text
stringlengths
198
621k
id
stringlengths
47
47
dump
stringclasses
95 values
url
stringlengths
15
1.73k
file_path
stringlengths
110
155
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
49
160k
score
float64
2.52
5.03
int_score
int64
3
5
The intellect is a little something that several of us comprehend as the seat of human cognitive power: our pondering, feeling, and perceiving. When you analyze for an exam, you are utilizing your mind. When you really feel content or sad, you are utilizing your mind. When you interpret facial gestures in your dialogue husband or wife, you are using your thoughts. In simple fact, your mind is currently being made use of each and every next you are alive-but, you may possibly not generally knowledgeable of it. Consciousness is a important term listed here, because the mind can be divided into two parts: the aware and the subconscious. Your mindful mind is one thing you are really familiar with-it is accountable for all views, emotions and perceptions that you are informed of. But the unconscious thoughts is a lot more mysterious-and however unlocking its mysteries can support you get deeper perception into who you are and why you are the way you are. The Aware Head Simply outlined, the acutely aware thoughts is everything that we are conscious of all thoughts, emotions and perceptions that we can examine rationally. For example, when you are having a conversation with a pal, you are knowledgeable of the factors he or she is indicating and hence you can give information mainly because you have, with recognition, evaluated the matters they have stated rationally. The Unconscious Brain The subconscious brain is like a wide room made up of all the reminiscences, emotions, thoughts, perceptions and needs that you have ever experienced-you just are not mindful of them any more. But even although you are not knowledgeable of the contents of your unconscious head, you are however influenced by them day by day. They are what sort your behaviors, beliefs, attitudes and responses to men and women and the entire world close to you. In some cases, your unconscious supplies you with a favourable reservoir of beliefs, attitudes and emotions to draw from. But often, sad to say, your unconscious is filled with destructive thoughts, beliefs and attitudes, incredibly normally because of early traumas or bad experiences. So why fully grasp the mother nature of your conscious and subconscious intellect? Due to the fact carrying out so will enable you to obtain healing, contentment and peace in your everyday living. At the time your mindful brain is informed of the contents of your unconscious brain-something that can be reached by way of hypnotherapy-you can then make intentional adjustments to your unconscious views, beliefs and attitudes. Generating adjustments can lead to a range of favourable outcomes: you can stop using tobacco, reduce excess weight, and even combat off anxiousness and depression. When you allow the conscious and subconscious areas of your brain perform alongside one another as a crew, terrific issues materialize. And you have earned to have terrific points transpire to you. When you make it possible for the acutely aware and subconscious components of your intellect to do the job collectively, excellent points occur. Great factors like quitting smoking cigarettes and getting rid of fat. Do you agree? We’d appreciate to hear your feelings and get to know you much better, so do not forget about to like us on Fb. And if you want to give us a shout-out, allow the earth know by using Twitter![ad_2] Check our related article here: thought elevator
<urn:uuid:4f2fe2e5-be62-4509-9774-fcadff8ec6bf>
CC-MAIN-2021-43
https://www.decisiondesk.com/great-things-happen-when-the-conscious-and-subconscious-minds-work-together/
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323583087.95/warc/CC-MAIN-20211015222918-20211016012918-00115.warc.gz
en
0.954584
676
2.53125
3
A needle biopsy (or punch biopsy) removes a slender core of tissue, as seen in the inset. In this specimen, cirrhosis is indicated by the presence of extensive masses and strands of connective tissue, which in turn suggests a history of chronic liver damage. (Cirrhosis is a non-specific descriptive term, equivalent to "sclerosis", "fibrosis", or simply "scarring".) A biopsy specimen represents a very small sample of an organ and must thus be interpreted with care to avoid mistaking an unusual sample for a pathological condition. For more informative images of cirrhosis, see WebPath or Milikowski & Berman's Color Atlas of Basic Histopathology, pp. 284ff. Comments and questions: email@example.com SIUC / School of Medicine / Anatomy / David Last updated: 25 January 2002 / dgk
<urn:uuid:674ceb36-ae51-4e61-82ed-04d891a3008b>
CC-MAIN-2015-27
http://www.siumed.edu/~dking2/erg/GI177b.htm
s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375099173.16/warc/CC-MAIN-20150627031819-00075-ip-10-179-60-89.ec2.internal.warc.gz
en
0.854236
190
3.046875
3
The same kinds of inoculation techniques used to keep infectious disease in check may work just as well in neutralizing misleading media coverage of climate change, according to a team of researchers in a paper published in PLOS. Climate change misinformation in the form of “fake experts” casts doubt on the overwhelming scientific consensus on global warming, the researchers say, and that typically has a polarizing effect on people’s attitudes toward climate change, especially those who most strongly support free-market ideas. But the authors find that by preemptively explaining the potentially misleading effect of false-balance media coverage — which gives equal weight to the views of a small minority of scientists versus an overwhelming majority who affirm human-caused climate change — news consumers gain resistance to that coverage. “An inoculating message,” write the researchers, ”fully neutralized the polarizing effect of misinformation.” When told of misleading techniques, they add, “free-market supporters resist being misled as they see this as a violation of their right to be well-informed.” Notes lead author John Cook, in an interview in The Guardian: “Explaining the techniques of denial can help people spot attempts to mislead them, hence neutralizing misinformation that uses those techniques.” In a separate report about more productive ways to talk about climate change, climate scientist Katharine Hayhoe told National Public Radio that it is best to avoid labels like “climate denier” and to instead use climate “dismissive.” She based her recommendation on the “Global Warming’s Six Americas“ work by the Yale Program on Climate Change Communication. Listen below for the full interview with Hayhoe.
<urn:uuid:146a5d12-292a-4c16-a3c7-c91be9fe72bb>
CC-MAIN-2018-09
http://e360.yale.edu/digest/a-shot-of-climate-consensus-may-inoculate-against-false-balance-say-researchers
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891814833.62/warc/CC-MAIN-20180223194145-20180223214145-00008.warc.gz
en
0.919339
354
2.515625
3
Selenium Certification Training - 29k Enrolled Learners - Live Class Testing the system against all odds is a challenging task and you need a tool which can help you in this process. One such predominantly used tool by Automation Testers is Selenium. If you are a beginner and wish to know how Selenium functions internally, then you have landed at the perfect place. In this article, I will give you brief insights about Selenium WebDriver Architecture. Below are the topics covered in this article: Selenium is an open source portable framework used to automate testing of web applications. It is highly flexible when it comes to testing functional and regression test cases. Selenium test scripts can be written in different programming languages like Java, Python, C# and many more. These test scripts can run across various browsers like Chrome, Safari, Firefox, Opera and also provides support across various platforms like Windows, Mac OS, Linux, Solaris. Selenium also supports cross browsing where the test cases run across various platforms simultaneously. It also helps in creating robust, browser-based regression automation suites and perform tests. I hope you understood the fundamentals of Selenium. Now let’s move further and understand various tools that are available in the Selenium Suite. Selenium is mainly comprised of a suite of tools, which include: Let’s understand the functionalities of each of these tools in more detail. IDE (Integrated Development Environment) is a Firefox plugin. It is one of the simplest frameworks in the Selenium Suite. It allows us to record and playback the scripts. If you wish to create scripts using Selenium IDE, you need to use Selenium RC or Selenium WebDriver to write more advanced and robust test cases. Next, let’s see what is Selenium RC. Note: Selenium RC is officially deprecated. Selenium WebDriver supports the following: Selenium Grid is a tool which is used together with Selenium RC. It is used to run tests on different machines against different browsers in parallel. Which implies – running multiple tests at the same time against different machines running different browsers and operating systems. So this was all about the Selenium Suite of Tools. Let’s dive deeper into this article and learn the functionalities and various components of Selenium WebDriver Architecture. In order to understand Selenium WebDriver Architecture, we should first know what is a WebDriver API. Selenium Webdriver API helps in communication between languages and browsers. Each and every browser has different logic of performing actions on the browser. Below image depicts various components of Selenium WebDriver Architecture. It comprises four main components which are: Let’s understand each of these components in depth. 1. Selenium Client Libraries/Language Bindings Selenium supports multiple libraries such as Java, Ruby, Python, etc. Selenium Developers have developed language bindings to allow Selenium to support multiple languages. If you wish to know more about libraries, kindly refer to the official site for Selenium libraries. 2. JSON WIRE PROTOCOL Over HTTP Client 3. Browser Drivers Each browser contains a separate browser driver. Browser drivers communicate with the respective browser without revealing the internal logic of the browser’s functionality. When a browser driver has received any command then that command will be executed on the respective browser and the response will go back in the form of an HTTP response. Selenium supports multiple browsers such as Firefox, Chrome, IE, Safari, etc. Now let’s move further and know how exactly Selenium functions internally with the help of the below example. In real time, you write a code in your UI (say Eclipse IDE) using any one of the supported Selenium client libraries (say Java). WebDriver driver = new FirefoxDriver(); driver.get("https://www.edureka.co"); Once you are ready with your script, you will click on Run to execute the program. Based on the above statements, the Firefox browser will be launched and it will navigate to Edureka website. Once you click on ‘Run’, every statement in your script will be converted as a URL, with the help of JSON Wire Protocol over HTTP. The URL’s will be passed to the Browser Drivers. (In the above code, I have used FirefoxDriver). Here, in this case, the client library (Java) will convert the statements of the script into JSON format and further communicate with the FirefoxDriver. WebDriver driver = new ChromeDriver(); driver.get("https://www.edureka.co"); If the request is POST request, then there will be an action on the browser. If the request is a GET request then the corresponding response will be generated at the browser end. It will be then sent over HTTP to the browser driver and the Browser Driver over JSON Wire Protocol and sends it to the UI (Eclipse IDE). So, that was all about Selenium WebDriver Architecture. I hope you understood the concepts and it added value to your knowledge. Now, if you want to get more insights into Selenium, you can check out the article on Selenium Tutorial. If you found this “Selenium WebDriver Architecture” relevant, check out the Selenium Certification Training by Edureka, a trusted online learning company with a network of more than 250,000 satisfied learners spread across the globe. Got a question for us? Please mention it in the comments section of Selenium WebDriver Architecture article and we will get back to you.
<urn:uuid:0f4bc57c-caa0-4bf7-90b5-2cbac4afd975>
CC-MAIN-2020-50
https://www.edureka.co/blog/selenium-webdriver-architecture/
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141189038.24/warc/CC-MAIN-20201127015426-20201127045426-00188.warc.gz
en
0.876913
1,147
2.90625
3
The Internet of Things (IoT) is the network of physical devices, vehicles, home appliances and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these objects to connect and exchange data[i]. The IoT is going to be transformational – significantly impacting most industries and parts of society. Experts estimate that the IoT will rapidly grow to 30 billion objects within just two more years[ii] (for comparison, in 2015, there were approximately 4.9 million things connected to the internet). Importantly, IoT will also play a major role in achieving “smart healthcare” to improve patient care/experience, efficiency, and outcomes. Hospitals already use many medical devices today (e.g. numerous monitoring and pump devices etc.), though mostly not in a very interconnected fashion. Presently, in most cases, there is a human (e.g. nurse) in the loop to ensure safety, because the devices in use have not been designed with the security in mind that is required for autonomous operation (e.g. monitoring). According to the latest research, US Department of Health plans to (eventually) save up to USD 300 billion from the national budget due to medical innovations[iii]. Such future medical device landscapes pose many cybersecurity and privacy challenges because most of these are “cyber-physical” systems where cybersecurity breaches (and other failures) would directly impact the physical safety of patients. Today, Medical IoT is not fully matured yet, leading to a disconnect: Health IT is increasingly interconnected, while information security is not keeping up. This limits “smart healthcare” improvements and health IoT in general: in this emerging environment, hospitals need to prioritize patient safety first, which means medical devices are often not integrated; since humans are usually in the loop, there isn’t much need for automation. This leads to inefficiencies, and patient care/experience is not as good as it could be. Yet, having humans in the loop actually creates its own risks. In this article we will present innovative approaches to cybersecurity that should be considered to securely integrate medical device landscapes (and many other IoT environments) in the coming years as IoT rapidly matures. The article is based on the results of several government-funded R&D projects, in particular a research project to secure a cyber-physical medical environment (for Defense Health Program, DHP), and a research project to automate access control policy testing (for National Institute of Standards and Technology, NIST). The presented approach comprises several parts: - Integrated Clinical Environment: OpenICE (https://www.openice.info/) is an initiative to create a community implementation of an Integrated Clinical Environment (ICE). The initiative encompasses not only software implementation but also an architecture for a wider clinical ecosystem to enable new avenues of clinical research. The OpenICE project is run by MD PnP. Our research uses the OpenICE reference implementation and DocBox’s implementation as an ICE layer. - Secure Device Communications: The Data-Distribution Service (DDS) (http://www.omg.org/dds/) provides secure publish-subscribe communications for real-time and embedded systems. DDS introduces a virtual Global Data Space where applications can share information by simply reading and writing data-objects addressed by means of an application-defined name (topic) and a key. DDS features fine and extensive control of QoS parameters. Our research uses RTI DDS Connext (https://www.rti.com/products/dds), a leading DDS implementation provided by Real-Time Innovations (RTI), Inc. OpenICE uses RTI DDS as a communications layer. - Security Policy Automation simplifies the management and technical implementation of security policies. It allows security professionals to manage rich security policies consistently in one place and often automatically technically enforce the managed policies across many devices, layers and technologies. Our research uses ObjectSecurity OpenPMF (https://objectsecurity.com), a leading security policy automation product, which generates technical policy enforcement for DDS, networks etc. from generic security policies and imported information about users, systems, applications, networks etc.
<urn:uuid:b1c2f207-e1a3-4534-a838-99eb9b0b2c40>
CC-MAIN-2018-30
https://objectsecurity.com/blog/2018/04/13/meddevsec/
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676594886.67/warc/CC-MAIN-20180723032237-20180723052237-00019.warc.gz
en
0.922057
855
3.046875
3
Do You Know How to Prepare for What “Hails” You? Hail happens, and it’s no fun. Not only does hail have the potential to wreak a lot of physical damage to your property, but it can also compromise life safety should you find yourself in the midst of a major storm system. Understanding what a hailstorm is and how to protect life and property during such an event will keep you and your loved ones feeling calm and level-headed the next time disaster strikes. A Closer Look at Hail Hailstorms are a lot more common than you might think. There are upwards of 5,400 hailstorms that occur in the U.S. each year, averaging some $720 million worth of damages. Because Colorado is one of the states where hail occurs most frequently, it’s in your interest to understand what causes hail and how to protect yourself against it. Hail occurs during thunderstorms with winds strong and severe enough to force raindrops upwards and back into the atmosphere. Once the raindrops are introduced to the extremely cold air, the drops are quickly frozen and harden into spheres of ice. This can actually happen several times, causing balls of ice to fall and rise back into the atmosphere, collecting more moisture and condensation throughout the process. For this reason, hail can be very small in size, or can even grow to the size of golf balls or softballs. Although all hail is dangerous, the larger the balls of ice grow to be, the more hazardous they become. Life Safety During a Hailstorm As you can imagine, large balls of ice falling from the sky can cause serious injury and physical trauma to humans and animals alike. If you believe that a hailstorm is imminent, it’s important that you bring your pets indoors or direct your farm animals to indoor shelters. Once hail begins to fall, you and your loved ones should seek shelter indoors in a location away from doors and windows that could be shattered by falling hail. If you are driving, pull over to the side of the road, cover your neck and head, and wait until the storm passes. In the event that the hail has cracked your windshield, it is advisable to call a tow truck or glass repair company and address the damages prior to attempting to drive. Protecting Property During a Hailstorm Hail can also cause a great deal of damage to buildings, vehicles, and other physical property. If you know that a hailstorm could be coming, you may be able to take steps to minimize or prevent damages from occurring. Moving your vehicles into a garage or shelter, or covering your vehicles with a tarp could prevent hail from creating dents or shattering glass. It’s also wise to trim your trees and to remove any dead branches that could be thrust through windows or glass doors as a result of high winds during a hailstorm. You might also consider installing storm shutters to protect your windows from hail and wind. After the Storm Once the storm has passed and you’ve received the “all clear” from your local weather station, it’s time to assess the damage done to your property. Has your roofing been compromised by the hail? Has your siding been dented up by hail or damaged by wind? Have the heavy rains resulted in flooding? Making note of damage promptly, taking photos, and obtaining a repair quote from a trustworthy contractor can help you with your insurance claims. When you need help assessing the damages after a hailstorm or require assistance in repairing those damages, Abbotts Fire & Flood will have your back.
<urn:uuid:49103abb-7063-4978-ac59-a7ff4e6379eb>
CC-MAIN-2023-14
https://abbottsfireandflood.com/blog/do-you-know-how-to-prepare-for-what-hails-you/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949331.26/warc/CC-MAIN-20230330132508-20230330162508-00293.warc.gz
en
0.951994
752
2.640625
3
North Carolina has a wide diversity of ecosystems and species. From elk to red wolves, from Venus fly traps to bobwhite quail, the state is home to more than 825 species of fish and wildlife, 175 species of butterflies, and over 625 flora species. The “top nine” list obviously doesn’t include all the special places the state offers hunters, anglers, campers, paddlers, hikers, photographers or birders, but it tries to capture a cross-section of North Carolina’s beauty and uniqueness. A brochure highlighting just what makes the Little Tennessee River so special suggests a novel way to explore the mountain aquatic ecosystem: by donning a snorkel mask and glimpsing life below the surface. “It’s a fantastic place to go ‘fish-watching.’ It’s like bird-watching in the water,” according to the Wildlife Federations’ write-up on the river. “Pull on a dive mask and a snorkel, and you can slowly ease your way into riffles and the heads and tails of pools and check out some of the most brilliantly colored wildlife on display.” In particular, from April to June, hundreds of fish can be seen swarming over gravel mounds built up on the river bottom as spawning grounds by the fish themselves. The phenomenon is also a testament to how interdependent species are to one another in the aquatic ecosystem. The large gravel nests built by river chubs in turn attract a host of other fish. “Scientists have counted at least 13 other fish species that spawn over bluehead chub nests (there may be many more) and at least one, the gorgeous yellowfin shiner, rare in North Carolina, appears to require chub nests for successful spawning,” according to the Wildlife Federation. Other spots on the “top nine” wildlife list include: • Green River Game Land, mountains • Wilson Creek, mountains • Stone Mountain State Park/Thurmond Chatham Game Land Complex, mountains • Cowan’s Ford Wildlife Refuge, Piedmont • Hanging Rock State Park, Piedmont • Roanoke River, coast • Pocosin Lakes National Wildlife Refuge-Pungo Unit, coast • Alligator River National Wildlife Refuge, coast
<urn:uuid:544e2e5c-a777-4f22-9c2f-95a543bd0caf>
CC-MAIN-2015-40
http://smokymountainnews.com/outdoors/item/9452-little-tennessee-heralded-for-wildlife-spotting
s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443737956371.97/warc/CC-MAIN-20151001221916-00226-ip-10-137-6-227.ec2.internal.warc.gz
en
0.905365
488
2.734375
3
Cementing the coalition, Sen. Christopher Dodd (D‐Conn.) and Rep. Vernon Ehlers (R‐Mich.) have recently proposed a bill to create a national curriculum in reading and math. The bill’s supporters rightly tell us that by the end of high school, American students have fallen behind their international peers. Dodd and Ehlers use that observation to conclude that we need such a curriculum “to compete in the global economy.” But how exactly would homogenizing our curriculum and testing make us more competitive? “National standards would help propel U.S. economic competitiveness, because they would allow the country to set expectations higher than those of our international competitors,” write Rudy Crew and Paul Vallas, the superintendents of the Miami and Philadelphia school districts, in a recent Education Week commentary. This idea of higher standards has a certain appeal. In many other areas of life, higher standards are associated with better performance. It’s much harder to qualify for a U.S. Olympic team than for a typical high school sports team — and Olympic teams are demonstrably better. Japanese automakers generally set higher reliability standards in the 1970s than did American automakers, and they produced more reliable vehicles. But sports and manufacturing are competitive fields, while public schooling currently is not. Standards advocates mistakenly assume that high external standards produce excellence, but in fact it is the competitive pursuit of excellence that produces high standards. We understand this point implicitly in every field outside of education. We didn’t progress from four‐inch black‐and‐white cathode ray tubes to four‐foot flat panels because the federal government raised television standards. Apple did not increase the capacity of its iPod from 5 to 80 gigabytes in five years because of some bureaucratic mandate. And the Soviet Union did not collapse because the targets for its five‐year plans were insufficiently ambitious. Progress and innovation in these and almost all other human endeavors have been driven by market incentives: consumer choice, competition among providers, the profit motive. The absence of these incentives — as in the Soviet Union — has led to economic decline and collapse. Not surprisingly, the link between standards and performance in public schooling is noticeably weaker than it is in other areas, because government schooling is a monopoly, not a market. Existing federal education laws reaffirm the point that standards, in the absence of market forces, do not improve results. A 2006 Harvard University study by Jaekyung Lee found that the No Child Left Behind Act “did not have a significant impact on improving reading or math achievement,” and “has not helped the nation and states significantly narrow the achievement gap.” The only industrialized nation the United States beats in 12th grade science is Italy, which has a national curriculum. Two nations that beat us at the 12th grade level in both mathematics and science, Canada and Australia, do not. While some nations with national standards also do well — Japan, for instance — it does not follow that they do well because of the standards. National curriculum advocates are thus wrong on both theoretical and empirical grounds. But it gets worse, because their recommendation would actually impede the very forces that could improve American education. Specialization and the division of labor are essential to the effectiveness of the market. If all schools conformed to a single curriculum, it would drastically reduce their ability to compete and thus their incentives to improve. Instead of a diverse menu of schools specializing in fine arts, applied sciences, or international relations, families would be offered a uniform educational gruel. Michael Petrilli, a scholar at the Fordham Foundation, recognizes the role of competition in education, but contends that national standards are necessary to facilitate it. “In order for any market to work effectively,” Petrilli claims, “consumers need good information,” and in his view, that information can only be delivered by a national system of standards and tests. Yet around the world, free education markets are already thriving with no such standards in place. One such market exists in the United States: after‐school tutoring. Tutoring services like Sylvan Learning Systems (a rapidly growing U.S. company) and Kumon (a Japanese firm with millions of students in scores of countries) have arisen with no government involvement whatsoever. And Japanese and Americans alike acknowledge the contribution these services have made to student achievement. Toshio Sawada and Sachino Kobayashi of the Japanese National Institute of Educational Research remarked that without their nation’s multi‐billion dollar tutoring industry, “the [international] success of Japan in the area of education would be unthinkable.” Few American wonks and pundits realize that there is a vast body of international academic literature comparing market and bureaucratic school systems, and that it favors markets in academic achievement, efficiency, responsiveness to parents’ demands, and even the maintenance of physical facilities. As I noted in a 2004 review of that literature, the statistically significant results for achievement and efficiency favor markets by a 10 to one margin. By contrast, there is no evidence that imposing government standards improves the performance of true education markets. On the contrary, by placing all intellectual eggs in the same basket, a single national curriculum would hobble competition and magnify the damage done by every bad decision. As Jared Diamond so compellingly argued in his Pulitzer Prize winning Guns, Germs, and Steel, diversity is as important to the health of human societies as it is to the survival of ecosystems. We need education diversity as much as we need biodiversity. A dynamic, competitive system is better able to survive mishaps than a monolithic, centralized one. It is ironic that standards advocates exhort us to improve our schools in response to competitive pressures from abroad, but then discount the ability of the same competition and consumer choice to drive improvement at home. It is the competitive pursuit of excellence spurred by market forces that drives up standards, not the other way around. The sooner we realize that, the better off our children will be.
<urn:uuid:d9fc906d-347e-42d2-8aae-b4d8becb8f6d>
CC-MAIN-2021-10
https://www.cato.org/commentary/education-standards-are-not-answer
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178368608.66/warc/CC-MAIN-20210304051942-20210304081942-00346.warc.gz
en
0.959141
1,233
2.953125
3
The MIT Press, Cambridge, MA, 2001 608 pp., 268 illus., This is the first textbook that provides a thorough, comprehensive and unified introduction to the field of learning from experimental data and soft computing. Support vector machines (SVMs) and neural networks (NNs) are the mathematical structures, or models, that underlie learning, while fuzzy logic systems (FLS) enable us to embed structured human knowledge into workable algorithms. The book assumes that it is not only useful, but necessary, to treat SVMs, NNs, and FLS as parts of a connected whole. The theory and algorithms are illustrated by 47 practical examples, as well as by 155 problem sets and simulated experiments. This approach enables the reader to develop SVMs, NNs, and FLS in addition to understanding them. The book also presents three case studies on: NNs based control, financial time series analysis, and computer graphics. A solutions manual and all of the MATLAB programs needed for the simulated experiments are available. Learning and Soft Computing provides a clearly organised book focusing on a broad range of algorithms and it is aimed at senior undergraduate students, graduate students and practising researchers and scientists who want to use and develop SVMs, NNs and/or FL models rather than simply study them. The book is rich in graphical presentations (268 illustrations). The insight obtained through the simulation experimenting and graphical presentation of the results enables faster and better understanding of initially 'difficult' matrix-vectorial notations present in the field. This, we hope, will enable self-study
<urn:uuid:9c71e993-e89e-4d02-b373-0c8590c12112>
CC-MAIN-2021-43
http://support-vector.ws/index.html
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587767.18/warc/CC-MAIN-20211025185311-20211025215311-00366.warc.gz
en
0.885667
347
2.59375
3
Kettlebells have enjoyed growing popularity as a full-body training tool for improving cardiovascular health and musculoskeletal fitness. Yet for all the enthusiasm among personal trainers, experimental research on the effects of KB training was scant until last year, when studies began showing up in peer-reviewed journals. Here are the recent research findings on KB training. Study 1. Metabolic Demand of Kettlebell Training Hulsey, C.R., et al. 2012. Comparison of kettlebell swings and treadmill running at equivalent rating of perceived exertion values. Journal of Strength and Conditioning Research, 26 (5), 1203–07. Experimental question. The two-handed KB swing is generally viewed as a foundational training approach for KB training. Researchers wanted to determine whether performing continuous KB swings would create an energy cost capable of improving cardiorespiratory fitness. To find out, they compared the metabolic demand of KB swings to treadmill running at equivalent ratings of perceived exertion (that is, subjective assessments of exercise intensity). Subjects. Thirteen subjects (11 male, 2 female, average age = 21.4, average height = 69 inches, average weight = 170 pounds, average BMI = 23.5) volunteered for the study. All were deemed moderately trained and had no KB experience. Prior to testing, a certified KB instructor familiarized them with the two-handed KB swing exercise. Study procedures. In the first experimental trial, subjects performed 10 minutes of two-handed KB swings, alternating 35-second swing bouts with 25 seconds of rest. The men used a 16-kilogram KB, and the women an 8 kg KB. Subjects were encouraged to maintain a steady swing count averaging 22–25 per minute. A certified KB instructor gave continuous feedback, helping subjects maintain correct swing execution and posture. After 48 hours of rest, study participants returned to the testing lab and completed a 10-minute treadmill run at a subjective intensity (RPE of 15.3–15.5 on a 6–20 scale) equivalent to what they experienced during the KB swing trial. An automated metabolic gas analysis system commonly used in exercise studies measured oxygen consumption and kilocalorie expenditure. The final 7 minutes of each work bout were used for data analysis. Results and discussion. Table 1 compares key cardiovascular and metabolic values obtained in this investigation. At an equivalent subjective RPE, subjects had no significant difference in heart rate. Oxygen consumption and calorie expenditure were significantly higher for treadmill running than they were for KB swings. However, it should be noted that subjects completed both 10-minute exercise bouts at above 85% of their age-predicted maximum heart rate. Thus, KB swings, albeit for just 10 minutes in this investigation, did elicit a physiological response necessary for improving cardiorespiratory fitness. The study did not determine an optimal KB workout duration or a weekly frequency necessary to obtain a meaningful improvement in cardiorespiratory fitness; further research is needed to answer those questions. However, the kilocalorie expenditure (375 kcal) obtained from this study suggests that KB training is a viable exercise option for inclusion in a weight loss program. To read additional studies, please see “Kettlebell Research Update” in the online IDEA Library or in the January 2013 issue of IDEA Fitness Journal.
<urn:uuid:e68545fc-97bc-4b38-a7b0-c8c735b427d0>
CC-MAIN-2015-35
http://www.ideafit.com/fitness-library/kettlebell-research-what-science-says
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645258858.62/warc/CC-MAIN-20150827031418-00022-ip-10-171-96-226.ec2.internal.warc.gz
en
0.937678
675
2.53125
3
Latest video updates related to Coronavirus. Watch this “Traveling with "The Green Book" during the Jim Crow era” video below: Racism was a chilling fact of life that, in 1936, inspired “The Negro Motorist Green Book,” a guide to businesses that welcomed African American travelers who faced being turned away or threatened in a time of segregation. Martha Teichner talks with cultural historian Candacy Taylor about the importance of this guide to safe travels in the Jim Crow South. Subscribe to the “CBS Sunday Morning”…..(read more)
<urn:uuid:a43fa37b-c5ea-407c-b8b1-4ea23bf62b1c>
CC-MAIN-2021-31
http://bestdealstotravel.com/traveling-with-the-green-book-during-the-jim-crow-era/
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046149929.88/warc/CC-MAIN-20210723143921-20210723173921-00683.warc.gz
en
0.920408
123
2.5625
3
According to blackdrago.com an Amphiptere is a hybrid from European heraldry. It is part snake and part bird or bat. Heraldry is a broad term, encompassing the design, display, and study of armory or armor, as well as related disciplines, such as vexillology (flag design,) together with the study of ceremony, rank, and pedigree. Throughout Europe, the amphiptere was widely feared, so all who displayed it on their coat of arms would be perceived as particularly fearsome in battle. Despite the origin of the word, amphipteres can be found all over the world predating the European counterpart. For example, Ancient Egypt had many amphipteres, and the Mesoamerican Plumed Serpent Quetzalcoatl takes the form of the amphiptere. According to Mexico Unexplained, By the time of the Spanish Conquest, Quetzalcoatl had become known as the plumed serpent god who came from a long tradition of similar representations. The earliest reference to the feathered serpent deity in ancient Mexico appears in the Olmec times, around 900 BC at the city of La Venta in the modern-day Mexican state of Tabasco. While not as “fleshed out” as the later representations of Quetzalcoatl, the Olmec plumed serpent shows that the iconography of feathered snakes dates back thousands of years. The first major civilization in ancient Mexico to adopt on a widespread basis what has been commonly recognized as Quetzalcoatl was Teotihuacán. The massive ancient city with its Avenue of the Dead, its gigantic pyramids of the Sun and Moon also had a temple dedicated to the feathered serpent god. The iconic heads sticking out of stone abutments are easily recognizable. As this city-state had no writing system and Teotihuacán collapsed about a thousand years before the arrival of the Spanish, archaeologists and ethno-historians know very little about the feathered serpent god and how it fit into this civilization. It is unclear whether or not this plumed snake deity at Teotihuacán had many or any of the attributes of the later god known as Quetzalcoatl found in other parts of Mexico. According to Wikipedia, Amphipteres generally were said to have greenish-yellow feathers, a serpentine body similar to a lindworm, bat-like green wings with feathered bone, and an arrow-tipped tail much like a wyvern‘s. Others are described as entirely covered in feathers with a spiked tail, bird-like wings, and a beak-like snout. Uncommon however, is the description of an Amphiptere with legs. Wikipedia documents Amphitheres as being featured in the Dragonology series of books, which employ a conceit that dragons are real. It also appears in Dracopedia: A Guide to Drawing the Dragons of the World. Guest Writing Prompt from Charity Hume In Indiana Jones and the Raiders of the Lost Ark, Harrison Ford gets a laugh when, after riding through Amazonian rapids, stealing a grave idol, fighting off warriors and flying through the air like Tarzan, he then confesses that he’s mortally afraid of snakes. We may not all be Indiana, but many can identify with his squeamish fear. In this exercise, list the creatures or settings that especially scare you. My list includes both situations and objects: heights, snakes, dentist appointments… (I could go on!) When you look down that list, one of the entries will have a particular charge of energy. Circle that one and commit to writing about that phobia for today. Once you’ve chosen it, stick with it and don’t waffle. Write for a page about this fear, and associate to every time you can remember any physical encounter with this object: the day you stepped on a jellyfish, the time your mother insisted you eat okra. As you write, don’t worry if there are several different memories crowding in your mind. Let them lead you to different experiences and fully explore them all as you give yourself permission to remember them in detail. Use every sense you can as you communicate the details. Once you’re done, you will have interesting footage. From here, you can consider a story or poem that uses your imagery and feelings. Try to be specific and realistic, as you tell the story of the cockroach you saw your first night in the Brooklyn apartment, the opossum on the road, the barn spider that first week in Canada. You can also create a fictional character who shares your phobia. Let your character explain the fear to another character, or write a character’s “interior monologue.” Use your “footage” freely and give this fictional character a human weakness. If you find this fun and interesting and decide to expand on this story- let me know how this story continues in the comment section below, and as usual…happy writing!
<urn:uuid:08f63e02-2b78-4375-9fb1-2bd07258a6bc>
CC-MAIN-2021-17
https://arjungwriter.com/2019/07/25/mythological-creature-amphiptere-a-european-hybrid-snake-and-bat-or-bird-with-similar-comparisons-from-other-cultures-with-guest-writing-prompt-about-snakes/
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038088264.43/warc/CC-MAIN-20210415222106-20210416012106-00522.warc.gz
en
0.955791
1,046
3.6875
4
Domestic Violence: A National Epidemic According to the National Coalition Against Domestic Violence, “Domestic violence is the willful intimidation, physical assault, battery, sexual assault, and/or other abusive behavior as part of a systematic pattern of power and control perpetrated by one intimate partner against another .” Domestic violence is present in every community across America. It shows no favoritism or bias. It can happen anywhere. It cuts across all ethnic groups, economic classes, religions, sexual orientations, ages, and genders. A Shocking Reality Victims suffer from psychological trauma, physical abuse, and even death. What starts as emotional abuse often escalates physical violence. …includes behaviors that physically harm, arouse fear, prevent a partner from doing what they wish; …includes the use of physical and sexual violence, threats and intimidation, emotional abuse …different forms of domestic violence/abuse can be occurring at any one time within the same intimate relationship. - Nearly 20 people per minute are physically abused by an intimate partner in the United States. More than 10 million a year * - 1 in 3 women and 1 in 4 men have experienced some form of physical violence by an intimate partner * - 1 in 7 women has been stalked. Stalking causes the target to fear they or someone close to them will be harmed or killed * The impact extends beyond the targeted individual and affects the entire family. Even those who are just witnesses are severely impacted, especially children. This manifests as fear, anxiety, depression; self-abuse, hostility, and suicide. The damage can last a lifetime.* Protection orders alone may not be enough to prevent an offender from re-assaulting a targeted individual. All too often the offender returns to attack again. Being charged with a crime doesn’t stop them. The fact is, victims can be at risk at any time and place. The following independent agencies advocate on behalf of victims, work for societal change, and can offer immediate help. National Coalition Against Domestic Violence is a not for profit organization dedicated to supporting survivors, holding offenders accountable and supporting advocates. To get information or guidance for yourself or someone else they can be reached at 1-800-799-7233 or https://ncadv.org/get-help. National Domestic Violence Hotline provides lifesaving tools and immediate support to empower victims and survivors to find safety and live free of abuse; provide support to friends and family members who are concerned about a loved one. https://www.thehotline.org/help 1−800−799−7233 This information is offered as a public service for anyone seeking additional guidance on this matter. Sentinel does not offer an opinion and neither agrees or disagrees with specific positions of these organizations. victims can be at risk at any time and place. Real-world tools to help in the fight A Monitoring Program for Victims Keeping the victim away from their attacker is an important step. When the violence stops, recovery can begin. We are proud that Sentinel Offender Services offers help to combat the problem. The Domestic Violence Monitoring program delivers the highest level of electronic monitoring that we offer and can have the greatest positive impact. In cooperation and coordination with local law enforcement agencies across the US thousands of victims and their attackers have been monitored through this program. Victims sleep easier at night when they are in the program. They know that they will be alerted if the attacker gets too close. The program combines the services of our industry-leading National Monitoring Center with proven electronic monitoring technology and provides: - Simultaneous location tracking that compares the location of offenders and victims - Advanced notification to victims if a would-be assailant breaches an exclusion zone - Up-to-the-minute information to law enforcement to take appropriate action - 24 hour a day location monitoring that gives victims extra peace of mind in their daily lives Participation in the program for the victim is entirely voluntary and is available with multiple levels of coverage. Specific locations, such as the victim’s home or work, are identified as stationary exclusion zones and monitored 24 hour-a-day. Mobile Exclusion Zones are established to follow the victim as they travel throughout the community. When carrying a small GPS device, the area surrounding the victim -from hundreds of feet to tens of miles- is monitored 24 hours a day. Should the offender breach any exclusion zone, specially trained operators in Sentinel’s 24/7 National Monitoring Center calmly notify the victim and law enforcement. They can then execute an appropriate safety plan. Law enforcement officials can take action. In every level of the program the victim is given advance notification of potential contact with the offender. Programs for the Offender When the offender stops offending, everyone wins. Sentinel delivers cognitive skills training to help in this effort. Courses address the root causes of violence and provide tools to make better decisions. According to leading psychologists and criminologists, addressing the root causes of violence can help avoid it in the first place. Topics that are covered include: - Anger Management - Parenting and Family Values - Substance Abuse - Making Changes for Good The courses work on cognitive restructuring. The offender develops self-awareness, self-control, and positive relationship management skills. For information on Domestic Violence Monitoring Program or any community-based cognitive skills program: * “WHAT IS DOMESTIC VIOLENCE?”, National Coalition Against Domestic Violence
<urn:uuid:f7d3a1ba-63f0-4e1c-9bdd-4e0f24f9894e>
CC-MAIN-2022-49
https://sentineladvantage.com/domestic-violence-a-national-epidemic/
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710974.36/warc/CC-MAIN-20221204140455-20221204170455-00400.warc.gz
en
0.922722
1,116
3.078125
3
How To prevent Alzheimer's and Dementia What pre-dementia symptoms events do you have the most off? Dementia is actually a term for many forms of memory loss. Alzheimer's Disease is a severe form of Dementia. Some forms of dementia can be prevented and possibly reversed, especially if it was a stroke sometimes people can't talk at first but if they try to keep talking and work at it sometimes they can bounce back, this type is vascular dementia it is defined by damage caused to your brain by stroke or heart attack. or bleeding stroke. Head trauma is one of the main causes of dementia.I have spent most of my adult life caring for Alzheimer's and Dementia clients and as an activities director, it is necessary for me to learn all I can to help clients in the best way possible. Alzheimer's can be "set back" or prevented in a way, but it cannot be avoided altogether. With Alzheimer's, the only real way to officially tell is an X-ray. Many people are afraid they have dementia, lots of times they are undernourished and sleep deprived or just plain overworked. People who stress out need to take time out and relax. Stress can cause high cholesterol which clogs arteries, which is connected to strokes and heart attacks and can affect people with vascular dementia. Sometimes urinary track infection or thyroid problems mimic dementia. Be sure to check those first. One Doctor told me that people who have to multitask need time to walk or exercise and sort themselves out, because they are burdened daily with too much. This can cause symptoms of dementia as well. Things you can do to help - Walking and being aware of your surroundings, don't put on the i pod and tune out, take it all in naturally. - Tai chi is helpful for Parkinson's Disease and new breakthrough studies say it helps with dementia as well. - Word search and Crossword puzzles help too. - Practice basic math & arithmetic - Exercise and weight training, keeps you focused and strong - Plan a party & have an adult conversation or visit friends - Laugh for one minute it releases endorphin's to relieve stress - Old fashioned games like charades & card games - Any cognitively stimulating activities, clubs and organizations help. - Eat antioxidant foods, blueberries,cranberries,apples, cherries and plums. Believe it or not number one is red beans! Also coconut oil, milk & vitamin C too are helpful. - Take care of a pet they are comforting and help you to remember to care for it. - One cup Coffee in the morning can help you be more awake, but too much can constrict blood supply. Great ideas for relaxation More of Mindy's hubs - mindyjgirl on HubPages Welcome! My maiden name was Ray...I like to think I am a ray of sunshine to those around me. Me: HAPPILY married and have four children... Many people are afraid they have dementia, lots of times they are undernourished and sleep deprived or just plain overworked. Get plenty of rest drink your daily amount of water and see if you react better to life situations. Use crutches like: - Using the pill boxes with the days of the week on it. - A diary really helps too write down things you did everyday and use it like a to do list too. - Keep a calendar and write down appointments up on the fridge. - Take time out and relax, detox with a cup of green tea. - If its too noisy and hectic in the house lock yourself in the bathroom and give yourself a nice long hot bath. - Take a ride out to the lake and listen to your favorite CD. - Write down all the things that bother you and then decide if you really want to change things and how you want to change it. Some people are in denial about having dementia. It is important to identify the facts if you have it and prepare for your future. Start making plans about who will help take care of you and your finances. Who will take care of you when you cannot cook or clean. Sometimes just having a caregiver come in and fix meals and help you with taking medications will take the burden off off you and your family.
<urn:uuid:1a198c2f-a348-45a7-a817-ad5673a779fd>
CC-MAIN-2017-22
https://hubpages.com/health/Alzheimers-and-Dementia-Prevention
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463608633.44/warc/CC-MAIN-20170526032426-20170526052426-00079.warc.gz
en
0.949356
886
2.765625
3
In April 2010, 100 dogs had their throats slit or were shot when a sled operator no longer needed them. In 2009, 100 dogs were found emaciated, chained, and near death in Québec, Canada, and three dead dogs who had been used for sledding were found chained to stakes and frozen to the ground in Canada’s Northwest Territory. In April 2008, a Montana dog-sledding operator pleaded guilty to cruelty to animals after abandoning 33 chained dogs and allowing them to starve. In May 2006, authorities in British Columbia seized 51 emaciated, dehydrated, and sick dogs from a kennel that provided dogs for sledding. In 2005, Krabloonik Kennels in Colorado—the largest dog-sledding operation in the continental U.S.—generated a considerable public outcry when its manager admitted that dogs who didn’t “work out” were killed by a gunshot to the head and dumped into a waste pit. Krabloonik’s manager shrugged off the killings, saying, “[Culling dates] back hundreds of years. This is nothing new. … This is part of the circle of life for the dog-sled dog.” Supporters are now helping to My hope is that this petition will open up the eyes of people who are unaware of what happens behind the scenes to these innocent dogs. As well as of course, to put a halt to this unnecessary barbaric event that gives people false insight to what it truly going on. This cruel race should end -- but until then, Iditarod organizers need to enact further reforms, including time limits on dogs'… Inspired 27 signatures Viewed 565 times
<urn:uuid:893f2ad5-357e-489e-a08b-191a6150985f>
CC-MAIN-2016-07
https://www.causes.com/posts/900990
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701166222.10/warc/CC-MAIN-20160205193926-00168-ip-10-236-182-209.ec2.internal.warc.gz
en
0.963396
353
2.578125
3
National PTA believes that students need access to information in order to explore and experience the diversity of ideas in a pluralistic society. PTA recognizes and supports the rights of parents to guide their children in choosing appropriate reading and educational materials. PTA supports the rights of both public libraries and school libraries to provide materials and information that include all points of view on current and historical issues and that are free of censorship based on bias, partisanship or doctrinal disapproval. National PTA urges its members at all levels to monitor, support and advocate for laws, regulations, policies and programs that: - Support a person’s right to use a library without bias because of origin, age, background or view. - Encourage the establishment of local school system policies to ensure the rights of educators, parents, students and other community members to assume roles in the evaluation, selection and adoption or removal procedures for instructional materials and of school library materials used by children in public schools. - Provide schools with materials that are free of bias, challenging and interesting to students, providing a means to explore ideas and concepts, make informed judgments and expand students’ access to a variety of resources. - Present the diverse racial and ethnic heritages of this country, and the contributions of all groups in the educational materials and textbooks used by our schools. - Portray accurately the role and contribution of both men and women of all racial, regional and occupational groups in textbooks and materials used by our public schools. - Maintain school libraries and media centers in all public schools with the support of school boards and, when needed, PTAs and communities. This position statement was written to update and combine resolutions and position statements concerning “Libraries and Educational Material.” The original resolutions and position statements will be archived in the Historical Records as reference on this issue. Libraries, Public Schools and Censorship; Library Bill of Rights; Textbook Credibility; Parents’ and Students’ Role in the Selection, Review, and Removal of Educational Materials; School Libraries/Media Centers and the PTA **Please refer to position statement entitled “Mass Media” for further information on pornography and children’s access to pornographic material.
<urn:uuid:efecb285-9277-423d-bf22-8ed43ea88d92>
CC-MAIN-2021-04
https://www.pta.org/home/advocacy/ptas-positions/Individual-Position-Statements/Position-Statement-Libraries-and-Educational-Material
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610704839214.97/warc/CC-MAIN-20210128071759-20210128101759-00060.warc.gz
en
0.938801
455
3.09375
3
Once again, tragedy looms over Brazil. Last Friday, for the second time in less than four years, a tailings dam broke in the State of Minas Gerais—this time in the municipality of Brumadinho—leaving catastrophic human and environmental damage in its wake. Once again, the losses are incalculable. We’re faced with disappearances and death. We see the same, disconcerting images: survivors evacuated by helicopter; trees, animals, and homes covered in toxic sludge; a swollen river carrying mining waste downstream. Once again, nature and society have been damaged, torn apart. As if in an endless loop, the tragedy has repeated in Minas Gerais. Five similar incidents, at least of which there is evidence, occurred in 1986, 2001, 2007, 2014, and 2015. The tragedy in November 2015 in the city of Mariana is considered the worst environmental disaster in the history of Brazil. It destroyed the town of Bento Rodrigues and contaminated the Doce River basin, carrying toxic sludge all the way to the Atlantic Ocean. Far from isolated events, the failures of mine tailings dams have become a common occurrence, and statistics suggest we can expect many more in the future. Like any infrastructure work, a dam has a certain useful life—a period of operation with a firm beginning and end. That period is based on the dam having adequate design, execution, and maintenance, something that often does not occur. Thanks to the World Information Service on Energy’s Uranium Project, we know that over the last 30 years there have been 73 accidents or incidents involving mine tailings dams worldwide. The United States (17), China (8) and the Philippines (7) lead the list of affected countries. The project’s database offers an account of the main accidents and indicators including breakdowns, overshoots, collapses, partial failures, and lining ruptures. These figures should lead us to reflect on large-scale mining, particularly metal mining, which requires these types of dams and impoundments. Instead of continuing to build mines, wouldn’t it be better to concentrate our efforts on recovering and reusing the metal we discard? When will we transition to a circular economy that avoids such catastrophes? How many more disasters can our ecosystems and our human populations endure? Quite often, affected communities do not have objective or sufficient information about the benefits and harms of the mining projects proposed near their homes. Breaking that information gap is urgent. At AIDA we contribute to this task by providing useful information about the potential harms of mining, and using it to strengthen legal actions undertaken to protect people and the environment. It’s urgent that the governmental, non-governmental and private sectors do whatever is necessary to avoid more tragedies like those we’ve seen in Brazil. They must make a conscious decision to put the value of people and nature above profit. For more information, consult the database of major tailings dam failures: http://www.wise-uranium.org/mdaf.html 73 tailings dams have failed over the last 30 years, wreaking havoc on the environment and affected communities: https://t.co/G6xZibNIAk — AIDA Americas (@AIDAorg) January 28, 2019
<urn:uuid:e6ce4476-7380-4883-8f00-71f47d0b73a7>
CC-MAIN-2019-09
https://aida-americas.org/en/blog/mine-tailings-dams-a-history-of-failures
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247495001.53/warc/CC-MAIN-20190220125916-20190220151916-00261.warc.gz
en
0.922978
691
3.546875
4
Deconstructing 'Guilt' and 'Shame' Updated: Aug 30, 2021 "Guilt is the inner experience of breaking the moral code. Shame is the inner experience of being looked down upon by the social group." (Fossum and Mason, 1986: Facing Shame) We tend to overlap 'guilt' and 'shame' in therapy. But, one can improve their skills in separately identifying the both of them, by examining the following definitions of the two emotions: Guilt: internal sense of malevolent power, a feeling of deep personal destructiveness Shame: powerless vulnerability, chronic risk of exposure to the criticism of others
<urn:uuid:e7090797-51b2-427d-9594-26cecea927bf>
CC-MAIN-2023-23
https://www.aishwaryabhalla.com/post/deconstructing-guilt-and-shame
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652235.2/warc/CC-MAIN-20230606045924-20230606075924-00328.warc.gz
en
0.937798
138
3.234375
3
Q. How can I find a primary source on James Madison? To find primary sources for your research on James Madison, I suggest you access our History research guide: http://library.uhd.edu/history?hs=a . Select the Primary Source Documents tab, and start with the first database AAS Historical Periodicals Collection. Search other sources listed in that guide especially American Periodicals. You may also want to access our short tutorial on primary sources; see the link in the left box on the same page.
<urn:uuid:42b1f809-8826-425f-bbe2-990f61fa0674>
CC-MAIN-2020-16
http://answers.library.uhd.edu/faq/244170
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370492125.18/warc/CC-MAIN-20200328164156-20200328194156-00004.warc.gz
en
0.865231
106
2.734375
3
How much does diet affect the cancer patient? Do “antioxidants” really play an important role in health, or are they causing more cancers than they cure? And what exactly is the relationship between obesity and cancer? “In our clinical practice, cancer patients often ask ‘Doctor, is there something specific I should eat or avoid eating?’” says Dr Luca Mazzarella of the European Institute of Oncology, Milan, Italy, guest editor of this special issue. “This ecancer special issue tries to equip the practicing oncologist with an up-to-date and critical collection of evidence to provide the best answer to this question.” The relationship between cancer and metabolism was overlooked for decades— metabolism has long been typecast as an uninteresting research subject. But the past five years have seen an incredible surge of interest. Now, it seems that every cancer-related article in the popular press claims a new connection between food and cancer—whether positive or negative, or sometimes both. Take the relationship between cancer and obesity, for example. As Mazzarella explains, the molecular mechanisms underlying the links between cancer and obesity have not been properly studied and are poorly understood, leading to mixed messages. “As the scientific community is insecure on what messages it should deliver, administrators are uncertain as to what exactly to recommend, and consumers are confused about whom to believe,” he explains. “This leaves the field flooded with pseudo-scientific recommendations that are hard to eradicate.” Antioxidants are another area where the juggernaut of popular belief has outpaced the scientific understanding of their role in cancer. Dr Marco Giorgio of the European Institute of Oncology prepared an expert review on the “unfulfilled promise” of antioxidants in cancer. “In 2013, researcher Jim Watson wrote in Open Biology that antioxidant supplementation ‘may have caused more cancers than they have prevented,’” Giorgio writes. Clearly, there is a disconnect between research frontiers and dietary marketing – Giorgio explains the role of oxidative stress in cancer metabolism to clarify the issue. “Many beliefs about food and breast cancer persist in the absence of supporting scientific evidence,” writes Dr Krizia Ferrini of the European Institute of Oncology, author of an article connecting the dots between lifestyle, nutrition and breast cancer. “Despite current awareness on the role of nutrition on cancer outcomes, there is inadequate translation from research findings into clinical practice.” The fourth article in the special issue addresses the important topic of biomarkers. Researchers led by Dr Cecilia Bosco of King’s College London, UK examined the data produced by the Swedish Apolipoprotein MOrtality RISk study (AMORIS) to look for metabolic serum biomarkers, which may be used for the prediction of cancer. This collection of articles spans the breadth of current understanding in cancer metabolism. It is our hope that health care professionals will be able to use the information in this special issue to inform their own best practice – if not their own diets.
<urn:uuid:f5239b14-6d85-43f0-858b-27fe3ae1f0ff>
CC-MAIN-2017-17
http://oncologynews.com.au/resolving-the-cancerdiet-paradox/
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917124297.82/warc/CC-MAIN-20170423031204-00378-ip-10-145-167-34.ec2.internal.warc.gz
en
0.934741
645
2.640625
3
Robert McCrum surveys the big battles and the outsize personalities who lit up presidential contests over the last 150 years. Abraham Lincoln 1864 President Barack Obama shares with Abraham Lincoln a re-election campaign in the midst of intractable domestic problems. In 1864, the lack of success in the civil war dogged his election prospects. His supporters feared he would lose. Sharing this anxiety, Lincoln made a pledge to defeat the confederacy before leaving the White House. "This morning, as for some days past, it seems exceedingly probable that this administration will not be re-elected," he wrote. Lincoln did not show the pledge to his Cabinet, but asked them to sign the sealed envelope that, in the event, was unnecessary. Within a year, he was dead. The Democratic nomination was hotly contested in the light of incumbent Herbert Hoover's vulnerability. Franklin D. Roosevelt built his national coalition with personal allies such as newspaper magnate William Randolph Hearst and Joseph Kennedy snr. He went on to win the first of an unprecedented four terms. In his acceptance speech, Roosevelt declared: "I pledge you, I pledge myself to a new deal for the American people ... a call to arms." His inaugural address, given in the midst of the great Depression, offered the rallying cry: "The only thing we have to fear is fear itself." Truman vs Dewey 1948 A cliffhanger campaign immortalised in a dead wrong Chicago Daily Tribune headline (shown right). Truman had become president on the death of FDR in 1945, but no one gave him a chance. The New York Times declared: "Thomas E. Dewey's Election as President is a Foregone Conclusion." Dewey, however, was a dreadful candidate - stuffy, prone to gaffes and out of touch. Truman played the popular card. In his final campaign speech, Truman said: "The smart boys say we can't win ... but we called their bluff; we told the people the truth. And the people are with us. The tide is rolling... The people are going to win this election." He was right. JFK v Nixon 1960 This election was a thriller in which Kennedy, the matinee idol Democrat, was nearly defeated by the brooding figure of Eisenhower's former vice- president, Richard Milhous Nixon. It was the first campaign in which the candidates debated on live television. The popular perception among those who had listened over the radio was that Nixon had got the better of JFK. But the TV told a different story. Kennedy appeared confident, sun-tanned and relaxed. Nixon looked shifty and, sweating badly under the lights, cut a sorry figure and came across as a loser. Kennedy won, by a whisker, and Camelot was born. Humphrey v Nixon 1968 Another thriller, with the outcome uncertain long into the morning after the poll. The election was conducted against a backdrop of turmoil that included the assassinations of Martin Luther King and Robert Kennedy, nationwide race riots, Vietnam war protests and violent clashes between police and anti-war protesters at the Democratic National Convention in Chicago as the Democratic party split. Hubert Humphrey, the Democrats' candidate, was the underdog, only closing in the final days. Nixon, who had put the humiliation of 1960 behind him, campaigned successfully on law and order and ending the war. Eagleton breaks down 1972 Nixon appeared unbeatable. When George McGovern won the Democratic nomination, high-profile Democrats, including Ted Kennedy, Walter Mondale and Hubert Humphrey, turned down offers to run as VP. In desperation, McGovern chose Thomas Eagleton, a senator from Missouri, with only a minimal background check. Eagleton had made no mention of his electroshock treatment for depression and frequent hospitalisations, and decided to keep them secret from McGovern. When the press confronted Eagleton with the story, he broke down and was replaced by Sargent Shriver. On election day, McGovern took only one state, Massachusetts. Nixon resigned over Watergate in August 1974. Reagan v Carter 1980 Jimmy Carter was always a poor bet for a second term, but his Republican opponent, Ronald Reagan, was distrusted as a veteran cold warrior and no one had ever been elected at the age of 70 before. Coming into the final weeks of the campaign, the outcome seemed finely balanced. The televised debates were essentially a score draw, but Reagan managed to land a punch when he twitted Carter's penchant for manipulating statistics with the humorous line: "There you go again." It was Reagan's folksy charm that delivered a landslide. Clinton v Dole 1996 Bill Clinton's second term now looks like a foregone conclusion. The cold war was over and America was prosperous and at peace. Bob Dole, a lacklustre candidate, with the now-forgotten Jack Kemp as VP, was a grizzled war veteran whose vulnerability was underlined when he slipped and fell head first from a podium on the election trail. Compared with the 50-year-old Clinton, 73-year-old Dole appeared old and frail and the Clinton-Gore ticket won a landslide. But within a year, the president was fighting for his political life over his relationship with Monica Lewinsky. George W Bush v Al Gore 2000 After the euphoria of the Clinton years, this was the election defeat Al Gore and the Democrats snatched from the jaws of victory. Though Gore came in second in the electoral vote, he received 543,895 more popular votes than Bush. With no outright winner, and the votes of Florida in dispute - due to problems with the punchcards ballots (creating "hanging chads"), the unresolved outcome of the popular vote was passed to the Supreme Court. After a month of high drama, the court ruled (by a margin of 7-2) that George W Bush had won, a low point in the history of Supreme Court judicial verdicts. Sarah Palin 2008 With no incumbent defending the White House, the McCain-Obama presidential clash was dominated by the spectacle of the Republican challenge imploding - and the emergence of Sarah Palin. Her defining moment came with her first solo appearance. Hardcore Republicans went wild when she said: "You know the difference between a pit bull and an average hockey mum? [pause] Lipstick!" For a few weeks, Palin-fever swept middle America. But by polling day, her star was waning and in the end her candidacy probably did more harm than good. Palin has a new political life as a TV commentator and Tea Party darling.
<urn:uuid:0cee24a9-c657-47c5-a0d1-a1baf384f2d3>
CC-MAIN-2017-09
http://www.nzherald.co.nz/us-presidential-election-2012/news/article.cfm?c_id=1503227&objectid=10832490
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170651.78/warc/CC-MAIN-20170219104610-00154-ip-10-171-10-108.ec2.internal.warc.gz
en
0.975035
1,351
2.671875
3
Soccer Drill Demonstration Players move to meet the pass and play a one-two. After playing the return pass the player should then move to receive the diagonal pass. The patten then continues all the way around the grid. After playing the diagonal pass players should run onto the next cone. Always have two players on the first cone to ensure that once players have moved on there is always one player on each cone. Drill tags: diagonal, follow, move, movement, one, passing, two
<urn:uuid:396f4ea0-4cdd-4124-8f60-97561cb7f263>
CC-MAIN-2019-43
https://www.sportplan.net/drills/Soccer/Passing-and-Receiving/Third-man-Passing-FA00017.jsp
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986672723.50/warc/CC-MAIN-20191017045957-20191017073457-00149.warc.gz
en
0.957715
107
3.15625
3
Natura non facit saltus Debunking the Paradigm Shifters About these blogs Powered by RogBlog Saturday, May 31, 2008 Some think that Lucy is related to Flores Man The latest Scientific American magazine (see podcast here) claims that most scientists still believe that Flores Man was a separate species of human that lived 20k years ago on a small Pacific island: Steve: One of the big problems right now is there are a number of individual skeletons that we have but only one head.Australopithecus is the supposed missing link between humans and apes. The main skeleton is called Lucy and is from Africa over 3M years ago. It looked like a chimp, except that some scientists say that it walked slightly more upright that most other chimps, and so they argue that it was just starting to evolve to be a human. So what do Lucy and Flores Man have in common? Both were very short, and had small brains. Their brains were only a third the size of humans. One problem with this theory is that we have just found one Lucy skeleton, and one Flores skeleton, and they lived three million years apart on opposite sides of the world! If they were really connected by 3M years of evolving cave men, we would see some evidence. It is easier to believe that we have been visited by space aliens. Another silly article asks Does Time Run Backward in Other Universes? Every time you break an egg, you are doing observational cosmology.The is wacky stuff. The magazine used to be better than this. The author of the article has a blog. Update: The UK BBC has a story on this nonsense. Tuesday, May 27, 2008 I happened to hear Dr. Laura Schlessinger plugging her latest book, and taking questions from an audience. A man asked: I don't understand -- what are you going to do when it is proved conclusively by science that homosexuality is physiological and not a choice? ...Dr. Laura denied that she ever said that homosexuality was a choice. I understand that she once said several things that offended gays, and she later apologized. But I am wondering what the point to such a silly question is. Nobdy has found a "gay gene", and it is likely that no one will. But what if someone does? How is that going to change Laura's opinions? Science has not found genetic explanations for much in the way of human behavior. Probably future research will find genetic correlations with various sorts of behaviors, but I doubt that the research will affect public opinion of those behaviors very much. Sunday, May 25, 2008 Sandisk Sansa ipod is better than the Apple iPod I like the Sandisk Sansa e280 mp3 music player. It sells a lot worse than the Apple iPod, but it has a lot of advantages. It has 8G of flash memory, and is a whole lot cheaper than an iPod. You can sometimes buy one for about the same cost as the flash memory. It has an FM radio, microphone, recorder, picture display, movie player, memory card slot, 20-hour battery life, and replaceable battery. It was years ahead of Apple on these features. It is completely uncrippled. If you have a v1 unit, you can just plug it into a computer usb port, and all the files are plainly exposed for copying back and forth. You can copy data, and just use it as a usb drive if you wish. You can just use any file utility to copy music, recordings, playlists, or whatever. You can even edit the playlists directly, which are in a simple text format. (But annoyingly encoded in 16-bit unicode, so you have to be a little careful.) With the v2 unit, the file structure is almost completely exposed. You cannot edit the playlists directly, but you can create them easily with just Msft Windows Explorer. While the device is connected in MTP mode, just right click on the device files you want on a playlist, and choose "Create playlist". You will then see a 0-byte playlist file on the device. You can rename it as you wish. The choice of MSC or MTP mode is minor complication. In MSC mode, the device is just a regular usb drive with Windows assigning a drive letter. In MTP mode, it still looks like a usb drive, but instead of having a drive letter it is set up for communication with Micosoft Media Player and other computer music players. You can sync with libraries on your PC, if you wish. The Apple iPod does not support either MSC or MTP mode. Instead it only supports a special Apple iTunes mode, where Apple puts artificial limits on what you can do. The Apple software works okay if you are buying from the iTunes music store, but it is really complicated and confusing to do anything else. The Sansa v1 player allows loading the Rockbox alternative open-source firmware for playing music and games. The Sansa v1 firmware also has some quirks. You have to pause the music before turning it off, or else the next boot-up will be slow. The v2 firmware fixes this, and has a snappier user interface. Boot times are only slow if you add a playlist or something like that. At first I found it annoying that I could not listen to music and recharge it at the same time. But I have discovered that if I just partially plug in the usb cable then I can do exactly that. Works great. I have taken to calling the player my ipod, as if ipod has become a generic term for this type of music player. Terms like "music player" and "mp3 player" are inadequate. If someone asks for something more specific, I'll say it is a non-Apple ipod, or an ipod made by Sandisk. Then they understand. Update: I've just discovered that the Sansa v2 player supports M3U playlists nicely. These are just ascii files with mp3 filenames in them. You can just load them on the main player or the memory card, and the player will find them the next time it boots up. There are just a couple of minor tricks needed. I'll post details if I have time. Wednesday, May 21, 2008 Silly letters about marriage The San Jose newspaper has some wacky letters on same-sex marriage. This Monday letter said: Let's suppose an initiative was passed, with an overwhelming majority, to bring back slavery. Would the court be accused of being "activist" when they struck down such a law? Isn't slavery a part of this country's deep-rooted tradition? Isn't it the will of the people?This is a particularly bad example, because the courts did *not* strike down slavery. To the extent that they intervened, the courts made things worse. It took a civil war, and some constitutional amendments to end slavery in the USA. A letter today said: If marriage, at its very core, isn't about the potential for procreation, then why is there a social taboo and laws against closely related heterosexuals getting married? Obviously it is to avoid inter breeding.He means "inbreeding". Monday, May 19, 2008 NY Times readers say humans are not smart For the second week in a row, the NY Times science section published a letter saying animals were smarter than humans. Last week was this: I must disagree with the very premise of this article — that humans are “so smart.” Why must scientists and supposedly objective people be so egotistically ignorant? Classifying other animals as “dumb” is, well, dumb. Until we humans drop the attitude that we are so smart and so superior, the chances that we will continue to exist as a species become less and less. So let’s stop the collective pats on the back and start really looking at why other animals are so smart that they have not needed to improve for very long periods of time.And this week: What I finally determined was that apparently smart humans were messing with the natural predilections of animals, ... Should we blame the flies for adapting? I blame the allegedly smart humans for confounding their cues.Evolutionists often have a real hard time saying that humans are better than animals in any way. Saturday, May 17, 2008 Michael Medved writes that Americans are evolving distintive DNA: Nevertheless, two respected professors of psychiatry have recently come out with challenging books that contend that those who chose to settle this country in every generation possessed crucial common traits that they passed on to their descendents. In “American Mania,” Peter C. Whybrow of U.C.L.A. argues that even in grim epochs of starvation and persecution, only a small minority ever chooses to abandon its native land and to venture across forbidding oceans to pursue the elusive dream of a better life. The tiny percentage making that choice (perhaps only 2%, even in most periods of mass immigration) represents the very essence of a self-selecting group. Compared to the Irish or Germans or Italians or Chinese or Mexicans who remained behind in the “Old Country,” the newcomers to America would naturally display a propensity for risk-taking, for restlessness, for exuberance and self-confidence –traits readily passed down to subsequent generations. Whybrow explained to the New York Times Magazine that immigrants to the United States and their descendents seemed to possess a distinctive makeup of their “dopamine receptor system – the pathway in the brain that figures centrally in boldness and novelty seeking.”I don't know whether it is observable in DNA, but Americans do appear to have some distinctive qualities. Thursday, May 15, 2008 Same-sex marriage decision The California Supreme Court has just mandated same-sex marriages by a 4-3 vote. Judge Kennard wrote: As the opening words of the Chief Justice’s majority opinion indicate, this case is a continuation of Lockyer. There, this court held that local officials had acted unlawfully by issuing gender-neutral marriage licenses to same-sex couples after the officials made a legal determination that depriving same-sex couples of the right to marry was unconstitutional. ... Here, this court holds that under the state Constitution’s equal protection guarantee, same-sex couples have a right to marry, and that state officials should take all necessary and appropriate steps so that local officials may begin issuing marriage licenses to same-sex couples.This decision has many controversial aspects, but for now I'll just note the judicial supremacist nature of it. This court of seven judges is saying that it is the only body that is allowed to interpret the state constitution. That is just wrong. All Californians are responsible for upholding the constitution. The court is just making a political decision about its own political ideologies, and it wants all the power for itself. Monday, May 12, 2008 There is no best technology, if you ignore cost The US Supreme Court has agreed to hear a case about whether the US EPA should mandate the "best technology available", regardless of any cost-effectiveness analysis. This essay explains why cost-effectiveness analysis ought to be essential to environmentalism. Doing a cost-benefit analysis is essential to any engineering problem, and its necessity just seems like common sense. I don't even see how there could ever be a "best technology available", regardless of cost. There is always some way to spend more money to get a slightly better result. There are apparently environmentalists who argue against a cost-benefit analysis. This is just more evidence that environmentalism is a big fraud. Anyone serious about improving the environment would want to analyze what will do the most good with the resources available. Sunday, May 11, 2008 Narrow-minded law profs A dozen feminist law profs have issued this public letter: Our objection to honoring Ms. Schlafly instead stems from the fact that she has devoted her career to demagoguery and anti-intellectualism in the pursuit of her political agenda. ...Other gripes have come from People For the American Way and Katha Pollitt in The Nation magazine. Wash. U. points out that it has given honorary degrees to much more controversial political figures, such as Jesse Jackson. The complaints are absurd and disengenuous. How can it be "anti-intellectual" to disagree with the substance of some judicial decisions? Update: Washington University Chancellor Mark Wrighton has now apologized for the "anguish" suffered by those pathetic law profs. Quantum crypto broken again Here is research from Sweden: ScienceDaily (May 11, 2008) — Quantum cryptography has been regarded as 100-percent protection against attacks on sensitive data traffic. But now a research team at Linköping University in Sweden has found a hole in this advanced technology. ...Quantum crypto is a big scam. The security is not guaranteed. The technology has no practical utility. This is just the latest of many weaknesses that have been announced. Wednesday, May 07, 2008 National “DNA warehouse” bill passes The physician group AAPS reports: Passing the House of Representatives on a voice vote, S. 1858 has been sent to President Bush for signature. The Newborn Genetic Screening bill was passed by the Senate last December. ...I warned below that the GINA Act was paving the way for DNA privacy invasions. Monday, May 05, 2008 Ben Stein's assertions Jim Manzi writes: Expelled makes two key assertions. First, the scientific establishment has prevented adequate consideration of Intelligent Design (ID). Second, the scientific finding of evolution through natural selection logically entails atheism and nihilism.These assertions are indeed dubious, but I didn't notice the movie going that far. I would say instead that the movie asserted that (1) the scientific establishment is incredibly hostile to Intelligent Design (ID), and (2) Darwinism leads many people to atheism and a devaluation of human life. I think that the scientific establishment would be better off letting the ID folks say whatever they have to say. At worst, it is just nuttiness that is of the sort that is common in academia anyway. Relativity was invented before Einstein Who Invented Relativity?. It concedes that Einstein really just had a reinterpretation of an existing theory, but Einstein gets most the credit anyway: In the context of electro-dynamics, Fitzgerald, Larmor, and Lorentz had all, by the 1890s, arrived at the Lorentz transformations, including all the peculiar "time dilation" and "length contraction" effects (with respect to the transformed coordinates) associated with Einstein's special relativity. By 1905, Poincare had clearly articulated the principle of relativity and many of its consequences, had pointed out the lack of empirical basis for absolute simultaneity, had challenged the ontological significance of the ether, and had even demonstrated that the Lorentz transformations constitute a group in the same sense as do Galilean transformations. ...One of the arguments in favor of Einstein is that he demanded and got credit at the time, while Lorentz and Poincare generously credited others. But this just reflects the fact that Einstein was more of a plagiarizing egomaniac: Regarding Born’s impression that Poincare was just “recording Lorentz’s work”, it should be noted that Poincare habitually wrote in a self-effacing manner. He named many of his discoveries after other people, and expounded many important and original ideas in writings that were ostensibly just reviewing the works of others, with “minor amplifications and corrections”. So, we shouldn’t be misled by Born’s impression. Poincare always gave the impression that he was just recording someone else’s work – in contrast with Einstein, whose style of writing, as Born said, “gives you the impression of quite a new venture”.The article really gets absurd when it argues that Lorentz and Poincare did not fully understand Relativity. They were regarded as two of the smartest men in Europe, and understood Relativity better than Einstein. It is true that Lorentz and Poincare wrote after 1905 of the possibility of the aether existing, but so did Einstein. Saturday, May 03, 2008 Evolutionists preoccupied with motives On a legal blog discussing the teaching of Evolution and Intelligent Design (ID) in the schools, someone named Oren wrote: I think it's been pretty conclusively shown (Kitzmiller) that ID is and always was religion. Most damning IMO was the revision of "Pandas" in which the word "creation" (and its cognates) was systematically removed to make the book more palatable as non-religious.I responded: The judge said that this was done in order comply with a Supreme Court decision. Why is it damning to comply with a court decision? Shouldn't everyone try to comply with the law?Arnold Asrelsky responded to me: Judge Jones did not say that the editors of 'Pandas' changed every instance of 'creationism' to 'Intelligent Design' in order to 'comply' with a Supreme Court decision. The changes were made to hide the fact that the 'new' 'Pandas' presented the same old Creationist text in a disguise meant to deceive the courts, the school boards and the general public. I hope you were making your comment tongue-in-cheek. Otherwise your comment is as deceptive as the 'Panda' editors' and your motives become as suspect as theirs were.The remarkable thing here is how the leftist-athiest-evolutionists make such unscientific arguments. They pretend to be advancing the cause of science, but they usually base their arguments on dubious mindreading instead of actual facts. There are several good arguments against teaching ID in the schools. But these evolutionists focus on the alleged motives of others. They want to read the minds of the Pandas authors, the Discovery Institute, the Dover PA school board, and others who don't buy into the leftist-atheist-evolutionist party line. I made one little comment, and now the guy wants to read my mind! The US Supreme Court ruled 7-2 in Edwards v. Aguillard (1987) that Louisiana's Creationism Act was unconstitutional. Judge Jones found that the Pandas book was subsequently edited to remove references to creationism, and made inferences about the motives of the Pandas authors. I think that it is bizarre to denigrate folks for complying with a court decision. Here is what Judge Jones ruled in Kitzmiller v. Dover (2005): In Edwards v. Arkansas [sic], 482 U.S. 578 (1987), five years after McLean, the Supreme Court held that a requirement that public schools teach “creation science” along with evolution violated the Establishment Clause. The import of Edwards is that the Supreme Court turned the proscription against teaching creation science in the public school system into a national prohibition. ...(It is curious that Judge Jone would get the name of his main precedential case wrong; the Edwards case was from Louisiana, not Arkansas. The mistake is not in the ACLU brief he plagiarized.) You can draw your own conclusions about why the Pandas authors revised their terminology. The simplest explanation is that they were trying to comply with a court decision. It is also a little bizarre to say that there is a "massive and well-funded PR campaign to subvert scientific inquiry". Whatever you think of the Discovery Institute, it is a tiny operation that has not spent one cent to subvert scientific inquiry. Friday, May 02, 2008 Congress passes Genetic Information Nondiscrimination Act (GINA) Russell Korobkin makes a good point when he says that Amy, Beth, and Cindy may have the exact same cancer risk, and yet GINA forces insurance companies to discriminate between them. This seems unfair and economically inefficient to me. But he loses me here: Exceptions should be permitted to allow insurers to surcharge customers who engage in risky activities within their individual control, such as smoking.He defends his op-ed here. This is the really insidious part of Korobkin's ideology. He wants the govt to decide what behavior you ought to be correcting. There is no consensus about what is under your individual control. Recent research has shown that some smokers may have a gene that makes it very difficult for them to quit. Likewise, some obese people seem to be unable to lose weight. Many physical conditions can be ameliorated by actions that people are unable or unwilling to do. Does Korobkin really want the govt or the insurance company to distinguish "unable" from "unwilling"? It just cannot be done, with today's medical knowledge. It is like trying to separate nature and nuture; you can do it for a few things, but you cannot do it for most things. It is amazing that there was no opposition to GINA. It is a horrible law that will waste health care dollars, create inequities, and ultimately be unworkable because it requires insurance companies to make distinctions that cannot be made. Ron Paul was the only one to vote against it. I also commented on this law below.
<urn:uuid:1b27d1db-00bb-44c0-9210-6c67f89bacf7>
CC-MAIN-2018-47
http://buzz.spinstop.com/2008-05.htm
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039746465.88/warc/CC-MAIN-20181120150950-20181120172950-00097.warc.gz
en
0.964226
4,448
2.546875
3
Installing a one-way slab is a complex process that requires careful planning, precise measurements, and skilled labor. Here is a step-by-step guide to installing a one-way slab c_eheydw6yu : Before beginning any construction work, it is important to prepare the site by clearing the area of any debris, leveling the ground, and ensuring that the soil is stable and compacted. Once the site is prepared, the next step is to install the formwork for the slab c_eheydw6yu . Formwork is a temporary structure that is used to shape the concrete into the desired shape and size. It is typically made from wood or metal and must be strong enough to support the weight of the wet concrete. The formwork for a one-way slab c_eheydw6yu will typically consist of two parallel beams running along the length of the slab c_eheydw6yu , with smaller cross beams spaced at regular intervals between them. Once the formwork is in place, the next step is to install the reinforcement. This typically consists of a series of steel bars or mesh that are placed within the formwork to provide additional strength and support to the slab c_eheydw6yu . The reinforcement should be placed at the correct spacing and elevation, as specified in the slab design. Pouring the concrete: Once the reinforcement is in place, the next step is to pour the concrete. The concrete should be mixed according to the manufacturer’s specifications and poured into the formwork using a pump or chute. It is important to pour the concrete evenly and to ensure that it reaches all areas of the formwork. After the concrete is poured, it is important to finish the surface to ensure a smooth, level surface. This may involve using a trowel or float to remove any air pockets and to create a smooth surface. The surface may also be textured or stamped to create a specific pattern or texture. After the concrete is finished, it is important to allow it to cure for a period of time. Curing is the process by which the concrete hardens and gains strength. The length of the curing period will depend on the type of concrete and the weather conditions, but it typically takes several days. Once the concrete is fully cured, the formwork can be removed. This should be done carefully to avoid damaging the newly poured slab c_eheydw6yu . The formwork should be removed in sections, starting at the edges and working toward the center. Once the formwork is removed, the final step is to add any finishing touches, such as sealing or staining the surface or adding decorative elements such as tiles or pavers. Overall, installing a one-way slab c_eheydw6yu requires careful planning, skilled labor, and attention to detail. It is important to work with an experienced construction team and to follow all safety and building code requirements to ensure a successful installation.
<urn:uuid:f8fcdb3e-5193-418f-b013-31cf0669dd9c>
CC-MAIN-2023-50
https://homemodling.com/step-by-step-guide-to-installing-a-one-way-slab-c_eheydw6yu/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100286.10/warc/CC-MAIN-20231201084429-20231201114429-00215.warc.gz
en
0.925226
617
2.53125
3
N/APosted on - 02/06/2013 I am using MAC OS X 10.4 and I also have MS PowerPoint in it. My question is how to develop a jigsaw puzzle in PowerPoint. Anyone having any idea creating jigsaw shapes puzzle using PowerPoint. Please teach me how to create Mac jigsaw PowerPoint. Require urgently Mac jigsaw powerpoint? There are several ready to use PowerPoint Jigsaw Puzzle templates that you can use. Please Download the free template. However, if you are interested in creating your own jigsaw shapes, I can give you the steps to create a basic puzzle piece using shapes in PowerPoint. First, open the PowerPoint application and draw a rectangle shape. Next, add a white colored shape with no border on top of the rectangle. Set the fill color to solid fill, use white as background (or the background color of your slide) and change the line color to No line. Now Group the shapes by selecting both shapes. And you have it, a small puzzle piece ready to be used. Repeat the steps and add a new circle shape to create the male portion of the piece.
<urn:uuid:a59a2006-4af9-4236-a3c8-6c5b5f809168>
CC-MAIN-2018-13
http://www.techyv.com/questions/require-urgently-mac-jigsaw-powerpoint/
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647885.78/warc/CC-MAIN-20180322131741-20180322151741-00586.warc.gz
en
0.855218
236
3.03125
3
Student Trips for History Our expert study tours are hugely popular with lecturers and students of history. Our custom itineraries are put together to allow the subject matter to be brought to life, allowing students to fully grasp the realities of the historical events they are studying. Each destination has been chosen to enhance your students’ learning on a broad range of historical study themes. From studying the rise of the Third Reich and the Cold War in Berlin; the French Revolution in Paris, to the Holocaust in Krakow and the US Civil Rights movement in New York and Washington, a StudyLink custom itinerary will further develop your students’ understanding of the subject. Our range of college trips for history... Students on a history trip to Berlin will enjoy learning about the city’s past including World War II, the Holocaust and the fall of the Berlin Wall. Popular visit ideas include The Fuhrer Bunker, where Hitler spent time prior to the end of World War II, The Holocaust Memorial which commemorates the Jewish people murdered during the holocaust and The Wall museum which documents the history of the Berlin Wall. Discover the ancient history of the Terracotta Warriors in Xian and visit the desert landscapes of the Silk Road and of course, The Great Wall. Educational trips to China make for a fascinating visit for college and university students of history, allowing them to discover a new found understanding of this vast country. A college trip to Krakow, with opportunities to explore pre-war history or to better understand the Holocaust, is guaranteed to leave an impact on your students. For history students the Jewish quarter where Schindler’s List was filmed and a guided excursion to Auschwitz-Birkenau bring home the realities of Nazi occupation. A student trip to London provides an opportunity to experience some of the world's best museums and monuments, each telling the story of London’s fascinating past. Students can even round off their stay with a trip to the theatre to see a West End show. Munich & Nuremberg Munich & Nuremberg During a visit to Munich and Nuremberg you will experience the backdrop of modern German culture and language which provide a stark contrast to the historical events which shaped these Bavarian cities. For students of History, these cities are an ideal destination to study strategic locations in Nazi Germany and the Second World War. An educational visit to the East Coast of America will allow you history students to explore the origins of the Civil Rights movement and learn more about American political history. This fast-paced, vibrant city has a great choice of must-see attractions offering students on college trips to New York an experience they'll never forget. New York & Washington DC New York & Washington DC Visiting the USA, one of the most powerful countries in the world cannot fail to inspire students of history during an educational tour. Whilst Washington is the decision-making capital with its grand buildings, parks and political significance, New York is a fast-paced vibrant city with a great choice of must-see attractions. With its beautiful coastline and pretty seaside resorts, Normandy is a very popular destination for an educational study tour. From Mont St Michel to the D-Day landing beaches and the Peace Museum in Caen, there are plenty of excellent town and city excursions to fill your history trip itinerary. The birthplace of Revolution, Paris is the perfect destination to learn about the modern nation state. The city has a wealth of historical monuments and landmarks that will give students an insight into a pivotal period in European history, giving rise to the motto "Liberty, Equality and Fraternity" which is still so entwined in the ethos of modern day France. The medieval architecture throughout Prague gives the city its characteristic Bohemian appearance. A college trip to Prague allows students to study many topics including Nazi occupation and the Holocaust, the Cold War, the collapse of Communism and the Velvet Revolution. Washington is the decision-making capital of arguably the most powerful country in the world and as such cannot fail to inspire students of history and politics during an educational tour. Washington’s grand buildings, parks and monuments present a calm and ordered façade, the antithesis of the political debates and scandals that take place within. Our range of university trips for history... We’re a one-stop shop for your university group travel package for your history study tour. Whether you’re looking for a travel package, or a comprehensive subject-linked itinerary, we’ll work with you to pull together exactly what you need. We have a host of visits and programs for your study trip, which may help you to cover subject modules, such as Ancient History, Archaeology, Egyptology, or modules focusing on the histories of Ireland or Latin America. We've created group travel packages and educational programs, to destinations across the globe including Amsterdam, Berlin, Bratislava, Brussels, Budapest, Ireland, Jerusalem, Krakow, London, Munich, Normandy, Paris, Prague, Rome, Valetta, Vienna and Washington DC. - Support from one of our award-winning group travel Account Executive with excellent knowledge of destinations suited for a history trip - A one-stop shop for your history student group travel package - Multiple quote options to help you make the best value choice for your group - Preferential rates with airlines, hotels & hostels, rail & other transport options & flexible flight booking options – reserve seats for longer than if you book direct - On-the-ground support & assistance from our representatives - Convenient and time-saving online travel technologies - Risk management services for complete peace of mind - External accreditations providing reassurance, including ABTA, ATOL & IATA licences Price promise - we’ll beat any like-for-like quote We’ll also beat any like-for-like quote to ensure you’re getting the most competitive price for your travel requirements. What our customers are saying about us... “I was very impressed by the information provided and the value for money. It saved me so much time organising it myself. The maps and directions were invaluable. Parents liked the tracker.” Mrs Kerry Morris, Worcester Sixth Form College “Rachel Cain was great throughout the process. Guided me through the booking procedures. Nothing seemed to much of a task whilst ensuring it came within budget. Thank you.” Mr Jonathan Hunt, University for the Creative Arts
<urn:uuid:e08af8cd-d0d9-479b-a131-deb3878994d5>
CC-MAIN-2019-22
https://www.studylinktours.co.uk/history-college-trips
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232255251.1/warc/CC-MAIN-20190520001706-20190520023706-00553.warc.gz
en
0.905785
1,335
2.53125
3
Facts about Jorge Borges Jorge Luis Borges Biography Jorge Luis Borges is one of the great literary heroes of Argentina. Born in Argentina, Borges spent several years in Europe as a child and was educated in English as well as Spanish. As an adult he returned to Argentina to write and work as a professor of English. Artistically rebellious, Borges wrote poems and stories which are imaginative and often puzzling, many of them vehicles for complex philosophical themes. His 1944 collection of short stories, Ficciones, is widely regarded as his masterwork. Prolific and smart as all get-out, Borges also wrote allegories, fantasies and even detective stories.
<urn:uuid:2cfecf01-e12f-4e33-8fe6-1ce6639fc87e>
CC-MAIN-2018-51
https://www.who2.com/bio/jorge-luis-borges/
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823322.49/warc/CC-MAIN-20181210101954-20181210123454-00399.warc.gz
en
0.979995
144
3.015625
3
Background for Teachers Come Fly With Me TPW Magazine, May 2009 Texas is one of the premiere destinations for birding in North America. Every year, hundreds of millions of birds migrate through Texas, adding to the splendor of the many resident bird species living here. About half of the 634 bird species found in Texas are migratory. Thinking of it another way, of the 338 species that mirgrate in North America (north of Mexico), 333 of them (or 98.5%) have been recorded in Texas. Texas is a haven for birds and birdwatchers, especially during migration. Migration is more that just flying to a different area for food or a nesting spot. Migration describes movement of a population that occurs regularly and is predictable by season, path and purpose. Migratory birds have separate breeding and wintering grounds. During the late spring and summer, these birds travel north to their breeding areas that are less crowded, have fewer predators, less competition for food and longer daylight in which to find food and feed their young. As the days shorten, weather gets colder and food supplies dwindle, these birds migrate south for the winter. Their destination "wintering grounds" provide better climate and ample food sources. Why don't they stay there to breed? Some species do live in temperate areas year-round, but other species breed more successfully with more space, less competition, longer days...so the cycle of migration continues back and forth from wintering to breeding grounds. Migratory birds follow predicatable paths called "flyways." These flyways must provide food, water and shelter for migrating species. There are four North American flyways. Texas falls along both the Central and Mississipi Flyways. Sadly, loss of habitat along flyways is a serious conservation threat to migratory bird species. How birds migrate is an intriguing mystery for science. For example, the ruby-throated hummingbird may fly 600 miles, 26 hours non-stop across the Gulf of Mexico and end up in the same place each year! How do they stay on course and manage such long flights? Hummingbirds and hawks travel by day, using the sun, rivers, mountain ranges and coastlines to guide them. Songbirds migrate by night, using the stars and the earth's magnetic field. How these birds sense magnetism is still a mystery. Biologists recently discovered tiny magnetite crystals in the heads of some birds and scientists are experimenting to see how they might serve as an internal compass. Other birds sense vegetation zones and changes in humidity and temperature. Experiments are showing that birds rely on multiple factors to migrate. To learn more about migration, please check out these frequently asked questions about bird migration. Making these long journeys is dangerous. Less than half the birds that start out make it back. What behaviors help birds with their journey? Some birds wait for tailwinds and select the best altitude to help them fly. Hawks hop thermals (a column of rising air) to save energy. They fly in an upward spiral on these warm wind tunnels. Once at the top, they glide to the next thermal. Geese fly in "v" shape to reduce wind resistance on the flock, taking turns at the front of the "v" to share the burden. Songbirds depend on cooler evening temperatures to prevent overheating and cover of night to avoid some of their predators. Before migration, metabolic changes occur in response to sun intensity and increasing day length. Food consumption increases and fat accumulates under the skin tissues. This will provide the energy for long flights. For example, hummingbirds almost double their weight with stores of fat to provide energy for their long flight. The Ruby-throated Hummingbird stores enough fat to fly 26 hours non-stop at 25 miles an hour. This is enough to span the Gulf of Mexico! Neither metabolic changes nor any other single factor alone triggers migration. Sucessful migration is also dependent on environmental factors such as weather, arrival of spring, flowering, foliation, insect hatching and availability of food which vary from year to year. Birds can be exhausted and emaciated by the time they reach stopping areas. Both learned and inherited traits come into play for migrating birds. Their body size and shape and the triggers that prepare them for migration are inherited, but learning their destination, food sources and evading predators are examples of learned traits. Migrating birds must rely on good habitat along the way to rest and eat. They gorge themselves to replenish their fat reserves before preparing for the next leg of the flight. Sadly, habitat loss threatens migrating birds. Maintaining habitat, especially wetlands, for both resident and migrating birds will be critical to their survival. - Bird Migration (TPWD) - Migration and the Migratory Birds of Texas (TPWD booklet) - Smithsonian Migratory Bird Center - How You Can Help Migratory Birds - Highways in the Sky, TPW Magazine, May 2007 - Sky Trek, TPW Magazine, May 2006 - USGS Wind Energy and Wildlife - affects on migration - Great Texas Wildlife Trails - An Introduction to Birdwatching (TPWD booklet) - From the Young Naturalist
<urn:uuid:d9b5312a-ff5e-494e-990c-3083b64777b3>
CC-MAIN-2014-10
http://www.tpwd.state.tx.us/learning/resources/keeptexaswild/birdmigration/background.phtml
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999653202/warc/CC-MAIN-20140305060733-00012-ip-10-183-142-35.ec2.internal.warc.gz
en
0.931022
1,067
3.75
4
With temperatures hovering around 90 degrees this week, Kane County residents are being asked to be attentive to heat-related emergencies. The combination of high temperature and humidity recently have put the heat index at 100 degrees or more, according to the National Weather Service. A heat index measures how hot it feels when relative humidity is added to the actual air temperature. Kane County Coroner Rob Russell and the American Red Cross are asking that people be diligent about staying hydrated – by drinking water and other fluids – and staying out of the heat for extended periods of time. Infants, the elderly and those who work outside are the most susceptible to heat-related illnesses, especially heatstroke. Those with chronic illnesses also are considered high-risk, according to a news release. Russell and the Red Cross also are urging people to follow tips on staying safe in high temperatures, especially never leaving children or pets inside a car. Other heat safety tips include wearing loose-fitting, light-colored clothing; staying indoors; avoiding strenuous exercise; and postponing outdoor activities. Also, people are urged to use a buddy system when working in excessive heat. People should take frequent breaks and check on those who do not have air conditioning. Those without air conditioning should get relief by going to libraries, theaters, malls and other cool, public places, officials recommend. Excessive heat can lead to heat exhaustion and heatstroke. Symptoms of heat exhaustion are cool, moist, pale or flushed skin, heavy sweating, headache, nausea, dizziness and weakness. Someone with those symptoms should be moved to a cooler place, have their clothing loosened, and be sprayed with water or have cool, wet cloths or towels applied. If the person refuses water, vomits or begins to lose consciousness, 911 should be called. Heatstroke symptoms, which occur after heat exhaustion, include hot, red skin, headache, dizziness and confusion, vomiting, high body temperature exceeding 103 degrees, fast pulse, seizures and unconsciousness. A call to 911 should be immediately placed if someone shows signs of heatstroke. While waiting, the ill person should be moved to a cooler place, doused or sprayed with cold water, or covered with cold, wet towels or bags of ice.
<urn:uuid:09ce0959-9bfa-4300-aaf5-11032794c7d8>
CC-MAIN-2017-43
http://www.kcchronicle.com/2013/07/16/heat-at-high-levels-coroner-red-cross-asking-residents-to-stay-safe/ai5yfo9/
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823255.12/warc/CC-MAIN-20171019065335-20171019085335-00829.warc.gz
en
0.940781
458
2.84375
3
In today's world of rapidly evolving technology, achieving sustainability in the electronics industry is more critical than ever. With an increasing demand for energy-efficient and eco-friendly products, manufacturers are seeking innovative solutions that prioritise sustainability without compromising on performance. One such innovation is the GaN (gallium nitride) charger, which has the potential to revolutionise sustainable electronics and redefine our relationship with power consumption. In this comprehensive overview, we'll delve into the world of GaN chargers, exploring their unique benefits and potential impact on the electronics industry. We'll also examine the role Chargeasap plays in bringing sustainable, high-performance mobile accessories to consumers, reflecting their unwavering commitment to pushing the boundaries of technology. Discover the future of electronics with GaN chargers and Chargeasap, and learn how you too can contribute to a more sustainable future. Understanding GaN Technology Gallium nitride (GaN) is a semiconductor material that has been making waves in the electronics industry due to its unique properties and potential for revolutionising power conversion. Compared to traditional silicon-based components, GaN enables faster energy transfers, higher power density, and improved efficiency. Reducing Energy Waste with GaN Chargers One of the key benefits of GaN chargers is their ability to significantly reduce energy waste during the charging process. Traditional silicon-based chargers lose a considerable amount of energy in the form of heat, which not only impacts energy bills but also contributes to a larger carbon footprint. In contrast, GaN-based chargers are more efficient in transferring energy, minimising energy losses and heat generation. Smaller, Lighter, and Environmentally Friendly GaN chargers also boast a smaller physical footprint and lighter weight, thanks to the increased power density afforded by the GaN material. These compact chargers require fewer components and less raw material, leading to reduced production waste and environmental impact. With an emphasis on portability and convenience, GaN chargers support the growing trend towards minimalist and eco-friendly electronics. The Role of Chargeasap in Supporting GaN Technology Chargeasap, a consumer electronics startup originating from Sydney, has been at the forefront of promoting the use of GaN technology in mobile accessories. By integrating GaN components into their product offerings, Chargeasap has embraced the environmental benefits and performance capabilities of this innovative material, setting the stage for a more sustainable future in the electronics industry. As part of their commitment to delivering cutting-edge and eco-friendly solutions, Chargeasap offers GaN-based fast chargers that emphasise efficient power conversion, compact design, and minimised energy waste. By investing in GaN technology, Chargeasap contributes to promoting sustainable electronics and encouraging consumers to adopt environmentally responsible charging practices. Accelerating the Shift Towards Sustainable Electronics The adoption of GaN chargers has the potential to accelerate the shift towards sustainable electronics on a larger scale. As more manufacturers recognise the benefits of GaN technology, we can expect an increased focus on developing environmentally conscious products that minimise energy waste, reduce raw material consumption, and promote eco-friendly charging practices. Considerations for Consumers Choosing GaN Chargers For consumers committed to making sustainable choices, GaN chargers provide an attractive alternative to traditional silicon-based chargers. When selecting a GaN charger, it's essential to consider factors such as charging speed, compatibility with devices, and the charger's overall build quality. By investing in a high-quality, efficient GaN charger, consumers can contribute to reducing energy waste and promoting eco-friendly practices within the realm of mobile technology. The Future of GaN Technology in the Electronics Industry As GaN technology continues to advance, its applications within the electronics industry are expected to expand. Potential future developments include further miniaturisation of components, increased power efficiency, and integration into a wider range of devices. This innovation has the potential to extend beyond mobile phone chargers, positively impacting numerous electronic devices and establishing a greener future in consumer technology. With a growing emphasis on sustainability and energy efficiency, GaN chargers play a significant role in shaping the future of the electronics industry. By reducing energy waste, promoting eco-friendly charging practices, and supporting innovative startups like Chargeasap, consumers and manufacturers can work together to create a more sustainable future in electronics. Embrace a Sustainable Future with Chargeasap The remarkable potential of GaN chargers to revolutionise the electronics industry lies in their ability to reduce energy waste, minimise e-waste, and promote sustainable charging practices. Chargeasap has played an instrumental role in championing GaN technology by incorporating it into their innovative product offerings, demonstrating a commitment to pushing the boundaries of sustainable electronics. As a Sydney-based startup, Chargeasap has consistently been at the forefront of this movement, creating highly innovative mobile phone accessories since 2016 that incorporate the latest technological advancements. Elevate your mobile experience while supporting a greener future with Chargeasap's range of GaN chargers. Explore our exceptional, eco-friendly GAN chargers and transform your charging experience that contributes to a sustainable future.
<urn:uuid:3525bfac-8932-4e89-a87f-a3c1ed04e0ed>
CC-MAIN-2024-10
https://chargeasap.com/blogs/news/revolutionising-sustainability-with-gan-chargers
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475422.71/warc/CC-MAIN-20240301161412-20240301191412-00360.warc.gz
en
0.919079
1,044
2.625
3
Pablo Picasso (Spanish, 1881–1973), one of the most prominent, innovative artists of the 20th century, is celebrated for his lengthy and prolific career working in several modernist idioms, as well as for co-founding Cubism. Picasso was born in Málaga, Spain, and began drawing and painting early on under the influence of his father, an academic painter. He later studied art in Barcelona and often frequented the café Els Quatre Gats, where he first began exhibiting his own paintings. Picasso first visited Paris in 1900 for the city’s world fair, before moving there in 1904. Early on, Picasso painted many scenes of laborers and the poor during his Blue Period, later focusing on acrobats and circus performers during his Rose Period; in each period, his compositions were dominated by blue or rose hues. In 1907, inspired by African aesthetics, Picasso made his first significant foray into Cubism and into a modernist aesthetic with his monumental painting Les Demoiselles d’Avignon, which featured a scene of five aggressive-looking prostitutes painted with distorted, angular forms and faces in bold outlines, influenced by African masks. Alongside fellow artist Georges Braque (French, 1882–1963), Picasso further developed Cubism, a revolutionary aesthetic in which artists attempted to capture multiple views of an object simultaneously, abstracting the subject matter in the process. Picasso and Braque also pioneered experiments with collage in their Cubist works, incorporating wallpaper, newspaper, and other materials into their canvases. Towards the 1920s, Picasso returned to more representational works, depicting classical figures and landscapes while dividing his time between Paris and Barcelona. Later in the decade, he began communicating with Surrealist artists, such as his friend Julio Gonzalez (Spanish, 1876–1942). His work reflected the biomorphic forms and bright hues characteristic of the movement, though he always remained separated from the Surrealist circle. Deeply affected by the Spanish Civil War, Picasso painted his monumental work Guernica in 1937, famous for its poignant depictions of the anguish and destruction of the war. In the mid-1940s, Picasso fully settled in Paris, later moving to Mougins, France, where he created an astounding number of paintings, prints, sculptures, ceramics, and works on paper during the next few decades. Held in the highest regard during his lifetime, retrospectives of his work have been held at the Museum of Modern Art in New York, the Musée Picasso in Paris, the Emirates Palace in Abu Dhabi, the National Gallery in London, and the Reina Sofia Museum in Madrid, among many other institutions. In 1973, Picasso died in Mougins, at 92 years old, and is renowned today as one of the pioneering and most influential forces of 20th-century modernism.
<urn:uuid:abc28ad3-5222-4454-beb8-77a1d0282d39>
CC-MAIN-2020-05
http://www.hammergalleries.com/artists/pablo-picasso
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250594705.17/warc/CC-MAIN-20200119180644-20200119204644-00258.warc.gz
en
0.977974
599
3.625
4
In Genesis God is introduced in the plural Elohim ELOHIM: God (a plural noun, meaning more than one being within a family group of several beings called Elohim, used with singular verbs); Elohim occurs 2,570 times in the OT, 32 times in Genesis. Eccl., Dan. Jonah use Elohim almost exclusively. See Gen. 17:7, 6:18, 9:15, 50:24; I Kings 8:23; Jer. 31:33; Isa. 40:1. Literally meaning “Mighty Ones” the word Elohim over time came to refer to all those in authority and to everything that is called god by all peoples. Because of this diluting of the meaning of Elohim to refer to lesser gods or authorities, it became necessary for God to use other descriptive names to differentiate him from other authorities. EL: The singular of the plural Elohim (“mighty, strong, prominent”) used 250 times in the OT See Gen. 7:1, 28:3, 35:11; Nu. 23:22; Josh. 3:10; 2 Sam. 22:31, 32; Neh. 1:5, 9:32; Isa. 9:6; Ezek. 10:5. “ELOHIM” (or Elohay) is the first name for God found in the Bible, and it’s used throughout the Old Testament over 2,300 times. Elohim comes from the Hebrew root meaning “strength” or “power”, and has the unusual characteristic of being plural in form. In Genesis 1:1, we read, “In the beginning Elohim created the heaven and the earth.” Right from the start, this plural form for the name of God is used to describe the One God, a mystery that is uncovered throughout the rest of the Bible. Throughout scripture, Elohim is combined with other words to describe certain characteristics of God. Some examples of Elohim: Elohay Kedem – God of the Beginning: (Deuteronomy 33:27). Elohay Mishpat – God Of Justice: (Isaiah 30:18). Elohay Selichot – God Of Forgiveness: (Nehemiah 9:17). Elohay Marom – God Of Heights: (Micah 6:6). Elohay Mikarov – God Who Is Near: (Jeremiah 23:23). Elohay Mauzi – God Of My Strength: (Psalm 43:2). Elohay Tehilati – God Of My Praise: (Psalm 109:1). Elohay Yishi – God Of My Salvation: (Psalm 18:46). Elohim Kedoshim – Holy God: (Leviticus 19:2, Joshua 24:19). Elohim Chaiyim – Living God: (Jeremiah 10:10). Elohay Elohim – God Of Gods: (Deuteronomy 10:17). “EL” is the singular of Elohim, showing up about 200 times in the Old Testament. El is the simple form arising from Elohim, and is often combined with other words for descriptive emphasis. Some examples of El: El HaNe’eman – The Faithful God: (Deuteronomy 7:9). El HaGadol – The Great God: (Deuteronomy 10:17). El HaKadosh – The Holy God: (Isaiah 5:16). El Yisrael – The God Of Israel: (Psalm 68:35). El HaShamayim – The God Of The Heavens: (Psalm 136:26). El De’ot – The God Of Knowledge: (1 Samuel 2:3). El Emet – The God Of Truth: (Psalm 31:6). El Yeshuati – The God Of My Salvation: (Isaiah 12:2). El Elyon – The Most High God: (Genesis 14:18). Immanu El – God Is With Us: (Isaiah 7:14). El Olam – The God Of Eternity (Genesis 21:33). El Echad – The One God: (Malachi 2:10). “ELAH” is another name for God, used about 70 times in the Old Testament. Again, when combined with other words, we see different attributes of God. Elah is Aramaic [Syriac] for “god.” Elah appears in the Hebrew Bible in Jer. 10:11 (which is in Aramaic, and is plural, “gods”). In Daniel (the Aramaic sections) Elah is used both of pagan gods, and of the true God, also plural. Elah is the Aramaic equivalent to the Hebrew ELOAH; Elohim is plural meaning two or more. The gods of the nations are also called “Elohim.” The origin of Eloah is obscure. Elohim is the more common plural form of El. Eloah is used 41 times in Job between 3:4 and 40:2, but fewer than 15 times elsewhere in the OT. Some examples of Elah: Elah Yerush’lem – God of Jerusalem: (Ezra 7:19). Elah Yisrael – God of Israel: (Ezra 5:1). Elah Sh’maya – God of Heaven: (Ezra 7:23). Elah Sh’maya V’Arah – God of Heaven and Earth: (Ezra 5:11). All of these names are acceptable names for BOTH God the Father and for the Son. Yet we are commanded to call God the Father by the most exalted title of all: ”Our Father!” In whose name should we pray? In the name of the son for he is our High Priest and our only intercessor with God the Father. in the scriptures; whenever God sought to reveal a new aspect of himself and his relationship with man; he gave men a NEW NAME by which to call him! Other names of God not associated with Elohim EL SHADDAI: God Almighty or “God All Sufficient.” used 48 times in the OT, 31 times in Job. First used in Gen. 17:1, 2. (Gen. 31:29, 49:24, 25; Prov. 3:27; Micah 2:1; Isa. 60:15, 16, 66:10-13; Ruth 1:20, 21) In Rev. 16:7, “Lord God the Almighty.” The Septuagint uses Greek “ikanos” meaning “all-sufficient” or “self-sufficient.” The idols of the heathen are called “sheddim.” SHEPHERD: Psa. 23, 79:13, 95:7, 80:1, 100:3; Gen. 49:24; Isa. 40:11. JUDGE: Psa. 7:8, 96:13. EL ELYON: ‘Most High” (from “to go up”) Deut. 26:19, 32:8; Psa. 18:13; Gen. 14:18; Nu. 24:16; Psa. 78:35, 7:17, 18:13, 97:9, 56:2, 78:56, 18:13; Dan. 7:25, 27; Isa. 14:14. ABIR: ‘Mighty One’, (“to be strong”) Gen. 49:24; Deut. 10:17; Psa. 132:2, 5; Isa. 1:24, 49:26, 60:1. ADONAI: Lord in our English Bibles (Capital letter ‘L ‘, lower case, ‘ord’) (Adonai is plural, the singular is “adon”) meaning “Master” or “Lord”. Used 300 times in the OT always plural when referring to God; when singular. the reference is to a human lord. Used 215 times to refer to men. First use of Adonai, Gen. 15:2. (Ex. 4:10; Judges 6:15; 2 Sam. 7:18-20; Ps. 8, 114:7, 135:5, 141:8, 109:21-28). Heavy use in Isaiah (Adonai YHVH: i.e. Lord YHVH). 200 times by Ezekiel. Ten times in Dan. 9. YHVH and its variations YHVH: LORD in our English Bibles (all capitals). Yahweh is the name of God given to Moses. It occurs 6823 times in the OT. First use Gen. 2:4 (YHVH Elohim). From the verb “to be”, havah, similar to chavah (to live), “The Self-Existent One,” “I AM WHO I AM” or ‘I WILL BE WHO I WILL BE” as revealed to Moses at the burning bush, Ex.3. The name of God, considered too sacred to be uttered, or written “YHWH” was written without vowel points and is called the he tetragrammaton [the four letters]. Josh., Judges, Sam., and Kings use YHVH almost exclusively. The name of God is descriptive of His moral and spiritual attributes. (Dan. 9:14; Ps. 11:7; Lev. 19:2; Hab. 1:12). Note Deut. 6:4, 5 known to Jews as the Sh’ma uses both YHVH and Elohim to indicate one God with a plurality of persons in a God family of Beings. YHVH-JIREH: “The Lord will Provide.” Gen. 22:14. From “jireh” (“to see” or “to provide,” or to “foresee” as a prophet.). YHVH-ROPHE: “The Lord Who Heals” Ex. 15:22-26. From “rophe” (“to heal”); implies spiritual, emotional healing as well as physical healing. (Jer. 30:17, 3:22; Isa. 61:1) God heals body, mind and spirit; all levels of man’s being. YHVH-NISSI: “The Lord Our Banner.” Ex. 17:15. God on the battlefield, from a word which means “to glisten,” “to lift up,” See Psalm 4:6. YHVH-M’KADDESH: “The Lord Who Sanctifies” “To make whole, to set apart for holiness.” The Lord says: “Consecrate yourselves and be holy, because I am the Lord your God. Keep my decrees and follow them. I am the Lord, who makes you holy.” (Leviticus 20:7-8) YHVH-SHALOM: “The Lord Our Peace” Judges 6:24. “Shalom” translated “peace” 170 times means “whole,” “finished,” “fulfilled,” “perfected,” [Related to “wellness,” welfare.”] Deut. 27:6; Dan. 5:26; I Kings 9:25 8:61; Gen. 15:16; Ex. 21:34, 22:5, 6; Lev. 7:11-21. Shalom means that kind of peace that results from being a whole person in right relationship to God and to one’s fellow man. YHVH ELOHIM: “LORD God” Gen. 2:4; Judges 5:3; Isa. 17:6; Zeph. 2:9; Psa. 59:5, etc. YHVH-TSIDKENU “The Lord Our Righteousness” Jer. 23:5, 6, 33:16. From “tsidek” (straight, stiff, balanced – as on scales – full weight, justice, right, righteous, declared innocent.) God our Righteousness. YHVH-ROHI: “The Lord Our Shepherd” Psa. 23, from “ro’eh” (to pasture). YHVH-SHAMMAH: “The Lord is There” (Ezek. 48:35). YHVH-SABAOTH: “The Lord of Hosts” The commander of the angelic host and the armies of God. Isa. 1:24; Psa. 46:7, 11; 2 Kings 3:9-12; Jer. 11:20 (NT: Rom. 9:29; James 5:4, Rev. 19: 11-16). Other names of God BRANCH: (tsemach), The Branch: Zech. 3:8, 6:12; Isa. 4:2; Jer. 23:5, 33:15. KADOSH: “Holy One” Psa. 71:22; Isa. 40:25, 43:3, 48:17. Isaiah uses the expression “the Holy One of Israel” 29 times. SHAPHAT: “Judge” Gen. 18:25 EL ROI: “God of Seeing” Hagar in Gen. 16:13. The God Who opens our eyes. KANNA: “Jealous” (zealous). Ex. 20:5, 34:14; Deut. 5:9; Isa. 9:7; Zech. 1:14, 8:2. PALET: “Deliverer” Psa. 18:2. YESHUA: (Yeshua) “Savior” (“he will save”). Isa. 43:3. Jesus is the Greek equivalent of the Hebrew “Joshua.” The latter is a contraction of Ye-Hoshua. (“Christ”, the anointed one is equivalent to the Hebrew Maschiah, or Messiah). GAOL: “Redeemer” (to buy back by paying a price). Job 19:25; For example, the antitype corresponding to Boaz the Kinsman-Redeemer in the Book of Ruth. MAGEN: “Shield” Psa. 3:3, 18:30. STONE: (eben) Gen. 49:24 EYALUTH: “Strength” Psa. 22:19. TSADDIQ: “Righteous One” Psa. 7:9. EL-OLAM: “Everlasting God” (God of everlasting time) Gen. 21:33; Psa. 90:1-3, 93:2; Isa. 26:4. EL-BERITH: “God of the Covenant” Used of Baal in Judges 9:46. Probably used originally to refer to the God of israel. EL-GIBHOR: Mighty God (Isa. 9:6) TSUR: “God our Rock” Deut. 32:18; Isa. 30:29. Malachi calls Messiah “The Sun of Righteousness” (Malachi 4:2). Isaiah calls Messiah “Wonderful, Counselor, Mighty God (El Gibhor), Everlasting Father, Prince of Peace” (Isa. 9:6). ‘ATTIQ YOMIN (Aramaic): “Ancient of Days,” Dan. 7:9, 13, 22. MELEKH: “King” Psa. 5:2, 29:10, 44:4, 47:6-8, 48:2, 68:24, 74:12, 95:3, 97:1, 99:4, 146:10; Isa. 5:1, 5, 41:21, 43:15, 44:6; 52:7, 52:10. “The Angel of the Lord:” Gen. 16:7ff, 21:17, 22:11, 15ff, 18:1-19:1, 24:7, 40, 31:11-13, 32:24-30; Ex. 3:6, 13:21, Ezek. 1:10-13. Seen in the theophanies, or pre-incarnate appearances of the Son of God in the OT (See I Cor. 10:3 NT). FATHER: 2 Sam. 7:14-15; Psa. 68:5; Isa. 63:16, 64:8; Mal. 1:6. THE FIRST AND LAST: Isa. 44:6, 48:12. IMMANUEL, or EMMANUEL, or IMANUEL: “God with us.” Isaiah 7:14, 8:8. Quoted in Matthew 1:23. New Testament Scriptures, (Greek): KURIOS: (kurios) “Lord” Found some 600 times in the NT. DESPOTES: (despotes) “Lord” used 5 times: Lu. 2:29; Acts 4:24; 2 Pet. 2:1; Jude 4; Rev. 6:10. THEOS: (yeos) “God” (equivalent to the Hebrew Elohim), 1,000 times in the NT. I AM: Jesus upset his generation especially when He said, “Before Abraham was, I AM,” John 8:58. Note also his claim to be YHVH in such phrases as “I AM the Light of the world,” “I AM the bread of life,” living water,” “I AM the Resurrection and the Life,” “I AM the Way, Truth and the Life” in John’s Gospel. I AM from the Hebrew OT verb “to be” signifying a Living, Intelligent, Personal Being. THEOTES: “Godhead” Col. 2:9; Rom. 1:20. HUPSISTOS: “Highest” Mt. 21:9. SOTER: (soter) “Saviour” Luke 1:4 7. WORD: (logos) John 1:1ff ALMIGHTY: (pantokrator) 2 Cor. 6:18, Revelation, 9t, e.g. 19:6. JESUS is English from the Greek which was derived from the Hebrew “Joshua” (Y’shua) or “Ye-Hoshua” meaning YHVH IS SALVATION. CHRIST: is equivalent to the Hebrew ‘Messiah’ (Meshiach), “The Anointed One.” Yeshua a short form of Yehoshua [English Joshua] and in Hebrew is a verbal derivative from “to rescue”, “to deliver” “Salvation”. Its usage among the Jews of the Second Temple period, the Biblical Aramaic/Hebrew name יֵשׁוּעַ Yeshua‘ was common: the Hebrew Bible mentions several individuals with this name – while also using their full name Joshua. The name Yehoshua has the form of a compound of “Yeho-” and “shua”: Yeho- יְהוֹ is another form of יָהו Yahu, a theophoric element standing for the name of God יהוח (the Tetragrammaton YHWH), and שׁוּעַ shua‘ is a noun meaning “a cry for help”, “a saving cry”, that is to say, a shout given when in need of rescue. Together, the name would then literally mean, “God is a saving-cry,” that is to say, shout to God when in need of help. The English name Jesus derives from the Late Latin name Iesus, which transliterates the Koine Greek name Ἰησοῦς Iēsoûs. In the Septuagint and other Greek-language Jewish texts, such as the writings of Josephus and Philo of Alexandria, Ἰησοῦς Iēsoûs is the standard Koine Greek form used to translate BOTH of the Hebrew names: Yehoshua and Yeshua. Greek Ἰησοῦς or Iēsoûs is also used to represent the name of Joshua son of Nun in the New Testament passages Acts 7:45 and Hebrews 4:8. (It was even used in the Septuagint to translate the name Hoshea in one of the three verses where this referred to Joshua the son of Nun—Deut. 32:44.) Jesus is merely the English form of Yeshua [Emanuel] which the scriptures demand that Christ be called. The Origin of the Name Jesus Some try to claim that the word Jesus is “pagan.” They say erroneously that Jesus is from “Ye Zeus.” “Jesus” is not from “Zeus” but from “Iesua.” In fact, the Greek form of Zeus is…Zeusor Dios. Zeus (means “Living”) was the chief God of the Greeks… I think the Greeks would get the name of their own right, don’t you? The idea that Iesous is the Ionic masculine form of Iaso, the Greek goddess of healing cannot be substantiated. In the abridged and unabridged editions of Greek-English Lexicon by Liddell and Scott there is no such word connected with Iaso. Iesous is listed as the name of Jesus, which this Lexicon says is the Greek form of the Hebrew name ‘Joshua’. Iesous is in no way related to Iaso, the Greek goddess of healing. The New International Dictionary of New Testament Theology says this: “Iesous is the Greek form of the Old Testament Jewish name Yeshua, arrived at by transcribing the Hebrew and adding an s to the nom. to facilitate declension.” Language scholars all agree that the name “Jesus” is a direct translation of the Greek “Joshua” which proves that the “Zeus” story is a lie against the Savior. A point to consider is that when Paul preached to the Greeks at Athens, he preached about Jesus (Acts 17:18,31). The Greeks accused Paul of being a ‘setter forth of strange gods’. They did not connect the name “Jesus” with the hometown Greek god named “Zeus.” There is not a single historical, scholarly, or biblical source that etymologically connects “Jesus” with the god “Zeus.” All authorities state that “Jesus” is the Greek form of the Hebrew word ‘Joshua’ or Aramaic word ‘Yeshua.’ It has also the same root as “Hosea” or “Hoshea” or “Oshea.” In fact, Joshua’s birth name was Hoshea (Deut 32:44), which means “salvation.” JHWH (or YHVH) added to the word for salvation gave us Yehovah-Oshea or Ye-oshea … or Joshua. The names Hosea, Joshua, and Jesus are all derived from the same Hebrew root word meaning “salvation” but “Joshua” and “Jesus” include an additional idea, “YHWH or JHWH is Salvation!” Other NT Titles for Jesus: Shepherd of the Sheep; Master; King of kings; Lord of lords; Bishop and Guardian of our Souls; Daystar, Deliverer, Advocate, Last (or Second) Adam, Ancient of Days, Branch, Chief Cornerstone, Immanuel, First Born, Head of the Body, Physician, Rock, Root of Jesse, Stone, Potentate; Chief Apostle; Great High Priest; Pioneer and Perfecter of our Faith (or Author and Finisher); Lamb of God; Lamb Slain before the Foundation of the World; Lord God Almighty. LOGOS: “The Word of God” John l; Rev. 19:13. SOPHIA: “The Wisdom of God,” referring to Christ, refers back to Proverbs (I Cor. 1,2) The term YHVH refers to BOTH God the Father and the Son and its meanings are applicable to both. The son, Yeshua [Jesus] WAS the Creator “YHVH” and was made flesh to die and to then be resurrected by God the Father who was also called YHVH. YHVH can refer to either God the Father or to the Son, just like Elohim; although in the vast majority of cases in the Old Testament; Elohim and YHVH refers to the Son. Jesus said “My Father and I are ONE” is it any wonder that the same descriptive names could apply to both of them? How many people do you know of today, who bear their father’s name? especially their surname? Elohim is a family name and can refer to any member of the God family; Father or Son. That is why at the creation of man, Elohim said: Genesis 1:26 And God said, Let us make man in our image, after our likeness: and the Son YHVH, complied and executed God the Father’s desire. It is these things that were not understood and have given rise to the Jewish fable of Unitarianism. Yes, God the Father is subtly revealed in the Old Testament scriptures, but it takes the New Testament teachings to bring out that Jesus Christ was also YHVH and Elohim, along with the Father in the beginning; and gave up his God-hood for the sake of his creation and became a man of flesh. It takes the New Testament scriptures and the Holy Spirit to understand that there are two individual beings called by the same family names. During the Old Testament period the people knew of only one being in the God family, even though there were subtle hints of another. It was when Christ came and revealed the spiritual things, that the truth that there were two beings in the God family, that we graduate from the into the New Covenant understanding of the nature and identification of Messiah the Son, and the enormity of his sacrifice in discarding his God-hood to die for his creation. Was the Being who later became the Son; God, of the YHVH Family of Elohim? Yes, he was an Elohim, a YHVH, and the very Implementing Creator God; before he gave that up to be made flesh. Was the man Jesus Christ God? No, he had given up his God-hood to become a man, to become flesh and to die for his creation. Is he now a God again? Yes; he has been changed to spirit and is exalted above all authorities and powers except the Father. Does the correct pronunciation in the correct language the only name that can save us: or does faith in the Being [with many names] that the name represents save us? Acts 4:10-12 Be it known unto you all, and to all the people of Israel, that by the name of Jesus Christ of Nazareth, whom ye crucified, whom God raised from the dead, even by him doth this man stand here before you whole. This is the stone which was set at nought of you builders, which is become the head of the corner. Neither is there salvation in any other: for there is none other name under heaven given among men, whereby we must be saved. The meaning of Acts 4:12 is that there is no other Being in whom men can find salvation other than Jesus Christ. There is a fundamental assumption by some that we must place a great emphasis on the way the Messiah’s name is spoken. This assumption is NOT true. Upon what basis is this doctrine founded? Why should we stress something that even God Himself did not stress? There is no place in the Bible where God stressed that His name, or that the name of the Messiah must be pronounced in a certain way. He only declared that His name was “ehyeh asher ehyeh” (I AM THAT I AM), and later, YHVH (or YHWH). YHWH is the third person singular form, most likely coming from the old Hebrew word hayah (He is), which has the meaning of “to be.” The name for God was not a special word that was not a part of the Hebrew vocabulary, but was actually words that they were already familiar with. In other words, when God declared who He was through the use of the Hebrew language, He was trying to portray who He was, i.e. the “self-existing one to the speakers of that language.” God only said “YHVH” because He was speaking to the Hebrews. There is nothing in the OT that would lead us to believe that if God would have spoken to any other non-Hebrew, that He still would have said YHWH as His name. God’s name is not language-specific, nor is it dependent on the right pronunciation. There is no Scripture that can be shown to teach otherwise—such simply does not exist. No one can bring forth one that will. After all, God is the creator of ALL languages! What makes salvation effective, or prayer effective, is not the pronunciation of the Messiah’s name, but FAITH in the Messiah and obedience to God. His name is not mystical. To teach such is Kabbalism [magic]. There is nothing about His name that has the ability to save in and of itself. This is a misunderstanding of the ancients’ concept of a name, particularly the Hebrew concept. In the scriptures, one’s name signifies their person, worth, character, reputation, or authority. EXAMPLE: When the Scripture says that the “name of the Lord is a strong tower” it does not mean that there is a tower shaped in the letters of Lord that the righteous run into, but that the person of YHWH is like a strong tower wherein lies safety. The focus is on the person, not the verbal symbol of the person. Another example is found in Revelation where John said that there were “a few names in Sardis who have not defiled their clothes” (Revelation 3:4). John clearly had people in mind, not names. Because a person’s name does represent them, however, when one uses that name, they carry the person’s authority, character, and reputation along with it. The focus must always be seen as being on the person, and not the actual pronunciation of the name. How did the bible use the concept of a “name”?” Was Peter (Petros) offended when Christ called him that and also called him Cephas (Joh 1:42)? “Both mean “pebble” so why would he be offended? The disciple Andrew did not seem to mind using the Hebrew title for (Actually the Aramaic form of the Hebrew; Mashiach) Messiah with the Greek in John 1:41 He first findeth his own brother Simon, and saith unto him, We have found the Messias, which is, being interpreted, the Christ. Jesus cried out to God the Father with has last breaths in Aramaic and not in Hebrew; so that the onlookers were confused: Matthew 27:46 And about the ninth hour Jesus cried with a loud voice, saying, Eli, Eli, lama sabachthani? that is to say, My God, my God, why hast thou forsaken me? [Aramaic] 27:47 Some of them that stood there, when they heard that, said, This man calleth for Elias. A name is a created thing, and God commands us not to worship the creation. We are commanded to worship God, not the letters or pronunciation of His name: When we ascribe power to a word, we are ascribing power to something that was created, not to its creator. A name has no significance or meaning without the person. A name only serves to identify. Names and titles applied to God, describe His attributes, character, and being. Those who call on a name or title as the way to salvation should read Matthew 7:21-22 and Luke 6:46, which speak of people who call upon and appropriate the name of the Lord, but do not do the things that He commands. How is God’s Holy Name Profaned? Leviticus 18:20 Moreover thou shalt not lie carnally with thy neighbour’s wife, to defile thyself with her. 18:21 And thou shalt not let any of thy seed pass through the fire to Molech, neither shalt thou profane the name of thy God: I am the LORD. 18:22 Thou shalt not lie with mankind, as with womankind: it is abomination. 18:23 Neither shalt thou lie with any beast to defile thyself therewith: neither shall any woman stand before a beast to lie down thereto: it is confusion. 18:24 Defile not ye yourselves in any of these things: for in all these the nations are defiled which I cast out before you: The context of Leviticus 18 is sexual sins – what has this to do with not correctly pronouncing the ‘proper name’ of God only in Hebrew, as some interpret the injunction against profaning his ‘shem’? The word rendered “profane” may be understood as “prostitute” (see Leviticus 21:9), as in: “Thou shalt not prostitute the name of thy “Elohim” (God) [by claiming to be of God while not living by God’s Word]. Let us look further at the matter. Leviticus 20:1 And the LORD (YHWH) spake unto Moses, saying, 20:2 Again, thou shalt say to the children of Israel, Whosoever he be of the children of Israel, or of the strangers that sojourn in Israel, that giveth any of his seed unto Molech; he shall surely be put to death: the people of the land shall stone him with stones. 20:3 And I will set My face against that man, and will cut him off from among his people; because he hath given of his seed unto Molech, to defile My sanctuary, and to profane My holy name. We see here that God’s holy name was profaned by a man giving his seed to Molech–not by misspelling or mispronouncing God’s “name;” nor by using one of God’s names other than YHVH, or by speaking in another language. It is a man’s evil actions, as a supposed man of the covenant, which profane God’s holy name [reputation]. When a person says that he is a godly man and then has no zeal to live by every Word of God, he profanes God’s name! Leviticus 19:11 Ye shall not steal, neither deal falsely, neither lie one to another. 19:12 And ye shall not swear by My name falsely, neither shalt thou profane the name of thy God: I am the LORD. 19:13 Thou shalt not defraud thy neighbour, neither rob him: the wages of him that is hired shall not abide with thee all night until the morning. Again, why mention “neither shalt thou profane the name of thy God” in this context (don’t steal, don’t deal falsely, don’t lie–don’t swear falsely by or profane God’s name–don’t defraud, don’t rob, nor keep back wages) if this command against profanation truly is one concerning the use or disuse of certain phonetic sounds? Leviticus 21:5 They shall not make baldness upon their head, neither shall they shave off the corner of their beard, nor make any cuttings in their flesh. 21:6 They shall be holy unto their God, and not profane the name of their God: for the offerings of the LORD made by fire, and the bread of their God, they do offer: therefore they shall be holy. How would the priests avoid profaning God’s name? By saying it a certain way? No! By being holy unto their God. It is acts of sin; that profane His name. The Word of God is telling you this – not any man. Leviticus 22:1 And the LORD spake unto Moses, saying, 22:2 Speak unto Aaron and to his sons, that they separate themselves from the holy things of the children of Israel, and that they profane not My holy name in those things which they hallow unto Me: I am the LORD. 22:3 Say unto them, Whosoever he be of all your seed among your generations, that goeth unto the holy things, which the children of Israel hallow unto the LORD, having his uncleanness upon him, that soul shall be cut off from my presence: I am the LORD. The scripture says here that the priests would profane God’s holy name if they would offer sacrifices while being in the state of uncleanness [an analogy of being in sin], or offer improper sacrifice, etc. Read the entire chapter to see the context–it even concludes with the same notion: Leviticus 22:31 Therefore shall ye keep my commandments, and do them: I am the LORD. 22:32 Neither shall ye profane my holy name; but I will be hallowed among the children of Israel: I am the LORD which hallow you Like the other Scriptures we have already examined, this has NOTHING to do with an alleged commandment to use only a certain language or pronunciation of phonetic sounds (i.e., a proper name). Jeremiah 34:14 At the end of seven years let ye go every man his brother an Hebrew, which hath been sold unto thee; and when he hath served thee six years, thou shalt let him go free from thee: but your fathers hearkened not unto Me, neither inclined their ear. 34:15 And ye were now turned, and had done right in My sight, in proclaiming liberty every man to his neighbour; and ye had made a covenant before Me in the house which is called by My name: 34:16 But ye turned and polluted My name, and caused every man his servant, and every man his handmaid, whom ye had set at liberty at their pleasure, to return, and brought them into subjection, to be unto you for servants and for handmaids. YHVH (or YHWH) here proclaims that His name was polluted by Israel. What was the evidence He presented them? Disuse of “Yahweh” ? No. How about mispronunciation,? No. God’s claim of evidence that they polluted His name: was Disobedience to the Sabbatical Year law. Ezekiel 20:39 As for you, O house of Israel, thus saith the Lord GOD; Go ye, serve ye every one his idols, and hereafter also, if ye will not hearken unto Me: but pollute ye My holy name no more with your gifts, and with your idols. God once again proclaims that His name was polluted by Israel. Was it for using a title (i.e., “God/Elohim,” “Lord/Adonai,” etc.)? Was it for not professing the ‘tetragrammaton”? No, it was their idolatry which profaned God’s name! Ezekiel 43:7 And He said unto me, Son of man, the place of My throne, and the place of the soles of My feet, where I will dwell in the midst of the children of Israel for ever, and My holy name, shall the house of Israel no more defile, neither they, nor their kings, by their whoredom, nor by the carcases of their kings in their high places. 43:8 In their setting of their threshold by My thresholds, and their post by My posts, and the wall between Me and them, they have even defiled My holy name by their abominations that they have committed: wherefore I have consumed them in mine anger. 43:9 Now let them put away their whoredom, and the carcases of their kings, far from Me, and I will dwell in the midst of them for ever. A name is a symbol of the person and the reputation of that person. When we claim to be God’s people and then sin, we are besmirching God’s reputation, which is what profaning God’s name really means. When we claim to be of God, then people equate what we do with the God that we claim to worship, and our evil deeds defile His name, staining the reputation of God in the minds of people! We ruin/profane/pollute/besmirch God’s name – which good name is God’s good reputation – by our evil deeds, not by the language we speak or the pronunciation of a word. We are to pray to God the Father in the name of the Son; whether we use the Hebrew form or the Greek form or the English form or the Vietnamese form or the Spanish form of the Son’s name is not important; because God is the Creator of ALL languages and ALL mankind are the created children of God, and when called to God each turns to God in their own language which was given to him by God.
<urn:uuid:7e6e65e5-df9f-43e9-8919-73c9a12ec464>
CC-MAIN-2020-29
https://theshininglight.info/103-the-names-of-god/
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657140746.69/warc/CC-MAIN-20200713002400-20200713032400-00373.warc.gz
en
0.928906
9,216
3.515625
4
Leaf springs are thin metal plates that are elastically deformed under load: When a force is applied to a leaf spring, then it is subject to deformation. A characteristic of such an elastic deformation is that the original shape is re-formed when the force is no longer active. In this experiment, the dependence of the deformation on the force applied is to be examined. Especially understandable and didactic prepared experiment descriptions including protocol Future-proof lessons: Integration of tablets in digital science lessons Enhanced motivation of students due to the use of the intuitive measureAPP Increase of media competence
<urn:uuid:ce4a1d63-379c-4c34-bcb2-30fbf4634fe6>
CC-MAIN-2020-16
https://www.phywe.com/en/biegung-einer-blattfeder-mit-measureapp.html
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370505359.23/warc/CC-MAIN-20200401003422-20200401033422-00271.warc.gz
en
0.912764
124
3.296875
3
Scientists in Cambridge have built a virtual reality (VR) 3D model of cancer, providing a new way to look at the disease. The tumour sample, taken from a patient, can be studied in detail and from all angles, with each individual cell mapped. Researchers say it will increase our understanding of cancer and help in the search for new treatments. The project is part of an international research scheme. How it was done Researchers start with a 1mm cubed piece of breast cancer tissue biopsy, containing around 100,000 cells Wafer thin slices are cut, scanned and then stained with markers to show their molecular make-up and DNA characteristics The 3D tumour can be analysed within a virtual reality laboratory The VR system allows multiple users from anywhere in the world to examine the tumour. Prof Greg Hannon, director of Cancer Research UK Cambridge Institute (CRUK), told the BBC: “No-one has examined the geography of a tumour in this level of detail before; it is a new way of looking at cancer.” The ‘virtual tumour’ project is part of CRUK’s Grand Challenge Awards. Within a ‘virtual’ laboratory, Prof Hannon and I became avatars, whilst the cancer was represented by a multi-coloured mass of bubbles. Although the human tissue sample was about the size of a pinhead, within the virtual laboratory it could be magnified to appear several metres across. To explore the tumour in more detail, the VR system allowed us to ‘fly through’ the cells. The virtual tumour we were looking at through our headsets was taken from the lining of the breast milk ducts. As Prof Hannon rotated the model, he pointed to a group of cells that were flying off from the main group: “Here you can see some tumour cells which have escaped from the duct. “This may be the point at which the cancer spread to surrounding tissue – and became really dangerous – examining the tumour in 3D allows us to capture this moment.” Prof Karen Vousden, CRUK’s chief scientist, runs a lab at the Francis Crick Institute in London which examines how specific genes help protect us from cancer, and what happens when they go wrong. She told the BBC: “Understanding how cancer cells interact with each other and with healthy tissue is critical if we are going to develop new therapies – looking at tumours using this new system is so much more dynamic than the static 2D versions we are used to.”
<urn:uuid:14207dee-f5f2-4921-9531-871c7bcfae81>
CC-MAIN-2021-21
https://peoplesdailyng.com/virtual-tumour-new-way-to-see-cancer/
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991553.4/warc/CC-MAIN-20210510235021-20210511025021-00091.warc.gz
en
0.951633
538
3.75
4
Buy Smarter: what you need to know about... SSDs Speed up your laptop Smarter Memory The solid state drive (SSD) is like a fast hard disk drive (HDD) with no moving parts. Many SSDs can be used as direct replacements for mechanical hard drives, although usually with a capacity restriction. They are better suited to notebooks, netbooks and Ultrabooks because capacities in these tend to be lower than in desktop PCs, where storage can easily run into terabytes. Even in desktops, though, there is good reason to fit an SSD alongside mechanical storage. The lower cost of SSDs is the reason they are fitted as standard in some portable devices, such as the Apple MacBook Air and in many rivals on the PC side, but not, usually, in new PCs. They can be retro-fitted, though, so this guide looks at buying for both replacement and supplementation. SSDs are faster, less noisy and more robust than hard drives An SSD is an array of Flash storage chips combined with a sophisticated controller, so it acts like a hard drive. It can perform random and sequential reads and writes like an HDD, but at much higher speed because the data transfer is not governed by the speed at which each bit can be moved through a read/write head to or from the surface of a spinning disk platter. Instead, the data is stored in much the same way as on a USB drive or memory card, but with a more intelligent controller distributing and buffering it. Good things about SSDs SSDs have several advantages over HDDs, particularly when it comes to access time, transfer rate, robustness, power consumption and noise level. The access time, which is the time before data starts to flow, is typically about 0.1ms for an SSD compared with 5ms-10ms for a hard drive. The transfer rate of an SSD is between 100MBps and 500MBps, depending on the model, while a typical hard drive comes in at the lower end of this range. If you combine the access time and transfer rate, you will see a noticeable storage speed improvement when using an SSD. SSDs were originally developed for military use, which demanded toughness Since there are no moving parts in an SSD, it is considerably more robust than an HDD with its spinning disks and floating heads. SSDs were originally developed for military use, which demanded this kind of toughness. The lack of moving parts also means that an SSD is completely silent. Modern hard drives are also pretty quiet, but you can still hear them in operation. Portable devices also benefit from an SSD's lower power consumption, which is about half that of a comparable hard drive.
<urn:uuid:fda5428a-11cb-45e8-81cb-3c35395acff9>
CC-MAIN-2014-23
http://www.theregister.co.uk/2012/07/05/smarter_memory_ssd_buyers_guide/
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510275111.45/warc/CC-MAIN-20140728011755-00124-ip-10-146-231-18.ec2.internal.warc.gz
en
0.962085
558
2.765625
3
When plotted as voltage (V) as a function of phase (θ), a square wave looks similar to the figure to the right. The waveform repeats every 2π radians (360°), and is symmetrical about the voltage axis (when no DC offset is present). Voltage and current exhibiting cyclic behavior is referred to as alternating; i.e., alternating current (AC). One full cycle is shown here. The basic equation for a square wave is as follows: There are a number of ways in which the amplitude of a square wave is referenced, usually as peak voltage (Vpk ), peak-to-peak voltage (Vpp ), average voltage (Vav ), and root-mean-square voltage (Vrms Peak voltage and peak-to-peak voltage are apparent by looking at the above plot. Root-mean-square and average voltage are not so apparent. Also see Sinewave Voltages Triangle Wave Voltages Root-Mean-Square Voltage (Vrms) As the name implies, Vrms is calculated by taking the square root of the mean average of the square of the voltage in an appropriately chosen interval. In the case of symmetrical waveforms like the square wave, a quarter cycle faithfully represents all four quarter cycles of the waveform. Therefore, it is acceptable to choose the first quarter cycle, which goes from 0 radians (0°) through π is the value indicated by the vast majority of AC voltmeters. It is the value that, when applied across a resistance, produces that same amount of heat that a direct current (DC) voltage of the same magnitude would produce. For example, 1 V applied across a 1 Ω resistor produces 1 W of heat. A 1 Vrms square wave applied across a 1 Ω resistor also produces 1 W of heat. That 1 square wave has a peak voltage of 1 V, and a peak-to-peak voltage of 2 V. Since finding a full derivation of the formulas for root-mean-square (Vrms ) voltage is difficult, it is done here for you. So, Vrms = Vpk Average Voltage (Vavg) As the name implies, Vavg is calculated by taking the average of the voltage in an appropriately chosen interval. In the case of symmetrical waveforms like the square wave, a quarter cycle faithfully represents all four quarter cycles of the waveform. Therefore, it is acceptable to choose the first quarter cycle, which goes from 0 radians (0°) through π/2 As with the Vrms formula, a full derivation for the Vavg formula is given here as well. * I have no idea why we write "Sinewave," but not "Trianglewave" and "Squarewave."
<urn:uuid:5e1777c9-c98f-459e-8693-b16646bf0278>
CC-MAIN-2016-44
http://www.rfcafe.com/references/electrical/square-wave-voltage-conversion.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719784.62/warc/CC-MAIN-20161020183839-00521-ip-10-171-6-4.ec2.internal.warc.gz
en
0.914261
606
4.40625
4
Near Kingstree in Williamsburg County, South Carolina — The American South (South Atlantic) Lower Bridge: Take the Low Ground! After clashes at Wiboo Swamp and Mount Hope Swamp, Marion continued moving east along the Santee towards Murray’s Ferry, thinking Watson would follow. But Watson turned north and made for the Lower Bridge over the Black River, with Kingstree just beyond. Marion and his men moved quickly to get to the Lower Bridge first. When Watson arrived at the high bluffs of the south bank (across the river), he found the bridge partially destroyed and Marion’s men arrayed against him on the low, swampy ground of the north bank (on this side of the river). In most battles, the high ground is the best tactical position. But in this case, when Watson sent his artillery forward, the artillerymen could not lower their guns far enough to hit their opponents below. As Marion’s expert riflemen picked off his artillerymen, Watson withdrew to the Witherspoon plantation nearby. Baffled at the defeat, Watson reportedly said to his unwilling Whig hostess: “I have never seen such shooting before in my life.” Marker series. This marker is included in the Francis Marion trail marker series. Location. 33° 35.255′ N, 79° 49.043′ W. Marker is near Kingstree, South Carolina, in Williamsburg County. Marker is on Martin Luther King, Jr. Ave. (State Highway 377) half a mile north of Thorntree Road (State Highway S45-143). Touch for map. Marker is in this post office area: Kingstree SC 29556, United States of America. Other nearby markers. At least 8 other markers are within 6 miles of this marker, measured as the crow flies. Battle Of Lower Bridge (a few steps from this marker); Burrows's Service Station / Cooper's Country Store (approx. half a mile away); McClary Cemetery (approx. 3.9 miles away); Dr. Martin Luther King, Jr. (approx. 5.3 miles away); Thurgood Marshall, J.D. (approx. 5.3 miles away); Old Muster Ground and Courthouse (approx. 5.3 miles away); Williamsburg County Confederate Monument (approx. 5.3 miles away); Williamsburgh (approx. 5.3 miles away). Touch for a list and map of all markers in Kingstree. Categories. • War, US Revolutionary • Credits. This page was last revised on June 16, 2016. This page originally submitted on March 25, 2012, by Anna Inbody of Columbia, South Carolina. This page has been viewed 509 times since then and 43 times this year. Photos: 1, 2, 3, 4. submitted on March 25, 2012, by Anna Inbody of Columbia, South Carolina. • Bill Pfingsten was the editor who published this page.
<urn:uuid:95aa84ab-fbe4-491c-abc9-97e8f032a5be>
CC-MAIN-2017-22
https://www.hmdb.org/marker.asp?marker=53893
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463608058.13/warc/CC-MAIN-20170525083009-20170525103009-00199.warc.gz
en
0.952821
624
2.828125
3
Struggling Honduran Farmers Cope With Climate Challenges World leaders have called President Trump’s withdrawal from the Paris climate accord “regrettable” and “disappointing.” But for Honduran farmers, climate change is personal. The country ranked No. 3 in the world on the list of countries most affected by global warming between 1996 and 2014. And now, Honduran farmers risk losing millions in U.S. Agency for International Development money earmarked to help fight back. Opatoro County sits in the densely forested western side of Honduras, a few miles from El Salvador. Its 35 villages are connected by steep mountain roads, many of them impassable during the rainy season. Life has always been hard for Opatoro’s residents: plumbing and electricity are rare, health care is scarce and poverty is endemic. Farmer Jose Santos Martinez Gavarra has been farming coffee for 45 years, just outside the tiny town of La Florida. When asked about changes he’s seen, the first words out of his mouth are “cambio climático” — climate change. “We’ve seen the climate change here a lot, especially with there being a lack of water from the springs,” Gavarra says through a translator. “We’ve also seen a lot of change in the amount of fruit produced.” And then there are the funguses — he says they’ve hit hard. The rust fungus, “la roya,” thrives in warmer temperatures. It prevents leaves from absorbing sunlight, causing plants to die. In 2013 it wiped out 40 percent of the country’s coffee crop, leading the government to declare a national emergency. But the rust fungus isn’t the worst of the “plagues,” Gavarra says. He reserves that distinction for the southern pine beetle, an invasive insect that attacks trees. “We were very surprised at how fast and how hard this plague hit us,” he says. The loss of trees, he says, also caused erosion, landslides and poorer soil quality. In 2014 the government literally declared war on the pine beetle, sending troops into the forests with chainsaws. Three years and a million acres later, huge swaths of brownish-red trees stand out like beacons on the green mountain landscape. Dilcia Garcia’s farm sits on steep hillside in El Sauce. It’s remarkable in the region for two reasons: the diversification Garcia is attempting after her coffee was devastated by the rust fungus, and the irrigation pipes that line some of her fields. Both those innovations came with the help of USAID. But under President Trump’s budget proposal Honduras would lose one-third of its USAID money, and all the money earmarked for development assistance. In other words, projects like Garcia’s. Garcia says the president of her village is working hard to figure out how to finish what they’ve started over the last six years, particularly the education and training. She says she knows that farmers will need to keep innovating if they’re going to survive — and that might mean putting their resources together to create microbusinesses, something she’s already attempting with a women’s collective formed to make wine from local pineapples and oranges. Jose Roher Lopez was a lifelong coffee picker when he decided to try his hand at beekeeping. He says the local decline in coffee production was forcing him and others to travel farther and farther during the picking season — a move that was destroying families. Now he produces two different varieties of honey, which allows him to support his family. Because he received his seed money for the project from a nongovernmental organization, he says the USAID cutbacks wouldn’t affect him directly. But he worries that those cuts could drain resources from the region at a time when farmers are starting to see real gains. For Garcia, climate change isn’t only an immediate concern, but something she worries may ultimately change the only way of life the region has known. She and her husband have planted what she calls “wood trees,” or trees to sell for lumber, as her children’s inheritance — they take a long time to grow, and promise high returns. But she says the plagues, droughts and water shortages are driving young people out of the region to work at menial jobs in the city. “We see them leaving,” she says through a translator, “and then not being able to come back.” Ultimately, Garcia says she worries that neither the wood trees — nor the children — will still be there in another decade. Copyright 2020 NPR. To see more, visit https://www.npr.org.
<urn:uuid:555f47ef-1d0b-46dd-9be9-99d9ab58eeb2>
CC-MAIN-2021-43
https://www.wfae.org/2017-06-20/struggling-honduran-farmers-cope-with-climate-challenges
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323588284.71/warc/CC-MAIN-20211028100619-20211028130619-00663.warc.gz
en
0.961173
1,024
2.625
3
Posts for: November, 2017 More than likely your great-grandparents, grandparents and even your parents had a common dental experience: when one of their teeth developed a cavity, their dentist removed the decayed portion (and maybe a little more) through drilling and then filled the cavity. In other words, treatment was mainly reactive—fix the problem when it occurred, then fix it again if it reoccurred. You may have had similar experiences—but the chances are good your dentist’s approach is now quite different. Today’s tooth decay treatment is much more proactive: address first the issues that cause tooth decay, and if it does occur treat it with an eye on preventing it in the future. This approach depends on maintaining equilibrium between two sets of competing factors that influence how your teeth may encounter tooth decay. This is known as the caries balance (caries being another name for tooth decay). On one side are factors that increase the risk of decay, known by the acronym BAD: Bad Bacteria that produce acid that dissolves the minerals in tooth enamel; Absence of Saliva, the body’s natural acid neutralizer; and Dietary Habits, especially foods with added sugars that feed bacteria, and acid that further weakens enamel. There are also factors that decrease the risk of tooth decay, known by the acronym SAFE: Saliva and Sealants, which focuses on methods to boost low salivary flow and cover chewing surfaces prone to decay with sealant materials; Antimicrobials, rinses or other substances that reduce bad bacteria populations and encourage the growth of beneficial strains; Fluoride, increased intake or topical applications of this known enamel-strengthening chemical; and Effective Diet, reducing the amount and frequency of sugary or acidic foods and replacing them with more dental-friendly choices. In effect, we employ a variety of techniques and materials that inhibit BAD factors and support SAFE ones. The foundation for prevention, though, remains the same as it was for past family generations—practice effective oral hygiene by brushing and flossing daily and regular dental cleanings and checkups to keep bacterial plaque from accumulating and growing. Your own diligent daily care rounds out this more effective way that could change your family history of tooth decay for you and future generations. Are you tired of those stained, chipped, slightly crooked or—in a word—unattractive teeth? We have an effective solution for you: cover them with life-like porcelain veneers. As the name implies, a veneer is a thin layer of dental porcelain custom-made to match your tooth’s shape and color and permanently bonded to the outside enamel. With its translucent, light-reflective quality similar to tooth enamel, dental porcelain looks completely natural. Veneers are well suited for minor to moderate imperfections, and can even be used to correct slight gaps between teeth. We begin the process by performing a comprehensive dental exam to begin planning the exact shape and color of your new veneers. We can now do much of this planning with computer imaging, which may also give you the chance to see how your veneers will look on you after treatment. We often will also need to prepare the teeth to accommodate the veneers when we bond them. Although the alterations shouldn’t be anywhere near as extensive as with a porcelain crown, we will still often need to remove some of the enamel layer so the veneer won’t look bulky. Even though we’ll remove as little as possible, if needed it will still permanently alter your teeth—so they’ll require some form of restoration from then on. Once we’ve prepared the teeth, it’s then time to create the veneers. This is typically done by a dental laboratory technician through a manual process that may take several weeks. Increasingly, though, equipped dental offices are now able to generate their veneers in-house with computer-aided design/computer-aided manufacture (CAD/CAM) milling technology. Once the veneers are ready, they’re bonded securely to the teeth with a detailed process that helps ensure they’ll endure biting and chewing forces for a long time. Still, you’ll need to avoid biting into hard objects or using your teeth for such things as cracking nuts. If you have a clenching or grinding habit, we may also recommend you wear a night guard to prevent excessive forces against not just your veneers but your teeth as well. By taking good care of them, your new veneers can give you many years of service. Most of all, they can transform your embarrassing appearance into a smile you’re proud to show. If you would like more information on porcelain veneers, please contact us or schedule an appointment for a consultation. You can also learn more about this topic by reading the Dear Doctor magazine article “Porcelain Veneers.” People with diabetes have special concerns when it comes to dental care. In fact, 1 in every 5 cases of total tooth loss is linked to this widespread health condition. November is National Diabetes month, so it’s a good opportunity for us to answer some frequently asked questions about oral health and diabetes. Q. Can I get a dental implant to replace a missing tooth even if I have diabetes? A number of studies have shown that people with diabetes can be good candidates for dental implants, but there are some concerns regarding dental implant treatment, which involves minor surgery. Wounds tend to heal more slowly in people with diabetes, who are also more infection-prone than those without diabetes. In diabetic individuals with poor glucose control, research has also shown that it takes longer for the bone to heal after implant placement. We will take these (and other) factors into account when planning your implant treatment. However, in many situations even poorly controlled diabetes does not necessarily preclude dental implant treatment. Q. I’ve heard people with diabetes have a higher risk for gum disease. Is that true? Yes. Research shows that people with diabetes are more susceptible to periodontal (gum) disease, especially when their diabetes is poorly controlled. The reverse is also true: untreated periodontal disease can worsen blood sugar levels. So it’s important to manage both of these inflammatory conditions. If you notice the early signs of gum disease, such as inflamed or bleeding gums, please bring this to our attention. Early gum disease (gingivitis) is much easier to treat than more advanced forms—which can eventually lead to tooth loss. Q. If I have diabetes, how can I protect my oral health? Keep doing your best to control your blood sugar levels with exercise and a healthy diet—and stick to an effective daily oral hygiene routine, which includes both brushing and flossing and coming in for regular dental checkups and cleanings. Make sure to let us know what medications you are taking and update us on any changes. If you notice any mouth sores, swelling or inflammation, bring this to our attention as soon as possible.
<urn:uuid:fd7ba567-d350-42fe-aa45-3e32867c4b56>
CC-MAIN-2019-35
http://www.pleasantavenuedentistry.com/blog/date/2017-11-01.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027319724.97/warc/CC-MAIN-20190824041053-20190824063053-00140.warc.gz
en
0.94921
1,486
2.8125
3
Our project entitled 'GET AHEAD WITH STEM!' aimed to close the educational achievement gap for children from disadvantaged backgrounds and particularly girls, who are currently underrepresented within STEM careers. It ran for two years from April 2009 to March 2011 with an extra-curriculum educational programme comprising of: - 160 stimulating in-school, STEM curriculum enhancement days each for 50 Yr.9 students, for a total of 8000 students. - Eight high-impact Yr.9 residential Engineering Experience 4-day courses, each for 100 students. - Students for the residentials will be recruited from the STEM days. - Teacher Continual Professional Development to enhance the delivery of practical STEM skills in the classroom. Both STEM days and residential courses will be populated with maintained sector students recruited from specified areas in England.
<urn:uuid:5a4c4de9-128f-44a7-a274-0aeeb7fbdac2>
CC-MAIN-2017-04
http://getaheadwithstem.org.uk/
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560279176.20/warc/CC-MAIN-20170116095119-00524-ip-10-171-10-70.ec2.internal.warc.gz
en
0.920731
164
3.328125
3
Authors: van Rooij, Erica P.; Rollins, Lee A.; Holleley, Clare E.; Griffith, Simon C. Source: PEERJ, 4, JAN 5 2016 Brief summary of the paper: Although the majority of passerine birds are socially monogamous, true genetic monogamy is rare, with extra-pair paternity (EPP) occurring in almost 90% of surveyed socially monogamous species. We present the first molecular data on the genetic breeding system of the long-tailed finch, Poephila acuticauda, a grass finch endemic to the tropical northern savannah of Australia. Although the species forms socially monogamous pair bonds during the breeding season, we found that extra-pair males sired 12.8% of 391 offspring, in 25.7% of 101 broods. Our findings provide only the second estimate of extra-pair paternity in the estrildid finch family.
<urn:uuid:f731b79d-48b0-42c4-ba24-ec7c4d8b65b5>
CC-MAIN-2017-51
https://cie-deakin.com/2016/02/19/cie-spotlight-extra-pair-paternity-in-the-long-tailed-finch-poephila-acuticauda/
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948511435.4/warc/CC-MAIN-20171210235516-20171211015516-00560.warc.gz
en
0.853951
197
2.890625
3
We encourage our Michigan neighbors to be very careful when visiting areas near our 13 hydroelectric generating plants located on the Manistee, Muskegon, Au Sable, Kalamazoo and Grand Rivers. In particular, watch for thin ice upstream and downstream of the dams. Ice conditions on the reservoirs next to these hydro plants can change rapidly due to unpredictable weather. Water currents at a hydroelectric plant can be hazardous in winter, when a reservoir may or may not be covered with ice. Ice near a dam is not reliable and should be avoided by snowmobilers, anglers and anyone else. Ice-covered water downriver from a hydroelectric facility should also be considered very dangerous, and is never a safe place to walk. Built between 1906 and 1935, our hydros are an important contributor to renewable energy in Michigan and have a combined generating capacity of approximately 130 megawatts, which is enough to serve about 70,000 people.
<urn:uuid:30b45145-071f-4c71-abe1-3ba931e0be86>
CC-MAIN-2023-23
http://force4michigan.com/be-safe-around-hydro-dams-and-michigan-rivers-this-winter/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224643388.45/warc/CC-MAIN-20230527223515-20230528013515-00463.warc.gz
en
0.960888
193
3.1875
3
Learning Scales Using CAGED Question by Doug The CAGED method has me confused. One teacher/web site will call the C-shape position "1" while another will call the E-shape position "1". Should I just memorize the 5 shapes and their root note(s) positions? Do the shapes always go in sequence? Meaning if I start with the E-shape on the 5th Fret, to play the A major scale, should I then play the D-shape below it and the G-shape above it? If I want to start at the top of the neck, and someone says play a B- scale, how should I choose the shape? Based on the roots I guess? Thank you in advance for your advice. I like the site It's common for the C shape to be considered the 1st position in CAGED for two reasons: 1) Because when talking about major chords, keys and scales, C major tends to be the default example, therefore the C shape becomes the "starting point". 2) Because C is the first letter in the CAGED acronym! I've personally always thought of the E-shape and its related pattern as the 1st position, since it "starts" on the 6th string, i.e. the root is the lowest note in the shape/pattern. In reality, there is just an ordered sequence of patterns, no matter which one you start on - CAGED, AGEDC, GEDCA, EDCAG, DCAGE. Memorizing the CAGED patterns If you want to learn through CAGED then, yes, I would recommend simply memorizing the 5 shapes/patterns and their root note positions. Only think of these patterns as an ordered sequence in terms of their relationship to one another on the fretboard. When it comes to actually playing them , you're best off testing your knowledge by picking a random chord and position in your mind and seeing if you can jump straight to that position without thinking too much about it. Once you have the positions nailed, it's crucial (it really is!) that you work on merging them so you can move between patterns seamlessly, for any given root , and get out of "box think". Start by connecting the 1st (E) and 2nd (D) patterns... Then merge the 2nd (D) and 3rd (C) patterns... Then connect the 3rd (C) and 4th (A) patterns... The 4th (A) and 5th (G) patterns... And finally link the 5th (G) to the 1st (E) pattern... Once you have the patterns memorized for a number of different roots (and therefore keys), you can try the following exercises to link the patterns together. In this example I'm using C major, starting on the 1st pattern (8th fret) and moving through the other 4 patterns back to the 1st pattern an octave higher (20th fret). The fingering is in blue (as you can see it's a repetitive 1 2 4 fingering pattern)... And in C major again, this time starting from the 4th CAGED pattern Try also working down these exercises from high to low.Use a metronome and increase by 10bpm once you can play at the current tempo flawlessly. This merging of the patterns will allow for more fluid, quicker movements across the fretboard and the use of legato techniques such as sliding. As for which position to start on - this isn't really important. Just find a root and work from there, see where it takes you. I've got into the habit of finding roots on the E and A strings. Don't expect CAGED to be a magic bullet as so many do. If it helps you memorize the fretboard, then great, but when you come to learning scales and chords with sharp and flat intervals, you'll need to either adjust these major CAGED patterns or start a fresh set of patterns using the scale's intervals. And don't forget to work on 3 notes per string patterns , which allow you to navigate scales in a far more efficient, economical way, allowing for elaborate legato runs, for example. The important thing is, with any patterns you learn, that you can identify the root on at least the E and A strings and work on merging these "box" patterns to allow free and unrestricted movement across the fretboard. That way, your fingers won't become "CAGED in" (...haha).
<urn:uuid:91d1a28c-2853-437b-80e7-2745b2de34dc>
CC-MAIN-2016-50
http://www.fretjam.com/learning-scales-using-caged.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698540915.89/warc/CC-MAIN-20161202170900-00216-ip-10-31-129-80.ec2.internal.warc.gz
en
0.942804
969
2.828125
3
As winter season has come, gardening becomes really tricky. You have to plant new seeds or wait for the planted seedlings to blossom. There are many garden lovers who stop gardening in the winters or simply grow vegetables. This is simply because of the chilling weather that kills many plant seeds. However, there are many winter plants that can grow and make your garden look more colourful. Lets check out few colourful winter plants that you can plant this season. Colourful winter plants for your garden: Snowdrops: The small, white, bell-shaped flowers can add a touch to your winter garden. Plant the snowdrops in a well drained soil. This plant can also blossom after winter. Make sure the soil is moist; water accordingly. For best results, plant the snowdrops in well sheltered spots like under the trees or shrubs. During the early spring season cut the plant so that they survive for more years. Winter Jasmine: This winter plant can make the woody branches and garden look bright and colourful. The tall stalks are covered with yellow and white flowers. The plant blossoms from December till June. The only disadvantage is that the winter variety of this jasmine doesn't have strong aroma like the summer jasmines. Camellias: Camellia Japonica has pink and red flowers and glossy green leaves. The camellias can be planted in all seasons. So, make your garden look colourful and smell good throughout the year. The 10-feet tall plant needs rich and abundant soil to sustain. Add mulch in the winters and avoid planting them in drought soil. The bright shine of pink and red flowers and glossy leaves under the partial sun can make your garden look beautiful. Just have patience to see the flowers bloom. Witch Hazel: You can plant this winter plant in August or in October. The plant looks colourful with its bright yellow flowers. The garden can blossom with numerous small witch hazel flowers throughout the winter season. There are also many uses of this winter plant. You can store the flowers and prepare the essential oil at home! Evergreen Holly Bushes: The small red cherries can make your garden look extremely attractive. To make your garden look colourful and bright in the winter season, do not forget to plant evergreen holly bushes. If you want the plants to sprout berries, mix male and female evergreen holly plants to get the cherry red and glossy berries. These are the best colourful plants for your winter garden. Take care of the plants and do not over-water them as moist soil can be best for these plants to bloom. When you will see the colourful flowers covered with snow or fog, the garden will look perfect. Which is your favourite winter plant?
<urn:uuid:4d1849f2-2e0f-4ddd-8d8a-bb64ecb1da0f>
CC-MAIN-2017-04
http://www.boldsky.com/home-n-garden/gardening/2012/colourful-winter-plants-for-garden-031532.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280364.67/warc/CC-MAIN-20170116095120-00427-ip-10-171-10-70.ec2.internal.warc.gz
en
0.949456
562
2.609375
3
Tibetan Muslims: A treasured legacy A youngster from Tibetan Muslim community praying in Kathmandu's Jame Masjid "My ancestors were Nepalis," says Karimulla, 52. He's just arrived to join a group of Tibetan Muslims who are sitting on the carpet-adorned floor outside the prayer room in Kathmandu's Jame Masjid before evening namaz, conversing with each other in Tibetan language. "My great grandfather was a proper Kathmanduite," he smiles. "My great grandmother a Lama from Yolmo [Helambu]. She was a Buddhist." The great grandfather worked in Nepali consulate in Tibet. After marriage, they converted to Islam and mingled among Tibetan Muslims. Tibetan Muslims sprang out of a blend of cultures – mostly a mix of Kashmiri and Tibetan – and, for centuries, they lived in Tibet, giving continuity to their distinct culture, but allowing other cultures, like Karimulla's Nepali ancestors', to mingle with their own. But when the community felt a threat to its heritage, it left its ancestral place. Jame Masjid has become one point for them to express their faith and to preserve their culture. "Everyone is fasting during Ramadan," one member explains to me why people were not heeding to my request to share information about their community. "Most of them might not be in the mood to talk." He convinces an elderly to talk with me the following day. Ibrahim Naik's family moved to India and later to Nepal after 1959 Ibrahim Naik, a 73 year-old Kashmiri Tibetan Muslim, says Kathmandu's Tibetan Muslim community has 300-400 members spread across 72 households. This is a tiny minority of Nepal's Muslims that makes 4.4 percent of the country's population. Naik speaks in a soft voice and has a kind expression, a quality that's telling of his community, which for centuries have quietly and peacefully given continuity to the rich heritage that dates back almost 1,000 years. History has it that the traders from Kashmir settled in Lhasa in the 12th century. They married Tibetan women, and their offspring became the ancestors of today's Tibetan Muslims. This community accepted and blended with other cultures too. Newar traders from Kathmandu as well as other Nepali men, who were working in Nepali Consulate in Tibet married Tibetan women and converted to Islam. Tibetan Muslims, for whom Tibetan identity is as close as their religious identity, held their heritage dearly for centuries in Tibet. "Following political changes in China in the mid-twentieth century, Tibetan Muslims felt restrictions in the freedom to exercise their religion," Naik says. "So we decided to leave." Naik left Lhasa with his four sisters, cousins and other relatives in 1959. They came to Kalimpong first and eventually spread to settle in Darjeeling, Sikkim and Kashmir. His family lived in Kalimpong. He was 17 then. Unlike their Tibetan Buddhist brethren, who escaped Tibet as refugees, things became a bit easier for Tibetan Muslims because the Indian government granted them citizenship based on their Kashmiri ancestry. Just like their Kashmiri ancestors, Tibetan Muslims were also businesspeople by profession in Tibet. Their business skill also helped them settle in their new home. Naik's family set up a jewelry shop in Kalimpong. Others also set up businesses, mainly in jewelry and garments. But a search for business opportunities also led to further dispersal of the community which was mostly clustered in Lhasa. Naik's family moved to Sikkim where they lived for nine years. Later, Naik migrated to Kathmandu. "My sisters' families migrated to Kathmandu for business in 1972/73. I followed them in 1980." Many families moved to Kashmir. Others like Karimulla moved to Kathmandu because of their ancestral roots to this place. Eventually the 124 families that had left Lhasa along with Naik's family spread to different places. Today, Tibetan Muslims are mostly clustered in Kashmir, Kathmandu, Darjeeling, Kalimpong and Sikkim. There is a group in Tibet. By citizenship, most Tibetan Muslims are Nepali or Indian, shares Naik. However, the identity of Tibetan Muslim is so strong a fabric that binds individuals within this community that the divisions resulting from citizenship or geography hold little value. A family, irrespective of where it lives – in Kathmandu or Kashmir, Ladakh or Darjeeling and Tibet - is related to another in some ways. Function like marriage is a collective event. When Naik wrote invitation cards for his daughter's marriage, he had to be extra careful, he says, lest he missed any of the 72 families in Kathmandu. And when in the immediate aftermath of the recent earthquake, panic made many to leave the Kathmandu, several went to live at their relatives' places in Kashmir. When a marriage has to be arranged, a family in Kathmandu reaches out to a family as far as Kashmir, Sikkim, Darjeeling and other places, and vice versa. In fact, one reason that has helped preserve this heritage is because the community largely adheres to marriage within the community. "We hugely encourage marriage within the community," Naik says. But this is no strict rule, and the community accepts if the children wish to marry outside the community. Naik's own wife is a Nepali of Thapa Chettri ethnicity. One of his three daughters too is married to a Muslim convert Nepali of Rai ethnicity. Increased mobility of the younger generation has augmented chances of such blending. Many in Kathmandu have sent their children to schools in Kalimpong and Darjeeling. Even most of those who attend schools in Kathmandu eventually go abroad for higher education. Many seek employment opportunities abroad. The intermingling of and interactions between cultures in the modern age certainly pose challenges to preserving the distinct culture of this minority group. "They understand Tibetan. But they speak a mix of Tibetan, Nepali and English," Naik says, not complaining though, but understanding it as a natural outcome of education in English and exposure to other cultures. With equally considerate feeling, he says today's children tend to feel embarrassed to attend madrassa, much in the same way any children, irrespective of their religion, are likely to show disinterest in religion. But the community is passing its culture to the children. Each family ensures the children get education on Islam. As a young boy, Karimulla attended madrassa in Jame Masjid with other Tibetan boys. These days, he says, most families invite moulanas at home to tutor their children on Arabic, Urdu and Quran. Karimulla feels it's only natural for children to be influenced by other cultures they interact with. "But in their families, they grow with the culture and values our ancestors passed to us," he says. "Obviously they will adopt the same culture and values." Naik says his daughters can't read Quran in Arabic. "But they do read it in English and Nepali," he adds. He shows me a family photo on his mobile phone. In the photo, his wife and three daughters are standing beside him. All three daughters decked in traditional Tibetan dress. Four members of a family killed; five went missing Four members of a family died when the flood and landslide triggered by incessant rainfall swept away a human settlement in Khimti of Ramechhap district last night. Muslim women victimized by Talaq practice Women from the Muslim community who have been given talaq (divorce) by their husbands are facing additional problems due to the lack of education and awareness, stakeholders have pointed out. Nuwakot people demand round the clock opening of road People in Nuwakot district have demanded that the road connecting their district to the capital and passing through the Shivapuri National Park be kept open 24 hours. Road Section at National Park to be Repaired A section of the Madhi-Thori road from Rapti River to Rewa River in the Chitwan National Park is going to be repaired soon. The District Development Committee (DDC) has allocated Rs. 500 thousand for the repair and maintenance of the road sectio... EID observed across the nation Eid ul-Fitr, the great festival of the Islamic community, was observed with gaiety and gusto across the country today. In Kathmandu, the Muslim people visited the Jame mosque at Ghantaghar, performed prayers, recited Namaj in grou... Democracy without justice The Unified Communist Party of Nepal-Maoists (UCPN-M) is the backbone of the government headed by Chief Justice Khil Raj Regmi. But last week, an unexpected warning came from UCPN-M chairman Prachanda on the government's declaration that it will launch a full investigation into the case of Krishna Prasad Adhikari, who was abducted, tortured and killed by the Maoists in 2004. GJM digs in for long Gorkhaland stir DARJEELING: GorkhaJanmuktiMorcha's U-turn on the Gorkha Territorial Administration is part of a "well knit strategy" to stay on in the autonomous Hills body and turn it hollow from inside, said a senior Morcha leader on Tuesday.
<urn:uuid:c1cb3171-b366-40d3-b3ac-912a5df63f9b>
CC-MAIN-2019-39
http://archive.setopati.net/society/7365/
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514572289.5/warc/CC-MAIN-20190915195146-20190915221146-00445.warc.gz
en
0.971757
1,958
2.625
3
The Boeing C-17 Globemaster III military transport plane turned 20 on Sept. 15. In celebration, the first one built, the T-1, repeated its maiden 2-hour 1991 flight from California’s Long Beach Airport to Edwards Air Force Base in the Mojave Desert. A short ceremony at Edwards with the original flight crew—pilot Bill Casey, co-pilot Air Force Lt. Col. George London, load master Ted Venturini, and flight test engineer Henry Van De Graf—followed in a hangar housing the original T-1 model, which guests had a chance to tour, and the Air Force will retire this year. The C-17, originally developed by McDonnell Douglas Corp. before it merged with Boeing in 1997, was a game-changer, because it could carry greater payloads into smaller, more austere airfields than its predecessors, like the C-130. “The airplane can go into both tactical airfields and strategic airports, so it can take delivery from many places 'round the globe and put them to the point of need,” said Col. Andrew Ingram, C-17 System program manager at Wright-Patterson Air Force Base, near Dayton, Ohio. The C-17’s feat of engineering was balancing transport strength and aerial flexibility. It’s 53 meters (174 feet) long with a nearly 52-m (170-foot) wingspan, and powered by four of the same engines used on commercial Boeing 757s—each with over 179 886 newtons (40 440 lbs) of thrust. It’s designed to carry 77 519 kg (170 900 lbs), airdrop 102 paratroopers and equipment, and last month, set an airdrop record with a 38 555-kg. (85 000-lb) test vehicle. Today, seven countries operate 236 C-17s, 211 of which belong to the USAF. The aircraft have logged more than 2 million hours and 500 000 sorties, and delivered more than 4 million passengers and 3 million tons of cargo. The C-17 is used not only in battle support, but also to deliver humanitarian aid to and evacuate wounded from disaster-stricken areas. The Edwards event was particularly memorable for London, who, as the sole original crewmember on the East Coast missed the 10-year anniversary when flights were grounded following Sept. 11. “I watch C-17s flying in and out of Andrews Air Force Base [in Maryland], but this is the first time I’ve seen this plane in almost 20 years,“ he said. “It’s big, but it flies like a fighter.” Of the 46 different kinds of airplanes London flew in his career, he noted that the C-17 stood out for its size, maneuverability, and capability. Compared with commercial jets, C-17s ascend and descend at slightly sharper angles and use their engine exhaust to create additional lift. “It can take to any runway that’s 90 feet wide and 3000 feet long, which for an airplane of this size is unheard of,” London added. “Commercial airliners need a runway at least twice that length. I expect these planes to be around another 40 years.”
<urn:uuid:e6c30d5c-7576-4500-be98-ddecbe07fe3c>
CC-MAIN-2017-43
https://spectrum.ieee.org/tech-talk/aerospace/military/the-c17-turns-20
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823350.23/warc/CC-MAIN-20171019160040-20171019180040-00761.warc.gz
en
0.947668
680
2.828125
3
Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer. What is the charge for all elements in Group 1A? For starters, it's worth noting that located in group 1 of are called alkali metals. All these elements have one valence electron, i.e. one electron located in their outermost energy shell. In order complete their octet and become stable, these elements lose that valence electron. Consequently, group 1 elements will form ##1+## cations.
<urn:uuid:1ac2ce8d-f977-4dc3-b863-5f39704240f7>
CC-MAIN-2019-30
https://studydaddy.com/question/what-is-the-charge-for-all-elements-in-group-1a
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195524502.23/warc/CC-MAIN-20190716035206-20190716061206-00099.warc.gz
en
0.96644
115
2.828125
3
UNIVERSITY OF CAPE COAST FACULTY OF ARTS DEPARTMENT OF HISTORY GHANA UP TO 1800 FIRST SEMESTER, 2011 - 2012 ACADEMIC YEAR This course examines the evolution of the various ethnic groups that make up Ghana from the earliest times up to 1800. It will briefly examine the pre-history of Ghana. It will also trace the immigration and settlement of the various peoples, discuss their economic, social and political institutions, and examine the relations between the various peoples. In addition, the factors that motivated European explorations of the West African coast and the consequences of the contact with Europe on Ghana will be assessed. Finally, the course will examine the introduction of the Trans-Atlantic Slave Trade and its impact on Ghanaians. Course Objectives: The objectives of the course include the following: a. At the end of the course, students should be able to use the knowledge acquired from reading the course to examine the Eurocentric view that pre-colonial Africa did not have history and civilisations; b. Students should be able to form their own points of view about the past; c. In a broader context, students should be able to relate the past of Ghana to its present and, possibly, form a perspective of the future; and d. Students should be able to examine the significance of the past of Ghana to its present. The course will focus on the following topics: 1. The Name Ghana. 2. Documents for the Study of Ghanaian History. 3. Pre-history of Ghana. 4. The Origins and Rise of the Peoples and States of Ghana. 5. Comparisons of the Forest and Savannah Zones, and Ghana East and West of the 6. History of Visual Art. 7. History of Early Ghanaian Economies. 8. History of Indigenous Medical Practices. 9. The Coming of...
<urn:uuid:2efa4b5a-2d60-4b6e-9db2-2acd4eb30edd>
CC-MAIN-2017-04
http://www.writework.com/essay/history-ghana
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280835.60/warc/CC-MAIN-20170116095120-00428-ip-10-171-10-70.ec2.internal.warc.gz
en
0.888965
400
2.921875
3
We don't have a mind reading machine. But what if we one day did? The technique of functional MRI (fMRI), which measures changes in localized brain activity over time, can now be used to infer information regarding who we are thinking about, what we have seen, and the memories we are recalling. As the technology for inferring thought from brain activity continues to improve, the legal questions regarding its potential application in criminal and civil trials are gaining greater attention. Last year, a Maryland man on trial for murdering his roommate tried to introduce results from an fMRI-based lie detection test to bolster his claim that the death was a suicide. The court ruled (PDF) the test results inadmissible, noting that the "fMRI lie detection method of testing is not yet accepted in the scientific community." In a decision last year to exclude fMRI lie detection test results submitted by a defendant in a different case, the Sixth Circuit was even more skeptical, writing (PDF) that "there are concerns with not only whether fMRI lie detection of 'real lies' has been tested but whether it can be tested." So far, concerns regarding reliability have kept thought-inferring brain measurements out of U.S. (but not foreign) courtrooms. But is technology the only barrier? Or, if more mature, reliable brain scanning methods for detecting truthfulness and reading thoughts are developed in the future, could they be employed not only by defendants hoping to demonstrate innocence but also by prosecutors attempting to establish guilt? Could prosecutors armed with a search warrant compel an unwilling suspect to submit to brain scans aimed at exploring his or her innermost thoughts? The answer surely ought to be no. But getting to that answer isn't as straightforward as it might seem. The central constitutional question relates to the Fifth Amendment, which states that "no person ... shall be compelled in any criminal case to be a witness against himself." In interpreting the Fifth Amendment, courts have distinguished between testimonial evidence, which is protected from compelled self-incriminating disclosure, and physical evidence, which is not. A suspected bank robber cannot refuse to participate in a lineup or provide fingerprints. But he or she can decline to answer a detective who asks, "Did you rob the bank last week?" So is the information in a brain scan physical or testimonial? In some respects, it's a mix of both. As Dov Fox wrote in a 2009 law review article, "Brain imaging is difficult to classify because it promises distinctly testimonial-like information about the content of a person's mind that is packaged in demonstrably physical-like form, either as blood flows in the case of fMRI, or as brainwaves in the case of EEG." Fox goes on to conclude that the compelled use of brain imaging techniques would "deprive individuals of control over their thoughts" and be a violation of the Fifth Amendment. But there is an alternative view as well, under which the Fifth Amendment protects only testimonial communication, leaving the unexpressed thoughts in a suspect's head potentially open to government discovery, technology permitting. In a recent law review article titled "A Modest Defense of Mind Reading," Kiel Brennan-Marquez writes that "at least some mind-reading devices almost certainly would not" elicit "communicative acts" by the suspect, "making their use permissible under the Fifth Amendment." Brennan-Marquez acknowledges that compelled mind-reading would raise privacy concerns, but argues that those should be addressed by the Fourth Amendment, which prohibits unreasonable searches and seizures. That doesn't seem right. It would make little sense to provide constitutional protection to a suspected bank robber's refusal to answer a detective's question if the thoughts preceding the refusal--e.g., "since I'm guilty, I'd better not answer this question"--are left unprotected. Stated another way, the right to remain silent would be meaningless if not accompanied by protection for the thinking required to exercise it. And if that weren't enough, concluding that compelled brain scans don't violate the Fifth Amendment would raise another problem as well: In a future that might include mature mind-reading technology, it would leave the Fourth Amendment as the last barrier protecting our thoughts from unwanted discovery. That, in turn, would raise the possibility that the government could get a search warrant for our thoughts. It's a chilling prospect, and one that we should hope never comes to pass.
<urn:uuid:09a0b6a4-cbab-46db-9097-26635b9a90c2>
CC-MAIN-2022-27
https://www.theatlantic.com/technology/archive/2013/07/could-the-government-get-a-search-warrant-for-your-thoughts/278111/
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104628307.87/warc/CC-MAIN-20220705205356-20220705235356-00021.warc.gz
en
0.960633
891
2.609375
3
American Heritage® Dictionary of the English Language, Fourth Edition - n. The bite of a flea. - n. The small red mark caused by a flea's bite. - n. A trifling loss, inconvenience, or annoyance. - From flea + bite. (Wiktionary) “I am not interested in your provincial attempts to diminish and enclose the question to a fleabite.” “About how terrific everything smelled this minute, and how great that scratch behind the ear felt on a fleabite.” “And I tried to make her feel a fleabite on her ankle.” “And then, still in a reasonable voice, "I've never found it necessary, Dr. Quental, to seek medical aid for a fleabite.” “His most towering rage, controlled only by supreme expenditures of effort, was met with no more reaction than the bite of a flea; less, for a fleabite is at least scratched.” “I had paid six hundred pounds for one and four hundred and fifty for the other; they were a fleabite in the total value of my aeroplanes, and both of them were pretty well written down in the accounts.” “It was a fleabite to them apparently, but it was the hell of a lot of money to me.” “The water problem is still unsolved, and we get very thirsty; but thirst is a small fleabite, after all.” “It is eighty miles third-class and more; it is thirty or less first-class; it is a flash in a train _de luxe, _ and a mere fleabite as a bribe to a journalist.” “It thus appears that even the proverbially trivial fleabite may at times prove a serious injury.” Looking for tweets for fleabite.
<urn:uuid:d116ec2c-6c5b-4c39-a1db-3b10768f3d29>
CC-MAIN-2013-20
http://www.wordnik.com/words/fleabite
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704590423/warc/CC-MAIN-20130516114310-00098-ip-10-60-113-184.ec2.internal.warc.gz
en
0.95996
413
2.984375
3
free shipping on orders over $49 Could your breastmilk hold the keys to the prevention and treatment of breast cancer? This Breast Cancer Awareness Month, we’re pleased to share some groundbreaking breast cancer research which uses breast milk to unlock the secrets of the disease. And if you fit the criteria for one of the studies using breast milk, you may be able to donate your own!* Dr. Kathleen Arcaro at the University of Massachusetts, Amherst, is an environmental toxicologist who analyzes breast milk for clues about breast cancer risk. In spite of years of breast cancer research, we know little about the reasons why women develop it. The most widely known risk factors - family history and inherited gene mutations - account for only a small number of the new cases diagnosed each year. But breast milk might be able to help. Some of your breast duct cells naturally slough off into your milk. These cells are incredibly valuable in understanding breast cancer, and they’re also hard to get without an invasive procedure. But you produce an average of 30,000 per milliliter every time you nurse or pump! Scientists can now use DNA analysis to examine these breast cells for patterns of “methylation:” the presence of methyl groups which attach to key parts of our DNA such as tumor suppressor genes, and “turn them off,” rendering us less capable of stopping the growth of tumors. Some forms of methylation, which is related to things like diet, smoking, exposure to toxins, stress, and exercise, can render us more vulnerable to breast cancer. Since 2009, Dr. Arcaro has been investigating whether breast milk could reveal patterns in breast cancer risk by studying women who had or were planning to have a breast biopsy. Her research has found that certain patterns of methylation are correlated with a higher risk of breast cancer. This finding is important because it may allow mothers to one day get a personalized breast cancer risk profile. Even more importantly, the hope is that new treatments may actually be able to reverse methylation, dramatically reducing our risk of breast cancer. You may have known that your breast milk is amazing for its nutritional and immunological properties, but now you know how it’s a weapon in the war on cancer, too! * Dr. Arcaro is currently looking for milk camples from 1) African American nursing mothers living anywhere in the country, OR 2) nursing mothers of any race living anywhere in the country who have had a breast biopsy or are expecting to have one, OR 3) mothers of any race living anywhere in the country who have had breast cancer and are now nursing. To participate, see Dr. Arcaro’s donation page. If you don’t qualify for one now, please check Dr. Arcaro’s website at another time, as her criteria do change over time. If you don’t qualify to participate but want to be involved (whether you’re nursing or not), you can register for the Love/Avon Army of Women, which will put you on a list of people willing to be contacted should another opportunity arise. Dr. Arcaro would appreciate it if you’d select “breast milk study” when asked how you heard about the study.
<urn:uuid:66e8da1c-c9f1-4bb8-a56e-2b43898ed804>
CC-MAIN-2021-25
https://www.motherlove.com/blogs/all/fight-breast-cancer-by-donating-your-breast-milk
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487586465.3/warc/CC-MAIN-20210612222407-20210613012407-00514.warc.gz
en
0.952738
682
2.9375
3
Ever heard about “lime disease” — not to be confused with Lyme disease? It’s a painful, itchy rash that sometimes causes blisters and appears a day or two after skin splattered with lime juice is exposed to the sun. Dermatologists refer to it by its scientific name, phytophotodermatitis, but perhaps “bartender disease” is a more fitting moniker since it’s likely to plague those mixing margaritas on sunny outdoor patios, said Dr. Joe Merola, a dermatologist at Brigham and Women’s Hospital. Fruits, vegetables, or plants that contain compounds called psoralens — limes, celery, parsnips — increase the skin’s sensitivity to sunlight. This can lead to blistering rashes if the plant juices get on the skin before sun exposure. The rash tends to have an unnatural-looking shape, he added, based on how the juice lands on one’s skin. People who handle limes or are avid gardeners of root vegetables should wear gloves when outdoors to protect their skin or wash their hands and arms before heading into the sunlight. If a rash appears, the irritated area should be washed with soap and water. “You can treat it with an over-the-counter topical steroid like hydrocortisone,” Merola said. Dermatologists can prescribe stronger prescription creams if that doesn’t bring relief.
<urn:uuid:e744e487-f49a-4762-bc4e-eec452b1a0dc>
CC-MAIN-2015-32
http://www.bostonglobe.com/lifestyle/health-wellness/2013/06/23/ever-heard-lime-disease-prevention-has-nothing-with-avoiding-ticks/NAfoyk20XqaKGPgWrIqXqM/story.html?p1=ArticleTab_Article_Top
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042988650.6/warc/CC-MAIN-20150728002308-00006-ip-10-236-191-2.ec2.internal.warc.gz
en
0.941328
306
3.1875
3
Already have an account? Get multiple benefits of using own account! Login in your account..! Don't have an account? Create your account in less than a minutes, Forgot password? how can I recover my password now! Enter right registered email to receive password! VuGen have two options to help debug Vuser scripts-the Run Step by Step command and breakpoints. The Debug settings in the Options dialog box permit us to verify the extent of the trace to be performed during scenario implementation. The debug information is written to the Output window. We can manually set the message class within your script using the lr_set_debug_message function. This is useful if we require to receive debug information about a small section of the script only. I''m suppose to create a function called calc_rectang_area(height, width),that takes two parameters: the height and width of the rectangular and return the area of the rectangular. Episodes - artificial intelligence: If an agent's current choice of action not based on its past reactions, then the environment is known as episodic. In the non-episodic envi what is robot?explain different types of robots with respect to joints. Q. Explain about Magnetic Disk? A disk is circular platter constructed of nonmagnetic material known as substrate, coated with a magnetisable material. This is used for storing What is the difference between, page directive include, action tag include? Ans) One difference is whereas using the include page directive, in translation time it is making t Disadvantages of Stateful Multi-Layer Inspection A firewall such as the SMLI remains completely transparent to both users and applications. Consequently, SMLI firewall does no Communications Parallel tasks classically need to exchange data. There are many ways in which this can be accomplished, such as, through a network or shared memory bus. The act (a) Explain the following terms: Information System and Information Technology. (b) Describe the main components of a computer. Illustrate your answer by a block diagram. (c) Unification Algorithm - Artificial intelligence: To merge two statements, we should get a substitution which forms the two sentences similar. Remember that we write V/T to sign Draw the circuit diagram of a Master-slave J-K flip-flop using NAND gates. What is race around condition? How is it eliminated in a Master-slave J-K flip-flop? Ans. Using NA Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report! All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd
<urn:uuid:e9114b3a-51ee-44cf-9b8f-8689fe9dd541>
CC-MAIN-2021-49
http://www.expertsmind.com/questions/how-do-you-debug-a-loadrunner-script-30149833.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358180.42/warc/CC-MAIN-20211127103444-20211127133444-00464.warc.gz
en
0.88866
607
2.734375
3
8 hour sleeping is a modern invention. Imagine you are a denizen of the 18th century. It’s just past 8:30 P.M., you’ve got your night-cap on. You blow out your candles and fall asleep to the smell of the wax and the wick, which gently fills the air around your bed. Some hours pass. 2:30 AM. You awaken, grab your coat, and visit the neighbors because they, too, are up. Doing quiet reading, prayer, or even having sex. Well, apparently before the age of electricity, sleeping twice a night was completely ubiquitous. Back in those times, we slept twice a night, getting up for an hour or two for recreation before heading back to bed until dawn. … Read the rest The existence of our sleeping twice per night was first uncovered by Roger Ekirch, professor of History at Virginia Tech. His research found that we didn’t always sleep in one eight hour chunk.
<urn:uuid:d24145cc-6548-4e99-af99-fdb54b073abd>
CC-MAIN-2014-23
http://disinfo.com/tag/present-shock/
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997900573.25/warc/CC-MAIN-20140722025820-00193-ip-10-33-131-23.ec2.internal.warc.gz
en
0.937199
206
2.8125
3
Children's: Reading 9 - Ring Around the Rosie Reading 9 - Ring Around the Rosie Ring around the rosie, A pocketful of posies. We all fall down. This children's reading video teaches kids how to read, using the simple nursery rhyme "Ring Around the Rosie." In the video, we read the lines three times: The first and last time, we read it quickly and the second time we read slowly and highlight the word that is being read. The second reading is done with a pause after each word and we highlight the word so that children have time to absorb it. Additionally, we display each line of text while we read to keep the words in context.
<urn:uuid:7509afa0-2420-41bc-b8d8-d9098e517299>
CC-MAIN-2018-13
http://xoax.net/children/crs/reading/lessons/reading_9/
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647299.37/warc/CC-MAIN-20180320052712-20180320072712-00634.warc.gz
en
0.911652
147
3.453125
3
43km (27 miles) S of Lerwick, Shetland Islands Called the "most isolated inhabited part of Britain," Fair Isle lies on the same latitude as Bergen, Norway. It measures only about 1.6 by 6km (1 by 3 3/4 miles) and sits about midway between the Orkneys and the Shetlands, administered by the latter. Relentless seas pound its 32km (20-mile) coast in winter, and powerful westerly winds fling Atlantic spray from one side of the island to the other. It's home to fewer than 100 rugged, self-reliant souls. An important staging point for migrating birds, Fair Isle is even better known for its patterned pullovers, which greatly aid the island's economy. In stores around the world, you see these intricately patterned garments retailing at high prices. The homegrown product is sold on Fair Isle at half the price. Fair Isle knitting is even a part of the curriculum at all primary schools, and many jobless men have turned to knitting. Originally, the fame of the sweaters was spread in the 1920s by the prince of Wales. The pattern is of mysterious origin. Some suggest that it was derived from Celtic sources, others that it came from the island's Viking heritage. A more daring theory maintains the themes were Moorish, learned from Spanish sailors shipwrecked off Fair Isle in 1588. In 1954, the island was acquired by the National Trust for Scotland. The bird observatory installed here is the most remarkable in the country. Since work began in 1948, some 200 species have been ringed. Fair Isle is an important breeding ground for everything from the puffin and the Arctic skua to the razorbill and the storm petrel.
<urn:uuid:f9060193-06ec-415b-a2c2-155d2a82b058>
CC-MAIN-2023-50
https://www.frommers.com/destinations/fair-isle
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100276.12/warc/CC-MAIN-20231201053039-20231201083039-00544.warc.gz
en
0.969832
364
3.34375
3
Forschungsgruppe Antolin: Small-scale farming societies in Prehistoric Europe This research group is interested in small-scale farming societies that inhabited Southern and Central Europe during the Neolithic period (ca. 6000-2300 cal. BC) and the process of change towards more extensive farming models with the development of urbanism. Our focus is on agricultural decision-making processes, environmental perception and resilience. We are therefore interested in past crop diversity, crop husbandry practices, animal herding practices, risk-reducing strategies (exchange networks, storage systems, pest controls), wild plant use and methods of plant food preparation, as well as the social structures and networks in which they are embedded. Small-scale farming is still today the most widespread farming system in the planet. Currently, most farmers are under multiple threads including climate change and globalisation. Likewise, urban areas also would benefit at all levels by investing on more spaces for sustainable farming. A change of a model is needed worldwide. Archaeology can prove how resilient small-scale farming can be under various climatic and ecological conditions and provide keys for a more sustainable, small-scale and diversity-friendly planet that still produces enough food for every human being living in it.
<urn:uuid:65edc52f-3d3c-46c0-972c-de2224e85032>
CC-MAIN-2020-05
https://duw.unibas.ch/de/ipna/forschung/fg-antolin/
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251801423.98/warc/CC-MAIN-20200129164403-20200129193403-00099.warc.gz
en
0.942376
252
2.875
3
With most events in history nothing is as black and white as we think. The War of 1812 was one of those. While American history tends to focus on the American Revolution and Civil War it was the War of 1812 that would cause more changes in the Untied States. After President James Madison presented to Congress the grievances against Great Britain on June 1, 1812, Congress took up the debate on formally declaring war. It’s not clear if this was the intention of President Madison since his message didn’t specifically ask for a declaration of war. The House debated for four days before voting 79 to 49 for war, with the Senate agreeing with a 19 to 13 vote. This would be the first declaration of war for the new United States. On June 18, 1812 James Madison signed the declaration into law, formally starting a conflict that both the United States and Great Britain were unprepared for. It was only twenty-nine years since the end of the American Revolution and twenty-three years since the U.S. Constitution went into effect. The United States was just beginning to learn what being a nation was about. Many of the nation’s policies before this war were based on fears it had from the Revolution and what the founders knew of Europe. One of those fears was not having a large standing army which could be used to overthrow the government. After the American Revolution Congress disbanded most of its standing army, depending instead on each state’s militias to handle the defenses, as had been done before the revolution. This reliance on state militias is shown in the Untied States Contitution’s Second Amendment which starts out, “A well regulated militia, being necessary to the security of a free State,…” Congress even passed a bill limiting the size its federal forces. At the start of the War of 1812 the United States had less than 12,000 men in its regular army. The U.S. Congress turned to the state militias to take up arms in this first declared war, but what happened didn’t make them feel very secure. In some states the war was unpopular and they refused to call up their militias. At its beginnings the new United States saw each of its thirteen states as being more independent. A united federal style government was an unfamiliar concept, so some objected to fighting outside their own state. But the biggest drawback to the militia style of armed forces was that for the most part they were under trained and poorly commanded. These state militias would struggle against the well trained British soldiers causing President Madison to say,” I could never have believed so great a difference existed between regular troops and a militia force.” However on the Canadian front at the start of the war the United States did fairly well. This was mostly due to the fact that the greatest number of America’s regular trained army was already there from its involvement in the Indian wars. Another reason for the United States early successes was that Britain was a little busy with the French in Europe, and had little concern about their former colonies. Although the United States saw the War of 1812 as just its war it was in reality a true globe conflict. Through the first two years of the war most of the fighting took place along the northern border between the United States and Canada, and on the lower Great Lakes. The defense of Canada was done mostly by the Canadians because the British were heavily involved in the European War of 1812 against Napoleon Bonaparte and France. In fact many of the issues that caused the United States to declare war were based on what Great Britain had imposed on the U.S. due of their fight against France. These were trade sanctions and the U.S. merchant sailor “impressment.” It wasn’t until 1814 that things dramatically changed in the fighting in North America, and that many of the events that American’s hold dear came about during this period. On March 30, 1814 Napoleon surrendered to the British and their allies after his devastating defeat in Russian. On April 6 Napoleon abdicated his power in France, and although Napoleon would return to meet his Waterloo at Waterloo this short respite allowed Britain to turn their full attention to the war in America. On July 18, 1814, A British 74-gun ship of the line and its support ships sailed into Passamaquoddy Bay Maine. The small American detachment at Fort Sullivan, both out manned and out gunned, surrendered. This began the occupation of Maine by the British. At that time Maine was part of the commonwealth of Massachusetts, and when Maine’s cry for assistance from their Massachusetts government went unheeded it would begin the movement for Maine’s eventual statehood. 1814 would also be the beginnings of the British offensive in America. Although the British Navy had controlled the eastern seaboard of the United States since 1813 the war with France had limited a large land campaign. Britain now free from the conflict in Europe was ready to launch a major attack on the US cities of Washington DC, Baltimore and Philadelphia. The first encounter was the Battle of Bladensburg, just outside of Washington DC. The majority of American troops involved where the poorly trained state militia, while the British were battle hardened and disciplined. The result of that battle was what has been termed, “the greatest disgrace ever dealt to American arms.” The American militia broke rank and fled, with some running through the streets of the nation’s Capital in panic. On August 24 the British army entered Washington as President James Madison and Congress fled. British troops burned government buildings, including the Capital and the President’s house. During the rebuilding of the President’s house it was found that white washing would hid the stains from its burning, hence the President’s house became then known as- the White House. The taking of our capital would be the high water mark for England. The British army and navy then moved on toward Baltimore. They believed that American resistance would be equally as weak there as it had been in Washington. However on September 14 and 15, at the battles of North Point and Hampstead Hill, and the famous defense of Fort McHenry (Star Spangled Banner fame) they met a stronger and better trained American force of army regulars. The British could not break the American defenses so they withdraw back out to sea. Their new plan was to leave the U.S east coast and resume the offensive in the Gulf of Mexico at New Orleans. From the results of the Battle of Baltimore and also their defeat in the Battle of Plattsburg New York on September 6 – 11, the British felt that there was nothing to be gained by continuing the war. The United States also saw it as a stalemate with nothing to be gained by continuing, so on December 24 1814 the US and Britain signed the Treaty of Ghent, officially ending the War of 1812. However this news of the wars end had failed to reach the British fleet and army heading for New Orleans, and the American Major General that would be there to meet them. Major General Andrew Jackson would come out of this meeting of these two forces as a national hero that would rocket him to the Presidency. But before I discuss the Battle of New Orleans I’d like to give a brief background of this man that benefited most from that conflict. Andrew Jackson was born to an improvised family on March 15, 1767 in ether North or South Carolina. History isn’t exactly sure on which side of the state line he was born, and both states claim him for their native son. Jackson’s lifelong hatred of the British came about due his mother and two brothers dying while the British occupied the Carolinas during the American Revolution. Jackson studied law and was admitted to the North Carolina bar in 1787. Soon after he moved to the new territory of Tennessee and became the prosecuting attorney for what would be the city of Nashville. When Tennessee began its application for Statehood Jackson helped to write its constitution. He would also be one of Tennessee’s first members to the U.S. House of Representatives. Jackson decided not to run for reelection to the house but rather for the U.S. Senate. After only a year in that seat he resigned to take a Judgeship with the Tennessee Superior Court. While a judge he was chosen to command the state’s militia, and fate stepped in when the War 1812 broke out. Jackson received national notice from his five month campaign against the British supported Creek Indian Nation, and his victory at the Battle of Horseshoe Bend. Although Andrew Jackson was popular from the Indian campaign it would be the battle New Orleans that would make him an American household name. Hearing that the British’s were sailing to attack New Orleans Andrew Jackson raced to the city’s defense. Before he left he told his wife, “I owe to the British a debt of retaliatory vengeance, and should our forces meet I trust I shall pay the debt.” The attack on New Orleans was part of the British’s three part invasion strategy: Plattsburg, Baltimore and New Orleans. Their success had been checked by the Americans at both Plattsburg and Baltimore; their last chance to gain anything from the war was to win at New Orleans. Having New Orleans in British control would have given them power over the Mississippi River and American’s western trade. The British faced a hodgepodge American force comprised of army regulars, state militiamen, free blacks, New Orleans aristocrats, Choctaw tribesmen, and Jean Lafitte’s pirates. These numbered at around 5,300 men. Jackson and the Americans faced over 6,000 well trained British red coats that had just come from the Battle of Baltimore. Between December 23 and the 28, 1814 there were a few minor skirmishes between the two armies. The main battle finally occurred on January 8 1815, when British commander General Pakenham ordered a two-fold attack on the American’s. The first phase was a partial success when Pakenham’s men took a small American artillery post. However when a rifle shot killed their commander, Colonial Rennie, the British soldiers panicked into a hasty retreat. That was one of the weaknesses of the British soldiers at that time; they were effective only when an officer was leading them. The next phase of Pakenham’s plan was to march directly against Jackson’s main line of defense with the full body of his troops. He hoped that the morning mist would hide his men’s advancement. However the sun burned off the fog leaving the British soldiers completely visible and open to American rifle and cannon fire. The British plan unraveled, and although the red coats fought bravely the American fire was too overwhelming. After 30 minutes the British soldiers retreated in droves leaving behind a field of dead and dying. Afterwards American Major Howell Tatum said of the state of the British casualties, “truly distressing…some had their heads shot off, some their legs, some their arms. Some were laughing; some crying…there was every variety of sight and sound.” In the end the British had lost over 2,000 of its best soldiers, including General Pakenham. Andrew Jackson’s losses were less than 100 men. Although the stunned British army languished in Louisiana for a few days after the battle, and there was an abortive navel attack of Fort St. Philip, the fighting was over. As the British troops were boarding their ships for England Andrew Jackson paraded into New Orleans to great celebration, rivaling any Mardi Gras, or a Caesar marching into Rome. Battle of New Orleans and the end of the War of 1812 gave the young United States a shot in the arm of national pride and honor. Even though strategically America gained nothing, they had beaten the great British army and navy. The War of 1812 has been called our second revolution, and this one we won on our own. The War of 1812 had shown that the United States needed a strong national military force, the old militia system wasn’t effective. The national pride of beating the 19th century’s superpower would inspire the United States to become more globally active, it would also give drive to the nations western expansion challenging Span and Mexico. It was the war that put the United States on the road of being a major power in the world. Of further interest: While traveling in Canada, especially near Niagara and the Great Lakes, you’ll find monuments to the War of 1812. The differences in these, as opposed to our monuments of that war, is these hail Canadian victories over the United States.
<urn:uuid:8296290d-06ee-4823-9beb-d8e2f7407752>
CC-MAIN-2018-05
https://stillcurrent.wordpress.com/2017/06/15/the-war-of-1812-americas-second-revolution/
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084889617.56/warc/CC-MAIN-20180120122736-20180120142736-00584.warc.gz
en
0.982066
2,620
3.921875
4
Every year, thousands of people leave their homes and migrate to Yemen from other parts of Africa, or else abandon their homes, friends and relatives in Yemen and go to other countries. Some do this because of poverty while others out of fear for their lives. Whatever the reason, migration is one of the greatest problems facing Yemen. Whether it stems from domestic or external conditions, a solution needs to be found because uncontrolled migration can bring about significant problems. In April of 2013, the Yemeni Department of Immigration (YDI) announced that the number of people who had left their homes because of conflicts and fled to different regions within the country had passed half a million. Set up in 2009 to provide migrants with food and housing assistance, the department said that migrants are now in much worse condition. Due to the World Food Program (WFP) stepping up its assistance for Syrian refugees, the amount of food aid reaching migrants within Yemen has fallen by half. Another problem concerning migration for Yemen is the migration overseas of an educated work force seeking a better income. More than one million have emigrated for that reason. Although losing well-educated and qualified people is a problem for Yemen, it is also not without its benefits; Yemenis who migrate overseas contribute indirectly to the country’s economy by the foreign remittances they send home to their families. These migrants may also take part in voluntary activities on behalf of Yemen in the countries they live in. The number of those fleeing to neighboring countries due to conflicts or poverty is quite large. There are estimated to be 900,000 Yemeni migrants in the Middle East and various African countries and some 700,000 in Saudi Arabia. When the civil war in Somalia broke out, some 60,000 Yemenis returned home, but that was not the sole source of migration to Yemen from Somalia. The instability in Somalia led to an explosion in the number of migrants from Yemen to Somalia. Various authorities now say there are 700,000 Somalis in Yemen. Ethiopia is another source of migration to Yemen in East Africa. There are an estimated 10,000 Ethiopians in Yemen. However, it also needs to be said that these figures are not entirely reliable, since they are not confirmed by official bodies. According to a U.N. report published in 2008, 50,000 migrants reached Yemen from Africa a year. Migrants generally reach Yemen from East Africa by sea, under very difficult conditions, and usually fall into the hands of human traffickers. Most migrants, who give their last few pennies to the traffickers, are brought to Yemen in rickety boats. These boats are very frail and lack even the most basic amenities, and are of dubious seaworthiness. In order to avoid being apprehended by the security forces, the traffickers prefer to drop the migrants off in remote areas rather than in harbors. Indeed, they sometimes throw them into the sea miles from shore, or else sink the boats. The boats that carry the migrants often deliver them to their deaths; many migrants drown at sea. Reaching the Yemeni shore does not mean salvation for the migrants. Even if they are legally admitted to Yemen, they still have to live under very difficult conditions in the country, where unemployment is very high. Somalis generally work for very low wages doing jobs that Yemenis are unwilling to do. A Somali migrant in Yemen earns an average of $50 a month. In addition to the hard work they do, migrants are generally despised. Such behavior is totally unbecoming of a Muslim. In verse 83 of Surat al-Baqara, our infinitely merciful Lord commands us that in order to establish social peace, the poor should not be despised, but treated well. No Muslim must forget that the Muslims of Medina embraced the Muslims who migrated there in the time of our Prophet (saas) with sincerity and love. Muslims must adopt them as role models. The Islamic world now needs the solidarity personified by the spirit of brotherhood among the pilgrims and the Ansar. Feelings such as hatred and ruthlessness must be purged from people’s hearts, and replaced by brotherhood, compassion, love, affection and positive thoughts. Believers have a responsibility to treat other believers with enormous compassion and modesty; any other behavior is incompatible with the Qur’an. Arrogance, jealousy, intolerance, rude speech and quarrelsomeness are features of deniers, not of Muslims. Therefore, a believer who has fallen into such a disgraceful state because of his lower self must immediately pull himself together, seek shelter in God and behave like a true believer. Otherwise, according to the following verse, he will be sent away and God will bring forward someone more auspicious: You who have faith! If any of you renounce your religion, God will bring forward a people whom He loves and who love Him, humble to the believers, fierce to the disbelievers, who strive in the Way of God and do not fear the blame of any censurer. That is the unbounded favor of God which He gives to whoever He wills. God is Boundless, All-Knowing. (Surat al-Maida, 54) Mr. Adnan Oktar's piece on National Yemen:
<urn:uuid:65cbc35c-3c6c-432f-97f2-11f2b7b85507>
CC-MAIN-2016-40
http://evolutiondeceit.com/en/Articles/188284/One-of-the-Dozens-of-Problems-facing-Yemen-Is-Immigration
s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738659865.46/warc/CC-MAIN-20160924173739-00133-ip-10-143-35-109.ec2.internal.warc.gz
en
0.959344
1,069
3.078125
3
Intensive Interaction Institute - what is Intensive Interaction? Intensive interaction is an approach to teaching the pre-speech fundamentals of communication to children and adults who have severe learning difficulties and/or autism and who are still at an early stage of communication development. The approach was developed during the nineteen-eighties by the team of staff working at Harperbury Hospital School Herfordshire. Harperbury was a school for people who have severe learning difficulties on the campus of a large long-stay hospital in southern England. The developments followed the work of the late Geraint Ephraim Ph.D, a psychologist who worked in the Hertfordshire long-stay hospitals. Dave Hewett Ph.D and Melanie Nind Ph.D, were teachers at Harperbury School, and they carried out Intensive Interaction research projects at the school as part of the development work. They have published three books on the approach (e.g. ‘Access to Communication’ London: David Fulton 1994) and extensive other publications.
<urn:uuid:9aca365d-c7f9-4c39-8018-578908291fea>
CC-MAIN-2021-39
https://www.intensiveinteraction.org/find-out-more/what-is-intensive-interaction/
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057508.83/warc/CC-MAIN-20210924080328-20210924110328-00059.warc.gz
en
0.973104
210
2.984375
3
Can economics contribute to moral life? This paper wants to answer the following question: can economics contribute to a morally decent life? Economics as a science originates from modern moral philosophy. This discipline analyses human nature and its consequences for the way in which social order is maintained. But as economics developed from the morally embedded economic analyses of Adam Smith to the morally neutral neoclassical economics, it became increasingly independent of its moral philosophical roots. The paper shows a way out of this moral indifference. Firstly, it discusses a more realistic economic approach, in which social and psychic processes play a significant role in the shaping of interpretations of the world. Secondly, it places humans in an ecological context. Ecology is about the interrelationship between entities and their environment. In our analysis ecology is about the relationship between humans and non-humans. We can, if morally necessary, consider particular non-humans, such as animals or plants, as independent identities, having value in their own right. In this way a multidisciplinary economic analysis appears to be a more efficient map in the hands of morally motivated people. A last problem analysed by the paper is the question: how do people get morally motivated? They do if they discover which virtues of persons and organisations lead to a maximum of utilities for all and when they place themselves in situations, where moral sentiments are aroused. Then people will listen to a voice inside themselves that says: you ought to develop these virtues. |Date of creation:||Apr 2008| |Date of revision:| |Contact details of provider:|| Web page: http://www.sceme.org.uk/| More information through EDIRC When requesting a correction, please mention this item's handle: RePEc:sti:wpaper:025/2008. See general information about how to correct material in RePEc. For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Matthias Klaes)The email address of this maintainer does not seem to be valid anymore. Please ask Matthias Klaes to update the entry or send us the correct address If references are entirely missing, you can add them using this form.
<urn:uuid:e0bce609-a9a2-44db-a9a5-632645322561>
CC-MAIN-2015-48
https://ideas.repec.org/p/sti/wpaper/025-2008.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398450559.94/warc/CC-MAIN-20151124205410-00105-ip-10-71-132-137.ec2.internal.warc.gz
en
0.90853
458
2.671875
3
Choose the Right Format for Better Image Quality Knowing what images to use can be quite beneficial to a website designer. Essentially, anyone can put together a basic website with words on it. However, knowing what images to use and where can improve the flow of a website and entice visitors to return. The Graphics Interchange Format, or GIF, was widely popular in the beginning stages of internet strategy. With its lossless data compression, these images can be animated with 256 colors per frame. These images made a profound impact on the earlier website strategy for the file size was fairly small. A portable Network Graphics image, or PNG, was designed later on to replace the GIF. PNG images are far superior to GIF because they can handle more than 256 colors and can be placed without a background. With a PNG, a background doesn't exist giving the image versatility. The JPG image, or JPEG, is quite common for its scalability. While saving the image, one can trade off image quality for storage size. This means they can be as clear as you need, or take up as little space as possible. The Bitmap images, or BMP, are images that can store data independently of your video device. Operating systems use these quite extensively because it will only need to be loaded into the memory once. WBMP images are essentially bitmap images made in monochrome for mobile devices. With Tagged Image File Format, or TIFF, one could store the image and return to edit it later without the loss of image quality. The TIFF images have not changed much since the early 90s, and are used mostly by graphic designers. Depending on ones website strategy, there are many types to choose from. There is no right or wrong way, just efficiency for visitors to view the images.
<urn:uuid:08ec42ad-f890-4125-ae1f-f76fb06f987e>
CC-MAIN-2019-18
https://www.gmrwebteam.com/blog/choose-the-right-format-for-better-image-quality
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578529813.23/warc/CC-MAIN-20190420120902-20190420142902-00244.warc.gz
en
0.954129
368
2.75
3
Author(s): Brian Gill New Zealand is the most isolated landmass of its size and few types of amphibians reached its shores. The only groups occurring naturally in New Zealand are frogs, tuataras, two families of lizards (geckos and skinks), sea-snakes and marine turtles. The tuataras and native frogs are archaic animals of exceptional scientific interest. This guide helps the reader - by means of photographs, identification keys and descriptive text - to identify the 59 living species of frogs and reptiles that occur wild in New Zealand.
<urn:uuid:6e430df5-1501-4a61-8f09-02c19f4590eb>
CC-MAIN-2018-43
https://paradoxbooks.co.nz/p/nz-natural-history-new-zealand-frogs-and-reptiles--6
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583513441.66/warc/CC-MAIN-20181020205254-20181020230754-00308.warc.gz
en
0.942235
113
3.375
3
PRAGUE (Jul. 8) The Czecho-Slovakian ministry of education today began an investigation into the use of public school textbooks containing anti-Semitic marks. The probe was the result of protest on the part of Jewish leaders whose attention had been called to the volumes by Jewish parents. One geography text generally used in the schools contains the following passage: “In Slovakia the Jews had a virtual monopoly of trade as well as of industry. The peasants, who were exploited as laborers, took to drink and could not free themselves from Jewish influence. There was virtually no Slovakian settlement in which the businesses and inns were not in the hands of Jews. The Jews were the richest element of the population in Slovakia. But with the overthrow of the Austro-Hungarian monarchy there came a change. The Slovaks freed themselves from the influence of the Magyars and Jews and again became masters of their glorious homeland”. Another school book declares that “in Judaised Munkacz, Czechs were kept prisoners of war during the fifties.”
<urn:uuid:75b34acc-56db-471f-8a79-ffee7e57c591>
CC-MAIN-2016-36
http://www.jta.org/1931/07/09/archive/czecho-slovakian-education-ministry-probes-text-books-with-anti-semitic-passages
s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982290442.1/warc/CC-MAIN-20160823195810-00220-ip-10-153-172-175.ec2.internal.warc.gz
en
0.98648
225
2.703125
3
As technology continues to evolve, it’s vital to understand the concepts of universal and inclusive design. For anyone interested in the tech industry, recognizing the differences between these two design philosophies can be essential. Universal design and inclusive design are both aimed at creating more accessible and user-friendly products and environments. However, they approach this goal from different angles and with different strategies. Let’s dive deeper into what these terms mean and their significance in the design world. This image depicts the core concepts of universal and inclusive design. Understanding Universal Design Universal design originated from the architectural field, where the goal was to create environments accessible to everyone, regardless of their age, size, ability, or disability. This design philosophy has since been adopted by various industries, including tech, with the aim of creating products and systems that can be used by all people, to the greatest extent possible, without the need for adaptation or specialized design. The focus is on making everything as accessible and user-friendly as possible for the broadest range of users. Principles of Universal Design The principles of universal design serve as a guideline for creating accessible and inclusive products and environments. These principles are as follows: - Equitable use: The design is useful and marketable to people with diverse abilities. - Flexibility in use: The design accommodates a wide range of individual preferences and abilities. - Simple and intuitive use: Use of the design is easy to understand, regardless of the user’s experience, knowledge, language skills, or current concentration level. - Perceptible information: The design communicates necessary information effectively to the user, regardless of ambient conditions or the user’s sensory abilities. - Tolerance for error: The design minimizes hazards and the adverse consequences of accidental or unintended actions. - Low physical effort: The design can be used efficiently and comfortably and with a minimum of fatigue. - Size and space for approach and use: Appropriate size and space is provided for approach, reach, manipulation, and use regardless of user’s body size, posture, or mobility. Each of these principles plays a pivotal role in ensuring that the design is accessible to a wide range of users. The Elements of Inclusive Design While universal design emphasizes accessibility and usability for all, inclusive design takes a slightly different approach. Inclusive design focuses on diversity and inclusion, making sure that everyone’s needs and experiences are considered during the design process. It’s not just about the end product, but also about how it’s created. This includes involving a diverse group of people in the design process to ensure that various perspectives and potential challenges are taken into account. The Difference Between Universal and Inclusive Design Understanding the distinctions between universal and inclusive design is crucial, particularly in the realm of technology. Although the two concepts share some common ground, they differ significantly in their objectives and strategies. Let’s delve into their unique characteristics. When we look at the objectives of universal and inclusive design, we can observe a clear difference. The goal of universal design is to create products, environments, and systems that are usable by all people, to the greatest extent possible, without the need for adaptation or specialized design. In other words, it aims for a broad, one-size-fits-all solution. On the other hand, inclusive design takes a different route. Its objective is to include as many diverse users as possible in the design process. This means considering a wide range of abilities, ages, reading levels, languages, cultures, genders, and other characteristics of potential users. Inclusive design acknowledges that each user is unique and that designing for diversity from the outset can result in better products and experiences for everyone. The strategies employed by universal and inclusive design also differ. Universal design adopts a ‘one-size-fits-all’ approach, aiming to create solutions that work for everyone. It’s a top-down strategy, often driven by design experts who rely on established principles to guide their design decisions. On the contrary, inclusive design is a bottom-up approach that embraces diversity and individual differences. It often involves users in the design process, ensuring their needs and experiences are considered and reflected in the final product. It’s about designing with people, not just for them. The Intersection of Universal and Inclusive Design While universal and inclusive design have distinct objectives and strategies, they are not mutually exclusive. In fact, they often intersect and can complement each other when used together. For instance, a product designed with universal design principles can reach a broad audience, and when combined with inclusive design strategies, it can also ensure that individual user needs are met. So, while we differentiate between the two, it’s important to recognize that their combination can lead to the most accessible and inclusive products. After all, isn’t that what good design should aim to achieve? Why Universal and Inclusive Design Matters Ever wondered why we constantly stress the importance of universal and inclusive design in the tech industry? Is it just a buzzword, or is there a real, tangible value to implementing these design principles? To answer these questions, we must first acknowledge the role that technology plays in our lives. As tech pervades every aspect of our daily routines, from communication to entertainment to work, it becomes increasingly crucial that these tools are accessible to everyone. This is where universal and inclusive design come into play – they ensure that products are usable by as many people as possible, regardless of their abilities or circumstances. - Reach a wider audience: By designing for everyone, you increase the potential user base of your product. - Enhance user experience: Ensuring that your product is accessible and usable for everyone enhances overall user experience. - Legal compliance: Depending on the jurisdiction, there might be laws requiring certain levels of accessibility in tech products. - Corporate responsibility: Implementing these design principles is a reflection of a company’s commitment to diversity, inclusion, and social responsibility. - Innovation: Addressing complex design challenges often leads to innovative solutions that benefit all users. Universal and Inclusive Design in Tech Many tech companies, large and small, have begun to recognize the value of universal and inclusive design and are incorporating these principles into their design processes. For instance, consider a software application that is equally usable by sighted users, those with low vision, and those who are blind. This could be achieved through the use of high-contrast color schemes, adjustable text sizes, and screen reader compatibility. Similarly, a website that is navigable by keyboard alone, not just by mouse, caters to users with motor impairments. Another example is the use of inclusive language and representation in digital content. This ensures that people of all genders, races, and cultures can see themselves represented and feel included. While these examples are not specific to any brand, they represent the kind of thinking and design practices that promote inclusivity and universal access. Challenges and Critiques of Universal and Inclusive Design While the benefits of universal and inclusive design are evident, implementing these practices is not without its challenges. One common critique is the fear of design homogenization. The argument is that in the pursuit of universal design, products may end up being too generic, lacking in individuality or cultural specificity. However, this can be mitigated by a careful and thoughtful design process that values diversity and individual differences. Another challenge is the difficulty of achieving true inclusivity. It’s virtually impossible to design a single product that is perfect for everyone. What works for one user might not work for another. However, the goal of inclusive design isn’t to create a one-size-fits-all solution, but to design a flexible system that can adapt to the needs of as many users as possible. Despite these challenges, the importance of universal and inclusive design cannot be overstated. As technology continues to evolve and play an increasingly significant role in our lives, the need for accessible and inclusive products will only grow. The Role of Universal and Inclusive Design in Future Tech Development As technology continues to evolve at a rapid pace, the principles of universal and inclusive design are becoming increasingly relevant. With advancements in artificial intelligence (AI), virtual reality (VR), and augmented reality (AR), the potential for these design principles to shape the future of tech development is significant. But what does this look like in practice? Let’s explore the potential impact of universal and inclusive design on these emerging tech trends. |Tech Trend||Universal Design Impact||Inclusive Design Impact| |Artificial Intelligence||Ensuring AI systems are usable by all, regardless of ability or circumstance.||Involving diverse user groups in the development and testing of AI systems.| |Virtual Reality||Creating VR environments that are accessible and easy to navigate for all users.||Including diverse perspectives in the creation of VR content and experiences.| |Augmented Reality||Designing AR tools that can be used effortlessly by all, without need for adaptation.||Ensuring the development process of AR tools includes a wide variety of users.| Getting Started with Universal and Inclusive Design in Tech If you’re interested in implementing or learning more about universal and inclusive design, there are plenty of resources available to help you get started. Whether you’re a seasoned professional looking to expand your knowledge or a beginner just dipping your toes in the world of design, these resources can provide valuable insights and guidance. - The Design of Everyday Things by Don Norman: A classic book that explores the fundamental principles of design. - Inclusive Design for a Digital World by Regine Gilbert: This book offers insights into the importance of inclusive design in the digital space. - Interaction Design Foundation: An online learning platform offering courses in universal and inclusive design. - World Wide Web Consortium (W3C): An international community that develops open standards to ensure the long-term growth of the Web. They offer guidelines on web accessibility. In conclusion, the future of tech development will undoubtedly be shaped by the principles of universal and inclusive design. As we continue to make strides in AI, VR, and AR, it’s crucial that we keep these design principles at the forefront of our minds. Not only do they ensure our technologies are accessible and usable by all, but they also foster an environment of diversity and inclusion. So, why not start your journey into universal and inclusive design today? And remember, don’t keep this knowledge to yourself – share this blog post with others who might be interested in the topic. After all, the more we spread these principles, the more inclusive our future tech will be.
<urn:uuid:bc49211e-6ff1-4a91-9185-a5467193fd2f>
CC-MAIN-2023-40
https://www.venturelessons.com/what-is-universal-design-what-is-inclusive-design/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506658.2/warc/CC-MAIN-20230924155422-20230924185422-00188.warc.gz
en
0.933813
2,206
3.921875
4
Campaign of the Month: January 2012 Star Trek Late Night - Planet Name: Tellar - Class: M - Moons or Rings: One moon - Gravity: 1.05 G - Climate: 40% hydrosphere (surface), cool temperatures - Demographics: Billions of humanoid natives - Civilization: Agg ress ive and Scientifc, federal congress - Resources: Industrial minerals, precious metals, gemstones, advanced manufactured goods, building materials, spring water Tellar is the homeworld of the Tellarites, one of the charter members of the Federation. Coping with the planet’s unusual geology has molded the Tellarites into skilled engineers whose talents are admired throughout Alpha Quadrant. They have covered a substantial portion of the planet’s surface with massive irrigation and hydroponics projects so that Tellar could support a large population. Tellar is the fourth planet in the Pangeos system, which is located in Alpha Quadrant. Historically, Tellar has had an unusually dry and inactive climate for a Class M world. It’s sunny most of the time at all latitudes. The light, dry atmosphere doesn’t trap heat very well, so temperatures also remain cool year round. Very recently, however, scientists studying the planet’s climate have noticed a slight overall warming and increase in precipitation. They have determined that massive irrigation projects have increased the amount of water that enters the atmosphere through evaporation, and that this seems to be stimulating Tellar’s water cycle. By Class M standards, water covers remarkably little of Tellar’s surface. Its oceans are a nothing more than a handful of large inland seas. By volume, however, Tellar has just as much water as most Class M planets. Due to a quirk of the planet’s geology, the continental shelf of its continents cantilevers over the ocean’s surface, rather than slopes beneath it. The lack of ocean surface means that relatively little water evaporates into the atmosphere to fall back to the surface as precipitation. This explains why Tellar’s climate is so calm and dry. The planet’s water cycle instead enacts a unique variation on Class M norms. Seawater flows through subterranean streams and percolates through the rock and collects inland in vast underground reservoirs. This process filters out salt and other impurities, leaving the water fresh. At first glance, the Tellarites were rather an unlikely candidate to become charter members of the United Federation of Planets, an organization dedicated above all to forging cooperation and respect between diverse races. They are a quick-tempered and impulsive race, and even their most skilled diplomats have a habit of speaking their minds with astonishing frankness. When the Tellar Ambassador Gav was assassinated while en route with other delegates to the Babel Conference in 2267, no one was terribly surprised. Among themselves, however, Tellarites accept quarrelsome behavior simply as part of their nature, and they rarely think anything of it. In fact, outside observers have marveled at how little strife there is in Tellarite society given how much they remonstrate and argue with each other. World government on Tellar consists of a congress of delegates representing the planet’s traditional nation-states, and because there is no executive branch of government, all important matters are settled by simple majority vote by the delegates. Tellarite nature being what it is, no question ever comes to a vote without extensive debate before and even during the voting. These debates are usually loud, but never violent, and once a matter is settled all arguments are forgotten. Tellarites are renowned throughout the Federation for their talent as engineers. They acquired their skills by necessity, having to drill deep into the ground for something as essential as fresh water. They constructed massive irrigation projects to increase the amount of arable land available to them, and later built vast hydroponic farms to augment their agricultural capacity and support large cities. The Tellarites also developed space travel at a relatively early point in their history. Their engineering talents make the Tellarites skilled miners as well as builders. They can find industrial minerals, precious metals and even gemstones in ways and places that most Federation engineers couldn’t even imagine. Tellar marble is a prized building material throughout Alpha Quadrant. Bottled Tellar drinking water is also a lucrative export commodity, as the process of filtering that water undergoes as it passes from the ocean to underground reservoirs gives it an unusually clean taste. The Tellarites developed space travel relatively early in their history. By the turn of the 20th century they were using impulse-driven ships to explore and exploit most of the Pangeos system. In 1967, Garas, then an obscure designer working for the Tellar space exploration agency, developed the first Tellarite warp engine prototype. Ever since then, the Tellarites have kept a place on the cutting edge of Federation propulsion technology, a distinction in which they take just pride. Their leap into interstellar travel brought them into contact with other starfaring races, and in 2161 Tellar became a charter member of the UFP. However, the Tellarites also found themselves at the center of one of the most serious diplomatic incidents in early Federation history. In 2267, the Enterprise was assigned to transport delegates to the Babel Conference. Ambassador Gav, who headed the Tellar delegation, was assassinated, and initial suspicion pointed to the Vulcan ambassador Sarek, with whom he had quarreled in public. A diplomatic crisis loomed, one that threatened to break up not only the Babel Conference, but perhaps even the Federation (imagine a blood feud between two charter UFP members, one notoriously hot-headed). The crew of the Enterprise, headed by Captain James Kirk, defused the crisis by revealing that an Orion Syndicate assassin had killed Gav in an effort to sabotage the conference. Since then, Tellar has been an active and enthusiastic supporter of the Federation, anxious to make contact with other races, even though they may be quick to take umbrage at foreign ways. Recently, Ferengi visitors have periodically shown up on Tellar, trying to recruit Tellarite mining specialists to help them search for new latinum deposits. Some of them are also convinced that vast deposits of the currency metal lie undiscovered on Tellar, and they use as many blandishments as they have at their disposal to convince the natives to give up their location. In truth, no such secret knowledge exists, because the Tellarites have never bothered to look for latinum. They themselves have little use for it, and they don’t much like pushy little Ferengi trying to badger them into searching for it. Tellarites also volunteered in large numbers to staff the repair sections of Federation starbases to work on Starfleet vessels damaged in the Dominion and Empire Wars. PLACES OF INTEREST Eranas is the capital city of Tellar. The center of the city, known as the Old City, is enclosed by a massive fortified wall. It is a relic of the days when Eranas was the capital of the planet’s largest nation-state and felt the need to defend itself from envious rivals. Tellar’s seat of government, the Tellar Global Congress, is located here in the Old City. Tellar’s largest irrigation project, the Bilav Fields, is located just outside Eranas, but it is large enough to spill over the border into neighboring nations. Bilav Fields draws its water from a network of pipes that taps a large underground reservoir directly beneath it. Land irrigated by the project grows enough food to feed 100 million Tellarites, and they like to boast that it is large enough to be seen from space.
<urn:uuid:c5a01362-33c3-4f6b-96a6-bdc732df2b98>
CC-MAIN-2016-22
https://star-trek-late-night.obsidianportal.com/wikis/tellar
s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049276964.77/warc/CC-MAIN-20160524002116-00030-ip-10-185-217-139.ec2.internal.warc.gz
en
0.962794
1,622
2.59375
3
George Geddes (February 14, 1809 Fairmount, Onondaga County, New York – October 8, 1883 Fairmount, NY) was an American engineer, agronomist, historian and politician from New York. He was the son of engineer, surveyor and Congressman James Geddes. George Geddes studied engineering and surveying in Middletown, Connecticut, and law in Skaneateles, New York. He was a member of the New York State Senate (22nd D.) from 1848 to 1851, sitting in the 71st, 72nd, 73rd and 74th New York State Legislatures. He was one of three state senators instrumental in the passage of the 1848 New York State law permitting women to hold property independently of their husbands, the first of its kind in the United States. He served on the New York State Senate's Indian Affairs committee and wrote articles about Iroquois history and archaeology. Originally a Whig, he later joined the Republican Party. He was a moderate abolitionist. Geddes was well-known nationally in agricultural circles for his model farm at Fairmount, and was an early mentor to Frederick Law Olmsted. He also built the first plank road in America, at North Syracuse, New York, in 1846.
<urn:uuid:9d7b5220-835a-443a-b013-917e40778a3b>
CC-MAIN-2015-18
http://www.whoislog.info/profile/george-geddes.html
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246652296.40/warc/CC-MAIN-20150417045732-00100-ip-10-235-10-82.ec2.internal.warc.gz
en
0.981673
272
2.984375
3
“From the earliest days of life, the youngest among us are accorded with measures of commitment and esteem that echo our deepest understanding of respect.” Dr. Maria Montessori The Nido Program is designed to meet the developmental needs of infants ages 6 weeks to 17 months. Dr. Montessori first described the infant environment as Nido (meaning Nest in Italian). The classroom environment is cozy, loving, secure, attentive and comforting – just like at home. The environment is intentionally designed to facilitate movement, develop language, and realize independence. Our Infant classes are intentionally small with lots of floor space to crawl and explore. We follow each infant’s regular schedule in sleeping, eating, and diaper-changing in order to maintain a secure and trusting environment. We have several goals in the Nido Infant environment that ultimately facilitate independence and the ability to move freely for the acquisition of knowledge: Coordinating Movement The Nido Infant environment is designed to maximize movement. We avoid activities and equipment that restrict a baby’s natural movement and desire to explore. Communicating with the World We enrich our Nido Infant classroom through song, music, and spoken language to provide a rich communication environment. Our Directresses express different ideas in order to help babies effectively communicate with their teachers, parents, and loved ones. Developing Independence As our infants prepare to transition to the Toddler environment (18 months – 2 ½ years), we encourage children to care for themselves. They learn to stand confidently, sit comfortably, grip strongly, and even hold a cup. Montessori materials in the Nido environment are curated to develop coordinated, precise movements. Programs & Timings Infants can participate in part-time or full-time programs. Programs are offered from 8:30 – 2:30 PM (Full Day Montessori) and 6:30 – 6:30 PM (Full Day Montessori and Extended Care). Schedule a Visit Drop us a note and say hi.
<urn:uuid:baaec036-086e-4816-b72b-26c62d64582a>
CC-MAIN-2019-26
https://ourmontessoripreschool.com/nido-infants/
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998084.36/warc/CC-MAIN-20190616082703-20190616104703-00399.warc.gz
en
0.926642
417
2.984375
3
Definition of exit poll in English: A poll of people leaving a polling place, asking how they voted. - I became skeptical about such survey findings after filling out an exit poll after I voted in Manhattan on Tuesday morning. - This is a national exit poll conducted in 267 voting centers throughout the country. - Last year an election was held at which reporters for the school's newspaper conducted an exit poll that found a majority of grad students voted to unionize. Definition of exit poll in: - British & World English dictionary What do you find interesting about this word or phrase? Comments that don't adhere to our Community Guidelines may be moderated or removed. Most popular in the US Most popular in the UK Most popular in Australia Most popular in Malaysia Most popular in India
<urn:uuid:f86f5114-4f5c-42fc-a21f-65c01e3cc46d>
CC-MAIN-2015-06
http://www.oxforddictionaries.com/definition/american_english/exit-poll
s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422115860277.59/warc/CC-MAIN-20150124161100-00223-ip-10-180-212-252.ec2.internal.warc.gz
en
0.957761
165
2.875
3
Does Consciousness Depend on the Brain? By Chris Carter "In this materialistic age, dualists are often accused of smuggling outmoded religious beliefs back into science, of introducing superfluous spiritual forces into biology, and of venerating an invisible "ghost in the machine." However, our utter ignorance concerning the real origins of human consciousness marks such criticism more a matter of taste than of logical thinking. At this stage of mind science, dualism is not irrational, merely somewhat unfashionable." --Nick Herbert, Elemental Mind. The strongest arguments against the existence of an afterlife are those that deny the possibility of consciousness existing apart from the biological brain. These arguments derive their strongest force from common and undeniable facts of experience, and from their supposed association with the findings of modern science. But in fact, these arguments have an ancient history. The Greek atomists were the first to define the soul in terms of material atoms. Epicurus (342-270 BC) defined the soul as "a body of fine particles ... most resembling breath with an admixture of heat." He stressed the complete dependence of soul on body, so that when the body loses breath and heat, the soul is dispersed and extinguished. The Roman poet Lucretius (99-55 BC) took up the arguments of Epicurus, and continued the atomist tradition of describing the mind as composed of extremely fine particles. Lucretius wrote one of the earliest and most cogent treatises advancing the arguments that the relation between mind and body is so close that the mind depends upon the body and therefore cannot exist without it. First, he argued that the mind matures and ages with the growth and decay of the body; second, that wine and disease of the body can affect the mind; third, the mind is disturbed when the body is stunned by a blow; and finally, if the soul is immortal, why does it have no memories of its previous existence? Similar arguments, to the effect that the mind is a function of the brain, were taken up with greater force nineteen centuries later, in the work of men such as Thomas Huxley. More recently, Corliss Lamont, former president of the American Humanist Association, has written one of the most extensive statements of the materialist positions in his book The Illusion of Immortality, the title of which speaks for itself. He tells us in the preface that he started out as a believer in a future life, but does not give us the reasons why he held the belief against which he reacted so strongly. Lamont rightly contends that the fundamental issue is the relationship of personality to body, and divides the various positions into two broad categories: monism, which asserts that body and personality are bound together and cannot exist apart; and dualism, which asserts that body and personality are separable entities which may exist apart. Lamont is convinced that the facts of modern science weigh heavily in favor of monism, and offers the following as scientific evidence that the mind depends upon the body: - In the evolutionary process the versatility of living forms increases with the development and complexity of their nervous systems - The mind matures and ages with the growth and decay of the body - Alcohol, caffeine, and other drugs can affect the mind - Destruction of brain tissue by disease, or by a severe blow to the head, can impair normal mental activity; the functions of seeing, hearing and speech are correlated with specific areas of the brain. - Thinking and memory depend upon the cortex of the brain, and so "it is difficult beyond measure to understand how they could survive after the dissolution, decay or destruction of the living brain in which they had their original locus." These considerations lead Lamont to the conclusion that the connection between mind and body "is so exceedingly intimate that it becomes inconceivable how one could function without the other ... man is a unified whole of mind-body or personality-body so closely and completely integrated that dividing him up into two separate and more or less independent parts becomes impermissible and unintelligible." Lamont briefly considers the findings of psychical research, but contends that they do not alter the picture, because of the possibility of other interpretations, such as fraud and telepathy. However, Lamont's portrayal of psychic research is extremely superficial, and contains several incorrect and misleading statements. For a trenchant critique of Lamont's book, exposing a mass of inconsistencies and non-sequitur, see chapter XIII of A Critical Examination of the Belief in a Life after Death, by C. J. Ducasse. In summary, the various arguments against the possibility of survival are: the effects of age, disease, and drugs on the mind; the effect of brain damage on mental activity, and specifically, the fact that lesions of certain regions of the brain eliminates or impairs particular capacities; and the idea that memories are stored in the brain and therefore cannot survive the destruction of the brain. The inference drawn from these observations is that the correlation of mental and physical processes is so close that it is inconceivable how the mind could exist apart from the brain. Except for the appeals of the modern writers to the terminology of neuroscience, the arguments advanced in favor of the dependence of the mental on the physical are essentially the same as those advanced by Lucretius. There are really two separate issues here: one is the logical possibility of survival, and the other is the empirical possibility. The post-mortem existence of consciousness is at least a logical possibility - that is, there is no self-contradiction in the assertion that consciousness may exist in the absence of a brain. Then the question becomes whether or not survival is an empirical possibility - that is, whether or not the idea of survival is compatible with the facts and laws of nature as currently understood. All the arguments mentioned above that are opposed to the empirical possibility of survival are based upon a certain assumption of the relationship between mind and body that usually goes unstated. For instance, one of the arguments mentioned earlier starts with the observation that a severe blow to the head can cause the cessation of consciousness; from this it is concluded that consciousness is produced by a properly functioning brain, and so cannot exist in its absence. However, this conclusion is not based on the evidence alone. There is an implicit, unstated assumption behind this argument, and it is often unconsciously employed. The hidden premise behind this argument can be illustrated with the analogy of listening to music on a radio, smashing the radio's receiver, and thereby concluding that the radio was producing the music. The implicit assumption made in all the arguments discussed above was that the relationship between brain activity and consciousness was always one of cause to effect, and never that of effect to cause. But this assumption is not known to be true, and it is not the only conceivable one consistent with the observed facts mentioned earlier. Just as consistent with the observed facts is the idea that the brain's function is that of an intermediary between mind and body - or in other words, that the brain's function is that of a receiver-transmitter - sometimes from body to mind, and sometimes from mind to body. The idea that the brain functions as an intermediary between mind and body is an ancient one. We have seen how Hippocrates described the brain as "the messenger to consciousness" and as "the interpreter for consciousness." But, like the materialist theory, this ancient argument also has its modern proponents - most notably Schiller, Bergson, and James. Ferdinand Schiller was an Oxford philosopher in 1891 when a book titled Riddles of the Sphinx: A Study in the Philosophy of Humanism appeared which, according to the cover, was written by a 'Troglodyte' (cave-dweller). This troglodyte turned out to be Schiller, who in his book attacked the prevailing materialism of the late nineteenth without revealing his name in order to avoid "the barren honours of a useless martyrdom." Schiller likened himself to the man in Plato's Republic who has glimpsed the truth but finds that his fellow cave-dwellers simply do not believe his accounts, and so consider him ridiculous. In his book Schiller proposes that "matter is admirably calculated machinery for regulating, limiting and restraining the consciousness which it encases." He argues that the simpler physical structure of 'lower beings' depresses their consciousness to a lower point, and that the higher organizational complexity of man allows a higher level of consciousness. In other words, Matter is not what produces consciousness but what limits it and confines its intensity within certain limits. This explanation admits the connection of Matter and Consciousness, but contends that the course of interpretation must proceed in the contrary direction. Thus it will fit the facts which Materialism rejected as 'supernatural' and thereby attains to an explanation which is ultimately tenable instead of one which is ultimately absurd. And it is an explanation the possibility of which no evidence in favour of Materialism can possibly affect. As for the effects of brain injury, Schiller argues that an equally good explanation is to say that the manifestation of consciousness has been prevented by the injury, rather than extinguished by it. With regard to memory, he thinks that it is forgetfulness rather than memory that is in need of a physical explanation: pointing out the total recall experienced under hypnosis and 'the extraordinary memories of the drowning and dying generally', he argues that we never really forget anything, but rather are prevented from recalling it by the limitations of the brain. The French philosopher Henri Bergson held similar ideas to those of Schiller, although it is unclear if he ever read Riddles of the Sphinx. Bergson attempted to reconcile physical determinism with the apparent freedom of human behavior by proposing a theory of evolution whereby matter is crossed by creative consciousness: matter and consciousness interact, with both being elemental components of the universe, neither reducible to the other. According to Bergson the brain canalizes and limits the mind, restricting its focus of attention and excluding factors irrelevant for the organism's survival and propagation. He assumed that memories have an extra-cerebral location, but that most are normally screened out for practical purposes, and in support of this, refers to near-death experiences in which the subjects' entire life histories flashed before their eyes. The brain is therefore both "the organ of attention to life" and an obstacle to wider awareness. He speculates that if the brain is a limiting obstacle, filtering out forms of consciousness not necessary for the organism's biological needs, then freedom from the body may well result in a more extended form of consciousness, which continues along its path of creative evolution. In 1898 the American psychologist and philosopher William James delivered the Ingersoll Lecture. At the start of the lecture he first remarks that "Every one knows that arrests of brain development occasion imbecility, that blows on the head abolish memory or consciousness, and that brain-stimulants and poisons change the quality of our ideas." He then makes the point that modern physiologists "have only shown this generally admitted fact of a dependence to be detailed and minute" in that "the various special forms of thinking are functions of special portions of the brain." James then explores the various possibilities for the exact type of functional dependence between the brain and consciousness. It is normally thought of as productive, in the sense that steam is produced as a function of the kettle. But this is not the only form of function that we find in nature: we also have at least two other forms of functional dependence: the permissive function, as found in the trigger of a crossbow; and the transmissive function, as of a lens or a prism. The lens or prism do not produce the light but merely transmit it in a different form. As James writes: James then raises an objection to the transmissive theory of the body-mind relationship: yes, the transmission theory may be a logical possibility, but isn't it just unbridled speculation? Isn't the production hypothesis simpler? Is it not more rigorously scientific to take the relationship between brain and mind to be one of production, not transmission? But as James points out, from the standpoint of strictly empirical science, these objections carry no weight whatsoever. Strictly speaking, the most we can ever observe is concomitant variation between states of the brain and states of mind - when brain activity changes in a certain way, then consciousness changes also. The hypothesis of production, or of transmission, is something that we add to the observations of concomitant variation in order to account for it. A scientist never observes states of the brain producing states of consciousness. Indeed, it is not even clear what we could possibly mean by observing such production. And as for the objection that the transmission hypothesis is somehow fantastic, exactly the same objection can be raised against the production theory. In the case of the production of steam by a kettle we have an easily understood model - of alterations of molecular motion - because the components that change are physically homogenous with each other. But part of the reason the mind-body relationship has seemed so puzzling for so long is because mental and physical events seem so completely unlike each other. This radical difference in their natures makes it exceedingly difficult to conceptualize the relationship between the two in terms of anything of which we are familiar. It is partly for this reason that even though it has been more than a century since James delivered his lecture, in all that time neither psychology nor physiology has been able to produce any intelligible model of how biochemical processes could possibly be transformed into conscious experience. It has been pointed out many times that there is no logical requirement that only 'like can cause like' - or in other words, that only things of a similar nature can affect each other. But this consideration has not removed the mystery from the mind-body relationship. As James wrote, the production of consciousness by the brain, if it does in fact occur, is "as far as our understanding goes, as great a miracle as if we said, thought is 'spontaneously generated,' or 'created out of nothing.'" James continued: James wrote these works around the turn of the nineteenth century, but since then these arguments have been endorsed and developed by several more recent philosophers and psychologists, such as philosophers Curt Ducasse and David Lund, and psychologist Cyril Burt. The latter elegantly summarized the position set forth earlier by Schiller, Bergson, and James:
<urn:uuid:5b7075ca-4a80-4aa7-873b-29d90111ce5f>
CC-MAIN-2017-22
https://trans4mind.com/counterpoint/index-esoteric/carter1.shtml
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607960.64/warc/CC-MAIN-20170525010046-20170525030046-00608.warc.gz
en
0.955238
2,946
2.921875
3
Everything is connected with everything. Rarely has the term such validity as when it comes to the balance in nature. If a small insect goes extinct, it may have serious consequences for entire ecosystems. In vulnerable areas, the smallest interference from humans might change everything. The Norwegian countryside as we know it is not to be taken for granted. About a thousand Norwegian species are critically or severely threatened. What ripple effects there might be for other species and their habitats if these disappear, we do not know. Nature is constantly changing, adapting, and developing. Ecosystems change and species die out, while new ones appear through evolution. These are natural processes that take place over a very long time. But the current species extinction happens probably more than a thousand times faster than what we consider natural. Although we need a rational nature management, this does not mean we should not harvest and use of Norwegian nature. A rich and varied nature provides us with valuable goods like food, water, medicines, building materials, clothing, safety, health and new technology. Cultural landscapes are also part of our natural heritage and must be protected. Nature also has a great intrinsic value. The value of biodiversity, the joy of natural wonders and recreation are difficult to measure. Because of this, nature often loses in the fight against economic interests and other social considerations. Preserving our natural values depends on a sound management and good politics. We need laws and rules ensuring that the pressure on the fragile nature does not become too great. Intact areas of wilderness is a very scarce resource, even in Norway. Although parliament has voted to spare such areas, the reality is that they are increasingly diminishing. Friends of the Earth Norway believes that both the intrinsic and societal value of a diverse and intact nature speaks for its protection. Without progressive and ambitious legislation, we will not be able to secure our wonderful natural heritage for future generations.
<urn:uuid:3b9ac126-4752-4294-bc19-1165251f5fd2>
CC-MAIN-2018-13
https://naturvernforbundet.no/nature/category987.html
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257645613.9/warc/CC-MAIN-20180318110736-20180318130736-00703.warc.gz
en
0.941157
383
3.421875
3
Image Nature: Photograph Creation Place: (Certain) Topic: Pagoda and wall in Hanyang (Wuhan in Hubei) Action: A famous pagoda stands above the buildings and walls of a fortified place on the Yangzi river. The top of a white stupa appears in the back. Mat sheds and houses stand before the river. The city of Hankow (another part of present-day Wuhan) appears on the other bank. Image Particulars: The former cities of Hankou, Hanyang and Wuzhang, in Hubei, are now amalgamated as the city of Wuhan.
<urn:uuid:f6a6ae68-9b29-4b63-bd11-33debd78f43e>
CC-MAIN-2019-43
http://postcard.vcea.net/Browsing.php?ID=cn00423&Start=394
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986648481.7/warc/CC-MAIN-20191014003258-20191014030258-00329.warc.gz
en
0.923749
138
2.546875
3
Current time in Dominica Local time in Dominica The time in Dominica is 4 hours behind UTC and 5 hours behind Amsterdam. The timezone in Dominica is Atlantic Standard Time (AST). Dominica is not using Daylight Saving Time (DST) but used to in the past. The last DST transition was in 1945. Details for the time in Dominica |Time zone||Atlantic Standard Time (AST)| |IANA time zone||America/Dominica| |Your time difference||5 hours behind Amsterdam| |UTC time difference||UTC-4 4 hours behind UTC Dominica Daylight Saving Time (DST) Dominica is not using Daylight Saving Time. Dominica uses Atlantic Standard Time AST. AST is UTC -0400. Dominica's latitude and longitude is 15° 25' N and 61° 20' W. Therefore a four hours offset between AST and UTC is close to perfect for Dominica. Because Dominica is an island not far north of the equator, it has no use for daylight savings time. Important cities in Dominica The current time in some important cities in Dominica is shown below.Time in Dominica
<urn:uuid:2ddbc174-db70-4a02-b690-f17dcfb6ecf5>
CC-MAIN-2023-14
https://clocks.world/time/dominica/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945323.37/warc/CC-MAIN-20230325095252-20230325125252-00387.warc.gz
en
0.766624
266
2.890625
3
Remembering U.S. Endangered Species The United States is home to thousands of species in trouble; here's how a few are faring on (or off) the Endangered Species List - Hannah Schardt - May 03, 2010 North America harbors a stunning array of wild plants and animals, from the bison and wolves of the West to Hawaii's dazzling flora to Florida's diminutive Key deer. However, scientists estimate that as many as one-third of U.S. native species are at increased risk of extinction, mostly due to human-caused threats such as habitat loss and global warming. Some 1,300 species are already listed as threatened or endangered under the Endangered Species Act of 1973. Read about what NWF is doing to help protect the plants and animals that make North America so special—including those species that are threatened by the BP oil spill—then read on below to find out how a few individual species are faring. Living Fossil: Loggerhead Sea Turtle Sea turtles can be considered living fossils from the time of the dinosaurs. They first appeared about 200 million years ago and are now protected by the Endangered Species Act. Their continued existence is threatened by human development: Tiny baby turtles find their way from sandy beaches to the ocean by moving toward the brightest horizon—under natural conditions, the ocean. But with beachfront development creating artificial sources of light, the hatchlings may instead head inland, where they cannot survive. They also are severely affected by the loss of nesting beaches and by sea pollution. Read more about loggerheads and other endangered sea turtles. Back from the Brink: Black-Footed Ferret Thirty years ago, many scientists believed this rare mammal—once widely dispersed throughout North America’s prairie lands—was extinct in the wild. Now a successful captive breeding program is giving the endangered animal a new lease on life. Read more about the black-footed ferret and other prairie wildlife. In the News: Greater Sage-Grouse These extraordinary birds currently occupy 258,000 square miles of the sagebrush ecosystem, spread throughout parts of 11 Western states. Last year, Agriculture Secretary Tom Vilsack and Interior Secretary Ken Salazar announced an agreement to support the conservation of the increasingly rare greater sage-grouse and its sagebrush habitat. The announcement came just weeks after the U.S. Fish and Wildlife Service decided that while the sage-grouse warrants protection under the Endangered Species Act, the bird would have to wait its turn while other, higher-priority species were addressed. That means the bird will be placed on the list of candidate species and eventually will be proposed for protection under the act. Read more about the greater sage-grouse. Find out more about bats, crocodiles, lynx and other threatened and endangered species.
<urn:uuid:63ac965e-53e9-4408-86ae-91ca08c906f3>
CC-MAIN-2019-09
https://www.nwf.org/en/Magazines/National-Wildlife/2010/Endangered-species-day
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247479627.17/warc/CC-MAIN-20190215224408-20190216010408-00026.warc.gz
en
0.940329
580
3.390625
3
Case: A 25 year old woman with no significant past medical history presents to walk-in clinic complaining of several days of right heel pain. She notes that the pain is quite sharp and worst when walking. It is so severe that she has skipped her morning run for three consecutive days. She has tried taking acetaminophen which has provided minimal symptom relief. Physical exam reveals mild swelling and point tenderness over the right heel. You suspect that she has plantar fasciitis, but are unsure how to proceed. The differential diagnosis of heel pain includes plantar fasciitis, bone spurs (which often coexist with plantar fasciitis), tendonitis of the posterior tibialis or flexor digitorum longus and bursitis. Heel pain may also be derived from pathologic processes affecting the calcaneus, such as stress fractures, malignancy, reactive arthritis, Paget’s Disease and sarcoidosis. This patient most likely has plantar fasciitis based on her history. Plantar fasciitis is characterized by moderate to severe heel pain, worse in the morning, or when initiating activity. It is due to repetitive microtrauma to the plantar fascia of the foot, leading to pain and inflammation. It can be diagnosed by history and physical exam. The treatment of plantar fasciitis is conservative. In order to allow the fascia to heal, patients should decrease the amount of walking, running and jumping that they do. Proper footware is essential and should include well-cushioned soles and possibly a heel pad. Soft medial arch supports may be beneficial to prevent over-pronation. High heels are to be avoided, as they can lead to shortening of the Achilles tendon. Patients with suspected plantar fasciitis may be referred to Podiatry, Rehab or Orthopedics for selection of appropriate heel and arch supports. The Rehab service can also instruct patients on an exercise program aimed at stretching the plantar fascia and Achilles tendon. Icing, ultrasound and deep friction massage are other modalities that are sometimes employed. In terms of medical therapy, NSAIDs may provide some relief by decreasing inflammation. Most cases of plantar fasciitis will completely resolve within 6-12 weeks. For persistent cases, cortisol injections can be considered. In the rare instances when relief is not obtained by conservative methods, the plantar fascia can be surgically released from the calcaneus. The efficacy of preventive measures is not known; however patients should be advised to wear shock absorbent shoes, stretch prior to a work out and control their intensity of running. Image courtesy of Conrad Nutschan, Wikimedia Commons
<urn:uuid:3f365f75-3ee9-4d0a-8697-ecdc963d2467>
CC-MAIN-2015-11
http://www.clinicalcorrelations.org/?p=346
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462982.10/warc/CC-MAIN-20150226074102-00153-ip-10-28-5-156.ec2.internal.warc.gz
en
0.917277
558
2.75
3
‘Aqeeqah is a Sunnah – for a boy two sheep, and for a girl, one sheep. That is the Sunnah. It is to be slaughtered on the seventh day. There is no clear text regarding its distribution. So if it is distributed among the neighbours or the relatives it is allowed – so he eats some of it, invites the neighbour or some of the neighbours, and gives some of it to the poor – all of it is permissible, and there is allowance in the matter. Some of the scholars have made the division like the udhiyyah (the ‘Eid sacrifice), that a third is eaten by the family, a third is given in charity and a third is gifted to people. However, there is no evidence for this. So what is better is that the family should eat from it, give some away as charity and gift some (to friends, relatives and neighbours). There is no fixed division, and all praise is for Allah. When is the first day and seventh day? The day is measured from the day of the birth of the baby. If it was born on Monday morning, or Monday at ‘Asr time or at Dhuhr, then Monday is the first day. If the baby was born on Sunday after Maghrib (after the sun has set), then likewise the first day is taken as Monday. So when the seventh day arrives which would be the following Sunday, then it is named and ‘aqeeqah is performed. So the intent is that the first day is counted as the day on which the child was born – so if was born at ‘Asr time, then that is the first day. I have used Western terminology to keep things simple. In the Western way of measuring days, Sunday night comes after the day of Sunday. In Arabic, however, after Maghrib on Sunday is considered as the night of Monday, i.e. beginning of the next day. That is because, in Arabic, the night comes before the day. Abu Khadeejah (2022)
<urn:uuid:c5367ba1-8699-4904-8ce7-ffe208cbb114>
CC-MAIN-2022-49
https://abukhadeejah.com/the-aqeeqah-eaten-by-the-family-and-distributed-how-to-calculate-first-and-seventh-day-birth/
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711126.30/warc/CC-MAIN-20221207021130-20221207051130-00121.warc.gz
en
0.984846
475
2.890625
3
|Posted on Twitter by Krissy Brynn Jackson @KBJblog| To which I responded:We are spending $30 billion a year to reduce class sizes, but a bad teacher with 30 kids is still a bad teacher with 16 kids. We should use those funds to increase salaries; great teachers can handle 30 students.— Ron Clark (@mrronclark_) April 2, 2018 I think we can do both. If we can suddenly find money to arm teachers, I think we can raise teacher salaries AND reduce class sizes. I would also like to know where that $30 billion is being spent.OMG Great teachers can handle 30 kids? Why would we just want to “handle” them? We want to provide an environment where learning takes place. Where there is enough space to walk. Where a teacher can meet the needs of all our students. #smh #classsizematters— Lisa M. (@BriteEyes49) April 2, 2018 Define "bad teacher." Is it a teacher having a hard time with classroom management with 30 kids? "Great" teachers can "handle" 30 students. But what "great" teacher wants to? What "great" teacher wouldn't want a smaller class size? One year I had 20 kids and I felt like I was in Teacher heaven! Classroom teachers see things so much differently. I mean actual teachers who work with children in a classroom. Here are some reasons why class size matter: - Physical space: You know those classrooms you see in magazines? They are huge and have corners, spaces, nooks, and lots and lots of room. My classroom is a rectangular box with 27 5th grade bodies. Someone came in my room one day and said it was an obstacle course. I can't imagine what it is like for middle and high school teachers. - Behavior Problems: Those kids who should never,ever, be in the same class under any circumstances? Well, guess what? They are in the same class because there are 30 kids in them, and there is nowhere else to put them. - Differentiated Instruction: Our students learn at different paces and places. You have advanced, average, and struggling. As an educator, I try to meet all their needs so that they feel successful. Which class size would make it more viable for me to meet them? 20 or 30? 10 less students that I would have to give my attention to. - Personalized Learning: This kind of goes along with differentiated instruction. I do not believe personalized learning is sitting a student in front of a computer with an adaptive program all day. Therefore, it is my job to personalize learning for my students. Again, would I rather do this with 20 students or 30? - An educator's time: This applies to any and everything I have to do in my classroom that involves my students. Have you ever tried to have productive Writing Conferences with 30 students? Set up Student-led conferences for 30 students? Report cards for 30 students? Should I go on? Grade papers for 30 students? - Parents: If a parent were able to choose where their child could attend school, which school do you think they would choose? The school where the student:teacher ratio is 15:1 or 30:1? Now think about why they made that choice. Unfortunately, the majority of public school parents aren't given that option. Fortunately, I am an educator who can educate 20, 27, or 30 students. And maybe that's the problem. It can be done, and therefore it is. And if you can't, you are labeled. Class size matters. The problem is that, sadly, it matters most to the educator in the classroom.
<urn:uuid:d63a39f6-1210-4ad9-adcf-2481eebf5636>
CC-MAIN-2022-40
https://www.diaryofapublicschoolteacher.com/2018/04/
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337529.69/warc/CC-MAIN-20221004215917-20221005005917-00070.warc.gz
en
0.974038
768
2.859375
3
Herb latin name: Salix matsudana Synonyms: Salix pseudo-matsudana Family: Salicaceae (Willow Family) Medicinal use of Salix matsudana:The fresh bark of all members of this genus contains salicin, which probably decomposes into salicylic acid (closely related to aspirin) in the human body. This is used as an anodyne and febrifuge. Description of the plant: Habitat of the herb:Banks of rivers. Edible parts of Salix matsudana:Inner bark - raw or cooked. It can be dried, ground into a powder and then added to cereal flour for use in making bread etc. A very bitter flavour, it is a famine food that is only used when all else fails. Young shoots - raw or cooked. They are not very palatable. An emergency food, they are only used when all else fails. Other uses of the herb:The stems are used for weaving wicker baskets. The wood is used for timber. Propagation of Salix matsudana:Seed - must be surface sown as soon as it is ripe in late spring. It has a very short viability, perhaps as little as a few days. Cuttings of mature wood of the current year's growth, November to February in a sheltered outdoor bed or planted straight into their permanent position and given a good weed-suppressing mulch. Very easy. Plant into their permanent positions in the autumn. Cuttings of half-ripe wood, June to August in a frame. Very easy. Cultivation of the herb:Banks of rivers. Known hazards of Salix matsudana:None known Plant information taken from the Plants For A Future.
<urn:uuid:91265025-549a-4a50-b123-e28886cf31d1>
CC-MAIN-2021-43
http://www.naturalmedicinalherbs.net/herbs/s/salix-matsudana.php
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585450.39/warc/CC-MAIN-20211022021705-20211022051705-00488.warc.gz
en
0.928661
376
2.890625
3
THE ROYAL ASTRONOMICAL SOCIETY OF CANADA STANDING COMMITTEE ON OBSERVATIONAL ACTIVITIES Bulletin No. 2 Meteor observing is a field in which amateurs without specialized equipment can make an important contribution. The prime requirements are enthusiasm, knowledge of the constellations, and a willingness to stay awake when the majority of citizens are sleeping. Other things being equal, more meteors are observed between midnight and dawn than between dusk and midnight. With some thought, it becomes apparent that those arriving before midnight have to overtake the earth, while those in the early hours of the morning are meeting the earth bead-on. Thus the latter will tend to be brighter with more of then. Meteor observing is a field in which the junior member of a Centre can come into his (or her) own. In Ottawa, we have two groups of experienced observers composed of high school students (Hillcrest and Queensway). If you are thinking of starting Cr expanding a meteor observing group, include high school pupils in your recruiting - after a short period of training the students will develop into very effective The first bulletins of the Meteor Section will deal with topics such as setting up a visual observing station, the type of information gathered by visual observers, and the recovery of meteorites after a suspected fall. Later bulletins will deal with meteor photography and spectroscopy, telescopic meteors, and the collection of fire- ball reports from untrained observers. I would like to stress that these bulletins will attempt to transmit advice fran one amateur to another, and will not be formu- lating hard and fast rules. If you have ideas of your own, go ahead and try them art and please let me know the results. Your comments on these bulletins will be welcomed along with news of the activities of your group in the meteor observing field, but NOT the data you have collected. Please mail this to: Meteor Centre, National Research Council, Ottawa 2, Ontario, where Dr. Peter M. Millman will feed it to his hungry computers. A number of brilliant fireballs have been observed recently; it is important to remember that most of the people from whom fireball observations can be collected do not know what they have seen. Reports of flying saucers, or unconfirmed stories of planes crashing in flames, unexplained noises from the sky and other peculiar happenings should be investigated - otherwise the chance of a meteorite recovery may be lost. Remember, reporters and others in the mass-communication field cannot be expected to be familiar with meteoritic phenomena. It is instructive to read the reports of the meteorite which fell in Barwell, England, last Christmas Eve (see SKY AND TELESCOPE July 1966, p.7, and Journal of the British Astronomical Association April 1966, p.192), art compare this with the published account of the Bruderheim meteorite of March 4, 1960 and the Peace River meteorite of March 31, 1963 (see JOURNAL of the R.A.S.C., October 1961, p.218 and June 1964, p.109, respectively). The comparison reflects great credit on our meteorite recovery experts in Western Canada and the final story of the fireball of September 17, 1966 should reflect similar credit on us in Ontario! Meteor Section, Bulletin No.2 -2- There are a number of books now available which will be useful to students of meteor- itics. A reliable star atlas of naked-eye stars is essential - my first choice would be Norton' s Star Atlas (Gall & Inglis) with Ray Coutchie' s Deep Sky Catalogue a close second, available from Ray Coutchie, 22018 Ybarra Road, Woodland Hills, California,USA. Fletcher G. Watson' s Between the Planets (available as a paperback from Doubleday- Anchor Bock N17) is a near-essential. In a large group, one individual should obtain McKinley' s Meteor Science and Engineering (McGraw-Hill). There are many others - some day I hope to send you a fairly comprehensive list. Do not forget the publica- tions "Sky and Telescope" and "The Review of Popular Astronomy". METEOR SHOWERS OF AUTUMN AND EARLY WINTER The ORIONIDS reach the maximum of their 8-day period on the evening of Thursday, 20-21 October. The radiant is located at RA 6 h 20 m, Decl. 15°N (10°NE of Betelguese, between Betelguese and Delta Geminorum). Thus the shower is at its best in the early morning with the radiant culminating (reaching its highest point in the sky) around 4 a.m. at which time the maximum rate of 15-20 Orionids and 7 sporadic (non-shower) meteors may be expected. The first-quarter moon will not interfere with observations of this shower. The TAURIDS are not a rich shower (of the 15 meteors per hour which may be expected under favourable conditions, only half will be Taurids); however, they have an extremely long period (about 30 days) and the long paths at low speeds make these meteors fascinating objects. They are associated with Encke's Comet; it is possible that they give rise to meteor showers on Wars, Venus and Mercury as well as on earth. During the period of maximum activity, from 1st to 10th November, the diffuse radiant is located in the area of the sky between Aries arid Aldebaran. The waning moon may interfere with observing during the early part of this period. Incidentally, this shower makes a "return visit" in the latter part of June as the daytime Beta Taurids, which can be observed only by means of radar. The LEONIDS are the most famous (or infamous!) of the periodic showers. They gave rise to spectacular displays in 1799, 1833 and 1866, but their failure to perform as expected in 1899 ruined popular interest in meteor observing for years. However, interest in this shower is reviving due to the unexpectedly rich display of 1961, and another rich return in 1965. There is an excellent chance that the night of 16-17 November will be an exciting one for meteor observers. The radiant is in the Sickle of Leo, and the moon is between new and first-quarter phase. If you have an interest in meteor photography, this is one night to keep your camera handy. If possible, observations on the nights of 15-16 November and 17-18 November should also be made, just in case the Leonids have other surprises in store. Good Luck! The GEMINIDS, like the Perseids, are classed among the "old reliables" of meteor showers. The radiant is near Castor, the period of greatest activity is between the 9th and 14th of December, and the maximum will occur on the night of 13-14 December, when the hourly rate should reach 50 meteors. The Geminids tend to be rather slow (not as slow as the Taurids) and bright Ä this is a good shower to try your luck with a camera, taking precautions to prevent the lens from dewing or frosting oven Culmination of the radiant takes place around 2 a.m. Meteor Section, Bulletin No.2 -3- The URSIDS are normally a weak shower of faint meteors, but they apparently gave rise to a minor storm in 1945. Their maximum falls on the night of 22-23 December; the radiant is near Beta Ursae Minoris, in the bowl of the Little Dipper. The QUADRANTIDS, named for a now-defunct constellation, have their radiant roughly in the centre of a triangle formed by the last star in the "tail" of the Big Dipper (Alkaid), the head of Draco, and the "Keystone of Hercules" (RA 15 h 28 m, Decl.50°N). There are no bright stars in this area - just a big nondescript patch which left an embarrassing void in early star maps - hence the unsuccessful attempt to fill it with a drawing labelled "Quadrans Muralis". The Quadrantids owe third among the "Big Three" of the annual showers, with a rate of 40 meteors per hour (the Perseids are first with a rate of 50+ per hour, the Geminids second with a rate of nearly 50). However, it is a difficult shower to observe - the period of activity is less than a day, and weather coalitions normally daunt all but the hardiest observers. The peak of activity occurs on the night of 3-4 January, 1967. Dress warmly if you observe Finally, for fireball report forms, meteor plotting charts, meteor record sheets, and instructions in their use, write to the Meteor Centre, National Research Council, Ottawa 2, Ontario, and return all data sheets there on completion. If you want to talk about your meteoritical exploits and adventures, or would like advice on getting started in this hobby of meteor observing, then write to me. Please let me know the name of your Centre's meteor co-ordinator as well. Stan Mott, National Co-ordinator, Standing Committee on Observational Activities, 20149 Honeywell Avenue, 21 September, 1966 Ottawa 13, Ontario. Meteor Section Bulletin No. 2
<urn:uuid:50965ef7-1d91-44c6-af97-b566a39e79f7>
CC-MAIN-2014-41
http://www.rasc.ca/content/660921meteor2
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657136181.32/warc/CC-MAIN-20140914011216-00072-ip-10-234-18-248.ec2.internal.warc.gz
en
0.917844
2,073
2.640625
3
This method is similar to sowing the seed indoors in pots with the exception that the pots are stored outside whilst the seed germinates (see last paragraph of this page). The advantage over indoor sowing, is that space is not a limiting factor to the amount of plants to be raised. and position of the plants are the key factors to success. Keep the pots in the warmest part of the garden (against a house wall is ideal) to hasten germination and subsequent growth. The use of cloches will assist greatly in retaining heat. to buy a poly-tunnel or cloche online from our recommended suppliers. the most difficult aspect of this method - keeping the plants under cloches and or against a house wall will raise the temperature and permit earlier growing, but it is not an exact science. The basic rules of no frost and a minimum soil temperature of 15C (60F) must be achieved. combination which can work well is to sow the seeds inside (where they do not have to be in a light position) and the transfer them outside when the seedlings emerge.
<urn:uuid:e4872ce2-aeab-478f-b8c4-f156139f2646>
CC-MAIN-2017-47
http://www.gardenaction.co.uk/fruit_veg_diary/fruit_veg_mini_project_july_1ad_tomato_sowoutdoors.asp
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934805761.46/warc/CC-MAIN-20171119191646-20171119211646-00691.warc.gz
en
0.901114
243
2.734375
3
Australians pay tax so our government can provide services to our community, ranging from hospitals, schools and roads to recycling centres, national parks and even your local swimming pool. The main tax you'll pay is income tax, which is charged on income you receive, such as salary and wages, investment income and business income. At the end of the income year (30 June), most people need to lodge an annual tax return. The amount of income tax you pay is linked to how much you earn and whether you're an Australian resident. The more you earn, the higher your rate of tax. Before you start work, or soon after, you may need to get a tax file number (TFN). You don't have to have a TFN, but you pay more tax if you don't have one. You can apply for a TFN from the Australian Taxation Office.
<urn:uuid:9a8672f8-081b-44b2-96f3-c201826ca847>
CC-MAIN-2017-26
http://canberrayourfuture.com.au/portal/living/article/taxation-system/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320386.71/warc/CC-MAIN-20170625013851-20170625033851-00158.warc.gz
en
0.978406
181
2.59375
3
Take The Hypercarniovre 30-Day Health Challenge Take The Hypercarniovre 30-Day Health Challenge and discover for your self just how good you can feel! When you greatly simplify your diet, you can better determine which foods may be triggering symptoms, and which foods help you to feel your best. There are many potential issues with plant foods that can disrupt proper digestion and assimilation of nutrients, and undermine your health. Wouldn't you like to feel more empowered about your food choices? Or finally overcome food cravings, and eat in a manner that is simple, satisfies, and easy to sustain? This challenge will help you discover for yourself which foods are best nourishing your health, and which foods may not be as healthy as you ~ and we all ~ have been led to believe! Many of the fruits and vegetables on the market are hybridized ~ man-altered versions of their original form. Fruits are bred to have increasing levels of sweetness, meaning they are much higher in sugars than their original wild cousins. Some zoos are even removing fruit from their primates' diets because these sugar-laden domestic fruits are so full of sugar!(1),(2),(3) Vegetables and greens, including the so-called super foods ~ kale and broccoli ~ are a modified form of the mustard plant. Plant foods, including those 'healthy' whole grains and beans contain phytates and lectins ~ compounds that inhibit absorption of important minerals. Fiber is another non-essential nutrient that can cause constipation!(4) Yes you read that correctly. A study conducted comparing high and low-fiber diets concluded with those eating a low to no-added-fiber diet having 100% relief of constipation, and the associated symptoms of bloating, abdominal distention, gas, etc., compared to those given a higher-fiber diet! Elimination frequency was once per day on average. High fiber diets can cause either constipation, or excess elimination and loose stools. The stems and leaves of plants, such as the broccoli and kale, also contain bitter compounds designed to ward off predators. It's the plant's built-in defense mechanism. While it is happy for animals and humans to eat of it's fruit, it does not want critters to pray upon it's leaves and stems. When we eat the fruit, we help the plant by leaving behind the seeds, ensuring it continues to propagate. When we eat the leaves and stems, we are killing it before it can bear fruit.(5) There are other compounds in many plant foods that can cause inflammation and/or gut distress in the body, or are considered high histamine triggers, increasing likelihood of allergy symptoms. Oxalates, FODMAPs and high histamine trigger plant foods are all potential sources of a wide-range of problems. When you avoid or greatly minimize plant food consumption for a long enough time, you can then slowly add some back, and see for yourself if you are asymptomatic after eating certain plant foods, or not. There is nothing to fear about eating a nearly all animal food-based diet. Humans survived through challenging climatic conditions by consuming animals, fish, seafood, and even insects with small amounts of fruits and other wild plant foods ~ if and when available seasonally and locally. Take The Hypercarnivore 30-Day Challenge! You just may surprise yourself! You may feel better than you expected! And even have a remarkable recovery of some chronic conditions that have plagued you for years, and medical authorities were not able to help you resolve. There is no substitute for eating a nutrient-dense diet that will support your immune system, and help you maintain your health and vigor, along with lean muscle, as you age. Take The Hypercarniovre 30-Day Challenge and find out for yourself just how good you can feel! Get your free copy by subscribing, below. You may also be interested in The Trust Your True Nature Low-Carb Lifestyle ~ available in paperback on Amazon, and with food photos in the Kindle and E-Book versions. BE SURE TO CHECK OUT DON'S NEW BOOK, THE HYPERCARNIVORE DIET, NOW AVAILABLE!!! A HIGHLY REFERENCED, WELL WRITTEN, EXCELLENT READ COVERING EVERYTHING YOU WANT TO KNOW TO BETTER UNDERSTAND WHY A HYPERCARNIVORE DIET IS BEST FOR OPTIMAL HEALTH!
<urn:uuid:198b7ed2-612a-4675-b641-96c47e56c9c9>
CC-MAIN-2020-40
https://www.thehypercarnivore.com/p/hypercarnivore-30-day-challenge.html
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400206763.24/warc/CC-MAIN-20200922192512-20200922222512-00283.warc.gz
en
0.944142
940
2.703125
3
Being assertive can come very easily to many of us whilst some of us might have an extreme difficulty in this area, due to many of the following blocks as stated by Hauck (1981b): 1.Fear of injury-Physical violence may be threatened or unleashed in order to keep you in line. This might be the case in an abusive relationship. 2. Fear of failure 3. Fear of hurting other people’s feelings-For example, if I tell him that ‘his gift wrapping is not very good, I might hurt his feelings’ 4. Fear of rejection– For example: I couldn’t cope if they criticised me or abandoned me 5.Fear of financial insecurity- For example, you stay in a job you hate because you are worried about financial instability if you leave. According to Trower et al (2011)there are these 2 blocks: 1.Guilt – You believe it is wrong to assert your… View original post 301 more words
<urn:uuid:4b19dcc7-0163-4032-9e2e-1a3f6422363f>
CC-MAIN-2018-13
https://mychildwithin.wordpress.com/2016/06/06/blocks-to-healthy-self-assertion/
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647885.78/warc/CC-MAIN-20180322131741-20180322151741-00109.warc.gz
en
0.948328
206
2.703125
3
Modify Signal Properties in the Simulation Data Inspector You can modify signal display units, data type, and names in the Simulation Data Inspector. When you modify the data type for a signal, the Simulation Data Inspector converts the signal values stored on disk. Changes you make to signal properties in the Simulation Data Inspector do not affect any models, files, or workspace variables. You may want to save the original signal data or export modified signal data to use as simulation input. You can export data from the Simulation Data Inspector to the workspace or a file. For more information, see Export Data to Workspace or File. This example uses data from a simulation of the model. To generate the data for this example: Open the model To log the q, rad/sec, the Stick, and the alpha, radsignals to the Simulation Data Inspector, select the signals in the model. Then, right-click the selection, and select Log Selected Signals from the context menu. Double-click the Pilot block. Set Wave form to sine, and click OK. Simulate the model. Modify Signal Units Signals in the Simulation Data Inspector have two unit properties: display units and stored units. To analyze sets of data using consistent units, modify the display units for a signal. The Simulation Data Inspector converts data when the stored units and display units for a signal differ such that signals are always plotted using values that correspond to the display units. The units you specify are properties of the signals in the Simulation Data Inspector only and do not affect the signal properties in models. To learn how to specify units in a model, see Unit Specification in Simulink Models. slexAircraftExample model does not specify units for its signals. However, some signal names indicate the intended units. In the Inspect pane, select the To view the properties for the selected signal, expand the Properties pane. To specify units of radians for the signal, in the Properties pane, type radinto the white text box next to the Display Units property. For a list of units supported by Simulink®, enter showunitslist into the MATLAB® Command Window. Now, the Simulation Data Inspector interprets the data for the rad signal as having units of rad. When you specify display units for a signal without units, the specified units also set the value for the stored units. Once a signal has units Simulink recognizes, you can convert the display units for the signal to supported compatible units using the Simulation Data Inspector. When you click the Display Units text box to modify the units, the Simulation Data Inspector provides a drop-down list of compatible units. alpha, rad signal display units to using the drop-down or by typing the new units into the Display Units field. When you change the units, the Simulation Data Inspector performs the conversion, and the plot updates to show the converted signal values. You can also configure unit preferences in the Simulation Data Inspector to use units from a system of measurement or consistent units for a measurement type, such as length, for all logged and imported data. For more information, see Signal Display Units. You can convert the stored units for a signal using the convertUnits function. Unit conversion does not support undo and may result in loss of precision. Modify Signal Data Type You can modify the data type for a signal to analyze the effect on signal values or to create a signal to use as simulation input. Converting the data type in the Simulation Data Inspector does not affect any signal properties in the model. You can convert signal data types to all built-in data types. If you have a license for Fixed-Point Designer™, you can also convert to fixed-point data types. For a list of built-in data types, see Data Types Supported by Simulink. When you convert to a lower precision data type, you lose precision in the data that cannot be recovered. You can save a copy of the data in the Simulation Data Inspector before changing signal data types. For more information, see Save and Share Simulation Data Inspector Data and Views. The data type for the alpha, rad signal is Suppose you want to convert the data type to single. First, select the alpha, rad signal. Then, expand the Properties pane and click the white text field next to the Data Type property. You single or select it from the drop-down of data types. The Simulation Data Inspector converts the data when you click outside the drop-down. single data type has less precision than the double data type, the Simulation Data Inspector returns a warning about irreversible precision loss. Click Continue. The plot shows no visible difference in the signal. If you saved the data for the original signal, you can compare the converted signal to analyze the effect of changing the data type. For more information on comparing data in the Simulation Data Inspector, see Compare Simulation Data. If you have a license for Fixed-Point Designer, you can convert signal data types to fixed-point data types in the Simulation Data Inspector. Specify the data type in the Data Type property text box using the Modify Signal Names You can modify the names of signals in the Simulation Data Inspector. Changing the name of a signal in the Simulation Data Inspector does not affect signal names specified in the model. You can specify a new name from the work area, the Archive, or the Properties pane. To modify the signal name, click the signal name and type the new name. For example, change the name of the alpha because the Units property now has the units information. When you export data from the Simulation Data Inspector after modifying the name, the exported data uses the new name.
<urn:uuid:b0029c4f-0304-4802-a4cd-54e5c3bc6205>
CC-MAIN-2024-10
https://ch.mathworks.com/help/simulink/ug/modify-signal-properties-in-the-simulation-data-inspector.html
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474526.76/warc/CC-MAIN-20240224080616-20240224110616-00684.warc.gz
en
0.718843
1,211
2.609375
3
Conservation Status: Rhinoceros Iguana, IUCN Red List – Vulnerable; Ricord’s Iguana, IUCN Red List – Critically Endangered Threats to Survival: Habitat loss and fragmentation; hunting; invasive species Unraveling Iguana Ecology In 2002, our in-country and international partners began a program to protect and monitor nesting zones for rhinoceros and Ricord’s iguanas in the Dominican Republic. In 2012, our Population Sustainability team advanced this work by carrying out the first detailed studies of nesting behavior and hatchling dispersal in both species. We also conducted the first range-wide survey of rhinoceros iguanas since the 1970’s, and discovered that their numbers have declined more than previously thought. We are continuing to collect vital data that will aid in the protection and preservation of these iguana species. Gaining a better understanding of their overall distribution and status, as well as the environmental characteristics needed for successful reproduction and hatchling dispersal, is critical for informed conservation planning. Genetics Guiding Conservation Using a variety of molecular techniques, we are evaluating the population genetic structure of rhinoceros and Ricord’s iguanas throughout the Dominican Republic. This information will allow us to better understand where sources of genetic variation exist and the potential negative effects of inbreeding found in small, isolated populations. Studies in our Conservation Genetics lab will also help us determine which areas are most vital to protect in order to secure the long-term future of these species. We are using molecular techniques to evaluate the origin of captive and confiscated rhinoceros iguanas, which is critical to determining the most appropriate sites for releasing individuals back into the wild. With our partners, we are using genetic techniques to evaluate the role that natal homing may play in nest site selection by female Ricord’s iguanas. Helping through Outreach In collaboration with our partners, our Population Sustainability and Community Engagement teams have been working to document the many facilities, known locally as iguanarios, holding rhinoceros iguanas throughout the Dominican Republic. The majority of iguanarios house confiscated iguanas of unknown origin in subpar conditions. Overcrowding as a result of uncontrolled reproduction can result in animals being released at inappropriate sites. After documenting all iguanarios in the country, we held a workshop in 2014 that brought together facility managers and conservation managers to find solutions that not only improved animal care, but also helped alleviate risks to the wild population resulting from haphazard releases.
<urn:uuid:ef4936fb-28cd-4d12-8c10-765e006b24da>
CC-MAIN-2017-26
http://institute.sandiegozoo.org/species/rhinoceros-and-ricords-iguanas
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320077.32/warc/CC-MAIN-20170623170148-20170623190148-00408.warc.gz
en
0.910102
538
3.4375
3
In this book we studied 350 ancient stone monoliths with strange inscriptions that were discovered in Cross River State, Nigeria, in a local area called Ikom. These inscriptions include some glyphs that are obviously Egyptian, and others that we identified as Sumerian and many unknown scripts too. One of them looks like Dravidian Malayalam or even Tamil, a celebrated sacred language of India. The book details our preliminary attempts to connect the works of Thoth, the Egyptian god of wisdom and letters with those of Enoch, the Hebrew patriarch who was first to learn to write – on stone! Our linguistic analyses/ study of Cave Art and Rock Inscriptions from all over the African continent is the subject of The Gram Code. They Lived Before Adam is the sequel to The Gram Code. It relates the story of the first people Homo Erectus, ancestors of Homo Sapiens (otherwise called Adam), how he was genetically engineered; but mostly who was there before him in West Africa. Our books are sold on Paypal and by direct order.
<urn:uuid:026a2d1e-15c8-4de0-bb60-958fc81a8bde>
CC-MAIN-2018-34
https://catherineacholonu.wordpress.com/2011/03/20/the-gram-code-of-african-adam-reconstructing-450000-years-of-africas-lost-civilizations/
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221213666.61/warc/CC-MAIN-20180818114957-20180818134957-00478.warc.gz
en
0.970072
219
2.640625
3
Charles Rolls (1877-1910), a salesman, and Henry Royce (1863-1933), an electrical engineer, got together in 1906 to produce a car that would be sold exclusively by Rolls. They agreed the car would be called a Rolls-Royce. The first model was the Silver Ghost, which they produced until 1925. The company continued in private ownership until 1971 when financial problems in its aircraft division led to a takeover by the British government. Today Rolls-Royce is owned by the German automobile maker Bayerische Motoren Werke (BMW). Rolls-Royce is highly regarded for its engines. They powered many of the Spitfires and Hurricanes used in the Battle of Britain during World War II.
<urn:uuid:27862b56-fd7e-40cf-b493-99cfb2161967>
CC-MAIN-2016-36
http://superbeefy.com/how-did-the-rolls-royce-get-its-name-what-does-it-mean-and-where-did-the-automobile-come-from/
s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982952852.53/warc/CC-MAIN-20160823200912-00209-ip-10-153-172-175.ec2.internal.warc.gz
en
0.964474
154
2.609375
3
In normal English syntax, single-word modifiers precede the noun they modify, but phrases follow the noun. So you put the -ing word before the noun it modifies when it is acting as an adjective, not as a non-finite verb. You put the -ing word after the noun when it is part of a verbal phrase with other parts in it; you can’t have a long verbal phrase preceding the noun it modifies. Sometimes the -ing word is actually a noun: a writing desk is a desk for writing, not a desk that happens to be writing. But it is still modifying desk. Here are examples of the -ing word used as a modifier (either as adjective or a noun) preceding the modified noun: answering machine, barking mad, bleeding heart, bowling alley, burning bush, burrowing owl, carrying capacity, changing room, chattering classes, closing credits, coloring book, cooking oil, creeping thyme, dictating machine, drawing board, drilling rig, eating disorder, fighting drunk, firing squad, floating bridge, flying fish, flying buttress, flying fox, flying fuck, growing pains, heating element, holding pen, hopping mad, killing field, landing gear, laughing gas, lending library, lightning bug, magnifying glass, mailing list, missing person, moving walkway, opening night, parking meter, plunging neckline, praying mantis, quaking aspen, revolving door, rising sun, rounding error, scalding hot, shifting use, shouting match, starting line, talking point, thinking cap, trading post, On the other hand, here are pairs of examples where the first one has the -ing word first where it acts as a simple adjectival modifer, and where the second one has it acting as an actual verb: - the acting director had harsh words for us - the director acting in the company’s best interests keeps a tight ship - the binding action of this substance - the cord binding the two halves together - the bouncing ball hit me in the face - the ball bouncing down the stairs was lost forever - the calling function retains its own private variables - the woman calling for a new husband will soon enough find one - the carrying case was very heavy - the case carrying the lead was heaviest of all - the circling vultures drifted ever higher - the vultures circling above our heads would wait until we dropped - the cooking sausages smelled fabulous - the women cooking our breakfast made us wash up first - a demanding teacher is hard on the students - a teacher demanding full attendance is seldom listened to - the facing audience recoiled - the man facing the audience cheered And so on and so forth. In your case, you could have put sleeping afterwards, and had a man sleeping under the tree, but sleeping men like sleeping dogs are not particularly unusual. However, you would not normally speak of fishing men, so you would have a man (who was/is) fishing for something down by the river bank. If you strained it, you could build up a context in which fishing men might contrast with farming men or some such, but it would be abnormal. You might find a man singing in the rain, or you might find a singing man (who is out) in the rain, but you will never find a singing-in-the-rain man. Or to put it more crudely, there is a world of difference between having a fucking idiot in your livingroom and having an idiot fucking in your livingroom.
<urn:uuid:4ac7aedf-644d-451f-826a-97dcc3ed6c2d>
CC-MAIN-2015-27
http://english.stackexchange.com/questions/83675/when-can-the-ing-form-of-a-verb-be-placed-before-a-noun/83698
s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435376093097.69/warc/CC-MAIN-20150627033453-00265-ip-10-179-60-89.ec2.internal.warc.gz
en
0.931526
756
2.890625
3
A recent report by Google (.pdf) revealed a significant increase in the number of unique strains of malware designed to install rogue antimalware software. This increase has been accompanied by a rise in the number of hacked or malicious webpages that attempt to foist the malware on unsuspecting visitors. Figures from Microsoft support these findings, with their security products cleaning fake antivirus-related malware from 7.8 million computers in the second half of 2009, an increase of 46.5% from the first six months of that year. The often well-resourced and IT-savvy scammers who create fake antivirus programs use varied packers and polymorphism on each installation to evade signature-based detection. Distributors of fake antivirus pop-up scams and the like rely on misleading online advertisements to scare users into thinking their computers are infected, while offering a free download to scan for malware. This type of malicious software, often called scareware, has a high infection rate because it uses social engineering techniques to trick users into installing it, or worse still, handing over their credit card details to pay for a worthless subscription fee. Ironically, attackers have been leveraging Internet users' increased awareness of the need to keep their computers secure to distribute fake AV software and other malware programs, such as the Storm Trojan. Social engineering exploits various psychological triggers such as greed, fear or curiosity to induce or seduce people into ignoring common sense and breaking security rules. Although the social engineering methods used in these attacks are fairly simple, attackers are using more sophisticated methods to deliver their ads and defend their distribution network. For instance, the readers of the New York Times were targeted last year by scammers who initially posed as the Internet telephony provider Vonage Holdings Corp. The initial ad the hackers paid to place on the site was innocuous, but was later switched to one that warned NYTimes.com visitors that their computers may be infected with viruses. Clicking on the link then redirected visitors to a site that offered to sell antivirus software. By paying to place ads on such high-profile sites, attackers gain an air of respectability and believability. Real antivirus programs are struggling to keep up with fake antivirus malware as well. The often well-resourced and IT-savvy scammers who create fake antivirus programs use varied packers and polymorphism on each installation to evade signature-based detection. They have also dramatically increased the number of pages that try to download their malware, overwhelming the ability of legitimate antivirus programs to keep blacklists and malware-detection signatures up to date, which reduces the chances of their attack being detected. One reason why these malicious sites are increasingly difficult to blacklist is that attackers use what is called domain rotation, a technique used by attackers to drive traffic to their distribution servers by setting up a number of either dedicated or legitimate sites that they've infected, which in turn redirects browsers to another intermediary site set up to redirect traffic onto their servers. Another trick behind the success of these programs is that it often doesn't matter whether you click 'Yes,' 'No,' or 'Cancel' to close a pop-up alert, the alerts don't stop appearing. (In this situation, instruct users to kill the browser session by pressing Ctrl+Alt+Delete to launch the Windows Task Manager. Then, terminate the process for the browser -- iexplore.exe, firefox.exe -- and, when restarting, do not restore the previous browser session, if prompted by the browser.) If you think the computer may have been infected, disconnect it from the Internet and run a full-system scan using your original antivirus software. If you find that your antivirus program can't update itself, then malware may be blocking access to the update files. Sites such as Symantec.com and Microsoft.com often publish free advice on how to remove specific malware based on the symptoms the computer is experiencing. The best way to prevent fake antivirus at the enterprise level is to reinforce a security awareness training plan for employees: It's important to prepare the staff to deal with social engineering attacks of this kind. If you use scenario-based training with realistic examples of what the staff may encounter, you can build up their resistance to the psychological triggers used in social engineering attacks and make them less susceptible to being tricked into breaking security policy. Simple security posters warning against clicking on pop-ups and ads that are too good to be true can be very effective and keep users aware of the danger. Most AV programs will display a warning if a user tries to access a site that it thinks carries malicious code, and users should be made aware that they are not allowed to ignore or override these warnings; unfortunately, disallowing overrides is not something that can be set up within the antivirus system itself. For more information Read more about countermeasures against targeted attacks in the enterprise. Cut down calls to help desk with cybersecurity awareness training: Learn more. It should be made clear during user awareness training that all enterprise computers already have antivirus and antimalware software installed, and that it is the responsibility of the IT department to maintain this protection: Users do not need to take action themselves. In addition, ensuring that users are not logged in with administrative rights will prevent most from being able to install unwanted programs. Also, while it might seem that just telling users to turn off pop-ups -- as with telling them to turn on or off any security settings -- is a good idea, doing so is often fraught with difficulties. I would avoid this if at all possible. You also need to have a well-defined process for handling a security incident that an employee can begin as soon as he or she suspects something is wrong. If someone is concerned about any aspect of his or her computer's behavior, perhaps because of continuous prompts or sluggish behavior, then he or she should report it to the IT department. This process should also include a provision for proactively informing other users when a new scam is spotted, thus reinforcing the best practices you have been promoting. About the author: Michael Cobb, CISSP-ISSAP is the founder and managing director of Cobweb Applications Ltd., a consultancy that offers IT training and support in data security and analysis. He co-authored the book IIS Security and has written numerous technical articles for leading IT publications. Mike is the guest instructor for several SearchSecurity.com Security Schools and, as a SearchSecurity.com site expert, answers user questions on application security and platform security.
<urn:uuid:86be66aa-d162-4a0a-b301-25f5ed23b6d0>
CC-MAIN-2020-24
https://searchsecurity.techtarget.com/tip/Fake-antivirus-pop-up-scams-Forming-a-security-awareness-training-plan
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347398233.32/warc/CC-MAIN-20200528061845-20200528091845-00015.warc.gz
en
0.948166
1,326
2.5625
3
Semiconductors Blog Posts How to Model the Interface Trapping Effects of a MOSCAP Looking to analyze interface trapping effects in a MOSCAP? Learn how to use a feature in the Semiconductor Module that enables you to add charging and carrier capture/release effects to a model. Simulating the Tunneling Current Across a Graded Heterojunction Interested in semiconductor design? Get an intro to the theory behind quantum tunneling as well as a demonstration of simulating the tunneling current across a graded heterojunction. Self-Consistent Schrödinger-Poisson Results for a Nanowire Benchmark This benchmark model of a GaAs nanowire validates the Schrödinger-Poisson Equation multiphysics interface, which is useful for modeling systems with quantum-confined charge carriers. Evaluating a Schottky Diode with a Semiconductor Benchmark Model We present a model of a Schottky diode with benchmarked results, validating the use of simulation to analyze the performance of semiconductor devices. Studying the Program and Erase Cycle of an EEPROM Device Using the Semiconductor Module, you can study the program and erase cycles of an electrically erasable programmable read-only memory (EEPROM) device. Optimizing ISFET Designs with Multiphysics Simulation Ion-sensitive field-effect transistors (ISFETs) measure pH levels for soil analysis, the production of dairy products, and more. Multiphysics simulation can help us optimize these devices. Modeling a MOS Capacitor with the Semiconductor Module MOS capacitors (MOSCAPs) contain 3 main parts: a semiconductor body or substrate, an insulator film, and a metal electrode (or gate). You can use the Semiconductor Module to model MOSCAP designs. Learning Quantum Mechanics Concepts with Double-Barrier Structures Quantum mechanics is a notoriously difficult subject to learn — and teach. Modeling a double-barrier structure is an effective way to teach quantum mechanics concepts to physics students. - COMSOL Now - Today in Science
<urn:uuid:d73227b9-3938-4eed-b769-bc60e3e09b28>
CC-MAIN-2021-04
https://br.comsol.com/blogs/category/electrical/semiconductors/page/2/?setlang=1
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703522133.33/warc/CC-MAIN-20210120213234-20210121003234-00768.warc.gz
en
0.783713
455
2.734375
3
New advice: Peanuts in baby's diet can prevent scary allergy New parents, get ready to feed your babies peanut-containing foods—starting young lowers their chances of becoming allergic. The National Institutes of Health issued new guidelines Thursday saying most babies should regularly eat those foods starting around 6 months of age, some as early as 4 months. It's a major shift in dietary advice for a country fearful of one of the most dangerous food allergies. "We're on the cusp of hopefully being able to prevent a large number of cases of peanut allergy," said Dr. Matthew Greenhawt of the American College of Allergy, Asthma and Immunology, a member of the NIH-appointed panel that wrote the guidelines. The recommendations are based on landmark research that found early exposure is far more likely to protect babies from developing peanut allergies than to harm them. The guidelines spell out exactly how to introduce infants to age-appropriate peanut products depending on whether they're at high, moderate or low risk of becoming allergic as they grow. Babies at high risk—because they have a severe form of the skin rash eczema or egg allergies—need a check-up before any peanut exposure, and might get their first taste in the doctor's office. For other tots, most parents can start adding peanut-containing foods to the diet much like they already introduced oatmeal or mushed peas. No, babies don't get whole peanuts or a big glob of peanut butter—those are choking hazards. Instead, the guidelines include options like watered-down peanut butter or easy-to-gum peanut-flavored "puff" snacks. "It's an important step forward," said Dr. Anthony Fauci, director of NIH's National Institute of Allergy and Infectious Diseases, which appointed experts to turn the research findings into user-friendly guidelines. "When you do desensitize them from an early age, you have a very positive effect." Peanut allergy is a growing problem, affecting about 2 percent of U.S. children who must avoid the wide array of peanut-containing foods or risk severe, even life-threatening, reactions. For years, pediatricians advised avoiding peanuts until age 3 for children thought to be at risk. But the delay didn't help, and that recommendation was dropped in 2008, although parent wariness of peanuts persists. "It's old news, wrong old news, to wait," said Dr. Scott Sicherer, who represented the American Academy of Pediatrics on the guidelines panel. The guidelines, published Thursday in several medical journals, make that clear, urging parents and doctors to proactively introduce peanut-based foods early. "Just because your uncle, aunt and sibling have an allergy, that's even more reason to give your baby the food now," even if they're already older than 6 months, added Sicherer, a pediatric allergist at Mount Sinai Hospital in New York. In Columbus, Ohio, one doctor told Carrie Stevenson to avoid peanuts after her daughter was diagnosed with egg allergy. Then Stevenson found an allergy specialist who insisted that was the wrong advice—and offered baby Estelle a taste test of peanut butter in his office when she was 7 months old. "I was really nervous," Stevenson recalled, unsure which doctor to believe. But "we didn't want her to have any more allergies." Now 18 months old, Estelle has eaten peanut butter or peanut-flavored puffs at least three times a week since then and so far seems healthy. Stevenson, pregnant again, plans early exposure for her next child, too. The guidelines recommend: —All babies should try other solid foods before peanut-containing ones, to be sure they're developmentally ready. —High-risk babies should have peanut-containing foods introduced at age 4 to 6 months after a check-up to tell if they should have the first taste in the doctor's office, or if it's OK to try at home with a parent watching for any reactions. —Moderate-risk babies have milder eczema, typically treated with over-the-counter creams. They should start peanut-based foods around 6 months, at home. —Most babies are low-risk, and parents can introduce peanut-based foods along with other solids, usually around 6 months. —Building tolerance requires making peanut-based foods part of the regular diet, about three times a week. What's the evidence? First, researchers noticed a tenfold higher rate of peanut allergy among Jewish children in Britain, who aren't fed peanut products during infancy, compared to those in Israel where peanut-based foods are common starting around age 7 months. Then in 2015, an NIH-funded study of 600 babies put that theory to the test, assigning them either to avoid or regularly eat age-appropriate peanut products. By age 5, only 2 percent of peanut eaters—and 11 percent of those at highest risk—had become allergic. Among peanut avoiders, 14 percent had become allergic, and 35 percent of those at highest risk. What if an older sibling or someone else in the home already is allergic to peanuts? The new baby needs a chance at prevention so talk to your doctor about how to do so while keeping the allergic family member safe, with extra care in washing hands and keeping food separate, said Greenhawt, an allergy specialist at Children's Hospital Colorado. Whether the dietary change really will cut U.S. peanut allergies depends on how many parents heed the new advice, and the guidelines urge doctors to follow up, even offer lower-risk tots an in-office taste, to reassure them. "We would encourage everybody to get on board with this," Greenhawt said. © 2017 The Associated Press. All rights reserved.
<urn:uuid:e00daffc-de47-44d8-ab9a-f37d50cb86f4>
CC-MAIN-2019-47
https://medicalxpress.com/news/2017-01-advice-peanuts-baby-diet-scary.html
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496670729.90/warc/CC-MAIN-20191121023525-20191121051525-00004.warc.gz
en
0.960254
1,187
3
3
A spectacular fall of migrants occurred in the drizzly conditions during the night, and small numbers also continued to arrive in the day. A total of 1000 Wilow Warblers (the highest count for at least two years) were scattered all over the island, with other warblers seen including: ten Grasshopper Warblers, 68 Sedge Warblers, four Whitethroats and four Chiffchaffs. The first Pied Flycatcher of the autumn was in the gorse on the south end, and three Spotted Flycatchers were also seen. FourSwifts passed through with four Sand Martins, and a Collared Dove was in the Ty Nesaf pines. Two Common Sandpipers were along the coast, a Whimbrel was seen at the north end, and the usual gathering of waders at high tide amounted to: 31 Turnstoes, a Dunlin and 23 Redshanks. TwoSandwich Terns were seen at sea, and 13 Common Scoters also passed by. A Buzzard drifted over the mountain in the late afternoon, and a Little Owl was seen by Carreg Bach. Willow Warblers were all over the island today Grasshopper Warbler (upper) and Sedge Warbler (lower) Buzzard and Raven A Knot Grass (upper) in the Ty Pellaf Withy trap was first for the year, whereas a Broad-bordered Yellow Underwing (lower) was the first record for the island.
<urn:uuid:59dfcb38-57fd-45b8-bdf2-a1e453cdeb6f>
CC-MAIN-2017-43
http://webirdnorthwales.blogspot.com/2011/08/autumn-is-off-to-flyer-on-bardsey.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824675.67/warc/CC-MAIN-20171021081004-20171021101004-00663.warc.gz
en
0.979944
308
2.609375
3
Linguist Ferdinand de Saussure famously stated that language is composed of hidden rules that we use but don’t articulate. This is structuralism. The statement also defines how video games are both made and played. Whatever code is used in a game has those rules that define usage. This vocabulary, grammar, and syntax yields complex behavior, making a video game an emergent artifact. Complexity scientist John Holland helped define complexity as its own discipline, and the lessons learned from his work can help further define the creation of video games, and of the immaterial environments contained within game media. Games are both physically and adaptively complex. Holland defines these to branches of complexity as geometric arrays of elements/parts (physically complex), and as agents that learn/adapt in response to interactions with other agents-entanglements and feedback loops (adaptively complex). The games are performance-artifacts that are interacted with by players in real-time. The performance utilizes signals to determine how to distribute action in-game and to explore possibilities for future adaptation. These code-loops generate a kind of community of rules in the system of the game, creating a hierarchy of what came before, leading to what is happening now in a game, followed by what could happen next. These code routines are communities within the network. As the player interacts with the game, various routines are set in motion to react, and to predict. Holland called this mechanism for generating non-linear interaction between complex adaptive systems/agents “co-evolution” as the game adapts to what is happening in real-time to preserve and promote its goal(s), something done more efficiently in parallel, than in a linear way. Signal-processing lies at the heart of all complex systems. Recombination of tags yields new routings and procedures. These new recombinations, routings, and procedures make for good AI and for either a rewarding or frustrating gameplay experience. The game is not just in the lines of code; it gains dimensionality through how and when that code is executed with other routines during play. Complexity depends on time: when is as important as where things happen in a game. Holland calls this a “time-step”, which corresponds to a specified time in the world, and the model’s laws transform its state so that the resulting state matches the detector readings after the specified time has elapsed in the world. To simplify, we don’t die before getting shot in Halo by members of the Covenant. Master Chief enters a room, is noticed by the enemy who then draws a bead and fires, hitting an unprepared player. The code dictates how fast the enemy’s projectile travels in a given environment, calculates the location of the player, direction and speed of travel, and then executes the shot. If the player is quick enough, Master Chief can step out of harm’s way. The complexity lies in how the action of the shot is executed, and is dependent on the player’s (in)action. As the shot is taken, other enemies in the room are alerted to the noise, the presence of the player, and begin to act according to their coded subroutines, always a little differently based on how a player chooses to move, hide, or return fire. The game and player create an event, which leads to other events as the narrative unfolds, driven by these smaller elements. A simple gunshot can end a player’s campaign, or can inspire a counter-attack utilizing time and geometry to deadly effect. In a sufficiently complex game like Halo, the system can already display sufficiently emergent behavior. The gameplay is an artifact of the complexity of code that is itself the artifact of human and/or machine creation. Within the context of digital games, the archaeologist must deal with action-as-artifact, a physical, kinetic manifestation of static code. An event becomes a thing. A verb becomes a noun. —Andrew Reinhard, Archaeogaming
<urn:uuid:dcfcbf37-e363-4b4d-a7aa-a392ee431730>
CC-MAIN-2019-35
https://archaeogaming.com/2017/09/25/video-games-as-complexity-created-artifacts/
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027314638.49/warc/CC-MAIN-20190819011034-20190819033034-00558.warc.gz
en
0.95173
818
3.046875
3
Ethics and Community Shiites are part of the same community as Sunnis, but the relationship remains controversial. Important institutions within the Shiite community include the scholars, guilds, and, in the modern world, political parties and militias. While Shiite religious scholars were quietists for centuries, they have become increasingly prominent on the political scene. Principles of Moral Thought and Action Shiites find guidance in the Quran, in law, and in the sacred narratives around the family of the prophet and the Imams. The branches within Shiism have held different views regarding the need for political action in different historical epochs. Vision for Society While all Shiites tend to consider current conditions as unjust and expect the restoration of justice from the Mahdi, they differ regarding their own duty and possibilities to improve the here and now. Gender and Sexuality The protagonists of Shiite sacred narratives are often used to promote ideals of gender behavior. These differ according to historical period and geographical region. Shiite law differs from Sunni law by allowing temporary marriage for the sake of pleasure.
<urn:uuid:5258a7c7-9188-4b04-82fd-e328fc062015>
CC-MAIN-2014-42
http://www.patheos.com/Library/Shia-Islam/Ethics-Morality-Community
s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1413507450767.7/warc/CC-MAIN-20141017005730-00358-ip-10-16-133-185.ec2.internal.warc.gz
en
0.947762
218
3.375
3
PHP is a programming language used primarily for server-side website development. Developers, who are knowledgeable in PHP code, can directly embed it into HTML. This can be useful for graphics, images or fundamental web content. PHP is free software that was released under the PHP license. Beginning with the original release in 1995, there have been various versions. PHP 7 is the current language programmers’ use. PHP is a frequently used programming language, so it’s beneficial knowledge for anyone working with web content or website development. Here are 7 of the best websites to learn PHP language from scratch. 1. PHP – Codecademy Codecademy is not your normal educational experience. They are dedicated to simplifying the learning experience for a new generation of online learners. There are a number of programming and computer language courses available, including this alternative to learn PHP language. - PHP by the Code Academy follows an 11-segment course outline to learn PHP language. - This course explains loops, functions, and object-oriented programming for PHP. You will begin with PHP basics and then tie these different concepts to a finished project. - Estimated time for this PHP course is approximately 4-hours, and only requires a technical level of beginner. 2. PHP 101: PHP for the Absolute Beginner As the course title indicates, this online alternative to learn PHP language starts with the basics. It is another free course offered on the Zend Developer Zone website. Zend provides a number of free tutorial type alternatives to learn various programming languages. - This a 15-part course to learn PHP language that begins with variables and operators, ending with hands-on creation of RSS news feeds. - You will get direct experience with error handling and basic security using PHP. - All students who register for PHP 101: PHP for the Absolute Beginner will have access to the informative Zend community platform to discuss problems and generate innovative ideas. 3. PHPBuddy.com – Tutorials, Script Instruction & Articles This is a tremendously diverse website to learn PHP language. PHP Buddy uses a very basic website format, stressing the amount of available information over appearance. All the material on PHPBuddy.com is free. - There are individual PHP discussion sessions to share problems, or generate new ideas. There are engaging articles from industry experts available on PHPBuddy.com. - Everything is free with an account. All that is required is your name and email address for full access. - There are five quick start tutorials and two individual blocks to help learn how to work with PHP and MySQL. 4. Beginner PHP and MySQL Tutorial from Udemy You can pursue your ambition to learn PHP language, or other IT and Software courses, through a number of dedicated courses on Udemy. However, this is an excellent beginner course to get you started. It presents all the basic information to lay a good foundation to move on to more difficult studies. - The Udemy Beginner PHP and MySQL Tutorial starts with instruction on how to download and install PHP. - You will have full, lifetime access to the 10 hours of video. There is a certificate of completion available. - You will finish with a block of instructional videos to teach you how to plan and apply PHP and MySQL to real-world projects. 5. Try PHP – Code School Similar to the programming curriculum of Codecademy, the Code School website has a number of free courses. The first level of this course is free, and the remaining levels are available with a paid account. The best program is a $29 per month, all-inclusive monthly plan. - Estimated time to fully complete Try PHP is four to five weeks. - The course has six instructional videos and 21 interactive challenges spread across the four sections. - Try PHP lays out a solid foundation of basics. Afterwards, it progresses into more intricate aspects of PHP arrays, operations, and loops. 6. HTML.net PHP Tutorial This is one of the most extensive lists of topics from the best websites to learn PHP language. One very appealing feature of HTML.net is the ability to go back and forth between other computer language tutorials. - HTML.net PHP Tutorial doesn’t try to sell you additional, unnecessary stuff. You get a no-frills, organized website with a list of 22 lessons dedicated to helping you learn PHP language. - The tutorials are also available in 11 different spoken languages. This input provides an interesting benefit to anyone aspiring to learn computer skills in multiple tongues. 7. PHP Free Tutorial from Webucator The Webucator website offers one of the most extensive sets of programming and developer courses. This is a free tutorial to learn PHP language. While this will provide you with a solid foundation of PHP knowledge, they offer more comprehensive alternatives starting at $199. - The Webucator PHP Free Tutorial follows a 12-lesson structure. - Each lesson block has a PHP scripting exercise to practice your skills. - This is a self-paced tutorial where you can set up the class structure to meet your schedule. You can also download all the class files for convenient access. PHP is a free code that is widely used on websites and across other areas. It is an important tool for Internet workers and website developers. If you aspire to pursue a career as a developer, understanding the PHP language is imperative. You can take more costly courses to learn PHP language. Nonetheless,this selection contains free websites only that provide a wealth of PHP knowledge. Begin with any of these alternatives and move on to them in progression. They won’t cost you any money, but you’ll build a strong understanding of PHP.
<urn:uuid:f9c09f62-3c65-4963-8431-86ba7a486b85>
CC-MAIN-2020-29
https://webcourseworld.com/websites-to-learn-php-language/
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655890566.2/warc/CC-MAIN-20200706222442-20200707012442-00347.warc.gz
en
0.890474
1,171
2.625
3
Market forces alone are not sufficient to produce new drugs needed for children with cancer, according to a new report by the Institute of Medicine (IOM). Faced with "a near absence of research in pediatric cancer drug discovery," the IOM report recommends forming new public-private partnerships among government, industry, researchers, advocacy groups and other parties to lead research and development. The report, "Making Better Drugs for Children with Cancer," analyzes childhood cancer treatment in the light of historic advances. "Over the past 40 years, researchers and clinicians have achieved long-term survival for most children and adolescents with cancer," said pediatric oncologist Peter C. Adamson, M.D., chief of the Division of Clinical Pharmacology and Therapeutics at The Children's Hospital of Philadelphia, and an editor of the report. "However, our therapies are not curative for 30 percent of children, and for children who are cured, the short-term and long-term side effects of current treatments are often too high." Dr. Adamson is a member of the IOM's Committee on Shortening the Time Line for New Cancer Treatments, which issued the report on April 18. As Chair of the Developmental Therapeutics program of the Children's Oncology Group, a nationwide consortium of pediatric oncology centers, Dr. Adamson took a leadership role in drafting the report. The Institute of Medicine is part of the National Academy of Sciences, a private, nonprofit organization of scholars chartered by the U.S. Congress. The absolute number of U.S. children with cancer is relatively small (about 12,000 cases diagnosed annually, compared to 200,000 new cases of breast cancer alone), and pharmaceutical companies do not consider it profitable to invest in research and development for pediatric cancer drugs. Oncologists have used many existing adult cancer drugs to treat children, but many of those drugs have toxic side effects. On the other hand, say the authors, some new drugs being developed for adult cancers may still prove useful for children with less common cancers. "The major childhood cancers are often distinct from adult cancers at the level of molecular abnormalities, and more focused research and development might allow us to better target those abnormalities," said Dr. Adamson. "More targeted drugs might not only allow us to better attack the most difficult childhood cancers, but also cause fewer toxic side effects, by sparing healthy cells." The IOM report says that select components of a pediatric drug pipeline already exist in academic medical centers, industry, universities, and in federal centers such as the National Cancer Institute. Those resources include repositories of synthetic and natural products, services to screen compounds for anticancer activity, drug discovery databases, and programs to support drug assays and clinical trials. "What is needed is a comprehensive mechanism to put all these pieces together into a pediatric drug pipeline," says Dr. Adamson, emphasizing one of the major recommendations of the IOM report. The IOM proposes a partnership among government, industry and academia to produce new pediatric anticancer drugs. It suggests that in cases where companies do not proceed to full development of promising pediatric drugs, the federally sponsored National Cancer Institute should assume responsibility as the developer of last resort. As one model of a public-private partnership focused on a health condition, the IOM report describes the Therapeutics Development Program established by the Cystic Fibrosis Foundation to support the research and development of new drugs for cystic fibrosis. That program, begun in 1997, has forged agreements with government and industry to form a "virtual" research and development pipeline. In addition to proposing a coordinated pediatric oncology drug pipeline, the IOM proposes to speed up the drug development process by setting priorities to determine which pediatric drugs should be tested among the limited pool of children with cancer. It also recommends initiating pediatric trials earlier than they typically begin. About the Oncology Program at The Children's Hospital of Philadelphia: The Children's Hospital of Philadelphia cares for more children with cancer than any other general pediatric hospital in the United States. Its extensive basic and clinical research programs have been recognized recently by Child Magazine, which ranked Children's Hospital first in the nation in pediatric oncology. The Children's Hospital of Philadelphia was founded in 1855 as the nation's first pediatric hospital. Through its long-standing commitment to providing exceptional patient care, training new generations of pediatric healthcare professionals and pioneering major research initiatives, Children's Hospital has fostered many discoveries that have benefited children worldwide. Its pediatric research program is among the largest in the country, ranking second in National Institutes of Health funding. In addition, its unique family-centered care and public service programs have brought the 430-bed hospital recognition as a leading advocate for children and adolescents. For more information, visit www.chop.edu. Cite This Page:
<urn:uuid:3c62081f-2397-42fa-824d-cef1a7c867fe>
CC-MAIN-2016-07
http://www.sciencedaily.com/releases/2005/05/050523235011.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701152959.66/warc/CC-MAIN-20160205193912-00313-ip-10-236-182-209.ec2.internal.warc.gz
en
0.952073
980
2.59375
3
Since the turn of the twentieth century, the earth's temperature has risen dramatically. The introduction of technology has accelerated the use of fossil fuels with carbon emission increasing in tandem. The emission acts as a greenhouse gas in the atmosphere, causing the earth's temperature to rise. This phenomenonm 'Global Warming', causes changes in climate and landscapes, and ecological as well as behavioural abnormalities, not to mention mood swings of the majority of the human race. Our key challenge today is to reduce carbon emission. The biggest culprit is the combustion of petrol fuel in vehicles and electric generators. To mitigate the effects of carbon emission, we need to look for alternative energy sources which are sustainable and environment-friendly. Gading Kencana with its experiencce and multi-disciplinary skills, is able to offer a host of green energy solutions from renewable sources of energy, sustainable lighting to energy efficiency consultations and energy audits Solar street lights are LED bulbls powered by batteries charged during the day by photovoltaic cells. They switch on automatically by sensing outdoor light. As stand-alone systems, solar street lights do not need to connect to utility grid, eliminating the need for the messy wires and maintenance. Gadin Kencana solar street lights have been developed to deliver quality, reliability and luminance that is unequalled to give your organization substantial savings.Why Solar Street Lighting? The Light Emitting Diode (LED) is a semi-conductor PN junction diode that produces light as electrons flow through the junction. LEDs have been around for years and have been used as light indicators for computers, radios, cars, monitors and other electronic devices. However, they were never very bright and usually came in standard red, green or yellow colours. Today, LED replacement bulbs are very bright and come in brilliant white and a host of colour hues. Super bright red, yellow and green LEDs for Traffic signal lights have replaced the filament type 100 watt traffic light bulbs and this translates into savings in electricity consumption and manpower needed to replace traffic light bulbs for city municipalities. Even the filament type Flashlight bulb is being replaced with high light output, low current drain Light Emitting Diodes. In recent times, super bright LEDs are phasing out filament bulbs in Automotive and Truck lightings and soon Home lighting as well. Gading Kencana is able to offer a multitude of LED solutions for commercial and home use. Comparison of LED and Fluorescent Bulbs: Light Emitting Diode With sunlight all year round in Malaysia, generating energy from the sun makes good sense. Using Photovoltaic (PV) cells. solar energy is converted to clean green energy with no CO2 emission. The PV systems can be applied in isolated locations away from the national grid (off-grid) or connected to the national grid (on-grid). Gading Kencana has both the expertise and experience to handle off- and on-grid, and from the small-scale kWh to the large-scale MWh systems. The three main types of Solar PV systems offered by Gading Kencana are: Stand-alone, Hybrid and Building Integrated. For more information, click HERE Energy inputs (both electrical and fuel) are essential parts of any manufacturing process. The expenditure on these inputs often accounts for a significant share of the manufacturing costs. As such, any savings on electrical and fuel costs adds directly to the profits of the company and these probably require less effort to impact profits than other measures such as reducing labour costs, increasing sales or lowering distribution costs. The main purpose of an energy audit is to systematically identify, using calibrated measuring instruments, the level of energy consumption and to investigate practical and feasible opportunities for saving all forms of energy costs. Experience show that as much as 10-15% of energy costs could be saved without any need for large investment on energy reducing measures. Instruments used in Energy audits Energy Audit Works Types of energy audits available: The audit team will: Energy Management consulting includes Energy efficiency (EE) which offers very effective ways to lower carbon emission by reducing power consumption. It is every bit as renewable as wind power, solar photovoltaic and solar base load. Power consumption can be reduced via zero-cost, low-cost or high-cost measures resulting in 20%, 30% and 30% increases in energy efficiency respectively. Some common reasons to conduct energy management studies: We also provide Blue Print Development, Policy Study, and Implementation Strategy. Supported by relevant certification from various renowned authorities, Gading Kencana is well qualified to handle all types of electrical works from low voltage individual units to high voltage substations. You can rest assured of high quality and reliable installation. Some of the electrical works include: 1. Electrical cabling and equipment installation works. 2. Maintenance works. Maintenance of TNB Substation Laying of underground cable Cabling works for building Our expertise covers the design and installation of electro-acoustic systems. We have manufacturing facilities to design and produce audio systems which have assisted us to produce large quantities of speakers for our fast track projects.Products: PA Systems for Mosques and Convention Centres Audio System R&D Dept Audio System Assembly Line AV System as Teaching Aid
<urn:uuid:503b352f-b7af-46a0-bb2c-579ce0de6590>
CC-MAIN-2017-39
http://gadingkencana.com.my/product-services/
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818686034.31/warc/CC-MAIN-20170919202211-20170919222211-00015.warc.gz
en
0.929573
1,078
3.25
3
Read an Excerpt A DICTIONARY OF SYMBOLS By J.E. CIRLOT, JACK SAGE Dover Publications, Inc.Copyright © 2002 Dover Publications, Inc. All rights reserved. Abandonment The symbolism of abandonment has a similar range of reference to that of the 'lost object', and they are both parallel to the symbolism of death and resurrection (31). To feel abandoned is, essentially, to feel forsaken by the 'god within us', that is, to lose sight of the eternal light in the human spirit. This imparts to the individual's existence a sense of estrangement-to which the labyrinth theme is also related. Ablution To quote Oswald Wirth: 'In alchemy, the subject, having undergone nigredo (blackness) followed by death and putrefaction, is subjected to ablution, an operation which makes use of the slow dripping of condensation from the vapours that rise from the carcass when a moderate flame applied externally is alternately raised and lowered in intensity. These continual drops serve to bring about the progressive washing of the material, which changes from black to grey and then gradually to white. The whiteness is an indication of the success of the first part of the Magnum Opus. The adept worker achieves this only by purifying his soul of all that commonly agitates it' (59). Washing, then, symbolizes the purification not so much of objective and external evil as of subjective and inner evils, which we might call 'private'. It is hardly necessary to add that the latter kind of purification is much more difficult and painful than the former, since what it sets out to destroy is something which is bonded to existence itself with all its vital urges. The principle involved in this alchemic process is that implied in the maxim 'Deny thyself ...', and an indispensable precept for true moral progress. Abnormality In primitive cultures, maimed beings, as well as madmen, were believed to possess supernatural powers-the shamans, for example. In primitive magico-religious thinking, the outstanding ability of physically abnormal individuals is not regarded, as it is in modern psychology, as having been developed in compensation for the abnormality, but rather the other way round: the maiming, the abnormality, the tragic destiny were the price the individual had to pay for some inborn extraordinary gift-often the gift of prophecy. This belief was universal (9). In some mythologies, maimed beings are connected with the moon and its phases; there are mythic lunar beings, with only one hand or one foot, who have the magic power to cure disease, bring rain, and so on (17). This conception of abnormality is not restricted to animate beings, but applies equally to objects. According to Cola Alberich, abnormal objects have always been considered as particularly useful in warding off malignant influences. Such objects are: stones with embedded fossils; amulets shaped like a six-fingered or a four-fingered hand; double almonds in one shell; unusually shaped grains of corn, etc. (12). There is an interesting parallel to be drawn between the spontaneous interest evinced by Primitive Man in strange or abnormal objects, and the more deliberate, 'poetic' treatment bestowed by surrealists upon such objects as elements in the symbolic process. The belief in the magic powers of abnormal objects is connected with the symbolism of the jester (that is, the inverted king, the sacrificial victim) and with the symbolism of the moon. Abracadabra Many words and phrases relating to rituals, talismans and pentacles have a symbolic meaning, either in themselves or in the way they are used, which is expressed either phonetically or, more frequently, graphically. This word was in frequent use during the Middle Ages as a magic formula. It is derived from the Hebrew phrase abreq ad hâbra, meaning 'hurl your thunderbolt even unto death'. It was usually inscribed inside an inverted triangle, or was set out so that it formed a triangle (39) thus: This magic word has also been related to the Abracax (Abraxas, Abrasax) of the Gnostics. It is in reality one of the names of the sun-god, Mithras (4). Abyss The abyss in any form has a fascinating dual significance. On the one hand, it is a symbol of depth in general; on the other, a symbol of inferiority. The attraction of the abyss lies in the fact that these two aspects are inextricably linked together. Most ancient or primitive peoples have at one time or another identified certain breaks in the earth's surface or marine depths with the abyss. Among the Celts and other peoples, the abyss was inside mountains; in Ireland, Japan and the South Sea islands, it was at the bottom of seas and lakes; among Mediterranean peoples it was just beyond the horizon; for the Australian aborigines, the Milky Way is the abyss par excellence. The abyss is usually identified with the 'land of the dead', the underworld, and is hence, though not always, associated with the Great Mother and earth-god cults (35). The association between the nether world and the bottom of seas or lakes explains many aspects of legends in which palaces or beings emerge from an abyss of water. After King Arthur's death, his sword, thrown into the lake by his command, is caught as it falls and, before being drawn down to the bottom, flourished by a hand which emerges from the waters. Acacia This shrub, which bears white or pink blooms, was considered sacred by the Egyptians, partly, no doubt, because of its dual coloration and also because of the great mystic importance of the white-red principle (8). In Hermetic doctrine, according to Gérard de Nerval in his Voyage en Orient (9), it symbolizes the testament of Hiram which teaches that 'one must know how to die in order to live again in eternity'. It occurs with this particular symbolic meaning (that is, the soul and immortality) in Christian art, especially the Romanesque (20). Acanthus The acanthus leaf, a very common ornamental motif in architecture, was, during the Middle Ages, invested with a definite symbolism derived from its two essential characteristics: its growth, and its thorns. The latter is a symbol of solicitude about lowly things. According to Bishop Melito of Sardis, they signify the awareness and the pain of sin. We may mention here that in the Diary of Weininger, there is no difference between guilt and punishment. A more generalized symbolism, alluding perhaps to natural life itself, with its tendency towards regression or at least towards stunting, appears in the Gospels in the parable of the sower (Luke viii, 7), where we read that some of the seed (of spiritual principles and of salvation) fell amongst thorns and was choked. And in the Old Testament (Genesis iii, 18) the Lord tells man that the earth will yield to him thorns and thistles (46). Acrobat Because of his acrobatics, which often involve reversing the normal position of the human body by standing on his hands, the acrobat is a living symbol of inversion or reversal, that is to say, of that need which always arises in time of crisis (personal, social or collective historical crises) to upset and reverse the established order: idealism turns into materialism; meekness into aggressiveness; serenity into tragedy; order into disorder, or vice versa. Acrobats are related to other aspects of the circus and, in particular, to the mystery of the Hanged Man in the Tarot pack, which has a similar significance. Activity In the mystic sense, there is no activity other than spiritual movement towards evolution and salvation ; any other form of activity is merely agitation and not true activity. On this point, the West is in full accord with the East, for, according to the doctrine of Yoga, the highest state (sattva) characterized by outward calm, is that of greatest activity (the activé subjugation of the lower impulses and their subsequent sublimation). Thus, it is not surprising that Cesare Ripa, in his Iconologia, through a process of assimilation with the exalted images of the Archangel St. Michael and of St. George, represents Virtuous Action' as a warrior armed in a gilt cuirass, holding a book in one hand and in the other a lance poised ready to be thrust into the head of a huge serpent which he has just vanquished. The head of Vice, crushed under his left foot, completes the allegory. Hence, every struggle or victory on the material plane has its counterpart in the realm of the spirit. Thus, according to Islamic tradition, the 'Holy War' (the struggle against the infidel, depicted with weapons held at the ready) is simply an image of the 'Great Holy War' (the struggle of the faithful against the Powers of Evil). Adam Primordial Man. The name is derived from the Hebrew adama (= earth). G. G. Scholem, in On the Kabbalah and its Symbolism (London, 1965), states that, initially, Adam is conceived as 'a vast representation of the power of the universe', which is concentrated in him. Hence the equation macrocosm = microcosm. In both the Bible and the platonic doctrine of the androgyne, Eve appears as an excision of the first being, which integrated sexual duality. Do the tree and the serpent reproduce the same duality on another symbolic plane? Or do they express a different duality to that contained in the first human couple, which is the symbol of the internal and external excision of the living being ? Eve, in the rôle of persuader, appears as a mediator between the serpent (the source of evil, which William Blake likened to energy) and man, who would have been free and indifferent, and who would have 'fallen' only under pressure. Aerolite A symbol of spiritual life which has descended upon earth. A symbol of revelation ; of the 'other world' made accessible; and of the heavenly fire in its creative aspect, i.e. as seed. Tradition has it that, just as there are 'upper waters', there is also 'upper fire'. The stars symbolize the unattainable aspect of this fire; aerolites and meteorites are its messengers, and hence they are sometimes associated with angels and other heavenly hierarchies (37). It must be remembered that the iron first used by man was meteoric (which may account for the common root of the word sidereal and other words beginning with the prefix sidero-). The belief in a symbiotic relationship between the heavenly and the terrestrial worlds lies at the root of the idea of the 'cosmic marriage', a concept with which primitive astrobiological thought sought to explain the analogy, as well as the tangential relationship, between the antithetical worlds of heaven and earth. Ages, The For the purposes of the morphology of symbols, an age is exactly the same as a phase. The lunar 'model' of the four phases (of waxing, fullness, waning and disappearance) has sometimes been reduced to two or three phases, and sometimes increased to five. The phases in the span of human life have undergone similar fluctuations, but in general they are four, with death either omitted or combined with the final phase of old age. The division into four parts quite apart from the importance of its relationship with the four phases of the moon-coincides with the solar process and the annual cycle of the seasons as well as with the spatial arrangement of the four points of the compass on the conceptual plane. The cosmic ages have been applied to the era of human existence, and also to the life of a race or an empire. In Hindu tradition, the Manvantara, also called Mahâ-Yuga (or the Great Cycle), comprises four yuga or secondary periods, which were said to be the same as the four ages in Greco-Roman antiquity. In India, these same ages are called after four throws in the game of dice : krita, tretâ, dvâpara and kali. In classical times, the ages are associated with the symbolism of metals, giving the 'golden age', 'silver age', 'bronze age' and 'iron age'. The same symbolic pattern-which in itself is an interpretation is found in the famous dream of Nebuchadnezzar (Daniel ii) as well as in the figure of the 'Old Man of Crete' in Dante's Commedia (Inferno, XIV, 11. 94-120) (60, 27). Progress from the purest metal to the most malleable—from gold to iron—implies involution. For this reason René Guénon comments that the successive ages, as they 'moved away from the Beginning', have brought about a gradual materialization (28). And for this reason, too, William Blake observed that 'Progress is the punishment of God. So that progress in life—in an individual's existence—is tantamount to gradual surrender of the golden values of childhood, up to the point in which the process of growing old is terminated by death. The myths concerning the 'Golden Age' find their origin, according to Jung, in an analogy with childhood—that period when nature heaps gifts upon the child without any effort on his part, for he gets all he wants. But in addition, and in a deeper sense, the Golden Age stands for life in unconsciousness, for unawareness of death and of all the problems of existence, for the 'Centre' which precedes time, or which, within the limitations of existence, seems to bear the closest resemblance to paradise. Ignorance of the world of existence creates a kind of golden haze, but with the growing understanding of concepts of duty, the father-principle and rational thinking, the world can again be apprehended (31). The aims of surrealism are nothing short of reintegrating, as far as is practicable, this state of emotional irrationality characteristic of primigenial peoples. Agriculture Its allegorical representation is the figure of a goddess, like Ceres in appearance (with whom it may be identified), but with a plough and a plant bearing its first blossom. Sometimes, the allegorical figure carries a cornucopia full of fruits and flowers, or has both hands leaning on a spade or a hoe. The Zodiac is also included, to indicate the importance of the yearly cycle and the sequence of the seasons and the work that each season implies (8). Air Of the four Elements, air and fire are regarded as active and male; water and earth as passive and female. In some elemental cosmogonies, fire is given pride of place and considered the origin of all things, but the more general belief is that air is the primary element. Compression or concentration of air creates heat or fire, from which all forms of life are then derived. Air is essentially related to three sets of ideas: the creative breath of life, and, hence, speech; the stormy wind, connected in many mythologies with the idea of creation; and, finally, space as a medium for movement and for the emergence of life-processes. Light, flight, lightness, as well as scent and smell, are all related to the general symbolism of air (3). Gaston Bachelard says that for one of its eminent worshippers, Nietzsche, air was a kind of higher, subtler matter, the very stuff of human freedom. And he adds that the distinguishing characteristic of aerial nature is that it is based on the dynamics of dematerialization. Thoughts, feelings and memories concerning heat and cold, dryness and humidity and, in general, all aspects of climate and atmosphere, are also closely related to the concept of air. According to Nietzsche, air should be cold and aggressive like the air of mountain tops. Bachelard relates scent to memory, and by way of example points to Shelley's characteristic lingering over reminiscences of smell. Excerpted from A DICTIONARY OF SYMBOLS by J.E. CIRLOT, JACK SAGE. Copyright © 2002 Dover Publications, Inc.. Excerpted by permission of Dover Publications, Inc.. All rights reserved. No part of this excerpt may be reproduced or reprinted without permission in writing from the publisher. Excerpts are provided by Dial-A-Book Inc. solely for the personal use of visitors to this web site.
<urn:uuid:a777c5a6-197c-413c-956b-50a444e42815>
CC-MAIN-2015-35
http://www.barnesandnoble.com/w/dictionary-of-symbols-j-c-cirlot/1101596263?ean=9780203133750
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644064869.18/warc/CC-MAIN-20150827025424-00019-ip-10-171-96-226.ec2.internal.warc.gz
en
0.95336
3,470
2.515625
3
The other day I watched a ninety minute video of a speech by Dr. Lera Boroditsky, of Stanford University, about her work on comparing and contrasting languages across cultures and drawing conclusions on how language affects the way we think. Astute readers may recall my interest in this topic, and specifically in Boroditsky’s work on the subject, from my In Spanish, It’s Not Your Fault post. Today, I just want to point out a few points from her talk that resonated with me and then direct you towards the video itself. She does go into detail about Spanish vs. English and culpability. She uses the academic terms agentive or non-agentive. In fact, English is fairly rare in its insistence of attributing actions to an agent. In an experiment, native English and Spanish speakers were shown a video of a man intentionally performing an action (e.g. popping a balloon) and then another one of a man unintentionally causing an action. Then, they were asked to pick the man out of a lineup. The anglophones did well identifying the man in both scenarios, but the hispanophones had much more trouble identifying the man when the action happened unintentionally, since they hadn’t needed to focus on him as the subject of the sentence when they thought about the video. Not only that, but the researchers were able to induce this effect in native English speakers by making them read lots of passive voice, non-agentive sentences before watching the videos. Fascinating! How odd is it that so many human languages would evolve to consider various inanimate objects as inherently masculine or feminine? Not that odd, apparently, as some languages have up to 30 genders, at which point it becomes clear that genders are really just classifications of concepts. Some languages have a gender just for hunting weapons or things that are shiny. And then there’s the famously humorous Australian Aboriginal gender for “women, fire, and dangerous things”. The gender of objects in the languages we speak directly influences how we think about an object. In Russian, a chair is masculine, so Russians – even if they are tested in English! – will describe a chair as sturdy and strong, whereas a Spaniard, who has a feminine concept of a chair, will describe it as elegant and slender and beautiful. What surprised me most about the gender section of her talk was my emotive reaction to learning how, for many words, Russian has some opposite genders to Spanish. It really feels inherently wrong to me that, in Russian, chairs, flowers, and the moon are all masculine, and the sun is feminine. How revolting! My emotions on this subject are direct evidence of just how much learning a second language directly influences how you think about the world. During the Q&A session after the talk, one of the people facilitating the questions is Stewart Brand, who is clearly a very intelligent man, but who came across to me as a glaringly ignorant monolingual. He says – and I’m paraphrasing – “Here in California, we hear a lot of Spanish, and it seems to me that Spanish is a very simple language, with each thing having one word associated with it, whereas English has a rich tapestry of words for each concept. If I ever got Alzheimer’s,” he quips, “I’d rather have it in English than in Spanish, because there would be more words to convey what he meant even if he couldn’t think of the word I wanted.” I’ve heard this same opinion, but reversed, from monolingual Spaniards. You have to get quite deep into learning a language before you learn all the synonyms. In Spain, for example, they have a very rich bacon-flavored tapestry of words for the animal from which they derive their favorite meat: cochino, puerco, guarro, marrano, chon, etc. But you could probably get to fourth-year Spanish in college and never learn more than cerdo for the word pig, because you really don’t need the rest until you’re writing poetry or insulting someone in a Spanish bar. Dr. Boroditsky does an excellent job of not calling Brand an idiot, even if the look on her face does. Her talk doesn’t actually start until about the four minute mark because first they preview a wonderful short video from my beloved RadioLab, aptly titled Words. It’s a sequence of very video clips cleverly edited that requires a good knowledge of English to follow. The full length video is available on FORA.tv, where they provide a nice table of contents for navigating to just the bits you’re interested in if you so choose. I’m really starting to love FORA.tv as a site for what are more or less unabridged TED talks.
<urn:uuid:7f332d8f-47ec-480e-beee-be80ddf1d506>
CC-MAIN-2016-44
http://erikras.com/2010/12/17/lera-boroditsky-on-language/
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721415.7/warc/CC-MAIN-20161020183841-00321-ip-10-171-6-4.ec2.internal.warc.gz
en
0.964087
1,020
2.765625
3
The growth of cyber-physical programs in healthcare, specifically the IP “heartbeats” dispersed throughout clinic networks, has stretched cybersecurity past its IT legacy of tracking for downed e mail and web page uptimes at a health center. As we glance to expedite making use of cybersecurity to offer protection to the sphere of medication and its evolving cyber-physical nature, affected person protection must be our guiding big name. Healthcare organizations already perceive the concern; affected person protection and the Hippocratic Oath information the paintings of scientific execs. Regardless of the hindrances, care groups tirelessly make stronger the undertaking to avoid wasting affected person lives. The similar isn’t all the time true for the IT skilled looking to bolster cybersecurity in a clinic. Regardless that, to be honest, scientific execs are most often granted abundant assets to win the struggle towards affected person illness, whilst hospitals’ IT groups are incessantly missing other folks, processes, and the generation make stronger they wish to foil ransomware, instrument hacking and different cybersecurity threats. Within the cybersecurity box, protection as the safety of human lifestyles is a relative time period, relying at the sector. Business regulate device safety, for instance, readily accepts that confidentiality isn’t the concern; availability is. That comes with resourcing to verify paper mill kilns perform at a protected temperature in order to not hurt people within reach. It additionally contains make stronger buildings to watch water amenities for indicators of virtual tampering and protected environmental remedy (e.g., no flooding wastewater). Protection in a client safety global, on the other hand, treats each safety and privateness way more frivolously. For instance: so far, shopper well being tracking apps have presented unacceptable ranges of possibility to the scientific neighborhood since they have an effect on affected person protection (misguided blood drive size, and so forth.). Bearing in mind each the scientific and cybersecurity communities face enormous and approaching threats to human lifestyles according to hacking and geopolitical cyberthreats, I’d love to rally all sides in combination to believe how you can collectively fortify coverage within the healthcare sector. My point of view is that we will arrange and deal with cybersecurity in healthcare the similar approach affected person protection is addressed – disciplined procedure, timeliness, and oversight with skilled human judgment. This manner might also lend a hand overburdened clinic IT scale their efforts to stand the present danger panorama, in conjunction with lend a hand from skilled cyber experts. Let’s smash it down and believe how we will paintings in combination. Relating to processes for affected person protection, scientific fields perceive their price. However IT wishes extra make stronger to ramp up their cybersecurity efforts to succeed in the similar stage of rigor. Processes similar to patching knowledge servers or tracking visitor Wi-Fi require other folks and generation. When was once the remaining time the server was once scanned? What was once came upon? Who’s performing on anomalies? Are they robotically notified? We will higher make stronger IT with safety automation (generation) controlled via SOC mavens and danger analysts (other folks). For the cybersecurity skilled, a disciplined procedure usually contains defining timelines within the safety program to continuously carry out skilled exams, particularly on belongings or workflows impacting affected person protection. This might come with verifying infrastructure configurations. Consistent tracking may be a disciplined procedure, as is the experience of examining threats, to understand which indicators are definitely worth the IT lead’s consideration and require motion, and which no longer. Agreeing to an manner of disciplined procedure on all sides can fortify ranges of healthcare cybersecurity adulthood. Affected person data should glide temporarily to attending hospital therapy groups. In a similar fashion, danger and programs data must glide temporarily to IT and cyber groups. This may also be higher achieved via standardization and automation (the place imaginable). Taking the time to arrange the processes smartly can result in much less wasted time afterwards, resulting in timelier coverage/reaction. Hospitals’ IT leads must paintings to spot the cyber-physical infrastructure that can have an effect on affected person protection in more than a few clinic departments and create an inventory of priorities. The cybersecurity group can align possibility tests and path carrier stage settlement (SLA) communications accordingly. If an alert finds ransomware in a single a part of a clinic’s community, for instance, different portions of the clinic may also be safely taken offline to stop unfold, if the have an effect on to affected person protection has already been analyzed and understood. Timeliness must even be addressed up entrance as a result of many cyber-attacks occur all through off-hours and vacations. Pre-work in cybersecurity contains realizing who to name and the way temporarily a choice should be returned to offer protection to affected person protection (don’t omit a difficult reproduction of telephone bushes for when the community is down!). Healthcare execs know all about this from ER, the place they incessantly make calls to the right care group specialist. The shared affected person protection precedence way timeliness is very important for, and revered via, each groups. Contemporary analysis says that variety improves efficiency, and healthcare already recognizes the need for diverse disciplines, credentialed specializations, and a various inhabitants. To fortify cybersecurity in healthcare, a numerous set of technical execs should be tapped duvet the large danger panorama. Once more, the undertaking is affected person protection. Leaving it to the IT lead by myself misses the chance to search out one thing sooner, be told one thing related, and to take the suitable mitigation motion on the proper time. The similar as in healthcare, there’s no change for a human in cybersecurity: a human that is aware of the community, is aware of the affected person, is aware of the attackers, and so forth. In the end, they should make the tricky choices to uphold affected person protection. I am hoping this abstract leads each trade and scientific execs towards a greater working out about how our two facets of the similar coin can unite to succeed in the shared undertaking of defending affected person protection.
<urn:uuid:2937fb6a-ebf7-423c-a362-47b26efb394c>
CC-MAIN-2022-49
https://www.firnco.com/rallying-cybersecurity-and-healthcare-it-to-make-stronger-affected-person-protection/
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710734.75/warc/CC-MAIN-20221130092453-20221130122453-00786.warc.gz
en
0.929582
1,267
2.625
3