text
stringlengths
198
621k
id
stringlengths
47
47
dump
stringclasses
95 values
url
stringlengths
15
1.73k
file_path
stringlengths
110
155
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
49
160k
score
float64
2.52
5.03
int_score
int64
3
5
Updated August 2012 — LWJ2 Listed below are some of the most common — or irritating — usage mistakes I've run across in years of reading. Note that many of these are homophones, words which are spelt differently, mean different things but are pronounced the same. Therefore, if you use pour instead of pore to describe your character reading very intently, your Spill Czech will not pick it up. And yes, that was a deliberate typo, which will also pass through a spell-check analysis. So after running your work through a spell check, you still have to proof read it. The definitions are mostly my own, you can get the general idea from them. Alter: to change something, i.e., He altered the settings on the radio. Altar: Located on sacred ground, a part of a religious ceremony, i.e., The priest approached the altar. The apostrophe: used to indicate a contraction, i.e. can't; or a possesive, i.e. Hitler's limousine. NOT used to indicate a plural. Smith's is the singular possessive. "John Smith's car." Smiths is the plural. "The Smiths left their house." The plural possessive uses an apostrophe at the end, i.e. The Smiths' house. Principle: Primary, main, a firm belief, i.e., A man's principles are the foundation of his character. Principal: A key portion or individual, i.e., Joe Doakes is a principal in the firm of Doakes, Smythe & Jones, LTD. Pouring: emptying a vessel of it's contents. He poured coffee from the pot. Poring, to pore: to study or contemplate. The scholar pored over many old manuscripts. Prone: to lie on one's stomach, face down. Supine: to lie on one's back, face up. Your - something you own, i.e., Your favorite tea mug. You're - contraction of you are, You're scheduled for your dental appointment this morning. There: A geographical location. Their: The possessive form of they. Can be singular or plural. They're: A contraction of they are. Aide/Aid: An aide is an assistant, a physical person. An aid is something that helps someone, not a person, "...with the aid of a chisel"; or the verb to aid; viz., "He aided them after the accident". "Joe Smith was Motchenfotch's principal aide." Council: A governing body or group of people, viz.: a County or City Council. Counsel: To advise, also used to refer to an attorney, viz.: Counsel of Record, Defence Counsel. Here: A physical place. Hear: What one does when a sound is made within a certain distance, the processing of auditory input by the brain. Cloth, cloths: fabric used to make garments,or something one uses to wipe down a bar or scrub a floor. Clothes: items used for apparel generally made of cloth. Breathe: to inhale air, i.e., He breathed deeply. Breath: what one inhales, i.e., He took a deep breath. Knew: present perfect or past perfect tense of the verb know, viz.: He knew they were liars. New: unused, fresh, viz.: There were new potatoes on the menu or The clothes were new. Peak: the top, i.e., They climbed to the mountain's peak. Peek: to view or look sureptitiously, i.e., She peeked between her fingers. Heal: to cure, to become healthy or whole. Heel: the posterior portion of the foot just below the ankle, also os calcis or calcaneus. Roll: a small loaf of bread or the motion of movement, tumbling, moving in a circular manner, generally on the ground. Also applied to cooking/baking, viz. "He rolled out the dough." Role (also rolé): a part in a play or motion picture. Planned: past tense of the verb "plan", i.e., "They planned to go to Venice." Planed: past tense of the verb "plane", i.e., "The joiner planed the door smooth." Plain: from the dictionary: 1. clear or distinct to the eye or ear: a plain trail to the river; to stand in plain view. 2. clear to the mind; evident, manifest, or obvious: to make one's meaning plain. 3. conveying the meaning clearly and simply; easily understood: plain talk. 4. downright; sheer; utter; self-evident: plain folly; plain stupidity. 5. free from ambiguity or evasion; candid; outspoken: the plain truth of the matter. 6. a geographical feature, viz, an extensive, basically flat area of land or sea bed. Stationary: un-movable, not moving; frequently used to refer to large machinery, i.e., stationary machinery. Stationery: writing paper, envelopes, et c.; goes back to the term for speciality printers known as stationers. Horde: a large mass of people, usually with fell intent, viz: A horde of barbarians. Hoard: to store something, hold something closely, the place where something is stored in such a manner, i.e., The dragon's hoard and She hoarded information as a bee would honey. Shear: to cut, frequently with scissors Sheer: steep, i.e., a cliff face is sheer Do: verb, i.e., He had to do his chores, Their homework was done. Due: adjective, i.e., The utility bill is due on the 15th. Due to unique circumstances ... Starred: This sneaks through Spill Czech. It's a sort of verb, as in He starred the critical items on the list. It's most frequently a typo for: Stared: Past tense of the verb to stare. Now on to newspapers and geography; something which really annoys me is that newspapers are constantly mis-identified — which probably puts me at the top of the column under "anal-retentive." I'm the ugly one with the moustache in the photograph, just in case you decide to look. The white-haired lady next to me is Dr. Grover, my high-school English teacher; my aunt is next to her. Don't mess with the lady, she worked for the Internal Revenue Service. First, it's The Times not, I say again NOT the "London Times" or "the Times of London." Second, the New York Times is NOT "the Times." It is the New York Times. The same applies to the Los Angeles Times — although that rag is generally called "the LA Times," for which I am thankful. I realize most American readers have probably never known the proper names, however, if one is writing, one should at least do minimal research. And yes, I'm well aware that denizens of the metropolitan New York City area routinely refer to the New York Times improperly. That does not make it proper or correct. The New York Times, well aware of their limitations, does refer to itself properly. Second place, coming up fast in the clubhouse stretch, is bad geography. Again, research. In this day and age, the internet can easily show a writer an overhead or map of almost everywhere. Prior to that, street maps of major areas were — and still are — readily available. One of the errors that still stands out in my mind was the author who had a rendezvous set at "35th and E NW" in a Washington DC-based novel. It doesn't exist; extending lines from those streets leaves one on North Kent Street between 19th Street and Wilson Boulevard in Arlington VA, not far from the Potomac River. If you're not writing a contemporary novel there's still no excuse, historical maps are available for some areas through Google Earth, there are references on-line for other locations. It isn't difficult. And editors, beta-readers — the same are available to you also. I can understand an unpaid beta-reader not doing that, but a professional editor? There is no excuse for muffing something like that when the information is so readily available at no or minimal cost.
<urn:uuid:5e7f7273-455b-47ad-b82f-6901aa122f78>
CC-MAIN-2021-43
https://m.fanfiction.net/s/7505980/1/Some-Notes-on-Basics
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587908.20/warc/CC-MAIN-20211026134839-20211026164839-00423.warc.gz
en
0.948481
1,791
2.96875
3
Linking Spatial Variations in Water Quality with Water and Land Management using Multivariate Techniques - Yongshan Wan *a, - Yun Qianb, - Kati White Migliacciob, - Yuncong Lib and - Cecilia Conrada Most studies using multivariate techniques for pollution source evaluation are conducted in free-flowing rivers with distinct point and nonpoint sources. This study expanded on previous research to a managed “canal” system discharging into the Indian River Lagoon, Florida, where water and land management is the single most important anthropogenic factor influencing water quality. Hydrometric and land use data of four drainage basins were uniquely integrated into the analysis of 25 yr of monthly water quality data collected at seven stations to determine the impact of water and land management on the spatial variability of water quality. Cluster analysis (CA) classified seven monitoring stations into four groups (CA groups). All water quality parameters identified by discriminant analysis showed distinct spatial patterns among the four CA groups. Two-step principal component analysis/factor analysis (PCA/FA) was conducted with (i) water quality data alone and (ii) water quality data in conjunction with rainfall, flow, and land use data. The results indicated that PCA/FA of water quality data alone was unable to identify factors associated with management activities. The addition of hydrometric and land use data into PCA/FA revealed close associations of nutrients and color with land management and storm-water retention in pasture and citrus lands; total suspended solids, turbidity, and NO3 + NO2 with flow and Lake Okeechobee releases; specific conductivity with supplemental irrigation supply; and dissolved O2 with wetland preservation. The practical implication emphasizes the importance of basin-specific land and water management for ongoing pollutant loading reduction and ecosystem restoration programs.Please view the pdf by using the Full Text (PDF) link under 'View' to the left. Copyright © 2014. . Copyright © by the American Society of Agronomy, Crop Science Society of America, and Soil Science Society of America, Inc.
<urn:uuid:a946fd67-2c7f-4728-b6c8-1983405e6396>
CC-MAIN-2016-36
https://dl.sciencesocieties.org/publications/jeq/abstracts/43/2/599
s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982295358.50/warc/CC-MAIN-20160823195815-00146-ip-10-153-172-175.ec2.internal.warc.gz
en
0.883188
435
2.734375
3
Knowledge is Power The European Environment Agency and the European Commission have release new set of 32 online maps that show where air pollutants are present in high concentrations. This allows the pinpointing of major sources of pollution and will hopefully raise awareness and lead to changes. New online maps published today by the European Commission and the European Environment Agency, in close cooperation with the Institute for Environment and Sustainability (IES) of the Joint Research Centre, allow citizens to pinpoint the main diffuse sources of air pollution, such as transport and aviation. The new set of 32 maps shows where certain pollutants such as nitrogen oxides and particulate matter are released. It complements existing data on emissions from individual industrial plants from the European Pollutant Release and Transfer Register (E-PRTR). The Europe-wide register aims to help Europeans actively engage in decisions affecting the environment. The maps show nitrogen oxides (NOx), sulphur oxides (SOx), carbon monoxide (CO), carbon dioxide (CO2), ammonia (NH3) and particulate matter (PM10). You can access the maps here: The European Pollutant Release and Transfer Register (just make sure to pick the kind of pollutant you want to see in the menu on the left of the map) Via EEA, GCC More on Green Tech Mushrooms Can Break Down 90% of Diaper Materials Within 2 Months Amazon is Now Selling More Digital Kindle Books Than Print Books 95% Data-Center Cooling Energy Reduction Thanks to Fluid-Submerged Servers Google's Prediction API Could Optimize Your Car's Fuel Efficiency
<urn:uuid:fb116a1f-762d-48d5-8104-edf701eea379>
CC-MAIN-2019-18
https://www.treehugger.com/clean-technology/europes-air-pollution-is-shown-in-online-maps.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578532050.7/warc/CC-MAIN-20190421180010-20190421202010-00517.warc.gz
en
0.858638
331
3.484375
3
We just came across this article today and it is a must read for those with asthma and allergies, especially those with children who suffer from one or both. FAIRFAX, Va., May 14, 2012 (BUSINESS WIRE) — In recognition of National Asthma and Allergy Awareness Month, celebrated in May, the National Pest Management Association (NPMA) is reminding people that cockroaches can trigger asthma and allergy attacks, along with other pertinent diseases. According to the Centers for Disease Control and Prevention, an estimated 25.7 million people, including almost 7.1 million children, have asthma. Many of these cases are caused by one of the most dangerous allergens — cockroaches — that may be crawling inside your home. “Cockroach droppings, saliva, shed skin and other body parts contain potent allergen proteins known to cause allergic reactions and exacerbate asthma symptoms, especially in children,” said Dr. Jorge Parada, medical spokesperson for the NPMA. “Unfortunately, people who are exposed to these allergens during childhood are at an increased risk for bronchial hyperresponsiveness and asthma problems later in life.” In addition to being a culprit behind running noses, itchy eyes and wheezing, cockroaches spread nearly 33 kinds of bacteria including E. coli and Salmonella. They pick up germs on the spines of their legs as they crawl through decaying matter, which may be transferred to humans on hard surfaces and through food contamination. The NPMA offers the following tips to prevent cockroach infestations: - Seal cracks and holes around the outside of the home including utility pipes. - Properly ventilate basements and crawl spaces to prevent moisture buildup. - Keep counters free of crumbs and vacuum the floors often to reduce the accumulation of cockroach allergens. - Keep garbage in a sealed container and dispose of it regularly to avoid attracting pests. - Pay extra attention to kitchens and bathrooms — especially under appliances and sinks — as these areas are particularly vulnerable to cockroach infestations. - If you find signs of a cockroach infestation, contact a licensed pest professional to inspect and treat the pest problem. For more information on cockroaches or finding a local pest professional, visit www.pestworld.org. The NPMA, a non-profit organization with more than 7,000 members, was established in 1933 to support the pest management industry’s commitment to the protection of public health, food and property. SOURCE: National Pest Management Association (NPMA) Green Pest Solutions is a recognized leader in the pest management industry in the Philadelphia and the surrounding areas. The company offers pest and termite control services using traditional treatment methods and green products. Not valid on one-time services. Pertains to new annual service agreement. Cannot be combined with other promotions. One coupon per service. Subject to change without notice. Offer Expires April 30, 2019
<urn:uuid:3cd7cc31-9d90-4ceb-9649-db19f82edc04>
CC-MAIN-2019-18
https://www.greenpestsolutions.com/2012/05/cockroaches-linked-to-increased-asthma-and-allergy-attacks/
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578526966.26/warc/CC-MAIN-20190419021416-20190419043416-00553.warc.gz
en
0.925905
619
3.359375
3
Once, during Prohibition, I was forced to live for days on nothing but food and water. Not all chemicals are bad. Without chemicals such as hydrogen and oxygen, for example, there would be no way to make water, a vital ingredient in beer. The functional group is ľOH and in a compound is known as the hydroxy group. If the main group in the molecule is the OH then the compound is an alcohol. The name is given as for the alkane but with the ending ľol, or, if the OH is not on the 1 position it will -2-ol, or -3-ol depending on the carbon atom it is attached to. If the OH group is not the main group in the molecule then the OH may be called hydroxy . Alcohols like the halogenalkanes are defined as primary (1o), secondary (2o) and tertiary (3o) depending on the position of the ľOH group. Butanol can exist in all three forms, 1o,2o and 3o ;please note the naming! The polarisation of the Cδ+ -Oδ- bond is qualitatively similar to the C-Hal bond. There is the possibility of nucleophilic attack at the Carbon, and electrophilic attack at the Oxygen. Alcohols also show the reactions of the ľOH group. Hydrogen bonding raises the mpt and bpt's of alcohols far above those of hydrocarbons of similar molecular weight. The hydroxyl group renders low molecular weight alcohols water soluble because the -OH group forms hydrogen bonds with the water, the higher alcohols become insoluble as the hydrophobic properties of the alkane end of the molecule kicks in. With the ľOH group we might expect the group to ionise as follows ľO- + H+ , as it does in HCl, but it does not do this, so we need a way to quantify the ľOH group and any other acid. e.g. a strong acid will have its equilibrium over to the RHS of the equation. Acidity of OH: Alcohols are very much weaker acids than water, e.g. ethanol pKa about 18 (N.b. the smaller the pKa value the stronger the acid). Water has a pKa of about 16 Salts (alkoxides) are formed by reaction of alcohol with alkali metal or alkaline earth metals: 1. With sodium: the alcohols give up a proton, and in this capacity they behave as an acid, forming a salt-sodium alkoxide. 2. Alcohols will react with even weaker acids: e.g. NH2-, H- 3. Oxidation to form the C=O group:Primary alcohols form first the aldehyde then on further oxidation the carboxylic acid. The oxidant is acidified potassium dichromate (VI). With refluxing, further oxidation gives: Secondary Alcohols are oxidised differently with acidified K2Cr2O7, this time ketones are formed: 4. Dehydration: This is the elimination of water from the molecule. It is achieved by passing the alcohol vapour over aluminium oxide at 400oC. Dehydration can also be done using concentrated H2SO4, e.g. At 180oC ethene is formed. At 145oC diethyl ether is formed. 5. Formation of Esters This reaction is very slow, to help the process a catalyst is used, this enables the alcohol to become a better nucleophile and for the acid to be a better electrophile. The catalyst is usually an acid, this protonates the carbonyl oxygen and thus increases the electrophilicity of the acid. The ester that is formed is as shown below, you can see that the original C=O has reformed into the carbonyl group and water was lost; try to work out the mechanism for this resultant. If too much acid is used in this esterification, the reaction will go much slower as the acid will protonate most of the ROH. Concentrated H2SO4 or dry HCl ( Fischer Speier1) are the most common used catalysts. b) Basic catalysts, to give RO- , can be used; i.e. they increase the nucleophilicity of the alcohol. These cannot be used with free carboxylic acids, as they would react to give the salts, but are used with acid chlorides. This is the Schotten Baumann2 reaction. 1 E. Fischer and A. Speier, Ber. 28, 3252 (1895). 2 Bull. Chem. Soc. Japan 42, 1756 (1969) 1. Alcohols with a strongly electrophilic carbon: The alcohol can now attack the R group: 2. RO- as a strong nucleophile: Williamson synthesis3 3 A. W. Williamson, J. Chem. Soc. 4, 229 (1852): also, L. F. Fieser and M. Fieser, Advanced Organic Chemistry, pp 113, 306 ( New York 1961). Preparation of Alcohols 1. A Sn reaction by HO- on R-Hal or CH3COO- 2. Grignard Reagents: RMgX 3. Reduction of aldehydes and ketones: this is done using H2/Pt, LiAlH4 and NaBH4 (these being a source of H-) This reaction uses an aluminium catalysed H - shift from the CH3CH(OH)CH3 (propan-2-ol) via a 6 membered transition state. The catalyst is usually Al(OiPr)3 (OiPr is propan-2-ol) and is used because one of the products is propanone and this can be removed from the mixture by continuous distillation. 4 Reduction of acids and esters with LiAlH4:
<urn:uuid:eb791e42-1b3a-475a-abec-a82ed6509f42>
CC-MAIN-2017-30
http://intermediateorgchemistry.co.uk/alcohols.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549428325.70/warc/CC-MAIN-20170727162531-20170727182531-00707.warc.gz
en
0.90194
1,276
3.375
3
Welcome to Tea & Tips, where we respond to burning questions from parents and educators — taking aim on one topic at a time, guiding you to improve communication, confidence and calm. Many kids with complex challenges resist getting positive feedback from their parents. It’s strange, because they get so much negative feedback that you’d think they’d be all over it. But truly, it’s quite common for complex kids to feel embarrassed or ashamed. They don’t want you to make a big deal about things. So how do you build their confidence and help them feel proud of themselves? Diane and Elaine have a few simple thoughts. Elaine: One of the issues we hear a lot from parents is frustration because their kids don't take praise well. Parents want to acknowledge them for something they're doing well, and the kid doesn't want to hear it. And so parents really want to be able to boost their confidence, but the kid is kind of resistant. Diane: And a lot of times what happens is these kids do get a little self-conscious, so they feel beat up. And so as parents we naturally want to boost them and get their ego's up. And so part of it is modeling that, because I think as adults, sometimes we do the same thing. It's like, "Oh no, it's nothing, it's not a big deal." We kind of dismiss praise when it comes to us as well. Elaine: Yeah. So, really modeling that and celebrating, right? Celebrating when things go well. Celebrating what we do well. Diane: Celebrating what they do well, and doing it in a way that they can hear it. So, sometimes people like verbal praise. Sometimes it's a high five. Sometimes it's a, "Hey, let's go out for ice cream." But part of it is about finding ways that your kids can comfortably hear and accept praise, rather than having it be the same way all the time. Elaine: Well, and it's got to be authentic, right? It's got to come from a real feeling of, "Wow, this is exciting," instead of a sense, "I want to make sure I'm boosting your confidence." We want to do it really authentically. Diane: And pat of it is about it being external praise. So, if you can get them to the point where they're praising themselves and using words like, "You must be really proud of yourself," instead of, "I'm proud of you," it feels really different to a kid. Elaine: One of my kids really struggled with this issue, and I remember having a conversation where she said to me, "But I was taught not to be prideful." Right. And so to make that distinction between prideful and it's okay to be proud of yourself. That's a leap for some of them. And so to really help her say, "I bet you're really proud of yourself," was way more important than me saying, "I'm proud of you." Diane: Right, so there's two pieces. One is the kid maybe beating himself up internally. And so you want to model celebration. And then the other is that they may be feeling like they shouldn't be boastful. Elaine: Right, and so give them permission and model it for them as well. Bottom Line: If your kids are embarrassed by your praise, you can help them feel proud of themselves and build their confidence with a few quick shifts. Tea & Tips videos are for busy parents. Short, sweet and to the point. To get weekly wisdom delivered to your inbox, sign up for our newsletter below. Stay Up to Date Get our newest tips, articles & videos delivered to your inbox.
<urn:uuid:16d86cf5-619e-43b6-a7a1-eaa2eeaadb37>
CC-MAIN-2019-39
https://impactadhd.com/help-kids-feel-proud
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573832.23/warc/CC-MAIN-20190920050858-20190920072858-00400.warc.gz
en
0.977682
791
2.765625
3
Unauthorized Immigrants and Their U.S.-Born Children Unauthorized immigrants comprise about 4% of the adult population, but their children make up a much larger share of both the newborn population (8%) and the overall child population (7% of those younger than age 18) in this country. Hispanics and the GED Hispanics have a much higher high school dropout rate than do blacks or whites, but far fewer obtain GEDs. Among dropouts, however, native-born Hispanics are four times more likely than foreign born to have a GED, and as likely as African American dropouts. Hispanics and Arizona’s New Immigration Law Past Pew Research Center reports have found that Latinos are the ethnic group most likely to be illegal immigrants and that Americans see Hispanics as the racial/ethnic group most often subjected to discrimination. Find more demographic and public opinion research related to the new Arizona law in a just-released fact sheet. Latinos and the 2010 Census: The Foreign Born Are More Positive Foreign-born Latinos are more likely to say the census is good for the Hispanic community and are more knowledgeable about the process than native-born Latinos. But large majorities of both groups plan to participate. Census History: Counting Hispanics Despite the long history of Hispanic residents in the United States, there was no systematic effort to count this group separately in the Census until the late 20th century. An analysis of changes in Census question wording over recent decades reveals the challenges in trying to count and describe this fast-growing population.
<urn:uuid:0ac29be1-4b16-481e-bdfd-a479bb5b5e4d>
CC-MAIN-2014-52
http://www.pewresearch.org/topics/hispaniclatino-demography/2010/
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802775517.52/warc/CC-MAIN-20141217075255-00151-ip-10-231-17-201.ec2.internal.warc.gz
en
0.95814
325
2.890625
3
In 2007, Apple surprised everyone and announced the first iPhone. At this time, it was a major leap for society. We went from a “basic” cell phone where we were able to only call and text to a smartphone where we were able to surf on the Internet, send emails, use apps and download files. It’s hard to not see similarities with the jump from “basic” home to smart home. A Smart Home, what is it? A smart home is a residence that has lighting, heating, air conditioning, entertainment audio, security, and more that are able to communicate with each other and can be controlled remotely. In other words, compared to a “basic” home, a smart home offers energy efficiency, security and convenience to its owners, at all times. Let’s take a quick look at some of the most common elements that turn a home into a smart home: - Turn the light on when someone enter the room and turn it off, after a few minutes, when no one is in the room. - Set the light power at a desired level. - Use a smart lock to lock your door remotely, if you forgot to do it. - Create virtual barrier that will alert you if someone crossed it. - Start playing your favorite music in every room of your house with one click. A Smart Home, what does it looks like? Actually, a smart home looks exactly like a regular home. The only difference is that the home has some connected devices. A Smart Home is already capable to learn how its owners are living. It can predict actions such as adjusting the temperature in a room, if someone is in it or not, to minimize energy consumption. This is what we call at Hayo: Context Awareness. Companies innovate so quickly that we can wonder what a smart home will look like in five, ten or even twenty years. A new report shows that 52% of all respondents plan to buy a smart device in the next two years. What about you? Are you ready to take that step?
<urn:uuid:6a4f1e97-6cc5-483a-8e28-5161e3a64600>
CC-MAIN-2020-24
https://hayo.io/what-is-a-smart-home/?utm_source=rss&utm_medium=rss&utm_campaign=what-is-a-smart-home
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347413786.46/warc/CC-MAIN-20200531213917-20200601003917-00524.warc.gz
en
0.969078
430
2.515625
3
Canadian National Railway Company is a Canadian rail transportation company that operates the Canadian National Railway. It was created in December, 1918 as a Crown corporation of the Government of Canada to nationalize several bankrupt rail systems in Canada. On November 28, 1995 the company was fully privatized by the federal government when an initial public offering of shares was completed. From 1918 until 1960, the railway itself was known as the "Canadian National Railways", using the acronym "CNR". From 1960 to present, the railway has been known simply as "Canadian National"/"Canadien National", using the acronym "CN". The actual company name, Canadian National Railway Company, has been used from 1918 to present.
<urn:uuid:30758838-e5f1-4eda-84c4-61abeee59aff>
CC-MAIN-2014-41
http://www.reference.com/browse/Canadian+National+Railway+Company
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657127503.54/warc/CC-MAIN-20140914011207-00223-ip-10-196-40-205.us-west-1.compute.internal.warc.gz
en
0.974839
140
2.96875
3
Start a 10-Day Free Trial to Unlock the Full Review Why Lesson Planet? Find quality lesson planning resources, fast! Share & remix collections to collaborate. Organize your curriculum with collections. Easy! Have time to be more creative & energetic with your students! In this teddy bear maze learning exercise, students explore and seek out a route to help the teddy bear find his way to his house through a maze. 3 Views 1 Download
<urn:uuid:2088a15a-47c0-44a2-82ce-09f939f73564>
CC-MAIN-2017-04
https://www.lessonplanet.com/teachers/teddy-bear-maze
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283689.98/warc/CC-MAIN-20170116095123-00292-ip-10-171-10-70.ec2.internal.warc.gz
en
0.90489
96
2.734375
3
|IQ Test Guidelines| 1. Don't judge an IQ test by its name. Just because the test says its designed "for high IQ individuals", "a test for genius" etc does not necessarily mean that this is the case at all. Also, it might be pleasing to know that you have scored high in an IQ test, but it does not mean the results are valid at all. Many IQ tests are created by non-professionals who do not have a proper or clear understanding as to how IQ scoring operates. Every IQ test examines its subjects in a slightly different way. Some may be more biased towards particular areas of intelligence such as spatial or grammatical ability. Other tests are less accurate at the higher IQ levels, or do not take into account the situation where difficult questions are answered correctly. 3. Be aware of the target audience for the IQ test. If the IQ test is tailored towards the general public, it is likely that it will be inaccurate for higher levels of intelligence. This is because the average IQ lies within the 95-105 mark, so most general tests will aim to test your IQ with accurate measurements for the averages in mind. 4. Tests which tend to test multiple areas will tend be more accurate. Since there are many areas that compose our intelligence, it is only natural that a good IQ test is also able to discriminate and test multiple areas of intelligence. Such a test would include grammatical, logical, spatial, auditory, co-ordination, perspectival and stationary intelligence measures. This goes without saying, but some people like to believe that their IQ is sky high, even when they have taken an IQ test multiple times to artificially boost the score. The best method is to drop your ego and find out how high your IQ is. In actual fact, it doesn't matter what your IQ is, because you can become a genius nevertheless. Your starting IQ is only your starting point towards intelligence gains, and so a lower than expected IQ is definitely not a limiting barrier at all. What To Expect These guidelines will help you to recognise the limitations and strengths in the IQ test. You will therefore be able to interpret their results more accurately to determine your current IQ level.
<urn:uuid:a038ef3f-2ed7-4467-adf0-ae9c43d31a3c>
CC-MAIN-2014-10
http://www.geniusintelligence.com/iqtestguidelines.htm
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999652921/warc/CC-MAIN-20140305060732-00014-ip-10-183-142-35.ec2.internal.warc.gz
en
0.953935
452
2.859375
3
Personal hygiene is of paramount importance for a pregnant woman. The importance of this cannot be stressed upon enough. While the body does not feel like one’s own, rising progesterone and estrogen level adds to one’s woes. A rising growth of bacteria levels results in an increased body odour. Good hygiene goes a long way in ensuring that infections can be negated, the health of the baby is retained, and the would-be-mom feels fresh. Odor-causing bacteria tend to become hyperactive during pregnancy. Cleaning the teeth after every meal is the need of the hour during this period. Dentists often recommend cleaning the tongue as well. Using an antimicrobial mouthwash can be of great help to ensure that bad breath doesn’t embarrass a pregnant woman. There are chances of vaginal odour during the pregnancy stint. Hormonal changes increased blood flow to the genital region, and increased discharge can initiate the vaginal odour. As part of the normal hormonal change, there can be an acidic smell along with white discharge from the vagina. If this becomes difficult to deal with, the vaginal area can be washed twice daily and pat dry. Wearing cotton panties also helps the smell to escape. In case the vaginal discharge smells rancid or fishy, a healthcare provider should be immediately consulted. Smelly feet is a result of increased water retention and weight gain because of pregnancy. This results in sweaty feet and snug shoes. It makes sense to change shoes every alternate day and wear fresh socks daily. Soaking feet in lukewarm water mixed with tea bags can pay rich dividends in curbing this issue. Additionally, consuming at least 10 glasses of water daily helps to ensure that bacterial growth in the feet doesn’t crop up. Because of the hormonal changes in the body, the level of bacteria in the skin take a spike as well. This results in the underarm funk. To tackle this, bathing at least twice a day, avoiding tight clothes and wearing cotton outfit can greatly help. Additionally, choosing an antiperspirant deodorant can help to mask odour as well as inhibit sweat. The tooth is the most neglected part of the body when it comes to pregnancy hygiene. Brushing the tooth twice a day and flossing every alternate day can help to ensure no build-up of plaque. The growing level of estrogen in the body can make the gums more sensitive. To counter this, the gums should be massaged with an anti-inflammatory agent to neutralize its sensitivity. Few other hygiene practice that should be always maintained includes cleaning the body every time after using the washroom, rigorously washing the hands every time before the meal, using a sanitizer after wearing shoes, using a soap that is well within the recommended pH criteria etc. At times it becomes difficult to take care of the hair like normal times. Pregnancy fatigue is the main culprit behind this. Without proper hair care, there are chances of a sudden influx of dandruff leading to itching of the skull. The ideal way to deal with this is to ensure shampooing of hair at least twice in a week. Applying a gentle hair oil on the skull and using a scarf while going out can also produce fruitful results.
<urn:uuid:20e040c2-8701-4bde-95d6-2687d149acf6>
CC-MAIN-2019-13
https://www.tinystep.in/blog/importance-of-personal-hygiene-for-pregnant-women-xyz
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912203464.67/warc/CC-MAIN-20190324165854-20190324191854-00404.warc.gz
en
0.932914
665
2.609375
3
Most babies are born with curved or bowed legs. This is usually a result of the way they were "packaged" in the uterus. (You can see this if you try to fold your baby back into the position that she was in while inside of you.) When your child starts walking, somewhere between 9 and 17 months, the bones in her legs will start to slowly reform as old bone breaks down and is replaced by new bone in different places where it's now needed to support her weight. Usually within six to nine months of starting to walk, your child will have straighter legs.
<urn:uuid:81277d83-3948-4498-aed3-d23bf0aa3907>
CC-MAIN-2016-18
http://www.babycenter.com/404_why-are-my-babys-legs-bowed-is-this-permanent_9956.bc
s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860111518.82/warc/CC-MAIN-20160428161511-00198-ip-10-239-7-51.ec2.internal.warc.gz
en
0.986478
119
3.03125
3
Pediatric dentists specialize in treating children and assisting them in feeling comfortable and relaxed. Sedation in dentistry refers to the use of several different methods to promote improved coping skills during dental procedures. Often very young children, highly anxious children, and some children with special needs are candidates for sedation. Our office offers various options including: Nitrous oxide, more commonly known as “laughing gas”, is a combination of nitrous oxide and oxygen. It is administered for a mild sedative effect to accomplish dental treatment. While inhaling nitrous oxide, your child remains fully conscious and more relaxed. Conscious sedation is a management technique for children who have a level of anxiety that prevents good coping skills or are very young and do not understand how to cope in a cooperative fashion for proper dental treatment. Conscious sedation usually involves the use of medications at doses calculated to the child’s weight, along with the use of nitrous oxide, that help alleviate the child’s anxiety and promote a comfortable environment for providing dental care. The patients remain conscious while in a more sedated state, with constant monitoring of vital signs. Before administering any sedative medication, Dr. Krieger and/or Dr. Gulati will discuss with the parent the process of pre- and post-sedation instructions. Dr. Krieger and Dr. Gulati both have specialized training in the use of conscious sedation and are licensed in the State of Georgia for pediatric conscious sedation. The American Academy of Pediatric Dentistry recognizes sedation as a safe and effective technique in treating children’s dental needs.
<urn:uuid:513a77d0-9ac4-4a31-86d5-fbaaaff80057>
CC-MAIN-2018-09
http://atlantapds.com/sedation/
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891814101.27/warc/CC-MAIN-20180222101209-20180222121209-00173.warc.gz
en
0.939242
334
3.234375
3
but it can be a great one! Use your mentor and your Association prepare yourself before school starts. - Visit your classroom. - Set up student desks, work stations and your own desk. - Develop a seating chart. Consider traditional student seating in rows until you get to know your students. It will make your teaching life much easier. - Create lesson plans for the first week. Plan for twice as much material as you think you can cover in a day. This will help when the lesson you thought would take an hour only takes twenty minutes. - Decorate your room. Send a message that's positive and inviting. Inspirational thoughts and words of encouragement can motivate. - Develop routines and standards for the day. Think about how you will handle discipline, classroom interruptions, recess. Talk to your mentor for ideas. - Develop routines for the beginning and end of class. Decide how you will take attendance, distribute work and dismiss the class. Consult your mentor. - Decide how to handle and organize information on absences, tardiness and other student information. Set up a system for your grade book and/or computer. - Establish instructional activities and routines. Decide how much time you will spend on a particular lesson, on group work and on individual work. - Prepare for fire drills and lock-downs. Know the procedures for every room you use. Develop a routine or standard for how you will manage your own paperwork. Think about how you'll handle deadlines, incomplete work, grading papers, extra credit, assignment due dates. - Develop a communication system. One of the most important partners in this job is parents. How will you communicate both the good and the bad news about their children to them? Decide if a newsletter, personal notes, e-mail, a website or all of these methods can be used. - Develop a schedule and expectations for homework. Think about how students will get their missed assignments or make up missed work.
<urn:uuid:813da44b-4b2f-4c81-981a-993fbdd477f2>
CC-MAIN-2017-39
http://teateachers.org/making-it-through-first-day
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818687484.46/warc/CC-MAIN-20170920213425-20170920233425-00062.warc.gz
en
0.919122
408
3.109375
3
Materials scientists at Harvard have created a fuel cell that not only produces energy but also stores it, opening up new possibilities in hydrogen fuel cell technologies. The solid-oxide fuel cell (SOFC) converts hydrogen into electricity, and could have an impact on small-scale portable energy applications. The thin-film SOFC benefited from recent advances in low-temperature operations, which enabled the integration of versatile materials, said lead researcher Shriram Ramantham. The star of the new cell is vanadium oxide, a multifuncional material that allows the fuel cell to multitask as both an energy generator and storage medium. The new fuel cell uses a bilayer of platinum and vanadium oxide for the anode, which allows the cell to continue operating without fuel for up to 14 times as long as the thin-film SOFCs that use platinum only for the electrodes. In the case of the latter, when the platinum-anode SOFC runs out of fuel, it will continue to generate power for only about 15 seconds before it fizzles out. With the new fuel cell, the scientists have managed to increase that to three minutes, 30 seconds at a current density of 0.2 mA/cm2. That length of time could be increased with further improvements to the composition of the vanadium oxide-platinum anode. It should happen fairly soon, and this type of fuel cell could be available for applications testing within two years. The researchers say that one field that could benefit from the new fuel cell is micro aerial vehicles, although fuel cells for powering vehicles are already a reality. The researchers observed and confirmed a few chemical phenomena that possibly explains the extended power of the cell. The first of these is the oxidation of the vanadium ions. Another one is the storage of hydrogen within the vanadium oxide crystal lattice, which is then gradually released and oxidized at the anode. Finally, they noticed that the concentration of oxygen ions differs from the anode to the cathode, which could mean oxygen anions (negatively-charged ions) also get oxidized as in a concentration cell. Details about the research appeared in the journal Nano Letters. Source: Harvard University
<urn:uuid:b88bb5b1-733e-4824-a2e5-4f89e31db62e>
CC-MAIN-2017-43
https://newatlas.com/harvard-research-hydrogen-fuel-cell-battery/23252/
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187825227.80/warc/CC-MAIN-20171022113105-20171022133105-00082.warc.gz
en
0.933059
448
3.703125
4
Soil moisture is an important land surface variable, which is present at land-atmosphere interphase and influences the hydrologic, atmospheric, climate, agricultural, and carbon cycles. Given the challenges involved in measuring the soil moisture at the local scale (heterogeneous nature of the soil, financial constraints etc.), microwave remote sensing has assisted the researchers in obtaining the soil moisture at the global scales. Microwave remote sensing of the land surface processes has advantages over optical remote sensing such as least attenuation due to the atmosphere, and high temporal resolution among others. The microwave sensors can be categorized into two kinds, passive (where the Sun acts as the source of energy) and active (where the sensor sends a microwave signal and records the response) sensors. Each has their own pros and cons. With the advent of dedicated soil moisture missions European Space Agency (ESA)’s Soil Moisture Ocean Salinity (SMOS) sensor and National Aeronautics and Space Administration (NASA)’s Soil Moisture Active Passive (SMAP) sensor, there is an increased opportunity to involve soil moisture in several hydro-meteorological, climate and agricultural applications such as monitoring of floods and droughts, estimation of precipitation, crop yield assessment, and weather forecasting. Last year, 2017, marks the four decades of research on microwave remote sensing of soil moisture. Signifying this milestone, a synthesis of four decades of research and development on the passive and active microwave soil moisture retrieval algorithms is provided. A retrieval algorithm is used to convert the satellite microwave measurements (brightness temperatures in the case of passive sensors, backscatter coefficients in the case of active sensors) into soil moisture. Generally, microwave measurements associated with L- (0.5 – 1.5 GHz), C-(4 – 8 GHz), and X- (8 – 12 GHz) frequency bands are sensitive to the dielectric constant of soil, which in turn gets influenced by variations in the moisture content of the soil. It is interesting to note that the use of lower frequencies will improve our ability to retrieve soil moisture from greater depths. So, an L-band sensor, which is equipped currently in SMOS and SMAP missions, can retrieve soil moisture up to a depth of 5 cm. The microwave measurements intended to retrieve soil moisture have major and minor attenuations due to the presence of vegetation and atmosphere respectively. So, a retrieval algorithm generally attempts to separate the effects of these attenuations from the satellite measurement in order to estimate the signal that associated exclusively with the soil moisture. Over the past four decades, numerous airborne and field campaigns have assisted researchers to improve our ability to obtain high-quality soil moisture retrievals at global scales. In this review effort, the important developments that took place in the area of retrieval algorithms associated with passive and active microwave satellite sensors are presented. These developments are summarized in the form of figures, one each for passive and active microwave satellite soil moisture research. In each of these figures, the entire area of research is categorized into important sub-fields. The passive microwave soil moisture research (Figure 1) is broadly classified into six fields, concept development of retrieval algorithms, dielectric mixing model, surface temperature, roughness effects, vegetation effects and atmospheric effects. The active microwave soil moisture research (Figure 2) is broadly classified into five fields, characterization of soil moisture, roughness and vegetation, physical models, semi-empirical models, empirical models, and change detection approach. The numbers on the sides indicate the year during which a particular paper got published. Each citation is color coded so as help the reader to select the set of references that belong to a particular sub-field. For example, if one is interested in learning about the advances that took place in the area of ‘roughness effects’ in passive microwave remote sensing of soil moisture since 1965 to 2017, the references indicated in brown may be selected and reviewed. The works that have made multiple contributions are indicated in black. Through this review, the following challenges have been identified in terms of the algorithm limitations and the associated physics, which call for further efforts. - A reasonable physical interpretation of several empirical parameters such as soil roughness and vegetation albedo is necessary so as to limit the assumptions involved and improve the global applicability of the retrieval algorithms. - There is a need improve the algorithms that quantify the Vegetation Optical Depth (VOD) accurately so as to facilitate the soil moisture retrievals over densely vegetated regions. - With ease in their implementation, attempts have to be made to extend the applicability of physics-based algorithms of the active microwave sensors the global scale. - Efforts have to be made to segregate the uncertainties in soil moisture retrievals due to sensor configuration and retrieval algorithm so as to reduce the noise and improve the quality of soil moisture retrievals. - The operational dielectric mixing models such as the Dobson model, and the Wang and Schmugge model still relies on the empirical equations developed during the 1980s. Hence, there is a need to update these models by considering a larger database of up-to-date soil samples so that the errors involved in soil moisture estimation from soil dielectric constant may be reduced. This review work can be considered as a starting point for someone who would like to venture into this area of research as it provides a comprehensive evolution of research and developments in the retrieval algorithms of soil moisture using microwave sensors. In the succeeding work (Karthikeyan et al. 2017), we looked into the evolution of passive and active microwave instruments, and the validation of soil moisture from eight passive and two active microwave sensors using station observations and land surface model simulations over the Continuous United States (CONUS) region. These findings are described in the article entitled Four decades of microwave satellite soil moisture observations: Part 1. A review of retrieval algorithms, recently published in the journal Advances in Water Resources. This work was conducted by Karthikeyan Lanka from Princeton University and Indian Institute of Science (IISc).
<urn:uuid:37ed4ee4-9b85-48e6-9aba-d8f2a0c77870>
CC-MAIN-2021-04
https://sciencetrends.com/determining-soil-moisture-globally-through-satellite-measurements/
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703564029.59/warc/CC-MAIN-20210125030118-20210125060118-00687.warc.gz
en
0.923197
1,238
3.78125
4
On a Sunday in late April, Andrew Tauber, a Mayer Brown partner in Washington, boarded a plane for Paris, where he and his father planned to spend an hour alone with a painting that his grandparents, the original owners, had sought for so long but did not live to see again. When he walked into the private viewing room at Sotheby's, Tauber recalled being struck physically and emotionally by the 18th century painting, "La Punta della Dogana e san Giorgio Maggiore," from the Italian artist Michele Marieschi. "I had only seen a black and white photo of it," Tauber, 54, said in a recent interview. "I had never seen it in color. To see the vibrant colors was breathtaking. To see the way the artist plays the light, the incredible detail of the workers' legs as they worked on the dock.” A partner in Mayer Brown's U.S. Supreme Court and appellate practice group, Tauber had briefed and argued myriad disputes—medical devices, railroad injuries, asbestos claims. He turned to a different set of skills to help resolve, through a settlement, the nearly eight-decade saga of the Marieschi painting, stolen from his family by the Nazis. Sotheby’s is preparing to auction the work next month. In our conversation with Tauber, excerpted below, he shared his family's history, their hunt for the painting and his role as chief negotiator in bringing the artwork out of the shadows. NLJ: When did you first become aware of the importance of the painting to your family? Tauber: I've known about the painting ever since my childhood. I was very close to my grandparents growing up and spent a considerable amount of time with them. In the course of growing up, I heard pieces of the story. It was part of the family history. What is some of that history? My maternal grandparents were Viennese Jews. They bought the painting in 1937. Germany annexed Austria in 1938. My grandparents fled for their lives across the Italian border. In preparation for migration, they placed all of their possessions in storage with the idea they would have their possessions shipped to them. Events overtook them. It took them three years to escape and get to the United States in 1941. Once the war was over, in 1945, my grandfather attempted to recover their possessions in storage. He was informed the Gestapo seized all contents in 1940 and they were probably sold at public auction. The painting resurfaced in London in 1952. We have no idea what happened to it between 1940 and 1952. The general attitude of those times was: the Jews are dead; they're not coming back for their property. Why was the painting so special to your grandparents? My grandfather had been trained as an architect and worked in finance, and my grandmother loved art. I developed an appreciation for art through my grandmother, who took me to all the great museums in New York where they lived. My grandmother spent most of her childhood in Trieste and had an affinity for Italy. It’s a beautiful painting by a master of a scene in Venice. It spoke to her love of art and Italy. Was the return of the painting a central focus of their lives here? No. My family was among the lucky families. We got out alive. They came to the U.S. as refugees and built new lives here. Their focus was on that. At the same time, they did not forget what happened to them and what was taken from them. My grandfather had correspondence with the Occupation authorities to no avail. He died when I was 13. A few years later, my mother and her twin sister contacted the Art Law Register, which then took out an ad in the Art Newspaper declaring the painting to be stolen property. Charles Beddington, who has some affiliation with Christie's, saw the announcement and realized he had seen the painting. He informed us but declined to disclose either the name of the possessor or the location citing a confidentiality agreement with Christie's. We go to Christie's and say it's stolen property; please disclose the possessor and location. Christie's declined. Did you go to court to get the disclosure? We sued in Boston district court to compel Christie’s to disclose. They forced us to go to England, where, in conjunction, with the Jewish Community of Vienna, we filed suit in London in the High Court of Justice, Chancery Division, in late 2004. Christie's was ordered to divulge the owner's name—Bryan Jenks, a British industrialist who left Britain for Monaco. He died in 2013 at age 94. In the early 2000s, the Jewish Community of Vienna attempted to approach the possessor and enter into a dialogue. He literally refused to engage, did not respond at all. I think we ultimately shrugged our shoulders and got on with our lives. But then about three years ago, I received a call out of the blue from an attorney—Christopher Marinello of Art Recovery International in Venice, saying he had been approached by the then possessors of the painting and wanted to start a dialogue. Jenks had died and the painting passed into a trust. Because it was a stolen painting, they could not sell it on the open market. They wanted to get clear title to sell. How did you respond to the request for a dialogue? I said yes. Of course I was interested in recovering the painting. We spent two years in negotiations. Part of the time, I spent doing research to document the claim and the rest of the time negotiating with the holders of the stolen work. It culminated in a settlement agreement. I have no idea how many times it went back and forth. It was an extended negotiation with many, many drafts exchanged. From my family's perspective, the proper resolution would have been the return of the stolen painting to our family. As the old saying goes, possession is nine-tenths of the law, and the trust has physical possession and had tremendous negotiating leverage. It was exciting and frustrating—exciting because the painting was finally within reach, and frustrating because it was clear from the outset that we weren't going to get the painting back. The only realistic solution was a negotiated financial agreement. How did the private viewing of the painting in Paris occur? Sotheby's helped smooth this entire process. They set up the private viewing room. It was just wonderful. I'm now 54 years old. I've known of this painting for half a century. We had been working so hard to reach a settlement. For the first time in my life to see this painting that had hung in my grandparents' home was very moving. Emotionally, how did you feel at this moment? It was certainly bittersweet at some level. My grandparents—Heinrich and Anna Maria Graf—are long dead. My mother, Erika, had died in the interim. My father and my aunt, Eva Glaser, each have three children. My aunt, who is 84, could not make the trip. If we had gotten the painting back, none of us could have hung it in our homes. It would have been donated to a local museum in Boston and we would have looked at it periodically and others too could have enjoyed it. As ambivalent as we may feel about the terms of the settlement, one unambiguous part of reaching settlement is that this lovely painting can now come out of the shadows to be enjoyed. Reprinted with permission from the June 6, 2017 edition of The National Law Journal © 2017 ALM Properties, Inc. All rights reserved. Further duplication without permission is prohibited.
<urn:uuid:439524cf-bbd6-4eb4-8993-4590d2077857>
CC-MAIN-2021-17
https://www.mayerbrown.com/en/news/2017/06/how-a-mayer-brown-lawyer-brought-a-nazilooted-fami
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038860318.63/warc/CC-MAIN-20210418194009-20210418224009-00022.warc.gz
en
0.986537
1,582
2.65625
3
In the middle of all the rapid changes of the current era, Japan is losing its traditional culture, its crafts and its skills. At Nine Bridges, we think the answer to this problem lies in looking outwards to the world, and with a well-balanced team, addressing the causes of the problem with clearly defined strategies and concrete steps. A Decreasing Population As the birth-rate declines and the population grows older, domestic demand falls, reducing the people’s purchasing power. The population continues to be drawn towards Tokyo and away from the regional cities, where the decreasing workforce becomes more and more apparent. This leaves fewer and fewer young people in those regional cities to inherit traditional skills and carry on the work of city-building. In addition, as the families responsible for presiding over Japan’s shrines and temples also decrease, it becomes increasingly difficult to secure the funds needed to maintain and preserve them. The Advancement of Technology While technology has greatly improved our lives, it simultaneously contributes to the erasure of those characteristics that make up the heart of traditional Japanese culture. The wares of traditional craftsmen take a great deal of time, effort, and skill to create, so the cost of an individual piece is much higher than something that has been mass-produced by machines. In future, with the rise of technologies such as 3D printing or robots with artificial intelligence, great changes will continue to occur in many different fields. If we only chase after lower prices and higher efficiency, we will lose the spirit of making objects with a human touch. Due to post-war educational reform, the Japanese have become greatly westernized, and the customs that used to be characteristic of Japanese everyday life have vanished. As a result, traditional furniture and everyday objects are also disappearing as their production declines. The old residence of a wealthy farmer – without efforts to maintain these mansions, they rapidly decay (Niigata City) The cost of preserving historical structures is high. As domestic demand for traditionally crafted goods falls, business becomes unsustainable, and without a successor, these crafts die out. For the reasons listed above, the spirit of traditional Japan is rapidly vanishing. It is easy enough to say that this is just the price of a more convenient lifestyle, or that this is just the natural consequence of change – however, if we abandon our traditional culture, we can no longer truly call this Japan. While this danger has already been reported on by the media, through our own personal experience visiting and talking to craftsmen and priests throughout Niigata Prefecture, we have gained a deep understanding of the situation. Though there are many Japanese who can also see this danger, they have their hands full protecting their own way of life. Why Global Connections Are Necessary A Wider Commercial Sphere If you look outwards from Japan, you can see that there are people in countries all over the world who love Japanese culture. Domestic demand for traditional handcrafted goods is limited – the simple solution is to spread the market overseas to those people with an interest in Japanese culture. Rediscover Japanese Culture Through the Eyes of Other Countries To those living in Japan, Japanese culture is so intertwined with the everyday that it can be easy to lose sight of its depths and complexity. Seeing it from the perspective of those overseas can reaffirm the value of Japanese traditions and re-establish what it means to be Japanese. Support from International Lovers of Japanese Culture Creating a community means more than just creating a market for goods and services. We can use our technological skills to raise awareness of the dangers Japan’s traditional skills are facing and propose possible solutions, such as crowdfunding. (Caption: There are people all over the world who love Japanese culture) To create contents, perform marketing, form online communities, and construct effective lines of flow in order to develop and expand our projects. By uncovering the sleeping treasures of the regional cities in beautiful and compelling web magazines, we’ll create new fans of Japanese culture all over the world. By setting up communities online, we’ll stimulate tourism to the regional cities and open up new markets for Japanese goods and services overseas, ensuring that traditional crafts and skills continue to exist for years to come. The material we cover isn’t subject to change, so the value of our information doesn’t decrease with time. Our goal is to create something rich and profound, even if that takes time. About Nine Bridges The members of Nine Bridges are creators and marketers, people who have personal experienced living abroad. While basing ourselves here in the regional cities of Japan, through the nine areas of people, goods, services, culture, history, places, philosophy, nature, and arts, we will form a bridge between Japan and the world. About our Logo Our logo uses one of the Genjikō crests (a part of the lesser-known Japanese art Kōdō, or “Way of Incense”), known as hashihime. Hashihime is an ancient goddess who blocks the path of bad influences such as infectious diseases, a protective deity of bridges. The perspective of those from Japan and from overseas, as well as the birds-eye view of those who aren’t constrained by the lines of nationality. Analog Spirit, Digital Expertise In this increasingly digital world, we use our expertise to anticipate the next change and make the first move, while at the same time staying true to an analog spirit that values traditions and nature. Rich Contents Creation We do not just use advertising tools to promote the works of others. We also propose our own ideas and produce our own media. We put some of our revenue towards making these contents and improving our communication skills, widening the range of possibilities for future projects. Construction of Networks Through our owned media properties, we are building a network connecting us to entrepreneurs and creators overseas. Through marketing, new product development, and research into the customs and tastes of target audiences, we can help boost conversion rates and mitigate risks. We are creating a pipeline that will allow the instant spread of information from the regional cities to the globe. Training Human Resources We would like to start a program to train individuals in cross-cultural communication – how to respect and appreciate the differences between countries while loving and promoting their own country’s culture. English language acquisition would of course be included, along with skills such as web design, photography, and film-making. Constructing a Replica of a Nostalgic Japanese Village After obtaining support both domestically and internationally, we would like to construct a village somewhere near one of the regional cities that would allow visitors to slip backwards in time to historical Japan. All of our tourist spots today were created by someone at some point in time. We’d like to challenge ourselves to create a new kind of space that nobody has seen before. Our role at Nine Bridges is to link Japan’s traditional culture from the past to the present, and from the present to the future.
<urn:uuid:43af918e-bff9-41de-8a7e-45631927d263>
CC-MAIN-2019-04
https://ninebridges.jp/our-role/
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583656577.40/warc/CC-MAIN-20190116011131-20190116033131-00277.warc.gz
en
0.950889
1,442
2.859375
3
—The Challenger Solid Rocket Boosters (SRB) Field Joint initial design was deemed as a direct cause of the shuttles catastrophic failure during lift off. The Field Joint SRB was a key component in containing dangerous gases produced in the SRB. After conducting research on the Challenger accident, a Fault Tree Analysis was developed to analyze the reliability of the SRB field joint configuration in relation to its goals. The reliability model will show how the field joint fell short in terms of operational reliability. —Failure analysis, SRB field joint, reliability. K. Jenab is with Faculty of the College of Aeronautics, Embry-Riddle Aeronautical University, FL, USA (e-mail: email@example.com). S. Moslehpour is with the Department of Electrical and Computer Engineering, University of Hartford, CT, USA (e-mail: firstname.lastname@example.org). Cite: Kouroush Jenab and Saeid Moslehpour, "Failure Analysis: Case Study Challenger SRB Field Joint," International Journal of Engineering and Technology vol. 8, no. 6, pp. 401-405, 2016.
<urn:uuid:1fa59f19-8c10-4c5c-a650-048d652ef8e6>
CC-MAIN-2017-09
http://www.ijetch.org/index.php?m=content&c=index&a=show&catid=80&id=1070
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172775.56/warc/CC-MAIN-20170219104612-00483-ip-10-171-10-108.ec2.internal.warc.gz
en
0.892108
247
2.8125
3
01 – Real-world objects contain? state and behavior 02- A software object’s state is stored in? fields 03- A software object’s behavior is exposed through? methods 04- Hiding internal data from the outside world, and accessing it only through publicly exposed methods is known as data? encapsulation 05- A blueprint for a software object is called? a class 06- Common behavior can be defined in a superclass and inherited into a subclass using the extends keyword. 07- A collection of methods with no implementation is called? an interface. 08- A namespace that organizes classes and interfaces by functionality is called? a package 09- A term API stands for Application Programming Interface. Endeavor: Create new classes for each real-world object that you observed next to you. For each new class that you’ve created above, create an interface that defines its behavior, then require your class to implement it. Omit one or two methods and try compiling. What does the error look like? There you are! Congratulations! Bear in mind that Want is Might. Just God is Power!. http://konlinux.com – fundada em 2002 – Knowledge Management.
<urn:uuid:6d7be7ad-66ef-4c65-b132-6ee3cf6112e6>
CC-MAIN-2018-39
https://konlinux.wordpress.com/2011/04/25/k-l-konlinux-object-oriented-programming-questions-and-answers/
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267160923.61/warc/CC-MAIN-20180925024239-20180925044639-00388.warc.gz
en
0.874665
256
2.8125
3
Sunday June 3 at 2:00 PM, in celebration of New York State Museum Week, a military drill will be held to honor the soldiers who secured our independence. Surrounded on all sides now by housing developments and in certain areas completely built over, the Continental Army winter encampment, at New Windsor, in 1782-83, was, during its short existence, the second largest city in New York State. Soldiers fashioned out of the ancient forest, approximately 600 buildings, arrayed in tidy rows, replicating battlefield formations. Though a mighty gathering, the effects upon the vicinity were fleeting. The army moved on in June 1783, leaving only a wife, abandoned by her ne’er do well husband, with two young children and quartermasters responsible for disposing of the encampment. Surplus army equipment, as well as nearly all of the log structures, were sold at public auction. Following the Revolutionary War, farmers cleared the land- making stonewalls out of the collapsed fieldstone chimneys of the huts. By the mid-19th century, except to the most discerning eye, all traces of the Continental Army had vanished. Learn about the historical significance of the New Windsor Cantonment and the soldiers encamped there during the final winter of the war. At the time, the 7,000 soldiers at New Windsor, and a few thousand more in the vicinity of West Point, were the only force standing between the people of New York and New England and 12,000 British troops in New York City, just 60 miles away. New Windsor Cantonment State Historic Site is co-located with the National Purple Heart Hall of Honor on Route 300, 374 Temple Hill Road, in New Windsor, NY, just three miles south of the intersection of I-87 and I-84. For more information please call (845) 561-1765 ext. 22.
<urn:uuid:078ca2ca-c577-42b4-9235-d3ab49949417>
CC-MAIN-2021-31
https://www.newyorkhistoryblog.com/2012/05/continental-army-encampment-at-new-windsor.html
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153729.44/warc/CC-MAIN-20210728123318-20210728153318-00663.warc.gz
en
0.957406
389
3.34375
3
National Talent Search Examination (NTSE) is a national-level scholarship program in India to identify and recognize students with extremely high intellect and academic talent. Close to 1,50,000 students appear in this scholarship exam every year. The scheme is open to students of Indian nationality. Only students studying in Class X are eligible to appear for the selection process. As it is organized by an official body (NCERT), it is widely regarded by the Government of India as the toughest and most prestigious examination at high school level in the country. What is NTSE: National talent search examination or NTSE is an annual examination conducted on a national level by NCERT. It was started in the year 1963 and has grown in prestige and scope ever since. The objective of the exam is to identify students who have the potential to excel in Science, Social Science, Engineering, Medicine, Management and Law. The successful students, called NTSE Scholars, receive financial support / scholarships from NCERT till the time they continue to study. How is NTSE exam conducted: NTSE or National talent search examination is conducted on a national level in 2 stages. - National Talent Search Examination’s Stage-1 is conducted by states and union territories. This is a written exam where students are supposed to answer questions related to mental ability, general science and maths. Each state / union territory selects a pre-specified number of candidates to represent it in the second round i.e. State-2. - Stage-1’s written exam consists of MAT (mental aptitude test) and SAT (scholastic aptitude test). Both the tests have 100 multiple choice questions to be answered in 90 minutes. More information on the paper content, sample paper etc can be found here. - NTSE’s stage-2 is conducted at a national level by NCERT. Only students who clear stage-1 of NTSE are eligible to sit in this stage. Though first stage has quotas or pre-specified number of seats for each level, there are no state quotas for the final round. However, pre-specified reservation for SC/ST and physically challenged candidates exists. - Like stage-1, NTSE’s stage-2 also has MAT and SAT. Further, those candidates who qualify the written exam at the national level will be called for interview. What are the important dates for NTSE 2013: There are 4 important dates regarding NTSE that you must be aware of. For academic year 2012, the dates for NTSE are as follows - Start date for sale of NTSE forms is 1st August 2012 - Last date for submission of completed NTSE application form is 31st August 2012 - Stage-1 NTSE exam will be conducted on Sunday 18th November 2012. However for Mizoram, Meghalya, Nagaland and Andaman & Nicobar Islands the stage-1 exams will be conducted on Saturday 17th November 2012. - Stage-2 NTSE exam will be conducted on Sunday 13th May 2012. The dates may vary from state to state. Further, the candidates who qualify the 2nd round written exams will be intimidated by post about the dates for interviews. Who is eligible to appear for NTSE 2013: All Indian students studying in class-8 of recognized schools are eligible to appear for the first stage of NTSE. There is no domicile restriction. in class-8 can take NTSE exam. Even Indian students living abroad can appear for NTSE. They can directly apply for stage-2 exams if they fulfil conditions prescribed in NTS brochure for Class-8. What is the course for NTSE 2013: NTSE exam follows NCERT prescribed syllabus and the exam is conducted in both English and in Hindi Why should I appear in NTSE: - NTSE is one of the oldest and most prestigious scholarship exams in India. - Around 1000 NTSE Scholars are finally awarded scholarships based on Stage-II results through this examination. It honours and helps talented students by providing financial assistance in the form of monthly scholarship. For the courses in Basic Sciences, Social Sciences and Commerce, this assistance is provided up to Ph.D. level. For professional courses like Engineering, Medicine, Management and Law this assistance is given only up to Post Graduation. - Scholarship exams like NTSE have been designed with the sole aim of encouraging students to develop the skills, attitudes, knowledge, aptitudes, talent (both apparent and latent), proficiency & expertise. It also emphasizes in moulding the students in a way where they will not only be able to handle the intricacies of the exam but also the pressure of competition. Importance of NTSE in Class X - The National Talent Search Examination (NTSE) is a National Level scholarship program in India to identify and nurture talented students. - Till year 2007, it was conducted for students of class X only and in the Stage-I and Stage-II, objective questions based on applications of fundamentals of subjects of Class IX and X are asked. Some questions are based on advance application of the subjects. - When a student prepares for NTSE, the preparation methodology is oriented to train the brain of student for understanding in-depth applications of all concepts of Science and Mathematics. This preparation helps students in grooming their brain for fundamental and advance applications which are asked in engineering and medical entrance examinations when student is in class XII. - NTSE preparation forms a strong foundation of students for higher level competitive and other scholarship examinations. - During Class XI, all bright students aspire for KVPY Fellowship (visit www.kvpy.org.in for details). Till year 2008 it was observed that almost all KVPY fellows were NTSE Scholars. This is because NTSE preparation starts building the application based foundation in students. - Till year 2009, it is proven history that students who were NTSE Scholars, have performed extraordinary in all engineering and medical entrance examinations. - Shifting NTSE back in Class X is boon for all students who are aspiring for higher level competitive examinations during their Class XI and XII.
<urn:uuid:282240fa-c28f-4d34-9efa-e0c0b1e38eed>
CC-MAIN-2022-05
https://gdiitclasses.org/ntsc.php
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304798.1/warc/CC-MAIN-20220125070039-20220125100039-00170.warc.gz
en
0.950591
1,257
2.984375
3
Cooperative Discipline. Revenge and Power!. STAGES. There are three different stages and techniques in power/revenge situations: The Rumbling Stage: Make a Graceful Exit The Eruption Stage: Use Time Out The Resolution Stage: Set Consequences; Conduct a student-teacher conference. Revenge and Power! There are three different stages and techniques in power/revenge situations: Warning signs: students’ face or body language, hear it in their voice, smile when disregarding rules We must remain calm. Do not use sarcasm or animosity. Humor directed at the teacher or situation may bring a more graceful exit. Sarcasm directed at the student will not help the situation. It’s like adding fuel to the fire! Teachers cannot actually make students do anything. We can acknowledge this and show that we are both human. This fuels cooperation. When students know that we are not superior and in turn they are not inferior, they tend to cooperate more than confront. The more we try to control students, the more they resist. Strategy #1: Remove the Audience Strategy #2: Table the Matter Strategy #3: Schedule a Conference Strategy #4: Use a Fogging Technique Strategy #1: Time out in the classroom This should be out of the direct line of vision of the rest of the students. You can partition off a small area of the room with a bookcase, moveable chalkboard or bulletin board. Strategy #2: Time out in another classroom Partner with a fellow teacher so that you each can send students to his/her room. The students in another class usually aren’t interested in being an audience for the misbehaving student. Strategy #3: Time out in a special room This is a step between another classroom and the principal’s office. Check with your school about a time out area. Strategy #4: Time out in the office This is the last resort. You might have to use this when all in-school choices have failed or the misbehavior is so malicious that intermediate steps are not an option. Strategy #5: Time out in the home The most sever time-out technique is suspension from school. This should be avoided when possible. Plus many students see this as a reward. Implementing Time Out: The Who Squad Duration of time out: Guidelines for effective consequences: Selecting the Consequence Forming Relationships with Students We Dislike: Teaching Students to Deal with Their Emotions: Developing Anger Management Plans
<urn:uuid:b6227be5-fb9e-45ad-9a21-0041a25eb218>
CC-MAIN-2017-04
http://www.slideserve.com/race/cooperative-discipline
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282202.61/warc/CC-MAIN-20170116095122-00236-ip-10-171-10-70.ec2.internal.warc.gz
en
0.90796
547
3.1875
3
Statistics drawn from Unicef, International Labour Organisation and the World Health Organisation indicate that one in five children in Europe are victims of a form of sexual abuse. It has been also estimated that in 70-85% of circumstances the abuser is a person that the child knows and feels they can trust. With its ONE in FIVE campaign the Council of Europe aims to stop sexual violence against children. One strand of the ONE in FIVE campaign is called The Underwear Rule. This simple and clear rule is aimed to help parents and carers talk to children about staying safe from sexual abuse. When discussions surrounding the topic of sexual abuse can seem difficult to approach this simple rule helps to explain to a child that their body is their body and they should always seek support and help from an adult if they ever feel intimidated, confused or distressed. The Underwear Rule video can be watched here. There are currently 14 national Underwear Rule campaigns in 14 European countries (EU and non-EU). The NSPCC reports Child abuse and neglect today in the United Kingdomand How safe are our children?reveal that an 200,000 children are in need due to abuse and neglect in 2011-2012 and in the same time period there were 29,305 recorded sexual acts and cruelty offences against children. The latter report draws together to most current and robust data regarding child protection and states that 1 in 5 children in the UK today have experienced severe physical abuse, sexual abuse or physical or emotional mistreatment. With these statistics in mind the NSPCC have initiated its Underwear Rule campaign.
<urn:uuid:6d9d0839-63f0-4976-96ed-715ddbd3bc54>
CC-MAIN-2014-52
http://europa.eu/epic/news/2013/20130918-the-underwear-rule-campaign_en.htm
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802766267.61/warc/CC-MAIN-20141217075246-00156-ip-10-231-17-201.ec2.internal.warc.gz
en
0.957487
317
3.640625
4
|View Our Catalog||Signed Languages| From Library Journal Signed language preceded spoken language in the evolutionary process, according to Stokoe (English and linguistics, Gallaudet Univ.), who passed away in April. His book persuasively demonstrates the worldwide diversity of signed languages and their viability as vehicles of both meaning and syntax. First, Stokoe explains with many examples how gestures can be true sentences (with both noun and verb components). He then supports his proposed order of linguistic development from four approaches: exploring the unique ability of visible signs to resemble what they represent, comparing human anatomy involved in gesture and speech to the anatomy of chimpanzees and other primates, examining signed languages still in use today among both hearing and hearing-impaired communities, and observing linguistic development in children. In this way, Stokoe not only effectively promotes the use of sign language in deaf education but also hopes to broaden the views of all who endeavor to help students achieve literacy. The complexity of signed language is examined in detail in Signed Languages through its selection of 13 papers presented at the 1998 Theoretical Issues in Sign Language Research Conference. This volume presents papers not published elsewhere. Moreover, more than half of the chapters discuss signed languages from other parts of the world, such as Sign Language of the Netherlands and the Hausa Sign Language from Nigeria. The editors divided the work into traditional areas of language study, such as morphology, syntax, psycholinguistics, and poetics. Further examination of the role of signed language in linguistic development is available in Sarah Taubís Language in the Body: Iconicity and Metaphor in American Sign Language (Cambridge Univ., 2001). Both volumes are highly recommended for specialized linguistics and deaf studies collections. -- Marianne Orme, West Lafayette, IN Valerie Dively is Professor, Department of Interpretation, Gallaudet University, Washington, DC. Sarah Taub is former Assistant Professor, Department of Interpretation, Gallaudet University, Washington, DC. Melanie Metzger is Professor and Chair, Department of Interpretation, Gallaudet University, Washington, DC. Anne Marie Baer, former ASL Assessor/Evaluator, Center for ASL Literacy, Gallaudet University, currently conducts research in Colorado. ISBN 978-1-56368-592-7, 7 x 10 paperback, 184 pages, tables, figures, photographs, references, appendices, index To order by mail, print our Order Form or call: TEL 1-800-621-2736; (773) 568-1550 8 am - 5 pm CST
<urn:uuid:8d763fac-9166-4392-b4cd-b4faf22b5e09>
CC-MAIN-2018-47
http://gupress.gallaudet.edu/reviews/SLreview.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039742020.26/warc/CC-MAIN-20181114125234-20181114151234-00296.warc.gz
en
0.900307
544
2.875
3
Changes to specific cells in the retina could help diagnose and track the progression of Alzheimer’s disease, scientists say. A team found genetically engineered mice with Alzheimer’s lost thickness in this layer of eye cells. As the retina is a direct extension of the brain, they say the loss of retinal neurons could be related to the loss of brain cells in Alzheimer’s. The findings were revealed at the US Society for Neuroscience conference. The team believes this work could one day lead to opticians being able to detect Alzheimer’s in a regular eye check, if they had the right tools Alterations in the same retinal cells could also help detect glaucoma – which causes blindness – and is now also viewed as a neurodegenerative disease similar to Alzheimer’s, the researchers report. Scott Turner, director of the memory disorders programme at Georgetown University Medical Center, said: “The retina is an extension of the brain so it makes sense to see if the same pathologic processes found in an Alzheimer’s brain are also found in the eye.” Dr Turner and colleagues looked at the thickness of the retina in an area that had not previously been investigated. This included the inner nuclear layer and the retinal ganglion cell layer. They found that a loss of thickness occurred only in mice with Alzheimer’s. The retinal ganglion cell layer had almost halved in size and the inner nuclear layer had decreased by more than a third. “This suggests a new path forward in understanding the disease process in humans and could lead to new ways to diagnose or predict Alzheimer’s that could be as simple as looking into the eyes,” said Dr Turner.
<urn:uuid:45593c66-5109-4b75-9ec4-10238fa16697>
CC-MAIN-2020-16
https://aloisalzheimerfoundation.org/2013/11/14/eye-cells-could-help-diagnose-alzheimers-disease/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371813538.73/warc/CC-MAIN-20200408104113-20200408134613-00318.warc.gz
en
0.954747
359
3.578125
4
The poems in Manuel Paul López’s The Yearning Feed, winner of the 2013 Ernest Sandeen Prize in Poetry, are embedded in the San Diego/Imperial Valley regions, communities located along the U.S.-Mexico border. López, an Imperial Valley native, considers La Frontera, or the border, as magical, worthy of Macondo-like comparisons, where contradictions are firmly rooted and ironies play out on a daily basis. These poems synthesize López’s knowledge of modern and contemporary literature with a border-child vernacular sensibility to produce a work that illustrates the ongoing geographical and literary historical clash of cultures. With humor and lyrical intensity, López addresses familial relationships, immigration, substance abuse, violence, and, most importantly, the affirmation of life. In the poem titled “Psalm,” the speaker experiences a deep yearning to relearn his family’s Spanish tongue, a language lost somewhere in the twelve-mile stretch between his family’s home, his school, and the border. The poem “1984” borrows the prose-poetics of Joe Brainard, who was known for his collage and assemblage work of the 1960s and 1970s, to describe the poet’s bicultural upbringing in the mid-1980s. Many of the poems in The Yearning Feed use a variety of media, techniques, and cultural signifiers to create a hybrid visual language that melds “high” art with “low.” The poems in The Yearning Feed establish López as a singular and revelatory voice in American poetry, one who challenges popular perceptions of the border region and uses the unique elements of the rich border experience to inform and guide his aesthetics.
<urn:uuid:7cbb9b9b-0a72-4e31-9cf2-ffd8a398feb2>
CC-MAIN-2020-45
https://curate.nd.edu/show/fx719k4561s
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107894890.32/warc/CC-MAIN-20201027225224-20201028015224-00012.warc.gz
en
0.940552
372
2.640625
3
Aug 7, 2007 The relevant birth defects include missing limbs and malformed hearts. Smaller scale studies in the past have suggested this link, but this is said to be the largest and most comprehensive study to date. University of Texas researchers interviewed more than 15,000 new mothers over a five-year period. The study appears in the journal Archives of Pediatrics and Adolescent Medicine. Obese women are more likely to have chronic diseases, fertility problems, miscarriages and complications during pregnancy. But the scientists who carried out this research say this is the strongest link so far between obesity at the time of conception and some birth defects. The University of Texas team interviewed more than 10,000 new mothers who had babies with birth defects. The women were asked for their height and weight at the time they conceived. Another group of 5,000 women with healthy babies was also assessed. The results suggested that seven different types of birth defect were more common when the mother was obese. They included spina bifida, heart defects, some genital and bowel abnormalities and small or missing toes, fingers, arms or legs. Researchers stress the risk of having a baby with birth defects is low, even for obese women. Amongst women of healthy weight, about three in 100 babies will have serious birth defects. That seems to rise to about four in 100 for obese mothers. The researchers are not sure how to explain their findings. The defects may be a direct result of obesity but could equally relate to other factors, like diet. Those questions will be addressed by further research. Professor Nick Wald at The UK's Wolfson Institute of Preventative Medicine said the defects may not be related to the actual weight of the mother. Incidents of spina bifida, a condition which occurs when part of the spinal cord is uncovered, have been greatly reduced by better nutrition and in particular the addition of folic acid to pregnant women's diet. "The women in this study may not be getting adequate nutritional intake," he said. "And while they have tried to exclude diabetics, there may be many cases of Type 2 which have gone undetected, and this has long been known to pose a risk in pregnancy." Professor Michael Patton, the medical director of charity BDF (Birth Defects Foundation) Newlife, said: "At present there are no increased concerns for mothers who are overweight but the best advice is still to eat a healthy balanced diet before and during pregnancy." The World Health Organization says global obesity has now reached epidemic proportions. It estimates that more than one billion adults are overweight, about a third of them clinically obese.
<urn:uuid:f9683d50-d9cd-420f-8575-d998110137e1>
CC-MAIN-2018-09
http://www.meta-religion.com/Health/Obesity_diet/obesity_defect.htm
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891815812.83/warc/CC-MAIN-20180224132508-20180224152508-00599.warc.gz
en
0.967597
548
2.96875
3
- Butrus al-Bustani Butrus al-Bustani (بطرس البستاني) (1883-1819) was a notable Arabicwriter and scholar from present day Lebanon. Al-Boustani was born to a Maronite Christianfamily in the village of Dibbiyein the Choufregion, in January 1819. He received primary education in the village school, where he attracted the attention of his teacher, Father Mikhail al-Boustani, because of his keen intelligence that he showed brilliantly. The latter recommended him to the Bishop of Sidonand Beiteddine, Abdullah al-Boustani, who sent him at the age of 11 to the school at ‘Ayn Warqa, the most famous school of that period, to continue his studies there. At 'Ayn Waraqa he learned Syriac and Latin. He spent ten years there and learned several foreign languages including French, Italian and English. While working to translate the Bible, Al-Bustani learned Hebrew, Aramaic and Greek, and perfected Syriac and Latin. In Beirut he came into contact with the American Protestant missionaries with whom he worked closely until his death on May 1, 1883. In the social, national and political spheres, he founded associations with a view to forming a national élite and launched a series of appeals for unity in his magazine Nafir Suriya.ref|Elite In the educational field, he taught in the schools of the Protestant missionaries at ‘Ubey before founding his own National School in 1863 on secular principles. At the same time, he compiled and published several school textbooks and dictionaries to become known famously as the Master and Father of the Arabic Renaissance.ref|Elite In the cultural/scientific fields, he published a fortnightly review, two daily newspapers and an encyclopedia Al-Muhit al Muhit (The ocean of oceans), the first Arabic encyclopedia. In addition to these activities, he began work, together with Drs Eli Smithand Cornelius Van Dyckof the American Mission, on a translation of the Bible into Arabic known as the Smith-Van Dyketranslation.ref|Translation He is best known for creating the first modern Arabic encyclopedia, Muhit al Muhit (The ocean of oceans), and founding the National School in Beirut. His prolific output and groundbreaking work led the creation of modern Arabic expository prose. While educated by westerners and a strong advocate of western technology, he was a fierce nationalist, playing a decisive role in formulating the principles of Works on Education *'Discourse on Education Given at the National School.' In: "Al-Jinan" (Beirut), no. 3, 1870. *'The National School.' In: "Al-Jinan" (Beirut), no. 18, 1873. *'Discourse on Science among the Arabs', Beirut, 15 February 1859. *'Discourse on the Education of Women', given in 1849 at the meeting of members of the Syrian Association and published in the "Actes de l'Association syrienne", Beirut, 1852. *'Discourse on Social Life', Beirut, 1869. *Boutros al-Boustani. "Textes choises". With a commentary by Fouad Ephrem al-Boustani. Beirut, Publications de l'Institut des Lettres Orientales, 1950. (Collection Al Rawai') *The writings and speeches of Boutros el-Boustani, either in published or manuscript form, are preserved in the 'Yafeth' Library at the American University of Beirut and available to readers and researchers. # [http://wwwlb.aub.edu.lb/~webjafet/about/librariesmaps/beginning.htm Notes from the website of the American University of Beirut] # [http://www.ibe.unesco.org/publications/ThinkersPdf/boustane.pdf Prospects: the quarterly review of comparative education(Paris, UNESCO: International Bureau of Education), vol. XXIII, no. 1/2, 1993, p. 125-133.] # [http://www.britannica.com/eb/article-9018296/Butrus-al-Bustani#176488.hook Britannica article] Wikimedia Foundation. 2010.
<urn:uuid:cde69bd1-b973-4369-992a-24a75128cb04>
CC-MAIN-2021-25
https://en-academic.com/dic.nsf/enwiki/325504
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487620971.25/warc/CC-MAIN-20210615084235-20210615114235-00218.warc.gz
en
0.905667
947
2.53125
3
Precision and accuracy Validity of an assessment is the degree to which it measures what it is supposed to measure. Test developers have the responsibility of reporting the reliability estimates that are relevant for a particular test. Before deciding to use a test, read the test manual and any independent reviews to determine if its reliability is acceptable. The acceptable level of reliability will differ depending on the type of test and the reliability estimate used. The discussion in Table 2 should help you develop some familiarity with the different kinds of reliability estimates reported in test manuals and reviews. Types of Reliability Estimates Test-retest reliability indicates the repeatability of test scores with the passage of time. This estimate also reflects the stability of the characteristic or construct being measured by the test. Some constructs are more stable than others. For example, an individual's reading ability is more stable over a particular period of time than that individual's anxiety level. Therefore, you would expect a higher test-retest reliability coefficient on a reading test than you would on a test that measures anxiety. For constructs that are expected to vary over time, an acceptable test-retest reliability coefficient may be lower than is suggested in Table 1. Alternate or parallel form reliability indicates how consistent test scores are likely to be if a person takes two or more forms of a test. A high parallel form reliability coefficient indicates that the different forms of the test are very similar which means that it makes virtually no difference which version of the test a person takes. On the other hand, a low parallel form reliability coefficient suggests that the different forms are probably not comparable; they may be measuring different things and therefore cannot be used interchangeably. Inter-rater reliability indicates how consistent test scores are likely to be if the test is scored by two or more raters. On some tests, raters evaluate responses to questions and determine the score. Differences in judgments among raters are likely to produce variations in test scores. A high inter-rater reliability coefficient indicates that the judgment process is stable and the resulting scores are reliable. Inter-rater reliability coefficients are typically lower than other types of reliability estimates. However, it is possible to obtain higher levels of inter-rater reliabilities if raters are appropriately trained. Internal consistency reliability indicates the extent to which items on a test measure the same thing. A high internal consistency reliability coefficient for a test indicates that the items on the test are very similar to each other in content homogeneous. It is important to note that the length of a test can affect internal consistency reliability. For example, a very lengthy test can spuriously inflate the reliability coefficient. Tests that measure multiple characteristics are usually divided into distinct components. Manuals for such tests typically report a separate internal consistency reliability coefficient for each component in addition to one for the whole test. Test manuals and reviews report several kinds of internal consistency reliability estimates. Each type of estimate is appropriate under certain circumstances. The test manual should explain why a particular estimate is reported. Standard error of measurement Test manuals report a statistic called the standard error of measurement SEM. It gives the margin of error that you should expect in an individual test score because of imperfect reliability of the test. The SEM represents the degree of confidence that a person's "true" score lies within a particular range of scores. For example, an SEM of "2" indicates that a test taker's "true" score probably lies within 2 points in either direction of the score he or she receives on the test. This means that if an individual receives a 91 on the test, there is a good chance that the person's "true" score lies somewhere between 89 and The SEM is a useful measure of the accuracy of individual test scores. The smaller the SEM, the more accurate the measurements.This glossary contains terms used when planning and designing samples, for surveys and other quantitative research methods. Abduction A useful but little-known concept first used by the philosopher Peirce around Enroll in the Global Health Research Certificate Program. Validity of Research. Though it is often assumed that a study’s results are valid or conclusive just because the study is scientific, unfortunately, this is not the case. Chapter 3: Understanding Test Quality-Concepts of Reliability and Validity Test reliability and validity are two technical properties of a test that indicate the quality and usefulness of the test. These are the two most important features of a test. You should examine these features when evaluating the suitability of the test for your use. Construct validity refers to the degree to which inferences can legitimately be made from the operationalizations in your study to the theoretical constructs on . Problems with validity. Since applied research often takes place in the field, it can be difficult to researchers to maintain complete control over all of the metin2sell.comeous variables can also exert a subtle influence that the experimenters may not even consider or . Face validity is a measure of how representative a research project is ‘at face value,' and whether it appears to be a good project. Check out .
<urn:uuid:ed1a8418-39c9-467b-9c95-3818bc3c5777>
CC-MAIN-2019-51
https://vudikyt.metin2sell.com/validity-of-research-6212bn.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540518627.72/warc/CC-MAIN-20191209093227-20191209121227-00198.warc.gz
en
0.934369
1,040
3.484375
3
It’s newsmaking. The colonists printed our fledgling nation’s first newspapers on paper made from it - paper that can last hundreds of years without degrading. It’s documented. Thomas Jefferson drafted the Declaration of Independence and the U.S. Constitution on paper made from it. It’s presidential. George Washington grew it and encouraged all citizens of his era to sow it widely. It’s fuel-efficient. Rudolph Diesel is said to have extracted its oil to power his engines. It’s environmental. Paper made from it can be recycled many more times than paper made from trees, and cultivating it for paper takes fewer toxic chemicals during manufacturing than does paper made from trees. It’s all that. And it’s banned in Indiana and 39 other states. It’s hemp, a fast-growing, copiously spreading commodity that a reporter in our newspaper last week called “pot’s less potent cousin.” The cousin connection is that hemp comes from the same species of plant, Cannabis sativa, as marijuana. But it lacks the drug effects that pot packs. The science of the matter says that hemp, compared with pot, contains much, much, much less THC (tetrahydrocannabinol), the chemical that induces a marijuana high. Hemp typically contains less than 0.33 percent THC, compared with 20 to 30 percent in marijuana. Despite this significant difference, hemp was banned as part of the Controlled Substances Act of 1970. That came after hemp had been widely cultivated and used for decades in the United States, including for many products, military and domestic, during World War II. During World War I, Indiana was among states growing hemp. Now, as mellower perspectives are prevailing, 10 states have legalized hemp. More states may soon follow suit, because the new federal farm bill, passed by Congress on Feb. 4 and signed into law by President Obama on Feb. 7, will let universities and state agriculture departments start industrial hemp research programs. But only in states in which hemp is legal. Indiana needs to become state No. 11 to legalize hemp production - because of hemp’s amazing versatility as a source of a wide range of commodities, its ability to grow like a weed (because it is one) in all sorts of ground, and because there are millions of dollars for Hoosier farmers and businesses to cash in on from hemp sales. An advocacy group called Vote Hemp estimates the U.S. market for hemp at $500 million in annual sales. Our southern neighbor, Kentucky, a hemp-legal state, appears ready to begin to tap into that market. Just last Monday its agriculture commissioner announced five state university projects to test whether planting hemp on sites formerly poisoned by industrial toxins - brownfields - can decontaminate the soil. Hemp growth in our state and others could help meet a domestic need in which American-grown hemp could drastically cut into the $11.5 million in hemp products that our nation imported in 2011, according to The Associated Press.
<urn:uuid:f72703c6-0f5f-4e36-b56d-e443c16e1922>
CC-MAIN-2015-32
http://www.washingtontimes.com/news/2014/feb/25/recent-editorials-published-in-indiana-newspapers/?page=2
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042988860.88/warc/CC-MAIN-20150728002308-00238-ip-10-236-191-2.ec2.internal.warc.gz
en
0.957825
634
2.84375
3
If you are a writer, you understand the importance of ideas. Without ideas your work cannot exist. The more original and striking your ideas are, the more likely it is that your work will be successful. Collecting and storing ideas (curation) is a left brain activity, while using ideas is a right brain activity. A simple explanation of the differences between your brain’s two hemispheres is available here. You can leave your idea curation to chance, or you can build an optimal process, it’s up to you. Here’s an example of an optimal process for folding a T-shirt. Once you’ve seen how that’s done, it’s hard to argue there isn’t a best way to fold a T-shirt. So, why not build your own perfect Idea Curation Process? An Idea Curation Process That Works This is the Idea Curation Process which I use. Your needs may differ, but I’m sharing it with you in case you find it useful. There are three elements to Idea Curation. 1 Idea Curation Method Idea Curation begins with collection. You must create a system for gathering ideas which occur to you as they happen. Your collection system must therefore meet the following criteria: - Ubiquitous — wherever you are, your idea collection system must be at hand. - Funnel — your idea collection must connect to a funnel which links to idea storage facility. Once you have collected your ideas, you must have a foolproof retrieval system. There is little point in harvesting your ideas if you can never access them again. Your retrieval system works with your idea repository (where you store your ideas). For it to work it must have the following elements in place: - Search — a powerful search capability. - Tags — tags connect ideas in different domains together. For example, a picture of a corrupt politician (tagged ‘greedx’) and a minor character called John (tagged ‘greedx) will show up if you search ‘greedx’. You might base your character on the politician. - Content agnostic — ideally, your depository should accept all content forms: PDFs, images, documents, webpages, notes, etc. 2 Idea Curation Tools Selecting your idea curation tools is important. You should make your choice deliberately. There’s a basic separation between analogue (paper and pen and variants) and digital. You can blend these together by using an iPad with a digital pencil or similar technologies. Whichever tools you select, they will work best if they can conform to the collection criteria above — ubiquity and funnel. 3 Idea Curation Mindset Idea curation is not a passive process. To make the most of your brain’s abilities, and to distinguish between the right and left side preferences, curation has to be active. An idea bank is a great way to view your idea curation process. You make deposits and withdrawals. However, you never want to go to the bank and find it empty of all resources. That means actively developing an idea collection mindset and then supporting it with a simple process. Each day your fund of good ideas grows and you’ve got rainy day money to draw on the next time the cursor on your screen gets stuck. My Idea Curation Workflow Leon Ho’s Idea Collection Method It’s a simple process which involves 7 steps. 1. Keep a notebook in your car Full marks to Leon for ubiquity. Your car is a key location where ideas may occur and so he recommends creating a method for recording your voice while driving. I use a Siri command and then record my thoughts into Bear to do the same. 2. Keep a notebook beside your bed Again, full marks for ubiquity. A pen and paper works fine, or dictate a note on your phone using Siri or use an app like Bear to jot down your thoughts. 3. Separate collection from retrieval Okay, he doesn’t say that, but he recommends not organising your ideas as you collect them. It’s all about right and left side, however. Let nothing impede collection and reflect on the ideas later. He includes an image of Kurt Cobain’s notebook as an illustration of a creative mind at work. 4. Compile ideas in one place Spot on Leon!. Funnel everything into your idea repository and you always know her to find them. He recommends Evernote (which I don’t). 5. Organise your ideas Leon categorises his ideas using large buckets such as ‘Stories’ and ‘Home’. I use tags to do the same thing. 6. Kill your darlings Leon suggests a cull. Not all ideas are good ones and so he triages his ideas regularly. Leon provides a link to another article which shows you how to decide if your idea’s a keeper. 7. Make your ideas actionable Leon recommends you work on your ideas to make them actionable. Build Your Own Process — Or Steal Mine I read a lot of articles like the one Leon wrote as I considered how to create my Idea Curation Process. There were some false starts, but now I’ve got mine working the way it suits me. Adam’s Idea Curation Process. 1. Idea Collection As already noted, everything starts with collection. I use the following tools to assist with collection. DevonThink — this is my central repository. DevonThink can store everything you throw at it. It has a clipper which you can add to your browser. I set my clipper to send everything to the global inbox on DevonThink. I have several databases set up for aspects of my life. These include: If I send everything to the global in-box, I know whatever I collect will wait there for me until I sit down to triage. My triage process has three steps: - Weeding — get rid of anything I don’t want to keep. - Tagging — I give everything a tag. I use words I will remember with an ‘x’ on the end. So ‘idea’ becomes ‘ideax’. I can’t remember where I got this tag method from but it is useful because when I search for a tag using an everyday word like ‘idea’ I know that if I add the ‘x’, only those records I’ve tagged as ‘x’ will appear in the results. I don’t get everything that contains the word ‘idea’ in the text. - Filing — some people only tag and keep everything in one folder. That makes sense considering how good DevonThink’s search engine is. However, I’ve got a tidy mind so I pop mine into folders. Here’s a screenshot of the folder structure in one of my database. DevonThink is amazing for many reasons but one of its best features is search. It has an intelligent search engine. By clicking on the top hat, it will serve up what it considers related results. This is a great way to uncover surprising connections between ideas. 2. My Idea Curation Tools These are the tools I use in my system. - Storage — DevonThink serves as my central repository. DevonThink is remarkable software and the Pro version has OCR baked in. That means you can search for text in PDFs. - Notes — I use Bear. I can dictate a note using Siri while driving. I know I could just use Apple notes, but hey, I like Bear. The only thing I have to remember to do is visit Bear once a week and extract any notes and send them to DevonThink. I do this last thing on Friday before I leave work. It’s best to do this on your iPhone. - Bullet Journal — I’ve tried using digital note taking apps at work, but they always make me feel like I’m not paying attention to whoever I’m talking to. I’ve set up a Workflow script on my phone which scans a note which contains an idea I want to collect and send it automatically to DevonThink. I find the Bullet Journal style of note taking easy to work with. - Photo — I use my iPhone to capture anything I see which triggers and idea. I send the photo to DevonThink (see video below). - Browser — Brave. This is a brilliant browser which accepts all the Chrome extensions, but without the sinister Google tracking. I’ve added the DevonThink clipper so I can capture anything I want to save on the fly. - Pocket — I use Pocket as an interim storage system. It serves as my ‘read later’ service. I send anything I might want to save to it. Once there I can read it later and if I want to keep it as an idea, I can send it across to DevonThink. Search and Retrieve Your Ideas Now that I have everything saved in my repository I can use a variety of search terms to find what I’m looking for. As a bonus, DevonThink’s search engine will occasionally deliver something surprising.
<urn:uuid:8f77875c-95b6-4d5b-be92-ec7fa31b246f>
CC-MAIN-2021-31
https://birderlife.com/what-you-should-know-about-curating-your-ideas/
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046150000.59/warc/CC-MAIN-20210723175111-20210723205111-00100.warc.gz
en
0.918922
1,961
2.578125
3
Before we get to the code, let's just go through how our calculator is going to work: - Click the number buttons. This will be the first number in the addition - The first number you want to add will then appear in the text box - Click the Plus button to tell the calculator you want to add - The first number will disappear from the text box, ready for the second number - Click the number buttons again to add the second number - Click the equals button and the answer appears in the text box The numbers on the buttons were put there by changing the Text property. So the only thing we need to do is to access this Text property. We can then use the button text as the text Property for the text box. Add the following line for your btnOne code: txtDisplay.Text = btnOne.Text; This says, "Make the Text in the text box the same as the Text that's on the button". Remember: whatever is on the right of the equals sign gets stored in whatever is on the left of the equals sign. Run your programme and try it out. Click the number 1 button and it will appear in your text box. Click your number 1 a few times and what do you notice? You might think that clicking the number 1 button twice, for example, will cause the text box to display 11, and not 1. After all, you clicked it twice, so why shouldn't two number 1's appear? The reason it doesn't is because you haven't told C# to keep the value that was already there. Each time you click the button, C# is starting afresh - it doesn't know what was in there before, and discards the number that you previously stored. Halt your programme and return to your code. Change your line to this: txtDisplay.Text = txtDisplay.Text + btnOne.Text; This line is easier to read if you just look at the part after the equals sign. Which is this: txtDisplay.Text + btnOne.Text; When you're working with text, the plus symbol doesn't mean add - it means concatenate (you learned about this in the previous section when working strings). So C# will join the text in the text box with the text on the button. After it has finished doing this, it will store the answer to whatever is on the left of the equals sign. In this case, it's not a variable but the text property of the text box. Run your programme again. Click the number one button a few times. You should find that the number one will appear in the text box more than once. Halt the programme and return not to your code but to the form itself. (If you can't see your form, right-click Form1.cs in the Solution Explorer on the right. From the menu that appears, select View Designer.) Now double click button 2, and add the following code: txtDisplay.Text = txtDisplay.Text + btnTwo.Text; The only thing that's different is the name of the button - btnTwo instead of btnOne. The rest is the same. Do the same for the rest of your button, changing the name of the button each time. (You can copy and paste your code to save time.) But your coding window should look like this, when you've finished: Run your programme again, and click all ten of your buttons. Make sure that each number appears in the text box when its button is clicked. Return to your form and double click the Clear button. Add the following line: After the full stop, you type the word Clear, followed by a pair of round brackets. Clear is a method you can use on text boxes. As its name suggests, it will clear the text box, leaving it blank. Run your programme again, click a few numbers, then try your Clear button. The numbers should disappear from the text box. In the next part, we'll add the code for the Plus button.
<urn:uuid:6b453538-5330-44dc-a60c-e6581a2eb166>
CC-MAIN-2018-22
http://www.homeandlearn.co.uk/csharp/csharp_s2p16.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794867416.82/warc/CC-MAIN-20180526092847-20180526112847-00036.warc.gz
en
0.916839
852
3.640625
4
Martin Liu, Kimberly Fuentes, and Zoe Parcells may have more experience with cigarettes than most smokers. According to the Santa Monica Mirror, the Santa Monica High School students spent 16 days of 2014 collecting and then counting cigarettes from seven Westside roads and the nearby beach while putting together “Cigarette Pollution and Mitigation in Santa Monica, CA,” a science project that won first place at the L.A. County Science Fair last weekend. Liu, Fuentes, and Parcells reportedly collected and studied a total of 40,699 butts with help from other students and mentors, including Santa Monica High School marine biology teacher Benjamin Kay and UCLA School of Public Health professor Tom Belin. They say they found more cigarettes littered in the streets during warmer weather and would like to see the Santa Monica City Council ban smoking in public to help reduce cigarette pollution. “Picking up cigarettes for hours is never pleasant,” Parcells told the Mirror. “Throughout the study, it was challenging to overcome time constraints and unexpected complications; such as sickness, a huge history test the next day, et cetera.” But they did, and now they’re off to compete in the California State Science Fair, which will be held at the California Science Center in downtown Los Angeles next month.
<urn:uuid:445066b3-a0ef-4526-a2b1-54667a556f19>
CC-MAIN-2019-04
https://www.lamag.com/citythinkblog/santa-monica-high-school-students-picked-up-more-than-40000-cigarette-butts-to-win-the-l-a-county-science-fair/
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583829665.84/warc/CC-MAIN-20190122054634-20190122080634-00241.warc.gz
en
0.940868
272
2.5625
3
The only way to be 100% sure you won't get HIV/AIDS is to abstain from sex and intravenous drug use. If you're sexually active, using condoms correctly each and every time you have anal or vaginal sex provides the best protection against HIV transmission. While there is not enough scientific evidence available yet to be certain, there are many individuals who also state that they have gotten HIV from participating in oral sex (as givers to infected men). It is advisable to consider using condoms for oral sex as well, especially because other STDs like syphilis and gonorrhea, which can increase your risk of getting HIV, can be transmitted via oral sex. How can I protect myself? It is critical that Americans get educated learn their HIV status as well as that of their sex and injection drug use partners, and do their best to avoid risky behaviors. Condoms are a very effective means of preventing the sexual transmission of HIV, and using clean needles to inject drugs also prevents transmission. Also, people living with HIV are much less likely to transmit it to anyone else if they are on effective medical treatment. The goal of all HIV “treatment as prevention” strategies is to reduce transmission by helping as many people living with HIV as possible to access treatment. Although HIV treatment can be expensive, there are programs to help people without other resources access care, medications, and other support services. In order for people living with HIV to experience the full benefits of HIV treatment on their health and in preventing transmission of the virus, it is very important that they work closely with a care provider and take medications regularly. Skipping medications can prevent the realization of these benefits, and may make the virus more difficult to treat. Contact the Alameda County Offices of HIV Care and Prevention for more information and assistance accessing HIV care and services.
<urn:uuid:3d871ae2-a428-4b82-8298-0bb0270ec89a>
CC-MAIN-2023-14
https://acphd.org/hiv/hiv-aids-basics/protect-yourself/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296944452.97/warc/CC-MAIN-20230322211955-20230323001955-00301.warc.gz
en
0.965124
373
2.8125
3
More than 126,000 people globally have now been confirmed to have contracted the coronavirus, out of whom 67,000 have recovered, and more than 4,600 have died, according to the Johns Hopkins University Center for Systems Science and Engineering. Clinicians got better at treating people with the disease During the first wave of infections in Wuhan, the Chinese Center for Disease Control and Prevention analyzed data from 44,672 people who had the virus. This research showed that 80.9% of patients experienced mild symptoms, 13.8% required hospitalization and experienced severe symptoms, and 4.7% were critical cases requiring intensive care. Chinese medical authorities appeared to get better at treating infections and preventing death as the outbreak proceeded. “Even the first and hardest-hit province, Hubei, saw its death rate tumble as public health measures were strengthened and clinicians got better at identifying and treating people with the disease,” Vox’s Julia Belluz explains. Coronavirus around the world Although Covid-19 has spread to 116 countries, the vast majority of cases have been confirmed in Wuhan, the capital of Hubei province in China, where the pandemic originated. Taken with the 110,000 cases in Italy, Iran and South Korea, this amounts to 87% of cases in total. The rate of infection in Italy has been observed to be similar to that of Hubei. The extraordinary efforts of the Chinese state to contain the virus seem to have slowed the spread of the disease in a population used to authoritarian government. Italy’s government has ordered all shops, bars, and restaurants across the country to close and has restricted travel in order to slow the outbreak. Recovery depends on the immune system The largest European outbreak is in Italy, where 23% of the population is aged over 65 and where 6% of cases have resulted in a fatality. Major outbreaks are also occurring in South Korea and Iran where there are fewer older people. Thousands of people affected by the coronavirus globally have already recovered. As Covid-19 is a viral illness, antibiotics are of no use and neither are antiviral drugs that work against flu. Recovery depends on the strength of the immune system and many of those who have died were already in poor health. The World Health Organization recommends people take simple precautions to reduce exposure and transmission. The symptoms of Covid-19 vary from case to case, but the most common ones in China, from February data, are fever and dry cough (which are each seen in a majority of cases), fatigue, and sputum (the technical term for thick mucus coughed up from the respiratory tract). If you have a fever and dry cough, that could be a good reason to get yourself tested if possible. Coronavirus VS other viruses Severe acute respiratory syndrome (Sars) and Middle Eastern respiratory syndrome (Mers) were both caused by coronaviruses that came from animals. Sars had a death rate of more than 10%. In 2002, Sars spread to 37 countries, infecting more than 8,000 people and killing more than 750. The Spanish flu was the deadliest pandemic in history, killing up to 100 million people between 1918 and 1920. Why canceling events and self-quarantining is so important The key is to “flatten the curve”: slowing the rate of increase in infections so that you spread out the cases, even if the total number doesn’t change. Flattening the curve slows the rate at which new cases arrive in hospitals, easing the burden on health care infrastructure and improving the odds that individual patients will survive. Warnings to avoid crowds, and cancellations of major gatherings like conferences and parades, have put a damper on travel in the US, and the consequences for airlines have been dire. According to Earnest Research, spending on airlines fell 16.5 percent in the last week of February relative to a year prior. Cruises have seen a similar dip, while hotels are only now starting to see sales mildly decline. It’s unlikely that the economic impact will stay limited to the hospitality industry, as social distancing leads people to avoid coffee shops, restaurants, gyms, bars, etc. Coronavirus is more deadly than the flu The following chart compares COVID-19 death rates by age in South Korea as of Thursday with death rates from the flu in the US over the course of the 2018-19 flu season, based on US Centers for Disease Control and Prevention data. The comparison makes clear that even given the lower death rates in South Korea, COVID-19 is still a far more dangerous disease than the flu. The overall death rate in the US from last year’s flu season was about 0.1%, about 8.5 times lower than South Korea’s COVID-19 death rate. While both the flu and the coronavirus are more dangerous for older patients than younger patients, the flu’s death rate of about 0.8% among patients 65 and older is about one-fourth that of South Korea’s COVID-19 death rate of about 3.4% among patients 60 and older. Comparisons between COVID-19 death rates in other countries and death rates from the flu are similarly stark.
<urn:uuid:af01978e-1d9d-423a-a925-8c79ac4446b2>
CC-MAIN-2020-40
https://mogazin.com/2020/03/13/coronavirus-pandemic-in-charts/
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400196999.30/warc/CC-MAIN-20200920062737-20200920092737-00479.warc.gz
en
0.962278
1,108
3.109375
3
YouTuber Explores Whether Humans Have an Internal Compass YouTuber Veritasium always brings us the strangest science-based videos. In this latest edition, he does not hold back. He puts himself through the oddest experiment to test if humans have an internal compass. Animals are known to have internal compasses. Birds and even dogs can detect Earth's magnetic fields and use them to orient themselves. Now, a team of researchers visited by Veritasium is seeking to test if humans can do the same. If you are wondering how this may be possible, Veritasium tells you to consider "that magnetite crystals have been found in the human brain that closely resemble those of magnetically active bacteria." There were even studies conducted on this matter in the early 1980s where students were blindfolded and taken on tours to see if they could identify where they came from. The question of the study is actually quite a controversial topic today. Lucky for us, Veritasium made himself a subject for the researchers. We won't tell you what the research revealed for his sense of direction. You have to watch the video for that. We will tell you it is exciting to see this study on humans come to life through every step. But don't take our word for it. See for yourself.
<urn:uuid:43c9e7d1-1800-48b0-89e4-4d74862a71a7>
CC-MAIN-2022-33
https://interestingengineering.com/video/youtuber-explores-whether-humans-have-an-internal-compass
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571190.0/warc/CC-MAIN-20220810131127-20220810161127-00056.warc.gz
en
0.962851
271
2.765625
3
Asphalt Emulsions consist of microscopic particles of asphalt cement coated with a mild soap solution to form a homogenous, water-based asphalt. Emulsions can be either anionic (negatively charged) or cationic (positively charged). These emulsions are further classified into slow setting, medium setting and rapid setting categories. Choice of emulsion type is determined by its intended purpose. Since emulsions are water based, they are environmentally friendly yet subject to temperature changes. Emulsions are used for many applications in fog seals, chip seals, slurry seals, pavement repair and in construction. Polymerized Asphalt Emulsions are emulsions modified with either natural or synthetic polymer. The addition of polymers to asphalt emulsions results in the modification of key physical properties including elasticity, tensile strength, viscosity, high and low temperature susceptibilities, and adhesion and cohesion. Typical uses are for chip seal, cape seal, fog seal, pavement repair and construction. Polymer Modified Asphalt is modified with latex polymer or rubber polymer with resins, oils and additives. The polymer is blended into the asphalt during the manufacturing process to modify the cured properties of the asphalt. It gives the asphalt increased temperature range performance, making it more flexible in cold weather and not as soft in summer. Cutback Asphalt is a mixture of asphalt cement and solvents. The most common types are classified as rapid cure and medium cure. They are essentially liquid asphalts. Some are thin enough to be used as prime oil or tack, while others must be heated for use. Their uses included dust control, pavement maintenance, construction (chip seal) and cold mix patching. RoadTac® is a specially formulated polymer-modified asphalt emulsion. It is designed to provide high flexibility and bonding for Ultra-Thin Hot Mix Asphalt, and Bonded Wearing Course Projects. The residual properties of this composition indicate polymer presens and the base psphalt grade used. The emulsion is designed to break rapidly after spraying to ensure no water is trapped. Microad Emulsions are commonly cationic (positively charged), slow-setting asphalt emulsions modified with a latex polymer. They are designed for adequate mixing, quick drying and superior performance. Their latex composition allows for tougher, stronger cured asphalt. Emulsions are matched to the specific job and location. Systems applied using these emulsions far outlast conventional systems. Systems may be opened to traffic in as little as 15 minutes. Slurry Seal Emulsions are specifically designed for use in a slurry system. Emulsions are anionic (negatively charged) or cationic (positively charged). Most are slow-setting emulsions, but quick-setting emulsions are available for fast-traffic systems. They are designed for a specific job in a specific area using specific raw materials, allowing for adequate mix time with the other materials before being placed on the pavement and curing to a new, slurry seal wearing surface. Bulk Tack-SS1H is an anionic emulsion specifically designed for priming old pavement before patching and overlay. Tack SS-1H is available in pails, drums and in bulk at our Kansas City, Denver, Oklahoma City, and Tulsa branches. Industrial Cutbacks are cutback asphalts blended with asphalt pitches and solvents, designed to dry quickly and leave a hard asphalt coating. They can withstand higher temperatures and environmental conditions (such as rain) better than softer conventional cutbacks. Can also be used as the base asphalt product for undercoating and roofing products. Foundation Coatings are primarily rapid cure cutback asphalts, either conventional or industrial. They are used for building foundations and subsurface applications such as bridge pilings. Asphalt emulsions can also be used for foundation coatings provided the necessary modifications are performed by the buyer.
<urn:uuid:250192c8-eb9e-4dfc-8cb2-3275ffd06deb>
CC-MAIN-2022-21
https://www.vancebrothers.com/productsection/indexa660.html?sec=asphalt&grp=Liquid+Asphalts
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662532032.9/warc/CC-MAIN-20220520124557-20220520154557-00607.warc.gz
en
0.931818
818
2.671875
3
1. a single splash - he heard a splat as it hit the floor 2. a slat of wood in the middle of the back of a straight chair Sentences with splat as a noun: - I didn't see the egg fall, but I heard the splat when it hit the floor. - The canvas was covered by seemingly careless splats of paint. 1. give off the sound of a bullet flattening on impact 2. split open and flatten for cooking - splat fish over an open fire 3. flatten on impact - The snowballs splatted on the trees Sentences with splat as a verb: - The egg splatted onto the floor.
<urn:uuid:7cf4e88f-4fe3-4730-9f32-d8b8dccee612>
CC-MAIN-2018-43
http://wordrequest.com/word-definition/?word=splat
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583514443.85/warc/CC-MAIN-20181022005000-20181022030500-00013.warc.gz
en
0.905205
151
2.796875
3
After the first Key West lighthouse was destroyed in an 1846 hurricane, a new lighthouse was completed in 1848. It stood 50-feet tall with 13 lamps in 21-inch reflectors. The growth of trees and taller buildings in Key West began to obscure the light, so in 1894 the tower was raised 20 feet, placing the light about 100 feet above sea level. The Coast Guard decommissioned the Key West Lighthouse in 1969. It was turned over to Monroe County, which in turn leases it to the Key West Arts & Historical Society that operates it as a museum. On display is the first-order Fresnel lens from the Sombrero Key Lighthouse. In 2016, a $1-million renovation was completed that repaired the slate roof, adding an ADA access to the Keeper’s Quarters, and new paint for the entire site. In 2018, the entrance will be renovated, HVAC systems will be updated, and the foundation of the Keepers’ Quarters will be restored. Future plans include the restoration of the Oil House into exhibition space, which will display the manner in which the lighthouse was fueled.
<urn:uuid:4de7466b-7a60-4d30-98bd-088ed62c90d8>
CC-MAIN-2021-43
https://monroecountyem.com/836/Key-West-Lighthouse-Keepers-Quarters
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587915.41/warc/CC-MAIN-20211026165817-20211026195817-00696.warc.gz
en
0.958969
235
2.859375
3
4 Data Analysis Techniques in Businesses Many data analysis techniques can be used in a business, such as analyzing market data, consumer data, marketing data, and many more. In this digital era, data has become the most important asset that every business must have. Through this article, you will learn about data analysis techniques that can be used by every company. But before that, you need to know what is meant by data analysis first. Let’s see the full explanation below! What is Data Analysis? Data analysis is the process of examining, cleaning, transforming, and modeling data to get useful information, informative conclusions, and supportive decision-making results. In today’s business world, data analytics has a role to play in making more scientific decisions and helping businesses operate more effectively and efficiently. Data analysis can reveal trends or metrics that might not be visible to the naked eye. The data can then be used to optimize processes thereby increasing the overall efficiency of a business or system. For example, factories often record runtime, downtime, and work queues for various machines and then analyze the data to better plan workloads so the machines can operate at their best. Another example of the use of data analysis techniques is in game development companies that use them to set a reward schedule for players which keeps the most players active in the game. Content companies also use a lot of data analysis to keep audiences clicking, watching, or similar activity on content to increase their number of interactions. Read Also: What is Big Data Data analysis is very important because it can help businesses optimize their performance. Applying data analytics to business models means companies can help reduce costs by identifying more efficient ways of doing business and by storing large amounts of data. Companies can also use data analytics to make better business decisions and help analyze trends and customer satisfaction, which can lead to new, better products and services. Data Analysis Techniques in a Business The best data analysis technique for each company will of course vary depending on the level of development and goals to be achieved. There are at least four data analysis techniques that are often used by many companies, including: 1. Descriptive Analysis Descriptive analysis is the simplest data analysis technique and is the foundation of other data analysis techniques. The descriptive analysis allows you to draw trends from raw data and succinctly describe what happened or is happening. Descriptive analytics answers questions about what is happening now. For example, imagine that you are analyzing data for a game company and find that there is a seasonal spike in sales for one of its products, namely the type X video game console. Here, a descriptive analysis might tell you, “This type X video game console is experiencing increased sales. in October, November, and early December each year.” To present the results of a descriptive analysis, you can visualize the data, such as using charts, graphs, or even a map. The data visualization that is performed must be able to show trends in the data such as decreases or spikes in a way that is clear and easy to understand. 2. Diagnostic Analysis Diagnostic analysis can explain the reasons behind the occurrence of a phenomenon. With slightly more complex analysis, this analysis technique includes comparing coexisting trends or movements, uncovering correlations between variables, and determining causal relationships where possible. The diagnostic analysis is useful for getting to the root causes of an organization. Continuing with the example above, you could dig into the demographic data of users of a type X video game console and find that they are between eight and 18 years old. However, those who buy it tend to be between 35 and 55 years old. This analysis reveals that one of the main motivators for consumer to buy a type X video game console is the console’s potential as a gift for children. The surge in sales at the end of the year may be due to the holiday schedule and Christmas where children are often given gifts by their parents. 3. Predictive Analysis Predictive analysis is used to make predictions about future trends or events. By analyzing historical data and trends, you can make accurate predictions about what the future may hold for your company, from the most likely to the least likely. For example, knowing that sales of the type X video game console have spiked in October, November, and early December each year for the last decade can give you a lot of data to predict that the same trend will follow next year. Backed by increasing trends in the video game industry as a whole, this is a reasonable prediction to make. Making predictions for the future can help companies formulate strategies based on the most likely scenarios. 4. Prescriptive Analysis The prescriptive analysis will help a company to prepare for the next business steps. The prescriptive analysis takes into account all possible factors in a scenario and suggests actions that can be taken next. This analysis technique can be very useful when making data-driven decisions. After seeing the example of the type X video game console listed in the section above, what should your team decide given the predicted trend? You can run an A/B test with two ads, one serving the product’s end users (children) and the other targeting consumers (their parents). Data from these tests can inform these companies as to how they can further utilize the data they have obtained. You can also step up your marketing efforts in September with holiday-themed messages to try to extend the spike into the following month. While you can perform prescriptive analysis manually, machine learning algorithms are often used to help decipher large volumes of data. The smaller the amount of data, the more optimal the recommendations for the next steps that can be taken. If you want to apply data analysis techniques but you still don’t really understand how to do it, just use a tool like the business intelligence application from AdIns. Our data analysis application uses the latest system in our company’s operational tools that are easy for you to understand and use. Contact AdIns right now to get more information about these systems!
<urn:uuid:ec8e20d1-0765-4045-9560-891369337723>
CC-MAIN-2023-50
https://www.ad-ins.com/our-story/adins-story/4-data-analysis-techniques-in-businesses/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100551.17/warc/CC-MAIN-20231205105136-20231205135136-00120.warc.gz
en
0.940443
1,238
3.0625
3
Another way to put my question would be: Can a heat engine act as a negative thermal resistance? Though that wording makes me expect the answer is “no”. Suppose we have: - a heat source (of constant power and finite heat capacity, e.g. an electronic device in continuous operation), - a “heat sink” in the colloquial sense (a surface exposed to ambient or forced air), - a closed-cycle heat engine (e.g. a Stirling engine). Then assuming suitable mechanical interfaces (e.g. flat plates of a common shape), we can compare two different configurations: one in which the heat source is directly joined to the heat sink (A), and one in which the hot and cold ends of the heat engine are interposed (B). Is it possible for case B to have a lower temperature of the heat source, assuming suitable (physically realizable) characteristics of the heat engine? If it cannot, can the answer be explained in terms of a simple prohibition based on a physical principle (e.g. some of the laws of thermodynamics)? The answer initially seemed obvious to me: the heat engine is an obstacle between the source and sink and therefore must present some effective (positive) thermal resistance and thus result in a greater temperature of the source in case B than in case A. Someone else thought that the engine would have a cooling effect since it acts to remove some heat from the overall system (turning it into work). I find this implausible but can't think of how to prove it either way.
<urn:uuid:73b8abcc-e70c-44d9-8cbb-fd34f53dc8af>
CC-MAIN-2019-51
https://physics.stackexchange.com/questions/282327/can-a-heat-engine-cool-its-heat-source
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540528490.48/warc/CC-MAIN-20191210180555-20191210204555-00159.warc.gz
en
0.948126
328
3
3
LONDON – Alarming new research confirms what millions have believed for years – Friday the 13th really is unlucky! A group of English scientists, reporting in the highly respected British Medical Journal, cited statistics and records stretching over a three-year period – 2005 through 2007 – that indisputably prove Friday the 13th is a dangerous date. The researchers go as far as to say that you shouldn’t leave your house on that day. “Staying at home is recommended,” says a spokesman for the group. They concluded that your life and health can be in twice as much danger on Friday the 13th as on other days. Perhaps the most frightening finding of the exhaustive study was that your chances of being admitted to the hospital due to an accident on the highway are two times greater on Friday the 13th. The professors studied traffic-flow figures on a busy London motorway. They compared accident figures for Fridays the 13th with those of other Fridays. They found that hospital admissions skyrocketed on the 13th. No one can explain the rise in bad luck but one theory has to do with the power of suggestion. The researchers believe that knowing it’s Friday the 13th may increase anxiety and interfere with people’s ability to concentrate on their driving, leaving them at greater risk of crashing. But another scientist, familiar with the experiment, calls that theory inconclusive. “Some of the people involved in accidents on Friday the 13th aren’t even aware of what day it is,” said the scientist. “It’s highly unlikely that the power of suggestion is working on them. “Why are my colleagues unwilling to admit that ‘folk wisdom’ may be accurate – that, for reasons we don’t understand, it may just be an unlucky day. “When people have believed something for hundreds of years, there’s a strong possibility that it’s true.”
<urn:uuid:f346d50c-383d-4d88-898a-36556c982028>
CC-MAIN-2017-13
http://weeklyworldnews.com/headlines/13645/friday-the-13th-unlucky/?like=1&source=post_flair&_wpnonce=dd1ec55e91
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189377.63/warc/CC-MAIN-20170322212949-00356-ip-10-233-31-227.ec2.internal.warc.gz
en
0.966828
411
2.609375
3
Learning how to use OpenAI in Python is an invaluable skill that can open up a world of possibilities. With the help of the OpenAI library, you can gain access to powerful machine learning algorithms. You can also implement them into your projects easily in Python. In this blog post, we’ll discuss how to use it with the Python programming language for real-world applications. What purposes can GPT-3 serve? OpenAI’s GPT-3 technology can be used for a variety of tasks, from natural language processing to machine learning. It is a very powerful tool that lets you quickly finish complex tasks with high-quality results. In particular, OpenAI’s GPT-3 technology enables automated text generation, question answering, and summarization capabilities. For instance, you can use GPT-3 to make summaries or descriptions of articles or other long texts without having to edit them by hand. This means it can make sense of long documents faster than any human ever could. Additionally, GPT-3 can be used to answer questions using the same underlying AI model that powers the generation of the summaries; this capability makes it great for fast and accurate question-and-answer systems. GPT-3 also brings a level of automation to tasks like language translation, text classification, and image captioning. With GPT-3’s powerful features, developers can quickly make AI models that can understand the complexities of natural language processing in the correct way. This makes it easier for developers to build applications that have an improved understanding of the user’s intent using natural language. How to use OpenAI in Python? Steps to use OpenAI in Python Sign up for an OpenAI account This is necessary to use the platform. Once your account has been verified, you will have access to a number of different tools and tutorials that can help you get started with GPT-3 in Python. You will need two libraries to use OpenAI: Pytorch and Transformers. Using these libraries, developers are able to quickly create AI models by defining parameters such as language model size and input types. Additionally, users can define how much training data is required or what tokenization method should be used with GPT-3 models. Once the environment and dependencies are set up correctly, developers can begin coding their applications using Python. To do this, we will use the API from OpenAI to make the GPT-3 model, train it on relevant datasets, and then use the trained model to do things like summarizing text or answering questions. Next, you should get the API key. Get the API Key In order to use OpenAI, you will need to generate an API key. This can be done by going to your account settings and selecting the “API Keys” tab. From there, you can create a new API key and give it a name. You will then need to add this API key to your environment variables so that your Python code can access it. To do this on Windows, open the Control Panel and search for “environment variables”. Select the “Edit the system environment variables” option, and then click on the “Environment Variables…” button. Find the PATH variable in the list of user variables and click on it. Then, click the “New” button, type in the API key name you chose earlier, and hit “OK”. You should now be able to use OpenAI in Python with your new API key. Save the API Key Once you have generated an API key, it is important to store it in a secure place so that no one else can use it. The best way to do this is to save the API key as an environment variable in your operating system. This will keep the API key from being used by more than one user at a time and make sure that only authorized people can use OpenAI’s tools and services. You should also make sure that your API keys are rotated on a regular basis, as sites such as GitHub and other repositories might contain sensitive information about your applications. Finally, make sure you are using two-factor authentication for any accounts or websites that require it, such as OpenAI’s platform, which can help further protect your API keys and data from unauthorized access. Now you are ready to start coding your application using OpenAI in Python. First, import the necessary libraries, such as Pytorch and transformers, which will enable you to quickly create AI models with GPT-3. Next, define the parameters for your model, such as language model size and input types. You can also specify what tokenization methods should be used for training data. After this is done, use OpenAI’s API to create the GPT-3 model and begin training it on relevant datasets. Once the model is trained, it can then be used for tasks such as text summarization or question answering with much better accuracy than before. Finally, remember to store your API key in a secure place and to rotate it regularly. This will ensure that your API keys are always safe and can only be used by authorized users. Visualization of GPT-3 model predictions Once you have created a GPT-3 model in Python, it can be useful to visualize the predictions it makes to better understand how the model works. To do this, use OpenAI’s API to output the model’s predictions as a graph or chart. This will let you see patterns in the model’s predictions and, if necessary, change the parameters to fit. Visualizing the results of the models can also help you find any problems or flaws that need to be fixed before you put your applications into production. F.A.Q. How to Use OpenAI in Python? Can you use OpenAI in Python? Yes, you can use OpenAI in Python by creating an account and generating an API key. You will need to install libraries like Pytorch and Transformers if you want to use GPT-3 to make AI models. Can I use the OpenAI API for free? Yes, you can use OpenAI’s API for free. However, the amount of data and requests you can make is limited. You may need to upgrade your account in order to access more features or use more resources. Is there an OpenAI API? Yes, there is an OpenAI API. How do I access OpenAI? To access OpenAI, you first need to create an account and generate an API key. You can then use the API key to access OpenAI’s tools and services in Python. Additionally, make sure you are storing your API key in a secure place and rotating it regularly for added security. Through this article, we have gone through the steps of how to use Python with OpenAI. First, we set up our environment by installing the necessary items. Then, we loaded a trained agent model and saw its performance in real-time on a digital game. Finally, after testing the model, we gave instructions on how to make modifications. If you would like more insights into OpenAI, visit openai-lab.org!
<urn:uuid:2c223335-adb3-4819-849e-d8648123dacc>
CC-MAIN-2023-23
https://openai-lab.org/how-to-use-openai-in-python/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224654871.97/warc/CC-MAIN-20230608103815-20230608133815-00450.warc.gz
en
0.909755
1,506
3.3125
3
Sports Medicine, also known as sports and exercise medicine (SEM), is a branch of medicine that deals with the treatment and prevention of sports and exercise-related injuries and improving fitness and performance. The main objective of sports medicine is to help individuals engage in sports and exercise in a safe and effective manner to accomplish their training goals. A sports medicine team may comprise medical and non-medical specialists, such as physicians, surgeons, athletic trainers, physical therapists, sports psychologists, nutritionists, coaches, and personal trainers. Most sports medicine physicians deal with non-operative musculoskeletal conditions. Others are orthopedic surgeons who have decided to focus their practice on the surgical treatment of sports injuries. Sports medicine is not a medical specialty in itself. Most sports medicine doctors are certified in internal medicine, emergency medicine, family medicine, orthopedics, or another specialty and then acquire additional training with a 2-year fellowship in sports medicine to be certified as a sports medicine specialist. Sports medicine specialists are medical doctors who specialize in the diagnosis and treatment of sports- or exercise-related injuries and illness. A sports medicine specialist focuses on the medical, therapeutic, and functional aspects of exercise and works directly with athletes to improve their overall sports performance. Although sports medicine specialists work exclusively with athletes, the majority will treat anyone who needs treatment for a sports or exercise-related injury. Sports medicine specialists treat a wide range of physical conditions, including acute traumas such as fractures, sprains, strains, and dislocations. They also treat chronic overuse injuries including tendonitis, degenerative diseases, and overtraining syndrome. Sports injuries are injuries sustained while playing indoor or outdoor sports such as football, basketball, hockey, baseball, and tennis, or while exercising. Sports injuries can result from sports accidents, inadequate training, improper use of protective devices, or insufficient stretching or warm-up exercises. Common sports injuries include bone, muscle, ligament and tendon injuries that commonly involve joints such as the shoulders, knees, hips, ankles and feet. Some of the common types of sports injuries treated by sports medicine specialists include: Treatment includes management of bruises, strains and sprains, fractures, dislocations, chronic injuries, torn shoulder ligaments, ACL ligament repair in the knee as well as cartilage and meniscal repairs. Surgery is mostly accomplished by minimally invasive methods and healing is expedited by physical therapy and a rehabilitation program to ensure a quick return to your sporting activities. The most common non-surgical or conservative treatment recommended for sports injuries include: Rest, Ice, Compression, and Elevation (RICE) Therapy Surgical treatment is employed when an individual has sustained serious sports injury by means of a severe fracture, bone displacement, and soft tissue tears not amenable to conservative treatment. Some of the common surgeries performed on athletes include: Some of the measures employed and advised by sports medicine specialists to prevent sports-related injuries include: Severe pain in the shoulders while playing your favorite sports such as tennis, basketball and gymnastics may be because of torn ligament in shoulder or shoulder dislocation. These may be caused by overuse of shoulder while playing sports. Fractures of the femur bone, labral tear and hip dislocation are some of the common sports injuries affecting the hip. Hip joint bears more weight and is more susceptible for injuries while playing sports. Hip injuries require immediate medical intervention to avoid further complications. Anterior cruciate ligament (ACL) is major stabilizing ligament in the knee which may tear with over use of knee for playing sports. The ACL has poor ability to heal and may cause instability. Other common sports injuries in knee are cartilage damage and meniscal tear. UPPER EXTREMITY AND HAND Common sports injuries that may affect the hands and wrists include finger fractures, mallet finger, jammed finger, wrist sprains, tendinitis, and wrist fractures. Elbow injuries include Tennis elbow and Golfer’s elbow. Foot and ankle injuries include the injuries in the leg below the knee and they are common while playing sports such as football, hockey, skating and in athletes. Common sports injuries include sprains and strains, ankle fractures, and Achilles tendinitis.
<urn:uuid:b7a5c4b5-1fb5-463c-a28f-ae1e3cdbccca>
CC-MAIN-2023-40
https://www.alainelbazmd.com/content/orthopaedics-sports-medicine
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510100.47/warc/CC-MAIN-20230925215547-20230926005547-00207.warc.gz
en
0.945807
887
3.15625
3
Earlier in this blog I wrote about the "legendary Hatch chiles" being a total myth, but this time I’m writing about the northern New Mexico Chimayó chiles that are an endangered food crop. They are a land race of chiles, meaning that they have been grown in the same area for hundreds of years and thus have become, with the hand of man, a cultivated variety. An institute has been formed to save the Chimayó chiles and they are making a slight come back. To read our article on northern New Mexico land races of chiles, go here. To read about the Native Hispanic Institute, go here. Historic Photo of Abelino & Faustino Martinez
<urn:uuid:797024a1-8ea8-4552-94c2-4f882b42eb24>
CC-MAIN-2020-40
https://www.fieryfoodscentral.com/2009/01/28/chimayo-chiles-not-a-myth/
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600402101163.62/warc/CC-MAIN-20200930013009-20200930043009-00186.warc.gz
en
0.957363
145
2.609375
3
Phishing is a popular attack form that is used to steal data on the Internet. It is often associated with emails as the majority of phishing attacks are conducted via email, but there are other forms as well. Phishing attacks usually look as if they are coming from a legitimate source, PayPal, Amazon, a financial institute or even the government. This is done to make the email look legit so that users are more likely to believe what the attackers are trying to make them do. This usually involves clicking on a link in an email but may sometimes also involve loading an attachment or other tasks. I worked for a large bank in the past where phishing support requests were handled regularly on a daily basis. Users usually believed the "phishing story" and provided attackers with account information and sometimes even transaction numbers. At other times, they may have executed attachments that they thought were security updates or financial reports. The websites that attacked users may be directed to look like the real website more often than not. This is again done to get users to believe that this is all a legit process and that they have nothing to worry about. Data that is entered on those sites on the other hand is usually saved on remote servers and used by the attackers to steal money, take over accounts, spam or perform other malicious activities. To sum it all up. Tech savvy users may detect the majority of phishing attempts and fake websites right away. Inexperienced users on the other hand find it more difficult and that's where guides like this one comes in handy. This is not only a trust issue as some may assume. If something looks real, it must be real, right? It is also important that users get a basic understanding of the technical possibilities, that email addresses can be faked and that it is easy to replicate official emails and websites.Advertisement Ghacks is a technology news blog that was founded in 2005 by Martin Brinkmann. It has since then become one of the most popular tech news sites on the Internet with five authors and regular contributions from freelance writers.
<urn:uuid:e3a83192-5ca1-41f5-bfcb-0191889623ee>
CC-MAIN-2021-17
https://www.ghacks.net/2006/07/14/anti-phishing-tips/
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038468066.58/warc/CC-MAIN-20210418043500-20210418073500-00016.warc.gz
en
0.973877
417
3.046875
3
Babies are always surprising their parents with a new activity or skill that they couldn't do the day before. Starting from when they are infants, a term usually reserved for very young babies, until about 2 years old, babies develop at a rapid pace. If your baby is throwing things from his crib, it might seem like a sign of rebellion or a nuisance, but he is actually just expressing his newfound ability to throw. When you are bending over to pick up that teddy bear for the 15th time in a row, it might ease your mind to know just why your baby loves this new game. The main reason why your baby delights in throwing her favorite dolls and books out of her crib and onto the floor is because it is a new skill. Starting at about 7 months old, babies' fine motor skills develop and they are able to grasp small objects in their hands and pick them up. What comes up must go down, so babies quickly learn that they can also let go, causing items to fall. At about 1 year to 18 months old, babies are able to purposely throw items and will love to experiment with this new motion of sending things flying in the air. Cause and Effect After a baby realizes that he can pick something up and let it go, he will wonder what happened to it. At about 7 or 8 months old, babies begin to develop "object permanence," or the concept that something out of sight still exists. This means that he will drop or throw things purposely to see what happens after he lets go, such as following the motion of his teddy bear as he flies out of the crib so that he can watch him land on the floor. As a baby grows, she will gain more and more independence. First she will be able to creep and crawl, so that she can get around on her own and reach toys that she wants, and soon after, she will begin to walk. The more independence baby tastes, the more she wants, which will occasionally lead her to resent how much power you exert over her. When your baby throws something from her crib and you bend down to get it for her, she will see that sometimes, she can exert power over you. This is thrilling to a baby and she will repeat the act as many times as you are willing to get her toy just to have the thrill of power. Just as babies love to exercise control over their parents by making you pick up their toys, they also love to see that they can cause a reaction. If you make a big deal out of his action, he is bound to repeat it. If you shout in a surprised or joking manner when he throws her toy, he will find this very funny and will want to make you shout again.
<urn:uuid:befbd10b-a6f2-4011-b220-1a5d31e5fb60>
CC-MAIN-2018-30
https://howtoadult.com/infant-throw-things-crib-7974049.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676593004.92/warc/CC-MAIN-20180722022235-20180722042235-00401.warc.gz
en
0.983469
559
3.0625
3
Download a registration form here! Download a registration form here! (Contact us for an accessible version) Check out the Ian Potter Foundation Technology Learning Centre (IPTLC) located in Deakin and sign the kids up to a workshop during the April school holidays. These hands-on workshops designed for young people aged between 10-15 years old will unleash the inner inventor, designer or maker. Participants will get the opportunity to meet other like-minded people, make some cool stuff, get great advice on their projects, and find out how to further develop their ideas while having heaps of fun along the way! Morning and afternoon workshops are available on 10, 11 and 12 April. |Monday 10th Of April||Tuesday 11th Of April||Wednesday 12th Of April| |AM||Strange Devices||Girls Make 3D Design||App Design| Monday 10th April - Strange Devices (AM) Explore the silly side of inventing in this half-day workshop focused on being creative and coming up with innovations that are almost useless, but not quite. - Gamecraft (PM) What goes into creating a computer game? Learn to make your own mini game using Scratch, then invent a wacky new way to control it! Tuesday 11th April - Girls Make: 3D Design (AM) Design your own objects in three dimensions! After building a physical prototype, we’ll explore the basics of computer aided design (CAD) to find out how to bring objects to life! Please note that this workshop covers identical content and activities to previous iterations of 3D Design, but delivered in a female-only, rather than co-educational, environment. - Crash Test (PM) Protect your precious cargo. Design and build a vehicle that’s going to get crumpled in a collision, but leave the occupants unscathed… Wednesday 12th April - App Design (AM) Ever had a bright idea for a new app? Explore what’s going on behind the screen and design the look and feel of your very own clickable app! - Enginuity (PM) Why do something the easy way when you could engineer a loopy, over-the-top, domino-effect machine to do it for you? How much does it cost? The workshops cost $55 per session (incl. GST) Q Club members get a discount - $44 per session (incl. GST) I’m in! How do I book? Download a registration form here, Download a registration form here, or contact our bookings team on 1800 889 995 to reserve your place! Ph: 1800 889 995 Fax: 1800 641 171
<urn:uuid:753dfc44-a915-4189-9379-feabde5ad360>
CC-MAIN-2017-13
https://www.questacon.edu.au/outreach/programmes/questacon-smart-skills-initiative/holiday-workshops
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218194601.22/warc/CC-MAIN-20170322212954-00200-ip-10-233-31-227.ec2.internal.warc.gz
en
0.899916
572
2.75
3
adult congenital heart disease, All the information you need to know! Approx. one million people over the age of 20 suffer from congenital heart disease and sometimes these adult patients slip through the loopholes in the medicals systems which makes the diagnosis difficult for cardiologists. Moreover, many of the patients are very old and cannot be cared for in the pediatric institutions by the pediatric cardiologists and sadly, most of the adult cardiologists are not well trained in congenital heart disease. And therefore, it is important to identify the common lesions in adult congenital heart disease and how they should be managed. adult congenital heart disease Talking about a type of adult congenital heart disease, acyanotic congenital involves left-to-right shunts, such as atrial septal defect, and obstructive lesions such as aortic coarctation of the aorta. Tetralogy of Fallot is the most common form of cyanotic congenital heart disease in adults. Other complex conditions seen in adults include corrected transposition of the great vessels, univentricular hearts, and lastly Ebstein’s anomaly of the tricuspid valve. Most patients with congenital heart disease will need to undergo surgery and some interventions like catheterization, or catheterization. The results of these surgeries and interventions are excellent in the adult population. There is a need for Long-term follow-up for any adult congenital heart patient receiving care in institutions that are well organized and well equipped. Some more of the congenital heart diseases in adults are: ATRIAL SEPTAL DEFLECT If someone’s internal excludes a bicuspid aortic valve and does not consider mitral valve prolapse a congenital lesion, an Atrial Septal Defect (ASD) is the most common cause of adult congenital heart disease. ASDs account for approximately ten to fifteen percent of all cardiac defects and are found more commonly in women than men with a ratio of 2:1. The three major forms of ASDs are ostium secundum, which makes up Sixty-six to seventy-five percent of all ASDs; the ostium primum type (partial atrioventricular canal or partial endocardial cushion defect) making up 15 to 20 percent. The sinus venosus type comprises 5 to 10 percent of all ASDs. VENTRICULAR SEPTAL DEFECT Ventricular septal defect (VSD) is the most common cardiac defect in children and occurs in approximately 30 percent of pediatric patients with adult congenital heart disease. It is much less common in adult patients with congenital heart disease and affecting approximately 10 percent. Patients with a VSD, unlike the patients having ASDs, present with a volume-loaded left heart with progressive enlargement of the left atrium and the left ventricle. They have increased vascularity and a holosystolic murmur along the left-mid-/left-lower sternal border. PATENT DUCTUS ARTERIOSIS Ductus occurs more frequently in females and is similar to ASDs. As in VSD patients, the PDA presents an extent-load of the left heart. Patients having PDA present with a continuous “machinery murmur” at the left upper sternal border because aortic pressure is almost always greater than pulmonary pressure both in diastole and systole. It is a downward displacement of the tricuspid valve atrializing a portion of the right ventricle. Some adult patients with this disease present with severe tricuspid regurgitation. Others will have a present with cyanosis with an exercise which will be secondary to a right-to-left shunted atrial level. Corrected transposition is a ventricular inversion with an aorta anterior to the left; thus the blood enters a morphologic right atrium, passes a morphologic mitral valve into the right-sided anatomic left ventricle. The blood then passes to the pulmonary artery, but returns from the lungs into a morphologic left atrium, and crosses a morphologic tricuspid valve into a left-sided anatomic right ventricle, which is connected to the aorta. congenital heart disease There are two types of congenital heart disease. Cyanotic congenital heart defects and acyanotic congenital heart defects. They are very different from each other. For more information you can read our two articles Will acyanotic congenital heart disease ever die? and Why cyanotic congenital heart disease should be your first focus?. congenital heart disease awareness According to cdc.gov, during February 7-14 congenital heart disease awareness week is celebrated. It is mainly organized to promote awareness and educate people about congenital heart defects. CHDs influence around one out of 100 births each year in the United States and are the most well-known sort of birth deformity (1,2). Heart defects are conditions that people live with for the duration of their carries on with; an expected 1 million kids and 1.4 million grown-ups in the United States were living with a CHD in 2010. CDC’s site, Stories: Living with Heart Defects, incorporates individual stories by people influenced by CHDs. american heart association foundation The american heart association foundation is a not-for-profit association in the United States that supports cardiovascular clinical examination. It teaches purchasers on solid living and cultivates fitting heart care with an end goal to lessen incapacity and passings brought about via cardiovascular illness and stroke. Initially shaped in New York City in 1924 as the Association for the Prevention and Relief of Heart Disease. It is right now settled in Dallas, Texas. The American Heart Association is a public intentional wellbeing office. Hope you like our article on adult congenital heart disease, All the information you need to know! Share for more valuable articles.
<urn:uuid:857d7217-5ff2-4a66-9413-2eb2bdb11cab>
CC-MAIN-2021-04
https://healthcoachjp.com/adult-congenital-heart-disease-all-the-information-you-need-to-know/
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703527224.75/warc/CC-MAIN-20210121163356-20210121193356-00268.warc.gz
en
0.914692
1,246
2.84375
3
WASHINGTON — THE disintegration of the Soviet empire will surely rank as a turning point of our time. It is one of those rare events that make clear the distinction between what is history and what is merely news.The suddenness of the collapse and the scope of political and economic changes underway throughout the former Soviet Union and Eastern Europe are almost unprecedented, according to historians. The problem now will be making the changes work while avoiding the recriminations and violence which have marked past periods of revolutionary political transition. "There have been very few peaceful breakups of empires," says John Lewis Gaddis, director of Ohio University's Contemporary History Institute. In historical terms, it is already remarkable that so much change has occurred with so little fighting. In September 1989, who would have believed that within two years the world would see the Berlin Wall torn down, Germany reunited, former Warsaw Pact nations clamoring to join NATO, and the Soviet Union itself disbanded - all without any concerted resistance? The situation in Yugoslavia stands as a warning of what the Soviet breakup has avoided, or may yet become. Previous European political upheavals of this century invariably followed the bloodshed of wars. The Russian Revolution of 1917 came near the end of World War I; construction of the Iron Curtain across Eastern Europe was a political consequence of the position of Allied armies at the end of World War II. "It is close to unprecedented to have this shift taking place without war," says Dr. Gaddis. One analogous period in recent history might well be the 1890s to the beginning of World War I. During that time the post-Waterloo structure of European power that had survived throughout the 19th century began to break up for good, notes Walter LaFeber, a professor of history at Cornell University. Feelings of nationalism and ethnicism exploded throughout the Balkans and other areas of Eastern and Central Europe. The world order turned upside down, with old power Britain declining in importance and upst arts Germany, Japan, and the United States rising. The fragmentation of power and empires was similar to what is sweeping Europe today. In that sense the fall of communism "is an interesting movement back into history," says Dr. LaFeber. The French Revolution of 1789 also provides striking similarities with today's events in the Soviet Union. Both involved ossified regimes stretched too far abroad, while not providing adequate consumer comfort at home, says Simon Schama, a professor of history at Harvard and author of "Citizens," a history of the French Revolution. Both revolutions involved rulers (Gorbachev, Louis XVI) who waffled about introducing reforms. At their height both involved huge crowds physically storming symbols of their overseers: the Bastille in France and the square in front of KGB headquarters in Moscow. This comparison gives one pause, considering the terror that later enveloped France, but Dr. Schama cautions that historical analogies shouldn't be taken too literally. He says there are two key problems illustrated by the French Revolution that Soviet citizens now face: "How to make economic changes and political reform work in tandem . . . and how to make a big state effective while securing freedom and justice." Americans forget, he points out, that their nation's relatively smooth transition from the violence of revolution to the debate of constructing new political institutions is, in historical terms, unique. The US was helped in that transition by an already deeply rooted sense of self-government created by the Virginia House of Burgesses and other colonial political institutions. The Soviet Union, however, has no such history and is still learning true democracy from scratch. In the Russian past there have been popular rebellions, and there has been some experience with urban self-government, says William McNeill, professor of history emeritus at the University of Chicago. But until this century the vast majority of the population consisted of peasants who worked the land. "What is different about the Russian past is that they never had the practice of majority vote," he says. "They had the feeling that unless everybody agreed, it wasn't right." Dr. McNeill says that he thinks such a frame of mind may well persist in the Soviet Union, making possible the return of dictatorship in some form. The great remaining question, he says, is whether the economic troubles almost certainly looming on the horizon will lead to further upheaval. Future stability in the region is a major Western concern. Another historical analogy may shed light on this problem: the breakup of the Austro-Hungarian Empire at the end of World War I. The Austro-Hungarian dissoluti on resulted in whole new states, such as Czechoslovakia and Yugoslavia, and radically changed the borders of older nations such as Poland and Romania. In geopolitical terms, the major problem was that these changes left "small, ineffective, and rather tempting states," says Charles Gati, an Eastern European expert at Union College. It should have been clear in 1920 that a larger power would inevitably move into this vacuum, he says. Hitler's Germany finally did, sparking World War II. With Yugoslavia now potentially dividing into microstates, plus the independence of the Baltics and the looser Soviet republic, such a situation might reoccur.
<urn:uuid:75cbf9de-7f5b-4114-941f-cc9be9dc9dff>
CC-MAIN-2016-40
http://www.csmonitor.com/1991/0911/11012.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738661213.28/warc/CC-MAIN-20160924173741-00089-ip-10-143-35-109.ec2.internal.warc.gz
en
0.963369
1,048
2.9375
3
Hormones and Menopause - What Are Bioidentical Hormones? Women Health Issues Tags : women health magazine, women health issues, women health center, women health pavilion, women health specialist, women health magazine, women health care, women health questions Women lose hormones as they get older. While the menopause transition usually occurs around age 50, perimenopause, the transition to menopause can start in the early thirties. Hormones and menopause is an important topic because most if not all the premenopause and menopause symptoms are due to hormonal imbalance. With hormonal imbalance comes one of the most debilitating consequence: weight gain. But there are also the other symptoms such breast tenderness, cravings, fatigue, depression. These are all the results of hormonal changes. Hormones regulate the biochemical reactions in your body. That's why when your hormones are out of balance, you suffer from so many symptoms. To replace the lost hormones, doctors usually recommend hormone replacement therapy (HRT). For a long time, synthetic hormones were the hormone replacement of choice. Synthetic hormones are drugs made from pregnant mares' urine. They are not natural to your body. Traditional HRT has been found in studies to increase the risks of breast cancer, heart disease and stroke. In contrast, bioidentical hormones are plant- based and synthesized in a lab to replicate the hormones found in your body. However, you will have to find the right doctor who is knowledgeable about the hormonal system. Your doctor will have to work with a compounding pharmacy to put together a special formula that will be unique to the hormone levels in your body. The result of proper replacement with bioidentical hormones will be a return to your normal weight (providing you have a balanced diet) and an overall feeling of wellbeing. There are two hormones in particular that are out of balance at the onset and during menopause: estrogen and progesterone. The symptoms associated with progesterone deficiency include: painful, tender breasts, anxiety, PMS, night sweats, trouble sleeping, low bone density and excessive water retention. Symptoms of estrogen deficiency include unexplained weight gain, bloating, night sweats and hot flashes, depression, trouble sleeping, foggy thinking, low libido, fatigue and low bone density. The benefits of bioidentical progesterone are numerous. Among them are improved energy and stamina. In addition, progesterone is a natural antidepressant and is known to restore the sex drive. It also protects against endometrial cancer and fibrocystic breasts. You must be aware of the fact that bioidentical hormones are controversial with some doctors as they are not regulated by the Drug & Food Administration. Because of that fact, doctors are skeptical about their reliability and quality. As with all natural treatments, you must do your research and weight the positives and the negatives.
<urn:uuid:473b9d12-b3bc-4444-bf2d-9d5b832a6bf7>
CC-MAIN-2013-48
http://www.docstoc.com/docs/96918179/Hormones-and-Menopause
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1387345775355/warc/CC-MAIN-20131218054935-00031-ip-10-33-133-15.ec2.internal.warc.gz
en
0.920158
637
2.578125
3
(Please note, what follows contains some confronting ancient texts and inscriptions from the world of the ancient Assyrians.) The ancient Assyrian homeland in Mesopotamia extended northwest from the mouth of the Little Zab river, a tributary of the Tigris, for only about 130 kilometres (80 miles) along the Tigris itself. The country was not large, hemmed in between the desert beyond the river to the west and mountains on its east, rising just beyond a narrow strip of arable land between them and the river that was much less fertile than in southern Mesopotamia. Naturally, then, Assyria’s most notable cities— Asshur; Kar-Tukulti- Ninurta; Calah; Nineveh and Dur-Sharrukin—were all located along the Tigris. The scarcity of farming land possibly helped give rise to the national character of the Assyrians, who were daring adventurers, brave warriors, talented organizers and an enterprising commercial people. While not a scientific or literary people when compared to their southern Babylonian kinsmen, they were artistically talented, as revealed by their masterly sculptures in stone. Like the Babylonians and Aramaeans, the Assyrians were a Semitic people, speaking a language closely related to that of the Babylonians. They used a modified Babylonian cuneiform script. Being Semites, the Assyrian religion had many gods in common with other Semitic nations, especially the Babylonians. They too worshiped the great Babylonian deities such as Shamash, the sun god; Sin, the moon god; Ea, the god of waters; and Ishtar, goddess of fertility. However, their principal god was Ashur, who was not part of the Babylonian pantheon. He was depicted as a winged sun that protected and guided the king, who was his principal servant. Ashur was also symbolized by a tree that represented fertility. But above all, Ashur was a god of war, and as such, war therefore intrinsic to the Assyrian national religion. Every Assyrian military campaign was thought to be undertaken in response to the direct orders of Ashur. Thus participation in warfare was considered an act of worship of a kind. Such facts help us understand why the Assyrians were a formidable fighting machine and why the cult of Ashur vanished when the Assyrian Empire was destroyed. Assyrian Cruelty and Ruthlessness The Assyrian Empire was the greatest of the Mesopotamian empires. The king, who represented the state, was naturally the pinnacle of the hierarchy, with all public acts recorded as his achievements. His two primary tasks as an Assyrian king were to wage war and erect public buildings. Both were seen as religious duties to the Assyrian gods. Historians have divided the Assyrian Empire into three periods: the Old Kingdom, the Middle Empire, and the Neo-Assyrian Empire. Most of what follows will concern itself with the greatest period of the Assyrian Empire— that of the Neo-Assyrian Empire (933–612 BC)—the era that primarily gave the Assyrian Empire its reputation for extreme ruthlessness and cruelty. Assyrian history continues past that point, and there are still Assyrians in Iran, Iraq and other countries today. Paradoxically, they are among the most friendly and hospitable people one can meet. Assyrian national history, as preserved for us in its cuneiform inscriptions and images on walls and floors of palaces and temples, and on clay and alabaster tablets, prisms and cylinders consists mainly of military campaigns and battles. It is perhaps the most gory and bloodthirsty of history known. And from its beginning, Assyria was a strong military power bent on conquest. Any country or people group that opposed their rule was punished with the destruction of their cities and the devastation of their fields and orchards. They were to be feared, with good cause. Adad Nirari I (1307–1275 BC), during the period of the Middle Empire, commenced what would become standard Assyrian policy for the rest of its history: the deportation of large portions of the population of conquered nations and their replacement with Assyrians. This policy killed the nationalistic spirit and sentiments and destroyed old loyalties of any people groups so treated. It helped prevent further uprisings. While it uprooted people from their own homes and land, they, as labour and persons with knowledge and ability, were extremely valuable to the Assyrians and, it seems, deportees were treated well enough enroute, as attested in a letter from an Assyrian official to his king Tiglath-pileser III (744–727 BC), which reads: As for the Aramaeans about whom the king my lord has written to me: “Prepare them for their journey!” I shall give them their food supplies, clothes, a waterskin, a pair of shoes and oil. I do not have my donkeys yet, but once they are available, I will dispatch my convoy. (“Mass deportation: the Assyrian resettlement policy,” by Karen Radner) And upon their arrival, it seems the Assyrians continued to support them, as seen in another letter by the same author: As for the Aramaeans about whom the king my lord has said: “They are to have wives!” We found numerous suitable women but their fathers refuse to give them in marriage, claiming: “We will not consent unless they can pay the bride price.” Let them be paid so that the Aramaeans can get married. (ibid) While deportees were carefully selected for their abilities and sent to areas where their talents could be best used, it seems that families were not separated. Rather they were absorbed into the growing empire and accepted as Assyrians. Under Ashur-Dan (933–910 BC), Assyria conquered northern Mesopotamia. From then on, its armies marched almost every year, ever expanding the Assyrian empire, the booty of their conquests financing their ever-greater exploits and dominion. It was from this time on that the Assyrians began to practice ever increasing cruelty and ruthlessness toward resisting foes. Assyrian inscriptions and pictorial reliefs testify to the Assyrian treatment of those they conquered, their armies and rulers. For example, Ashurnasirpal II (883–859 BC) calls himself “the trampler of all enemies . . . . who defeated all his enemies [and] hung the corpses of his enemies on posts” (Albert Kirk Grayson, “Assyrian Royal Inscriptions, Part 2,” from Tiglath-pileser I to Ashurnasir-apli II, p. 165). Accounts like this not only described what actually happened but were no doubt also designed to threaten others who might think of resisting. The following description of another conquest reveals why they could well be called the terrorists of the ancient world: “In strife and conflict I besieged [and] conquered the city. I felled 3000 of their fighting men with the sword . . . . I captured many troops alive: I cut off some of their arms [and] hands; I cut off others their noses, ears [and] extremities. I gouged out the eyes of many troops. I made one pile of the living [and] one of heads. I hung their heads on trees around the city.” (Grayson, p. 126) Such Assyrian records, which were only discovered in the past 150 years, also testify to the historical accuracy of ancient Jewish biblical records, as in the writings of the prophet Nahum, who, writing about the inhabitants of Nineveh, the capital of the Assyrian Empire, in 640 BC, records, “Woe to the city of blood, full of lies, full of plunder, never without victims! . . . who has not felt your endless cruelty?” (Nahum 3:1, 19). The Assyrians and Ancient Israel It was in this time of barbaric cruelty that the Assyrians first went into battle against Israel. In light of the historicity of such cruelty, one begins to understand the actions taken by some of Israel’s kings and prophets. The first of the Assyrian kings to come in contact with the Israelites was Shalmaneser III (859–824 BC). During his reign, Shalmaneser campaigned in practically every country surrounding his homeland. He records that he fought an alliance of Syrian kings in 853 BC at the battle of Qarqar, in which King Ahab of Israel committed a force of 2000 chariots and 10,000 foot soldiers to the Syrian coalition. Twelve years later, on the Black Obelisk of Shalmaneser III, he recorded that King Jehu of Israel gave him tribute. In one of the panels of the Obelisk, Jehu is seen kneeling before Shalmaneser III. For the next 80 years, several weak rulers led Assyria and the empire lost much of its hold on subjugated nations. However, during this time Adadnirari III (810–782 BC) conquered Damascus from the Syrian king, Hazael, who is mentioned numerous times in biblical records (see 1 Kings 19:15; 2 Kings 10:32). At the same time Adadnirari III conquered Damascus, he mentions on the Tel El Rimah Stele that he received tribute from King Joash of Israel, whose capital was at Samaria. The inscription reads: Adad-nirari . . . king of Assyria . . . . I gathered my chariots and army and gave them orders to march to the land of Hatti. In just one year, I subdued the entire county of the Amurru as well as Hatti. I imposed upon them tax and tribute forever. I received the tribute of 2000 talents of silver, 1000 talents of copper, 2000 talents of iron and 3000 garments with multi-coloured trim from Mari of the land of Damascus. I also received the tribute of Joash, the Samarian, as well as the rulers of Tyre and of Sidon. (Tell el Rimah stele) Biblical chronology places the story of Jonah the prophet between (793–753 BC). Given the accounts by the Assyrians of their ruthless cruelty, one can understand Jonah’s reluctance and refusal to go there (see Jonah 1–4). It was an exceedingly dangerous assignment. But he eventually went, proclaiming to them a warning of coming destruction on account of their evil ways. But as the story goes, led by its king, the entire city repented, and so was spared. It is possible that this story occurred during the reign of Adadnirari III, for there is evidence of a monotheistic revolution in which the god Nabu appears to have been proclaimed the sole, or at least the principal, god, occurring in Assyria during his reign. Under Tiglath-pileser III (745–727 BC), or Pul as he was also known, the Assyrians made an impressive comeback, re-establishing their power over neighbouring nations. He became one of the greatest monarchs and empire builders of Assyria. The Bible records that King Menahem of Israel (of the 10 northern tribes of the Israelites, with its capital at Samaria) paid him tribute: “And Pul the king of Assyria came against the land: and Menahem gave Pul a thousand talents of silver, that his hand might be with him to confirm the kingdom in his hand.” (see 2 Kings 15:19) Menahem’s tribute is also mentioned by the Assyrians on the Iran Stele found in Tiglath-pileser’s palace at Calah, which reads: “I received tribute from . . . Rezon of Damascus, Menahem of Samaria, Hiram of Tyre, . . . gold, silver, . . .” (Ancient Near Eastern Texts Relating to the Old Testament, 283, Ed. James B. Pritchard) During the reign of King Pekah of Israel, Tiglath-pileser received a request from King Ahaz of Judah (the two southern tribes of the Israelites, with its capital in Jerusalem) to aid him against an alliance between Pekah of Israel and Rezin of Damascus. With the request came a large tribute: So Ahaz sent messengers to Tiglathpileser king of Assyria, saying, I am thy servant and thy son: come up, and save me out of the hand of the king of Syria, and out of the hand of the king of Israel, which rise up against me. And Ahaz took the silver and gold that was found in the house of the Lord, and in the treasures of the king’s house, and sent it for a present to the king of Assyria. (see 2 Kings 16:7, 8) And a clay building inscription of Tiglath-Pileser III records the actual payment of this tribute by Ahaz, as follows: From these I received tribute . . . Ahaz, the king of Judah . . . including gold, silver, iron, fine cloth and many garments made from wool that was dyed in purple . . . as well as all kinds of lavish gifts from many nations and from the kings that rule over them. Tiglath-pileser also took the practice of deportation to a whole new level of wholesale transplantations of subjugated nations to other countries. On reception of the tribute from Judah, Tiglath-pileser captured and destroyed Damascus, killed Rezin its king, invaded Israel, and deported many of the Israelite captives. This deportation is mentioned in the Bible: In the days of Pekah king of Israel, Tiglath-Pileser king of Assyria came and took Ijon, Abel Beth Maachah, Janoah, Kedesh, Hazor, Gilead, and Galilee, all the land of Naphtali; and he carried them captive to Assyria. (2 Kings 15:29) And the following record left by Tiglath-pileser is a direct confirmation of the above account of this deportation: The land Bit-Humri [House of Omri, which is Israel], all of whose cities I had utterly devastated in my former campaigns, whose [people] and livestock I had carried off and whose [capital] city Samaria alone had been spared: [now] they overthrew Peqah, their king. (Tiglath-pileser III, pp 44, 17, 18) The land Bit-Humri [Israel]: I brought to Assyria . . ., its auxiliary army, . . . and an assembly of its people. [They (or: I) killed] their king Peqah and I placed Hoshea [as king] over them. (ibid, pp 42, 15b–17a) Tiglath-pileser allowed a small group to remain as a small vassal state with Samaria as capital. Ahaz king of Judah voluntarily submitted to the Assyrians and Judah became an Assyrian vassal state. Tiglath-pileser’s successor, Shalmaneser V (727–722 BC) ruled only briefly. During his reign, he fought a coalition of western kings, including Israel, who had ceased to pay tribute. He besieged the Israelite city of Samaria for three years and captured it, probably before his death, leaving the task of deporting the Israelites and resettling their territory with other people groups to his successor, Sargon II, who himself claimed to have conquered Samaria. Sargon II (722–705 BC) was a strong king who spent much of his reign on military campaigns. He built a new capital at Dur-Sharrukin, today known as Khorsabad, a few kilometres north of Nineveh. Sargon II’s successor, his son Sennacherib (705–681 BC, made technical improvements to his war machine and rebuilt Nineveh, making it the most glorious city of its time. During his reign, he campaigned in Palestine to put down a rebellion by Hezekiah, King of Judah. This campaign is described in great detail in the Bible, which specifically mentions his capture of the fortified cities of Judah, including his attack of Lachish; the payment of tribute by Hezekiah to Sennacherib; the construction of a water tunnel by Hezekiah; his inability to take the city of Jerusalem; his assassination by two of his sons upon his return to Nineveh; and his replacement by Esarhaddon on the Assyrian throne (2 Kings 18:13, 14, 17; 19:32, 35–37; 20:20). The biblical account has now been confirmed by archaeology in every detail: the Lachish wall reliefs from Sennacherib’s palace in Nineveh portray the battle of Lachish, as do the excavations of the city of Lachish; Hezekiah’s water tunnel in Jerusalem, which begins at the Gihon Spring and ends at the Pool of Siloam, has been discovered; an inscription on the flank of an Assyrian human-headed winged bull informs us that Hezekiah paid taxes to Sennacherib; the Taylor Prism of Sennacherib informs us of the 46 cities of Judah that he captured—but interestingly when it comes to the city of Jerusalem, Hezekiah simply says that he “shut up Hezekiah like a bird in a cage.” We also know that on his return to Nineveh, Sennacherib was assassinated and that Esarhaddon did take his place on the throne. Such discoveries confirm the Bible a legitimate and accurate historical source and one not be dismissed. According to Austen Henry Layard, the excavator of Nineveh, the wall reliefs in Sennacherib’s palace would stretch more than three kilometres (2 miles) if lined in a row. Included among these reliefs are those depicting the barbaric flaying (skinning alive) and impaling of Israelite captives of Lachish. But Sennacherib’s wall reliefs and inscriptions also demonstrate that he surpassed his predecessors in the grisly detail of his descriptions, an indication no doubt that he literally took Assyrian ruthless cruelty to a new level, if that were possible: I cut their throats like lambs. I cut off their precious lives [as one cuts] a string. Like the many waters of a storm, I made [the contents of] their gullets and entrails run down upon the wide earth. My prancing steeds harnessed for my riding, plunged into the streams of their blood as [into] a river. The wheels of my war chariot, which brings low the wicked and the evil, were bespattered with blood and filth. With the bodies of their warriors I filled the plain, like grass. [Their] testicles I cut off, and tore out their privates like the seeds of cucumbers.” (Daniel David Luckenbill, Ancient Assyrian Records of Assyria and Babylonia, Vol. 1, sections 584, 585) With the discovery of such gruesome details, one can clearly understand why Hezekiah, on receiving a letter from Sennacherib at Lachish, as the story is told, took it into the temple, lay it out before God and prayed for help (2 Kings 19:14–19). While Esarhaddon (681–669 BC), his son and successor, conducted a successful military campaign against Egypt, which thus pushed the boundaries of the Assyrian Empire to its furthest extent, nothing changed with respect to Assyrian ruthlessness. In fact, he seems to have been even more macabre in his treatment of his enemies than his father and grandfather: “Like a fish I caught him up out of the sea and cut off his head,” he said of the king of Sidon; “I hung the heads of Sandurri [king of the cities of Kundi and Sizu] and Abdi-milkutti [king of Sidon] on the shoulders of their nobles and with singing and music; I paraded through the public square of Nineveh.” (Lukenbill, Vol. 2, sections 511, 528) The biblical prophet Nahum, writing around 640 BC, could not have been more accurate in calling Nineveh “the city of blood” (Nahum 3:1). Finally under his son, Ashurbanipal (669–627 BC, Assyria reached the zenith of its glory and extent but at the same time the greatest depths of its depraved cruelty. Boasted Ashurbanipal: “Their dismembered bodies I fed to the dogs, swine, wolves and eagles, to the birds of heaven and the fish in the deep . . . . What was left of the feast of the dogs and swine, of their members which blocked the streets and filled the squares, I ordered them to remove from Babylon, Kutha and Sippar, and to cast upon heaps.” (Lukenbill, Vol. 2, section 800) But no civilization given to such brutality can expect not to disintegrate. The noted English historian, Sir Arnold J Toynbee, analysed the histories of 21 civilizations, including ancient Rome, Babylon, the Greeks and the Aztecs. In his epic A Study of History he describes six characteristics of civilizations on the brink of collapse—the first of which he terms a “schism of the soul,” in which a society commits a type of cultural suicide, where something down deep inside of the corporate psyche of society snaps, and by which a civilization thereby self-destructs by destroying its own soul. An example of this is what took place in the amphitheatres of ancient Rome, where for entertainment citizens spent their leisure hours watching humans slaughtered, slashed, gutted and gored. The lust for violence and blood of the Assyrian terrorists of the ancient world is perhaps an even greater example. Accordingly, the ancient biblical prophets made pointed predictions against Assyria, especially concerning Nineveh, its capital. While it was still at its peak, they predicted with astounding accuracy that drunkenness, flood and fire would be part of its destruction, that it would be laid waste and become a desolation (see Nahum 1:8, 10; 3:7, 13, 15; Zephaniah 2:13). According to the ancient historian, Diodorus, during the siege of Nineveh, the nearby river flooded and destroyed a section of the wall, through which the Babylonians and Medes gained access to the city. Temples were sacked and the palace was burned. Evidence of such a burning can still be seen on the blackened wall reliefs in the British Museum that were taken from the palace of Nineveh. Little wonder, then, that at the destruction of Assyria and its mighty capital Nineveh, the nations rejoiced, as expressed by Nahum: “Everyone who hears the news about you claps his hands at your fall” (Nahum 3:19). Warnings from Terrorists of the Ancient World There are ominous warnings for today to be found in the ancient Assyrian empire’s barbarism. First, Assyria’s ruthless cruelty was primarily a result of its religious belief that war was an act of worship. It would not be an overstatement to characterise Assyria’s relentless cruelty as religious terrorism akin to that being played out in Syria, Iraq and other countries by ISIS today. It should warn us of the danger of religious movements who seek to unite the state with religion. Such a combination, throughout history, inevitably led to intolerance and eventual persecution. As serious and as real as this threat is, there is an even more prescient warning against a contemporary and more sinister threat to be had—our contemporary global lust for the violence and mayhem on the Hollywood silver screen, where we see humans butchered, blown up and variously killed. We might well learn from the history of ancient Assyria and its modern counterparts in light of Toynbee’s first characteristic of a civilization in disintegration—cultural suicide through a “schism of the soul.” Albert Kirk Grayson, “Assyrian Royal Inscriptions,” Part 2, in Tiglath- pileser I to Ashurnasir-apli II. Ancient Near Eastern Texts Relating to the Old Testament 283. Ed. James B Pritchard Diodorus ii. 26,27 Dwight Nelson, “Why Civilizations Fall,” Program 3, Net 98, 1998 Erika Belibtreu, “Grisly Assyrian Record of Torture and Death,” in Biblical Archaeology Review, 17:01 (Jan/Feb 1991) Joshua J. Mark, “Assyria,” in Ancient History Encyclopaedia, June 12, 2014, http://www.ancient.eu/assyria Karen Radner, “Mass Deportation: the Assyrian Resettlement Policy” (http://www.ucl.ac.uk/sargon/essentials/governors/ massdeportation/) Karen Radner, “Israel, the ‘House of Omri,” Assyrian Empire Builders, University College London, 2012 (http://www.ucl.ac.uk/sargon/ essentials/countries/israel/) Daniel David Luckenbill, Ancient Assyrian Records of Assyria and Babylonia, Vol 1 & 2 Seventh-day Adventist Bible Commentary Vol. 2, p. 60. Seventh-day Adventist Bible Dictionary Vol. 8, pp. 91–94; p. 464
<urn:uuid:8917380d-6fdb-43f1-9cae-71ce09ab03b6>
CC-MAIN-2021-21
https://www.hopechannel.com/au/read/terrorists-of-the-ancient-world
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243989766.27/warc/CC-MAIN-20210512162538-20210512192538-00417.warc.gz
en
0.969083
5,453
3.765625
4
The immediate reaction of French President Francois Hollande to the terrorist attacks in Paris on November 13 was to declare a state of emergency; for the fifth time in France’s history and the first time since the riots in the suburbs in 2005. The state of emergency extends the powers of the administrative police, and the number of acts that don’t need to be authorised by the judiciary. The government can now temporarily shut down theatres, bars and other places of gathering and restrict freedom of movement and the right to hold public meetings. Theoretically, demonstrations are now forbidden in Paris. The state of emergency also allows police to make warrantless searches whether in the day or night in places of residence. So far, about 800 such searches have been ordered. It allows suspected individuals to be placed under house arrest. This means, those individuals must remain in their homes for a maximum of 12 hours per day. For the rest of the day, they may have to clock out in police stations. So far, 266 house arrests have been enforced. Upgraded and extended This and other measures will be in place until the state of emergency is lifted. To prolong the state of emergency after 12 days, the government must pass a law through parliament. This law was promulgated last week to prolong the state of emergency by three months. It will now be in effect until February 26, 2016. Interestingly, this law also modernised – or upgraded – the state of emergency, for example, expanding warrantless searches to vehicles and electronic devices. To guide its investigations, the intelligence services have in their possession the famous “S files”. These files contain detailed information (name, photos and how dangerous the individual could be under arrest) on most individuals suspected of involvement in terrorist activities. They are categorised according to threat and type: for example, S14 defines those known to be in, or returned from, Syria or Iraq. Since the French revolution of 1789, the French people like to imagine themselves as rebellious, not unlike the Gallic people of the comic strip Asterix. So why would all this require a constitutional revision? The law on which the state of emergency is based dates back to 1955. But the Constitution itself was drafted in 1958. Therefore, it can legitimately be asked whether the state of emergency is consistent with the constitution. In other words, could acts of police and restrictions of liberties based on a law passed in 1955 be considered unconstitutional? This would be bad news for the fight against terrorism, and of course, the French government. For this reason, the purpose of the constitutional changes is to integrate the law of 1955 into the constitution. However, it could also be an occasion to slip in other anti-terrorism measures, such as the stripping of citizenship from individuals convicted of terrorism. This has not yet happened, and it is not clear whether it will. Natural born protesters France is a nation of natural born protesters. Since the French revolution of 1789, the French people like to imagine themselves as rebellious, not unlike the Gallic villagers of the comic strip Asterix. They are a people who may have failed to resist during World War II but who have broken all world records of the number of strikes and demonstrations. However, no strong voices have so far been raised to denounce these anti-terrorism measures as destructive to cherished French values and freedom. Most French citizens are now aware that the measures taken by the government are necessary at two levels: police security and legal security. Most French citizens also understand that the measures are not designed to target or marginalise a specific community, ie, the French Muslims, who continue to enjoy the same rights and liberties as every other citizen, as long as they are not involved in terrorist activities. A poll by Ifop and Le Figaro showed 84 percent ready to accept “controls and a certain limitation of liberty in order to guarantee better security”. According to another poll conducted by Le Parisien, 53 percent of French people approve the revision of the Constitution to enlarge the exceptional powers of the president. Some 84 percent of French agree to facilitate the self-defence of policemen. And an overwhelming 91 percent of the French agree with the stripping of nationality from French-born dual nationals engaged in jihadist activities. n the contrary, the question to ask is: Will these measures be sufficient to defeat terror? They’ll surely help speed up investigations and possibly thwart new attacks. Unfortunately, they may not prevent all attacks in the future. For this reason, some have already advocated for stronger decisions such as putting the “S files” into “administrative detention” or establishing a French Guantanamo Bay. Ultimately, however, the French government’s measures are part of the wider war against terrorism – a war which must be waged in conjunction with the international community. Antoine Bueno is a writer and a jurist at the French Senate. The views expressed in this article are the author’s own and do not necessarily reflect Al Jazeera’s editorial policy.
<urn:uuid:745bc5d0-a74e-4cc1-916f-a85c9c6c198d>
CC-MAIN-2021-43
https://www.aljazeera.com/opinions/2015/11/29/frances-anti-terror-measures-are-unconstitutional/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585183.47/warc/CC-MAIN-20211017210244-20211018000244-00006.warc.gz
en
0.956435
1,037
2.53125
3
It was in the 1600s when the pendulum clock was invented by Christiaan Huygens. His invention of the pendulum clock, patented in 1657, was a breakthrough in timekeeping. However, the pendulum clock was still considered inaccurate. Such was the British Parliament’s yearning for a clock that could accurately tell the time, that a cash reward awaited anyone who could create a clock that could be used even for navigation. Finally, the accurate clock was invented and humans were once again able to navigate and work knowing that their clocks were telling them the right time. One of the clocks that have become famous is the grandfather clock. This clock is known for being a work of art in itself, enclosed in a tower case and has a long pendulum. Remember that in the olden days, the longer the pendulum of the clock was – the more accurate the time. Grandfather clocks usually measured a minimum of six feet tall, and the tower made of hardwood and glass. The Grandfather Clock actually referred to the floor clock kept in the George Hotel in England, owned by two brothers. The death of one of the brothers resulted in time malfunction of the floor clock. When the clock started to fail, the second brother died. The clock was never repaired. This was the same clock which inspired the song “My Grandfather’s Clock”, composed by Henry Clay Work in 1875 and written after he stayed in the George Hotel and learned of the story of the two brothers. Thus the origin of the term “Grandfather Clock.” Most Grandfather Clocks are striking clocks. Striking clocks, like the Big Ben clock in London, England are clocks that make a gong sound at every hour.
<urn:uuid:c2c195fe-6450-4eac-814a-e60c06fc3cc2>
CC-MAIN-2017-47
http://clockology.com/origins-of-grandfather-clocks/
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806258.88/warc/CC-MAIN-20171120223020-20171121003020-00612.warc.gz
en
0.98662
362
3.609375
4
Coxswains often say, ‘keep your eyes and head in the boat.’ Rowers can take this both literally and figuratively. Rowers must focus and concentrate on their own rowing stroke at all times. Look straight ahead and focus on anticipating and matching the movements of the rower ahead – hands away, body forward, slide, catch, push with the legs, back swing, arm draw, finish, tap down. Repeat. It is critical that rowers do not talk in the boat unless the coxswain asks a specific question or if there is an equipment issue. Rowers should not call out things like ‘it’s down on stroke side’ during practice, or encouraging remarks such as ‘come on, we can do it.’ Even though these comments seem positive, they can be distracting and will disrupt the rhythm in the boat. Rowers must trust that the entire crew is doing their best and that the coxswain will communicate as needed. Concentration & focus Rowing is a team sport and requires that each team member reflect the movements of the stroke oar in all kinds of situations, such as: - changing wind and water conditions - an unbalanced boat - a race Poor concentration, unfocused attention, and distracting mental thoughts often contribute to poor technique and poor boat performance. In order to improve the rowing stroke and minimize mistakes, rowers must be able to focus on what they are doing and block out everything else out – including other boats. Rowers are often caught looking around, which is a sure sign of poor concentration. Other issues are harder to see – doubts about technique or conditioning; thoughts about work, school, and social events. Coxswains will often remind rowers to concentrate but how do rowers do this? What do they focus on? Focus on a perfect stroke When practicing, rowers can focus on improving each aspect of the stroke so they get it perfect. - Focus attention on the recovery sequence and following the rower in front of you - Focus on establishing your forward body angle early in the recovery - Move attention to the catch and focus on the unweighing the oar handle, timing of the hands and legs as they lock the blade into the water, and the boat’s reaction to the catch - Focus on a good connection and a powerful drive that starts with the legs and a braced core - Focus on a long, strong, finish and clean release of the blade from the water - Finally, focus on on the run of the boat as you prepare for the next stroke Focus on relaxation and confidence It is important for rowers to relax and have confidence in what they are doing. Self-doubt and fear of failure are often the biggest distractions and can lead to the biggest mistakes. If a mistake is made on one stroke, forget about it and refocus on the next stroke. Practice rowing with confidence during every practice. Focus on timing, balance, and power Learning to concentrate on the right things is critical for rowing. Timing. Rowers must concentrate on moving with the rower in front of them. This includes stroke rate, ratio, hand height, entry at the catch, and tap down at the finish. This is not easy and requires full concentration. Good timing is critical to good balance. When the boat balance is poor, a high level of concentration is required to correct it. Power is dependent on timing and balance – without them a rower cannot effectively apply power. The application of power must be consistent with timing and balance. Without timing and balance, power is wasted. Focus on teamwork and support It is important for rowers to support each other. Feeling like ‘everyone is looking at me’ in the boat can be very distracting. Focus on what you are doing on each and every stroke, leave the coaching to the coaches and the coxswain, and cast all negative thoughts aside.
<urn:uuid:2426ae8f-8e47-4051-af0a-41872bd54025>
CC-MAIN-2019-04
https://fixedseatrowing.com/practice-sessions/concentration-and-communication/
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583688396.58/warc/CC-MAIN-20190120001524-20190120023524-00506.warc.gz
en
0.962997
827
2.84375
3
Of course, there is a possibility that someone could "pick" Bob's or Alice's lock. Among symmetric key encryption algorithms, only the one-time pad can be proven to be secure against any adversary - no matter how much computing power is available. However, there is no public-key scheme with this property, since all public-key schemes are susceptible to a "brute-force key search attack". Such attacks are impractical if the amount of computation needed to succeed - termed the "work factor" by Claude Shannon - is out of reach of all potential attackers. In many cases, the work factor can be increased by simply choosing a longer key. But other algorithms may have much lower work factors, making resistance to a brute-force attack irrelevant. Some special and specific algorithms have been developed to aid in attacking some public key encryption algorithms - both RSA and ElGamal encryption have known attacks that are much faster than the brute-force approach. These factors have changed dramatically in recent decades, both with the decreasing cost of computing power and with new mathematical discoveries. In practice, these insecurities can be generally avoided by choosing key sizes large enough that the best-known attack algorithm would take so long to have a reasonable chance at successfully "breaking the code" that it is not worth any adversary's time and money to proceed with the attack. For example, if an estimate of how long it takes to break an encryption scheme is one thousand years, and it were used to encrypt details which are obsolete a few weeks after being sent, then this could be deemed a reasonable risk and trade-off. Aside from the resistance to attack of a particular key pair, the security of the certification hierarchy must be considered when deploying public key systems. Some certificate authority - usually a purpose-built program running on a server computer - vouches for the identities assigned to specific private keys by producing a digital certificate. Public key digital certificates are typically valid for several years at a time, so the associated private keys must be held securely over that time. When a private key used for certificate creation higher in the PKI server hierarchy is compromised, or accidentally disclosed, then a "man-in-the-middle attack" is possible, making any subordinate certificate wholly insecure. Major weaknesses have been found for several formerly promising asymmetric key algorithms. The 'knapsack packing' algorithm was recently found to be insecure after the development of new attack. Recently, some attacks based on careful measurements of the exact amount of time it takes known hardware to encrypt plain text have been used to simplify the search for likely decryption keys (see "side channel attack"). Thus, mere use of asymmetric key algorithms does not ensure security. A great deal of active research is currently underway to both discover, and to protect against, new attack algorithms. Another potential security vulnerability in using asymmetric keys is the possibility of a "man-in-the-middle" attack, in which the communication of public keys is intercepted by a third party (the "man in the middle") and then modified to provide different public keys instead. Encrypted messages and responses must also be intercepted, decrypted, and re-encrypted by the attacker using the correct public keys for different communication segments, in all instances, so as to avoid suspicion. This attack may seem to be difficult to implement in practice, but it is not impossible when using insecure media (e.g. public networks, such as the Internet or wireless forms of communications) - for example, a malicious staff member at Alice or Bob's Internet Service Provider (ISP) might find it quite easy to carry out. In the earlier postal analogy, Alice would have to have a way to make sure that the lock on the returned packet really belongs to Bob before she removes her lock and sends the packet back. Otherwise, the lock could have been put on the packet by a corrupt postal worker pretending to be Bob, so as to fool Alice. One approach to prevent such attacks involves the use of a certificate authority, a trusted third party responsible for verifying the identity of a user of the system. This authority issues a tamper-resistant, non-spoofable digital certificate for the participants. Such certificates are signed data blocks stating that this public key belongs to that person, company, or other entity. This approach also has its weaknesses - for example, the certificate authority issuing the certificate must be trusted to have properly checked the identity of the key-holder, must ensure the correctness of the public key when it issues a certificate, and must have made arrangements with all participants to check all their certificates before protected communications can begin. Web browsers, for instance, are supplied with a long list of "self-signed identity certificates" from PKI providers - these are used to check the bona fides of the certificate authority and then, in a second step, the certificates of potential communicators. An attacker who could subvert any single one of those certificate authorities into issuing a certificate for a bogus public key could then mount a "man-in-the-middle" attack as easily as if the certificate scheme were not used at all. Despite its theoretical and potential problems, this approach is widely used. Examples include SSL and its successor, TLS, which are commonly used to provide security for web browsers, for example, so that they might be used to securely send credit card details to an online store. Other articles related to "weaknesses": ... Weaknesses to the Mk F3 design included a lack of nuclear-biological-chemical (NBC) protection for its crew ... ... in public education While anti-evolution members of the Texas SBOE have claimed their "weaknesses" campaign has nothing to do with faith, that "We're not putting religion in books", scientists have ... in November 2008 that evolution is a scientific theory, not a hypothesis and thus does not have weaknesses ... are concerned that the mention of "weaknesses" in the curriculum standards has had a chilling effect on science teachers ... Famous quotes containing the word weaknesses: “A doctor, like anyone else who has to deal with human beings, each of them unique, cannot be a scientist; he is either, like the surgeon, a craftsman, or, like the physician and the psychologist, an artist.... This means that in order to be a good doctor a man must also have a good character, that is to say, whatever weaknesses and foibles he may have, he must love his fellow human beings in the concrete and desire their good before his own.” —W.H. (Wystan Hugh) “Delicious essence! how refreshing art thou to nature! how strongly are all its powers and all its weaknesses on thy side! how sweetly dost thou mix with the blood, and help it through the most difficult and tortuous passages to the heart!” —Laurence Sterne (17131768) “One of the baffling things about life is that the purposes of institutions may be ideal, while their administration, dependent upon the faults and weaknesses of human beings, may be bad.” —Mary Barnett Gilson (1877?)
<urn:uuid:8ddd0eca-86e7-4169-85cf-7f8b1fdf05de>
CC-MAIN-2018-30
http://www.primidi.com/public-key_cryptography/practical_considerations/weaknesses
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676590493.28/warc/CC-MAIN-20180719031742-20180719051742-00272.warc.gz
en
0.954872
1,460
2.921875
3
Because of their low metabolic costs, ectothermic predators can specialise on prey resources that are available for only a brief period each year. Endemic pit-vipers (Gloydius shedaoensis) on a small island in north-eastern China offer an extreme example of this phenomenon, with adult snakes feeding only on seasonally migrating birds that are available for a few weeks in spring and autumn. We surgically implanted radiotransmitters in 16 pit-vipers, and located the snakes at weekly intervals for the next 12 months to record activity, movements, home ranges, habitat use, body temperatures and associated environmental temperatures. The snakes were extremely sedentary, with daily displacements averaging <2 m and home ranges <0.3 ha. The snakes maintained diurnal body temperatures around 25°C throughout the active season. Diurnal activity was reduced in summer, when birds were unavailable. Males and females were similar in most aspects of their ecology, except that females were often found in trees in autumn (feeding) while males were more often on the ground at this time (probably mate-searching). Males also tended to shelter under vegetation rather than under rocks. The low vagility, relatively low body temperatures and summer inactivity of these snakes may reduce energy expenditure, and thus facilitate survival in a habitat where food is available only in brief periods several months apart.
<urn:uuid:4910047b-e592-4705-b127-c863e8419c6c>
CC-MAIN-2016-36
http://onlinelibrary.wiley.com/doi/10.1034/j.1600-0706.2003.11942.x/full
s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982293468.35/warc/CC-MAIN-20160823195813-00203-ip-10-153-172-175.ec2.internal.warc.gz
en
0.959981
277
3.3125
3
Time to do some work It’s your turn. Design your own literacy strategy by choosing from the options below. Download our worksheet to record your ideas if you want to. Alternatively, you can skip ahead to the Assessment template and get started on this part right away. Have a play with the ideas here, but keep in mind that for your assessment, you only need to focus on one literacy strategy. We suggest that you use the tools below to create a broad literacy strategy for your teaching programme for strengthening either reading or writing. How to write your own strategy for reading - Choose one or two items from the box and then add your own context below. - Write out a final draft summarising your strategy. - If you need to, make any changes to ensure your strategy addresses the reading skills you want to concentrate on. I will: Teach my learners to read with understanding with a focus on… |how to use decoding strategies how to recognise language and text features how to use comprehension strategies how to read critically |in the context of… (add your own programme here)| Download our worksheet to record your ideas and get started now.
<urn:uuid:e82194c2-6538-40ee-9c10-f144ca640201>
CC-MAIN-2020-29
https://thisisgraeme.me/2017/03/25/strategies-how-to-write-your-own-strategy-for-embedding-reading/
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655881763.20/warc/CC-MAIN-20200706160424-20200706190424-00528.warc.gz
en
0.869614
245
3.625
4
Eating less at night time is sensible advice for someone trying to eat less. Now science has given some validity to changing your habits if you think eating at night means you’re eating too much. Eating less food at night time is sensible advice for someone trying to lose weight. The reason often given is that if eat you too much food at night, the body will store all those excess kilojoules as fat because we’re inactive until the next day. The reason sounds plausible, but if it was one hundred percent true then world hunger could be solved by just feeding people one meal at night time. What really matters is how much is eaten over days and weeks for weight gain or weight loss, not so much when it is eaten. There is merit though in advice to eat less at night time as it can help a person to cut back on the total quantity of food eaten. Eating lots of food in the evening can also be a marker for unhealthy dietary habits, especially if much of that extra food is going to fuel couch surfing exploits. So even though advice to eat less at night time seems logical, it hasn’t actually been well tested by science to see how effective it can be for losing weight. Filling this gap, a short-term study involving 29 healthy men looked at how 2 weeks of restricted night time eating fared against 2 weeks of ‘normal’ evening eating. Advice on restricting night eating was very clear: avoid any food or drink containing kilojoules between the hours of 7 pm and 6 am the next morning. No other changes to the participants’ diet or lifestyle was required so each person was free to eat whatever they wished during the day time hours until early evening. Twenty seven of the twenty nine people complied with following this advice for 2 weeks as well as the 2 week control period. Eating at night a waistline hazard So did people eat less when restricting night time eating? Yes, equal to 1000 kilojoules (about 250 Calories) per day less than during their normal eating pattern. This small energy difference was enough to see the men lose 0.4 kg over the 2 week restriction period, and gain 0.6 kg over the 2 week control period. Not surprisingly, the participants reported higher levels of hunger before breakfast during the 2-week restricted eating period. The two cautions with interpreting this study is that it was small in scale and only looked at healthy, mostly normal weight male university students. What it all means There is now some scientific evidence to make you think about what you’re eating at night time. By following a very simple rule of ‘no snacking after 7 pm’ can give a small, but effective benefit in cutting back on calories.
<urn:uuid:6144be40-b9e7-48d9-a786-7dba0c5c6b83>
CC-MAIN-2023-50
https://www.thinkingnutrition.com.au/eating-at-night/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100489.16/warc/CC-MAIN-20231203062445-20231203092445-00879.warc.gz
en
0.97495
568
2.640625
3
posted on Apr, 4 2003 @ 05:53 PM Newfound L.A. Fault Threatens Major Quake for National Geographic News April 3, 2003 Between the sun and the stars, Los Angeles sometimes seems like paradise. But life in the City of Angels comes at a price: earthquakes. Now the threat of "the big one" may be greater than previously feared. Researchers have identified a buried fault that may have caused at least four large-magnitude earthquakes in the past 11,000 years and is still active. Known as the Puente Hills Blind Thrust System, the fault is three to 17 kilometers (2 to 11 miles) deep and extends for almost 50 kilometers (31 miles) from northern Orange County, through Los Angeles, up to Beverly Hills. Earthquakes pose a constant threat to California. A recently identified fault found beneath the Los Angeles basin suggests the threat to the city is greater than previously thought. "In terms of location, it couldn't be much worse," said James Dolan, a professor at University of Southern California's department of Earth sciences, who led the study. "Downtown L.A. is sitting on top of this thing." Paleoseismologists have previously pinpointed the locations, magnitudes, and dates of ancient earthquakes, but never in so-called blind thrust faults. These are faults that don't extend to the surface of the Earth. Scientists have in fact debated if such faults exist beneath Los Angeles. The new study shows they both exist and could pose a credible earthquake hazard. Earthquakes New and Old The researchers received help for their study from an unexpected source: the oil industry. Companies like Texaco, which have spent millions of dollars on geologic drilling research in California, provided scientists with invaluable research data. Using that information and high-resolution seismic reflection data, Dolan and colleagues drilled 15 bore holes, up to 40 meters (130 feet) deep, to study sediment layers overlying the hidden fault. What they found was subtle folding of the sediments revealing a history of ancient earthquakes. The study shows the occurrence of at least four earthquakes with a magnitude of 7.2 to 7.5 on the Richter scale during the past 11,000 years. Perhaps most importantly, the 6.0-magnitude Whittier Narrows earthquake occurred in 1987 along a segment of Puente Hills, demonstrating that the fault system remains active and dangerous. Geodetic studies show that Los Angeles is contracting. The northern point of the L.A. basin is moving closer to the southern point. "L.A. is being squeezed from north to south at about 4 to 5 millimeters [0.15-0.2 inch] per year," said Dolan. This shortening, part of which is happening on top of recognized fault systems, literally bends the rock in the ground. The process stores energy, and when this energy exceeds the strength of the system, the fault breaks, triggering an earthquake. Scientists believe that up to half of the energy stored in this process could be released on the Puente Hills fault. "The good news is that major earthquakes along this fault are very infrequent, it may not happen again for thousands of years," said Dolan. "The bad news is that it could be very strong when it does happen." An earthquake with a magnitude of about 7.5 on the Richter scale probably occurred on the Puente Hills fault 7,000 to 8,000 years ago. That means it was 15 times stronger than the 1994 earthquake that hit Northridge, north of Los Angeles, and killed 51 people. The Northridge earthquake, which measured 6.7 on the Richter scale, caused U.S $44 billion in economic damage and is the largest natural disaster in The tremblor proved that an earthquake smaller in magnitude can cause greater damage than a more powerful earthquake. The shaking in Northridge was some of the worst ever felt. Bowl of Jello In bigger earthquakes, shaking lasts longer and is felt over a larger area. There is a difference in frequency content between small and large earthquakes. Small earthquakes have higher frequency energy and can be particularly harmful to homes. Big earthquakes have low frequency energy and may cause more damage to large structures like skyscrapers. What makes Los Angeles particularly vulnerable to any earthquake is that part of the basin the city is built on is filled with weak sediments. "The fault will pump energy directly into the basin and cause it to shake like a bowl of Jello," said Dolan. Mexico City has a similar problem. That city was severely damaged in a 1985 earthquake, even though the epicenter lay in far-away Acapulco. Establishing what kind of earthquakes could happen is critical for seismic hazard zoning, emergency response, and risk mitigation strategies. "You want to find out as much as you can about the threat," said Dolan. "That gives you a batter chance to prepare for it." The main challenge is to build earthquake-proof structures. As seismologists are fond of saying, "Earthquakes don't kill people, buildings do." A summary of the research appears in the current issue of Science, the journal of the American Association for the Advancement of Science.
<urn:uuid:c1584a17-af90-4abb-9fcd-be22ef5647b3>
CC-MAIN-2016-44
http://www.abovetopsecret.com/forum/thread7500/pg1
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988725470.56/warc/CC-MAIN-20161020183845-00090-ip-10-171-6-4.ec2.internal.warc.gz
en
0.95034
1,113
3.015625
3
Emergency dentists care touching many lives have been touched by our dental team. Patients will call from great distances for relief from pain and suffering when up all night due to toothache pain. Life to some is considered a little harder to bare until the toothache is resolved. We would like to think life is a little easier because our dental team is available. Our goal is to make life easier from a dental point of view. A dental radiograph in this post displays an implant with bone resorption. The dental implant is failing due to a lack of bone to hold it. Implants are anchored in solid bone for stability and viability. Bone loss leads to instability of the implant system. Emergency dentists care in this particular case call for removal of the dental implant. Due to a lack of bone support inflammation and infection require antibiotic therapy, Keeping the infection under control is a high priority to reduce patient complications. Make dentistry available to those in need. Oral bacteria that causes advanced periodontitis also is responsible for the breakdown of failing dental implants. Bacteria in the mouth has the ability to spread cancer. You will also find a connection between oral bacteria and Alzheimers disease. Periodontal evaluation of dental implants is important and should be placed on a periodic recall plan. Natural Teeth and dental Implants both need periodic re-evaluation in order to maintain optimal oral health. Times you show how much you care, greatly reduce the treatment of patients. No life is so hard that it can’t be made easier by the simple implementation of quality systems. One system in particular is the Water Pic, an oral irrigation system that improves greatly, your oral hygiene. A lot can be said for great systems that reduce the need for emergency dental care. From the Diary of my Enlightenment, A.L. Clark, D.D.S. http://www.dentist4you.biz Links nobelbiocare.com, kcdentalimplantsociety.com
<urn:uuid:cd1f8030-4c6f-4af1-9a13-5e76677c6079>
CC-MAIN-2021-04
http://dentist4you.biz/emergency-dentists-care/
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610704843561.95/warc/CC-MAIN-20210128102756-20210128132756-00522.warc.gz
en
0.895701
428
2.734375
3
An Introduction to the Book of MicahRelated Media I. TITLE OF THE BOOK: A. Hebrew: In Hebrew the book is titled hkym after the prophet to whom it was given. It seems that the name Micah has been shortened from the longer Why*k*m! meaning “Who is like Yahweh?”1 B. Greek: In Greek the book is titled MICAIAS again after the prophet to whom it was given A. The author, Micah, was of the town called Moresheth which may be the same town mentioned in 1:14, Moresheth-gath. If so, Micah came from a little town not far from Jerusalem (25 miles SW of Jerusalem near the Philistine city of Gath) HEATER writes, “Isaiah was apparently a more urbane prophet, personally acquainted with kings and leaders. Micah, like Amos, may not have been part of the official prophets’ guild. His trips to Jerusalem as a ‘country’ prophet no doubt confirmed what he had heard from a distance. He shared with Isaiah, however, an unswerving commitment to the covenant of Yahweh and an abhorrence of the sin so prevalent in his day”2 B. Micah lived during the times of the kings of Judah--Jotham (750-732/35), Ahaz (735-713/16), and Hezekiah (716-687) C. Micah’s contemporaries were:3 1. Isaiah--who prophesied during the times of Uzziah, Jotham, Ahaz, Hezekiah 2. Amos--who prophesied during the time of Uzziah (and Jeroboam II in Israel) 3. Hosea--who prophesied during the time of Uzziah, Jotham, Ahaz, and Hezekiah (and Jeroboam II in Israel) D. For a good discussion of unity under one author (Micah) see Robert B. Chisholm, Jr., Interpreting the Minor Prophets, 131-33. III. DATE: Eighth Century B.C. probably before the fall of Samaria in 722/21 B.C. to Sennacherib’s march to Judah in 701 B.C. A. That Micah mentions the “decrees of Omri” (c. 885-874 B.C.), the “works of the dynasty of Ahab” (c. 874-853; Mic 6:16), and Assyria indicates that at least part of Micah’s ministry was before the fall of Samaria in 722/21 B.C. B. The similarities between Micah 6:10-11 and Amos 8:5-6 supports a time which would have been before the fall of Samaria4 C. If 1:10-16 is describing the march of Sennacherib from Lachish to Jerusalem in 701 B.C. we may have a terminus boundary for the book D. Probably Micah’s references to the fall of Judah and Jerusalem by “Babylon” (Micah 3:12; 4:10) were typico-prophetic5 (cf. Jer 26:18 where Jeremiah affirms that Micah predicted the fall of Jerusalem during the reign of Hezekiah (716-687 B.C.)6 IV. HISTORICAL SETTING: A. Micah was a contemporary with Isaiah, Amos, and Hosea for at least for part of his ministry B. Tiglath-pileser had conquered all of northern Syria by 740 (the date of Uzziah’s death) 1. He conquered the Aramean city-state of Hamath 2. He forced all small kingdoms, including Israel under Menahem to pay tribute (2 Kings 15:19f) and Judah under “Azariah” (Uzziah)7 3. He entered Palestine in 734 B.C., set up a base of operations at the River of Egypt. Many small states rebelled against him including Israel in the Syro-Ephraimite war (733 B.C.). 4. Judah would not participate in the Syro-Ephraimite coalition. The coalition attempted to overthrow the Davidic dynasty to appoint a king who would join the coalition (2 Kings 15:37; 16:5; Isa. 7:1) 5. Isaiah exhorted Ahaz to trust in the YHWH; he refused and turned to Assyria (Isa. 7; 2 Kings 16:7-9) 6. Tiglath-pileser invaded Israel and almost came to Judah’s boarders (Isa. 15:29) a. Israel’s king--Hosea paid tribute to Tiglath-pileser (732) b. Tiglath-pileser died (727) and Hosea (who overtook Pikah in Israel) refused (in alliance with So of Egypt) to pay tribute to Shalmaneser V as he had to Tiglath-pileser (2 Kings 17:4). C. Assyria (Shalmaneser or his successor Sargon II) moved against Israel and after a three year siege, took the capital of Samaria (721) and carried the people into captivity D. Assyria expanded unto the northern boundary of Judah. Judah was also left alone when many of the city states of Palestine and Syria along with Egypt rebelled against Assyria and were put down in 720 B.C. E. Judah (under Hezekiah) joined an uprising along with Egypt, Edom, and Moab against Assyria (713-711) F. Sargon (of Assyria) took Ashdod and Gath leaving Judah vulnerable G. Sargon died in 705 leading to revolt by many including Judah under Hezekiah along with Babylon (2 kings 20:12-19; Isa. 39:1-4) H. Sennacherib (of Assyria) retaliated in 701 defeating Sidon, receiving tribute from Ashdod, Ammon, Moab, and Edom, subjugating Ashkelon and Ekron, and surrounding Hezekiah8 and forcing him to pay tribute to Sennacherib (2 Kings 18:13-16) V. AUDIENCES: Micah wrote to both the northern kingdom of Israel and the southern kingdom of Judah/Jerusalem; nevertheless, the southern nation of Judah was his primary audience A. To warn the northern kingdom, Israel, of impending judgment because of its covenant disloyalty B. To warn the southern kingdom, Judah, of impending judgment because of its covenant disloyalty C. To confirm for Judah that they were just as guilty as was Israel, so they would be judged like Israel D. To emphasize God’s justice and love in disciplining the nation E. To affirm God’s future restoration of His people (not the major purpose) F. To present “God as the sovereign Lord of the earth who controls the destinies of nations, including His covenant people Israel”9 1 Homer Heater, Jr., Notes on the Book of Micah, unpublished class notes in seminar in the preexilic Old Testament prophets [Dallas Theological Seminary, Fall 1990], 33. Micah, or Micaiah, was a common name in the OT (cf. Judges 17--18; 1 Chron 5:5; 9:15; 23:20; 2 Chron 34:20; 1 Ki 22:8; Neh 10:11. 2 Homer Heater, Jr., Notes on the Book of Micah, unpublished class notes in seminar in the preexilic Old Testament prophets [Dallas Theological Seminary, Fall 1990], 33. 3 Homer Heater, Jr., Notes on the Book of Micah, unpublished class notes in seminar in the preexilic Old Testament prophets [Dallas Theological Seminary, Fall 1990], 33. 4 Ralph L. Smith, Micah-Malachi, Word Biblical Commentary, XXXII:5. 5 Chisholm's discussion is helpful here: several explanations for the reference to Babylon (4:10) may be offered. One could label this line a later gloss without necessitating a late date for the entire context. However, if 4:10 is a gloss, why were 5:5-6 and 7:12, which view Assyria as Judah's enemey and place of exile, not altered by the propsed editor for the sake of consistency? Another possiblity is that Micah, like Isaiah (cf. 39:6-7), foresaw a distant Babylonian exile beyond the Assyrian crisis of his own day. However, if so, why did he picture Assyria as Judah's eschatological enemy (cf. 5:5-6) and view it as the place where Zion's people would be exiled (7:12)? A third possibility is that Micah, in mentioning Babylon, was referring (from his perspective at least) to the Assyrians, who conquered Babylon and regarded it as an important religious center. Micah may have chosen the name 'Babylon' for its symbolic value or because of its association with Nimrod (cf. Gen. 10:10), whom the prophet names in 5:6 in conjunction with Assyria. Since Genesis 10:8-12 identifies Nimrod as the founder of both Assyria and Babylon, the two were probably closely related in Israelite thought (Robert B. Chisholm, Jr., Interpreting the Minor Prophets, 133). 6 Ralph L. Smith, Micah-Malachi, Word Biblical Commentary, XXXII:5. 7 LaSor, et al, p. 367--cannot find this in ANET, p. 283f. 8 Cf. ANET, p. 288. 9 Robert B. Chisholm, Jr., Interpreting the Minor Prophets, 160. Related Topics: Introductions, Arguments, Outlines
<urn:uuid:8776ce7c-a7f6-4c7b-b6b8-909170f161bb>
CC-MAIN-2019-04
https://bible.org/article/introduction-book-micah
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547584518983.95/warc/CC-MAIN-20190124035411-20190124061357-00015.warc.gz
en
0.947799
2,151
3.03125
3
Polar Bears Swim Huge Distances Just to Find FoodThe Rainforest Site Because of the webbing between their toes and their near-exclusive diet of aquatic seals, polar bears are considered to be marine mammals, but they depend on pack ice over the sea from which to launch their hunting forays. A new study published in the April 2016 issue of Ecography shows that as climate change shrinks the sea ice, polar bears are forced to swim for longer and longer distances to find suitable ice. Researchers are concerned the habitat loss may not only cause a decline in polar bear population, but also eventual extinction. Researchers from Environment and Climate Change Canada and the University of Alberta have been using telemetry from GPS transmitters in collars to track polar bear migration for years. Because the necks of adult males are too thick to hold collars, scientists attach collars to subadult and adult females in Hudson Bay and the Beaufort Sea. In 2004, only 25 percent of the tagged bears were forced to make long distance swims of 31 miles or more, but by 2012, the amount had increased to 69 percent. A female bear swam the longest distance yet documented in 2009, spending nine days traveling about 250 miles in the water. The long swims take a toll on the health of the bears. They lose weight, and their cubs often get hypothermia and drown. Sometimes rather than risk swimming long distances, polar bears spend summers on the shore, where they may not even be able to find food. Observers note that bears in some areas are skinnier than they used to be and have fewer cubs. To survive, polar bears may have to change their predatory habits and learn to hunt on land. Because of the peril to their habitats, in 2008, polar bears were the first vertebrate species listed as in danger of extinction due to global warming in the U.S. Endangered Species Act.
<urn:uuid:c313243e-d926-41ea-b24a-77f4f06e55b1>
CC-MAIN-2018-39
https://blog.therainforestsite.com/cs-swimming-polars/
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267157569.48/warc/CC-MAIN-20180921210113-20180921230513-00040.warc.gz
en
0.962206
390
3.796875
4
Escallonia 'Compacta' flowers (Photo courtesy of Loen Nursery) Height: 5 feet Spread: 5 feet Hardiness Zone: 8 Other Names: Newport Dwarf Escallonia A compact, slow growing form; great low hedge or groundcover; a tough low maintenance shrub that is drought tolerant once established; flowers appear in early summer and sporadically throughout the year Dwarf Escallonia features showy clusters of red trumpet-shaped flowers at the ends of the branches in early summer, which emerge from distinctive crimson flower buds. It has attractive dark green foliage which emerges light green in spring. The glossy oval leaves are ornamentally significant but remain dark green through the winter. The fruit is not ornamentally significant. The bark is not particularly outstanding. Dwarf Escallonia is a multi-stemmed evergreen shrub with a mounded form. It lends an extremely fine and delicate texture to the landscape composition which can make it a great accent feature on this basis alone. This is a relatively low maintenance shrub, and should not require much pruning, except when necessary, such as to remove dieback. It is a good choice for attracting birds and butterflies to your yard. It has no significant negative characteristics. Dwarf Escallonia is recommended for the following landscape applications; - General Garden Use - Mass Planting Dwarf Escallonia will grow to be about 5 feet tall at maturity, with a spread of 5 feet. It tends to fill out right to the ground and therefore doesn't necessarily require facer plants in front, and is suitable for planting under power lines. It grows at a slow rate, and under ideal conditions can be expected to live for 40 years or more. This shrub should only be grown in full sunlight. It does best in average to evenly moist conditions, but will not tolerate standing water. It is not particular as to soil type or pH, and is able to handle environmental salt. It is somewhat tolerant of urban pollution. This particular variety is an interspecific hybrid. * This is a "special order" plant - contact store for details
<urn:uuid:c2bd3c8a-e1ee-451a-bb83-b10554ac53d7>
CC-MAIN-2015-18
http://plants.squakmtnursery.com/12230001/Plant/10236/Dwarf_Escallonia
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246639057.4/warc/CC-MAIN-20150417045719-00266-ip-10-235-10-82.ec2.internal.warc.gz
en
0.916059
444
2.65625
3
|SAMR||UNDERSTANDING BY DESIGN (Backwards Design - UbD)||LIBERATORY EDUCATION - Paulo Freire| |20 EXAMPLES OF TECHNOLOGY||Substitution (example using word instead of paper and pen)||Augmentation (using the tech one step further - ex. formatting)||Modification (redesign using interactive examples)||Redefinition (creating a novel task)||Desired Results “What you want them to know and be able to do”||Assessment Evidence "How will you measure their application of skills or transfer of knowledge?"||Learning Plan "What instruction/activities are you going to use to get the desired result?"||Provide Educational Access to Students||Encourages dialogue (Teacher and Student Share in Learning)| |Google Docs||"Used at a low level, technology| merely serves as a substitution—for example, using a word processor instead of paper and pencil to write a conclusion". (Smith & Mader, 2016). |"The next level is augmentation, in which technology improves| on a learning task similar to what students could do without the technology, such as using the formatting tools in a word processor to highlight areas of interest. (Smith & Mader, 2016) Modification level, technology integration requires a significant redesign of a task. For example, in a secondary science class an instructor shifts how students learn about light a modification that shifts from showing a diagram of light traveling to providing an interactive computer simulation of light with variables students can change" (Hamilton, E. R., Rosenberg, J. M., & Akcaoglu, M., 2016). Students can insert direct links using explore to bring in videos that bring their topic to life. |"Finally, the Redefinition level is achieved| when technology is used to create novel tasks. For example, instead of assigning a social studies-based persuasive essay, a fifth grade teacher requires students to create and present their arguments through individually created and edited videos." (Hamilton, E. R., Rosenberg, J. M., & Akcaoglu, M., 2016). Google docs allows for real time collaboration on a paper creating a non-static paper. |GoogleDocs can be used for peer-editing to facilitate transfer of learning. The learning objectives, big ideas and target skills are clearly identified (for example, "Determine what makes a well-developed essay and construct a multi-paragraph piece of writing with an introduction, body, and conclusion" ( McTighe & March, 2015).||Google Docs can be used for formal writing assessments (essays) and self-editing. Google Forms can be used for formative (exit slip) and summative assessments (test, quizzes). These performance tasks and other types of evidence show application and transfer of skills ( McTighe & March, 2015).||Google Docs can be used for collaborative writing as part of a classroom lesson sequence. The writing can be sequesnced or differentiated for different team members. The comments function allows students to give feedback and evaluate their work and against the objectives taught ( McTighe & March, 2015).| |Animoto||Using animoto to write a haiku is possible because of the limited space for writing. Instead of pen and paper students use animoto. "Although it is easy to add text, space is extremely limited, much shorter even than the length of one tweet per slide. Animoto allows, at max, 40 characters on a top line and 50 characters on a bottom line-90 characters in all per slide" (Ayotte, L., & Collins, C., 2017).||Animoto allows "putting images to lines in the poem, students would understand imagery" Ayotte, L., & Collins, C., 2017). Students enhance their writing with images.||In Animoto a student can change the added images or music to bring the poem alive to match the words and change in feelings. "Among Lori's favorite videos was Adam's-he was the student who discovered how to switch up the music halfway through the poem, which captured the change of action and tone. The poem is only eight lines and features two characters: an angelic child who asks for the pancake on top of the stack, followed by a troublesome child who wants the pancake in the middle. The inferential reader can imagine the result: taking the pancake in the middle would lead to the entire stack falling down, and that is precisely what Adam depicts at the end of his video" Ayotte, L., & Collins, C., 2017).||Redefinition is achieved because when "using Animoto, students can develop short digital videos that include music, photos, video clips, and text as well as share their creations electronically" Ayotte, L., & Collins, C., 2017). This step of sharing their digital work of their original poems is a novel task and therefore meets the redefinition of SAMR model.||Create original videos that express what each student learned in a sophicated creative way to portray their understanding to their peers and others.||The videos created by students will be assessed to ensure all content is correct and included.||Show great videos and bad videos to set a standard and provide a rubric to be sure all content is included.| |Instead of writing with paper and pen students "during class time, will read the text and periodically pause after some interesting development or following the completion of a chapter, and then tweet their interpretations as statements" (Hunter, J. D., & Caraway, H. J, 2014).||"The next level is augmentation, in which technology improves| on a learning task similar to what students could do without the technology, such as using the formatting tools in a word processor to highlight areas of interest. (Smith & Mader, 2016) |Twitter has allowed the reader of required texts to now lead the discussions of the book among their peers beyond the classroom period with the teacher. "Part of the appeal of rereading the text had to do with confirming, reconfirming, and/or disconfirming questions, statements, perspectives, and presages. This emergent practice signaled a different level of engagement with The Giver, as students used tweets as conversational starters. It became a common classroom practice for students to display a type of multimodal dexterity, moving with ease between Twitter, The Giver, in-class discussions, and journal writing" (Hunter, J. D., & Caraway, H. J., 2014).||Redefinition is achieved when novel tasks are created. The use of Twitter for some students provided this novel task. For the student that never participates in group conversations Twitter provides an anominous voice for full participation of the nonverbal or shy student. "Being given an alternative way to participate in classrooms was critical to students like #Solar who used these creative literacy tools and practices to demonstrate mastery of literature: (Hunter, J. D., & Caraway, H. J., 2014).||Twitter can be used for demonstration of mastery in final objectives. As part of a History lesson or English lesson, students create tweets related to historical events while acting as specific characters or figures. CITATION: Dodds, L. (2017). Students as Social Media Content Creators. CSLA Journal, 40(2), 13-16.||Twitter opens boundaries and creates access. It goes beyond time, physical space.||Twitter for Social Learning both for formal and informal education. Additionally, as content creators, students are not just passive recipients of knowledge.Twitter can also be used as a tool for social change.| |Today's Meet||Instead of students discussing verbally topics in the classroom. Today's Meet allows students to type their class discussions. "Today’s Meet looks a lot like a| “texting” program. Each message is limited to 140 characters, so students immediately know what to do" (Jarrett, K., & Devine, M. A., 2010). |Today's Meet takes classroom conversations to the next level because it gives every student a voice. "First, backchanneling gives every student a voice. In a traditional classroom discussion, students have to wait their turn to speak; some never get a chance to share, and dominant students sometimes inadvertently discourage participation. These are largely non-issues with backchanneling" (Jarrett, K., & Devine, M. A., 2010).||Today's Meet allows for multitasking. The students are now able to engage in the work of the classroom and still have a discussion online. In a science classroom student can participate in the science experiment while discussing online the why behind it. "Third, backchanneling leverages the multitasking skills that many| students have already mastered. It’s perfectly natural for students to watch a television program while carrying on a conversation with their friends about it via computer. It comes naturally, thanks to the pervasive role of technology in students’ lives today" (Jarrett, K., & Devine, M. A., 2010). |The novel component created using Today's meet is that your classroom can now be part of a classroom across the globe. "The collaborative nature of backchanneling means it would be possible for a much wider audience, including more than one class participating in the discussion" (Jarrett, K., & Devine, M. A., 2010).||Real-time access to content. (Miller, 2014)||With Today's Meet, use a backchannel for video and discussions, access transcripts and create private rooms for group dialogue. Conversations extend beyond the classroom. (Miller, 2014)| |Edmodo||"Edmodo enabled the students to realize the topics to be discussed in the next class. So, they could search the content to support their discussion in advance. Traditionally, questions for next class discussion were written on board" (Wichadeeq, S. S., 2017). |" Students completed the assignments via Edmodo through online quizzes" (Wendt, J. L., & Rockinson‐Szapkiw, A., 2014).||"Students completed the assignments via Edmodo through discussion threads" (Wendt, J. L., & Rockinson‐Szapkiw, A., 2014).||"Using the group feature, the teacher created small groups of students and posted files with the collaborative assignments" (Wendt, J. L., & Rockinson‐Szapkiw, A., 2014).||Instead of using worksheets at home teachers can create groups and have students post responses (for example, they can post their thoughts while viewing artifacts on a field trip).||Students can post evidence based responses or create higher-order thinking questions for peers to answer.||Students can upload audio files of themselves reading specific text and write commentary or critiques of their reading fluency. In Edmodo, teachers can also create study groups or reading circles.||Can be accessible from home or school.Teacher can post e-text for easy access.||Edmodo can be used to engage students in group communication.| |Screencast-O-Matic||Instead of using paper and pen "while preparing to record their screencasts, many students would state a sentence aloud and then revise and restate it, adding something they forgot to mention" (Hazzard, E., 2014, March).||"The "pause" feature allowed students to plan and discuss on a sentence-by-sentence basis, and the playback feature permitted them to review their work in its entirety" (Hazzard, E., 2014, March).||"For the most part, all students in each group participated, actively discussing how to respond to the questions and deciding who would speak" (Hazzard, E., 2014, March).||"Students spontaneously employed a range of collaborative techniques, such as ... retaking the screencast if team members thought they messed up" (Hazzard, E., 2014, March).||Find and create instructional videos to demonstrate key concepts. Ability to differentiate content to meet students’ needs. Reteach and reinforce. Students who need more time replay the videos as often as they need to understand/review etc.||With ScreenCast-O-Matic students can present evidence of learning.||Screencast-O-Matic can be used with online inquiry-based research. CITATION - Dwyer, B. (2016). Engaging All Students in Internet Research and Inquiry. Reading Teacher, 69(4), 383-389. doi:10.1002/trtr.1435||Pre-recorded videos for access anytime, anywhere.||Students can lead the lesson, pose questions and facilitate problem-solving, dialogue etc. using videos.| |Blackboard||Post a study guide to Blackboard||Students can sign up for their own groups based on interest.||Student Discussion forums are viewable by the instructor. Blackboard Collaborate works in this area as well.||Students work in small groups on a project, then link their work to an e-portfolio.||Online educational tools for access to content outside of traditional brick-and-mortar setting.||Knowledge is created through dialogue. CITATION: Boyd, D. (2016). What Would Paulo Freire Think of Blackboard: Critical Pedagogy in an Age of Online Learning. The International Journal of Critical Pedagogy, 7(1).| |EDpuzzle (Krista)||Rather than using paper to answer questions, students digitally answer questions that are embedded within a video ("EdPuzzle," 2016).||Teachers can accentuate the videos they create by adding their own narration & audio comments to highlight important concepts ("EdPuzzle," 2016).||Students can create their own interactive videos with multiple choice & open-ended questions and share with their classmates ("EdPuzzle," 2016).||Teachers can use the student data to assess whether students are viewing the video, duration of session(s), and quiz scores ("EdPuzzle," 2016).||Students view interactive videos where they control the pace of their learning. Ideal for class preparation where they can apply the newly acquired information in student-centered discussions (Tucker, 2015).||Data collected from the interactive videos helps teachers prognose student participation and effort (MacDonald, 2014).||Students can upload their own videos and create an interactive video to demonstrate their own learning with their teacher and classroom (Stern, 2015).| |Classkick (Krista)||Rather than use paper to complete assignments, students digitally complete their assignments ("Classkick," 2016).||Real-time feedback can be given to students from their teacher, allowing them to proceed and continue learning rather than waiting.||Students can include images, videos, and audio recordings in addition to text to an assigned question(s) - giving them multiple ways of responding. Allows visual and auditory learning.||The anonymity of requesting help from classmates in real-time enables support and comfort in the classroom. Students can also switch roles to teacher mode in order to help their classmates, thus helping to achieve a level of understanding and camaraderie in classrooms.||Students should work at their own pace, provide, and receive frequent feedback from both their teacher and classmates.||Notes, suggestions, and feedback from the teacher appear immediately on the student’s screen through use of the application.||Teachers can create and present lessons that can be modified to each individual student's needs.| |Edulastic (Krista)||Students print out the assignment(s), complete them on paper and hand them in ("Assessment - SAMR," 2016).||Teacher creates an assignment/assessment and assigns it to students digitally ("Assessment - SAMR," 2016).||Teachers can modify assessments for individual students. Students can view their results and choose to review the content and/or retake it to improve score(s) ("Assessment - SAMR," 2016).||Students can help teachers create assessments (student-developed questions) to quiz their classmates ("Assessment - SAMR," 2016).||Students will answer interactive questions that mirror SBAC and PARCC tests, along with a variety of state standards (CCSS and NGSS) (Sitkin, 2016).||Standards-aligned resources help teachers create new assignments. Standards-aligned reporting features offer feedback to help further student skills (Sitkin, 2016).||Ready-made or teacher-created assignments/assessments can be chosen from standards-aligned material. Content is available to reteach for students who may need remediation (Sitkin, 2016).||A Student Dashboard enables students complete access to their homework assignments/assessments from their teachers (Sitkin, 2016).||Student Dashboard enables students to create their own practice tests. The Learning Stream offers answers to questions students ask, as well as supplemental resources (Sitkin, 2016).| |CommonLit (Krista)||Teachers login and print out articles to give to students (Fleisher, 2017).||Teachers digitally assign (reading) texts and question sets to students to be graded (Fleisher, 2017).||Reading passages are labeled according to genres and grade levels. Teachers can choose to assign the text(s) to the whole class or individual students based on differential instruction (Fleisher, 2017).||Text passages can be used to extended research units, practice argumentive writing, learning vocabulary, and differentiated instruction while all students learn about the same topic (Fleisher, 2017).||Students receive leveled-reading assignments and answer the quiz questions (Kolodny, 2016).||Commonlit provides visualized data that includes class average, literary vs informational text class average, achievement by question type, individual student scores, and high and low scorers (Karlin, 2017).||Students should master specific literacy skills, develop higher-order reading and writing skills, and support claims with textual evidence ("CommonLit: Giving," 2016).||The Texthelp toolbar enables students to listen to text read aloud, translate text into several languages, view definitions to words, and highlight text (Fleisher, 2017).||Teachers can provide personalized writing feedback to students ("CommonLit Launches," 2016).| |CK12 (Krista)||Students read digital lessons and textbooks online ("Tools for Schools", 2015).||Students engage in videos, physics simulation modules (SIMS) and PLIX (Play, Learning, Interact, and Explore) interactive exercises that increase learning ("Tools for Schools", 2015).||Teachers can offer students individual exercises and lessons, catering to their specific learning differences| and styles in mind ("Tools for Schools", 2015). |Students can engage in the interactive exercises as the teacher assigns them online (i.e. through Google Classroom) ("Tools for Schools", 2015).||Students will read online textbooks and engage in interactive lessons and exercises ("Tools for Schools", 2015).||Teachers can make edits to lessons, add notes, and personalize interactive exercises to meet the learning goals of students (Owens, 2016).||The Flexbook Textbooks are online textbooks that integrate reading passages, with the addition of videos, simulations, and/or interactive exercises (PLIX). Students can interact with their own personalized learning assignments (Owens, 2016).||Students can sign up for free access to CK12 and pick the subjects they want to practice (at anytime, anywhere), CK12 monitors and tracks their progress ("BrainFlex: Summer," 2017).| |Kahoot! (Pat)||"What I like about the discussion feature on Kahoot! is that it allows teachers to pique students’ interest through a technological element and then springboard into a more traditional discussion" (Wallace, K. B., & Botzakis, S., 2016).||"Rather than offering a scrolling discussion platform where students have to type in their answers entirely, teachers can enter a question or a series of questions, and students can choose answer options such as “agree” or “disagree,” or any series of options the teacher provides" (Wallace, K. B., & Botzakis, S., 2016).||" The responses to these questions are immediately| calculated and displayed on the classroom’s projector screen, which initiates the next step of discussing whole class, face to face" (Wallace, K. B., & Botzakis, S., 2016). |"It offers manyuseful features, including the capacity to discuss with classrooms across the country or around the globe" Wallace, K. B., & Botzakis, S., 2016).||During planning, teachers think about the assessments and assessment types.||Teachers create a series of assessments both formative and summative. Kahoot is a game-based assessment tool that can be used for formative assessment (Rashtchian, 2016).||Kahoot can easily be integrated and become part of the instructional activities.| |Google Cardboard||Students can simply view information with this tool. (Weinberg, R. 2016)||Use the Google Cardboard camera app to take 360 degree pictures of settings, then create narrated descriptions.||Virtual fieldtrips using Google Cardboard guided tour app or Google Expeditions.||Students create their own VR scenarios with a Google Cardboard app.||Google cardboard with its virtual reality technology fit seamlessly into UbD. Google cardboard supports inquiry-based learning (Vasileva & Petrova, 2016).||Teachers can create activities that assess students skills based on virtual field trips or experiences that students create or want to investigate.||There are unique opportunities to develop activities that blend traditional textbooks with virtual reality.| |Class Dojo (Pat)||At the substitution level Class Dojo simply replaces pen and paper behavioral chart.||Augmentation students instantly know and can monitor their behavior when they hear a ding and view their performance on the interactive board.||During Modification the program allows the teacher to track class and individual points and generate reports (Edsurge, n.d.).||Redefinition: Parents get instant data on their child, teachers can share real-time photos of things taking place in the class, and parent and teacher can communicate instantly.| |Khan Academy (Pat)||Provides tutorial videos instead of in person tutoring (Lenihan, E., 2012).||Students can complete practice exercises to interact with the videos (Lenihan, E., 2012).||Teachers and students can receive performance data (Lenihan, E., 2012).||Teachers can combine this with interactive whiteboards to change the way class is conducted to make it a more hands on experience, (Lenihan, E. (2012).||Khan Academy is aligned with the goals that are set by the teacher. There is a multitude of lessons that can support struggling and advanced learners (Thompson, 2011).||Built within the Khan Academy platform are a series of formative assessments that teachers and students receive immediate feedback on (Thompson, 2011).||There are a plethora of tutorials that the teacher can assign to the whole class or individual students.| |TEDx (Pat)||"On TEDxYouthDay itself there will be a large number of events live-streamed online, essentially providing a ready-made TEDxYouthDay event for teachers and students anywhere" (Are you using..., 2011).||"The viewing party could be combined with a few presentations by your own students, a discussion forum, and talks by local role models" (Are you using..., 2011).||"Following the showing of a number of TED videos and practical activities based on the shared ideas, three local speakers were invited to present" (Are you using..., 2011).||"planning your TEDx event is to decide what will work best for you and your student community, and then tailor the event around the core concepts of empowering and inspiring young people through the sharing of ideas" (Are you using..., 2011).||The 4C’s of skills needed for the 21st century is communication, collaboration, critical thinking, and creativity. TEDx creates a platform to accomplish the 4C’s when the videos are used as part of a lesson (Cucinotta, 2014).||Assessment can be measured formally and informally, through discussion, and dialogue created between students||TEDx supports group discussions, collaboration, and amplify student's voice.| |YouTube||" YouTube can be used to augment stand-alone lessons" (Everhart, J., 2009). |"YouTube-enhanced lessons work| better as units of study" (Everhart, J., 2009). |"YouTube encourages viewers to comment and rate the| value of each video. Many students want to post questions for the creators of the content, or others want to offer suggestions for future productions. This is an opportunity to encourage students’ constructive contributions and criticisms of sites visited" (Everhart, J., 2009). |"YouTube and other file-sharing sites may be used as vehicles| for information exchange among students. Students can collaborate with others to conduct experiments, share results, and participate in competitions" (Everhart, J., 2009). |Youtube videos can give students a visual overview of concepts before group or individual practice.||Student-created videos on Youtube improve retention, show evidence of learning and application of concepts.||Through YouTube videos, educators can bring scientists, professors and experts into the classroom to help students learn.Tutorials and illustrated concepts are also a great way to illuminate instructional concepts.| |Nearpod||" The first, the Nearpod Content Tool, enables creation of customized presentations" (Doe, C. (2012).||" Teachers “push” information, questions, and activities to students’ mobile devices" (Doe, C. (2012).||"The student app enables students to use content and interactive features. They can follow the teacher’s interactive lesson, log in to submit personalized answers, touch the screen, and answer and get results and quiz scores (Doe, C. (2012).||"Teachers can use the fourth, or report, tool to get detailed real-time and post-session reports showing individual and class results" (Doe, C. (2012).| |Aurasma (Pat)||During substitution student presentations are static.||Augmentation student presentations include a link to another source.||Modification students are creating their own Auras and making a static image come to life.||When applied to the SAMR model Aurasma has the potential to reach the highest level of the model Redefinition (Blair & Finch, n.d.). At the redefinition stage students have the ability to share their project with classmates as well as others.||Aurasma creates learning opportunities for the student and students in the class by being able to reference Auras at anytime.||Using Aurasma creates the opportunity for students to create authentic learning experiences in order for students to demonstrate deeper understanding.||In a study conducted at the Monteney Primary School credited Aurasma for supporting creativity (Kucirkova & Falloon, 2017). Creativity supports 21st century learning skills.|
<urn:uuid:fe5c3d4e-8562-428d-812c-2fd9efd85a26>
CC-MAIN-2019-26
https://docs.google.com/spreadsheets/d/1Uc3XROpaMOc8xQYjQbOijaxzyhZTq7L8-uIMJj8_9I0/edit?usp=sharing
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998325.55/warc/CC-MAIN-20190616222856-20190617004856-00237.warc.gz
en
0.899562
5,696
3.5
4
A youngster gets jailed because a politician is offended. A man gets shot for scraping another man’s car. A couple gets beaten in a park, because they’re together but not married. A cinema hall gets vandalised, because someone doesn’t like the movie being screened. A riot breaks out in a town, because a community’s sentiments are hurt. A death-fatwa is issued because someone’s religious leaders are deemed slighted. Even in governance, we often find political opposition and even decision making layered with personal bias, and self-serving agenda. This is the unfortunate reality of the India we live in today. Even though the logical answer to the following questions should be a resounding “No!” I think we should pause and reflect on these questions, and also put them to those around us whom we find in situations that match: Are we, our societies, and our beliefs so weak and fragile: that we think criticism is an insult to us; that we imagine differing opinions reduce our stature; and we whip up a storm of hatred, fearing that individual acts actually threaten our culture and religions built and respected for hundreds of years?! Let’s pause and reflect on the question: Why has incredible India become so incredulously intolerant? Why do individuals and communities become really insensitive and inhuman, in order to protest against alleged insensitivity and inhumanity? Why do normally sane and well informed people, often behave in an insane and ignorant manner? I think this issue has deep rooted beginnings, and I’d like to share my theories with you to pause and reflect upon. In our minds and in our beliefs, perpetuated by our ancient history and popular texts, lies the image of an incredible India: festive with wealth, flourishing with happiness, steeped in dharma, and rewarded by nirvana. Even though, through time we suffered major invasions, absorbed many cultural alterations, and survived various colonial occupations, we held our heads high in the belief that our history is beautiful and our future is even more so. We wore our ethnic, cultural, and religious diversity like a badge of pride; we believed in the pursuit of an independent, strong, and self reliant nation; and we nurtured an image of a people well versed in ancient texts, talented as inventors and innovators, and practitioners of human compassion and religious tolerance. Our forefathers who wrote our Constitution perpetuated the pursuit of this image, in the letter and spirit of achieving Purna Swaraj. But today, almost seven decades after independence, our reality is far removed from purna swaraj, leave alone anywhere near nirvana. Sure we are a rich nation. But we also have a lot of poor people. Sure we are a powerful country. But our insides are stretched weak. Sure we are an enlightened, awakened, and progressive people. But we also have ignorant, closed, and fundamentalist elements among us. Our diversity has acquired new dimensions, and they don’t lend themselves to unity. Unfortunately, governments over the years, including mine, have failed to channel the evolution of our people, and failed to stop the subterranean growth of unrest and unhappiness across our national fabric. Even today, despite an overwhelming vote of confidence from the people, the Government finds itself stymied by the indecision and walls of criticism. Decades of scarcity in every conceivable aspect of our lives has conditioned our people to fight for everything they need or want. So despite having everything available to us today like unlimited wares in supermarket aisles, we still fight to beat the shopping line and jump the traffic lane. Perhaps the arrogance of power shows up in the attitude of bureaucrats and politicians who imagine themselves supreme and above the law, especially in the context of public dissent and the civil liberties of ordinary citizens. Perhaps memories of a closed economy and anti-multi-national sentiments under the Janata Party rule in the late 1970s, still shows up in right-wing sections of our society and politics – who drum up mistrust, hatred and fear of multinational companies, to suit their own agendas. Violent communal riots during the rule of right-wing parties; shameful incidents like the demolition of the Babri Masjid; and the horrific anti-Sikh riots in 1984 – only added to increase the mistrust and fear between communities across India. Allegations of corruption in high places, with prosecution of a very few, added to the impression that the common man had – that the letter of the law doesn’t apply to the high and mighty in India. What about the common man? He lives in this environment and is most certainly affected by it, dismayed and disturbed by it. When it comes to his own aspirations, he finds that growth is restricted to metros and urban areas, and not spread across all castes and communities in an equitable manner. So we have lopsided and unhappy migration from rural to urban areas happening every day. Many people leave their homes and their families behind in their home towns, to take up jobs they never wanted, to live like strangers among people they don’t know, for salaries that make them wonder whether it is all worth it in the end. When I pause and reflect, I think this is the backdrop, and these are the reasons why our people are becoming increasingly intolerant, and indulge in unlawful activities. Devoid of any peer pressure of family or biradiri, people don’t think twice about abusing or accusing someone of something, or even attacking them violently. Could it be that because there’s no job satisfaction in their life, some people make themselves feel useful by participating in so-called social or cultural activities – which could be ransacking an editor’s office, or thrashing an innocent couple in a park? Why can’t organisations with the resources and skills to organise attacks on galleries and give lectures on morality, use the same skills and resources to keep a vigil against crime and spread the word against prejudice? I think we are a great nation of great people with great talent and energy. I think people simply have to channel their own energies to realise their own potential. Why can’t our leaders and influencers from different walks of life, work together to help our people live the image we have in our heads? Why can’t all those with power and influence, those already seated on the pedestal of role models, use their positions to the advantage of a larger good? Why are those in power, afraid to go against communal bias and uninformed dissent? Why do the people sworn to uphold the law, become subservient to outlaws and surrender to unconstitutional activities? I see many Corporates today, taking on the mantle of leadership and creating programs for positive awareness and action among the people of India. We have to laud and encourage such initiatives. Critics may point out that they do this to further their brands and commercial interests. But I know for a fact, most of these business leaders are doing this simply because they are fed up of waiting for good things to happen, and simply because they recognise they have the power to make a difference. At the end of the day, human integrity, economic growth, and all round prosperity is intrinsic to the image of purna swaraj and the nirvana we all hope to attain. At the end of the day, we are all stakeholders and managers of this agenda and image of the incredible India we hold dear in our hearts and minds. So why can’t we all just get along?
<urn:uuid:649a2069-e484-425e-a7fb-ea79202cfe2c>
CC-MAIN-2017-13
http://www.kapilsibal.in/pause-and-reflect/why-cant-we-all-just-get-along/
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218191984.96/warc/CC-MAIN-20170322212951-00101-ip-10-233-31-227.ec2.internal.warc.gz
en
0.958276
1,584
2.53125
3
The many centuries during which leprosy was an incurable disease gave rise to myths and practices that have deep roots in cultures around the world. Below is a list of some of the forms of stigma and discrimination experienced by persons affected by leprosy. Persons affected by leprosy have been segregated within their own homes or forced to live elsewhere. The resulting stigma can persist long after a person has been cured, and some people are never able to return home. Obstacles to marriage Leprosy has been recognized as a legitimate reason for divorce in some countries. A person who contracts leprosy, especially a woman, is likely to have difficulty finding a partner. Denial of education There have been cases of children with leprosy or those who grew up in a leprosy community being prevented from enrolling in schools and denied an education. Legal restrictions and prohibitions There are over 150 laws and regulations in various parts of the world that discriminate against persons affected by leprosy, restricting them from using public transportation, running as a candidate in elections, and getting married. List of discriminatory laws at International Federation of Anti-Leprosy Associations (ILEP) website Denial of reproductive and family-related rights In the past, persons affected by leprosy in some countries were prevented from having and raising children. Policies included forced sterilization and forced removal of babies soon after birth. The consequences of these policies continue to affect people today. Stigmatizing images and language The use of insensitive imagery and derogatory terminology such as “leper” to describe a person with leprosy continues to reinforce the stigmatization of those with the disease. The use of leprosy as a metaphor has a similar effect. The many forms of discrimination experienced by persons affected by leprosy tend to result in self-stigma. Internalization of a culture’s negative prejudicial beliefs affects feelings of self-worth and can make a person affected by leprosy less likely to seek medical treatment and human rights. Visit the WHO Goodwill Ambassador’s page to learn about Yohei Sasakawa’s contributions to gaining recognition for leprosy as a human rights issue. Read about the Initiative’s strategies for eliminating discrimination. History and documents related to the Principles and guidelines for the elimination of discrimination against persons affected by leprosy and their family members Information about the appointment and mandate of the Special Rapporteur on the elimination of discrimination against persons affected by leprosy and their family members
<urn:uuid:d7fea5a1-7122-42b5-9172-477ed2a30cb3>
CC-MAIN-2021-39
https://sasakawaleprosyinitiative.org/about-hansens-disease/stigma-discrimination/
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057417.10/warc/CC-MAIN-20210923044248-20210923074248-00505.warc.gz
en
0.964131
528
3.671875
4
People who escaped the immediate destruction caused by the Great East Japan Earthquake -- and resulting tsunami -- on March 11, 2011 were not out of the woods, as illustrated by significantly elevated rates of out-of-hospital cardiac arrest in the weeks following the disaster. The epicenter of the earthquake -- which measured 9.0 on the Richter scale -- was off the northeast coast of Japan, and the brunt of the damage from the trembling and the surge of water was sustained by three prefectures -- Iwate, Miyagi, and Fukushima. In those areas, a total of 15,814 people died and another 2,664 went missing. Previous research has identified a relationship between earthquakes and the risk of sudden cardiac arrest, and Taku Iwami, MD, PhD, of the Kyoto University Health Service in Japan, and colleagues wanted to find out whether a similar association was seen after the Japanese disaster. As reported in the Nov. 28 issue of the New England Journal of Medicine, the researchers looked at data from adult patients transferred to centers in the hardest hit prefectures after an out-of-hospital cardiac arrest from 4 weeks before to 8 weeks after March 11, 2011. They compared rates of cardiac arrest during each week with the expected rates for 2011 and the preceding 6 years. The risk of out-of-hospital cardiac arrest was significantly elevated for the week following the earthquake (risk ratio 1.70) and for each of the 3 subsequent weeks (RRs 1.48, 1.47, and 1.26) before returning to the expected rate. No such deviations surrounding that date were seen in the previous 6 years. There were some differences by age and sex, however. The risk of cardiac arrest was not elevated in men ages 18 to 74 during any week, but it was increased in older men in the first 2 weeks after the earthquake and in the first week after maximum aftershocks occurred on April 7 and 11. Risk was increased in women ages 18 to 74 for the first 2 weeks after the earthquake, and in older women for the first, third, and fourth weeks after the earthquake. The researchers believe "that the earthquake triggered mental and physical stress among people living in disaster areas, [which] became the cause of sudden cardiac arrest," Iwami wrote in an email to MedPage Today. The differences in the findings according to age and sex "would be helpful information concerning where, when, and for whom emergency treatments should be provided after great disasters worldwide," he said. "In addition, these data suggest that long-term healthcare countermeasures would be needed in case of serious disaster that forces the majority of people (especially the elderly) to evacuate for months." Cardiac arrest was not the only problem exacerbated by the earthquake. A study presented at the 2012 meeting of the European Society of Cardiology and published in the European Heart Journal showed that heart failure and stroke cases also spiked in Miyagi in the aftermath of the disaster. During the meeting, the researcher who presented the findings, Hiroaki Shimokawa, MD, PhD, of Tohoku University Graduate School of Medicine in Sendai, Japan, said, "We consider that the increased occurrences of cardiovascular diseases may have been caused by the activated sympathetic nervous system by physical and mental stresses, insufficient medications, and increased salt intake from preserved foods." "While hospitals and pharmacy services were disrupted by the earthquake and tsunami, these services were restored rapidly and we do not believe [those disruptions] contributed greatly to the cardiovascular diseases we observed following the disaster," Shimokawa said.
<urn:uuid:b4596742-6315-41f2-8682-61aa22651103>
CC-MAIN-2014-23
http://www.medpagetoday.com/Cardiology/Arrhythmias/43197
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510264270.11/warc/CC-MAIN-20140728011744-00400-ip-10-146-231-18.ec2.internal.warc.gz
en
0.976873
726
2.65625
3
Do You Know How the Athenian Navy Was Formed? Comments Off on Do You Know How the Athenian Navy Was Formed? Everything changed for the Ancient Athenian city-state after the Persian Empire tried to conquer Ancient Greece. The empire had its sites set on conquering Ancient Greece and despite their large numbers, the Ancient Greeks were able to stop them from conquering Greece during what we know of as the First Persian Invasion that took place starting in 492 B.C. One of the aftermaths of this war is that the there were those in Greece, especially in Athens, who thought they would be back. This ultimately set the Athenian city-state on a course that would eventually lead to them forming their navy. Here’s more information: Themistocles Knew They’d Be Back There was one individual in particular who had a feeling that the Persians would come back and make another attempt at conquering Greece. It’s important to note that at the the time, Athens was operating as a full democracy, where the voting citizens had a say in every decision that was made. Politicians such as Themistocles had to make speeches and convince the people that their point of view was the correct one. After that, the new laws needed to be voted on by the people. Once he understood that it was highly likely that the Persians would return, he set out to convince the Athenian citizens that this was, in fact, the case. Convincing Athens to Form a Navy Ultimately, he realized that the Athenian city-state had something to offer that other areas of Ancient Greece didn’t have. Athens was in a strategic location since it had access to the sea. They were also sitting on vast silver deposits, which means that they had the wealth in order to make the changes needed to protect Athens and the rest of Ancient Greece from attack. After making a series of speeches, Themistocles effectively convinced the Athenian citizens to form a navy and the silver was to be used to fund this effort. Building the New Navy Once the decision was made to form the navy, the Athenians had their work cut out for them. They needed to construct the ships, known as triremes. They also needed to hire and train the soldiers who would man the triremes. Each member of the navy was responsible for his own oar and each side of the boats had multiple oars. The naval members needed to move as a cohesive unit so that they ships could be as efficient as possible. Not only that, but the fleet was filled with a lot of ships and each ship needed to learn how to maneuver and execute battle plans. Each solder who was a member of the navy was paid a wage and anyone from Athenian society could join. This is the first document instance of an ancient military paying its soldiers an actual wage. The Persians ultimately did return and after Athens was done developing its navy, it was quite effective. History tells us that the Athenian Navy was far superior to the Persian’s navy. The Athenian Navy experienced a major victory at the Battle of Salamis during the Second Persian Invasion. Ultimately the Persians left Greece and never tried to conquer again. Categorized in: Ancient Greek History This post was written by GreekBoston.com
<urn:uuid:8896b906-2621-4391-a6ec-dc085af6b973>
CC-MAIN-2020-40
https://www.greekboston.com/culture/ancient-history/know-athenian-navy/
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400265461.58/warc/CC-MAIN-20200927054550-20200927084550-00479.warc.gz
en
0.989676
683
3.4375
3
Reducing Your Risk of Heart Disease When You Have Diabetes Diabetes and Heart Disease Risk Controlling blood glucose along with controlling cardiovascular disease (CVD) risk factors are important steps in treating diabetes, since diabetes can cause damage to the heart and blood vessels. Millions of Americans are affected by ]]>diabetes]]>, a serious, chronic condition associated with numerous health complications. Diabetes is easy to diagnose by testing blood sugar levels. Although there is no cure, early detection, appropriate treatment, education, and a healthy lifestyle can help you avoid or delay diabetes-related complications. Cardiovascular Disease (CVD) ]]>CVD]]> is one of the leading causes of death in the United States and the primary reason for ]]>heart attacks]]>. It is also a common complication associated with diabetes. According to the American Diabetes Association (ADA), people with diabetes are 2-4 times more likely to have CVD than the general population. Diabetes significantly increases the risk of heart attack compared to the general population. Controlling Risk Factors: Getting Appropriate Treatment Coronary artery disease occurs when there is a gradual build-up of plaques in blood vessels that supply blood to your heart. Over time the plaques narrow or block the arteries, limiting blood supply to the heart. Controlling risk factors that lead to CVD, can decrease your risk of having a heart attack. High blood glucose levels can damage your heart and blood vessels and lead to CVD. Therefore, it is important to regularly monitor and control your blood glucose levels. Cholesterol is a substance that is an important component of cell membranes as well as a building block necessary in the production of many hormones. However, abnormally high levels of cholesterol contribute to formation of fatty deposits (plaques) within the walls of blood vessels, which in turn lead to development of coronary artery disease. Cholesterol is transported through the bloodstream by high-density lipoproteins (HDL), low-density lipoproteins (LDL), and very low-density lipoproteins (VLDL). LDL is frequently called “bad cholesterol” as it promotes accumulation of cholesterol in the walls of your arteries. Diabetes may make the LDL particles more likely to stick to and damage artery walls. HDL cholesterol is sometimes referred to as "good" cholesterol. It helps clear excess cholesterol from your body. Its level is raised mostly by regular exercise. A report by the American College of Physicians recommends that anyone with diabetes, who also has known CVD or risk factors for CVD, take medication, specifically statins, to control cholesterol, even if cholesterol levels are currently normal. Narrow blood vessels are one reason for high blood pressure (eg, ]]>hypertension]]>). Because ]]>high blood pressure]]> can make some of the complications of diabetes worse, the American Diabetes Association recommends aggressive treatment of hypertension for people with diabetes. The primary groups of medications recommended to treat high blood pressure in diabetics are angiotensin converting enzyme inhibitors (ACE-inhibitors) or angiotensin receptor blockers (ARBs) which may provide additional protection for the cardiovascular system and the kidneys beyond simply reducing the blood pressure. Controlling Risk Factors: Lifestyle Modifications In addition to using medication to control cholesterol, blood pressure, and blood glucose levels, modifying certain lifestyle factors is essential for reducing the complications associated with diabetes and improving your length and quality of life. Work with your doctor to devise an eating plan that you can follow. Include foods that are low in saturated fat and cholesterol, and high in fiber; consume salt and alcohol in moderation; choose fats that help lower cholesterol; and eat five servings of ]]>fruits and vegetables]]> every day. A ]]>healthy diet]]> can help manage your CVD risk by lowering your blood pressure, cholesterol, and blood glucose levels. Being physically active every day for 30 minutes or more will have broad health benefits. Find ways to incorporate extra movement into your day—walk briskly for 30 minutes, take the stairs instead of the elevator, or park a little farther away from your destination than usual. Start slowly and build up your strength and endurance. Being physically active can be very enjoyable, and it’s good for your health! Eating a healthy diet, reducing your calorie intake, and increasing your physical activity will all help you lose weight if needed. Weight loss and increased activity can also increase your healthy HDLs. If you are thinking about ]]>quitting]]>, there are many smoking cessation programs and support groups which can help you. The benefits of quitting are both immediate and long-lasting. Educate yourself about diabetes and how you can control it. There are many sources of information and organizations dedicated to managing and preventing this disease. Work closely with your healthcare team to monitor your health and help you address your individual health issues. American Diabetes Association American Heart Association National Diabetes Education Program Canadian Cardiovascular Society Canadian Diabetes Association Complications of diabetes in the United States. American Diabetes Association website. Available at: http://www.diabetes.org/diabetes-statistics/complications.jsp. Accessed June 12, 2009. Gilbert S. Looking beyond sugar to the heart. New York Times. June 6, 2004. Special Section: Women’s Health. Howard BV, Cowan LD, Go O, et al. Adverse effects of diabetes on multiple cardiovascular disease risk factors in women: the Strong Heart Study. Diabetes Care . 2004; 21(8). Hu FB, Stampfer MJ, Solomon CG, et al. The impact of diabetes mellitus on mortality from all causes and coronary heart disease in women. Archives of Internal Medicine. 2001;161(14):1717-1723. National Diabetes Information Clearinghouse. Prevent diabetes problems: Keep your heart and blood vessels healthy. National Institutes of Diabetes and Digestive and Kidney Diseases. Updated September 2003. National diabetes statistics, 2007. National Diabetes Information Clearinghouse website. Available at: http://diabetes.niddk.nih.gov/DM/PUBS/statistics/. Published June 2008. Accessed June 12, 2009. Tanasescu M, Cho E, Manson JE, et al. Dietary fat and cholesterol and the risk of cardiovascular disease among women with type 2 diabetes. American Journal of Clinical Nutrition. 2004;79(6). Sandeep V, Haywood RA. Pharmacologic lipid-lowering therapy in type 2 diabetes mellitus. Annals of Internal Medicine. 2004;(8)140. Webster’s New World Medical Dictionary. Foster City, CA: IDG Books Worldwide; 2000. 6/5/2009 DynaMed's Systematic Literature Surveillance http://www.ebscohost.com/dynamed/what.php : Bulugahapitiya U, Siyambalapitiya S, Sithole J, Idris I. Is diabetes a coronary risk equivalent? Systematic review and meta-analysis. Diabet Med. 2009;26:142-148. Last reviewed May 2010 by ]]>Brian Randall, MD]]> Please be aware that this information is provided to supplement the care provided by your physician. It is neither intended nor implied to be a substitute for professional medical advice. CALL YOUR HEALTHCARE PROVIDER IMMEDIATELY IF YOU THINK YOU MAY HAVE A MEDICAL EMERGENCY. Always seek the advice of your physician or other qualified health provider prior to starting any new treatment or with any questions you may have regarding a medical condition. Copyright © 2007 EBSCO Publishing All rights reserved.
<urn:uuid:c3e40dc0-e21c-460e-8980-6a9f6dccd2a3>
CC-MAIN-2018-47
https://www.empowher.com/media/reference/reducing-your-risk-heart-disease-when-you-have-diabetes
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039744368.74/warc/CC-MAIN-20181118114534-20181118140534-00286.warc.gz
en
0.886172
1,590
3.3125
3
Bessie Coleman (1892-1926) was the first African-American woman to become a licensed airplane pilot. She persevered through discrimination and danger in order to fly in the early days of aviation. Like many aviators of the early 20th century, she made her living as a barnstormer, similar to today’s stunt pilots. People lined up to see “Queen Bess” or “Brave Bessie” in action. Bessie was born in rural North Texas as the tenth child of thirteen on January 26, 1892. She grew up in Waxahachie, south of Dallas. Her father was a tenant farmer, but the entire family worked in the fields when it was time to harvest cotton. Schools were segregated, and the African American school closed during harvest time. School was one of Bessie’s favorite places. Even after her father and older brothers left, leaving Bessie’s mother to support the family as a cook and housekeeper and Bessie to care for her three younger sisters, Bessie found a way to walk to the one-room school house four miles away. When she couldn’t go to school, she borrowed books from the traveling wagon library. When Bessie became a teenager, she added work as a laundress to her busy schedule. But the money she earned paid for a semester at Langston University in Oklahoma. Bessie had to drop out after that. The cost of college was too great. But she knew that there was more to life than segregated Texas. Bessie moved to Chicago, working as manicurist. Two of her brothers lived in the city. Both had fought in World War I and told stories of airplanes and the French women who could be pilots. Bessie saw no reason why she couldn’t learn to fly, so she began knocking on doors of flight schools to find out how much it would cost her. But every flight school turned her down. Some refused her because she was a woman. Others turned her down because she was African American. Many refused her for both reasons. Robert Abbott, founder and editor of the weekly African American newspaper The Chicago Defender, told Bessie that France was more open about race and gender. She saved every penny from working as a manicurist and operating a chili parlor. In her free time, she learned the French language. In late 1920, Bessie sailed to France to study at the Caudron Brothers’ School of Aviation in Le Crotoy, France. She was the only female and person of color in her class. Bessie walked to the airfield, nine miles away, to make her meager funds last. She finished the 10-month course in seven months. On June 15, 1921, Bessie took the test for her pilot’s license and passed. She received her license from the Fédération Aéronautique Internationale. When Bessie arrived in New York, she was greeted by large groups of people. Only a handful of women were pilots in the U.S., and nine were African American. She was already a hero. In the challenges she faced to become a licensed pilot, Bessie recognized another dream. She wanted to open an aviation school for African Americans. In the early days of aviation, the only way to earn money was to give rides or entertain people with aerobatic flying. She returned to Europe for six months of advanced aviation training. Bessie returned to the U.S. and adopted a military-looking uniform designed to make the diminutive woman look important. She debuted on September 3, 1922 at New York’s Curtiss Air Field (7 years later, this would be the location where the Ninety-Nines International Organization of Women Pilots would be founded). Bessie performed figure eights, loop-the-loops, barrel rolls, and other barnstorming stunts guaranteed to draw gasps from the crowds. She became “Queen Bess, Daredevil Aviatrix.” Word of “Queen Bess” spread, and she drew huge crowds of black and white audiences wherever she went. At first, she concentrated on air shows in the North, but within a few years, the demand of her performances reached the South. When Bessie debuted in her home state of Texas in 1925, she refused to perform at venues with segregated gates. Flying is an expensive vocation. Bessie had plane repairs, doctor bills from a bad crash, and even had to buy a new airplane. Saving for a flight school was difficult. She began supplementing her income with lectures, parachute jumping, and wing walking. On April 30, 1926, Bessie was preparing for an airshow in Jacksonville, Florida. She went up as a passenger in her airplane. Her mechanic took the controls while Bessie scouted good locations for parachute jumps the next day. Observers reported that the plane went into a dive, then flipped. Bessie was thrown from the plane, dying instantly. The plane crashed to the ground, killing the mechanic. It was later determined that a loose wrench had become jammed into the controls. Bessie’s funeral was held in Chicago, where 10,000 said good-bye to Brave Bessie. Three years later, the Bessie Coleman Aero Club was established. The school trained many outstanding African American pilots, including Willa Brown and the Tuskegee Airmen. For many years, the Challenger Pilots’ Association of Chicago and later the Tuskegee Airman did a flyover of Lincoln Cemetery on Bessie’s birthday to honor the amazing aviator. This post was contributed by Karen Bush Gibson, author of Women Aviators: 26 Stories of Pioneer Flights, Daring Missions, and Record-Setting Journeys. Read more about Bessie Coleman and 25 other women aviators in her book:
<urn:uuid:6583bc82-dadc-4a6b-b60e-87cf619277da>
CC-MAIN-2018-51
http://amazingwomeninhistory.com/bessie-coleman-fearless-aviator-breaking-barriers/?replytocom=4834
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376826892.78/warc/CC-MAIN-20181215152912-20181215174912-00592.warc.gz
en
0.981923
1,253
3.921875
4
November 26, 1864 -- Franklin-Nashville Campaign: After having abandoned Atlanta, Gen. John B. Hood, commanding the 39,000 troops of the Army of Tennessee, knows he cannot stop Sherman’s march on the battlefield. As Sherman begins his March to the Sea through Georgia, Hood sidesteps into northern Alabama to cross the Tennessee River and invade Tennessee in an attempt to disrupt Sherman’s plans and draw him back north to defend Federal-occupied Tennessee, and his supply lines. Hood does not fully yet realize that Sherman has no intentions of turning back, and has abandoned his supply lines, to live off the land, thus punishing even more the state of Georgia as he marches through. Hood’s army remains in Palmetto, Georgia for much of September. Early in October, he makes a march toward Chattanooga, beating Yankee forces in a few insignificant engagements, and finally captures the Federal garrison at Dalton. The Rebels destroy railroads and supplies, doing their best to discomfit Sherman. Hood then turns west, into Alabama. Sherman sends troops to chase Hood, but he finally gives up and determines to abandon his supply line for the upcoming campaign to Savannah. Sherman detaches Thomas and Schofield with the 55,000 men to keep watch over Tennessee. Thomas arrives in Nashville, and begins to beef up its defenses. He assigns Schofield to move south into central Tennessee to block Hood’s moves. As Hood advances, he passes up Schofield’s force at Pulaski, hoping to cut off the smaller Yankee force from its base in Nashville. At the last moment, on Nov. 24, Gen. Schofield abandons his post in Pulaski and speeds north to block the Rebels from crossing the Duck River at Columbia. By this date, Nov. 26, Hood has marched his battered army up into central Tennessee, and approaches Columbia, finding Union troops entrenched south of the city, blocking all roads north. Forrest’s cavalry provides excellent screening, so that the Federals are clueless as to where Hood is, as skirmishing all around the Federal lines flares up. ---March to the Sea: Sherman’s troops continue sporadic fighting with Confederate troops near Sanderson, Georgia.
<urn:uuid:9b8b2cc9-7f1a-4eb0-86ab-2b667cd9ba6e>
CC-MAIN-2017-26
http://civilwarsesquicentdaily-wolfshield.blogspot.com/2015/01/november-26-1864.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320227.27/warc/CC-MAIN-20170624064634-20170624084634-00714.warc.gz
en
0.952386
463
3.109375
3
Obsessive-Compulsive Disorder, commonly called OCD, is a disorder in which an individual is compelled to repeat specific rituals over and over again. These rituals are aimed at reducing anxiety and stress. There are some who have problems with OCD that they cannot complete certain tasks or jobs due to their disorder. This can affect them emotionally as well as financially. In Malaysia, it has been found that about 0.7% of the population suffers from this condition, contributing to the creation of a society that is not only friendly but also understanding towards people with mental disorders like OCD. This article will discuss the causes, symptoms, and treatments for OCD in Malaysia. How common is it in women and men? Research shows that women are much more likely to be diagnosed with common illnesses such as depression and anxiety. But men experience these illnesses too! The difference is, women are more willing to admit it and seek help. Men, on the other hand, suffer in silence and often don’t know where or how to get help. What are the symptoms of OCD? Obsessive-Compulsive Disorder, or OCD, is a mental disorder that causes severe distress and anxiety in those who suffer from it. This disorder is characterized by obsessions and compulsions. Obsessions are thoughts or recurrent images that are intrusive and cause anxiety. These thoughts often center around cleanliness or germs. Compulsions are activities done over and over to prevent bad things from happening. They can be physical actions like hand washing or mental actions like counting to calm down. Are there any treatments for OCD? Yes! There are a number of treatments for Obsessive-Compulsive Disorder (OCD). They include : - Cognitive behavioral therapy - Exposure and response prevention, - Medications and support groups. How to find mental health services in KL Mental health issues have become a growing concern in Malaysia. The stigma around mental health has resulted in many people not seeking the help that they need. Finding the right mental health professional for you can be difficult. Your best bet is to consult your doctor about your symptoms and let them do a referral for you. Mental Health Services in KL Counseling in Kuala Lumpur is a sensitive topic. Many Malaysians still struggle to talk about it, and those with mental health issues are even more reluctant to open up. However, if you’re feeling like your life isn’t quite going the way you want it to, or you need some advice on how to deal with certain problems, counseling can be a great way to start moving in the right direction again! Mental illness can be a difficult topic to discuss, but it’s important that we talk about it. Your mental health affects your physical health, and vice versa. The first step to healing is taking care of yourself and seeking out professional help when needed. If you’re struggling with depression or another form of mental illness, there are many resources available to you! If you want to learn about Mental Health Services in KL here then you must read this content. Mindwell Sdn Bhd, founded by Dr. Cassandra Aasmundsen-Fry, Psy.D., can provide relief from OCD through individual therapy. It is concluded therefore that OCD is a prevalent mental disorder in Malaysia and the main risk factor identified was psycho-social stressors. The study recommended awareness programs to be implemented at the community level, in order to reduce the stigma attached to this disorder.
<urn:uuid:401d9b0e-7d76-497c-ab56-1b1fc20cd0b8>
CC-MAIN-2023-40
https://newshunt360.com/ocd-in-malaysia/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510214.81/warc/CC-MAIN-20230926143354-20230926173354-00774.warc.gz
en
0.961345
715
2.890625
3
Definitions for ogiveˈoʊ dʒaɪv, oʊˈdʒaɪv This page provides all possible meanings and translations of the word ogive nose cone, ogive(noun) front consisting of the conical head of a missile or rocket that protects the payload from heat during its passage through the atmosphere The curve of a cumulative distribution function. A Gothic pointed arch, or a rib of a Gothic vault. The pointed, curved nose of a bullet, missile, or rocket. A three-dimensional wave-bulge, characteristic of glaciers that have experienced extreme underlying topographic change. Origin: From augive/ogive. Several origins have been speculated for the Middle French, including Spanish aljibe, Arabic ال جب, and Latin obviata. An ogive is the roundly tapered end of a two-dimensional or three-dimensional object. Translations for ogive From our Multilingual Translation Dictionary Get even more translations for ogive » Find a translation for the ogive definition in other languages: Select another language:
<urn:uuid:4530d1e8-0517-41a5-8450-72f7e09ecfc9>
CC-MAIN-2015-32
http://www.definitions.net/definition/ogive
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042991076.30/warc/CC-MAIN-20150728002311-00088-ip-10-236-191-2.ec2.internal.warc.gz
en
0.798581
238
3.03125
3
- Training Programs - our sites - our work - ways to give - contact us Good health is the first building block of community development. Without proper care, communities are caught in a brutal poverty cycle that is nearly impossible to overcome. Diseases that kill millions of people each year, such as malaria, tuberculosis, and diarrhea, can be prevented and treated with basic medical care. Over 40 million people live with HIV/AIDS—95 percent of which live in developing countries that offer little testing, support, or educational outreach. Similarly, the effects of war and poverty produce a range of mental health problems that debilitate communities to a much greater extent than commonly recognized. Because these problems are not easily visible, they receive almost no government attention. Without stable health, marginalized communities are unable to plan, implement, and/or maintain sustainable growth. FSD partners with over 60 community-based organizations that provide a wide spectrum of local health services that are crucial to community growth. These include: direct medical care and training at hospitals and clinics, and in the field; HIV/AIDS testing, counseling, and preventative outreach; psychological and social services for women and children; educational outreach that addresses reproductive care, nutrition, disease prevention, sanitation, etc.; and many other services tailored toward local community needs. Critical to our health initiatives is cultivating the capacity and empowerment necessary for communities to maintain their own physical and mental health. FSD interns, volunteers, and donors create a powerful source of support for our partner organizations and the people they serve, while helping to stabilize the most critical ingredient to community growth. Read about our Community Partners to learn more about Child and Maternal Health programs and opportunities in the field with FSD. For a description of the Child and Maternal Health opportunities available in each country, click on the links below:
<urn:uuid:398bef0e-84bc-4440-9306-ddaea2fe67a7>
CC-MAIN-2016-26
http://www.fsdinternational.org/devsubject/health
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397873.63/warc/CC-MAIN-20160624154957-00070-ip-10-164-35-72.ec2.internal.warc.gz
en
0.937716
375
2.734375
3
By Adam Thorp Jose Garcia has been fishing in Bubbly Creek for a decade. On a recent fall Sunday, the welder from Chicago Lawn pulled a fair-sized carp off one of the five fishing lines he’d set up on its banks. On a good summer day, Garcia said, he could catch 10 to 15 carp from the waterway in Bridgeport and McKinley Park. “It’s not the cleanest place in the world, but what are you going to do?” he added. That’s a question the Army Corps of Engineers has been trying to answer. Now, help finally may be on the way for the creek, whose foul history was memorialized in “The Jungle,” Upton Sinclair’s expose on the Chicago meatpacking industry. “It is constantly in motion, as if huge fish were feeding in it, or great leviathans disporting themselves in its depths,” Sinclair wrote of Bubbly Creek in his 1904 novel. “The creek looks like a bed of lava; chickens walk about on it, feeding, and many times an unwary stranger has started to stroll across, and vanished temporarily.” The plan recommended in the draft study by the Corps would lay down a new, healthy creekbed above the rotting sediment. New plantings on the bottom of Bubbly Creek and along the riverbank would restore the base of the ecosystem and begin to improve water quality. Those plants, and woody debris spread in the creek, would provide habitats for returning animals. There are other legal avenues to a cleaner Bubbly Creek according to Mark Templeton, a University of Chicago law professor. Templeton’s Abrams Environmental Law Clinic advocates for better water quality in Bubbly Creek and the rest of the Chicago River. The Illinois Environmental Protection Agency is considering renewing a permit that allows Chicago to continue unloading its sanitary sewers into the Chicago River. The new permit could demand stricter rules, Templeton said. Continue reading at Chicago Sun-Times…
<urn:uuid:ecc7b085-2642-439f-8013-7dce5cf124f7>
CC-MAIN-2023-40
https://epic.uchicago.edu/news/bubbly-creeks-fortunes-might-finally-be-on-the-rise/?_aof=538%2C541%2C183
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506669.30/warc/CC-MAIN-20230924191454-20230924221454-00760.warc.gz
en
0.949511
426
2.59375
3
Persons using assistive technology might not be able to fully access information in this file. For assistance, please send e-mail to: email@example.com. Type 508 Accommodation and the title of the report in the subject line of e-mail. Disparities in Secondhand Smoke Exposure --- United States, 1988--1994 and 1999--2004 No level of exposure to secondhand smoke (SHS) is safe (1). Breathing SHS can cause heart disease and lung cancer in nonsmoking adults and increases the risk for sudden infant death syndrome, acute respiratory infections, middle-ear disease, and exacerbation of asthma in children (1--3). In the United States, exposure to SHS declined approximately 70% from the late 1980s through 2002, most likely reflecting widespread implementation of laws and policies prohibiting smoking in indoor workplaces and public places during this period (1,4). Although the major sources of SHS exposure for nonsmoking adults are the home and workplace, the primary source of SHS exposure for children is the home (1); therefore, eliminating smoking in workplaces and public places is less likely to reduce children's exposure to SHS. This report examines changes in the prevalence of self-reported SHS exposure at home and changes in any exposure, as measured by serum cotinine (a biologic indicator of SHS exposure), in nonsmoking children, adolescents, and adults. The analysis was conducted using data from the 1988--1994 and 1999--2004 National Health and Nutrition Examination Surveys (NHANES). The results indicated that self-reported SHS exposure at home and SHS exposure as measured by serum cotinine declined significantly (i.e., by 51.2% and 44.7%, respectively) in the U.S. population from 1988--1994 to 1999--2004; however, the decline was smaller for persons aged 4--11 years and 12--19 years. These results underscore the need to continue surveillance of SHS exposure and to focus on strategies to reduce children's SHS exposure. NHANES consists of a series of cross-sectional surveys designed to monitor the health and nutritional status of the U.S. civilian, noninstitutionalized population. Participants were selected through a complex, multistage probability design and completed a household interview and standardized physical examination in specially equipped mobile examination centers. Subgroups of the population, including blacks and Mexican Americans, were oversampled to provide reliable estimates for these groups. For persons aged >4 years in 1988--1994 and aged >3 years in 1999--2004, blood was collected by venipuncture and serum cotinine levels were measured in blood samples using a high performance liquid chromatography mass spectrometry method at CDC. Serum cotinine levels indicate exposure to nicotine during the past 3--4 days (4). The study sample was limited to nonsmokers aged >4 years. Nonsmokers were defined as respondents with serum cotinine <10 ng/mL. Respondents aged >12 years were excluded if, at the examination, they reported tobacco or nicotine use during the past 5 days. Serum cotinine measures were available for 83.7% (N = 22,377) of examined persons aged >4 years in 1988--1994 and for 89.9% (N = 22,994) in 1999--2004. The final sample size for nonsmokers was 17,261 in 1988--1994 and 17,931 in 1999--2004. Exposure to SHS in nonsmokers was defined as a detectable serum cotinine level of >0.05 ng/mL (i.e., the laboratory limit of detection during 1988--1994 and 1999--2000). Serum cotinine was not used as a continuous variable because approximately 50% of results were below the laboratory limit of detection in the study population during 1999--2000. Exposure to SHS inside the home was defined as the presence of at least one household member who smoked cigarettes inside the home.* The percentage of persons with self-reported home SHS exposure, the percentage with detectable serum cotinine, stratified by age group (4--11 years, 12--19 years, and >20 years), race/ethnicity (non-Hispanic white, non-Hispanic black, and Mexican American), and other demographic characteristics were calculated. Data analyses accounted for the complex survey design, differential probabilities of sample selection, nonresponse, and sample noncoverage. Differences between population subgroups and between periods were evaluated using a univariate t-statistic. All significance tests were two-sided using p<0.05 as the level of statistical significance. The percentage of the U.S. nonsmoking population aged >4 years with self-reported home SHS exposure declined from 20.9% in 1988--1994 to 10.2% in 1999--2004 (Table). Similarly, the percentage of the nonsmoking population with detectable serum cotinine declined significantly, from 83.9% in 1988--1994 to 46.4% in 1999--2004. The decline was statistically significant within all subgroups of the study population for both measures of exposure. The percentage of nonsmokers with detectable serum cotinine was uniformly high for all age groups during 1988--1994. The percentage decreased for all age groups during 1999--2004, and remained highest for those aged 4--11 years (60.5%) and those aged 12--19 years (55.4%) compared with those aged >20 years (42.2%). The decline in the prevalence of detectable serum cotinine was 28.1% for those aged 4--11 years, 35.1% for those aged 12--19 years, and 49.5% for those aged >20 years. During 1988--1994, non-Hispanic blacks were more likely than non-Hispanic whites and Mexican Americans to have detectable serum cotinine (93.7%, 83.2%, and 77.7%, respectively). However, by 1999--2004, the gap had increased between non-Hispanic blacks with detectable serum cotinine (70.5%) and non-Hispanic whites (43.0%) and Mexican Americans (40.0%). The percentage of nonsmokers with detectable serum cotinine was inversely associated with family income in both periods, and the decline over time was smaller for the lowest income group compared with the higher income groups. Although the percentage decrease in home SHS exposure from 1988--1994 to 1999--2004 was seen for persons of all ages, it was smaller in children, especially those aged 4--11 years, compared with those aged >20 years. For SHS exposure in the home, the declines were 37.7%, 44.9%, and 59.8% among those aged 4--11 years, 12--19 years, and >20 years, respectively. During both periods, prevalence of SHS exposure in the home was highest among non-Hispanic blacks and for persons with lower incomes. For both periods, self-reported home SHS exposure was not significantly different in males than in females, but a higher percentage of males had detectable serum cotinine than did females. Reported by: SE Schober PhD, C Zhang, DJ Brody, MPH, Div for National Health and Nutrition Examination Survey, National Center for Health Statistics; C Marano, DrPH, EIS Officer, CDC. This report assesses changes in exposure to SHS among nonsmokers from self-reported information about cigarette smoke exposure in the home and by serum cotinine levels. Based on both measures, SHS exposure decreased markedly from 1988--1994 to 1999--2004 for the total U.S. population and major population subgroups. However, despite the decreases in SHS exposure, 46.4% of U.S. nonsmokers still had detectable levels of serum cotinine during 1999--2004, indicating that SHS exposure remains an important public health problem. Documented reductions in SHS exposure since the late 1980s have been attributed to widespread implementation of laws and policies restricting or eliminating exposure in workplaces and public places during this period (4,5). Additionally, the prevalence of cigarette smoking has decreased during this period, from 28% in 1988 to 21% in 2004 (6), which likely reduced SHS exposure, particularly in the home. A recent study reported that the proportion of households that have rules against smoking in the home has increased since the early 1990s, from 43% in 1992--1993 to 72% in 2003 (7). That parallels the decline in the prevalence of SHS exposure in the home reported in this study. However, a higher prevalence of SHS exposure was still evident in the groups aged 4--11 years and 12--19 years compared with the group aged >20 years during 1999--2004, a pattern that has been noted previously (4). Additionally, the disparity in exposure between those aged 4--11 years and 12--19 years compared with those aged >20 years has widened since the early 1990s. The major source of SHS exposure for those aged 4--11 years is from parental smoking in the home (8). This analysis determined that the decrease in home SHS exposure from 1988--1994 to 1999--2004 was similar for non-Hispanic blacks and non-Hispanic whites. For SHS exposure as measured by serum cotinine, however, the relative decline was nearly twice as large for non-Hispanic whites compared with non-Hispanic blacks. Previous studies have noted that non-Hispanic blacks have higher serum cotinine levels than non-Hispanic whites, both for smokers and nonsmokers, and that differences in nicotine metabolism might partially explain this disparity (4). At least one study that assessed multiple sources of SHS exposure reported that among nonsmokers, non-Hispanic blacks had higher levels of SHS exposure than other groups, which explained the higher serum cotinine levels in non-Hispanic blacks (9). Information about other sources of exposure to SHS is needed to interpret the disparity between non-Hispanic whites and non-Hispanic blacks in the percentage with detectable serum cotinine in the NHANES surveys. The findings in this report are subject to at least three limitations. First, the assessment of self-reported home SHS exposure is based only on information about household members who smoke inside the home. Information about smoking inside the home by visitors was not collected. Second, information is not available about potential SHS exposure in locations outside of the home, including automobiles, workplaces, public places, and other homes. Information about smoker behaviors to protect nonsmokers from SHS exposure in the home also was not obtained. Finally, measurement of serum cotinine levels in nonsmokers only provides a measure of overall SHS exposure, regardless of the sources of exposure. The U.S. Surgeon General has concluded that protecting nonsmokers from SHS exposure can only be accomplished by completely eliminating smoking in indoor places (1). SHS exposure among nonsmokers has declined markedly during the past 2 decades, largely through implementation of laws and policies that prohibit smoking in workplaces and public places (4,6). Despite this success in reducing SHS exposure, the results of this study underscore the need for ongoing prevention efforts to reduce SHS exposure with strategies that focus on protection for those at greatest risk (10). * As determined by responses to questions in NHANES 1988--1994 ("Does anyone who lives here smoke cigarettes in the home?") and NHANES 1999--2004 ("Does anyone who lives here smoke cigarettes, cigars, or pipes anywhere inside this home?" and for each household member who smokes: "How many cigarettes per day do you/does [PERSON] usually smoke anywhere inside the home?"). All MMWR HTML versions of articles are electronic conversions from typeset documents. This conversion might result in character translation or format errors in the HTML version. Users are referred to the electronic PDF version (http://www.cdc.gov/mmwr) and/or the original MMWR paper copy for printable versions of official text, figures, and tables. An original paper copy of this issue can be obtained from the Superintendent of Documents, U.S. Government Printing Office (GPO), Washington, DC 20402-9371; telephone: (202) 512-1800. Contact GPO for current prices.**Questions or messages regarding errors in formatting should be addressed to firstname.lastname@example.org. Date last reviewed: 7/9/2008
<urn:uuid:c6b6f369-9825-48a9-a67c-65c564ac62da>
CC-MAIN-2017-09
https://www.cdc.gov/mmwr/preview/mmwrhtml/mm5727a3.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174135.70/warc/CC-MAIN-20170219104614-00414-ip-10-171-10-108.ec2.internal.warc.gz
en
0.949909
2,564
2.625
3
Tuesday, 15th May, 2,012. My Astronomy Course,Lesson 3. I am very sorry. I missed out a vital step! Regarding my distance finder(Read ZZ37 again, please, and make this extra step!)(astronomical objects), you DIVIDE THE VELOCITIES BY FIVE,FIRST! So as to get apparent magnitudes and radial velocities ON A PAR!! My platform was The Hubble Diagram. Where we compared magnitudes with velocities. This is where one of the 2-1’s showed up. Though Orthodoxy will deny it. It is as though we had apples and oranges. Two quite different entities. So we have to have two fruit that are digitally the same! Now it should all work out! So, the formula is: Apparent magnitudes(v) x radial velocities(rv)DIVIDED BY FIVE. Note ONLY the radial velocities get divided by five! DIGITALLY. Then you take THE SQUARE ROOT OF THE PRODUCT!! In other words get the MEAN, The Geometrical Mean of Mags times Vels. The VERY first step is to multiply the velocities(rv) by 1.25. To equalize vels and mags. Because mags go up in multiply increments of 2.5, while vels go up in multiply increments of 2. So by multiplying vels by 1.25, we bring them level on multiply increments of 2.5. So altogether, we take the vels and multiply them by 1.25. Next we multiply the rv vels and v mags together, and get their square root. In other words we take The Geometric Mean of the two basic distance obtainers, rv velocities(divided by five) and v magnitudes. Remove O.M. The Obscuring Matter(Extinction Effect) by basing to R, The Reddening, using COLOUR magnitudes.(It is VERY important NOT to use the orthodox magnitudes! Because they are wrong.) Removing the obscuring matter OM RAISES the value of the result. First reduce everything to the same units!(E.g. The O.M. equalized to a magnitude – for subtraction.) Mass Effect also needs to come off. M.E. is Geometric Mean less Arithmetic Mean. Take a batch of about 40 candidates. When you have all the distance figures for each candidate, plot maps in R.A. Right Ascension and Decl. Declination. The ideal thing then(if possible) is to fit R.A. to Declination to get a 3d picture. If you do EXACTLY as I have stated, the results should be STUNNING!!(Because the right figures in a patterned cosmos should picture out A DEFINITE PATTERN!!) Don’t forget to divide those velocities by FIVE!!(Fortunately I remembered in time!)(To give you the CORRECT formula now!)
<urn:uuid:581f63f0-0749-4a56-bbe5-00953cdd65be>
CC-MAIN-2017-13
https://vicsesoterica.wordpress.com/2012/05/15/zz39-continuing-on-my-astronomy-distance-finder/
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218188824.36/warc/CC-MAIN-20170322212948-00244-ip-10-233-31-227.ec2.internal.warc.gz
en
0.887591
648
3.796875
4
A list of facts (for example historical events) in the order that they occurred. Here is an example: Charles Darwin was born in England 1809. He was a naturalist who studied plants and animals by observing them. In 1831 he began a 5 year journey on a ship called The Beagle and visited many countries. He visited Australia in 1839. In 1859 he published a book called On the Origin of Species. He died on 19 April 1882. Return to HOW TO BLOG
<urn:uuid:ead4ee3e-4187-4add-8b2e-a2a6d6717dcc>
CC-MAIN-2016-36
http://voren-kidsblog.blogspot.com/2010/01/factual-recount.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982954771.66/warc/CC-MAIN-20160823200914-00291-ip-10-153-172-175.ec2.internal.warc.gz
en
0.983454
107
2.953125
3
“We’re all Jews, did you know that?” As a kid, that was just something my grandmother told me every so often. I didn’t think much of it. But as I’ve grown in my faith life, I really have come to love that sentiment. The whole history of the Jews in the Old Testament is the history of our Faith as well. Catholics are most keenly aware of this on Holy Thursday. Our celebration of the Mass of the Lord’s Supper is a clear fulfillment of the Passover promise. But the feast of Hanukkah, which began last night, is similarly a prefigurement of Christ and his plan of Salvation. The story of Hanukkah that Christians read is in 1 Maccabees 4:36-59. The Jews had been almost exterminated an oppressive conqueror. They were forced to participate in pagan rituals. Some 40,000 of them had been killed in Jerusalem alone. As a final blasphemy, a pig was slaughtered on the altar of the Temple, defiling it. Finally, after this outrage, a small band of revolutionaries, led by the Maccabees, were able to overthrow the Greek conquerors and regain control of Israel. The feast of Hanukkah commemorates the rededication of the rebuilt and purified Temple after these miraculous military victories. Jesus Himself celebrated Hanukkah during His life here on earth. In John 10:22-24, He was in Jerusalem celebrating the “Feast of Dedication”; Hanukkah is actually a derivation of the Hebrew word meaning “to dedicate.” The moniker “Festival of Lights” came much later, along with the story of the miracle of the oil. In the Old Testament, there is no mention of oil in the history of Hanukkah. The miracle of the oil is only found in the Talmud and is widely believed to be a legend. I love Hanukkah because it is a reminder of the faithfulness of God. While the miracle of the oil may be just a legend, the miracle of the restoration of the people of God is a historically provable fact. A century and a half later, the restored Chosen People were able to bring forth the Blessed Virgin, who in turn was able to birth Christ on Christmas. There couldn’t have been a Christmas if there hadn’t been that first Hanukkah. That seems to be a pattern of God. Things get truly awful, then He steps in and uses the awful circumstances to do something amazing. The ultimate way He does this is by using the Fall to necessitate the Incarnation and birth of Christ, which we will celebrate in a few weeks, but it has happened in our Faith history over and over again. When we look at our world around and see the darkness, Hanukkah is a smaller reminder of how God never ceases to bring us the Light. Continuing through the season of darkness and anticipation of Advent, waiting for the Birth of Christ, the Festival of Light helps us remember what we are waiting for– the faithful fulfillment of God’s covenant with His Chosen People. I won’t necessarily go buy a menorah, make latkes, or sing Ma’oz Tzur today, but every year when the feast comes around, I will always think of my grandmother’s reminder and thank God for His eternal faithfulness and mercy. Copyright 2017 Hilary Thompson
<urn:uuid:e9378b87-59e8-4e1c-b91d-1921d40ff789>
CC-MAIN-2019-35
http://catholicmom.com/2017/12/13/happy-hanukkah-catholic/
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027314732.59/warc/CC-MAIN-20190819114330-20190819140330-00252.warc.gz
en
0.964246
729
2.65625
3
Finding Earth’s habitable twins, looking further into the universe than ever before and mapping nurseries of new stars: astronomers have sky-high ambitions to increase our knowledge of the universe (and our place in it). This is evident from the latest plans of ESA, NASA and the European Southern Observatory (ESO) for the coming decades. To build the telescopes needed for this groundbreaking science, scientists are constantly working on increasingly advanced technologies. This week, the latest developments in astronomical (space) instrumentation will be presented at the “SPIE astronomical telescopes and instrumentation” conference in Montréal. This event takes place once every two years and is the most important conference on (optical) astronomical instruments and telescopes in the world. The conference consists of a symposium with technical and scientific presentations, and a trade fair where research institutes and industry present themselves and make new connections. World summit in terms of optical technology. The Netherlands is well represented at the conference. According to Thomas Wijnen, NOVA’s instrumentation coordinator and organiser of the Dutch pavilion at the fair, this makes sense. “The Netherlands definitely belongs to the world’s top in astronomical technology and research, regularly contributing to ESA and NASA missions with innovative technology developments, but also to ESO’s telescopes.” One example is the MIRI instrument on the James Webb Space Telescope (JWST). During the symposium, the telescope is the focus of much attention: after a successful launch late last year, the first recordings were released last week. One of the four instruments on board the JWST was substantially developed in of Dutch: the optical heart of MIRI that measures mid-infrared radiation was built by NOVA, in collaboration with SRON, ASTRON and TNO, among others. According to Wijnen, the Netherlands continues to innovate: “For example, technologies are currently being developed at Leiden University that enable direct observations of exoplanets. The aim is for these techniques to be used in telescopes on Earth as well as in space telescopes in the future.” New collaborations emerge at NL Space pavilion. At the fair, the NLSpace pavilion, where Dutch institutes and companies present visibility as a strong space community, with eye-catching orange banners, is not to be missed. This is where new connections are made between global industry and research institutes. The NL Space pavilion is co-funded by NSO, SpaceNed and the ILO network. This year, Cosine, Dutch United Instruments, NOVA, SRON, TNO and VDL ETG are participating in the pavilion. Through the contacts made and the ideas and collaborations created this week, astronomers can continue to increase our knowledge of the universe in the future.
<urn:uuid:87b62de4-7778-4d85-ac5b-814cf9c20c3e>
CC-MAIN-2023-40
https://www.spacened.nl/nederland-toont-kracht-in-ruimteonderzoek-op-spie-congres-montreal/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510358.68/warc/CC-MAIN-20230928031105-20230928061105-00343.warc.gz
en
0.937525
581
2.765625
3
How Does Culture Influence Consumer Behaviour – Marketers have always been concerned with the aspect of consumer behavior. This is because an in-depth understanding of the function has many advantages for business experts. Extensive concept knowledge allows marketers to determine how customers feel about a particular product. It provides information about how they value and select goods and services from different manufacturers and suppliers (Mooij, 2010). In addition, marketers can see how end users are influenced by other people around them. Significant others in this case include family members, friends, and vendors. In addition, environmental influences on the behavior of these consumers are evident (Solomon, 2006). We will write a custom essay on the effects of culture on consumer behavior especially for you for only 9.35 / page 808 certified writers online. How Does Culture Influence Consumer Behaviour The term “consumer” has different definitions. For example, in the field of marketing, the phrase refers to buying and purchasing actions and patterns. For this purpose, it is used to refer to consumer decisions before and after purchase. For her part, Solomon (2006) defines the consumer as a field of study. For this purpose, it is considered the practices associated with the acquisition, use and disposal of goods, services and ideas (Solomon, 2006). Understanding Consumer Behavior To Convert More Customers From their side, consumer behavior is defined as the actions of individuals. Activities are related to the process of receiving, using and discarding monetary goods and services. Extensive research shows that a wide variety of factors influence customer behavior. They include social, cultural, psychological and personal factors. Some of these items are beyond the seller’s control. However, business experts still need to take them into account to better understand consumers. In this paper, the author examines the way culture influences consumer behavior. To achieve this, the author will explore the topic using the information in the article published by Kwon Jung and Ah Keng Kau. The article by Jung and Kau (2004) is entitled “The Influence of Culture on Consumer Behavior: Ethnic Group Differences in a Multiracial Asian Country”. In order to bring the reader to the topic in depth, the author uses supplementary information from a number of consumer and marketing magazines. Literature is used to support the findings and conclusions of Jung and Kau (2004). In addition, the author refers to Solomon’s textbooks. In their article, Jung and Kau (2004) emphasize the importance of understanding the influence of culture on consumer behavior. According to the researchers, marketers should not ignore these effects. This is because when companies go global, they sell their goods and services to people from different cultures and backgrounds. Given the apparent relationship between culture and consumer behavior, extensive research has been conducted on various ethnic groups to understand this concept. According to Hofstede and McCrae (2004), individuality is shaped by culture. Therefore, facet is a key determinant of consumer behavior. From a wide range of studies, scientists have found the presence of different patterns of behavior among different ethnic groups. People tend to have different ideas about aspects such as possible risk, brand loyalty and novelty. High-risk customers tend to be confident about what they are buying. Less risky customers can afford a certain degree of uncertainty when purchasing goods. Consumer Behavior: Definition, Factors And Methods | Culture determines the success or failure of products and services in the market. A business that produces goods that are desired by a specific group of people has a better chance of success in the market. However, marketers sometimes face the challenge of predicting how a particular product will do. According to Solomon (2014), the relationship between consumer behavior and culture is bidirectional. Although culture is a major source of influence, marketers must consider three primary aspects that are not culturally bound. They include perceived suitability, quality and packaging. Perceived fit involves determining the right distribution channels for the product. Quality determines whether consumers buy the product or not (Peter & Olson, 2008). Packaging creates a connection between customers during acquisition. The unique packaging design attracts more people from all areas around the world. Because of this, there are higher levels of success. According to Jung and Kau (2004), culture consists of shared beliefs, customs, and attitudes that are passed down from one generation to the next. All these elements are responsible for influencing the standards of evaluation, perception and society. Therefore, culture tends to have a large influence on the decision to purchase items. One must behave in a similar manner to other members. Some marketers believe that people who live close to each other in terms of geographic regions are similar and share the same preferences (Balabanis & Diamantopolous, 2008). However, this is not the case. The reason is that individuals have partly different cultural values. Additionally, individuals from certain countries have a higher tendency to purchase items compared to others. In most East Asian countries, such as Singapore, shopping is considered a leisure activity. Therefore, it is important for salespeople to become familiar with the cultural characteristics of different groups. Thanks to this, they will be able to create the required brands for products and develop goods that suit a specific market. Consumer Behavior And The Influence Of The Self On Consumer Behavior A multicultural society consists of people of different races. Despite the groups living in the country, they practice their own unique cultural values, attitudes and beliefs. Many studies have been conducted to understand how people in multiracial countries differ when shopping. However, Jung and Kau (2004) argue that most research is conducted in American and European countries. Few scholars have focused on Asian countries. That’s why the duo chose to do a subcultural study in Singapore. The nation provides a perfect setting for studying Asian consumer behavior (Peter & Olson, 2008). This is due to the fact that the country is a multiracial society composed of three large groups. These include the Chinese, Indians and Malays. During the colonial period, Singapore was under British rule (Kongsompong, 2006). At that time, three ethnic groups already lived in the country. Despite living in the same nation and communicating with each other, they had different customs, values and religious practices and beliefs. In addition, the groups had different lifestyles. To ensure that cultural ties are maintained, the Singaporean government emphasized the need for the Chinese, Indians and Malays to maintain their practices (Kongsompong, 2006). Despite the cultural variations, Singapore has managed to maintain national harmony since its independence. People of Chinese descent tend to rate their public reputation highly in the context of interpersonal and social interactions. The term “face” is considered a factor that deserves respect in society. According to Lin, Xi, and Lueptow (2013), a bad public reputation has a huge emotional impact on an individual. In addition, the Chinese tend to maintain strong relationships with each other. Correlation is characterized by connections and reciprocity. Therefore, the trait of personal loyalty is more valued than organizational attachment. Constancy is considered a virtue. In Chinese culture, people learn the importance of loyalty to family and relatives when they are at a tender age (Mokhlis & Salleh, 2009). This aspect is further pursued in a commercial context. Many ethnic group studies show that Chinese consumers maintain their loyalty to a particular supplier. The reason is that constantly switching would destroy the public reputation or face of the provider. For this reason, Chinese customers try to avoid switching suppliers. According to Lin et al. (2013), the aspect of loyalty observed in culture has a fundamental influence on customer behavior. Consumer Behavior Theories We will write a custom essay on the effects of culture on consumer behavior especially for you! Get your first paper with 15% OFF. Learn more In Chinese culture, interpersonal relationships are based on reciprocity. The concept emphasizes that kindness from others must be reciprocated. Therefore, the Chinese rather focus on maintaining the symmetry of debits and credits. When it comes to buying products, some people only buy when there are special occasions or ceremonies. Jung and Kau (2004) noted that the concept of face greatly influences consumer behavior. Among the Chinese, public reputation influences individuals to buy products with prestigious brands. Some customers leave the manufacturer’s tags on their items, such as classic suits, when purchasing. In the Chinese community, family dynamics tend to influence consumer behavior. The family is seen as a refuge from the harsh aspects of life. Therefore, it should be well protected. When purchasing products, the Chinese population is attracted to items with advertisements that have a family orientation (Solomon, 2014). Compared to the West, the case is different. Most consumers How does art influence culture, factors that influence consumer behaviour, how does culture influence education, how does culture influence society, how culture influence consumer behaviour, how does media influence culture and society, influence consumer behaviour, how do reference groups influence consumer behaviour, culture influence on consumer behaviour, how does culture influence consumer behavior, branding influence consumer purchasing behaviour, the influence of culture on consumer behaviour
<urn:uuid:be6b4462-fc5a-4351-9185-e9865ce6862c>
CC-MAIN-2023-50
https://celebwnew.com/how-does-culture-influence-consumer-behaviour/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100452.79/warc/CC-MAIN-20231202203800-20231202233800-00527.warc.gz
en
0.941421
1,844
3
3
By Nancy McVicar February is Heart Month, reminding us that heart disease remains the number one killer of both women and men in this country, accounting for nearly one in three deaths – 2,150 each day, according to the most recent statistics from the American Heart Association. But ground-breaking research at the University of Miami Miller School of Medicine has the potential to reduce those numbers dramatically. Researchers have injected hearts damaged by a heart attack as long as 30 years ago with millions of cells that can regenerate their pumping ability without surgery – a feat long thought to be impossible. “We think this is absolutely one of the most important areas of research going on today,” says Dr. Joshua Hare, director of the university’s UHealth Interdisciplinary Stem Cell Institute. Stem cells taken from adult bone marrow – either from the patient or a donor – are grown in the lab to create millions of replicas. Called mesenchymal cells, they have the capacity to repair scarred hearts by rebuilding muscle, restoring good blood flow throughout the body, Hare says. “In these patients scar tissue has damaged the heart in a permanent way leading to dysfunction in the heart and changing the shape of the heart,” he says. Such scarring weakens the heart’s pumping ability and is the most common cause of debilitating congestive heart failure. In one early study, patients undergoing coronary bypass surgery had their own cells removed and grown in the lab weeks before the procedure, then injected into their hearts during the open heart surgery. In the most recent study, however, 30 patients got the cell injections through a catheter threaded up from the groin area into the heart. Millions of the cells were injected at 10 different sites in the weakened or damaged part of the heart. Half got their own cells and half got donor cells. Results were published and reported in November at the annual American Heart Association conference in Los Angeles. “In many cases we observed clinically significant improvement, even in patients who had heart attacks several decades ago,” Hare says. “Both [donor cells and the patient’s own cells] reduced the amount of scarring substantially.” Dr. Alan Heldman, professor of medicine and a co-author of the study, who performed the cell injections, said because growing the patient’s own cells for use takes six to eight weeks, being able to use banked donor cells opens up a new door in potential therapy. Hare says the researchers have applied to the National Institutes of Health to do a larger study. And more studies using different combinations of repair cells are on the horizon. “What’s really exciting is a new trial funded by the NIH that will mix two types of cells, [cardiac stem cells and mesenchymal cells] and our belief is they will be better than one type alone,” he says. “Millions and millions of people have had heart attacks and the people with the worst problems end up with a heart transplant, but there are only 2,500 of those a year,” Hare says, “so this is just an astounding advance – if it proves out – almost as ground-breaking as the discovery of antibiotics.”
<urn:uuid:0bd6aea2-b0ac-48b7-a932-128d0d465448>
CC-MAIN-2022-49
http://www.cityandshore.com/departments/body-conscious/an-astounding-advance-in-heart-treatment/
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711042.33/warc/CC-MAIN-20221205164659-20221205194659-00127.warc.gz
en
0.956689
673
3.296875
3
Engineering super-powered proteins for disease therapy Enhanced proteins equipped with stable artificial amino acids, recently developed by Salk associate professor Lei Wang, are proving to be promising candidates for future therapeutic use, particularly in cancer. Protein-based therapy could, in theory, directly target a variety of diseases and be less toxic than other drugs. However, attempts to engineer proteins with therapeutic characteristics by genetically integrating artificial amino acids have often failed, until recently. "We can provide novel insights into mechanisms of some types of cancers and aim to eventually develop a really useful biologically based drug," says Wang, who is also the Frederick B. Rentschler Developmental Chair. "And we can certainly expand this new platform technology into multiple other areas, such as neurodegenerative diseases, immunology, stroke treatment and more." Wang first outlined the breakthrough technology last summer, when he announced the development of an artificial amino acid that was able to genetically assimilate into a protein and provide strong bonds within the protein. The challenge was to develop an amino acid not too chemically active (and thereby likely to destroy the cell), but reactive enough to provide a new ability once in the protein. The artificial amino acid Wang and his collaborators created— dubbed Ffact—meets this balance by forming an irreversible bond when near the naturally occurring Cys amino acid. This controlled bonding (called "proximity-enabled protein crosslinking," or PEPC) is like a s taple, letting researchers bind and shape proteins that can, for example, target cellular proteins thought to go astray in some cancers. Since Ffact, Wang and his lab have created about a dozen similarly effective amino acids for wielding fine control over the shape of the protein. He is aiming to build a library of about 50 for varied therapeutic tests. These PEPC-capable amino acids promise to advance protein therapies in two important ways: by providing proteins with the ability to interact with other proteins and by beefing up their stability. "What we're doing is totally different from the traditional way of thinking," says Wang. "Previously, artificial amino acids were used as a probe or handle for tracking proteins. But now we are making the protein interact with native proteins as well as making itself stronger." Now armed with the new amino acids, Wang's lab is configuring proteins to target and interact with pathways involved in cancer— most particularly, pathways that halt the cell's self-destruct sequence (apoptosis), leading to cancer's unchecked and deadly proliferation. The lab is currently focusing on types of proteins known to be involved in cancer's inhibition of apoptosis, such as p53, STAT and caspases. Wang says the results have been very interesting so far, and he looks forward to sharing them in the coming year.
<urn:uuid:5247227f-b7f8-4301-b575-4210def6b811>
CC-MAIN-2014-52
http://www.salk.edu/insidesalk/article.php?id=511
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802775517.52/warc/CC-MAIN-20141217075255-00150-ip-10-231-17-201.ec2.internal.warc.gz
en
0.966981
566
3.21875
3
Homestead is a small town eight miles outside of Pittsburgh Pennsylvania, located on the bank of the Monongahela River. In 1881, Andrew Carnegie built his principal steel mill in the town of Homestead. The Carnegie Steel Mill had employed over 4,000 out of the town's 12,000 residents (Burgoyne). Carnegie’s mill was the lifeline of this small town. Every individual in the town was affected by the mill in some way. Andrew Carnegie, a Scottish born businessman, built his fortune from nothing. At its peak, Carnegie’s enterprise was worth $14 billion and controlled two-thirds of the steel production across the nation (Brinkley 106) . Although he was wealthy, Carnegie kept a good reputation among all his employees as a respected, kind man. On the contrary, Henry Clay Frick, Carnegie’s appointed chairman, had no compassion for his workers. He was a ruthless man who despised worker’s unions and anything associated with them. Andrew Carnegie left for vacation in 1892, trusting Henry Frick with full authority of the Homestead mill and the employees there. Upon his departure, Carnegie could never have anticipated the upcoming events that would take place in Homestead. The Homestead workers were members of the Amalgamated Association of Iron and Steel Workers (AAISW). The union was made up of over 24,000 members and was one of the largest iron and steel unions in the United States. In 1892 the contract between the AAISW and the Carnegie Steel Company expired (White). At the same time the price of steel in the early 1890s was falling. Frick, worried about the price cuts, decided to use the expiring contract to cut wages and take power away from the employees. The disputes between the Union and Carnegie’s company led up to what came to be known as the Homestead Strike of 1892. As of June 29, 1892, negotiations were making no progress. The lack of improvements in the strike and the declining state of the steel market led Frick to lock out the mill’s 4,000 workers. This way Frick could bring in strike breakers to keep production moving. Frick built a twelve-foot fence around the entire perimeter. The Fence, known as “Fort Frick”, stretched for over three miles, and was guarded by Deputy Sheriffs. The workers decided to take the mill for themselves and prohibit new non-union men, which were called in from surrounding cities, from entering the property. They ordered the sheriffs out of town using their superior numbers to intimidate them.. Meanwhile, Frick hired three hundred Pinkerton Detectives to aid in the retaking of the Homestead plant. Pinkertons, as they were called, were hired guards used to break strikes. These men were notoriously violent in their dealings with strikers. At midnight of July 5, 1892, the Pinkerton army was spotted coming down the Monongahela River on barges armed with Winchester rifles. The workers then warned the entire town of the coming attackers. The town of Homestead came to help guard the mill. Every man, women, and child gathered at the mill to confront the arriving Pinkerton force. The residents of Homestead urged the Pinkertons not to get off the barges, but they did not listen. On July 6, 1892, the first gunshots were exchanged between the Pinkerton Detectives and the people of Homestead. There is no record of who fired the first shot but the result was a massive firefight. The following fourteen hours of battle were brutal. The strikers went as far as rolling fire laden freight trains onto the barges. The heavily outnumbered Pinkerton Detectives were forced to surrender. Therefore, they were forced to march through a gauntlet of townspeople and were beaten on their way out. Hugh O'Donnell, the leader of the strikers remembers the march, "I must confess that during the march from the barges to the rink the Pinkerton men were shamefully abused by the crowd, but we took care of them that night and saw that they got out of town safely" (“The Situation at Homestead”). On July 6 at 5:00 p.m. a total of nine workers and seven Pinkerton Detectives were announced dead with many others wounded. The workers thought they had won the battle and kept the mill in their control, but the worker’s celebration did not last long. Six days later the Governor of Pennsylvania ordered the National Guard to take control of the situation in Homestead. Upon arrival, the National Guard took over the Carnegie Steel mill with no resistance from the workers. Following the National Guard occupation, the union still insisted on striking. This lasted until winter when exceptionally harsh weather, lack of money, and no progress in negotiations forced the workers to end the strike. Back on the job site they were required to work longer days, receive less pay, and work in the same unacceptable conditions. The union crumbled after losing the strike. Many of the members wondered what good a union was if it could not solve a strike? Along with the union, the Pinkerton Detective Agency never recovered from the loss of face they received after being run out of town. The agency was slowly pushed into oblivion after the event. On the business side of the strike, there were many repercussions. Andrew Carnegie received most of the blame for the event. Upon his return, he was very disappointed in Henry Clay Frick’s decisions. Carnegie showed his disappointment when he stated, "I have tried my best to be your friend again. It is simple ridiculous my dear Mr. Frick. . ." (Livesay 164). Carnegie faced a difficult decision of punishing Frick. To save his reputation, Frick begged for demotion instead of being let go. Being a compassionate man, Carnegie appointed him chairman of the board, an honorary position with no real power. Coupled with the demotion, Frick’s shares in the company were reduced from eleven percent to six percent, a substantial amount of money. Along with the job, Frick almost lost his life. Following the National Guard occupation assassin Alexander Berkman came to end the strike by killing Frick. Although Frick was shot, the attempt was unsuccessful due to the faulty working of the gun used by Berkman. Frick returned to work the next week. For his attempted murder, Berkman was to sentenced 14 years in the Pennsylvania Western Penitentiary. Many of the strikers were accused of murder but none of them were convicted. The Homestead strike was the beginning in a line of strikes to come over the next century. The effect it left on unionism remained for many years. The battle for Homestead, as it is now known as, went down in the history books as one of the most violent strikes in U.S. history. Many organizations never recovered from the unpleasant reputation that they gained from this event. The Battle at Homestead will be remembered as an occasion where human greed and civil rights collided and neither one came out on top. Brinkley, Allan. The Unfinished Nation. 4th ed. Boston: McGraw Hill, 2004. Burgoyne, Arthur G. “Homestead: A Complete History of the Struggle of July, 1892.” The Strike of Homestead. Patrick J. Hall. Ohio State U. http://www.history.ohio-state.edu/projects/homesteadstrike1892/homestead1892/homesteadd1892.htm (18 Feb. 2004). Fitch, John A. “Unionism and the Union Movement.” Patrick J. Hall. Ohio State U. http://www.history.ohio-state.edu/projects/PittsburghSurvey/SteelWorkers/unions.htm (4 Feb. 2004). Goldner, Cheri. “The Homestead Strike 1892.” The Homestead Strike. 1997. American Cultures Studies “Computing for ACS” http://www.bgsu.edu/departments/acs/1890s/carnegie/strike.html (22 Jan. 2004). Krause, Paul. The Battle for Homestead of 1892. U. of Pitt: Pittsburgh, 1992. Livesay, Harold. C. Andrew Carnegie and the Rise to Big Business. 2nd ed. New York: Longman, 2000. Solomon, Martha. Emma Goldman. Twanyne: Boston, 1987. ‘The Homestead Strike” The American Experience. 1999. PBS Online WGBH. http://www.pbs.org/wgbh/amex/carnegie/peopleevents/pande04.html (22 Jan. 2004). “The Situation at Homestead.” 23 July 1892. Ohio State Dept. of History. http://www.history.ohio-state.edu/projects/homesteadstrike1892/historyofsevendays/situationathomestead.htm (22 Jan. 2004) White, Joe. “The Homestead Strike of 1892.” Congress of Industrial Organizations: Constitutional Convention. 14 May 02. http://www.pittsburghaflcio.org/homested.html (25 Jan. 04). Labor Crises >
<urn:uuid:0209bafa-1075-4560-9bef-2b397982b9a8>
CC-MAIN-2015-40
https://sites.google.com/site/americanlaborcrises/labor-crises/homestead-strike
s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443737929054.69/warc/CC-MAIN-20151001221849-00101-ip-10-137-6-227.ec2.internal.warc.gz
en
0.96975
1,936
4.03125
4
One of the well known scientists, Edward Corridor says the influence of culture for the communication is too strong and he quoted it while “culture is communication and communication is usually culture”. The invisible supply of misunderstanding with the people is the central difference in cultural beliefs and awareness (Dutta, 2008). Database of essay examples, templates and tips for writing For only $9.90/page And the present world of globalization market found that there is a free flow of human resources across the geographical constraints and the different cultures, therefore it has become necessary to understand the relevance of sociable communication practice. Besides these fundamentals the existing paper is targeted to the exploration of different problems and difficulties in the cross- cultural conversation. Introduction In simple term the ‘culture’ can be defined as the life- design of people in a community. In broad approach the tradition include various attitudinal and behavioral dimensions like beliefs, faith, targets, norms, etc . However , these aspects make the culture a composite point to recognize and have drawn the concentration of researchers to understand about different magnitudes and its particular impact on the people whom are living inside the particular community or the world (Hayes, 2002). Within the lifestyle, however , there can be different subcultures on the basis of the ethnic teams, profession and religious group. But , a lot of studies about the behavioral aspects admit the every one of the people who belongs to a particular community are thinking and behaving in a similar fashion irrespective of all their sex. Hence, the traditions also several from one group to another and ultimately this difference will certainly affect for their trust in the communication process that one is attempting to achieve together with the people of other tradition. Therefore the perfect understanding about the cross-cultural communication is vital. Present free world situation requires the cross-cultural interaction and the people want to traveling one particular place to an additional freely for his or her business tasks or because of their entertainment activity. Hence that necessitates understanding others culture and the main aspect of the cross-cultural connection aims at, how the people through the different tradition could communicate each other and exactly how they figure out their challenges each other. Let us see an instance that how a culture difference affect the trust level as well as the open conversation. An American and a Chinese were visit the observance, where their good friends had been hidden. Meanwhile the Americans happen to be crying to place a beautiful couple of flowers in the friend’s severe. But the Chinese language were moaping to put a bowel of cooked rice and some fruits. However the Us citizens stated that one world leave the food in a grave. So he could be asking with the Chinese that, do u think that your dead friend will come and eat food that you put down on the grave. Reacting to this query, he said of course my buddy will come and eat the food around the period your time friend comes to be able to smell the flowers that you will be leaving intended for him. Even though it is a friendly nature between each other and it is the situation where American fined difficulty to understand the Oriental custom. Of course the ethnic differentiation would not threaten for their friendship. For that reason one’s traditions may be a main hunk for the international conversation. One person’s activity starts off from the traditions that he follows. Throughout his development, he recognizes the principles of his culture, values and traditions. However the tradition teaches into a person regarding good or bad and it displays the behavior of numerous people and it moves form one particular generation to another. In order to be effective communication, understanding one’s culture is too essential and it will get rid of the attitudinal and behavioral hurdle in the connection process. With no understanding the traditions, it will bring about the misconception of a person and eventually the actions and frame of mind will be imperfect. By taking into consideration these aspects the Hewlett – Packard (HP) helped bring its ALL OF US and the People from france engineers jointly to design the software program. The US designers sent lengthy and in depth emails for their counterparts in France. And response to it the French technicians reverted with prompt and intensely precise email. But the US engineers feels that France engineers were holding some information with out forwarding to them. Simply by understanding the trouble the HORSEPOWER hired a consulting firm to give appropriate training to them via both side to learn their very own differences. The positive effect Globalization means it is the available economy to any or all and no business is restricted to enter national border. The important benefit for globalization is advanced technology, greater market opportunity, Internet facilities, telecommunication and market expansion and it is an integration on the planet market (Lewis 1996). Consequently all these elements coordinate to increase output using a limited period. It integrates the supply cycle and outsourcing cheaper around the globe. Extremely the policy of globalization even helpful to a small company to introduce its product in to international market by making use of internet, contemporary transport etc . The multi-cultural Workforce A great instance intended for the Multi cultural labor force is ALL OF US economy. It has various people from distinct country coming from different moral background just like African and Asian create the majority of immigrants are staying in the country. Therefore these people have their own tradition and dialect style with the work place. Consequently this process offers the truth that the way the business convey, plan and interpret different aspect in the work place. Until the globalization and before the IT boom with the Indian economic climate, a few of midsection level supervision and the top-level management should communicate across culture. Nevertheless the present situation has changed as well as the young management have getting around the world through their different tasks. However there are two primary troubles in communicating with the individuals across lifestyle. The initial problem is the inability to note and read the icons that the various other culture screen and the different problem is that the tendency to attach to the signs perceived coming from one’s own culture. Thus in the two case there is a chance to misinterpretation with the symbols. When ever there is a collide arises between both the culture, the associates should take appropriate action and really should express wide open view of the features of the foreign culture. The extensive difference between Of india culture and the foreign culture makes a solid support to mutual understanding and its approval. Hence, there ought to be taken extra care in order to avoid any kind of losses due to this trouble. Understanding intercultural communication If we have the best knowledge about one’s culture, we are able to communicate successfully in a mix cultural circumstance. Mainly several kind of cultural differences, In-text The social context impacts on the way which the people be familiar with messages. Taiwan and Southern region Korea convey on nonverbal communication than verbal conversation whereas ALL OF US and Philippines convey more for the verbal communication. Social dissimilarities The social factor is another important factor which will disturbing the culture. The materialistic ALL OF US people believed that the money can solve any problem in fact it is one of the crucial sources intended for the accomplishment. However it is fairly opposite while consider in to Indian traditions. Because money is no extreme goal but a sense of spiritualization is the best irrespective of their very own cast, creed and sex (Gudykunst, 1998). The belief towards time is also varies in both the country. In western world the woman performs a major position in national politics, sports, organization etc but in India right up until last few years female participation was too low. Nevertheless they begin to enter into these areas which could find a great change in the Indian society. Non mental differences A non mental difference is definitely an essential instrument to understand the difference in the non- verbal communication. The simple side gesture can provide different which means from one culture to another. In certain time the interpreting through gesture according through one’s culture can result in the disbelief the meaning. Indian tradition Vs Western culture Through the last two to three decades a lot of Indian small executives and professionals consistently communicate with those from the various other culture specifically US and Europe. Nevertheless the people from the western want to control the future and they are highly receptive to watch the errors in efficiently and learn more from the previous situations. Nonetheless it is quite different in India. So the western people provide more importance to the individuality and they make more creativity in the field of technology and technology. But in American indian context all of us consult alternative party to take a simple decision. The concern is mainly depends on the genecology, that make an effort to protect the partnership. But in the western world in the event that an individual offers achieved anything, it is his real location in the world. These kinds of social values and faiths can affect to our cross ethnic communication program. Hence if we fail to give respect to our culture, or if we remain not aware about the values of different tradition, our communication may be far from the adequate communication. And certain signs of language cannot be identified by all of us or we might give them incorrect meanings based on their icons. Overcoming the Barriers You need to have a fantastic interpersonal conversation skills to comprehend others culture and to speak more effectively together with the individual through the other nationalities. He can find the skill by reading the articles from all other culture and speaking with those, who have interested to talk with other culture people. Hence he should know about each culture, history, religious beliefs, politics, worth and nationalities. Meanwhile this individual should know about the countries subculture and particularly the organization subculture. So this process may help them to generate communication simpler with the additional culture people (Rayudu, 1997). Hence we could see the expertise is an important mantra for powerful cross ethnic communication. Those understand the potential problems which is hitting for the cross cultural communication and so they learned about a conscious work to overcome the problems. Your energy won’t provide any achievement point till he adjusts his patterns in this element. So on should think that there exists a possibility the cultural difference may cause intended for communication problem. And he should be people to receive outcome as opposed to the aggressiveness. Finally he ought to be more very careful and his reply should be gradual rather than the habit of this individual said is correct and he knows anything. Active listening will avoid these kind of complications and it will the actual communication is far more accurate. Realization At present scenario is concerned the cross ethnical communication is a crucial factor in addition to a mantra intended for the accomplishment. The effect of poor connection in combination cultural circumstance is very excessive. The effective and in a position communication throughout cultures expanded the accomplishment in global business world. Hence which lessens the misunderstanding among several cultures and which enlarges productive sociable relationship among the dissimilar group. As far as present business circumstance is matter, the frontrunners should prompt to understand numerous issues and challenges relevant to the combination cultural conversation and should provide essential schooling and data to avoid the misunderstanding among the list of business group in different culture. Childs personality and life Essay Andy Murray is among the more outgoing tennis players on the rugby court and is known for his frequent reactions of passion and his hostile style of enjoy. In January ... The Person Who Has Influenced My Life Essay She actually is very slim but taller. She is amazing and get on well with people. When I have troubles, she always besides me personally to help me personally extricate ... Summarise and Compare the Evidence for the Development of Agriculture Essay The 2 continents supply a very different regarding the development of cultivation. America using its slow alterations, for example the gathering that extended and the consistency of seeds remaining in ... St jones aquinas regarding love Pages: 2 Love is usually directed for every person or from person to things, but in the Bible there is certainly another part of interpersonal take pleasure in which is ... Indigenous People Essay The term native has triggered controversy across the globe as some persons see it a great offensive brand to describe people, the name is not the only thing that provides ... The Prevalence of Imperialism in the Modern World Essay Imperialism is a insurance plan of overcoming and judgment other royaume usually with a motive of resources or perhaps land. Two well-known examples of imperialism lie in the film, Avatar, ... Technologies are important and helpful in everyone’s life Essay Computers assist individuals to do might be found or jobs easily and faster. Technology has a systematic and organized means of keeping data records, processing numbers, accomplishing a lot of ... My Ambition in Life Essay We all have been familiar with the proverb ‘Hitch your lorry to a superstar. ‘ The logic to it is simple. If we do not aspire for something great, we ... How One Ought To Behave When Wronged Essay Man being agreeable or wicked by nature is definitely subject to speculations. While some schools of thought advocate that man excellent by nature, a lot of argue that gentleman is ... Assignment Unit 303 Support Learning Activities Essay Mrs S the class teacher, the kids and I seated on the carpeting and Mrs S asked the children to distinguish different value coins by sight. I used to be ...
<urn:uuid:a4c3887c-1bf2-419b-964f-f04314c71be8>
CC-MAIN-2023-40
https://newszou.com/cross-cultural-communication-essay-2/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506480.35/warc/CC-MAIN-20230923062631-20230923092631-00731.warc.gz
en
0.950645
2,703
2.984375
3
Electricity voltage is one of the main indicators of electricity supply and quality which directly affects the performance of electrical devices connected to it. This section provides the basic norms of legislation of the Kyrgyz Republic on the quality of electricity supplie and the mechanisms and responsibilities of the parties. It also introduces the basic concepts and terminology for electricity quality, as well as methods and recommendations for improving the electricity quality in daily life. Electricity tends to change frequently and it is very difficult for an ordinary consumer to define its quality. Therefore, PU UNISON introduced special instrumental measurements and began its work on the voltage and on-site power quality monitoring, creating a database of measurement results data. To do this, Unison has worked together with a network of PC PRCE since January 2014 to measure indicators of supplied electricity to meet the state standard requirements. Since May 2014, similar work was implemented in the towns of Kant in Chui oblast and Naryn. The duration of a single measurement is 7 days, including weekdays and weekends. Measurements are made by the registrar of power quality PE-01. It is important to note that the device has passed a special verification, certification and registration by the authorised bodies for compliance with the benchmark. The main purpose of the work was to stengthen effective argumentative dialogue platforms between suppliers and consumers of electricity.
<urn:uuid:bba150d8-cf11-4d03-bcff-ca76915ea4f8>
CC-MAIN-2020-40
https://zppe.net.kg/en/content/electricity-voltage
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400221980.49/warc/CC-MAIN-20200925021647-20200925051647-00629.warc.gz
en
0.957862
274
2.703125
3
The powers not delegated to the United States by the Constitution, nor prohibited by it to the states, are reserved to the states respectively, or to the people. And we come to the end of those amendments known as the Bill of Rights, ratified together in 1792. Once again, we see the framers deferring to “the people” those powers not specifically addressed in the Constitution. It restates a truism, “That which is not surrendered is retained.” Throughout the years, the courts have seen this as a “catch all” amendment aimed at allying fear the federal government would begin an uncontrolled expansion of power and usurp the rights of the states. Although there are a number of cases where it became pivotal in the courts decision. One area this stands out is in the concept of a federal police force. At one time the Court held the federal government did not have the right to a national police force, since policing was a right of the states. The federal governments reach was limited to the District of Colombia and other areas where the Congress had exclusive authority.[i] Generally the Court skirts the amendment by citing the Interstate Commerce Clause as it supports the expansion of central powers, as it did with the United States v Darby, 1941 when the court reversed its previous decision on the government’s ability to regulate commerce. So ends the Bill of Rights.
<urn:uuid:e1b2f4c9-2d78-4e3d-9cdf-d589c4498f78>
CC-MAIN-2017-51
http://aviewfrombehindthecurtain.blogspot.com/2017/03/the-tenth-amendment.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948595858.79/warc/CC-MAIN-20171217113308-20171217135308-00649.warc.gz
en
0.971323
286
3.28125
3
A large sunspot region (AR1429) unleashed an X5 class flare (the second largest of this solar cycle) and a smaller one (X1) late on March 6, 2012, seen in extreme ultraviolet light by the SDO spacecraft. The bright flare (with several smaller flashes) was followed by a large coronal mass ejection that smacked Earth with a moderately strong geomagnetic storm two days later. The video clips covers about five hours of activity. The elongated, vertical streak in the still is really a visual aberration caused by its brightness overwhelming our sensors. It triggered a temporary radio blackout on the sunlit side of Earth that interfered with radio navigation and short wave radio. The close-up, pink image in the 1700 wavelength (below) clearly shows the bright, double ribbons of the flare, probably the best view we have seen of this kind if event. This image was taken at 00:59 UTC on March 7. High-resolution versions of this event in other wavelengths can be viewed and downloaded here: http://svs.gsfc.nasa.gov/vis/a000000/a003900/a003920/ Search Tag(s): 193, 1700, flares, active regions
<urn:uuid:d2e0a0d8-f657-4f76-a2d1-6fac18757b8c>
CC-MAIN-2023-40
https://sdo.gsfc.nasa.gov/gallery/main/item/133
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510520.98/warc/CC-MAIN-20230929154432-20230929184432-00425.warc.gz
en
0.936121
254
3.3125
3
Economists are sometimes guilty of misrepresenting real-world liquid objects as living examples of the abstract variables populating their favorite monetary model. A good example of this is the incorrect reliance on Yap stones to illustrate the idea of fiat money by economists as varying as Keynes, Milton Friedman and James Tobin. Whereas fiat money is intrinsically useless, inconvertible, and unbacked, Yap stones certainly aren't, the anthropological evidence revealing that the stones had cultural and religious significance apart from their monetary value. Similar in concept is the story of the macute, a unit of account used in Angola hundreds of years ago. Much like the exotic Yap stone, the existence of the macute (or macoute) came to the attention of Western thinkers as trade and conquest revealed ever large parts of the globe. Montesquieu was one of the first to describe the macute, noting: The negroes on the coast of Africa have a sign of value without money. It is a sign merely ideal, founded on the degree of esteem which they fix in their minds for all merchandise, in proportion to the need they have of it. A certain commodity or merchandise is worth three macoutes; another, six macoutes; another, ten macoutes; that is, as if they said simply three, six, and ten. The price is formed by a comparison of all merchandise with each other. They have therefore no particular money; but each kind of' merchandise is money to the other. - Montesquieu, Esprit des Lois, 1748Montesquieu's macute was later picked up by Sir James Steuart, an 18th century economist ranked just a notch or two below Adam Smith: That money, therefore, which constantly preserves an equal value, which poises itself, as it were, in a just equilibrium between the fluctuating proportion of the value of things, is the only permanent and equal scale, by which value can be measured.To Steuart and Montesquieu, the macute was an example of "ideal" money of account. The term money-of-account refers to the economy's pricing sign, or unit-of-account. It could be pounds (£), yen (¥), or dollars ($). Some real good typically defines this unit. For instance, the $ is the unit used to record prices in the US. The real good that defines the $ is base money issued by the Federal Reserve. In medieval times, prices were recorded in terms of £/s/d, with silver pennies being the defining real item (the "link coin"). To put this in the lingo of the econ blogosphere, the real good that defines the unit of account is the medium of account, a term popularized by Scott Sumner. Of this kind of money, and of the possibility of establishing it, we have two examples: the first, among one of the most knowing; the second, among the most ignorant nations of the world. The Bank of Amsterdam presents us with the one, the coast of Angola with the other. The second example is found among the savages upon the African coast of Angola, where there is no real money known. The inhabitants there reckon by macoutes; and in some places this denomination is subdivided into decimals, called pieces. One macoute is equal to ten pieces. This is just a scale of equal parts for estimating the trucks they make. If a sheep, e. g. be worth 10, an ox may be worth 40, and a handful of gold dust 1000. - An Inquiry into the Principles of Political Oeconomy, 1767 James Steuart's ideal money of account was a unit that, somewhat unusually, had no underlying real good defining it. It was a purely abstract accounting unit. There were prices in Steuart's economy, but no medium of account. Presumably Angolans were to keep the macute scale in mind, much like they might have a good sense for how long a foot was, or how much liquid a litre might contain. But at least with litres or feet there was a standard to which one might refer back to, say a metre stick or a measuring cup. Since the macute had no physical representation, goes the theory, it could only ever exist in people's heads. Steuart and many others in his day believed in the necessity of an invariable scale of value. What was important to Steuart was the relative prices of real goods, not the price of some superfluous intervening good who's only job was to provide a measuring stick. If the money-of-account was a gold coin, for instance, then the "smallest particle of either metal added to, or taken away from any coin" would cause the entire price level to rise, destroying the ability of coins to measure the value of things. This would create macroeconomic difficulties: any thing which troubles or perplexes the ascertaining these changes of proportion by the means of a general, determinate and invariable scale, must be hurtful to trade, and a clog upon alienation. This trouble and perplexity is the infallible consequence of every vice in the policy of money or of coin.Fixing the money of account to a coin rather than allowing it to have an independent and abstract value caused distributional unfairness, since the relative interests of debtors and creditors were now at the disposal of anyone who could reduce the quality of coin, not only of workmen in the mint, of Jews who deal in money, of clippers and washers of coin, but they are also entirely at the mercy of Princes, who have the right of coinage, and who have frequently also the right of raising or debasing the standard of the coin, according as they find it most for their present and temporary interest.To those like Steuart, the advantage to society of an imaginary accounting unit like the macute was that, unlike physical coin, no prince or money clipper could ever debase it. It existed safely in the collective imagination where it could not be damaged, and therefore trade would no longer be held hostage to a fluctuating price level. This idea spread. Around the time of Steuart, A.R.J. Turgot would also write of the macute as a purely imaginary unit: The Mandingo negroes, who carry on a trade for gold dust with the Arabian merchants, bring all their commodities to a fictitious scale, which both parties call macutes, so that they tell the merchants they will give so many macutes in gold. They value thus in macutes the merchandize they receive; and bargain with the merchants upon that valuation. - Reflections, 1766Macutes-as-ideal-unit would go on to be upheld a century later by John Stuart Mill: This advantage of having a common language in which values may be expressed, is, even by itself, so important, that some such mode of expressing and computing them would probably be used even if a pound or a shilling did not express any real thing, but a mere unit of calculation. It is said that there are African tribes in which this somewhat artificial contrivance actually prevails. They calculate the value of things in a sort of money of account, called macutes. They say one thing is worth ten macutes, another fifteen, another twenty. There is no real thing called a macute: it is a conventional unit, for the more convenient comparison of things with one another. - Principles of Political Economy, 1848As lovely as the idea of an imaginary macute was, it simply wasn't true. The macute was not so abstract as Montesquieu, Steuart, Turgot, and Mill would have liked it to be. William Stanley Jevons, for instance, scolded Montesquieu for misunderstanding the nature of money of account, since macutes served as "the name for a definite, though probably a variable, number of cowry shells, the number being at one time 2000." Lord Lauderdale accused Steuart of ignorance, noting that macutes were "pieces of net-work, used by the people of Angola for a covering." Like Lauderdale, John Ramsay McCulloch also found macutes to be bits of valuable cloth. Other writers declared that slaves were the missing medium-of-account used to describe the macute. With the benefit of modern ethnographic accounts, we know that McCulloch and Lauderdale were right—macutes were neither imaginary, nor slaves, nor cowries, but cloth. In Power, Cloth and Currency on the Loango Coast, Phyllis Martin describes a coastal economy in which domestically produced cloth currency circulated. These libongo (pl. mbongo) were fourteen inch square pieces of cloth about the size of a hankerchief (see photo below). Mbongo had multiple uses. Not only could it be used in local markets to buy food and other consumption goods, but it could be made into clothes, wall hangings, bags, and floor coverings, and used for ceremonial purposes. |Kongo or Angola cloth, 17th century, raffia pile (source)| Martin also describes a traditional unit of account called a makuta (macute), defined as ten mbongo wrapped together in a strip. European trade brought foreign substitute cloth, and with that a decline in the purchasing power of the makuta, or inflation, resulted. As a result, copper coins came into increased use, although Martin finds that mbongo remained in circulation well into the eighteenth century. By the 1700s, around the time that Montesquieu was writing, the nature of the makuta unit of account had changed: At Loango Bay traders used an abstract numerical unit of account based on a makuta, one mukuta being equal to 10. The unit may have developed from the older association of the mukuta with ten mbongo. Thus a slave-trader at Loango in 1701 wrote, "we bought men slaves from 3,600-4,000, and women, boys and girls in proportion." The goods to be exchanged were also valued in the numerical unit of account for example, a piece of "blue baft" or cotton cloth from India counted as 1,000, a piece of painted calico was 600, a small keg of powder was 300, and a gun was 300.40 - Martin, Power, Cloth and Currency on the Loango Coast, 1986What we have here is an example of "ghost money", not ideal money. An ideal money, having been divorced from any traded good, would have no commodity definition whatsoever. The mukuta (macoute) as described by Martin, however, was defined as a historically fixed, or "ghost" quantity, of mbongo. Though no longer prized as a highly liquid medium of exchange—copper coinage would have filled this place—mbongo were still desired for their non-monetary qualities. Thus any alteration in the real value of mbongo would continue to have an effect on all prices. It may have been this historically fixed "ghost" nature of macutes and their relative rarity in actual trade that confused Montesquieu into describing them as an ideal accounting unit. In sum, macutes were not the ideal unit of Steuart and Montesquieu's imagination. Does that mean that ideal units of account can't exist? I'm hard pressed to come up with a logical explanation for how they might work. And I surely don't have any historical examples, the macute having been confined to the dustbin. I vote we toss the idea out, along with fiat money. Beware economists toting imaginary accounting units, abstract numeraires, and ideal money of account. P.S. Indexed units of account like the Chilean Unidad do Fomento, which I wrote about here, are not imaginary units. Instead, I think they should be thought of as ghost monies.
<urn:uuid:94137e84-989e-4bc4-b8f2-a95692c5a7b5>
CC-MAIN-2014-41
http://jpkoning.blogspot.co.uk/2014/01/macutes-imaginary-money.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657131238.51/warc/CC-MAIN-20140914011211-00100-ip-10-196-40-205.us-west-1.compute.internal.warc.gz
en
0.962471
2,466
3.640625
4
During commute time in Bangalore when people are traveling to their offices, how many people do you see: 1. In a car? 2. On a motor bike? 3. In a bus? Answer : 1 in a car, 1 on a bike, 75 in a bus. Here’s a small transportation engineering exercise. If you count the number of vehicles on the flyover in the picture below, you’ll find that they add up to 150. Assuming the people in these vehicles are all going to or from work, each of the vehicles is carrying 1 person. That means there are 150 people between the two red lines. Lets now divide these 150 vehicles into two groups of 75 vehicles each. If each of these groups of people decide to travel by bus instead of in their cars and two-wheelers, this is what happens (remember, we already decided that the average bus carries 75 people during rush hour). The congestion magically disappears ! This is no magic. It is proven every day on Bangalore’s roads by BMTC. BMTC has just 5000 buses, and carries 37 Lakh people every day. Bangalore’s 32 lakh cars and two-wheelers carry 32 lakh people. This means that 0.15 per cent of the vehicle population is carrying 50 per cent of the human population. To carry a person 1 km, a bus: 1. Uses 1/30th the space of a car, and 1/20th the space of a two-wheeler. 2. Emits 1/6th the pollution of a car, and 1/10th that of a two-wheeler 3. Uses 1/15th the quantity of fuel of a car, and 1/3rd that of a two-wheeler With extensive use of buses this is what can be achieved in Bangalore: 1. Number of vehicles reduced to 1/10th 2. Air pollution 1/6th of what it is now. 3. Traffic density 1/10th of what it is now. 4. Commute time reduced by 1/2 5. Commuting cost reduced to 1/5th. 6. Accidents reduced dramatically. 7. The money that the government spends on road infrastructure will be available for improving water, power, education, medicare and housing. We don’t have to travel uncomfortably, 75 people in a bus. We can have multiple classes of buses, like BMTC already has. So where is the problem ? Why can’t we do this? Let’s hear it from someone who solved the problem in Bogotá, Colombia, which has the same population as Bangalore, in an area twice the size, and had a similar traffic problem. When Enrique Peñalosa became mayor of Bogotá in 1998, he asked a question that is changing the way people all over the world think about cities: “In Bogotá, where 85 percent of the people do not use cars for their daily transport, is it fair that cars occupy most of the space on the streets? The city built 70 miles of bicycle routes and closed several streets to cars and converting them into pedestrian malls. Car use was restricted during rush hour, each car banned from the downtown area two days a week, based on the license plate number. The results were dramatic: the average commute time dropped by 21 minutes, and pollution was reduced significantly. The city had been debating a multi-billion dollar train subway system for decades, but Peñalosa decided to build a rapid transit bus system (BRT) that was far cheaper. In the words of Peñalosa, who says he succeeded because he focused on improving the lot of people, not their cars. “All over the developing world, resources are used to help the affluent avoid traffic jams rather than mobilising the entire population”. People ask him why this is not done everywhere, if it is so simple and inexpensive. He says, “I tell them the only issue is a political one. They don’t want to take space from cars and give it to buses, bicyclists, and pedestrians”. After Peñalosa showed the way, scores of cities the world over have switched to bus systems. What we in Bangalore need now is our very own Peñalosa. ⊕ The Bogota Transformation : Vision and Political will Indore Bus Rapid Transit (BRT) : Executive Summary Presentation ‘Urban Transport in India:Beyond the Nanoand Metro …and Back to the Basics’.by Dr. Madhav Badami, Asst. Prof., School of Urban Planning, McGill Univ., Canada
<urn:uuid:87d24a6b-8bf6-4a2a-902e-4934ef8f07e3>
CC-MAIN-2018-51
http://bengaluru.citizenmatters.in/1320-bus-solution-traffic-1320
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823320.11/warc/CC-MAIN-20181210080704-20181210102204-00446.warc.gz
en
0.959758
990
2.84375
3
Spreadsheets are the lifeblood of finance departments everywhere. Whether you are an analyst with a Wall Street firm or an entrepreneur doing cost project analysis, you’ll have to use Microsoft Excel. Beginners, meanwhile, will benefit greatly from this free course on Excel. Make working with spreadsheets a little easier with these Excel keyboard shortcuts that will have you working like the pros in no time: Note: This article assumes you are using Excel on a Windows PC. If you are using a Mac, these shortcuts will change slightly. Here is a complete list of all Excel keyboard shortcuts on Mac. Adding/Deleting Cells and Data 1. CTRL + SHIFT + PLUS SIGN (+) Action: Inserts new cell Whether it’s a row, a column, or a single cell, keep this shortcut handy to speed up data entry. 2. ALT + ENTER Action: Inserts a new line within a cell Excel isn’t Word, but that doesn’t mean you won’t be dealing with plenty of text in Excel. This shortcut makes entering comments ridiculously fast and easy. 3. SHIFT + F2 Action: Inserts a comment within a cell Speaking of comments, just press SHIFT + F2 to add an explanatory pop-up note to a cell to make sure that your data won’t be misinterpreted. 4. CTRL + K Action: Adds a hyperlink to the selected data A shortcut you’ll turn to often when using external references. 5. CTRL + R Action: Fills a cell with data from the adjoining cell to the left Working with a lot of similar data? Then you’ll love this shortcut which makes data entry dramatically faster. No more CTRL-C, CTRL-V! 6. CTRL + D Action: Fills a cell with data from the above cell Another shortcut meant to ease data entry. It works exactly like the above, except, you know, in a different direction. 7. CTRL + ENTER Action: Fills the entire selected cell range with the current entry Few shortcuts are going to save you more time than this one. Using it is pretty simple as well: select a range, enter data into any one cell, and press this shortcut to populate the entire range with this data. Action: Creates a chart with the selected range Microsoft has made it relatively easy to create charts with its Ribbon interface starting with Office 2007. This shortcut makes the process even smoother by creating a chart instantly with the given data. 9. CTRL + T Action: Adds a table to the worksheet Tables are a wonderful way to create flexible data structure that can expand or shrink dynamically. This shortcut makes adding tables a little easier, which will hopefully encourage you to use this feature more often. 10. SHIFT + F11 Action: Inserts a new worksheet Pretty straightforward: use this shortcut to bypass the ‘insert worksheet’ button at the bottom. You’re going to use it pretty often if you work with big projects. Selecting Cells and Data Action: Makes an extended selection of cells or data This is similar to using the mouse to make a selection, except that you use the arrow keys. To use this shortcut, simply press F8 and press the arrow keys in the appropriate direction to make a precise selection. 2. CTRL + PageUp Action: Switches active window to the next worksheet Quite straightforward: instead of navigating from the buttons at the bottom, you can just press CTRL + PageUp to switch to the next worksheet. 3. CTRL + PageDown Action: Switches active window to previous worksheet Same as above, except it takes you back one step to the previous worksheet. Use the two shortcuts in conjunction to navigate through worksheets. 4. SHIFT + F5 Action: Opens the Find dialog box Another shortcut you’re going to use very often is the Find dialog box, especially if you work with large spreadsheets where data can get lost easily. 5. CTRL + SHIFT + Space Action: Selects the complete table This shortcut is pretty straightforward: it selects all the cells within a table. There’s only one caveat though: the active cell must be within range of the table. 6. CTRL + ~ Action: Reveals the formulas across the entire spreadsheet This shortcut will reveal all the formulas used across the worksheet – a great tool for scanning new and unfamiliar spreadsheets. Editing and Formatting Cells and Data Action: Edits a cell A simple shortcut you’ll turn to very often. 2. CTRL + 1 Action: Shows the Format Cells dialog box Plain spreadsheets with black text in Arial look pretty dull. Pep things up with this shortcut to format, align and color the spreadsheet. 3. Data Formatting Shortcuts These clutch of shortcuts will come in handy for quickly formatting cells to a desired data type: - CTRL + SHIFT + 1: Formats the selected data as number format with two decimal places (12000 to 12,000). - CTRL + SHIFT + 2: Formats the data in your chosen time format. - CTRL + SHIFT + 3: Formats the data in your chosen date format. - CTRL + SHIFT + 4: Formats the data in your chosen currency value (12,000 to $12,000). - CTRL + SHIFT + 5: Formats the data as percentage value (1 to 100%). - CTRL + SHIFT + 6: Formats the data into exponential value or scientific form (12000 to 1.20E+04). There are countless other shortcuts in Excel, but these 24 should be more than enough to help you get things done faster. Remember: you can always view commonly used shortcuts in the Ribbon interface by pressing ALT. You can also see a comprehensive list of all the shortcuts on the official Office website. Advanced users to Excel will love this course on advanced Excel topics such as VLOOKUP, MATCH and CHOOSE functions.
<urn:uuid:f15e715d-4ad0-4aed-97e1-85d1945a8147>
CC-MAIN-2017-13
https://blog.udemy.com/excel-keyboard-shortcuts/
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189525.23/warc/CC-MAIN-20170322212949-00562-ip-10-233-31-227.ec2.internal.warc.gz
en
0.825776
1,286
2.734375
3
10 Unexpected Scientific Reasons Why Old People Are Awesome You may think that the elderly are inferior in every way and do nothing but drag society down. Well, get ready to throw all preconceptions out the window as research shows us just how awesome they really are. 10They Handle Stress Better Than Young People Contrary to our view of elderly people as cranky old coots, findings say they actually exhibit a more optimistic outlook on life than their younger peers. Not only that, they can deal with stressful life events far better, readily accepting the outcome with less anger or anxiety. Researcher Mary Shallcross explains these findings by noting that people acquire a wealth of experience in dealing with life’s unpleasantness over time. Thus, the older a person becomes, the more readily they accept the outcome of unpleasant events such as the deaths of loved ones. However, this ability reaches its end with truly advanced age. In the final years of life, emotional health deteriorates. 9Overweight Seniors Live Longer The elderly, just like everyone else, should strive to be healthy. But according to an Ohio State University study, older adults (especially those in their fifties) are actually better off with a few extra pounds on their waistlines. Assistant sociology professor Hui Zheng found that slightly heavier adults outlive their slimmer peers of the same age range. Older people are more susceptible to disease and its accompanying weight loss. The few extra pounds could help stave off a potentially life-threatening loss of weight. Not only that, the extra weight would serve as a sort of emergency food supply for old people too sick to eat. However, Zheng warns that the benefits apply only to slightly overweight people who maintain their weight. Overweight people who continue to pack on the pounds as they grow even older risk dying a lot earlier. 8Nostalgia Is Therapeutic Ever had that grandpa or grandma who keeps telling you stories about the “good ol’ days?” If so, we’d forgive you for a natural hatred of nostalgia. Defined as a melancholic reflection on past events, nostalgia acquired a bad rap originally. It was first viewed as a medical disease in the 17th century and then a psychiatric disorder in the 20th century. However, modern researchers have found that nostalgia is actually beneficial, especially for the elderly. University of Southampton psychologist Constantine Sedikide, notes that modern researchers are just really beginning to find out the psychological benefits of nostalgia. For one, it can help to battle the effects of loneliness, increasing an individual’s self-esteem. It can also serve as a bridge from the past to the present, keeping people in touch with reality and giving meaning to their lives. 7Old People Helped Mankind Evolve The elderly have been instrumental to mankind’s evolution. According to anthropologist Rachel Caspari and her colleague Sang-Hee Lee, human evolution took a huge leap forward more than 30,000 years ago, specifically during a certain time period that saw a four-fold increase in the number of people going into old age. Although the exact cause still remains unclear, the anthropologists speculate that the population explosion occurred when people decided to keep the old folks around to tend to their children and homes while the parents were out hunting and gathering. As a result, the survival rate of the elderly increased substantially. With more and more old people settling down together, ideas and experiences could be shared and exchanged, resulting in a significant spread of information that would be felt by future generations. As Lee puts it, old people became the figurative computer hard drives for early mankind. 6They Still Get Plenty Of Sex The idea that old people live a sex-free life couldn’t be any further from the truth. According to a 2013 study done in the US, the elderly enjoy far more sexy time than any of us would have ever imagined. For example, more than 50 percent of interviewees belonging to the 57–75 age bracket reported giving or receiving oral sex, while one-third of those in the 75–85 range reported indulging in the act. As significant as the study was for breaking stereotypes, it also opened a can of worms: elderly STDs. According to the CDC, the number of geriatrics acquiring STDs has risen since 2007, mainly because of lack of education in using safety measures. Public health expert Emmanuel Ezekiel encourages health professionals to assist the elderly with sex education since sex comes naturally for people living in close proximity (in retirement homes, for example). 5Their Driving Has Improved Greatly Good news to all users of the road: A 2012 study by the US Insurance Institute for Highway Safety (IIHS) found that accidents and crashes involving older drivers have significantly decreased in the last decade. Those who do get in accidents are now far more likely to survive with fewer injuries. Since 1997, older driver fatalities have dropped by 42 percent, supported with a similar decrease in non-fatal incidents. For the Institute, this was a surprising find, since they expected that the ever-increasing elderly population would create more accidents on the road. This positive trend could be attributed to modern cars being generally safer than previous models. Another critical factor is the improving physical and mental health of the elderly, which have helped to curb the number of accidents. 4They Could Be The Key To World Peace The Roman Empire had a long period of peace called the Pax Romana, and some say that we’ll soon have our own version, thanks to our elderly. Mark Haas from Harvard’s International Security Program notes that a rapidly aging population will force the United States to spend more of its budget on pensions and healthcare for the elderly instead of on tanks and aircraft. The foreseeable future will still see the US as the dominant economic and military power because rival countries including Russia and China will be hit even harder by the aging trend. Supporters of the US’s current foreign policy say that the forced “Pax Geriatrica” will have its downsides. The US will be less able to police the world and intervene in localized conflicts. Decreased military and security spending could also leave the US more vulnerable to renegade terrorist attacks. 3Our Genes Command Us To Respect Them We don’t just respect our elders out of good manners and maturity. We may be programmed to. In 2010, France’s University of Rennes closely observed communication habits among a group of Campbell’s monkeys. The team noted that that older monkeys who called out tended to be answered more often, even though they communicated far less often than the younger ones. This indicated that the older monkeys—because of their greater experience in survival and higher rank in the social hierarchy—were far more influential in the group, leading younger monkeys to pay more attention to them. Some may interpret the findings as a sociological phenomenon rather than a biological one, and some may think the results only extend to the study subjects. But the researchers conclude that respect for elders is as an evolutionary trait, which may be found generally in all primates, including humans. 2Their Brains Work Slower (Only Because They’re Full Of Wisdom) While we young whippersnappers crack jokes at how excruciatingly slowly old people think and speak, they only do that because their brains have stored so much information. Combined with the fact that their brains need less dopamine than before, old people are also more thoughtful and far less likely to act on impulse than their younger peers. The elderly can still process new information, albeit at a slower pace for the same reason that they speak slowly. These unique characteristics of an aging brain make up what researchers believe to be the biological root of wisdom. As University of Dallas Center for Vital Longevity’s Denise Park summarizes, “There’s a reason why we don’t have 20-year-olds running the world.” 1Older Workers Outperform Younger Peers To learn how often cognitive performance fluctuates among workers, Berlin’s Max Planck Institute for Human Development divided participants into two groups based on their age range (20–31 and 65–80). All participants performed a series of cognitive tasks repeatedly for 100 days. The older group’s cognitive performance varied much less than those in the younger group. In other words, they did their work more consistently. The researchers attributed the old workers’ steady performance to their being more emotionally stable as well as being more experienced to handle the various tasks. Marc V. is always open for a conversation, so do drop him a line sometime.
<urn:uuid:2a7cbc08-04ca-4bc4-a4d6-f0e1dd09b93b>
CC-MAIN-2014-23
http://listverse.com/2014/06/29/10-unexpected-scientific-reasons-why-old-people-are-awesome/
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510257966.18/warc/CC-MAIN-20140728011737-00348-ip-10-146-231-18.ec2.internal.warc.gz
en
0.956956
1,775
2.59375
3
Find out the top 10 core skills you need to master as a government accounting and what hard skills you need to know to succeed in this job. Government accounting is highly essential for transparency and efficiency in the administration sector. A government accountant reviews financial documentation for the government plus its taxpayers ensuring there are no discrepancies. Just as analysts in the industry tracks, analyzes and reports all the financial information, these government accountants do the same but only for the government. As public servants, these individuals' workload includes prepare financial statements after a thorough audit process, private audit businesses and individuals ensuring they comply with the income taxation law, investigating various government agencies financial accounts for signs of fraudulent activity and advising on the budget and economical declaration process. Core Skills Required to be a Government Accounting Core skills describe a set of non-technical abilities, knowledge, and understanding that form the basis for successful participation in the workplace. Core skills enable employees to efficiently and professionally navigate the world of work and interact with others, as well as adapt and think critically to solve problems. Core skills are often tagged onto job descriptions to find or attract employees with specific essential core values that enable the company to remain competitive, build relationships, and improve productivity. A government accounting should master the following 10 core skills to fulfill her job properly. Innovation is the process of translating new invention into a service that creates value or brings better solutions that meet the requirements. A Government Accounting ought to introduce innovation in their business to help save time and money giving a competitive advantage to grow and adapt the business in today's marketplace as well as creating more efficient processes and ideas with a likelihood for your business to succeed. Knowledge of Company Processes: Knowledge of Company Processes is the in-depth understanding of a collection of related, structured activities that serve a particular goal for a group of customers or clients who are valuable to the enterprise. A Government Accounting ought to maintain consistency across the daily processed while keeping a keen eye on the overall plan of the organization by ensuring the company processes are performed and followed. Multi-Tasking allows one to juggle and perform more than one task at a time without losing track of what you are working on or dropping the ball. A Government Accounting must learn the trick of multitasking and help the staff balance the competing demands of their time and energy that they are expected to handle multiple priorities every day without compromising on the effectiveness of the work done. Appraisal and Evaluation Skills: Appraisal and Evaluation Skills are services that allow employers to assess their employees? contributions to the organization for the period they have been working with them. A Government Accounting must creatively develop a robust evaluation process that includes the standard evaluation form, approved performance measures, guidelines for presenting feedback and disciplinary procedures to promote staff recognition and rewarding following a fair assessment and appraisal process. Ethical Behavior is acting in policies that are consistent with what the society and individuals typically think are good morals or values. A Government Accounting should put emphasis on ethical behavior as best as he does to performance because it's as important as high morale and teamwork to all individuals who are committed to keeping the company values as well as speaking up when such costs are broken. Enjoyment of the Job: Enjoyment of the Job is the ability to enjoy what you do rather than enjoying what you earn from it. A Government Accounting needs to creatively learn of ways to motivate his employees to benefit from the workplace by matching their personality to the culture of the organization where they fit best and allowing them to explore their hidden talents to grow and mature with the team. Personal Relationships is the relationship between individuals who have or have had a continuing relationship of any nature either professional or informal. A Government Accounting reserves the right to take prompt action if an actual or potential conflict of interest arises concerning individuals who engage in a personal relationship that may affect terms and conditions of employment and he should not also date a subordinate. Problem/Situation Analysis is the ability to solve problems and assess situations to know what kind of solution is required to calm it down. A Government Accounting should learn how to identify and analyze problems and situations as well as use available resources to resolve them constructively by reaching a consensus through looking at an issue in a professional, not personal way. Financial Management is the skill of learning how to handle accounting, finance, and organizational management through providing daily data on the operations that take place every day. A Government Accounting ought to be highly effective in planning and organization, controlling and management of the financial resources to achieve the company's organizational objectives that are laid down to see the growth of the enterprise. Knowledge Management is the ability to manage knowledge and information that is presented to the company from different sources without overlooking any of them. A Government Accounting ought to creatively channel all the new information, tools, input, and methodology mean by actively practicing the art of knowledge management within the business by harnessing the organization's inherent wisdom's platform in one place. Hard Skills Required to be a Government Accounting Hard skills are job-specific skill sets, or expertise, that are teachable and whose presence can be tested through exams. While core skills are more difficult to quantify and less tangible, hard skills are quantifiable and more defined. Hard skills are usually listed on an applicant's resume to help recruiters know the applicant's qualifications for the applied position. A recruiter, therefore, needs to review the applicant's resume and education to find out if he/she has the knowledge necessary to get the job done. A government accounting should have a good command of the following hard skills to succeed in her job.
<urn:uuid:4a1dcd3b-2ad8-4ab5-9693-146d2470afe5>
CC-MAIN-2020-34
https://www.employeepedia.com/hire/job-skills/8284-skills-needed-to-be-a-government-accounting
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738888.13/warc/CC-MAIN-20200812083025-20200812113025-00013.warc.gz
en
0.947571
1,147
2.609375
3
Qingming Jie means clear and bright in Chinese. Qingming Festival, also know as Tomb Sweeping Day is one of the 24 solar terms in the Chinese solar calendar. It is one of the most symbolic of festivals celebrated in Taiwan. Tomb Sweeping Day is held 107 days after the start of winter. This day usually falls on April 4 or April 5, depending on the lunar calendar. In Taiwan, the public holiday is observed on April 5 each year in honour of the death of political and military leader Chiang Kai-shek on that day in 1975. From honouring the dead to welcoming the season of spring these are the things you need to know about Qingming Festival. It has a fascinating origin story An exiled prince named Chong’er was served loyally by his official named Jie Zitui, who once even cut his own flesh to feed the starving prince. After Chong’er was reinstated to his throne as duke, Jie Zitui retreated to the forest with his mother. The duke realised that he hadn’t rewarded Jie Zitui as yet and went to find him. He set fire to the forest in order to force Jie Zitui out but when the fire died down, he found the charred remains of his loyal servant and his mother beside a willow tree. Filled with remorse the duke ordered three days of memorial for Jie Zitui and the city erected over the former forest is still came to be known as Jiexiu. This is why during this festival, people also follow the tradition of carrying and hanging willow branches. It is a day to remember the departed The term “Tomb Sweeping” comes from the custom of cleaning tombs and grave sites as a sign of respect for the dead. On this day people remember the departed by sweeping the tomb, taking the dead person’s favourite food and wine and pouring them on the graves. Some also burn paper that symbolise money. This is done to ensure that the dead are not deprived of food and money. The Chinese also pay homage to the dead martyrs on Tomb Sweeping Day. It is a celebration of Spring Like so many festivals across the word, Tomb Sweeping Day or Qingming festival is also a celebration of the changing of seasons. Locals get involved in a lot of outdoor activities on this days like kite flying, tree planting, carrying flowers, riding on swings and having family outings. As it happens during spring, young couples are also meant to start a courtship during this time. It has an agricultural connection Tomb Sweeping Day or Qingming Festival signals the coming of warm weather and rainfall. It is an important time for plowing and sowing. The festival is also connected to the Chinese tea culture. Green teas made from leaves picked before this date are known as pre-qingming and are valued for their lighter aromas, fetching higher prices in the market than other green teas. To take in a bit of Taiwanese culture on this year’s Tomb Sweeping Day, indulge in the exclusive Moon of Taj sweets that brings the rich flavours and vibrant culture of Taiwan to the saccharin loving Indians.
<urn:uuid:fd8c759a-6c46-44af-9b0a-e003734f2cc2>
CC-MAIN-2019-51
https://moonoftaj.wordpress.com/2017/03/19/qingming-festival-2017-food-tea-wine-and-other-gifts-are-offered-to-the-departed-spirit/
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540527010.70/warc/CC-MAIN-20191210070602-20191210094602-00033.warc.gz
en
0.973998
665
3.390625
3
Something like this probably could have made a major difference. This crash was no anomaly. The routinely fog-bound section of highway, strung along the Virginia-North Carolina border, hosts crashes with depressing frequency. And these collisions have continued despite the emergence in recent years of safety systems designed to alert drivers to the danger of potential crashes. Some such devices even apply the brakes of a car automatically to avoid the crash or minimise the force of impact. But new technology that lets drivers know what cars ahead are doing before they even come into view will augment current on-board sensors within just a few years. “Of the sensors today, there’s sonar, which is not long enough range, there are cameras, but they work terribly in fog, and Lidar is so-so in fog,” explained Doug Patton, senior vice president for Denso International, an electronics supplier to the automotive industry. “Radar does work in fog”, he said, but at a reduced range. Radar-based collision warning and braking systems might at best reduce the force of impact in thick fog. And on winding mountain roads such as those along the Virginia-North Carolina border, it cannot see around corners. “If you couldn’t have seen it, then radar wouldn’t have helped you,” he said. That does not mean technology will not find a way. This summer, the National Highway Traffic Safety Administration (NHTSA) in the US is slated to issue rules on devices that will let cars communicate with each other over short distances in so-called vehicle-to-vehicle, or V2V, communications. Think of it as an automatic CB radio for your car’s safety systems. But instead of warning of a looming speed trap, cars ahead would alert those behind when a forward driver has slammed on the brakes, relaying a warning of an emergency ahead. Eventually, they will even be able to broadcast facts such as whether the driver has turned on headlights and windshield wipers, which are indicators of poor visibility, or of the car’s antilock braking or stability control systems have been engaged, a potential indication of poor traction due to moisture or debris on the road surface. The Virginia Tech Transportation Institute has developed an application it calls the Emergency Electronic Brake Light, which would warn nearby cars of rapid deceleration due to hard braking or a crash, says Zac Doerzaph, director of the institute’s Center for Advanced Automotive Research. “Something like this probably could have made a major difference,” Doerzaph claimed. And the system would not be dependent on every car on the road carrying it to be effective. “If I can tell just a handful of drivers to slow down, the drivers around them will slow down, instead of getting a sudden stopped vehicle ahead of them. This is the anti-pileup application.” Doerzaph emphasised that the technology to achieve lowered risk of collisions was “really close”. What may not be as ready are the government regulations that would establish rules for such systems to share information. NHTSA is set to issue those rules this summer, which could put systems in cars as soon as 2016, Doerzaph said. A potential government-related roadblock: a request from consumer electronics manufacturers to turn over a portion of the radio frequency designated for these safety systems in order to deliver internet-enabled services like streaming radio and social networking to cars’ infotainment systems. Patton warned that sharing the same frequency would mean more testing by automakers before they could put these systems into new cars.
<urn:uuid:abf458e5-8bc2-44e2-9a29-e803e41d79f0>
CC-MAIN-2017-39
http://www.bbc.com/autos/story/20130423-can-technology-lift-the-fog?ocid=global_autos_rss
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689661.35/warc/CC-MAIN-20170923123156-20170923143156-00716.warc.gz
en
0.963393
758
3.203125
3
In*gen"u*ous (?), a. [L. ingenuus inborn, innate, freeborn, noble, frank; pref. in- in + the root of gignere to beget. See Genius, and cf. Ingenious.] Of honorable extraction; freeborn; noble; as, ingenuous blood of birth. Noble; generous; magnanimous; honorable; uprigth; high-minded; as, an ingenuous ardor or zeal. If an ingenuous detestation of falsehood be but carefully and early instilled, that is the true and genuin method to obviate dishonesty. Free from reserve, disguise, equivocation, or dissimulation; open; frank; sa, an ingenuous man; an ingenuous declaration, confession, etc. Sensible in myself . . . what a burden it is for me, who would be ingenuous, to be loaded with courtesies which he hath not the least hope to requite or deserve. (Formerly) printers did not discriminate between . . . ingenuous and ingenious, and these words were used or rather printed interchangeably almost to the begining of the eighteenth century. G. P. Marsh. Syn. -- Open; frank; unreserved; artless; plain; sincere; candid; fair; noble; generous. -- Ingenuous, Open, Frank. One who is open speaks out at once what is uppermost in his mind; one who is frank does it from a natural boldness, or dislike of self-restraint; one who is ingenuous is actuated by a native simplicity and artlessness, which make him willing to confess faults, and make known his sentiments without reserve. See Candid. © Webster 1913.
<urn:uuid:0cb2602f-3b96-435c-b5c9-8fbb24123c8e>
CC-MAIN-2016-40
http://everything2.com/title/Ingenuous
s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738662400.75/warc/CC-MAIN-20160924173742-00066-ip-10-143-35-109.ec2.internal.warc.gz
en
0.899502
369
2.515625
3
Dancers have some of the most enviable bodies, with their long and lithe limbs, their sculpted muscles and amazing strength. In fact, ballet and other dance forms have been the inspiration for many workouts, including the Tracy Anderson method, Pure Barre and Kettlenetics. But just like any well-trained athlete, dancers’ bodies are challenged by working the same muscle groups with the same set of moves over and over again. Whether it’s cramming 10 toes in pointe shoes or sore knees from gliding across the stage in a series of split jumps, dancers’ bodies wear the marks and signs of their beautiful craft on their bodies – and sometimes those reflections are painful. But the ancient practice of yoga can offer the dancer a way to correct any imbalances or misalignments, while also improving their performance. Here is what you need to know about yoga for dancers: One of the many reasons dancers flock to yoga classes is that the postures in yoga mirror the same fluid and graceful movements that dancers perform every time they grasp the ballet barre or step onto the floor of their dance studio. Yoga also offers numerous anatomical benefits to dancers. While dancers have amazing extension in their legs, their hip flexor muscles, hamstrings, and shoulders are often tight. Yoga’s ability to stretch these areas can improve and strengthen them. In addition, yoga’s breath work helps dancers utilize his or her breath while performing in a way that enhances their physical dexterity, while also keeping their mind clear, steady, and focused. Just as their are endless dance moves, there are also innumerable yoga postures that can support a dancer’s performance. Here are just a few: Sun Salutation B (Surya Namaskar B): Because of the flowing movements of the series of postures that are linked with breath in Sun Salutation B, it makes this posture a practice in and of itself for the dancer. Plus, the lunges help loosen tight hip flexor muscles, and the powerful engagement of the core abdominal muscles encourage the dancer to connect with the central axis of their body. For beginners, start by performing five rounds of Sun Salutation B and work your way up to 10 or more a day. Bound-Angle Pose (Baddha Konasana): Not all areas of the dancer’s body are limber and bendy. The four muscles of the hip, including the abductors, adductors, flexors and extensors, are often quite stiff due to all the jumping and leg extensions. Bound-Angle Pose is a wonderful yoga posture for opening up these areas and loosening them. For the beginner, start by staying the posture for at least five breaths, gradually working your way to 10 or more. Focus on reaching out through your knees as you release the thigh bones towards the floor. If you have an injury, it’s always important to speak with your doctor before starting a yoga practice. In addition, seek out a qualified yoga instructor who has worked with dancers before or who has a sound knowledge of yoga and its implications for performing artists. Since the dancer may be used to being quite accomplished at his or her craft, it is important to realize that many yoga postures may be challenging to perform, yet it is within this challenge that the fun, exploration and understanding of yoga can grow and develop. Therefore, the dancer should go into a yoga class with no preconceived expectations of how they feel they should perform. Instead, they should view it as a mini vacation away from the dance studio and as a way to deepen their sense of self and their beloved art form. August 9th, 2010
<urn:uuid:7edb26c5-de70-4713-980f-fb838e509a3e>
CC-MAIN-2013-20
http://www.dietsinreview.com/diet_column/08/yoga-for-dancers
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368698104521/warc/CC-MAIN-20130516095504-00012-ip-10-60-113-184.ec2.internal.warc.gz
en
0.964702
758
2.75
3