added
stringdate 2024-06-03 18:26:11
2024-06-04 03:14:13
| created
stringdate 2013-04-29 18:49:42
2014-01-03 01:38:26
| id
stringlengths 32
32
| metadata
dict | source
stringclasses 2
values | text
stringlengths 237
356k
| version
stringclasses 1
value |
---|---|---|---|---|---|---|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:44:36.000Z
|
mq25ivc5assel2ttmzlmcyzknduwqvqy
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:7733",
"uncompressed_offset": 435035977,
"url": "www.familysearch.org/learn/wiki/en/index.php?hidemyself=1&target=North_Carolina_Divorce_Records&title=Special%3ARecentChangesLinked",
"warc_date": "2013-11-22T14:53:47.000Z",
"warc_filename": "<urn:uuid:20e2a6b0-4fcd-4068-932d-bf17f9227072>",
"warc_url": "http://www.familysearch.org/learn/wiki/en/index.php?title=Special:RecentChangesLinked&hidemyself=1&target=North_Carolina_Divorce_Records"
}
|
cccc_CC-MAIN-2013-20
|
Changes related to "North Carolina Divorce Records"
From FamilySearch Wiki
This is a list of changes made recently to pages linked from a specified page (or to members of a specified category). Pages on your watchlist are bold.
Recent changes options Show last 50 | 100 | 250 | 500 changes in last 1 | 3 | 7 | 14 | 30 days
Hide minor edits | Show bots | Hide anonymous users | Hide logged-in users | Show my edits
Show new changes starting from 06:44, 18 May 2013
Page name:
No changes on linked pages during the given period.
New to the Research Wiki?
In the FamilySearch Research Wiki, you can learn how to do genealogical research or share your knowledge with others.
Learn More
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T05:29:38.000Z
|
3i6aydqq2d6qdxjyp7kugs2uml6u7c72
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:7734",
"uncompressed_offset": 449073882,
"url": "www.forensicswiki.org/w/index.php?diff=12976&oldid=7952&title=Windows_Memory_Analysis",
"warc_date": "2013-11-22T14:53:47.000Z",
"warc_filename": "<urn:uuid:20e2a6b0-4fcd-4068-932d-bf17f9227072>",
"warc_url": "http://www.forensicswiki.org/w/index.php?title=Windows_Memory_Analysis&diff=12976&oldid=7952"
}
|
cccc_CC-MAIN-2013-20
|
Error
Jump to: navigation, search
2 revisions of this difference (7952 and 12976) were not found.
This is usually caused by following an outdated diff link to a page that has been deleted. Details can be found in the deletion log.
Personal tools
Namespaces
Variants
Actions
Navigation:
About forensicswiki.org:
Toolbox
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:30:10.000Z
|
abhpcpepjx3nbljunyzwzoy4pijkrz4b
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:7744",
"uncompressed_offset": 467141960,
"url": "www.go4expert.com/articles/shells-impressive-web-hacking-method-t19226/",
"warc_date": "2013-11-22T14:53:47.000Z",
"warc_filename": "<urn:uuid:20e2a6b0-4fcd-4068-932d-bf17f9227072>",
"warc_url": "http://www.go4expert.com/articles/shells-impressive-web-hacking-method-t19226/"
}
|
cccc_CC-MAIN-2013-20
|
All about SHELLS | Impressive Web Hacking Method
This is an article on All about SHELLS | Impressive Web Hacking Method in Ethical hacking Tips.
Rated 4.00 By 1 users
Introduction
I am sure many have you have read about "Hacked / Defaced with shells", So I am pretty sure that the first thing that comes to your mind is "What the heck are these shells?" . So this article would give you complete idea about shells and its use.
Difference between FTP & Shells:
Many times I see that some of us know how to use the shell but once they have uploaded they get confused. So to start with, Let me give you some information about FTP:
File Transfer Protocol
Whenever you want to open your website, the first thing you will do is to get some web hosting for your self. That cud be either free or paid. When your get your hosting services, you create a website on your computer first and then upload it to your hosting server so it becomes a World Wide Web. This process of uploading the documents from your computer to your hosting server is done through FTP [File Transfer Protocol]. It basically looks like a program with 2 columns, one column shows your computer files and another shows your servers files. Just like when you copy the stuffs from some USB drive to your computer. So here, I will show you an example is how you would connect if you own go4expert. So when you want to connect your self to your web hosting server, following information is required in order to authenticate yourself:
Server : ftp.go4expert.com
Username: shabbir
password: whatever
So, once you put in this information, server understands that you are shabbir and gives you access to all the files on the server so you can work on it.
Shells:
Since you understand the FTP now, we know that none of us will get access to Go4expert's server because we don't have the username and password authenticate yourself. Somehow we can manage to get the access to G4E's FTP we can easily remove/edit/replace files. So we can destroy this entire forum and upload our own stuffs. That is when shells comes into the picture. Shells are a malicious PHP files which you will need to upload to any website, and once you execute it you will get access to its server directly WITHOUT authenticating your self.
Moral of the Story:
I wrote the difference between FTP and shells so that you guyz can understand it, because lots of people tends to get confused between them. So again to make it clear, you can following thing:
Quote:
FTP is a protocol that lets you connect your computer to your hosting server so that you can upload/edit/delete/replace your files. Since we wouldn't have the username & password to connect to any website's ftp, thats why we will use the SHELL to get access. SO SHELL IS NOT FTP BUT IT GIVES YOU ACCESS TO THE HOSTING SERVER.
Funny Incidents:
Let me tell you guyz why i gave time to write this much about FTP in this article. In my forum, i reelased a couple of videos about "hacking with shells" etc .etc. So some guyz saw it and just copied what I was doing without understanding the logic.
I remember i saw couple of threads which said following thing:
" Hi guyz, i managed to hack my 1st website today! YAY, I am really happy! But theres only 1 problem, i uploaded the shell and ran it and it worked fine. The only problem is i dont have access to FTP."
Y0, i hacked a website today, uploaded a shell and it worked fine, now i am trying to get access to FTP
Logic
Shell is not a tool that you can run and complete your work. As I said, its just a normal ".php" file, you have to find a way in any website to upload that shell. The Idea is, you upload the shell to any website so it will be saved on their server and it will give you the access to it.
Phase 1 : Uploading a shell:
Suppose you want to hack "something.com". So the first thing that you will do is, open up "something.com", and try to find some place from where you can upload the files on the website. There are many such places for example, "file uploads, avatars, resume upload, cooking recipe uploads, upload your photo". So these are the places which will give you an opportunity to upload your shell. All you have to do is, try to upload the shell.php which is located in your computer and click on submit. So suppose you went to the webpage "something.com/submit_resume.php" and you uploaded your resume.
Phase 2 : Executing your uploaded shelll:
Once we have uploaded the shell as shown in "Phase:1", we know that its sitting on the server. The only thing we need to do now is to execute the shell from a browser so we get access to it.
Example:
So suppose i uploaded my shell as an attachment in THIS THREAD. SO now taht attachment is sitting on G4E's server. Now if we want to executive it, we will use following URL:
Code:
http://www.go4expert.com/attachment.php?attachmentid=456&d=1249607339
So that is the DIRECT url to the attachment which is called EXECUTION. In the same way if you execute your shell, it will take you to a webpage where you will see everything thats on the server. And you will have FULL ACCESS to remove/edit/replace/delete the files. So you are another shabbir!
Phase 3 : Defacing:
Defacign is a word which means "replacing the current index file with our own index with our motive and slogan on it". So once you have access to the server, you are the king
Different types of shells:
There are many shells available, most of them are public and some of them are private. Most of them does the samething to give you the access of the server. "c99, r57, b0yzone, j32" are some very common and easily available shells.
Where do I get them from?:
I'd have uploaded them here, but then it might have marked G4E as "Harmful web" on Google. So the best way is Google search with "inurl:c99.txt". You can replace c99 with r57, j32 or anything else.
Conclusion:
Now that you guyz know what are shells and how it works, i will start covering other method in coming articles. I will soon write about "RFI, LFI" which are somewhat connected with shells. Meanwhile, keep playing with it and learn more.
Important Piece of advice:
I would suggest you to download WAMP SERVER, which lets you make your own server on your comptuer. And then try to use shells on it. Which will help you avoid hacking in live environment. Because, if webmaster is smart then, he can simply check the logs for that shell fine and track down your IP which executed the shell. Then you might be in problem.
Thanks for your time to read the article . Hope you liked it . PEACE!
Invasive contributor
31Aug2009,02:13 #2
Nice Article
Security Expert
31Aug2009,03:19 #3
Glad you liked it.
Its just an article to give basic ideas about shells to members. In next article i will cover more things which cud be done with it
Go4Expert Founder
2Sep2009,18:55 #4
Nomination for Article of the month - Aug 2009 Started.
Go4Expert Founder
19Sep2009,11:41 #5
Vote for this article for Article of the month - August 2009
Skilled contributor
19Sep2009,20:57 #6
Cool one, rarely found this kinda articles on the net
Go4Expert Founder
2Oct2009,10:22 #7
Winner of Article of the month - August 2009 Jointly
Newbie Member
20Oct2010,19:53 #8
it's very interesting...
Newbie Member
27Jan2011,22:21 #9
sick...
Newbie Member
22Feb2011,18:58 #10
Great article, finally one that I can understand.
One question though, if I do this do I need to take any security measures to make sure I don't get caught
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T05:27:06.000Z
|
hwwwc66bvg5pkjfa7zu5md4kuuczirmi
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:7745",
"uncompressed_offset": 467154429,
"url": "www.go4expert.com/forums/c-cpp-free-compiler-software-t22078/",
"warc_date": "2013-11-22T14:53:47.000Z",
"warc_filename": "<urn:uuid:20e2a6b0-4fcd-4068-932d-bf17f9227072>",
"warc_url": "http://www.go4expert.com/forums/c-cpp-free-compiler-software-t22078/"
}
|
cccc_CC-MAIN-2013-20
|
C/C++ free compiler software
Newbie Member
12May2010,11:22 #1
Hi..........I would like to have a C/C++ compiler for practice.Please tell me which is better to install.Can anyone provide an .exe file for the same....!
Contributor
12May2010,18:42 #2
you can use gcc compiler, if you use linux you can use it. make a google search and find a windows version for executing your c or c++ program
Mentor
13May2010,21:24 #3
MinGW is a port of gcc to Windows. Alternatively you can get the Visual Studio compilers and the SDK for free from MSDN; you can't get Visual Studio itself as that's a premium product. Visual Studio Express might be a possibility.
Get something up to date though, don't rely on old outdated crap like TurboC or DevCpp - unless you've got an outdated crap PC that won't run the modern stuff.
Contributor
20May2010,14:46 #4
Is it possible to create C++ (on MinGW gcc compilers) applications without using any IDE i.e., through notepad? If it is then how to compile and run my cpp file?
Thanks
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T05:48:39.000Z
|
uoqcgfxndyaft5qvcu4eauqz4irf5rdo
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:7746",
"uncompressed_offset": 474222558,
"url": "www.grandtheftwiki.com/Carpe_Dime",
"warc_date": "2013-11-22T14:53:47.000Z",
"warc_filename": "<urn:uuid:20e2a6b0-4fcd-4068-932d-bf17f9227072>",
"warc_url": "http://www.grandtheftwiki.com/Carpe_Dime"
}
|
cccc_CC-MAIN-2013-20
|
Carpe Dime
From Grand Theft Wiki
Jump to: navigation, search
Mission
Carpe Dime
Huang cutting a van's side panel.
Game GTA Chinatown Wars
For Wu Lee
Target Art Dealer
Location Steinway, Dukes, Liberty City
Unlocks Store Wars
Raw Deal
Driven to Destruction
Unlocked by Recruitment Drive
Bomb Disposal
Carpe 'Dime' is a mission in Grand Theft Auto: Chinatown Wars.
Contents
Walkthrough
Before you can do this mission, you'll need to pay for the property in East Island City in Dukes that Uncle Kenny is looking at and close the deal. To do that you'll need at least $5000, and the best way to earn enough is drug dealing. Once you have enough, get over there and pay off the deal.
When it begins, Uncle Kenny thinks he knows who stole Yu Jian. He suspects that some rich fool who is with the Spanish Lords is the robber who left Huang Lee for dead. He tells Huang to jack one of his vans and bring it back to his place.
First of all, you'll need to locate the van. It's in the Meadow Hills area, but once you find it you'll need to force it to stop, by either ramming it or shooting at the van, then take it. Quickly drive it back to the flat in East Island City and via the touch screen, cut the panel to search for the sword. Result: No Sword but a book showing recent deals for the Spanish Lords.
Reward: Shortly after the completion of this mission, Uncle Kenny will email you saying that the rich fool you just hijacked used to own a place in Lancaster in Algonquin. He found the keys to it in the van, and gives it to you. So, a new free safehouse!
Following this mission, you can now hijack gang vans and take them to secluded safehouses to search the panels for hidden free drugs. Watch out as the more gang vans you steal, the bigger the hate you receive from the gang. Also, sometimes the panels will have drugs in them, but others will not. All of the vans that are free for stealing are marked randomly with red arrows.
Script
(At Kenny's Warehouse)
Kenny: Thank you nephew. I couldn't have bought this place without you.
Huang: I? I thought it was for us?
Kenny: It is! I meant we. I wrote my name on the deeds purely for tax purposes.
Huang: Of course! Anyway, I'm glad I could help. Any news on my father's killers, or that silly sword, Yu Jian?
Kenny: Possibly; A wealthy buyer of expensive stolen artifacts is visiting the city.
Huang: Do you think he might be here to buy Yu Jian?
Kenny: It's possible - and though some say it's dishonorable to attack lone travelers. I say a rich fool can be the cause of much mischief.
Huang: That's brilliant Uncle. If the life of crime thing goes wrong, you should take up script writing.
Kenny: I've always had a way with words. Huang, it's our noble duty to separate such fools from their money.
Trivia
• The mission's name is a play on "Carpe Diem", which means "Seize the Day".
Mission Replay description
"Thought a rich buyer was trying to get Yu Jian out of the city, but he was clean.
Still ... discovered that ripping off vans can be a lucrative side job."
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:57:52.000Z
|
r64miqlpk2ma3gi62rgx5iz4tr7hwdk3
|
{
"content_type": "application/xhtml+xml",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:7753",
"uncompressed_offset": 486204240,
"url": "www.hindawi.com/journals/ecam/2013/789674/abs/",
"warc_date": "2013-11-22T14:53:47.000Z",
"warc_filename": "<urn:uuid:20e2a6b0-4fcd-4068-932d-bf17f9227072>",
"warc_url": "http://www.hindawi.com/journals/ecam/2013/789674/abs/"
}
|
cccc_CC-MAIN-2013-20
|
About this Journal Submit a Manuscript Table of Contents
Evidence-Based Complementary and Alternative Medicine
Volume 2013 (2013), Article ID 789674, 7 pages
http://dx.doi.org/10.1155/2013/789674
Research Article
Effects of Electroacupuncture at Auricular Concha Region on the Depressive Status of Unpredictable Chronic Mild Stress Rat Models
1Institute of Acupuncture and Moxibustion, China Academy of Chinese Medical Sciences, Beijing 100700, China
2Guanganmen Hospital, China Academy of Chinese Medical Sciences, Beijing 100053, China
3Clinical Evaluation Center, Institute of Basic Research in Clinical Medicine, China Academy of Chinese Medical Sciences, Beijing 100700, China
4Beijing University of Chinese Medicine, Beijing 100029, China
Received 24 August 2012; Revised 21 November 2012; Accepted 14 December 2012
Academic Editor: Wolfgang Schwarz
Copyright © 2013 Ru-Peng Liu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Abstract
To explore new noninvasive treatment options for depression, this study investigated the effects of electroacupuncture (EA) at the auricular concha region (ACR) of depression rat models. Depression in rats was induced by unpredictable chronic mild stress (UCMS) combined with isolation for 21 days. Eighty male Wistar rats were randomly assigned into four groups: normal, UCMS alone, UCMS with EA-ACR treatment, and UCMS with EA-ear-tip treatment. Rats under inhaled anesthesia were treated once daily for 14 days. The results showed that blood pressure and heart rate were significantly reduced in the EA-ACR group than in the UCMS alone group or the EA-ear-tip group. The open-field test scores significantly decreased in the UCMS alone and EA-ear-tip groups but not in the EA-ACR group. Both EA treatments downregulated levels of plasma cortisol and ACTH in UCMS rats back to normal levels. The present study suggested that EA-ACR can elicit similar cardioinhibitory effects as vagus nerve stimulation (VNS), and EA-ACR significantly antagonized UCMS-induced depressive status in UCMS rats. The antidepressant effect of EA-ACR is possibly mediated via the normalization of the hypothalamic-pituitary-adrenal (HPA) axis hyperactivity.
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:44:56.000Z
|
cxriguf2bgyfgrtjiiwvc57bhlrv3csr
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:7770",
"uncompressed_offset": 560840912,
"url": "www.mdpi.com/1422-0067/11/4/1546",
"warc_date": "2013-11-22T14:53:47.000Z",
"warc_filename": "<urn:uuid:20e2a6b0-4fcd-4068-932d-bf17f9227072>",
"warc_url": "http://www.mdpi.com/1422-0067/11/4/1546"
}
|
cccc_CC-MAIN-2013-20
|
Int. J. Mol. Sci. 2010, 11(4), 1546-1556; doi:10.3390/ijms11041546
Article
Colon-Specific Drug Delivery Behavior of pH-Responsive PMAA/Perlite Composite
Chemistry Department, Azarbaijan University of Tarbiat Moallem, Tabriz, Iran
* Author to whom correspondence should be addressed.
Received: 12 March 2009 / Accepted: 12 April 2010 / Published: 12 April 2010
(This article belongs to the Special Issue Composite Materials)
Download PDF Full-Text [308 KB, uploaded 12 April 2010 12:09 CEST]
Abstract: The preparation, characterization, and in vitro release of 5-aminosalicylic acid (5-ASA)from methacrylic acid (MAA)/perlite composites (APC) prepared via a sol–gel route are reported. The free-radical graft polymerization of methacrylic acid (MAA) onto perlite particles was studied experimentally. The grafting procedure consisted of surface activation with 3-(trimethoxysilyl) propyl methacrylate (TSPA), followed by free-radical graft polymerization of methacrylic acid (MAA) in ethyl acetate with 2,2΄-azobis-isobutyronitrile (AIBN) initiator. The composition of the composites hybrid materials was determined by FTIR spectroscopy. Equilibrium swelling studies were carried out in enzyme-free simulated gastric and intestinal fluids (SGF and SIF, respectively). The dried composites were immersed in a saturated solution of 5-ASA in water overnight and dried over a period of three days at room temperature and the in vitro release profiles were established separately in both (SGF, pH 1) and (SIF, pH 7.4). The 5-ASA concentration of the solution was measured using a UV-Vis spectrophotometer (205 nm) at different time intervals. The in vitro drug release test revealed that the release rate of 5-ASA in buffer solutions increased with the silica content in the composites; on the contrary, the increase of the content of 3-(trimethoxysilyl)propyl methacrylate (TSPA), a coupling agent, decreased the drug release rate.
Keywords: methacrylic acid; perlite; silylation; polymerization; polymer grafting
Article Statistics
Click here to load and display the download statistics.
Cite This Article
MDPI and ACS Style
Mahkam, M.; Vakhshouri, L. Colon-Specific Drug Delivery Behavior of pH-Responsive PMAA/Perlite Composite. Int. J. Mol. Sci. 2010, 11, 1546-1556.
AMA Style
Mahkam M, Vakhshouri L. Colon-Specific Drug Delivery Behavior of pH-Responsive PMAA/Perlite Composite. International Journal of Molecular Sciences. 2010; 11(4):1546-1556.
Chicago/Turabian Style
Mahkam, Mehrdad; Vakhshouri, Laleh. 2010. "Colon-Specific Drug Delivery Behavior of pH-Responsive PMAA/Perlite Composite." Int. J. Mol. Sci. 11, no. 4: 1546-1556.
Int. J. Mol. Sci. EISSN 1422-0067 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T08:02:50.000Z
|
fonlpletmgu6ov2qy6awhyesex7tnyr3
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:7785",
"uncompressed_offset": 606516491,
"url": "www.openwetware.org/index.php?diff=prev&oldid=384343&title=20.385%28S10%29%3AAssignments_on_readings",
"warc_date": "2013-11-22T14:53:47.000Z",
"warc_filename": "<urn:uuid:20e2a6b0-4fcd-4068-932d-bf17f9227072>",
"warc_url": "http://www.openwetware.org/index.php?title=20.385(S10):Assignments_on_readings&diff=prev&oldid=384343"
}
|
cccc_CC-MAIN-2013-20
|
20.385(S10):Assignments on readings
From OpenWetWare
(Difference between revisions)
Jump to: navigation, search
Current revision (18:32, 23 January 2010) (view source)
(Presentations of Papers)
Line 37: Line 37:
*the date of your presentation
*the date of your presentation
*the class you're presenting to
*the class you're presenting to
-
Please upload your presentation to [https://stellar.mit.edu/S/course/20/sp10/20.385/homework/index.html| the homework drop box] on the day you give your presentation. <br><br>
+
Please upload your presentation to [https://stellar.mit.edu/S/course/20/sp10/20.385/homework/index.html the homework drop box] on the day you give your presentation. <br><br>
<center>
<center>
Your presentation with your partner will account for <font color = red>10% of your final grade.</font color><br>
Your presentation with your partner will account for <font color = red>10% of your final grade.</font color><br>
Your solo presentation will account for <font color = red>15% of your final grade.</font color>
Your solo presentation will account for <font color = red>15% of your final grade.</font color>
</center>
</center>
Current revision
Presentation Response Record
On the weeks when you are NOT presenting, you are expect to:
1. read the papers that will be presented so you can ask questions in class and
2. write a one paragraph summary after the presentation that includes:
• the name of the paper, its authors, and the citation information
• the presenter(s)
• the main motivation, methods and conclusion(s) from the paper
• your assessment of the work performed
• the reason you believe it was included in this class
• your assessment of its place in the larger context of synthetic biology
• a constructive suggestion for how the presentation itself might have been might have been improved (this will *not* be shared with the presenter unless you specifically ask it to be).
As a guide for your work, a sample response record is offered here. This sample is a modified submission by JK for 20.902(S08).
You are not expected to submit a response paragraph on the weeks you present a paper.
Response paragraphs are due before the studio session one week following the presentation.
Each response paragraph is worth 10 points.
Late assignments will be docked 0.5 points for each 24 hours late.
These response records will account for 25% of your final grade.
Presentations of Papers
The following components are expected in your presentations:
1. Background information: to set the stage for your talk. Includes the nouns and verbs of your topic, the knowns and unknowns
2. High level summary: one slide only
3. Primary evidence: the key data and any explanation needed to understand the experimental method used
4. Secondary/supportive evidence: other experiments or techniques that bolster primary data
5. Key assumptions: can be in method, in conclusion or in experimental design
6. Uh oh!?: if you had been reviewing this paper for publication, what questions or concerns would you have? would you recommend that the paper be published? Or, not?
7. Significance: then and now. follow-up work since if relevant
To help with the book-keeping, please include the following on your title slides:
• paper's title
• paper's authors
• your name
• your partner(s) name(s) when applicable
• the date of your presentation
• the class you're presenting to
Please upload your presentation to the homework drop box on the day you give your presentation.
Your presentation with your partner will account for 10% of your final grade.
Your solo presentation will account for 15% of your final grade.
Personal tools
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T07:17:14.000Z
|
cl4wt3pkuafolctmeo23d44hintrrxyp
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:7786",
"uncompressed_offset": 606620941,
"url": "www.openwetware.org/wiki/Talk:BioBricks_abstraction_hierarchy",
"warc_date": "2013-11-22T14:53:47.000Z",
"warc_filename": "<urn:uuid:20e2a6b0-4fcd-4068-932d-bf17f9227072>",
"warc_url": "http://www.openwetware.org/wiki/Talk:BioBricks_abstraction_hierarchy"
}
|
cccc_CC-MAIN-2013-20
|
Talk:Synthetic Biology:Abstraction hierarchy
From OpenWetWare
Jump to: navigation, search
Hey, I thought it was worth posting some of the ideas from the discussion Jason, Ilya and I had after lab meeting on the abstraction hierarchy. This is a part of a larger discussion on Ilya's presentation on using the semantic web for the Registry (which Ilya will likely be posting later). Feel free to revise/comment as you see fit. --Reshma 05:59, 15 Sep 2005 (EDT)
Can someone organize a meeting/discussion time (outside of group meeting) to discuss these issues in detail. I don't feel like gm is the place to hash these issues out. --Sri Kosuri 13:32, 16 Sep 2005 (EDT)
Personal tools
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T05:56:08.000Z
|
pjnjyy7fj5vsia44ipohjnod2inhswo5
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:7788",
"uncompressed_offset": 612533731,
"url": "www.panarmenian.net/eng/news/145121/",
"warc_date": "2013-11-22T14:53:47.000Z",
"warc_filename": "<urn:uuid:20e2a6b0-4fcd-4068-932d-bf17f9227072>",
"warc_url": "http://www.panarmenian.net/eng/news/145121/"
}
|
cccc_CC-MAIN-2013-20
|
Tunisia's ruling Islamists call for rally
PanARMENIAN.Net - Members of Tunisia's governing Islamist party, Ennahda, have called for a rally, a day after huge crowds attended a murdered opposition leader's funeral, BBC News reported.
A post on the group's Facebook page urged people to gather at 14:00 (13:00 GMT) on Habib Bourguiba Avenue in the centre of the capital, Tunis.
The rally would defend the legitimacy of the National Constituent Assembly and fight against violence, it added.
Opposition supporters have blamed Ennahda for the death of Chokri Belaid.
Chokri Belaid's widow Basma Khalfawi said she would file a lawsuit against the party's leader, Rachid Ghannouchi.
Mr Ghannouchi has condemned the murder and denied any involvement. The government has blamed opponents of democracy.
Mr Belaid, a lawyer and secular political figure, was shot by a gunman as he left home for work on Wednesday. The previous day he had accused a faction inside Ennahda of being behind attacks on the opposition.
Partner news
Top stories
Jorge Rafael Videla, an austere former army commander, led Argentina during the bloodiest days of its Dirty War dictatorship.
According to the United Nations, April was Iraq's bloodiest month for almost five years, with 712 people killed.
Reports suggest the rebel fighters may have tried to blow up the walls of the prison, which holds some 4,000 inmates.
Moscow has condemned other nations for supporting rebel forces and failing to condemn what it describes as terrorist attacks on the Syrian regime.
Partner news
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T05:28:08.000Z
|
pl3znhdzgkn2uqiglukbpiyejvkk6sp7
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:7790",
"uncompressed_offset": 619464353,
"url": "www.perseus.tufts.edu/hopper/text?doc=Perseus%3Atext%3A2006.05.0658%3Aarticle%3Dpos%3D5",
"warc_date": "2013-11-22T14:53:47.000Z",
"warc_filename": "<urn:uuid:20e2a6b0-4fcd-4068-932d-bf17f9227072>",
"warc_url": "http://www.perseus.tufts.edu/hopper/text?doc=Perseus%3Atext%3A2006.05.0658%3Aarticle%3Dpos%3D5"
}
|
cccc_CC-MAIN-2013-20
|
Operations of Garaters.
--On Tuesday evening an elderly gentleman named Carraway, from Johnston county, N. C., arrived in this city, en route to visit his sons in the army near Fredericksburg.--During his stay here he concluded to visit one of the camps in the vicinity of the city, and about dark on the evening in question set out in the direction of Camp Winder. Just beyond the city limits he met with four men, of whom he asked some questions with reference to the location of the camp for which he was search. They informed him that they were going to that camp, and would accompany him. Thinking himself fortunate in no soon finding company, the old gentleman accepted the escort of his newly-made acquaintances, and started off cheerfully for his destination. The party had not proceeded far, however, until the four scoundrels fell upon him and beat him unmercifully, bruising and cutting his head and face to soon an extent that he could scarcely see, and robbing him of everything that he had on his person — After inflicting this injury upon him the villains made their escape, and up to the time have not been arrested. The old man, in his bruised and disabled condition, managed to make his way to Camp Winder, where some soldiers procured a wagon and returned him to the city, and placed him in the North Carolina hospital. So serious are the injuries received about the head that some doubts are entertained of his recovery.
This work is licensed under a Creative Commons Attribution-ShareAlike 3.0 United States License.
An XML version of this text is available for download, with the additional restriction that you offer Perseus any modifications you make. Perseus provides credit for all accepted changes, storing new additions in a versioning system.
hide Places (automatically extracted)
View a map of the most frequently mentioned places in this document.
Sort places alphabetically, as they appear on the page, by frequency
Click on a place to search for it in this document.
North Carolina (North Carolina, United States) (1)
Johnston (North Carolina, United States) (1)
hide People (automatically extracted)
Sort people alphabetically, as they appear on the page, by frequency
Click on a person to search for him/her in this document.
Carraway (1)
hide Display Preferences
Greek Display:
Arabic Display:
View by Default:
Browse Bar:
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T05:59:28.000Z
|
p4womev3o6smx4nbejrsxnio2rtfmqvc
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:7791",
"uncompressed_offset": 619495047,
"url": "www.perseus.tufts.edu/hopper/text?doc=Thuc.+8.105.3&lang=original",
"warc_date": "2013-11-22T14:53:47.000Z",
"warc_filename": "<urn:uuid:20e2a6b0-4fcd-4068-932d-bf17f9227072>",
"warc_url": "http://www.perseus.tufts.edu/hopper/text?doc=Thuc.%208.105.3&lang=original"
}
|
cccc_CC-MAIN-2013-20
|
105. The Peloponnesians, therefore, charging this middle part, both drave their galleys to the dry land, and being far superior in fight, went out after them and assaulted them upon the shore. [2] And to help them neither was Thrasybulus able, who was in the right wing, for the multitude of the enemies that pressed him; nor Thrasyllus in the left wing, both because he could not see what was done for the promontory of Cynos-sema and because also he was kept from it by the Syracusians and others, lying upon his hands no fewer in number than themselves. Till at last the Peloponnesians, bold upon their victory, chasing some one galley some another, fell into some disorder in a part of their army. [3] And then those about Thrasybulus, having observed that the opposite galleys sought now no more to go beyond them, turned upon them, and fighting put them presently to flight; and having also cut off from the rest of the fleet such galleys of the Peloponnesians, of that part that had the victory, as were scattered abroad, some they assaulted, but the greatest number they put into affright unfoughten. The Syracusians also, whom those about Thrasyllus had already caused to shrink, when they saw the rest fly fled outright.
This work is licensed under a Creative Commons Attribution-ShareAlike 3.0 United States License.
An XML version of this text is available for download, with the additional restriction that you offer Perseus any modifications you make. Perseus provides credit for all accepted changes, storing new additions in a versioning system.
load focus Notes (T. G. Tucker, 1892)
load focus Greek (1942)
load focus English (1910)
load focus English (Benjamin Jowett, 1881)
hide References (19 total)
hideData/Identifiers
Citation URN: urn:cts:greekLit:tlg0003.tlg001.perseus-eng1:8.105
Document URN: urn:cts:greekLit:tlg0003.tlg001.perseus-eng1
hide Display Preferences
Greek Display:
Arabic Display:
View by Default:
Browse Bar:
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:21:15.000Z
|
rxfknvocpjvhru4zmwqas6r7c2x7wv2a
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:7798",
"uncompressed_offset": 668024021,
"url": "www.seroundtable.com/archives/021716.html",
"warc_date": "2013-11-22T14:53:47.000Z",
"warc_filename": "<urn:uuid:20e2a6b0-4fcd-4068-932d-bf17f9227072>",
"warc_url": "http://www.seroundtable.com/archives/021716.html"
}
|
cccc_CC-MAIN-2013-20
|
SMX West: Keyword Research: Beyond the Ordinary
Mar 2, 2010 • 5:45 pm | (0) by | Filed Under Search Marketing Expo 2010 West
Below is live coverage of the Keyword Research: Beyond the Ordinary from the SMX West conference.
This coverage is provided by Keri Morgret of Strike Models.
We are using a live blogging tool to provide the real time coverage, please excuse any typos. You can also interact with us and while we are live blogging, so feel free to ask us questions as we blog. We will publish the archive below after the session is completed.
Previous story: SMX West: Not Your Father's AdWords
blog comments powered by Disqus
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T08:02:40.000Z
|
zrfuvsoemgmda6efpe2hduf4g7sensrv
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:7799",
"uncompressed_offset": 668032504,
"url": "www.seroundtable.com/archives/022368.html",
"warc_date": "2013-11-22T14:53:47.000Z",
"warc_filename": "<urn:uuid:20e2a6b0-4fcd-4068-932d-bf17f9227072>",
"warc_url": "http://www.seroundtable.com/archives/022368.html"
}
|
cccc_CC-MAIN-2013-20
|
Daily Search Forum Recap: June 11, 2010
Jun 11, 2010 • 4:00 pm | (0) by | Filed Under Search Forum Recap
Here is a recap of what happened in the search forums today, through the eyes of the Search Engine Roundtable and other search forums on the web.
Search Engine Roundtable Stories:
• Google FIFA World Cup & Jacques Cousteau Logo & Other FIFA World Cup Logos From Bing, Ask & Others
The FIFA World Cup kicks off today and Google, Bing, Yahoo, Ask.com and other search engines have their special logos up today. The interesting thing is that in the US, Google.com does not have a logo for FIFA World Cup but rather has a Doodle for Jacques Cousteau. FIFA does not need an explanation. Jacques Cousteau is a 100 today, he died on June 25, 1997 and was a well-known for co-developing the aqua-lung, as
• Google Wants $25 Per Business Per Month With Maps Tags
Last night, Google expanded their Google Maps Places "Tags" nationwide. Tags basically enhance your Google Maps listing and cost an additional $25 per month per listing. Here are some pictures of how it looks on a browser and iPhone. The tags are the yellow highlighted listings. Browser Listing: Browser Coupon Page: iPhone Listing: iPhone Coupon Page: Forum discussion at Cre8asite Forums.
• Google Quietly Breaks & Fixes Starring In Google Dictionary
Google has a feature I never use named Google Dictionary. In the Google Dictionary, users can "star" words to be put in a special list for later. Earlier this week, the starring feature stopped working. A thread was created at Google Web Search Help to report the issue. Days later, Googler Emmit confirmed the bug and said they will look into it. Emmit said: Hi all, thanks for reporting this and sorry for being a
• Google News Drops Web Search Button
It seems like Google News is constantly going through tests. Besides for the ones reported yesterday with editors picks and the one from last week with sharing options, Google seems to have pulled the Google News "Search The Web" button. Here is a picture of the Google News Search box without the "Search The Web" option: Now it only says "Search News" and users want to also search the web. We have tons of complaints
• Google Releases Adwords Campaign Experiments Tool
Earlier this week, Google announced a new beta tool named AdWords Campaign Experiments or ACE. The tool is designed to help advertisers experiment with bid changes and track what would happen if their increased or decreased their bids for certain keywords. Google said "ACE allows you to perform faster, more accurate tests by executing your experimental campaign alongside your original campaign. By performing this type of simultaneous split test, we can tell you precisely if
Other Great Search Forum Threads:
Previous story: Google FIFA World Cup & Jacques Cousteau Logo & Other FIFA World Cup Logos From Bing, Ask & Others
blog comments powered by Disqus
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T08:02:33.000Z
|
ademdc5wjmypkilukqk66qdne63dkd4x
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:7821",
"uncompressed_offset": 2159443,
"url": "abs.gov.au/AUSSTATS/abs%40.nsf/ProductsbyReleaseDate/DAB93D806C8CE967CA25722E001C49D9",
"warc_date": "2013-11-22T14:54:25.000Z",
"warc_filename": "<urn:uuid:538441c1-957d-4877-a7e6-0a4b51ee8825>",
"warc_url": "http://abs.gov.au/AUSSTATS/abs@.nsf/ProductsbyReleaseDate/DAB93D806C8CE967CA25722E001C49D9?OpenDocument"
}
|
cccc_CC-MAIN-2013-20
|
Australian Bureau of Statistics
Celebrating the International Year of Statistics 2013
ABS Home > Statistics > By Release Date
8741.2 - Dwelling Unit Commencements Reported by Approving Authorities, Victoria, Sep 1994
Previous ISSUE Released at 11:30 AM (CANBERRA TIME) 08/12/1994
Page tools: Print Page Print All RSS Search this Product
• About this Release
Monthly; ISSN:0814-236X; Number of dwelling unit commencements (houses and other residential buildings) as reported by approving authorities, by local government area; ownership (private sector/public sector), and by material of outer walls, by statistical division and statistical local area. Also includes selected seasonally adjusted and trend estimates.
This publication has been converted from older electronic formats and does not necessarily have the same appearance and functionality as later releases.
© Commonwealth of Australia 2013
Unless otherwise noted, content on this website is licensed under a Creative Commons Attribution 2.5 Australia Licence together with any terms, conditions and exclusions as set out in the website Copyright notice. For permission to do anything beyond the scope of this licence and copyright terms contact us.
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:34:59.000Z
|
eecygncpzl7gwryijujeoaiillatys5c
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:7827",
"uncompressed_offset": 9004558,
"url": "answers.onstartups.com/questions/9357/how-do-you-know-if-you-have-what-it-takes-to-be-an-entrepreneur",
"warc_date": "2013-11-22T14:54:25.000Z",
"warc_filename": "<urn:uuid:538441c1-957d-4877-a7e6-0a4b51ee8825>",
"warc_url": "http://answers.onstartups.com/questions/9357/how-do-you-know-if-you-have-what-it-takes-to-be-an-entrepreneur"
}
|
cccc_CC-MAIN-2013-20
|
Tell me more ×
Answers OnStartups is a question and answer site for entrepreneurs looking to start or run a new business. It's 100% free, no registration required.
Many professionals want to start their own venture but are scared of failing. Many of them do not know if they have a multi-faceted personality that is needed to run a business successfully. How should such professionals know for sure if they have what it takes to run a business?
share|improve this question
10 Answers
Most people who start down the path have no idea if they "have what it takes". It really is a game of perseverance. It is likely that many of the ideas, concepts and ventures you (or anyone) try will fail. The real test is to decide to keep going (not necessarily with the same idea - but in general.
You learn as you go.
Gates, Jobs, Brin, et al all started as people with just an idea. They were not born CEOs. You do the best you can, learn, and hopefully succeed.
share|improve this answer
Find a mentor who can help you at the outset determine if you want to take the journey. And if you do, can help you along the way travel the right path. A mentor, many mentors.
As Tim says, it's virtually impossible to know what it takes without having done it. That's where you use your mentor.
share|improve this answer
Joydeep - you write "Many professionals want to start their own venture but are scared of failing" - how very true. Be aware that many (arguably most) entrepreneurs are still scared of failure when they're out there running their business. Fear of failing is just a part of life all the way until you succeed - read Steven Pressfield's The War of Art will give you an excellent insight to this phenomen.
There's a really simple way to tell whether you're up to up to the job - just make the leap. To me that's the difference between people who talk about starting their own business and true entrepreneurs - the former group of people never have the guts to go stand on their on two feet. To be fair, this isn't a criticism - "I'm better than you because I started my own business and you were too scared" sort of thing; the world would be a terrible place if every single individual was out trying to start their own thing and nobody wanted to be employed, and it's also a fact that the lonely world of the entrepreneur isn't for everybody.
I'm not saying that you should be reckless - you should definitely read, research and take advice as been suggested above. My point is simply that you won't know whether you've got it what it takes until you put your future on the line and go try!
share|improve this answer
I'd encourage you to read the E-Myth. It tells you the truth about what it really takes to be an entrepreneur. I mention this book often, but it has a wealth of entrepreneurial info.
share|improve this answer
As a small business law attorney, I've represented hundreds and hundreds of startups across many industries. That experience coupled with my own experience as an entrepreneur has led me to believe that there are 9 critical characteristics of an entrepreneur:
• Tenacity
• Healthy Ego
• Leadership Drive
• Creativity
• Street Smarts
• Coping Skills
• Problem Solving Skills
• Risk Taker
• Common Sense
Certainly, not every entrepreneur has every, single one of these qualities. And clearly, even the ones we do have, are not all at the same level of strength. Furthermore, you may not realize you are strong in one of these areas until you are already "out there" as an entrepreneur. But my point is this---if you read down this list and don't credibly believe that you possess many of these qualities, then you might want to explore whether entrepreneurship is really for you before you leap.
If you're interested in reading article I wrote about this topic, you can find it at http://tinyurl.com/yg9aeqv.
share|improve this answer
A cruel and funny answer may be this...
If you have to ask, you don't.
But truthfully, very little people have what it takes in terms of skills, resources and network when they get started.
Therefore I can only point to persistence and perseverance as a prerequisite quality, very similar to the experiment where they put marshmallows in front of kids and see how long they can hold off before eating them.
share|improve this answer
Felix Dennis, publishing tycoon, wrote a mindblowing article on the mentality of a self-made rich person. I encourage you to read the entire article, but here is one small excerpt:
After a lifetime of making money and ob serving better men and women than me fall by the wayside, I am convinced that fear of failing in the eyes of the world is the single biggest impediment to amassing wealth.
share|improve this answer
I think the best way to do this is to develop your idea to a point where you can gain funding for it. If someone else or a bank is willing to give you start-up money or a loan, they believe you have what it takes. You will never really know unless you try to execute on your ideas.
Best wishes,
Jed
share|improve this answer
Everytime I wonder about this myself, or hear someone say they do, I always remember the autobiography of Sam Walton. It's reassuring to know that even the man did not know what to do early in his business, and only survived through trial and error and learning from others. I believe he only attained what he did because:
1. He loves what he does and he knows it (retail)
2. Work really hard and long - that's why 1. is important
3. Persevere no matter what. He lost his store he built for 5 years because of a simple but grave error and had to start all over again at the age of 32
4. Focus not on yourself, but on customers and associates.
5. He never stopped learning, but kept on improving and improving.
share|improve this answer
the easiest answer is - just do it, try. and don't forget - who that doesn't try doesn't fail.
the more complecate answer is to offer you to go to learn what the process you will need to go through in order to reach to a point where you can rais funds, or open a company.
share|improve this answer
Your Answer
discard
By posting your answer, you agree to the privacy policy and terms of service.
Not the answer you're looking for? Browse other questions tagged or ask your own question.
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T05:23:59.000Z
|
52mfgrrixiyvimszqt3xkp6gookprgar
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:7831",
"uncompressed_offset": 12487607,
"url": "archive.mises.org/5695/hundreds-dead-in-cuban-dengue-outbreak/",
"warc_date": "2013-11-22T14:54:25.000Z",
"warc_filename": "<urn:uuid:538441c1-957d-4877-a7e6-0a4b51ee8825>",
"warc_url": "http://archive.mises.org/5695/hundreds-dead-in-cuban-dengue-outbreak/"
}
|
cccc_CC-MAIN-2013-20
|
1. Skip to navigation
2. Skip to content
3. Skip to sidebar
Source link: http://archive.mises.org/5695/hundreds-dead-in-cuban-dengue-outbreak/
Hundreds Dead in Cuban Dengue Outbreak
September 29, 2006 by
The Caribbean island of Cuba has recently been experiencing a strange outbreak of dengue. This may have resulted in hundreds of deaths throughout the island, something the Castro regime has done little to acknowledge the outbreak. Doctors at hospitals have also been dying from this disease leaving fewer individuals to properly treat patients. José Antonio Fornaris of writes that
In the end, no one can say for certain; the government-controlled media have not acknowledged the spread of the disease while many claim to know of at least one case of the mosquito-borne illness.
Last Monday, Carlos Campos, a 61-year-old physician who was director of the Luis de la Puente Uceda hospital died; some say of heart disease, others claim dengue was the cause of death.
Campos was the chief of the team of doctors performing medical tests on Cubans migrating to the United States.
This is a perfect example of the type of cover-ups associated with these tyrannical communist governments. Castro has refused to comment on the outbreak and has given little aid to the island in order to facilitate the treatment of patients. While the communist elite are in their mansions consuming thousands of dollars in luxury goods a day, the citizenry can not even fight the spread of a preventable disease. Communism is not equal wealth distribution, it is wealth confiscation.
Previous post:
Next post:
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:00:56.000Z
|
5nlzlwlhwytbmbeazcpcaftdokotjiex
|
{
"content_type": "application/xhtml+xml",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:7862",
"uncompressed_offset": 51982810,
"url": "cnx.org/content/m38227/latest/content_info",
"warc_date": "2013-11-22T14:54:25.000Z",
"warc_filename": "<urn:uuid:538441c1-957d-4877-a7e6-0a4b51ee8825>",
"warc_url": "http://cnx.org/content/m38227/latest/content_info"
}
|
cccc_CC-MAIN-2013-20
|
Connexions
Sections
You are here: Home » Content » Åbningsfasen (5x20)
About: Åbningsfasen (5x20)
Module by: Christina Sørensen. E-mail the author
View the content: Åbningsfasen (5x20)
Metadata
Name: Åbningsfasen (5x20)
ID: m38227
Language: Dansk (da)
Subject: Business
License: Creative Commons Attribution License CC-BY 3.0
Authors: Christina Sørensen (Christinas289@hotmail.com)
Copyright Holders: Christina Sørensen (Christinas289@hotmail.com)
Maintainers: Christina Sørensen (Christinas289@hotmail.com)
Latest version: 1.1 (history)
First publication date: May 5, 2011 1:13 pm -0500
Last revision to module: May 6, 2011 3:22 am -0500
Downloads
PDF: m38227_1.1.pdf PDF file, for viewing content offline and printing. Learn more.
EPUB: m38227_1.1.epub Electronic publication file, for viewing in handheld devices. Learn more.
XML: m38227_1.1.cnxml XML that defines the structure and contents of the module, minus any included media files. Can be reimported in the editing interface. Learn more.
Source Export ZIP: m38227_1.1.zip ZIP containing the module XML plus any included media files. Can be reimported in the editing interface. Learn more.
Version History
Version: 1.1 May 6, 2011 3:22 am -0500 by Christina Sørensen
Changes:
En beskrivelse af åbningsfasen
How to Reuse and Attribute This Content
If you derive a copy of this content using a Connexions account and publish your version, proper attribution of the original work will be automatically done for you.
If you reuse this work elsewhere, in order to comply with the attribution requirements of the license (CC-BY 3.0), you must include
• the authors' names: Christina Sørensen
• the title of the work: Åbningsfasen (5x20)
• the Connexions URL where the work can be found: http://cnx.org/content/m38227/1.1/
See the citation section below for examples you can copy.
How to Cite and Attribute This Content
The following citation styles comply with the attribution requirements for the license (CC-BY 3.0) of this work:
American Chemical Society (ACS) Style Guide:
Sørensen, C. Åbningsfasen (5x20), Connexions Web site. http://cnx.org/content/m38227/1.1/, May 6, 2011.
American Medical Assocation (AMA) Manual of Style:
Sørensen C. Åbningsfasen (5x20) [Connexions Web site]. May 6, 2011. Available at: http://cnx.org/content/m38227/1.1/.
American Psychological Assocation (APA) Publication Manual:
Sørensen, C. (2011, May 6). Åbningsfasen (5x20). Retrieved from the Connexions Web site: http://cnx.org/content/m38227/1.1/
Chicago Manual of Style (Bibliography):
Sørensen, Christina. "Åbningsfasen (5x20)." Connexions. May 6, 2011. http://cnx.org/content/m38227/1.1/.
Chicago Manual of Style (Note):
Christina Sørensen, "Åbningsfasen (5x20)," Connexions, May 6, 2011, http://cnx.org/content/m38227/1.1/.
Chicago Manual of Style (Reference, in Author-Date style):
Sørensen, C. 2011. Åbningsfasen (5x20). Connexions, May 6, 2011. http://cnx.org/content/m38227/1.1/.
Modern Languages Association (MLA) Style Manual:
Sørensen, Christina. Åbningsfasen (5x20). Connexions. 6 May 2011 <http://cnx.org/content/m38227/1.1/>.
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T05:59:26.000Z
|
vsa3pfqoavo4kfpzsq6ojyfrco7opvyc
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:7875",
"uncompressed_offset": 76185201,
"url": "dotnetkicks.com/stories/29491/Make_your_Grid_Views_more_fun_by_using_jQuery_Grid",
"warc_date": "2013-11-22T14:54:25.000Z",
"warc_filename": "<urn:uuid:538441c1-957d-4877-a7e6-0a4b51ee8825>",
"warc_url": "http://dotnetkicks.com/stories/29491/Make_your_Grid_Views_more_fun_by_using_jQuery_Grid"
}
|
cccc_CC-MAIN-2013-20
|
Error!
Success!
Make your Grid Views more fun by using jQuery Grid
0
kicks
Make your Grid Views more fun by using jQuery Grid (Unpublished)
Nowadays, you can see AJAX everywhere. All websites are using it widely and because of that, expectation of customers also increased. So, let’s satisfy them by adding a comprehensive AJAX grid view with lots of features. Here I am going to use a jQuery plug-in called jQuery Grid. You can download it from here. It has a nice download manager that allows us to choose which parts should be included in the package and you can add codes you need. Also it has complete documents could be found here. In this post you can find complete introduction of jQuery Grid and also other options that are available with this control.
Kicked By:
Drop Kicked By:
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:46:34.000Z
|
i646m5v3sv4wvhfbz6thqs62zlu4ur37
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:7877",
"uncompressed_offset": 82149903,
"url": "elinux.org/index.php?redirect=no&title=RPi_Keyboard_Layout",
"warc_date": "2013-11-22T14:54:25.000Z",
"warc_filename": "<urn:uuid:538441c1-957d-4877-a7e6-0a4b51ee8825>",
"warc_url": "http://elinux.org/index.php?title=RPi_Keyboard_Layout&redirect=no"
}
|
cccc_CC-MAIN-2013-20
|
RPi Keyboard Layout
From eLinux.org
Jump to: navigation, search
Updated to Raspbian 2012-12-16.
Contents
Available Keyboard Models
pc101 Generic 101-key PC
pc102 Generic 102-key (Intl) PC
pc104 Generic 104-key PC
pc105 Generic 105-key (Intl) PC
dell101 Dell 101-key PC
latitude Dell Latitude series laptop
dellm65 Dell Precision M65
everex Everex STEPnote
flexpro Keytronic FlexPro
microsoft Microsoft Natural
omnikey101 Northgate OmniKey 101
winbook Winbook Model XP5
pc98 PC-98xx Series
a4techKB21 A4Tech KB-21
a4techKBS8 A4Tech KBS-8
a4_rfkb23 A4Tech Wireless Desktop RFKB-23
airkey Acer AirKey V
azonaRF2300 Azona RF2300 wireless Internet Keyboard
scorpius Advance Scorpius KI
brother Brother Internet Keyboard
btc5113rf BTC 5113RF Multimedia
btc5126t BTC 5126T
btc6301urf BTC 6301URF
btc9000 BTC 9000
btc9000a BTC 9000A
btc9001ah BTC 9001AH
btc5090 BTC 5090
btc9019u BTC 9019U
btc9116u BTC 9116U Mini Wireless Internet and Gaming
cherryblue Cherry Blue Line CyBo@rd
cherryblueb Cherry CyMotion Master XPress
cherrybluea Cherry Blue Line CyBo@rd (alternate option)
cherrycyboard Cherry CyBo@rd USB-Hub
cherrycmexpert Cherry CyMotion Expert
cherrybunlim Cherry B.UNLIMITED
chicony Chicony Internet Keyboard
chicony0108 Chicony KU-0108
chicony0420 Chicony KU-0420
chicony9885 Chicony KB-9885
compaqeak8 Compaq Easy Access Keyboard
compaqik7 Compaq Internet Keyboard (7 keys)
compaqik13 Compaq Internet Keyboard (13 keys)
compaqik18 Compaq Internet Keyboard (18 keys)
cymotionlinux Cherry CyMotion Master Linux
armada Laptop/notebook Compaq (eg. Armada) Laptop Keyboard
presario Laptop/notebook Compaq (eg. Presario) Internet Keyboard
ipaq Compaq iPaq Keyboard
dell Dell
dellsk8125 Dell SK-8125
dellsk8135 Dell SK-8135
dellusbmm Dell USB Multimedia Keyboard
inspiron Dell Laptop/notebook Inspiron 6xxx/8xxx
precision_m Dell Laptop/notebook Precision M series
dexxa Dexxa Wireless Desktop Keyboard
diamond Diamond 9801 / 9802 series
dtk2000 DTK2000
ennyah_dkb1008 Ennyah DKB-1008
fscaa1667g Fujitsu-Siemens Computers AMILO laptop
genius Genius Comfy KB-16M / Genius MM Keyboard KWD-910
geniuscomfy Genius Comfy KB-12e
geniuscomfy2 Genius Comfy KB-21e-Scroll
geniuskb19e Genius KB-19e NB
geniuskkb2050hs Genius KKB-2050HS
gyration Gyration
htcdream HTC Dream
kinesis Kinesis
logitech_base Logitech Generic Keyboard
logitech_g15 Logitech G15 extra keys via G15daemon
hpi6 Hewlett-Packard Internet Keyboard
hp250x Hewlett-Packard SK-250x Multimedia Keyboard
hpxe3gc Hewlett-Packard Omnibook XE3 GC
hpxe3gf Hewlett-Packard Omnibook XE3 GF
hpxt1000 Hewlett-Packard Omnibook XT1000
hpdv5 Hewlett-Packard Pavilion dv5
hpzt11xx Hewlett-Packard Pavilion ZT11xx
hp500fa Hewlett-Packard Omnibook 500 FA
hp5xx Hewlett-Packard Omnibook 5xx
hpnx9020 Hewlett-Packard nx9020
hp6000 Hewlett-Packard Omnibook 6000/6100
honeywell_euroboard Honeywell Euroboard
hpmini110 Hewlett-Packard Mini 110 Notebook
rapidaccess IBM Rapid Access
rapidaccess2 IBM Rapid Access II
thinkpad IBM ThinkPad 560Z/600/600E/A22E
thinkpad60 IBM ThinkPad R60/T60/R61/T61
thinkpadz60 IBM ThinkPad Z60m/Z60t/Z61m/Z61t
ibm_spacesaver IBM Space Saver
logiaccess Logitech Access Keyboard
logiclx300 Logitech Cordless Desktop LX-300
logii350 Logitech Internet 350 Keyboard
logimel Logitech Media Elite Keyboard
logicd Logitech Cordless Desktop
logicd_it Logitech Cordless Desktop iTouch
logicd_nav Logitech Cordless Desktop Navigator
logicd_opt Logitech Cordless Desktop Optical
logicda Logitech Cordless Desktop (alternate option)
logicdpa2 Logitech Cordless Desktop Pro (alternate option 2)
logicfn Logitech Cordless Freedom/Desktop Navigator
logicdn Logitech Cordless Desktop Navigator
logiitc Logitech iTouch Cordless Keyboard (model Y-RB6)
logiik Logitech Internet Keyboard
itouch Logitech iTouch
logicink Logitech Internet Navigator Keyboard
logiex110 Logitech Cordless Desktop EX110
logiinkse Logitech iTouch Internet Navigator Keyboard SE
logiinkseusb Logitech iTouch Internet Navigator Keyboard SE (USB)
logiultrax Logitech Ultra-X Keyboard
logiultraxc Logitech Ultra-X Cordless Media Desktop Keyboard
logidinovo Logitech diNovo Keyboard
logidinovoedge Logitech diNovo Edge Keyboard
mx1998 Memorex MX1998
mx2500 Memorex MX2500 EZ-Access Keyboard
mx2750 Memorex MX2750
microsoft4000 Microsoft Natural Wireless Ergonomic Keyboard 4000
microsoft7000 Microsoft Natural Wireless Ergonomic Keyboard 7000
microsoftinet Microsoft Internet Keyboard
microsoftpro Microsoft Natural Keyboard Pro / Microsoft Internet Keyboard Pro
microsoftprousb Microsoft Natural Keyboard Pro USB / Microsoft Internet Keyboard Pro
microsoftprooem Microsoft Natural Keyboard Pro OEM
vsonku306 ViewSonic KU-306 Internet Keyboard
microsoftprose Microsoft Internet Keyboard Pro, Swedish
microsoftoffice Microsoft Office Keyboard
microsoftmult Microsoft Wireless Multimedia Keyboard 1.0A
microsoftelite Microsoft Natural Keyboard Elite
microsoftccurve2k Microsoft Comfort Curve Keyboard 2000
oretec Ortek MCK-800 MM/Internet keyboard
propeller Propeller Voyager (KTEZ-1000)
qtronix QTronix Scorpius 98N+
samsung4500 Samsung SDM 4500P
samsung4510 Samsung SDM 4510P
sanwaskbkg3 Sanwa Supply SKB-KG3
sk1300 SK-1300
sk2500 SK-2500
sk6200 SK-6200
sk7100 SK-7100
sp_inet Super Power Multimedia Keyboard
sven SVEN Ergonomic 2500
sven303 SVEN Slim 303
symplon Symplon PaceBook (tablet PC)
toshiba_s3000 Toshiba Satellite S3000
trust Trust Wireless Keyboard Classic
trustda Trust Direct Access Keyboard
trust_slimline Trust Slimline
tm2020 TypeMatrix EZ-Reach 2020
tm2030PS2 TypeMatrix EZ-Reach 2030 PS2
tm2030USB TypeMatrix EZ-Reach 2030 USB
tm2030USB-102 TypeMatrix EZ-Reach 2030 USB (102/105:EU mode)
tm2030USB-106 TypeMatrix EZ-Reach 2030 USB (106:JP mode)
yahoo Yahoo! Internet Keyboard
macbook78 MacBook/MacBook Pro
macbook79 MacBook/MacBook Pro (Intl)
macintosh Macintosh
macintosh_old Macintosh Old
macintosh_hhk Happy Hacking Keyboard for Mac
acer_c300 Acer C300
acer_ferrari4k Acer Ferrari 4000
acer_laptop Acer Laptop
asus_laptop Asus Laptop
apple Apple
apple_laptop Apple Laptop
applealu_ansi Apple Aluminium Keyboard (ANSI)
applealu_iso Apple Aluminium Keyboard (ISO)
applealu_jis Apple Aluminium Keyboard (JIS)
silvercrest SILVERCREST Multimedia Wireless Keyboard
emachines Laptop/notebook eMachines m68xx
benqx BenQ X-Touch
benqx730 BenQ X-Touch 730
benqx800 BenQ X-Touch 800
hhk Happy Hacking Keyboard
classmate Classmate PC
olpc OLPC
sun6 Sun Type 5/6
targa_v811 Targa Visionary 811
unitekkb1925 Unitek KB-1925
compalfl90 FL90
creativedw7000 Creative Desktop Wireless 7000
htcdream Htc Dream phone
Available Keyboard Layouts
Basic Layouts
us English (US)
ad Catalan
af Afghani
ara Arabic
al Albanian
am Armenian
at German (Austria)
az Azerbaijani
by Belarusian
be Belgian
bd Bengali
in Indian
ba Bosnian
br Portuguese (Brazil)
bg Bulgarian
ma Arabic (Morocco)
cm English (Cameroon)
mm Burmese
ca French (Canada)
cd French (Democratic Republic of the Congo)
cn Chinese
hr Croatian
cz Czech
dk Danish
nl Dutch
bt Dzongkha
ee Estonian
ir Persian
iq Iraqi
fo Faroese
fi Finnish
fr French
gh English (Ghana)
gn French (Guinea)
ge Georgian
de German
gr Greek
hu Hungarian
is Icelandic
il Hebrew
it Italian
jp Japanese
kg Kyrgyz
kh Khmer (Cambodia)
kz Kazakh
la Lao
latam Spanish (Latin American)
lt Lithuanian
lv Latvian
mao Maori
me Montenegrin
mk Macedonian
mt Maltese
mn Mongolian
no Norwegian
pl Polish
pt Portuguese
ro Romanian
ru Russian
rs Serbian (Cyrillic)
si Slovenian
sk Slovak
es Spanish
se Swedish
ch German (Switzerland)
sy Arabic (Syria)
tj Tajik
lk Sinhala (phonetic)
th Thai
tr Turkish
tw Taiwanese
ua Ukrainian
gb English (UK)
uz Uzbek
vn Vietnamese
kr Korean
nec_vndr/jp Japanese (PC-98xx Series)
ie Irish
pk Urdu (Pakistan)
mv Dhivehi
za English (South Africa)
epo Esperanto
np Nepali
ng English (Nigeria)
et Amharic
sn Wolof
brai Braille
tm Turkmen
ml Bambara
tz Swahili (Tanzania)
ke Swahili (Kenya)
bw Tswana
ph Filipino
Layout Variants
chr us: Cherokee
euro us: English (US, with euro on 5)
intl us: English (US, international with dead keys)
alt-intl us: English (US, alternative international)
colemak us: English (Colemak)
dvorak us: English (Dvorak)
dvorak-intl us: English (Dvorak international with dead keys)
dvorak-alt-intl us: English (Dvorak alternative international no dead keys)
dvorak-l us: English (left handed Dvorak)
dvorak-r us: English (right handed Dvorak)
dvorak-classic us: English (classic Dvorak)
dvp us: English (programmer Dvorak)
rus us: Russian (US, phonetic)
mac us: English (Macintosh)
altgr-intl us: English (international AltGr dead keys)
olpc2 us: English (layout toggle on multiply/divide key)
hbs us: Serbo-Croatian (US)
ps af: Pashto
uz af: Uzbek (Afghanistan)
olpc-ps af: Pashto (Afghanistan, OLPC)
fa-olpc af: Persian (Afghanistan, Dari OLPC)
uz-olpc af: Uzbek (Afghanistan, OLPC)
azerty ara: Arabic (azerty)
azerty_digits ara: Arabic (azerty/digits)
digits ara: Arabic (digits)
qwerty ara: Arabic (qwerty)
qwerty_digits ara: Arabic (qwerty/digits)
buckwalter ara: Arabic (Buckwalter)
phonetic am: Armenian (phonetic)
phonetic-alt am: Armenian (alternative phonetic)
eastern am: Armenian (eastern)
western am: Armenian (western)
eastern-alt am: Armenian (alternative eastern)
nodeadkeys at: German (Austria, eliminate dead keys)
sundeadkeys at: German (Austria, Sun dead keys)
mac at: German (Austria, Macintosh)
cyrillic az: Azerbaijani (Cyrillic)
legacy by: Belarusian (legacy)
latin by: Belarusian (Latin)
oss be: Belgian (alternative)
oss_latin9 be: Belgian (alternative, latin-9 only)
oss_sundeadkeys be: Belgian (alternative, Sun dead keys)
iso-alternate be: Belgian (ISO alternate)
nodeadkeys be: Belgian (eliminate dead keys)
sundeadkeys be: Belgian (Sun dead keys)
wang be: Belgian (Wang model 724 azerty)
probhat bd: Bengali (Probhat)
ben in: Bengali (India)
ben_probhat in: Bengali (India, Probhat)
ben_baishakhi in: Bengali (India, Baishakhi)
ben_bornona in: Bengali (India, Bornona)
ben_gitanjali in: Bengali (India, Uni Gitanjali)
ben_inscript in: Bengali (India, Baishakhi Inscript)
guj in: Gujarati
guru in: Punjabi (Gurmukhi)
jhelum in: Punjabi (Gurmukhi Jhelum)
kan in: Kannada
mal in: Malayalam
mal_lalitha in: Malayalam (Lalitha)
mal_enhanced in: Malayalam (enhanced Inscript with Rupee Sign)
ori in: Oriya
tam_unicode in: Tamil (Unicode)
tam_keyboard_with_numerals in: Tamil (keyboard with numerals)
tam_TAB in: Tamil (TAB typewriter)
tam_TSCII in: Tamil (TSCII typewriter)
tam in: Tamil
tel in: Telugu
urd-phonetic in: Urdu (phonetic)
urd-phonetic3 in: Urdu (alternative phonetic)
urd-winkeys in: Urdu (WinKeys)
bolnagri in: Hindi (Bolnagri)
hin-wx in: Hindi (Wx)
eng in: English (India, with RupeeSign)
alternatequotes ba: Bosnian (use guillemets for quotes)
unicode ba: Bosnian (use Bosnian digraphs)
unicodeus ba: Bosnian (US keyboard with Bosnian digraphs)
us ba: Bosnian (US keyboard with Bosnian letters)
nodeadkeys br: Portuguese (Brazil, eliminate dead keys)
dvorak br: Portuguese (Brazil, Dvorak)
nativo br: Portuguese (Brazil, nativo)
nativo-us br: Portuguese (Brazil, nativo for USA keyboards)
nativo-epo br: Portuguese (Brazil, nativo for Esperanto)
phonetic bg: Bulgarian (traditional phonetic)
bas_phonetic bg: Bulgarian (new phonetic)
french ma: French (Morocco)
tifinagh ma: Berber (Morocco, Tifinagh)
tifinagh-alt ma: Berber (Morocco, Tifinagh alternative)
tifinagh-alt-phonetic ma: Berber (Morocco, Tifinagh alternative phonetic)
tifinagh-extended ma: Berber (Morocco, Tifinagh extended)
tifinagh-phonetic ma: Berber (Morocco, Tifinagh phonetic)
tifinagh-extended-phonetic ma: Berber (Morocco, Tifinagh extended phonetic)
french cm: French (Cameroon)
qwerty cm: Cameroon Multilingual (qwerty)
azerty cm: Cameroon Multilingual (azerty)
dvorak cm: Cameroon Multilingual (Dvorak)
fr-dvorak ca: French (Canada, Dvorak)
fr-legacy ca: French (Canada, legacy)
multix ca: Canadian Multilingual
multi ca: Canadian Multilingual (first part)
multi-2gr ca: Canadian Multilingual (second part)
ike ca: Inuktitut
eng ca: English (Canada)
tib cn: Tibetan
tib_asciinum cn: Tibetan (with ASCII numerals)
uig cn: Uyghur
alternatequotes hr: Croatian (use guillemets for quotes)
unicode hr: Croatian (use Croatian digraphs)
unicodeus hr: Croatian (US keyboard with Croatian digraphs)
us hr: Croatian (US keyboard with Croatian letters)
bksl cz: Czech (with <\|> key)
qwerty cz: Czech (qwerty)
qwerty_bksl cz: Czech (qwerty, extended Backslash)
ucw cz: Czech (UCW layout, accented letters only)
dvorak-ucw cz: Czech (US Dvorak with CZ UCW support)
nodeadkeys dk: Danish (eliminate dead keys)
mac dk: Danish (Macintosh)
mac_nodeadkeys dk: Danish (Macintosh, eliminate dead keys)
dvorak dk: Danish (Dvorak)
sundeadkeys nl: Dutch (Sun dead keys)
mac nl: Dutch (Macintosh)
std nl: Dutch (standard)
nodeadkeys ee: Estonian (eliminate dead keys)
dvorak ee: Estonian (Dvorak)
us ee: Estonian (US keyboard with Estonian letters)
pes_keypad ir: Persian (with Persian Keypad)
ku ir: Kurdish (Iran, Latin Q)
ku_f ir: Kurdish (Iran, F)
ku_alt ir: Kurdish (Iran, Latin Alt-Q)
ku_ara ir: Kurdish (Iran, Arabic-Latin)
ku iq: Kurdish (Iraq, Latin Q)
ku_f iq: Kurdish (Iraq, F)
ku_alt iq: Kurdish (Iraq, Latin Alt-Q)
ku_ara iq: Kurdish (Iraq, Arabic-Latin)
nodeadkeys fo: Faroese (eliminate dead keys)
classic fi: Finnish (classic)
nodeadkeys fi: Finnish (classic, eliminate dead keys)
smi fi: Northern Saami (Finland)
mac fi: Finnish (Macintosh)
nodeadkeys fr: French (eliminate dead keys)
sundeadkeys fr: French (Sun dead keys)
oss fr: French (alternative)
oss_latin9 fr: French (alternative, latin-9 only)
oss_nodeadkeys fr: French (alternative, eliminate dead keys)
oss_sundeadkeys fr: French (alternative, Sun dead keys)
latin9 fr: French (legacy, alternative)
latin9_nodeadkeys fr: French (legacy, alternative, eliminate dead keys)
latin9_sundeadkeys fr: French (legacy, alternative, Sun dead keys)
bepo fr: French (Bepo, ergonomic, Dvorak way)
bepo_latin9 fr: French (Bepo, ergonomic, Dvorak way, latin-9 only)
dvorak fr: French (Dvorak)
mac fr: French (Macintosh)
bre fr: French (Breton)
oci fr: Occitan
geo fr: Georgian (France, AZERTY Tskapo)
generic gh: English (Ghana, multilingual)
akan gh: Akan
ewe gh: Ewe
fula gh: Fula
ga gh: Ga
hausa gh: Hausa
avn gh: Avatime
gillbt gh: English (Ghana, GILLBT)
ergonomic ge: Georgian (ergonomic)
mess ge: Georgian (MESS)
ru ge: Russian (Georgia)
os ge: Ossetian (Georgia)
deadacute de: German (dead acute)
deadgraveacute de: German (dead grave acute)
nodeadkeys de: German (eliminate dead keys)
ro de: Romanian (Germany)
ro_nodeadkeys de: Romanian (Germany, eliminate dead keys)
dvorak de: German (Dvorak)
sundeadkeys de: German (Sun dead keys)
neo de: German (Neo 2)
mac de: German (Macintosh)
mac_nodeadkeys de: German (Macintosh, eliminate dead keys)
dsb de: Lower Sorbian
dsb_qwertz de: Lower Sorbian (qwertz)
ru de: Russian (Germany, phonetic)
simple gr: Greek (simple)
extended gr: Greek (extended)
nodeadkeys gr: Greek (eliminate dead keys)
polytonic gr: Greek (polytonic)
standard hu: Hungarian (standard)
nodeadkeys hu: Hungarian (eliminate dead keys)
qwerty hu: Hungarian (qwerty)
101_qwertz_comma_dead hu: Hungarian (101/qwertz/comma/dead keys)
101_qwertz_comma_nodead hu: Hungarian (101/qwertz/comma/eliminate dead keys)
101_qwertz_dot_dead hu: Hungarian (101/qwertz/dot/dead keys)
101_qwertz_dot_nodead hu: Hungarian (101/qwertz/dot/eliminate dead keys)
101_qwerty_comma_dead hu: Hungarian (101/qwerty/comma/dead keys)
101_qwerty_comma_nodead hu: Hungarian (101/qwerty/comma/eliminate dead keys)
101_qwerty_dot_dead hu: Hungarian (101/qwerty/dot/dead keys)
101_qwerty_dot_nodead hu: Hungarian (101/qwerty/dot/eliminate dead keys)
102_qwertz_comma_dead hu: Hungarian (102/qwertz/comma/dead keys)
102_qwertz_comma_nodead hu: Hungarian (102/qwertz/comma/eliminate dead keys)
102_qwertz_dot_dead hu: Hungarian (102/qwertz/dot/dead keys)
102_qwertz_dot_nodead hu: Hungarian (102/qwertz/dot/eliminate dead keys)
102_qwerty_comma_dead hu: Hungarian (102/qwerty/comma/dead keys)
102_qwerty_comma_nodead hu: Hungarian (102/qwerty/comma/eliminate dead keys)
102_qwerty_dot_dead hu: Hungarian (102/qwerty/dot/dead keys)
102_qwerty_dot_nodead hu: Hungarian (102/qwerty/dot/eliminate dead keys)
Sundeadkeys is: Icelandic (Sun dead keys)
nodeadkeys is: Icelandic (eliminate dead keys)
mac is: Icelandic (Macintosh)
dvorak is: Icelandic (Dvorak)
lyx il: Hebrew (lyx)
phonetic il: Hebrew (phonetic)
biblical il: Hebrew (Biblical, Tiro)
nodeadkeys it: Italian (eliminate dead keys)
mac it: Italian (Macintosh)
us it: Italian (US keyboard with Italian letters)
geo it: Georgian (Italy)
kana jp: Japanese (Kana)
kana86 jp: Japanese (Kana 86)
OADG109A jp: Japanese (OADG 109A)
mac jp: Japanese (Macintosh)
phonetic kg: Kyrgyz (phonetic)
ruskaz kz: Russian (Kazakhstan, with Kazakh)
kazrus kz: Kazakh (with Russian)
stea la: Lao (STEA proposed standard layout)
nodeadkeys latam: Spanish (Latin American, eliminate dead keys)
deadtilde latam: Spanish (Latin American, include dead tilde)
sundeadkeys latam: Spanish (Latin American, Sun dead keys)
std lt: Lithuanian (standard)
us lt: Lithuanian (US keyboard with Lithuanian letters)
ibm lt: Lithuanian (IBM LST 1205-92)
lekp lt: Lithuanian (LEKP)
lekpa lt: Lithuanian (LEKPa)
apostrophe lv: Latvian (apostrophe variant)
tilde lv: Latvian (tilde variant)
fkey lv: Latvian (F variant)
modern lv: Latvian (modern)
ergonomic lv: Latvian (ergonomic, ŪGJRMV)
adapted lv: Latvian (adapted)
cyrillic me: Montenegrin (Cyrillic)
cyrillicyz me: Montenegrin (Cyrillic, Z and ZHE swapped)
latinunicode me: Montenegrin (Latin Unicode)
latinyz me: Montenegrin (Latin qwerty)
latinunicodeyz me: Montenegrin (Latin Unicode qwerty)
cyrillicalternatequotes me: Montenegrin (Cyrillic with guillemets)
latinalternatequotes me: Montenegrin (Latin with guillemets)
nodeadkeys mk: Macedonian (eliminate dead keys)
us mt: Maltese (with US layout)
nodeadkeys no: Norwegian (eliminate dead keys)
dvorak no: Norwegian (Dvorak)
smi no: Northern Saami (Norway)
smi_nodeadkeys no: Northern Saami (Norway, eliminate dead keys)
mac no: Norwegian (Macintosh)
mac_nodeadkeys no: Norwegian (Macintosh, eliminate dead keys)
qwertz pl: Polish (qwertz)
dvorak pl: Polish (Dvorak)
dvorak_quotes pl: Polish (Dvorak, Polish quotes on quotemark key)
dvorak_altquotes pl: Polish (Dvorak, Polish quotes on key 1)
csb pl: Kashubian
ru_phonetic_dvorak pl: Russian (Poland, phonetic Dvorak)
dvp pl: Polish (programmer Dvorak)
nodeadkeys pt: Portuguese (eliminate dead keys)
sundeadkeys pt: Portuguese (Sun dead keys)
mac pt: Portuguese (Macintosh)
mac_nodeadkeys pt: Portuguese (Macintosh, eliminate dead keys)
mac_sundeadkeys pt: Portuguese (Macintosh, Sun dead keys)
nativo pt: Portuguese (Nativo)
nativo-us pt: Portuguese (Nativo for USA keyboards)
nativo-epo pt: Esperanto (Portugal, Nativo)
cedilla ro: Romanian (cedilla)
std ro: Romanian (standard)
std_cedilla ro: Romanian (standard cedilla)
winkeys ro: Romanian (WinKeys)
phonetic ru: Russian (phonetic)
phonetic_winkeys ru: Russian (phonetic WinKeys)
typewriter ru: Russian (typewriter)
legacy ru: Russian (legacy)
typewriter-legacy ru: Russian (typewriter, legacy)
tt ru: Tatar
os_legacy ru: Ossetian (legacy)
os_winkeys ru: Ossetian (WinKeys)
cv ru: Chuvash
cv_latin ru: Chuvash (Latin)
udm ru: Udmurt
kom ru: Komi
sah ru: Yakut
xal ru: Kalmyk
dos ru: Russian (DOS)
srp ru: Serbian (Russia)
bak ru: Bashkirian
chm ru: Mari
yz rs: Serbian (Cyrillic, Z and ZHE swapped)
latin rs: Serbian (Latin)
latinunicode rs: Serbian (Latin Unicode)
latinyz rs: Serbian (Latin qwerty)
latinunicodeyz rs: Serbian (Latin Unicode qwerty)
alternatequotes rs: Serbian (Cyrillic with guillemets)
latinalternatequotes rs: Serbian (Latin with guillemets)
rue rs: Pannonian Rusyn (homophonic)
alternatequotes si: Slovenian (use guillemets for quotes)
us si: Slovenian (US keyboard with Slovenian letters)
bksl sk: Slovak (extended Backslash)
qwerty sk: Slovak (qwerty)
qwerty_bksl sk: Slovak (qwerty, extended Backslash)
nodeadkeys es: Spanish (eliminate dead keys)
deadtilde es: Spanish (include dead tilde)
sundeadkeys es: Spanish (Sun dead keys)
dvorak es: Spanish (Dvorak)
ast es: Asturian (Spain, with bottom-dot H and bottom-dot L)
cat es: Catalan (Spain, with middle-dot L)
mac es: Spanish (Macintosh)
nodeadkeys se: Swedish (eliminate dead keys)
dvorak se: Swedish (Dvorak)
rus se: Russian (Sweden, phonetic)
rus_nodeadkeys se: Russian (Sweden, phonetic, eliminate dead keys)
smi se: Northern Saami (Sweden)
mac se: Swedish (Macintosh)
svdvorak se: Swedish (Svdvorak)
swl se: Swedish Sign Language
legacy ch: German (Switzerland, legacy)
de_nodeadkeys ch: German (Switzerland, eliminate dead keys)
de_sundeadkeys ch: German (Switzerland, Sun dead keys)
fr ch: French (Switzerland)
fr_nodeadkeys ch: French (Switzerland, eliminate dead keys)
fr_sundeadkeys ch: French (Switzerland, Sun dead keys)
fr_mac ch: French (Switzerland, Macintosh)
de_mac ch: German (Switzerland, Macintosh)
syc sy: Syriac
syc_phonetic sy: Syriac (phonetic)
ku sy: Kurdish (Syria, Latin Q)
ku_f sy: Kurdish (Syria, F)
ku_alt sy: Kurdish (Syria, Latin Alt-Q)
legacy tj: Tajik (legacy)
tam_unicode lk: Tamil (Sri Lanka, Unicode)
tam_TAB lk: Tamil (Sri Lanka, TAB Typewriter)
tis th: Thai (TIS-820.2538)
pat th: Thai (Pattachote)
f tr: Turkish (F)
alt tr: Turkish (Alt-Q)
sundeadkeys tr: Turkish (Sun dead keys)
ku tr: Kurdish (Turkey, Latin Q)
ku_f tr: Kurdish (Turkey, F)
ku_alt tr: Kurdish (Turkey, Latin Alt-Q)
intl tr: Turkish (international with dead keys)
crh tr: Crimean Tatar (Turkish Q)
crh_f tr: Crimean Tatar (Turkish F)
crh_alt tr: Crimean Tatar (Turkish Alt-Q)
indigenous tw: Taiwanese (indigenous)
saisiyat tw: Saisiyat (Taiwan)
phonetic ua: Ukrainian (phonetic)
typewriter ua: Ukrainian (typewriter)
winkeys ua: Ukrainian (WinKeys)
legacy ua: Ukrainian (legacy)
rstu ua: Ukrainian (standard RSTU)
rstu_ru ua: Russian (Ukraine, standard RSTU)
homophonic ua: Ukrainian (homophonic)
extd gb: English (UK, extended WinKeys)
intl gb: English (UK, international with dead keys)
dvorak gb: English (UK, Dvorak)
dvorakukp gb: English (UK, Dvorak with UK punctuation)
mac gb: English (UK, Macintosh)
mac_intl gb: English (UK, Macintosh international)
colemak gb: English (UK, Colemak)
latin uz: Uzbek (Latin)
kr104 kr: Korean (101/104 key compatible)
CloGaelach ie: CloGaelach
UnicodeExpert ie: Irish (UnicodeExpert)
ogam ie: Ogham
ogam_is434 ie: Ogham (IS434)
urd-crulp pk: Urdu (Pakistan, CRULP)
urd-nla pk: Urdu (Pakistan, NLA)
ara pk: Arabic (Pakistan)
snd pk: Sindhi
legacy epo: Esperanto (displaced semicolon and quote, obsolete)
igbo ng: Igbo
yoruba ng: Yoruba
hausa ng: Hausa
left_hand brai: Braille (left hand)
right_hand brai: Braille (right hand)
alt tm: Turkmen (Alt-Q)
fr-oss ml: French (Mali, alternative)
us-mac ml: English (Mali, US Macintosh)
us-intl ml: English (Mali, US international)
kik ke: Kikuyu
qwerty-bay ph: Filipino (QWERTY Baybayin)
capewell-dvorak ph: Filipino (Capewell-Dvorak Latin)
capewell-dvorak-bay ph: Filipino (Capewell-Dvorak Baybayin)
capewell-qwerf2k6 ph: Filipino (Capewell-QWERF 2006 Latin)
capewell-qwerf2k6-bay ph: Filipino (Capewell-QWERF 2006 Baybayin)
colemak ph: Filipino (Colemak Latin)
colemak-bay ph: Filipino (Colemak Baybayin)
dvorak ph: Filipino (Dvorak Latin)
dvorak-bay ph: Filipino (Dvorak Baybayin)
Available Keyboard Options
grp Key(s) to change layout
grp:switch Right Alt (while pressed)
grp:lswitch Left Alt (while pressed)
grp:lwin_switch Left Win (while pressed)
grp:rwin_switch Right Win (while pressed)
grp:win_switch Any Win key (while pressed)
grp:caps_switch Caps Lock (while pressed), Alt+Caps Lock does the original capslock action
grp:rctrl_switch Right Ctrl (while pressed)
grp:toggle Right Alt
grp:lalt_toggle Left Alt
grp:caps_toggle Caps Lock
grp:shift_caps_toggle Shift+Caps Lock
grp:shift_caps_switch Caps Lock (to first layout), Shift+Caps Lock (to last layout)
grp:win_menu_switch Left Win (to first layout), Right Win/Menu (to last layout)
grp:lctrl_rctrl_switch Left Ctrl (to first layout), Right Ctrl (to last layout)
grp:alt_caps_toggle Alt+Caps Lock
grp:shifts_toggle Both Shift keys together
grp:alts_toggle Both Alt keys together
grp:ctrls_toggle Both Ctrl keys together
grp:ctrl_shift_toggle Ctrl+Shift
grp:lctrl_lshift_toggle Left Ctrl+Left Shift
grp:rctrl_rshift_toggle Right Ctrl+Right Shift
grp:ctrl_alt_toggle Alt+Ctrl
grp:alt_shift_toggle Alt+Shift
grp:lalt_lshift_toggle Left Alt+Left Shift
grp:alt_space_toggle Alt+Space
grp:menu_toggle Menu
grp:lwin_toggle Left Win
grp:rwin_toggle Right Win
grp:lshift_toggle Left Shift
grp:rshift_toggle Right Shift
grp:lctrl_toggle Left Ctrl
grp:rctrl_toggle Right Ctrl
grp:sclk_toggle Scroll Lock
grp:lctrl_lwin_rctrl_menu LeftCtrl+LeftWin (to first layout), RightCtrl+Menu (to second layout)
lv3 Key to choose 3rd level
lv3:switch Right Ctrl
lv3:menu_switch Menu
lv3:win_switch Any Win key
lv3:lwin_switch Left Win
lv3:rwin_switch Right Win
lv3:alt_switch Any Alt key
lv3:lalt_switch Left Alt
lv3:ralt_switch Right Alt
lv3:ralt_switch_multikey Right Alt, Shift+Right Alt key is Multi_Key
lv3:ralt_alt Right Alt key never chooses 3rd level
lv3:enter_switch Enter on keypad
lv3:caps_switch Caps Lock
lv3:bksl_switch Backslash
lv3:lsgt_switch <Less/Greater>
lv3:caps_switch_latch Caps Lock chooses 3rd level, acts as onetime lock when pressed together with another 3rd-level-chooser
lv3:bksl_switch_latch Backslash chooses 3rd level, acts as onetime lock when pressed together with another 3rd-level-chooser
lv3:lsgt_switch_latch <Less/Greater> chooses 3rd level, acts as onetime lock when pressed together with another 3rd-level-chooser
ctrl Ctrl key position
ctrl:nocaps Caps Lock as Ctrl
ctrl:lctrl_meta Left Ctrl as Meta
ctrl:swapcaps Swap Ctrl and Caps Lock
ctrl:ac_ctrl At left of 'A'
ctrl:aa_ctrl At bottom left
ctrl:rctrl_ralt Right Ctrl as Right Alt
ctrl:menu_rctrl Menu as Right Ctrl
ctrl:ctrl_ralt Right Alt as Right Ctrl
grp_led Use keyboard LED to show alternative layout
grp_led:num Num Lock
grp_led:caps Caps Lock
grp_led:scroll Scroll Lock
keypad Numeric keypad layout selection
keypad:legacy Legacy
keypad:oss Unicode additions (arrows and math operators)
keypad:future Unicode additions (arrows and math operators). Math operators on default level
keypad:legacy_wang Legacy Wang 724
keypad:oss_wang Wang 724 keypad with Unicode additions (arrows and math operators)
keypad:future_wang Wang 724 keypad with Unicode additions (arrows and math operators). Math operators on default level
keypad:hex Hexadecimal
keypad:atm ATM/phone-style
kpdl Numeric keypad delete key behaviour
kpdl:dot Legacy key with dot
kpdl:comma Legacy key with comma
kpdl:dotoss Four-level key with dot
kpdl:dotoss_latin9 Four-level key with dot, latin-9 restriction
kpdl:commaoss Four-level key with comma
kpdl:momayyezoss Four-level key with momayyez
kpdl:kposs Four-level key with abstract separators
kpdl:semi Semi-colon on third level
caps Caps Lock key behavior
caps:internal Caps Lock uses internal capitalization. Shift "pauses" Caps Lock
caps:internal_nocancel Caps Lock uses internal capitalization. Shift doesn't affect Caps Lock
caps:shift Caps Lock acts as Shift with locking. Shift "pauses" Caps Lock
caps:shift_nocancel Caps Lock acts as Shift with locking. Shift doesn't affect Caps Lock
caps:capslock Caps Lock toggles normal capitalization of alphabetic characters
caps:numlock Make Caps Lock an additional Num Lock
caps:swapescape Swap ESC and Caps Lock
caps:escape Make Caps Lock an additional ESC
caps:backspace Make Caps Lock an additional Backspace
caps:super Make Caps Lock an additional Super
caps:hyper Make Caps Lock an additional Hyper
caps:shiftlock Caps Lock toggles Shift so all keys are affected
caps:none Caps Lock is disabled
caps:ctrl_modifier Make Caps Lock an additional Control but keep the Caps_Lock keysym
altwin Alt/Win key behavior
altwin:menu Add the standard behavior to Menu key
altwin:meta_alt Alt and Meta are on Alt keys
altwin:ctrl_win Control is mapped to Win keys (and the usual Ctrl keys)
altwin:ctrl_alt_win Control is mapped to Alt keys, Alt is mapped to Win keys
altwin:meta_win Meta is mapped to Win keys
altwin:left_meta_win Meta is mapped to Left Win
altwin:hyper_win Hyper is mapped to Win-keys
altwin:alt_super_win Alt is mapped to Right Win, Super to Menu
altwin:swap_lalt_lwin Left Alt is swapped with Left Win
Compose key Compose key position
compose:ralt Right Alt
compose:lwin Left Win
compose:rwin Right Win
compose:menu Menu
compose:lctrl Left Ctrl
compose:rctrl Right Ctrl
compose:caps Caps Lock
compose:102 <Less/Greater>
compose:paus Pause
compose:prsc PrtSc
compose:sclk Scroll Lock
compat Miscellaneous compatibility options
numpad:pc Default numeric keypad keys
numpad:mac Numeric keypad keys always enter digits (as in Mac OS)
numpad:microsoft Shift with numeric keypad keys works as in MS Windows
numpad:shift3 Shift does not cancel Num Lock, chooses 3rd level instead
srvrkeys:none Special keys (Ctrl+Alt+<key>) handled in a server
apple:alupckeys Apple Aluminium Keyboard: emulate PC keys (Print, Scroll Lock, Pause, Num Lock)
shift:breaks_caps Shift cancels Caps Lock
misc:typo Enable extra typographic characters
shift:both_capslock Both Shift-Keys together toggle Caps Lock
shift:both_capslock_cancel Both Shift-Keys together activate Caps Lock, one Shift-Key deactivates
shift:both_shiftlock Both Shift-Keys together toggle ShiftLock
keypad:pointerkeys Toggle PointerKeys with Shift + NumLock.
grab:break_actions Allow breaking grabs with keyboard actions (warning: security risk)
eurosign Adding currency signs to certain keys
eurosign:e Euro on E
eurosign:2 Euro on 2
eurosign:4 Euro on 4
eurosign:5 Euro on 5
rupeesign:4 Rupee on 4
lv5 Key to choose 5th level
lv5:lsgt_switch_lock <Less/Greater> chooses 5th level, locks when pressed together with another 5th-level-chooser
lv5:ralt_switch_lock Right Alt chooses 5th level, locks when pressed together with another 5th-level-chooser
lv5:lwin_switch_lock Left Win chooses 5th level, locks when pressed together with another 5th-level-chooser
lv5:rwin_switch_lock Right Win chooses 5th level, locks when pressed together with another 5th-level-chooser
nbsp Using space key to input non-breakable space character
nbsp:none Usual space at any level
nbsp:level2 Non-breakable space character at second level
nbsp:level3 Non-breakable space character at third level
nbsp:level3s Non-breakable space character at third level, nothing at fourth level
nbsp:level3n Non-breakable space character at third level, thin non-breakable space character at fourth level
nbsp:level4 Non-breakable space character at fourth level
nbsp:level4n Non-breakable space character at fourth level, thin non-breakable space character at sixth level
nbsp:level4nl Non-breakable space character at fourth level, thin non-breakable space character at sixth level (via Ctrl+Shift)
nbsp:zwnj2 Zero-width non-joiner character at second level
nbsp:zwnj2zwj3 Zero-width non-joiner character at second level, zero-width joiner character at third level
nbsp:zwnj2zwj3nb4 Zero-width non-joiner character at second level, zero-width joiner character at third level, non-breakable space character at fourth level
nbsp:zwnj2nb3 Zero-width non-joiner character at second level, non-breakable space character at third level
nbsp:zwnj2nb3s Zero-width non-joiner character at second level, non-breakable space character at third level, nothing at fourth level
nbsp:zwnj2nb3zwj4 Zero-width non-joiner character at second level, non-breakable space character at third level, zero-width joiner at fourth level
nbsp:zwnj2nb3nnb4 Zero-width non-joiner character at second level, non-breakable space character at third level, thin non-breakable space at fourth level
nbsp:zwnj3zwj4 Zero-width non-joiner character at third level, zero-width joiner at fourth level
japan Japanese keyboard options
japan:kana_lock Kana Lock key is locking
japan:nicola_f_bs NICOLA-F style Backspace
japan:hztg_escape Make Zenkaku Hankaku an additional ESC
esperanto Adding Esperanto circumflexes (supersigno)
esperanto:qwerty To the corresponding key in a Qwerty keyboard.
esperanto:dvorak To the corresponding key in a Dvorak keyboard.
terminate Key sequence to kill the X server
terminate:ctrl_alt_bksp Control + Alt + Backspace
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T05:25:33.000Z
|
ryc2novlkgiekzvom6g3tf4o7l5vhi4w
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:7885",
"uncompressed_offset": 91681840,
"url": "familysearch.org/learn/wiki/en/2nd_Regiment,_Illinois_Cavalry",
"warc_date": "2013-11-22T14:54:25.000Z",
"warc_filename": "<urn:uuid:538441c1-957d-4877-a7e6-0a4b51ee8825>",
"warc_url": "http://familysearch.org/learn/wiki/en/2nd_Regiment,_Illinois_Cavalry"
}
|
cccc_CC-MAIN-2013-20
|
2nd Regiment, Illinois CavalryEdit This Page
From FamilySearch Wiki
United States U.S. Military Illinois Illinois Military Illinois in the Civil War 2nd Regiment, Illinois Cavalry
Contents
Brief History
The 2nd Regiment, Illinois Cavalry was organized at Camp Butler, Ill., and mustered in August 12, 1861. They mustered out November 22, 1865, and were discharged at Springfield, Ill., January 3, 1866.[1]
For more information on the history of this unit, see:
The Civil War Archive section, 2nd Regiment Illinois Volunteer Cavalry, (accessed 13 June 2012).
The Wikipedia article,2nd Regiment Illinois Volunteer Cavalry [1] accessed 15 June 2012).
Companies in this Regiment with the Counties of Origin
Men often enlisted in a company recruited in the counties where they lived though not always. After many battles, companies might be combined because so many men were killed or wounded. However if you are unsure which company your ancestor was in, try the company recruited in his county first.
The following counties of origin are taken from the Adjutant General's Report, found on the Illinois Civil War Rosters web site. Roster pages are from the same report found on the Internet Archives web site. The rosters show the men who served in each regiment, their residences, dates of enlistment and mustering out, and other remarks.
Company A - many men from DeWitt County and Ogle County (Also Known as Logan's Escort, Ord's Escort, Stevenson's Escort) - DeWitt and Ogle county web sites - Roster, vol. 7, pages 488-490.
Company B - many men from Logan County (Also Known as Quinby's Escort) - Logan County web site - Roster, vol. 7, pages 490-493.
Company C - many men from Mason County - Mason County web site - Roster, vol. 7, pages 494-496.
Company D - many men from Madison County - Madison County web site - Roster, vol. 7, pages 496-499.
Company E - many men from St. Clair County (Also Known as Quinby's Escort) - St. Clair County web site - Roster, vol. 7, pages 499-502.
Company F - many men from Piatt County - Piatt County web site - Roster, vol. 7, pages 502-506.
Company G - many men from Hancock County - Hancock County web site - Roster, vol. 7, pages 506-509.
Company H - many men from McDonough County and Schuyler County - McDonough and Schuyler county web sites - Roster, vol. 7, pages 509-512.
Company I - many men from Champaign County - Champaign County web site - Roster, vol. 7, pages 512-516.
Company K - many men from Pike County - Pike County web site - Roster, vol. 7, pages 516-519.
Company L - many men from Adams County and Hancock County (Also Known as Adams County Cavaly) - Adams and Hancock county web sites - Roster, vol. 7, pages 519-522.
Company M - many men from Mason County (Also Known as McKean's Escort) - Mason County web site - Roster, vol. 7, pages 522-524.
Unassigned Recruits - Roster, vol. 7, pages 524-525.
Second (Consolidated) Cavalry Regiment - Roster, vol. 7, pages 533-542.
The Civil War Soldiers and Sailors database lists 3,173 men on its roster for this unit. Roster.
Other Source Material
WEB SITES
• Beginning United States Civil War Research gives steps for finding information about a Civil War soldier. It covers the major records that should be used. Additional records are described in ‘Illinois in the Civil War’ and ‘United States Civil War, 1861 to 1865’ (see below).
• National Park Service, The Civil War Soldiers and Sailors System, is searchable by soldier's name and state. It contains basic facts about soldiers on both sides of the Civil War, a list of regiments, descriptions of significant battles, sources of the information, and suggestions for where to find additional information.
• Illinois in the Civil War describes many Confederate and Union sources, specifically for Illinois, and how to find them.. These include compiled service records, pension records, rosters, cemetery records, Internet databases, published books, etc.
• United States Civil War, 1861 to 1865 describes and explains United States and Confederate States records, rather than state records, and how to find them. These include veterans’ censuses, compiled service records, pension records, rosters, cemetery records, Internet databases, published books, etc.
References
1. National Park Service, The Civil War Soldiers and Sailors System (accessed 4 January 2011).
Need additional research help? Contact our research help specialists.
Need wiki, indexing, or website help? Contact our product teams.
Did you find this article helpful?
You're invited to explain your rating on the discussion page (you must be signed in).
• This page was last modified on 6 February 2013, at 02:17.
• This page has been accessed 697 times.
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T05:48:20.000Z
|
4vjecooo4c36o73begnqbz6pg2skqdq3
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:7901",
"uncompressed_offset": 134186188,
"url": "ipkitten.blogspot.com/2005/09/howzat.html",
"warc_date": "2013-11-22T14:54:25.000Z",
"warc_filename": "<urn:uuid:538441c1-957d-4877-a7e6-0a4b51ee8825>",
"warc_url": "http://ipkitten.blogspot.com/2005/09/howzat.html"
}
|
cccc_CC-MAIN-2013-20
|
For the half-year to 30 June 2013, the IPKat's regular team is supplemented by contributions from guest bloggers Stefano Barazza, Matthias Lamping and Jeff John Roberts.
Two of our regular Kats are currently on blogging sabbaticals. They are Birgit Clark and Catherine Lee.
Tuesday, 13 September 2005
HOWZAT?
Thanks to the Ashes victory, England has gone cricket crazy, and IP lawyers are no exception. The IPKat though is worried about the fate of a slightly different team - the European Patent Office Cricket Club. The team is part of the Munich Cricket Association, but more than that the IPKat doesn't know. Can any of his readers fill him in on how the team has fared this season? Merpel wonders whether any other Patent Offices have cricket teams.
Don't leave the kats in suspense. If you know the answer to either of these questions, post a comment below or send him an email here.
Subscribe to the IPKat's posts by email here
Just pop your email address into the box and click 'Subscribe':
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T05:11:30.000Z
|
nkxwzi6kb2w5gcgbd3hddsfplt7asfmh
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:7902",
"uncompressed_offset": 134207954,
"url": "ipkitten.blogspot.com/2006/10/calling-all-critics-new-blog-on-block.html",
"warc_date": "2013-11-22T14:54:25.000Z",
"warc_filename": "<urn:uuid:538441c1-957d-4877-a7e6-0a4b51ee8825>",
"warc_url": "http://ipkitten.blogspot.com/2006/10/calling-all-critics-new-blog-on-block.html"
}
|
cccc_CC-MAIN-2013-20
|
For the half-year to 30 June 2013, the IPKat's regular team is supplemented by contributions from guest bloggers Stefano Barazza, Matthias Lamping and Jeff John Roberts.
Two of our regular Kats are currently on blogging sabbaticals. They are Birgit Clark and Catherine Lee.
Friday, 6 October 2006
CALLING ALL CRITICS; NEW BLOG ON THE BLOCK
Calling all critics
The Journal of Intellectual Property Law and Practice, published by OUP, is looking for bright, enthusiastic volunteers to review some of the titles that the journal is receiving. The journal also reviews blogs, articles in other journals - even films.
If you'd like to be considered for a review, email Jeremy here and tell him, in brief, what your areas of interest or expertise are. He'll pass all serious responses on to the Review editor, Phill Johnson, who handles the allocation of reviews in person.
If you are an author or publisher and want JIPLP to review your book, read the details here
New blog on the block
The IPKat's Queen Mary friend and scholar Johanna Gibson writes:
"I've set up a blog on IP Aspects of Medicine as part of the course I'm teaching on the MA in Medical Law and Ethics. The blog is called IPmed. Contributors include me and any of the students who choose to sign up to it (registrations for the course haven't been taken yet, as the teaching year's just starting, but one student has signed up already)".
Doctor Jo is already a blogger - last year she breathed life into Patenting Lives, which many IPKat readers may be quite familiar with. Good luck, Jo - may you never run out of energy or inspiration!
Subscribe to the IPKat's posts by email here
Just pop your email address into the box and click 'Subscribe':
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:57:21.000Z
|
nrxgxm5uue4vhy7jfc3wlv5vdnc74acz
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:7904",
"uncompressed_offset": 139886523,
"url": "journals.tdl.org/icce/index.php/icce/article/view/1282",
"warc_date": "2013-11-22T14:54:25.000Z",
"warc_filename": "<urn:uuid:538441c1-957d-4877-a7e6-0a4b51ee8825>",
"warc_url": "http://journals.tdl.org/icce/index.php/icce/article/view/1282"
}
|
cccc_CC-MAIN-2013-20
|
3D SIMULATION OF WAVE INTERACTION WITH PERMEABLE STRUCTURES
Peter Wellens, M.J.A. Borsboom, M.R.A. van Gent
Abstract
COMFLOW is a general 3D free-surface flow solver. The main objective in this paper is to extend the solver with a
permeable flow model to simulate wave interaction with rubble-mound breakwaters. The extended Navier-Stokes
equations for permeable flow are presented and we show the discretization of these equations as they are implemented in
COMFLOW. An analytical solution for the reflection coefficient of a permeable structure is derived and the numerical
model is compared to the solution. In addition, a validation study has been performed, in which we compare the numerical
results with an experiment. In the experiment, pressures and surface elevations are measured inside a permeable structure.
The measurements are represented well by the simulation results. At the end, a 3D application of the model is shown.
Keywords
VOF; 3D Navier-Stokes, permeability; rubble-mound breakwater; 3D simulations
References
Borsboom, M., J. Groeneweg, N. Doorn and M.R.A. van Gent (2001), Flexible Boundary Conditions for a Boussinesq Type Wave Model, Proceedings of Waves 2001, San Francisco
Kleefsman, K.M.T., G. Fekken, A.E.P. Veldman, B. Iwanowski, and B. Buchner (2005), A Volumeof-Fluid based simulation method for wave impact problems. Journal of Computational Physics, 206(1):363–393http://dx.doi.org/10.1016/j.jcp.2004.12.007
Liu, P.L.F, P. Lin, K.A. Chang, and T. Sakakiyama (1999), Numerical Modeling of Wave Interaction with Porous Structures, Journal of Waterway, Port, Coastal and Ocean Engineering, 125, 322–330http://dx.doi.org/10.1061/(ASCE)0733-950X(1999)125:6(322)
Rienecker, M.M. and J.D. Fenton (1981), A Fourier Approximation Method For Steady Water-Waves, Journal Of Fluid Mechanics, 104(MAR):119–137, 1981http://dx.doi.org/10.1017/S0022112081002851
Van Gent, M.R.A. (1995), Porous flow through rubble mound material, J. of Waterway, Port, Coastal and Ocean Engineering, Vol.121, no.3, pp.176-181, ASCE, New Yorkhttp://dx.doi.org/10.1061/(ASCE)0733-950X(1995)121:3(176)
Van Gent, M.R.A. and I.M. van der Werf (2010), Stability of breakwater roundheads during construction, Proceedings of 32nd International Conference on Coastal Engineering. Shanghai, China
Van Gent, M.R.A., P. Tönjes, H.A.H. Petit and P. van den Bosch (1994), Wave action on and in permeable structures, Proc. ICCE'94, Vol.2, pp.1739-1753, Kobe, Japan
Verstappen, R.W.C.P. and A. E. P. Veldman (2003), Symmetry-preserving discretization of turbulent flow. Journal of Computational Physics, 187(1):343–368.http://dx.doi.org/10.1016/S0021-9991(03)00126-8
Wellens, P.R., R. Luppes, A.E.P. Veldman and M.J.A. Borsboom (2009), CFD Simulations of a Semi-Submersible with Absorbing Boundary Conditions, Proceedings of OMAE2009, Honolulu
Wenneker, I., P.R.Wellens and R. Gervelas (2010), Volume-of-Fluid model ComFLOW simulations of wave impacts on a dike, Proceedings of 32nd International Conference on Coastal Engineering.
PMid:21534463
Full Text: PDF
This work is licensed under a Creative Commons Attribution 3.0 License.
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T07:25:51.000Z
|
apzwbe7jpxekhtk7vutdczsxh5exd5ma
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:7905",
"uncompressed_offset": 139892918,
"url": "journals.tdl.org/icce/index.php/icce/article/view/3145",
"warc_date": "2013-11-22T14:54:25.000Z",
"warc_filename": "<urn:uuid:538441c1-957d-4877-a7e6-0a4b51ee8825>",
"warc_url": "http://journals.tdl.org/icce/index.php/icce/article/view/3145"
}
|
cccc_CC-MAIN-2013-20
|
HYDRAULICS OF GREAT LAKES INLET - HARBORS SYSTEMS
Robert M. Sorenson, William N. Seelig
Abstract
Reversing currents in inlets on the Great Lakes are generated primarily by long wave seiching modes of the lakes rather than by the tide. In order to investigate the nature of long wave excitation and the generating mechanism for significant inlet velocities, to establish techniques for predicting inlet-harbor system response, and to develop base data for future planning and design studies, field measurements were conducted in 1974-75 at several harbors on the Great Lakes. Data collected includes continuous harbor water level measurements at all sites, inlet velocity measurements at the primary site (Pentwater, Michigan), and channel hydrographic surveys at the sites where more recent data were needed. Historic water level and velocity data for some of the harbor sites was also available. Amplification of harbor oscillations and generation of the highest inlet velocities are caused by the Helmholtz resonance mode which has a period of 1 to 3 hours for the inlet-harbor systems studied. A recently developed simple lumped-parameter numerical model is shown to be quite effective in predicting inlet-harbor response over the range of excitation periods encountered. Selected data from Pentwater are presented to demonstrate the hydraulic response of the inlet harbor system and the applicability of the lumped-parameter numerical model.
Keywords
inlet hydraulics; Great Lakes; harbor; harbor system
Full Text: PDF
This work is licensed under a Creative Commons Attribution 3.0 License.
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T05:59:04.000Z
|
4atfororfok4r55cgrtwvsqunfceu3p2
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:7907",
"uncompressed_offset": 142013044,
"url": "kauaimark.blogspot.com/2006/02/what-i-forgot.html?showComment=1141048440000",
"warc_date": "2013-11-22T14:54:25.000Z",
"warc_filename": "<urn:uuid:538441c1-957d-4877-a7e6-0a4b51ee8825>",
"warc_url": "http://kauaimark.blogspot.com/2006/02/what-i-forgot.html?showComment=1141048440000"
}
|
cccc_CC-MAIN-2013-20
|
Search This Blog
Loading...
Thursday, February 16, 2006
What I Forgot...
The last two days I’ve been in Kindergarten. These are my first Kinder assignments in about eight months.
What I forgot…
1. They constantly tattle like little machine guns.
2. They can’t remember directions beyond the first two words.
Instructions: “Color the tree brown and the leaves green…” is executed as multi hued flora of Technicolor wonders, only some of which ends up with brown trees and green leaves.
3. They cry if you say “No”
4. That repeating the mantra “Print your name at the top of the paper” works for only 30% of the class. The rest need you to point your finger at where the “top of the paper” is and wait while they print the name.
5. That sitting still “Criss-cross, apple sauce with zip locked lips” isn’t achievable for more than 5 seconds.
6. That you MUST, MUST make sure each kinder gets an EQUAL amount of snack going out to recess. …And you better not run out of snack before the last kid reaches the door.
7. They can’t read or write words longer than four letters, so Mr. HOMEWORK is powerless to threaten assigning the extra homework essay if they act up.
8. They are short. You aren’t. That means you need a tune-up at the chiropractor tomorrow.
And last…to carry this list the next time the automated sub system calls for a Kinder assignment.
…Did I forget anything? If I did, leave a comment and I’ll add it to the list later.
Check the reader comments link ----v
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T05:59:04.000Z
|
cgzeanyjxynrgm4ybqpci5nogmgrayvd
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:7913",
"uncompressed_offset": 152167633,
"url": "listarchives.libreoffice.org/global/users/msg20791.html",
"warc_date": "2013-11-22T14:54:25.000Z",
"warc_filename": "<urn:uuid:538441c1-957d-4877-a7e6-0a4b51ee8825>",
"warc_url": "http://listarchives.libreoffice.org/global/users/msg20791.html"
}
|
cccc_CC-MAIN-2013-20
|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [libreoffice-users] Re: Open Type fonts
On 01/06/2012 at 16:06, "webmaster-Kracked_P_P" <webmaster@krackedpress.com>
wrote:
> What is this message trying to say?
> Anyone?
I have written explanations below each quote.
HTH
> > have a large number of OTF fonts in my 100,000+ font collection.
--- Quote from previous message (by webmaster-Kracked_P_P)
> > Private or public collection?Is possible to download?
--- Question from poster (Mieszko Kaczmarczyk)
> > --Mieszko KaczmarczykAdministrator ITWetzel Sp. z o.o.Duchnw, ul.
Kresowa 805-462 WizownaPhone:+4822780-20-00ext.219Direct:+48 22 780-20-19Fax:
+48 22 780-20-03Kapitazakadowy: 600.000,00 z.Sd Rejonowy dla M.ST. Warszawy w
Warszawie, XXI WydziaGospodarczy Krajowego Rejestru
SdowegoNIP:951-00-43-131Regon:010799082KRS:0000058229Zarzd Spki:
> > Prezes Zarzdu - Ewa Dzwonkowska, Czonek Zarzdu - Detlev
> > LiebschwagerPart of the WETZEL PROCESSING GROUP: Group
> > Management - Martin Hellweg, Detlev Liebschwager, Aglaia
> > Lthy
> >
> > Save a tree - only print this message if it's absolutely necessary!
--- Bunch of trash required by Polish law in official messages from companies.
Law was set up in nineties or so and was created with paper messages in mind.
In the meanwhile, Internet became common, and law was also applied to
electronic messages (e-mail).
There are way too many people in Poland who can't configure their e-mail client
to separate private messages from messages sent on behalf of companies they
work for.
--
Best regards
Mirosław Zalewski
--
For unsubscribe instructions e-mail to: users+help@global.libreoffice.org
Problems? http://www.libreoffice.org/get-help/mailing-lists/how-to-unsubscribe/
Posting guidelines + more: http://wiki.documentfoundation.org/Netiquette
List archive: http://listarchives.libreoffice.org/global/users/
All messages sent to this list will be publicly archived and cannot be deleted
Follow-Ups:
Re: [libreoffice-users] Re: Open Type fontsTom Davies <tomdavies04@yahoo.co.uk>
References:
[libreoffice-users] Open Type fontsGuy Voets <nimantuis@gmail.com>
Re: [libreoffice-users] Re: Open Type fontsMieszko Kaczmarczyk <mieszko.kaczmarczyk@wetzel.co>
Re: [libreoffice-users] Re: Open Type fontswebmaster-Kracked_P_P <webmaster@krackedpress.com>
Privacy Policy | Impressum (Legal Info) | Copyright information: Unless otherwise specified, all text and images on this website are licensed under the Creative Commons Attribution-Share Alike 3.0 License. This does not include the source code of LibreOffice, which is licensed under the GNU Lesser General Public License (LGPLv3). "LibreOffice" and "The Document Foundation" are registered trademarks of their corresponding registered owners or are in actual use as trademarks in one or more countries. Their respective logos and icons are also subject to international copyright laws. Use thereof is explained in our trademark policy.
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T08:01:33.000Z
|
nth56cf6u34r7sifbjppmmysxvjh5db6
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:7914",
"uncompressed_offset": 152403338,
"url": "lists.maemo.org/pipermail/maemo-community/2012-March/005128.html",
"warc_date": "2013-11-22T14:54:25.000Z",
"warc_filename": "<urn:uuid:538441c1-957d-4877-a7e6-0a4b51ee8825>",
"warc_url": "http://lists.maemo.org/pipermail/maemo-community/2012-March/005128.html"
}
|
cccc_CC-MAIN-2013-20
|
[maemo-community] No subject
From:
Date: Wed Mar 7 00:14:22 EET 2012
ferent categories since Nokia cannot grant any permissions for the latter o=
n its own.<br>
<br>
If there are 3rd party binaries that are required to build OBS targets then=
I will go back to my point of how worth it is to change the current situat=
ion given that there is no actual risk anybody could point to on Nokia pull=
ing hosting & funds for the servers where that software is currently ho=
sted. As explained in the IRC meeting, changing the terms for the Nokia bin=
aries without a strong business reason is already complex. I expect convinc=
ing legal teams in other companies under the same arguments to be even more=
complicated.<div class=3D"HOEnZb">
<div class=3D"h5"><br>
<br>
</div></div></blockquote></div><br>Thanks for the lists.=A0 Sure, if it tur=
ns out there are 3rd party binaries needed for an OBS target, then let'=
s pause the process and discuss the situation.<br><br>Rob<br>
--e89a8ff1c0982ead0a04bdf76acf--
More information about the maemo-community mailing list
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T07:13:10.000Z
|
hkg4qscewvhqcodlmza7ze7o4hfx5phr
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:7915",
"uncompressed_offset": 152407183,
"url": "lists.maemo.org/pipermail/maemo-developers/2005-November/001882.html",
"warc_date": "2013-11-22T14:54:25.000Z",
"warc_filename": "<urn:uuid:538441c1-957d-4877-a7e6-0a4b51ee8825>",
"warc_url": "http://lists.maemo.org/pipermail/maemo-developers/2005-November/001882.html"
}
|
cccc_CC-MAIN-2013-20
|
[maemo-developers] [maemo-developers] ELF file OS ABI invalid
From: Timo Steuerwald timo.steuerwald at gmx.de
Date: Thu Nov 17 14:58:23 EET 2005
Hi all,
I have installed checkinstall and installwatch via apt-get source -b
from a debian sarge mirror. During execution of checkinstall, I will get
this message:
<---------snip---------->
/scratchbox/tools/bin/sh: error while loading shared libraries:
/usr/lib/installwatch.so: ELF file OS ABI invalid
<---------snip---------->
What does this mean?
Cheers,
Timo
More information about the maemo-developers mailing list
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:27:29.000Z
|
agarggc5ghbwxvthmynvz7acq45aurkp
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:7939",
"uncompressed_offset": 175679570,
"url": "myrightword.blogspot.co.il/2009/08/even-bibi-isnt-that-good.html",
"warc_date": "2013-11-22T14:54:25.000Z",
"warc_filename": "<urn:uuid:538441c1-957d-4877-a7e6-0a4b51ee8825>",
"warc_url": "http://myrightword.blogspot.co.il/2009/08/even-bibi-isnt-that-good.html"
}
|
cccc_CC-MAIN-2013-20
|
Monday, August 03, 2009
Even Bibi Isn't That Good
Reported:
In the days before President Obama's last news conference, as the networks weighed whether to give up a chunk of their precious prime time, Rahm Emanuel went straight to the top.
Rather than calling ABC, the White House chief of staff phoned Bob Iger, chief executive of parent company Disney. Instead of contacting NBC, Emanuel went to Jeffrey Immelt, the chief executive of General Electric. He also spoke with Les Moonves, the chief executive of CBS, the company spun off from Viacom.
Whether this amounted to undue pressure or plain old Chicago arm-twisting, Emanuel got results: the fourth hour of lucrative network time for his boss in six months. But network executives have been privately complaining to White House officials that they cannot afford to keep airing these sessions in the current economic downturn.
The networks "absolutely" feel pressured, says Paul Friedman, CBS's senior vice president: "It's an enormous financial cost when the president replaces one of those prime-time hours. The news divisions also have mixed feelings about whether they are being used."
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T08:11:03.000Z
|
yb56ne2aevvtvblspjd5yxpo2t3nf3f6
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:7941",
"uncompressed_offset": 180128291,
"url": "newsgrist.typepad.com/underbelly/2011/07/copyright-shakedown.html",
"warc_date": "2013-11-22T14:54:25.000Z",
"warc_filename": "<urn:uuid:538441c1-957d-4877-a7e6-0a4b51ee8825>",
"warc_url": "http://newsgrist.typepad.com/underbelly/2011/07/copyright-shakedown.html"
}
|
cccc_CC-MAIN-2013-20
|
Become a Fan
Twitter Updates
follow me on Twitter
CC License
Fair Use
Network
• blognetworks
Join NEWSgrist on Facebook
• Facebook
Blog powered by TypePad
Member since 04/2004
« Ron Coleman on the PROTECT IP Act: Fighting the wrong war with the wrong weapons | Main | Pie Charts »
July 13, 2011
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T07:13:56.000Z
|
imuj7yvvnmemimjejwpf3q6dplrhc4fk
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:7945",
"uncompressed_offset": 188143213,
"url": "openwetware.org/index.php?curid=66094&diff=0&oldid=680110&title=User%3APranav_Rathi",
"warc_date": "2013-11-22T14:54:25.000Z",
"warc_filename": "<urn:uuid:538441c1-957d-4877-a7e6-0a4b51ee8825>",
"warc_url": "http://openwetware.org/index.php?title=User:Pranav_Rathi&curid=66094&diff=0&oldid=680110"
}
|
cccc_CC-MAIN-2013-20
|
User:Pranav Rathi
From OpenWetWare
(Difference between revisions)
Jump to: navigation, search
Current revision (13:15, 1 March 2013) (view source)
(About Me)
(11 intermediate revisions not shown.)
Line 1: Line 1:
-
[[Image:Optical tweezers.png|700x1000px|Optical Tweezers model in Solidworks]]
+
+
==About Me==
==About Me==
+
[[Image:Optical tweezers.png|thumb|left|820px|Optical Tweezers model in Solidworks]]
+
[[Image:Optical tweezers-2.png|thumb|left|820px|Optical Tweezers model in Solidworks]]
+
+
https://lh6.googleusercontent.com/-kHJxRtUlybU/UP4jadZ-7II/AAAAAAAACBM/Ys9oWlvd-AA/s288/2.jpg
https://lh6.googleusercontent.com/-kHJxRtUlybU/UP4jadZ-7II/AAAAAAAACBM/Ys9oWlvd-AA/s288/2.jpg
Current revision
Contents
About Me
Optical Tweezers model in Solidworks
Optical Tweezers model in Solidworks
Education
• Planning on getting PhD, Optical Science&Engineering, University Of New Mexico, Albuquerque-NM working at Koch Lab at UNM.
• 2010, MS, Optical Science&Engineering, University Of New Mexico, Albuquerque-NM
• 2005, MS, Applied-Physics, Northern Arizona University, Flagstaff-AZ
• 2003, MA, Mathematical Sciences, MJP-Rohalkhand University, Uttar Pradesh-UP, India
Experience
Skills & Expertise
Research interests
Optical Trap
1. Optics: nano, nonlinear, photonics, Bio-optics and optoelectronics.
2. Design and construction of optical, opto-mechanical, opto-electrical and other devices.
3. Material research through AFM, confocal, near and farfield microscopy and FTIR-spectroscopy.
4. Design and construction of devices for bio-engineering research.
Research & Work
• [Optical Tweezers[1]]
• [Design & Construction of devices for Optical Tweezers[2]]
• [Other research projects [3]]
• [Project page [4]]
Reccomendations
Contact Info
This user is a DNA unzipper
Personal tools
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T04:46:19.000Z
|
bv3i6cyvaz2mieyzicuw25tiwhhkh43x
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:7965",
"uncompressed_offset": 206370195,
"url": "quotationsbook.com/quote/11363/",
"warc_date": "2013-11-22T14:54:25.000Z",
"warc_filename": "<urn:uuid:538441c1-957d-4877-a7e6-0a4b51ee8825>",
"warc_url": "http://quotationsbook.com/quote/11363/"
}
|
cccc_CC-MAIN-2013-20
|
Quotation added by staff
Why not add this quote to your bookmarks?
Men become civilized, not in proportion to their willingness to believe, but in proportion to their readiness to doubt. Mencken, H. L.
This quote is about doubt · Search on Google Books to find all references and sources for this quotation.
A bit about Mencken, H. L. ...
Henry Louis Mencken (September 12, 1880 - January 29, 1956), better known as H. L. Mencken, was a twentieth-century journalist, satirist, social critic, cynic, and freethinker, known as the "Sage of Baltimore" and the "American Nietzsche". He is often regarded as one of the most influential American writers of the early 20th century.
These people bookmarked this quote:
More on the author
This quote around the web
Loading...
Search Quotations Book
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:36:40.000Z
|
evdo3nqdisqpoemfqcbzm7h3xqbkihwz
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:7966",
"uncompressed_offset": 206376620,
"url": "quotationsbook.com/quote/31127/",
"warc_date": "2013-11-22T14:54:25.000Z",
"warc_filename": "<urn:uuid:538441c1-957d-4877-a7e6-0a4b51ee8825>",
"warc_url": "http://quotationsbook.com/quote/31127/"
}
|
cccc_CC-MAIN-2013-20
|
Quotation added by staff
Why not add this quote to your bookmarks?
Politics, when I am in it, it makes me sick. Taft, William Howard
This quote is about politics · Search on Google Books to find all references and sources for this quotation.
A bit about Taft, William Howard ...
We don't have a biography.
These people bookmarked this quote:
• Nobody has bookmarked this quote yet.
More on the author
This quote around the web
Loading...
Search Quotations Book
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:12:52.000Z
|
ixhajwrwnntiy3y43fetmjmjbi7j55j6
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:7967",
"uncompressed_offset": 206387788,
"url": "quotationsbook.com/quote/gift/19715/",
"warc_date": "2013-11-22T14:54:25.000Z",
"warc_filename": "<urn:uuid:538441c1-957d-4877-a7e6-0a4b51ee8825>",
"warc_url": "http://quotationsbook.com/quote/gift/19715/"
}
|
cccc_CC-MAIN-2013-20
|
It's easy! Just pick the product you like and click-through to buy it from trusted partners of Quotations Book. We hope you like these personalized gifts as much as we do.
Make and then buy your OWN fantastic personalized gift from this quote
Let us ask ourselves; What kind of people do we think we are? Reagan, Ronald
Make a fabulous personalised bracelet or other form of jewellery with this quote
Click the banner below to pick the kind of jewellery you'd like ...
Choose something popular ...
Make a custom wrapped canvas ...
Make custom holiday cards ...
Make custom t-shirts ...
Make custom holiday gifts for boys ...
Make custom holiday gifts for girls ...
Make custom holiday gifts for men ...
A selection of more great products and gifts!
212 - The Extra Degree
The one extra degree makes the difference. This simple analogy reflects the ultimate definition of excellence. Because it's the one extra degree of effort, in business and life, that can separate the good from the great. This powerful book by S.L. Parker and Mac Anderson gives great examples, great quotes and great stories to illustrate the 212° concept. A warning - once you read it, it will be hard to forget. Your company will have a target for everything you do ... 212°
Click here to buy this »
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T05:54:48.000Z
|
dgbjxdzwghsszogx7u5dxror7mdkrgpm
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:7968",
"uncompressed_offset": 208532353,
"url": "rationalwiki.org/wiki/Islamophobia",
"warc_date": "2013-11-22T14:54:25.000Z",
"warc_filename": "<urn:uuid:538441c1-957d-4877-a7e6-0a4b51ee8825>",
"warc_url": "http://rationalwiki.org/wiki/Islamophobia"
}
|
cccc_CC-MAIN-2013-20
|
Islamophobia
From RationalWiki
Jump to: navigation, search
One of many articles on
Islam
Topics of interest
Persons of interest
This article is primarily about unreasonable criticism of Islam; see also some reasonable criticisms of Islam.
Islamophobia is the irrational fear or hatred of Islam or Muslims. It is usually, though not always, connected with xenophobia in general.
According to the Oxford English Dictionary, the first known use of the term was in 1976, though it has become more frequently used since the 1997 publication of Islamophobia: A Challenge For Us All by the Runnymede Trust, and even more so to describe the backlash against Muslims following the 9/11 terrorist attacks.[1][2] Some notable critics, such as Sam Harris, have rejected the validity of the term.
Contents
[edit] Characteristics of Islamophobia
The Runnymede Trust defines Islamophobia as having the following characteristics:
1. Islam is seen as a monolithic bloc, static and unresponsive to change.
2. Islam is seen as separate and “other”. It does not have values in common with other cultures, is not affected by them and does not influence them.
3. Islam is seen as inferior to the West. It is seen as barbaric, irrational, primitive, and sexist.
4. Islam is seen as violent, aggressive, threatening, supportive of terrorism, and engaged in a Clash of Civilizations.
5. Islam is seen as a political ideology, used for political or military advantage.
6. Criticisms made of 'the West' by Islam are rejected out of hand.
7. Hostility towards Islam is used to justify discriminatory practices towards Muslims and exclusion of Muslims from mainstream society.
8. Anti-Muslim hostility is seen as natural and normal.
[edit] Examples of Islamophobia
In a May 2001 interview, far-right British politician Nick Griffin stated "Muslims are the biggest problem at present, for several reasons, because they have the highest birth rate, which means their communities need living space - that's what the ethnic cleansing is about. They have political corruption in their own countries, and when they have a chance to get council places they are there for graft. Most important of all is that Islam is an aggressive religion."[3]
In a September 2001 column, following the World Trade Centre Attacks, Ann Coulter espoused the view that "We should invade their countries, kill their leaders and convert them to Christianity."[4]
On September 15, 2001 a Sikh man (Sikhs being known for wearing distinctive beards and turbans, and also for not being Muslims) was murdered at a gas station in Mesa, Arizona, "In revenge for the 11 september attacks". His murderer, Frank Silva Roque, was convicted and initially sentenced to death, but this was commuted to life in prison without the possibility of parole by the Arizona Supreme Court.[5]
In a February 2002 interview with the LA times, John Ashcroft stated "Islam is a religion in which God requires you to send your son to die for Him. Christianity is a faith in which God sends His son to die for you."[6] (Unless your name is Abraham [just kidding!] or Jephthah [for realz].)
In November 2006, Jerry Klein, a Washington DC area radio talk show host suggested, in parody of Islamophobic views, that "identifying markers. ... I'm thinking either it should be an arm band, a crescent moon arm band, or it should be a crescent moon tattoo. ...If it means that we have to round them up and do a tattoo in a place where everybody knows where to find it, then that's what we'll have to do."[7] Although some callers believed that Klein was "off his rocker" for suggesting such a thing, other callers believed Klein had not gone far enough, and suggested that Muslims should be placed in concentration camps, or deported en-masse. Klein exposed the parody at the close of his show, and chastised those who had called in to support what amounted to, in essence, a new Holocaust against Muslims.
The 2010 Halal soup controversy erupted when Campbell's introduced a line of canned soups that met with Halal dietary restrictions. The hysteria went as far as "Your kids might be eating halal food without you even realizing it!", as though eating something that passes the halal restrictions would turn you into a muslim.
After the April 2013 bombing at the Boston Marathon, frequent Fox News talking head Erik Rush tweeted that Muslims are evil and that the obvious thing to do was kill them all. This was sent out despite the fact that no group - Islamist or otherwise - had taken responsibility for the bombings at the time.[8]
[edit] Criticism of the concept of Islamophobia
Islamophobia is a controversial term for a number of reasons. Despite the implication of the term, those accused of Islamophobia are not actually afraid of Islam, but instead are highly (often disproportiantely) critical of it. Despite the fact that it may not be an actual phobia, it is akin to the concept of homophobia.
Kenan Malik, a British writer, has criticized the concept of Islamophobia, calling it a myth. He argues that the charge of Islamophobia is leveled against those who criticize Islam or Muslims in any way (even when those criticisms may be legitimate) to serve as a "chilling effect."
Rowan Atkinson, a British comic-actor has likewise stated that although criticizing another person based on their race is ridiculous and irrational, criticizing another's religion, which is a voluntary belief, is a right. He further stated that laws should not be created which protect certain types of ideas from criticism and not others.
Stephen Schwartz, an American writer and critic of Wahabbism, has stated that although the charge of Islamophobia is sometimes leveled too quickly against an opponent, that it is still a real phenomenon,[9] which he defines as:
1. Attacking the entire religion of Islam as a problem for the world;
2. Condemning all of Islam and its history as extremist;
3. Denying the active existence, in the contemporary world, of a moderate Muslim majority;
4. Insisting that Muslims accede to the demands of non-Muslims (based on ignorance and arrogance) for various theological changes, in their religion;
5. Treating all conflicts involving Muslims (including, for example, that in Bosnia-Herzegovina a decade ago), as the fault of Muslims themselves;
6. Inciting war against Islam as a whole.
[edit] Islamophobia versus criticism of Islam
Islamophobia has also been used as a term to disparage those who would make valid criticisms of Islam and the culture that arises because of following Islam and Sharia law. In a radio discussion on public radio between Reza Aslan and Sam Harris, Sam Harris mentions that Islam is different from many other religions at this moment in its history because of its doctrines and the results of them, but Reza Aslan accuses Sam of being a bigot for treating Islam as a special case.[10] Writers and public figures such as Richard Dawkins and Sam Harris, who are very critical of specific violent passages in all religions because of those who take them literally, are often accused of bigotry and Islamophobia when they criticize the text of Islam.
Harris writes that,
There is no such thing as Islamophobia. Bigotry and racism exist, of course-and they are evils that all well-intentioned people must oppose. And prejudice against Muslims or Arabs, purely because of the accident of their birth, is despicable. But like all religions, Islam is a system of ideas and practices. And it is not a form of bigotry or racism to observe that the specific tenets of the faith pose a special threat to civil society. Nor is it a sign of intolerance to notice when people are simply not being honest about what they and their co-religionists believe.
Sam Harris, The Daily Beast[11]
Of course, in full irony meter, Harris has gone on to call for the racial profiling of Muslims. Thanks, Sam!
[edit] See also
[edit] External links
[edit] Footnotes
1. http://news.bbc.co.uk/1/hi/uk/4102389.stm
2. http://news.newamericamedia.org/news/view_article.html?article_id=127fe2880e48951b564ac2f3e171242e
3. ‘Far right aims to gain foothold in Oldham’, Jeevan Vasagar, May 30, 2001 The Guardian"
4. http://www.nationalreview.com/coulter/coulter.shtml
5. http://news.bbc.co.uk/2/hi/americas/3154170.stm
6. Los Angeles Times, February 16, 2002
7. http://cair.com/default.asp?Page=articleView&id=2415&theType=NR
8. Erik Rush: Kill All Muslims in Response to Boston Marathon Attack, Right Wing Watch
9. http://www.frontpagemag.com/Articles/ReadArticle.asp?ID=17874
10. Would Park51, the "ground zero mosque" be a symbol of religious tolerance, and should that be an American goal?
11. What Obama Got Wrong About the Mosque
Personal tools
Namespaces
Variants
Actions
Navigation
Community
Toolbox
support
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T07:21:01.000Z
|
e2la2aicamy5kegxasy2oq3osyxuavlc
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8025",
"uncompressed_offset": 297239788,
"url": "www.abs.gov.au/AUSSTATS/abs%40.nsf/ProductsbyReleaseDate/919B11B6D86F3C09CA25722E001C7778",
"warc_date": "2013-11-22T14:54:25.000Z",
"warc_filename": "<urn:uuid:538441c1-957d-4877-a7e6-0a4b51ee8825>",
"warc_url": "http://www.abs.gov.au/AUSSTATS/abs@.nsf/ProductsbyReleaseDate/919B11B6D86F3C09CA25722E001C7778?OpenDocument"
}
|
cccc_CC-MAIN-2013-20
|
Australian Bureau of Statistics
Celebrating the International Year of Statistics 2013
ABS Home > Statistics > By Release Date
9301.0 - Registrations of New Motor Vehicles, Australia, Preliminary, Jun 1995
Previous ISSUE Released at 11:30 AM (CANBERRA TIME) 02/08/1995
Page tools: Print Page Print All RSS Search this Product
• About this Release
Registrations in each State and Territory of new passenger vehicles, light commercials, rigid and articulated trucks, non-freight carrying trucks, buses and motor cycles. Seasonally adjusted and trend estimated registrations for passenger vehicles and `other' vehicles; total vehicles by State and Territory.
This publication has been converted from older electronic formats and does not necessarily have the same appearance and functionality as later releases.
© Commonwealth of Australia 2013
Unless otherwise noted, content on this website is licensed under a Creative Commons Attribution 2.5 Australia Licence together with any terms, conditions and exclusions as set out in the website Copyright notice. For permission to do anything beyond the scope of this licence and copyright terms contact us.
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T07:24:51.000Z
|
mckvez4okcsanzjm436yvidqz2pzj5cc
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8026",
"uncompressed_offset": 297262663,
"url": "www.abs.gov.au/ausstats/abs%40.nsf/Previousproducts/6105.0Main%20Features1Oct%202011?issue=Oct+2011&prodno=6105.0&tabname=Summary",
"warc_date": "2013-11-22T14:54:25.000Z",
"warc_filename": "<urn:uuid:538441c1-957d-4877-a7e6-0a4b51ee8825>",
"warc_url": "http://www.abs.gov.au/ausstats/abs@.nsf/Previousproducts/6105.0Main%20Features1Oct%202011?opendocument&tabname=Summary&prodno=6105.0&issue=Oct%202011&num=&view="
}
|
cccc_CC-MAIN-2013-20
|
Australian Bureau of Statistics
Celebrating the International Year of Statistics 2013
ABS Home > Statistics > By Release Date
6105.0 - Australian Labour Market Statistics, Oct 2011
Previous ISSUE Released at 11:30 AM (CANBERRA TIME) 11/10/2011
Page tools: Print Page Print All RSS Search this Product
What's New
Highlights news, reviews and developments.
Labour Market Summary
An overview of key labour market indicators: changes and time series graphs.
Labour Statistics News
What's happening in the Labour Statistics program?
Review of ABS Labour Household Surveys
Updates and Information on the Labour Household Survey content review and the Labour Force Survey output review
Recent Releases
What has been released recently? What will be released in the next three months?
Articles and Analysis
This issue: Fifty Years of Labour Force: Now and Then, Fact Sheet: Employment or jobs - what does the Labour Force Survey measure?
Find Out More
Want to find out more about ABS labour statistics? Contacts, training courses and ABS labour statistics publications.
Data Sources for Tables
How to find the data for discontinued tables from Australian Labour Market Statistics (cat. no. 6105.0).
© Commonwealth of Australia 2013
Unless otherwise noted, content on this website is licensed under a Creative Commons Attribution 2.5 Australia Licence together with any terms, conditions and exclusions as set out in the website Copyright notice. For permission to do anything beyond the scope of this licence and copyright terms contact us.
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T08:09:41.000Z
|
2owv2d2o3xqstqqobykfc3dkqkt6rmaw
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8047",
"uncompressed_offset": 433992649,
"url": "www.eoearth.org/article/Sumatran_freshwater_swamp_forests",
"warc_date": "2013-11-22T14:54:25.000Z",
"warc_filename": "<urn:uuid:538441c1-957d-4877-a7e6-0a4b51ee8825>",
"warc_url": "http://www.eoearth.org/article/Sumatran_freshwater_swamp_forests"
}
|
cccc_CC-MAIN-2013-20
|
Rate This Article
Average: 0/5
Sumatran freshwater swamp forests
Sumatran freshwater swamp forests
This article has been reviewed by the following Topic Editor: Mark McGinley
The Sumatran Freshwater Swamp Forests contain many of the endangered and characteristic Sumatran species found in the lowland rain forests.
Sumatra, Indonesia. (Photograph by © WWF-Canon/Mauri Rautkari)
The endangered tiger, Asian elephant, estuarine crocodile, false gharial, clouded leopard, several primate species, and a multitude of waterbirds all live in freshwater swamp forests. All will be in danger of local extinction within ten years.
The freshwater swamp forests have been decimated in Sumatra. The forests are highly productive and have been cleared by illegal logging and slash-and-burn agriculture to establish plantations and agricultural fields.
Location and General Description
This ecoregion represents the disjunct patches of freshwater swamp forests along the eastern alluvial plain on the Indonesian island of Sumatra. Based on the Köppen climate zone system, this ecoregion falls in the tropical wet climate zone.
Source: WWF
The major difference between freshwater swamp forests and peat swamp forests is the lack of deep peat, and the source of water is riverine and [[precipitation and fog|rainwater. Freshwater swamp forests grow on fertile alluvial soils, and the wide variety of soils is reflected in a diversity of vegetation types that ranges from grassy marshes to palm or Pandanus-dominated forest and forests similar in structure and composition to lowland rain forests. Trees with buttresses, stilt roots, and pneumatophores are common in some areas. Trees in freshwater swamp forests endure prolonged periods of flooding, causing the soils to become anaerobic. Pneumatophores, specialized respiratory structures on the roots, are common on many tree species and assist in respiration during oxygen-poor periods. Emergent trees attain heights of 50-60 meters (m). These forests are floristically very variable; the dominant species include Adina, Alstonia, Campnosperma, Coccoceras, Dillenia, Dyera, Erythrina, Eugenia, Ficus, Gluta, Lophopetalum, Memecylon, Metroxylon, Pandanus, Pentaspadon, Shorea, and Vatica spp. Melaleuca leucadendron covers extensive areas in the south of this ecoregion.
Biodiversity Features
The freshwater swamp forest fauna is much more diverse than the fauna of peat swamp forests, being more similar to that of lowland rain forests. Many of the characteristic species of lowland rain forests are also found here, although these forests contain no endemic mammal or bird species. However, they are home to Asia's largest terrestrial mammal, the Asian elephant (Elephas maximus), which is found in numerous populations throughout Sumatra. However, only five populations number more than 200 individuals, and with the rapid habitat loss the survival of many of these populations is uncertain. Way Kambas, a freshwater swamp forest reserve in southern Sumatra, contains one of these populations. The endangered Malayan tapir (Tapirus indicus), the largest of the four living tapir species and only Old World representative, is also a resident of these forests. The Sumatran population of the Malayan tapir is close to extinction, with no more than fifty animals left in the wild. Another endangered species, the Sumatran tiger (Panthera tigris), Indonesia's largest terrestrial predator, lives in lowland, montane, and freshwater swamp forests throughout Sumatra. There are an estimated 500 Sumatran tigers remaining in Sumatra, with approximately 100 found in Gunung Leuser National Park in northern Sumatra.
Numerous primate species live in these forests, including the long-tailed macaque (Macaca fascicularis), pig-tailed macaque (M. nemestrina), and siamang (Hylobates syndactylus), Sumatra's largest gibbon. Other species common to these forests include squirrels, monitor lizards, estuarine crocodile (Crocodylus porosus), false gharial (Tomistomus schlegeli), and the endangered clouded leopard (Pardofelis nebulosa).
The swampy grasslands and forests provide important habitat for many waterbirds, including herons, egrets, bitterns, pond herons, whistling ducks, pygmy geese, lesser adjutant (Leptoptilos javanicus), milky stork (Mycteris cinerea), and the rare white-winged duck (Cairina scutulata).
Current Status
Table 1. WCMC (1997) Protected Areas That Overlap with the Ecoregion
Protected Area
Area (km2)
IUCN Category
Sei Prapat Simandulang 60 PRO
Giam Duri 140 PRO
Way Kambas 420 II
Total 620
Ecoregion numbers of protected areas that overlap with additional ecoregions are listed in brackets.
Less than a fifth of the original extent of natural habitat remains in this severely threatened ecoregion. There are three protected areas that extend into the ecoregion and cover 620 km2 (3 percent) of the ecoregion, but two of these are less than 200 km2 (Table 1). Freshwater swamp forests have very fertile soils that are suitable for agriculture; therefore, this ecoregion has been intensively converted and exploited. Very little of the remaining habitat is in an undisturbed state, including the areas inside nature reserves.
Types and Severity of Threats
Way Kambas is one of the oldest reserves in Indonesia, declared in 1937, and was upgraded to a national park in 1989. It was established to protect important freshwater and lowland rain forest flora and fauna in southern Sumatra. Despite its long standing as a nature reserve and increased protection in 1989, most of its land has been degraded by human interference.
The estuarine crocodile and the false gharial, once numerous in this ecoregion, have been decimated by hunting, both from fear of these animals and for their skins, although the estuarine crocodile is protected by law in Indonesia. Large-scale logging has also occurred throughout this ecoregion, especially from 1968 to 1974, and concessions cover 17 percent of the remaining habitat. Several large fires (1972, 1974, 1976, 1982, 1998, and 2000) have also swept through this ecoregion, destroying large tracts of forest. Paperbark, a common secondary growth tree in freshwater swamps, has a bark that peels off to form a highly flammable soil cover, encouraging further burning. Climax communities of this forest, which include 100-year-old dipterocarp trees, are extremely slow to regenerate. Widespread illegal logging, regardless of logging concessions, has occurred throughout Indonesia since the economic crises and fall of the Suharto government in 1998. It is doubtful whether any pristine freshwater swamp forests still exist in Sumatra. If any do exist, they will be under intensive pressure in the coming years and probably will be gone within 10 years.
Justification of Ecoregion Delineation
Whitmore and MacKinnon showed large extents of peat swamp forests along the northern coast of Sumatra, especially in Riau Province. We delineated the Sumatran Peat Swamp Forests to represent these forests but extracted the smaller patches of freshwater swamp forests into the Sumatran Freshwater Swamp Forests and the mangroves in the Sunda Shelf Mangroves.
MacKinnon's biounit 21 largely corresponds to Udvardy's Sumatra biogeographic province. However, Udvardy did not include the Nicobar Islands. Eight ecoregions overlap Udvardy's Sumatra biogeographic province: Sumatran Lowland Rain Forests, Sumatran Montane Rain Forests, Mentawai Islands Rain Forests, Sumatran Peat Swamp Forests, Sumatran Freshwater Swamp Forests, Sundaland Heath Forests, Sumatran Tropical Pine Forests, and Sunda Shelf Mangroves.
Additional information on this ecoregion
Disclaimer: This article is taken wholly from, or contains information that was originally published by, the World Wildlife Fund. Topic editors and authors for the Encyclopedia of Earth may have edited its content or added new information. The use of information from the World Wildlife Fund should not be construed as support for or endorsement by that organization for any new information added by EoE personnel, or for any editing of the original content.
Citation
World Wildlife Fund (Lead Author);Mark McGinley (Topic Editor) "Sumatran freshwater swamp forests". In: Encyclopedia of Earth. Eds. Cutler J. Cleveland (Washington, D.C.: Environmental Information Coalition, National Council for Science and the Environment). [First published in the Encyclopedia of Earth September 3, 2008; Last revised Date October 16, 2011; Retrieved May 18, 2013 <http://www.eoearth.org/article/Sumatran_freshwater_swamp_forests>
The Author
Known worldwide by its panda logo, World Wildlife Fund (WWF) leads international efforts to protect endangered species and their habitats. Now in its fifth decade, WWF works in more than 100 countries around the globe to conserve the diversity of life on Earth. With nearly 1.2 million members in the U.S. and another 4 million worldwide, WWF is the world's largest privately financed conservation organization. WWF directs its conservation efforts toward three global goals: 1) saving endangered ... (Full Bio)
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T08:06:19.000Z
|
z675477layh52xkmi5ujocbhy4kkzc6q
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8048",
"uncompressed_offset": 443913626,
"url": "www.familysearch.org/learn/wiki/en/index.php?target=User+talk%3AGailoraas&title=Special%3AWhatLinksHere",
"warc_date": "2013-11-22T14:54:25.000Z",
"warc_filename": "<urn:uuid:538441c1-957d-4877-a7e6-0a4b51ee8825>",
"warc_url": "http://www.familysearch.org/learn/wiki/en/index.php?title=Special:WhatLinksHere&target=User+talk%3AGailoraas"
}
|
cccc_CC-MAIN-2013-20
|
Pages that link to "User talk:Gailoraas"
From FamilySearch Wiki
What links here
Filters Hide transclusions | Hide links | Hide redirects
No pages link to User talk:Gailoraas.
New to the Research Wiki?
In the FamilySearch Research Wiki, you can learn how to do genealogical research or share your knowledge with others.
Learn More
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T05:29:17.000Z
|
rpv2utjr7agotrdfdgzge6kz4h75576w
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8051",
"uncompressed_offset": 457272300,
"url": "www.forensicswiki.org/w/index.php?oldid=7132&title=Journals",
"warc_date": "2013-11-22T14:54:25.000Z",
"warc_filename": "<urn:uuid:538441c1-957d-4877-a7e6-0a4b51ee8825>",
"warc_url": "http://www.forensicswiki.org/w/index.php?title=Journals&oldid=7132"
}
|
cccc_CC-MAIN-2013-20
|
Steganography Analysis and Research Center / Backbone Security
From Forensics Wiki
Revision as of 10:53, 5 June 2007 by Tookiewana (Talk | contribs)
Jump to: navigation, search
The Steganography Analysis and Research Center (SARC) is a Center of Excellence within Backbone Security focused exclusively on steganography research and the development of advanced steganalysis products and services. The SARC has developed state-of-the-art steganography detection and extraction capabilities that address the needs of digital investigation specialists and information technology security personnel in law enforcement, government, military, intelligence, and the private sector. By providing a national repository of steganography application hash values, or fingerprints, and developing the most advanced tools, techniques, and procedures to find and extract hidden information, the SARC is rapidly evolving into a high-value asset to computer forensic examiners who wish to conduct steganalysis on seized media. The SARC has the products and support that can provide you with state-of-the-art solutions and benefits.
Products
• Steganography Application Fingerprint Database A fundamental goal of the SARC is to collect steganography, watermarking, and other data-hiding applications from various sources and incorporate file profiles computed from them into the SAFDB. The SAFDB can be used to review files on seized media by matching file profiles in the SAFDB. SAFDB is the most extensive steganography hash set publicly available. The file profiles contain identifying information such as filename, associated application name, file size, and several unique hash values. These hash values may be used to determine the presence of a steganography application or artifact of a steganography application on the media being examined. The SAFDB is available for download in formats compatible with most of the popular digital forensic tools and utilities: EnCase, Forensic Toolkit (FTK), HashKeeper, ILook, and ProDiscover.
• Steganography Analyzer Artifact Scanner (StegAlyzerAS) StegAlyzerAS gives you the capability to scan the entire file system, or individual directories, on suspect media for the presence of steganography application artifacts. And, unlike other popular forensic tools, you can perform an automated or manual search of the Windows Registry to determine whether or not any Registry keys or values exist that can be associated with a particular steganography application.
• Steganography Analyzer Signature Scanner (StegAlyzerSS) StegAlyzerSS gives you the capability to scan every file on the suspect media for the presence of hexadecimal byte patterns, or signatures, of particular steganography applications in the files. If a known signature is detected, it may be possible to extract information hidden with the steganography application associated with the signature.
• Steganography Analyzer Real-Time Scanner (StegAlyzerRTS) StegAlyzerRTS is the first commercially available network security appliance in the world capable of detecting the fingerprints and signatures of digital steganography applications in real-time.
Training
External Links
Personal tools
Namespaces
Variants
Actions
Navigation:
About forensicswiki.org:
Toolbox
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:02:39.000Z
|
fk755djacx5rhrtbbk5ibkurjkpkqpti
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8067",
"uncompressed_offset": 516553483,
"url": "www.isfdb.org/cgi-bin/diffselect.cgi",
"warc_date": "2013-11-22T14:54:25.000Z",
"warc_filename": "<urn:uuid:538441c1-957d-4877-a7e6-0a4b51ee8825>",
"warc_url": "http://www.isfdb.org/cgi-bin/diffselect.cgi?1082222"
}
|
cccc_CC-MAIN-2013-20
|
Bibliography: OG's Speculative Fiction - 2010
You are not logged in. If you create a free account and sign in, you will be able to customize what is displayed.
Title: OG's Speculative Fiction - 2010
Author: Seth Crossman
Year: 2010
Type: EDITOR
Select 2 publications to diff:
Copyright (c) 1995-2011 Al von Ruff.
ISFDB Engine - Version 4.00 (04/24/06)
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T08:11:48.000Z
|
gp7u6bitpmm6247j5d53odk7iw7bp654
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8068",
"uncompressed_offset": 516561187,
"url": "www.isfdb.org/cgi-bin/title.cgi",
"warc_date": "2013-11-22T14:54:25.000Z",
"warc_filename": "<urn:uuid:538441c1-957d-4877-a7e6-0a4b51ee8825>",
"warc_url": "http://www.isfdb.org/cgi-bin/title.cgi?259231"
}
|
cccc_CC-MAIN-2013-20
|
Bibliography: Cover: The Incomer
You are not logged in. If you create a free account and sign in, you will be able to customize what is displayed.
Title: Cover: The Incomer
Author: Jane Furst
Year: 1987
Type: COVERART
ISFDB Record Number: 259231
User Rating: This title has fewer than 5 votes. VOTE
Current Tags: None Add Tags
Publications:
Copyright (c) 1995-2011 Al von Ruff.
ISFDB Engine - Version 4.00 (04/24/06)
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:27:20.000Z
|
w6bb6aclrgo5wed3crkhnseukm367wsj
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8082",
"uncompressed_offset": 613702080,
"url": "www.ohloh.net/p/dia/contributors/985695170394",
"warc_date": "2013-11-22T14:54:25.000Z",
"warc_filename": "<urn:uuid:538441c1-957d-4877-a7e6-0a4b51ee8825>",
"warc_url": "http://www.ohloh.net/p/dia/contributors/985695170394"
}
|
cccc_CC-MAIN-2013-20
|
Moderate Activity
Contributors : Marek Černocký
Analyzed 5 days ago based on code collected 5 days ago.
Activity on Dia by Marek Černocký
All-time Commits: 4
12-Month Commits: 1
30-Day Commits: 0
Overall Kudo Rank:
First Commit: 09-Jan-2012
Last Commit: 16-Nov-2012
Names in SCM: Marek Černocký
Commit history:
Recent Kudos...
... for Dia given by:
There are no kudos for this contributor at this time.
Do you know this contributor?
Ohloh computes statistics about contributors by analyzing their commits on all FOSS projects. We would like to be able to attribute this work to the right person, so if you know the contributor, please help out:
Are you this developer?
Add this position to your profile!
Know this developer?
Send him or her an invite to join Ohloh.
Project Commits
Approximately one year of commit activity shown
Project Languages
Ohloh did not measure any lines of code written by this contributor.
Copyright © 2013 Black Duck Software, Inc. and its contributors, Some Rights Reserved. Unless otherwise marked, this work is licensed under a Creative Commons Attribution 3.0 Unported License . Ohloh ® and the Ohloh logo are trademarks of Black Duck Software, Inc. in the United States and/or other jurisdictions. All other trademarks are the property of their respective holders.
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:43:59.000Z
|
uulhk6prfywvalfqaftnzyddvujntzso
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8093",
"uncompressed_offset": 617206340,
"url": "www.openwetware.org/index.php?oldid=545191&title=Lactobacillus_transformation_%28Speer_2012%29",
"warc_date": "2013-11-22T14:54:25.000Z",
"warc_filename": "<urn:uuid:538441c1-957d-4877-a7e6-0a4b51ee8825>",
"warc_url": "http://www.openwetware.org/index.php?title=Lactobacillus_transformation_(Speer_2012)&oldid=545191"
}
|
cccc_CC-MAIN-2013-20
|
Lactobacillus transformation (Speer 2012)
From OpenWetWare
Revision as of 12:22, 6 October 2011 by Michael A. Speer (Talk | contribs)
Jump to: navigation, search
Back to Protocols
Back to Electro-transformation of Lactobacillus spp.
Back to Richard Lab:protocols
Contents
Overview
This is basically a combination of the version of the Berthier (1996) protocol and the Mason (2005)protocol. This protocol is designed for use with Lactobacillus plantarum and an Eppendorf 2510 electroporator. For other protocols check out the Lactobacillus transformation archive.
Materials
• MRS media
• Glycine
• Milipore water
• 50mM EDTA solution
• Electroporation Buffer (0.5M Sucrose, 10% glycerol)
Procedure
1. Grow L. plantarum
1. Inoculate 5ml MRS medium with L. plantarum freezer stock.
2. Grow overnight at 30°C without shaking.
2. Make 100ml 2% glycine:
1. Add 1g glycine to two flasks of 50ml MRS medium.
2. Shake to dissolve.
3. Grow cells:
1. Add 1ml overnight culture to each flask (1:50 dlution).
2. Culture for ~3 hours at 37°C with shaking.
4. Wash 2x with ice-cold DI water:
1. Centrifuge culture for 5min at 4000g
2. Resuspend in 25ml ice-cold DI water.
3. Repeat.
5. Treat with ice-cold EDTA:
1. Centrifuge for 5min at 4000g
2. Resuspend in 10ml 50mM EDTA.
3. Incubate on ice for 5 minutes
6. Wash with ice-cold DI water:
1. Centrifuge culture for 5min at 4000g
2. Resuspend in 25ml ice-cold DI water.
7. Wash 2x with Electroporation Buffer:
1. Centrifuge culture for 5min at 4000g
2. Resuspend in 25ml ice-cold 0.5M Sucrose, 10% glycerol.
3. Repeat.
8. Concentrate cells:
1. Centrifuge culture for 5min at 4000g
2. Resuspend in 0.8ml ice-cold 0.5M Sucrose, 10% glycerol.
9. Divide cells:
1. Aliquot 90μL of cell concentrate into ~20 microcentrifuge tubes.
2. Keep on ice until use (within the next two hours).
10. Add DNA:
1. Add 10μL of plasmid DNA to the 90μL of cell concentrate.
2. Keep on ice for 5 minutes.
3. Put 1mm cuvettes on ice too.
11. Electroporate:
1. Pipette the cell/DNA mixture into the cuvette
2. Electrporate at 1200 volts
3. Time constant should be ~5.0
12. Recovery:
1. Immediately transfer the electroporated cells to 900μL of MRS medium.
2. Incubate at 30°C for 2-3 hours.
13. Select:
1. Plate on medium with the appropriate antibiotic
2. Incubate at 30°C for two days.
3. Pick colony
Notes
• All of the liquid reagents/buffers should be autolaved before use.
• This protocol works well for chromosomal insertion
• Notice the high amount of DNA added to the competent cells (10%)
• While glycerol in the electroporation buffer is typically used to make frozen competent cells, this is not advised and will lead to decreased competency. Instead the glycerol addition is strictly to increase to competency of the cells. The reason behind this correlation is not understood.
References
There will be one here soon.
Contact
• Tom Richard (tlr20@psu.edu)
• Mike Speer (mas853@psu.edu)
or instead, discuss this protocol. -->
Personal tools
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T05:21:48.000Z
|
a2ezj6ggxpvye7jgtwuiqtlbgzd5u3zo
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8094",
"uncompressed_offset": 617213646,
"url": "www.openwetware.org/index.php?oldid=652896&title=Sacks%3ARAD-seq",
"warc_date": "2013-11-22T14:54:25.000Z",
"warc_filename": "<urn:uuid:538441c1-957d-4877-a7e6-0a4b51ee8825>",
"warc_url": "http://www.openwetware.org/index.php?title=Sacks:RAD-seq&oldid=652896"
}
|
cccc_CC-MAIN-2013-20
|
Sacks:RAD-seq
From OpenWetWare
Revision as of 18:59, 9 November 2012 by Lindsay V. Clark (Talk | contribs)
Jump to: navigation, search
Contents
Overview
This is a protocol for generating RAD libraries for Illumina sequencing. With this technique, 96 samples can be multiplexed into one sequencing library, and only tags adjacent to PstI sites are sequenced. This is a cheap way to both mine and genotype large numbers of SNPs. This is the protocol developed in Erik Sacks' lab at UIUC by Lindsay Clark, based on protocols from Pat Brown and Megan Hall.
Materials
Reagents
• Quant-iT Picogreen kit (Invitrogen)
• Qiagen gel purification kit
• Qiagen PCR cleanup kit
• From New England Biolabs:
• PstI-HF, 20,000 U/mL
• MspI, 20,000 U/mL
• T4 DNA ligase, 2,000,000 U/mL
• ATP
• Phusion High Fidelity PCR master mix
• 100 bp DNA ladder
• gel loading dye that does NOT have bromophenol blue
Note: MspI is not a heat-inactivated enzyme, but I have found that the protocol works anyway. Between the ligation and gel extraction steps, I keep the sample on ice to prevent any residual digestion activity.
• You will also need a black microtiter plate for the Picogreen assay.
Oligonucleotides
PstI adapters
This is the most expensive part of the protocol other than the sequencing itself, since 192 oligonucleotides must be ordered.
Adapter 1 top: 5'GATCTACACTCTTTCCCTACACGACGCTCTTCCGATCTxxxxTGCA3'
Adapter 1 bottom: 5'yyyyAGATCGGAAGAGCGTCGTGTAGGGAAAGAGTGTAGATC3'
Where xxxx and yyyy are the barcode and its reverse complement, respectively.
Barcodes and oligo sequences are from Pat Brown's lab.
Media:PstI-barcodes.txt
Other oligos
MspI adapters:
• A2top: 5'CGCTCAGGCATCACTCGATTCCTCCGAGAACAA3'
• A2bot: 5'CAAGCAGAAGACGGCATACGACGGAGGAATCGAGTGATGCCTGAG3'
Illumina PCR primers:
• PCR1: 5'AATGATACGGCGACCACCGAGATCTACACTCTTTCCCTACACGACGCTCTTCCGATCT3'
• PCR2: 5'CAAGCAGAAGACGGCATACGA3'
Equipment
• Nanodrop spectrophotometer
• BioTek Synergy plate reader (for reading fluorescence)
• Ordinary PCR machine
• Agarose gel rig
• UV transilluminator for gel excision
• Bioanalyzer
• real-time PCR machine (we just pay the core facility to do that part)
Procedure
Adapter prep
Top and bottom strands of adapters need to be annealed 1X Annealing Buffer, which is 10 mM Tris, 50 mM NaCl.
The annealing program is:
• 95°C 5 minutes
• Ramp down -0.1°C every 2 seconds (or -1°C every 20 seconds) to 25°C.
My protocol:
• Pat Brown provided us with a plate of PstI adapters that are at 1 μM. I took a bottle of autoclaved 1X Annealing Buffer, added 45 μl to each well of a 96-well plate, then transferred 5 μl from the 1 μM plate to make a 0.1 μM working stock.
• MspI adapters are ordered like normal oligos, and I have 100 μM concentrated stocks in TE. To make a 10 μM stock:
• 20 μl A2top, 100 μM
• 20 μl A2bot, 100 μM
• 20 μl 500 mM NaCl
• 2 μl 1M Tris
• 138 μl nuclease-free water
• Mix well, add 100 μl to each of two PCR tubes, and run them on the annealing program ("Adapt" on the PCR machine).
DNA quantification and dilution
Nanodrop first:
1. Quantify your DNA using the Nanodrop spectrophotometer.
2. If the DNA concentration is greater than 200 ng/ul, dilute to 200 ng/ul. I find it useful to set up these dilutions on a 96-well plate. If the DNA is between 50 and 200 ng/ul, just put an aliquot directly on your dilution plate. If it is less than 50 ng/ul, you need to redo the extraction or find a way to concentrate the DNA.
Quantify your ≤200 ng/ul dilution plate using Picogreen:
1. Take the tube of bright orange Picogreen reagent out ahead of time to thaw. Wrap it in aluminum foil to protect it from light. It is in DMSO instead of water, so it takes a long time to thaw and will immediately freeze solid if you put it on ice.
2. The Quant-iT Picogreen kit comes with a lambda DNA standard at 100 ug/ml. Dilute some of the 20X TE that comes with the kit to 1X TE, and use it to make a 2 ug/ml dilution of the lambda DNA. (1:50 dilution.)
3. For one plate (88 samples, 8 standards) make up 20 mL of 1X TE. (1 mL of the TE that comes with the kit, plus 19 mL sterilized filtered water.)
4. The plate you need for the assay is a black, flat-well plastic plate. (Corning makes these.)
5. Set up a standard curve in column 1 (or column 12, doesn’t matter). Pipette 100 ul of TE into wells B-H. Add 100 ul of your 2 ug/ml lambda standard each to well A and B. Pipette well B up and down to mix, then transfer 100 ul to well C. Pipette well C up and down to mix, then transfer 100 ul to well D. Continue through well G, and leave well H as a blank. (After mixing well G, you will simply throw out 100 ul.)
6. Add 99 ul TE to the other 88 (or however many samples you are doing) wells . Add 1 ul of ≤200 ng/ul sample DNA to each well.
7. Add 50 ul of Quant-iT reagent to 10 mL of 1X TE. This solution needs to be used within a few hours, even if it is protected from light. Add 100 ul of the solution to each well (both sample, standard, and blank).
8. Picogreen bonded to dsDNA has an excitation maximum at 480 nm and emission maximum at 520 nm. The plate readers in IGB (BioTek Synergy HT) probably already have a picogreen program on them.
9. Read fluorescence intensity on the plate reader, and export it to Microsoft Excel.
10. Make a scatterplot of fluorescence intensity of the standard vs. the standard concentration. Given that the samples were diluted 200X, the standard concentration is multiplied by 200:
1. Well A 200 ng/ul
2. Well B 100
3. Well C 50
4. Well D 25
5. Well E 12.5
6. Well F 6.25
7. Well G 3.125
8. Well H 0
11. In Excel, fit a trendline to the scatterplot and display the equation on the chart. Use this equation to estimate the concentration of the samples.
In most cases, the concentration estimate via Picogreen should be lower than the concentration estimate via Nanodrop. This is because Nanodrop measures DNA + RNA, whereas Picogreen only measures DNA. Why didn’t we just use Picogreen to begin with? Because it can measure a much narrower range of concentrations than Nanodrop can. If the standard curve were any more concentrated, it would not be linear.
Based on the Picogreen concentration estimates, dilute the DNA to 50 ng/μL in 10 mM Tris (and 0.1 mM EDTA, optional).
Restriction digestion and ligation
Restriction digestion master mix:
Ingredient For one sample For one plate
50 ng/ul DNA 5 ul -
10X NEBuffer 4 1.5 ul 165 ul
PstI-HF, 20,000 U/mL 0.25 ul 27.5 ul
MspI, 20,000 U/mL 0.25 ul 27.5 ul
Nuclease-free water 8 ul 880 ul
(I have also used DNA at a concentration of 100 ng/ul because that was what Keck wanted for GoldenGate, so then I used 2.5 ul DNA and 10.5 ul water.)
Do this in a 96-well plate. Pipette the DNA into the wells and then add 10 ul of master mix to everything. Pick one well that will not have DNA in it. This will be an important control later on to demonstrate that this library was not contaminated with another library (which will have a different empty well).
Run the Digest program on the PCR machine: 3 hours at 37°C, then 20 minutes at 80°C.
Using a multichannel pipette, add 1.5 μL of 0.1 μM PstI adapters to their corresponding wells on the digestion plate. (Do add the adapter corresponding to the well that has no DNA in it.)
Ligation master mix, keep on ice until use:
Ingredient For one sample For one plate
10X Ligase buffer with ATP 1 ul 110 ul
10 μM MspI adapter 0.5 ul 55 ul
10 mM ATP 1.5 ul 165 ul
T4 Ligase, 2M U/mL 0.1 ul 11 ul
Nuclease-free water 5.4 ul 594 ul
Add 8.5 μL of ligation master mix to each well of the digestion plate.
Run on the "ligate" program on the PCR machine: 2 hours at 25°C, 20 minutes at 65°C.
Cleanup and amplification
• Using a multichannel pipette and a PCR 8-well strip tube, pool all the columns together, adding 5 μL from each well of the plate to the wells on the strip tube.
• Pipette the 60 μL out of each well on the strip tube into one 1.5 mL tube. Mix well so that all samples are combined evenly. Freeze or keep on ice.
• Pour a 2% agarose gel with ethidium bromide. Make it nice and deep; my recipe is 3 g agarose, 150 mL 1X TAE, and 7.5 μL ethidium bromide solution. Use a wide-toothed comb.
• Take 40 μL (or more depending on your well volume) of your pooled library and combine it with a loading dye that does not have bromophenol blue. I actually use 10 μL of Promega GoTaq Green PCR buffer, despite the fact that I'm not doing PCR, since it doubles as a loading dye and lacks bromophenol blue.
• I recommend cleaning out your gel rig and putting in fresh TAE, since you especially want to avoid any contamination from other Illumina libraries.
• Run your ~50 μL of library plus loading dye on the gel. The lane with the library should have a lane of 100 bp ladder on either side of it. You can put multiple libraries on one gel, but leave several empty lanes between them.
• The gel doesn't need to be run very long. I would go 20 minutes at 100 V, or until the ladder bands below 500 bp are distinguishable.
• The library should look like a smear. There may be some undigested DNA (a band in the 10's of kb) but that is okay as long as most of the DNA is digested. There may also be a thick band of leftover adapter below 100 bp.
• Using a clean razor blade for each library, cut out the smear between 200 bp and 500 bp. There should definitely be DNA visible in this range.
• Use the Qiagen gel extraction kit to purify the DNA out of this gel slice. Elute in the lower volume (30 μL EB).
• Run the Illumina PCR:
• 3 μL gel-extracted library
• 2 μL 10 μM forward + reverse Illumina primers (PCR1 and PCR2)
• 25 μL 2X Phusion Master mix
• 20 μL nuclease-free water
• PCR program:
• 98°C 30 seconds
• 15 cycles of 98°C 10 seconds, 65°C 30 seconds, 72°C 30 seconds
• 72°C 5 minutes
• Run 5 μL of the PCR product out on a 2% agarose gel. Look to see whether there is primer-dimer visible.
• If there is primer-dimer visible, run the remaining 45 μL of PCR product on a 2% agarose gel and extract the library (as was done pre-PCR). Follow the instructions in the Qiagen gel extraction kit as specified for sequencing. (After binding DNA to the column, do a wash with QG. When rinsing with PE, let sit for 2-5 minutes before spinning.)
• If there is no primer-dimer visible, use the Qiagen PCR cleanup kit to purify the remaining 45 μL of PCR product.
Quality control
• Quantify the purified PCR product using the Picogreen protocol as above. Expected concentrations are in the 10's of ng/μL.
• Run on a DNA 1000 chip on the Bioanalyzer. There should be a smooth curve from around 200 to 500 bp. Any sharp peaks could indicate that the enzymes were cutting in a repetitive region of the genome, in which case it is best to choose different enzymes. Use the Bioanalyzer software to calculate the average fragment size.
• If there is primer-dimer remaining in the library, it will be visible as a sharp peak at a lower molecular weight than the broad peak for the library.
• Calculate the concentration of the PCR product in nM. Keck supplies a worksheet for this calculation. If x is the concentration in ng/μL, y is the average size in base pairs, and z is the concentration in nM, then .
• Dilute the purified PCR product to 10 nM.
• Give 20 μL of 10 nM library to the core facility (Keck). They will use real-time PCR to confirm a concentration of 10 nM. Using Illumina Hi-Seq, do one lane of 100 bp single-end reads.
Bioinformatics
Notes
Please feel free to post comments, questions, or improvements to this protocol. Happy to have your input!
1. List troubleshooting tips here.
2. You can also link to FAQs/tips provided by other sources such as the manufacturer or other websites.
3. Anecdotal observations that might be of use to others can also be posted here.
Please sign your name to your note by adding '''*~~~~''': to the beginning of your tip.
References and additional reading
• Baird NA, Etter PD, Atwood TS, Currey MC, Shiver AL, et al. (2008) Rapid SNP Discovery and Genetic Mapping Using Sequenced RAD Markers. PLoS ONE 3(10): e3376. doi:10.1371/journal.pone.0003376
• Catchen JM, Amores A, Hohenlohe P, Cresko W, and Postlethwait JH (2011) Stacks: building and genotyping loci de novo from short-read sequences. G3: Genes, Genomes, Genetics 1:171-182. doi: 10.1534/g3.111.000240
• Davey JL and Blaxter MW (2010) RADSeq: next-generation population genetics. Briefings in Functional Genomics 9(5):416-423. doi:10.1093/bfgp/elq031
• Elshire RJ, Glaubitz JC, Sun Q, Poland JA, Kawamoto K, Buckler ES, and Mitchell SE (2011) A robust, simple Genotyping-by-Sequencing (GBS) approach for high diversity species. PLoS One 6(5): e19379. doi:10.1371/journal.pone.0019379
• Serang O, Mollinari M, Garcia AAF (2012) Efficient Exact Maximum a Posteriori Computation for Bayesian SNP Genotyping in Polyploids. PLoS ONE 7(2): e30906. doi:10.1371/journal.pone.0030906
Contact
or instead, discuss this protocol.
Personal tools
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:51:10.000Z
|
bgpotkues72yek2oljfzkffwzkdfwtkf
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8096",
"uncompressed_offset": 629661201,
"url": "www.perseus.tufts.edu/hopper/text?doc=Perseus%3Atext%3A1999.02.0020%3Atext%3DMil.%3Asection%3D9",
"warc_date": "2013-11-22T14:54:25.000Z",
"warc_filename": "<urn:uuid:538441c1-957d-4877-a7e6-0a4b51ee8825>",
"warc_url": "http://www.perseus.tufts.edu/hopper/text?doc=Perseus%3Atext%3A1999.02.0020%3Atext%3DMil.%3Asection%3D9"
}
|
cccc_CC-MAIN-2013-20
|
[9] And if the Twelve Tables have permitted that a nightly robber may be slain any way, but a robber by day if he defends himself, with a weapon, who is there who can think a man to be punished for slaying another, in whatever way he is slain, when he sees that sometimes a sword to kill a man with is put into our bands by the very laws themselves?
This work is licensed under a Creative Commons Attribution-ShareAlike 3.0 United States License.
An XML version of this text is available for download, with the additional restriction that you offer Perseus any modifications you make. Perseus provides credit for all accepted changes, storing new additions in a versioning system.
load focus Notes (J. B. Greenough, G. L. Kittredge)
load focus Latin (Albert Clark, Albert Curtis Clark, 1918)
hide Places (automatically extracted)
View a map of the most frequently mentioned places in this document.
Visualize the most frequently mentioned Pleiades ancient places in this text.
Download Pleiades ancient places geospacial dataset for this text.
hide References (7 total)
• Commentary references to this page (2):
• J. B. Greenough, G. L. Kittredge, Select Orations of Cicero, Allen and Greenough's Edition., AG Cic. 8
• J. B. Greenough, G. L. Kittredge, Select Orations of Cicero, Allen and Greenough's Edition., AG Cic. 14
• Cross-references to this page (2):
• Allen and Greenough's New Latin Grammar for Schools and Colleges, PRONOUNS
• A Dictionary of Greek and Roman Antiquities (1890), COMIT´IA
• Cross-references in general dictionaries to this page (3):
hideData/Identifiers
Citation URN: urn:cts:latinLit:phi0474.phi031.perseus-eng1:9
Document URN: urn:cts:latinLit:phi0474.phi031.perseus-eng1
hide Display Preferences
Greek Display:
Arabic Display:
View by Default:
Browse Bar:
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T05:30:04.000Z
|
vm2yti57l4awd72chjjtso4k5uwpup2p
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8097",
"uncompressed_offset": 629751907,
"url": "www.perseus.tufts.edu/hopper/text?doc=Perseus%3Atext%3A2001.05.0093%3Achapter%3D142%3Apage%3D553&ie_sort=token",
"warc_date": "2013-11-22T14:54:25.000Z",
"warc_filename": "<urn:uuid:538441c1-957d-4877-a7e6-0a4b51ee8825>",
"warc_url": "http://www.perseus.tufts.edu/hopper/text?doc=Perseus:text:2001.05.0093:chapter=142:page=553&ie_sort=token"
}
|
cccc_CC-MAIN-2013-20
|
[553] withdrawing the troops, going into camp, and sending for Smith, getting all our troops together, and then advance on the enemy and whip him soundly. But Franklin and Banks overruled him. Ransom formed his line. While this was taking place, a lieutenant of the Second Illinois cavalry came to Generals Stone and Lee and reported the enemy massing his force on our right and preparing to attack us, which they soon did with a vengeance; but just before the attack, General Banks ordered General Ransom to move his forces to the right. General Ransom then exclaimed: “That beats us.” Too true! for the move on the right was only a feint; but with the practised eye of an old soldier, he detected the movement, but obeyed the order of his superior officer. Nim's Second Massachusetts battery was at the extreme front, (and here let me say there was no better battery in the United States service,) supported by the Twenty-second Wisconsin regiment. On the left of that regiment was a portion of Lee's cavalry; on the right of Nim's battery was the Sixty-seventh Indiana; next, the Seventy-seventh and the One Hundred and Thirtieth Illinois; next, the Nineteenth Kentucky, Forty-eighth Ohio, and the Third division, which came in just as the enemy and our skirmishers met. We drove their skirmishers back on their main body, which was advancing four deep in three lines, one after the other, at a “right shoulder shift arms” in the form of a half-circle massed in the centre. Our main lines soon met. The Nineteenth Kentucky and the One Hundred and Thirtieth Illinois were first engaged, then Nim's battery, the Sixty-seventh Indiana, and the Seventy-seventh Illinois, and then the whole line, including the Chicago Mercantile and the First Indiana batteries. The enemy soon pressed back our cavalry, which was on the flanks, and came at double-quick on the infantry. The cavalry giving way exposed the flank of the infantry, both right and left, but they held their front manfully until they were compelled to fall back or be captured. They then fell back, slowly at first, dropping by hundreds on the wayside, bleeding and exhausted. But what at first was an orderly retreat soon became almost a rout. Nim's battery worked manfully — the veteran battery, the hero of seventeen engagements, always successful, but this time doomed to defeat — they double-charged their guns with canister, and adding a bag of bullets, mowed the enemy down, only to have their places filled again by the advancing hordes. But the battery support were forced back, and the enemy made a dash and took the guns. The cavalry by this time were in a panic, our infantry were driven out of the woods to the Chicago Mercantile battery, where they made a desperate effort to check the enemy. The battery, in connection with the First Indiana, did good work, but all to no purpose, as far as checking the enemy was concerned. The troops fell back to the woods on this side of the field, the enemy in close pursuit. Now all will ask: “Where was the Nineteenth army corps?” Let me tell you; back in the woods, some six miles distant, by order of General Franklin. They were sent for, as were the Ninety-sixth and Eighty-third Ohio, of the Fourth division, who were guarding a train. These two regiments soon came up and went at it desperately. They held the enemy in our front, but their flanks advanced and they were compelled to give way. Now comes the most painful part of this sad affair. General Ransom is wounded in the knee whilst trying to rally his men, and his assistant Adjutant-General killed, shot through the head. Our artillery retreated to the woods, and to the one road leading to the rear, and that was blocked full of wagons containing ammunition and supplies belonging to the cavalry, (all there by order of Generals Banks and Franklin,) so the batteries had to be abandoned. We lost here seventeen pieces of artillery, but the fight did not end yet, for the two regiments at the wood soon gave way, and on they came. Oh! may I never see the like again. Horses, men, wagons, all going to the rear — all saying: “Lost! Lost!” At about half an hour before sundown, and after the day was lost, and a large train captured, up came the Nineteenth army corps on the doublequick, having run the entire distance of some five miles. They soon formed in the woods and went at it. The roar of musketry was awful, but they soon checked the enemy, who had, by this time, been severely punished. Here the hard-fought battle of Mansfield ceased.
Now let me sum up our position: In a dense wood, in front of a victorious enemy, at least twenty-five thousand strong, we only six thousand troops to oppose them; many wounded, and over four hundred wagons to be moved, a distance of more than nineteen miles, to Pleasant Hill, by only one road, and that bad, and lined with heavy pine forests on each side. Do you wonder at our feeling dispirited, knowing that the enemy would attack us in the morning? But we fell back, building huge fires all along the road to dispel the darkness, and arrived at Pleasant Hill at about four o'clock A. M., on the ninth instant, where we found General A. J. Smith, with his column, ready to dispute with the enemy for the final mastery of the field. On the ninth, at twelve o'clock M., our wagon-train filed into the road for this place. I came at the same time. General Smith had formed his line of battle, and was skirmishing when I left. The Thirteenth army corps also came here, they being worn out and cut to pieces.
Now let me estimate our losses. First, in the Thirteenth army corps alone, I put it at one thousand, killed and wounded, and one thousand two hundred taken prisoners; and this out of four thousand men. We lost seventeen pieces of artillery, and about seventy-five wagons, loaded with ammunition, supplies, and forage; also sixteen ambulances, and nearly all our wounded. Poor boys! to be wounded and also prisoners — my heart bleeds for them.
On the afternoon of the ninth, General Smith had one of the severest engagements of the war; but he, being something of a general, succeeded
This work is licensed under a Creative Commons Attribution-ShareAlike 3.0 United States License.
An XML version of this text is available for download, with the additional restriction that you offer Perseus any modifications you make. Perseus provides credit for all accepted changes, storing new additions in a versioning system.
hide Places (automatically extracted)
View a map of the most frequently mentioned places in this document.
Sort places alphabetically, as they appear on the page, by frequency
Click on a place to search for it in this document.
Pleasant Hill (Louisiana, United States) (2)
United States (United States) (1)
Visualize the most frequently mentioned Pleiades ancient places in this text.
Download Pleiades ancient places geospacial dataset for this text.
hide People (automatically extracted)
Sort people alphabetically, as they appear on the page, by frequency
Click on a person to search for him/her in this document.
T. E. G. Ransom (4)
Nim (4)
A. J. Smith (3)
William B. Franklin (3)
N. P. Banks (3)
S. P. Lee (2)
Charles P. Stone (1)
Andrew Jackson Smith (1)
hide Dates (automatically extracted)
Sort dates alphabetically, as they appear on the page, by frequency
Click on a date to search for it in this document.
9th (3)
hide Display Preferences
Greek Display:
Arabic Display:
View by Default:
Browse Bar:
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T08:09:18.000Z
|
a5cweofrcwg3nst2gre4myyi3wnwsfiw
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8098",
"uncompressed_offset": 629775583,
"url": "www.perseus.tufts.edu/hopper/text?doc=urn%3Acts%3AlatinLit%3Aphi1017.phi013.perseus-lat1%3A5.6.3",
"warc_date": "2013-11-22T14:54:25.000Z",
"warc_filename": "<urn:uuid:538441c1-957d-4877-a7e6-0a4b51ee8825>",
"warc_url": "http://www.perseus.tufts.edu/hopper/text?doc=urn:cts:latinLit:phi1017.phi013.perseus-lat1:5.6.3"
}
|
cccc_CC-MAIN-2013-20
|
Click on a word to bring up parses, dictionary entries, and frequency statistics
This work is licensed under a Creative Commons Attribution-ShareAlike 3.0 United States License.
An XML version of this text is available for download, with the additional restriction that you offer Perseus any modifications you make. Perseus provides credit for all accepted changes, storing new additions in a versioning system.
hide References (1 total)
• Cross-references in general dictionaries to this page (1):
load Vocabulary Tool
hideData/Identifiers
Citation URN: urn:cts:latinLit:phi1017.phi013.perseus-lat1:5.6.3
Document URN: urn:cts:latinLit:phi1017.phi013.perseus-lat1
hide Display Preferences
Greek Display:
Arabic Display:
View by Default:
Browse Bar:
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T05:25:24.000Z
|
t5jkpvhavl3m52yrodg7em6zedymxyus
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8107",
"uncompressed_offset": 695710949,
"url": "www.sourcewatch.org/index.php?title=Layalina_Productions",
"warc_date": "2013-11-22T14:54:25.000Z",
"warc_filename": "<urn:uuid:538441c1-957d-4877-a7e6-0a4b51ee8825>",
"warc_url": "http://www.sourcewatch.org/index.php?title=Layalina_Productions"
}
|
cccc_CC-MAIN-2013-20
|
CMD sent two reporters to track ALEC in Oklahoma
Click here to help support our future investigations.
Layalina Productions
From SourceWatch
Jump to: navigation, search
Layalina Productions, Inc., a 501(c)(3) non-profit, private sector corporation [1], was "founded in March 2002 by Richard Fairbanks, the former chief U.S. negotiator for the Middle East Peace Process, to produce thoughtful Arabic-language television programming for broadcast in the Arab Middle East. The corporation's Board of Counselors comprises former diplomats and officials, broadcasters, and private sector executives from the United States. Layalina's educational, debate, entertainment, and children's shows aim to strengthen existing bridges of mutual understanding between the U.S. and the Arab world and build new ones." Fairbanks is Layalina's Chairman of the Board; Marc Charles Ginsberg, a former U.S. Ambassador to Morocco, is president; and Layalina's Honorary Chairman is former President George H.W. Bush. [2]
Note: Layalina Productions "('Our Nights') in Arabic", was "formally called Al-Haqiqa ('The Truth')." [3]
Contents
About
"Layalina develops and produces informative and entertaining Arabic-language programming for licensing to satellite and cable television networks throughout the Arab Middle East and North Africa," its website states. [4]
They also boast that "Hollywood's best develop our programming with input from our Program Production Advisory Board", adding that "Layalina's efforts represent the first private sector initiative to establish new lines of communication and dialogue with citizens and key opinion leaders throughout the Arab world. We realize that no single television program or series will immediately alter increasingly hardening attitudes, but America cannot afford to forfeit the terrain in the battle of ideas." [5]
Battle to "win hearts and minds"
"Layalina develops and produces documentaries, debates, entertainment, and children's programming for broadcast in the vernacular on Arab-owned satellite and cable television networks throughout the Arab world," Fairbanks wrote in a June 2005 article for Yale University alumni.
"Although the Bush administration has established a few major media initiatives and is clearly focused on a variety of policies to reshape the Middle East, their battle to win 'hearts and minds' has thus far not been a smashing success. The contribution of non-governmental actors, particularly non-profits, in public diplomacy initiatives can help ameliorate Arab skepticism toward the U.S. The interpersonal, apolitical, and non-profit character of Layalina and its credibility and production values makes it particularly attractive for Arab broadcasting networks and individuals. Layalina's projects and objectives are also, of course, quite attractive to our private sector as American citizens and companies living in and doing business in the Arab world can only benefit from improved relations between the United States and the Arab world," Fairbanks wrote.
Funding
"Layalina is funded solely through tax-deductible donations from individuals and corporations, and through grants by foundations based in the U.S. and the Arab world." [6]
In 2003, Layalina received $25,000 from the right-wing JM Foundation. [7]
In 2005, the Richard M. Fairbanks Foundation, Inc. gave Laylina two grants—$1,680,000 and $50,000—"in support of Programs". [8]
In October 2005, Layalina received a grant from The William and Flora Hewlett Foundation of California (www.hewlett.org) to "underwrite part of the development and pre-production expenses for Ben & Izzy, including character development, bible, and pilot production. This cross-cultural children’s animation series will be co-produced by Layalina Productions of Washington, DC, and Rubicon of Amman, Jordan. David Pritchard, as Executive Director, will lead the creative team." [9]
Online Fundraising: Swift Boat Connection
The web address for Layalina Productions' fundraising efforts links to DonationReport.com, plus an extension code for Layalina Productions.
The connection for the DonationReport.com website arrives at a Login page—requiring both a User ID and Password—which belongs to eDonation.com, a member of The Donatelli Group, a fundraising company that has raised campaign funds for the Republican National Committee, Republican National Convention, Bush-Cheney '04 Inc., John McCain, the NRA [10], and an exhaustive list of Republican members of the U.S. Senate and the U.S. House of Representatives, as well as other political organizations. [11]
The Donatelli Group, using its "primary segment" Campaign Solutions [12], is associated with Creative Response Concepts, the public relations firm that advised Swift Boat Veterans for Truth, the "organization that accused Kerry of inflating his Vietnam War record" during the 2004 presidential campaign. [13]
The Donatelli Group, which produced the RNC website [14], also created the SWIFTBOATVETSFORTRUTH.ORG website July 30, 2004, with Connell Donatelli Inc. (a.k.a. The Donatelli Group) as Registrant. Connell Donatelli Inc. was also listed as both Administrator and the Tech Organization for the Swift Boat Veterans for Truth website. [15]
Staff
Directors
Board of Counselors
Source
Contact
Layalina Productions
1800 K Street, NW, Suite 400
Washington, DC 20006
Phone:202-775-3202 Fax:202-822-6354
Email: information AT layalina.tv
Web: http://www.layalina.tv
Related SourceWatch Resources
External links
Personal tools
Namespaces
Variants
Actions
Navigation
How To
Other Info
Other Policies
Google AdSense
Toolbox
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T08:10:02.000Z
|
5zrxuz6apqeuexxlerklo6cln237nqqc
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8120",
"uncompressed_offset": 783505779,
"url": "www.werelate.org/wiki/Person:Violet_Washington_%281%29",
"warc_date": "2013-11-22T14:54:25.000Z",
"warc_filename": "<urn:uuid:538441c1-957d-4877-a7e6-0a4b51ee8825>",
"warc_url": "http://www.werelate.org/wiki/Person:Violet_Washington_(1)"
}
|
cccc_CC-MAIN-2013-20
|
Person:Violet Washington (1)
Violet Washington
Facts and Events
Name[1][2] Violet Washington
Gender Female
Census[3] 1870 Charleston, South Carolina, United States
Census[4] 1880 Charleston, South Carolina, United States
Census[5] 1900 Charleston, South Carolina, United States
Census[6] 1910 Charleston, South Carolina, United States
Contents
Violet Washington: Biographical Information
Violet Washington, age 32, opened a Freedmen's Bank account in Charleston, South Carolina on August 14, 1869. On her application, she stated that she was born in Georgetown County, South Carolina. In her application, Violet stated that her parents were Adam and Hagar (both deceased), her brothers were Friday Johnson and Peter Gilliard, and her sisters were Maria, Fanny and Diana (all deceased).
Violet's husband was Stephen Washington. They lived on Green Street near Dr. Bellinger and had no children in 1869. Violet was a seller in the Lower Market.
Violet and her husband Stephen were enumerated on the 1870 Federal Census in Charleston Ward 4. Their household in 1870 was:
Name Age Gender Color Occupation Birthplace
Washington, Stephen 32 M B Laborer GA
Washington, Violet 21 F B HucksterN1 SC
Washington, Mary 18 F B At School SC
The 1880 Federal Census shows Violet and Stephen living at 33 Wharf Street in Charleston. Their household in 1880 was:
Name Age Gender Color Relationship Birthplace
Washington, Stephen 45 M B GA
Washington, Violet 35 F B Wife SC
Washington, Rose 7 F B Adopt. Daughter SC
The 1900 Federal Census finds Stephen and Violet still living at 33 Wharf Street in Charleston. Their household in 1900 was:
Name Relationship Color Gender Birth Month Birth Year Age at Last Birthday Birthplace
Washington, Stephen Head B M Aug 1830 69 SC
Washington, Violet Wife B F June 1846 53 SC
The 1910 Federal Census reflects major changes in Violet's life: she is now widowed, and living with her is the family of her nephew Willis Johnson, Sr. Their household in 1910 was:
Name Relationship Gender Color Age Birthplace Occupation Place of Employment
Washington, Violet Head F B 53 SC Widowed
Johnson, Willis Nephew M B 31 SC Helper Boiler Works
Johnson, Rebecca Niece F B 22 SC None
Johnson, Willis Jr. Son M B 3 SC None
Johnson, Eliza Daughter F B 11 mos. SC None
Here, among Violet Washington's records, our Friday Johnson mystery crops up again. If the Willis Johnson, Violet's nephew, living in her household in 1910, is the same Willis Johnson listed in the household of Friday and Eliza Johnson in 1880, it is possible that Friday who listed Patsey as his wife on the 1871 Freedmen's Bureau record Person:Friday Johnson (3) and Friday who was married to Eliza at the time of the 1880 Census Person:Friday Johnson (1), are the same person. This awaits further investigation.
Violet's family is of interest to us because she may have ties to Drayton family plantations in Charleston, South Carolina. If you have information and/or records to share to help us learn more about Violet and her family, please do contact us. We will appreciate your contribution so much!
Family Group Sheet
Please note: Rose is listed in the Census as Violet and Stephen's adopted daughter.
More Features
You can click on "More" then "Pedi-Map" at the top right corner of this page to view pedigree charts, maps, timelines, thumbnail images and more for Violet's family.
About This Page
This page is part of a groundbreaking research project to rediscover the family lineages of enslaved people on Drayton family plantations in Barbados and the United States. To read more about this historic research, please visit the article below:
Genealogy of Enslaved Communities on Drayton Family Plantations: A Research Project Sponsored by the Magnolia Plantation Foundation of Charleston, SC
References
1. Freedmen's Bank Record 5352, Friday Johnson, Charleston, South Carolina, October 4, 1871.
Registers of Depositors in Branches of the Freedmen's Savings and Trust Company
Records of the Comptroller of the Currency (NARA RG 101)
NARA Micropublication M816, Reel 22
2. Freedmen's Bank Record 3341, Violet Washington, Charleston, South Carolina, August 14, 1869.
Registers of Depositors in Branches of the Freedmen's Savings and Trust Company
Records of the Comptroller of the Currency (NARA RG 101)
NARA Micropublication M816, Reel 21
3. 1870 Federal Census, United States.
Census Year: 1870; Census Place: Charleston Ward 4, Charleston, South Carolina; Roll M593_1486; Page 279; Image 561
4. 1880 Federal Census, United States.
Census Year: 1880; Census Place: Charleston, Charleston, South Carolina; Roll: T9_1222; Family History Film 1255222; Page 134.1000; Enumeration District: 59
5. 1900 Federal Census, United States.
Census Year: 1900; Census Place: Charleston Ward 5, Charleston, South Carolina; Roll: T623 1520; Page 18B
6. 1910 Federal Census, United States.
Census Year: 1910; Census Place: Charleston Ward 5, Charleston, South Carolina; Roll T624_1452; Page 20B; Enumeration District: 31; Image 338
7. A huckster was a market vendor.
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T08:11:23.000Z
|
cxjg3k4octm4kjoeyz2oxliiinl4zff7
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8121",
"uncompressed_offset": 783515102,
"url": "www.werelate.org/wiki/Place:Ellenboro,_Rutherford,_North_Carolina,_United_States",
"warc_date": "2013-11-22T14:54:25.000Z",
"warc_filename": "<urn:uuid:538441c1-957d-4877-a7e6-0a4b51ee8825>",
"warc_url": "http://www.werelate.org/wiki/Place:Ellenboro,_Rutherford,_North_Carolina,_United_States"
}
|
cccc_CC-MAIN-2013-20
|
Place:Ellenboro, Rutherford, North Carolina, United States
Watchers
NameEllenboro
Alt namesEllenburwellsource: USGS, GNIS Digital Gazetteer (1994) GNIS37009253
TypeTown
Coordinates35.33°N 81.759°W
Located inRutherford, North Carolina, United States
source: Getty Thesaurus of Geographic Names
the text in this section is copied from an article in Wikipedia
Ellenboro is a town in Rutherford County, North Carolina in the United States of America. The population was 479 at the 2000 census.
Research Tips
This page uses content from the English Wikipedia. The original content was at Ellenboro, North Carolina. The list of authors can be seen in the page history. As with WeRelate, the content of Wikipedia is available under the Creative Commons Attribution/Share-Alike License.
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T08:02:00.000Z
|
6zsk6kcweiw7e4kz2ahyntw6y2urxwbo
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8133",
"uncompressed_offset": 11480252,
"url": "archive.mises.org/18091/a-sticky-situation/",
"warc_date": "2013-11-22T14:55:26.000Z",
"warc_filename": "<urn:uuid:00f730d0-e727-4c6d-968b-f0ca37218a52>",
"warc_url": "http://archive.mises.org/18091/a-sticky-situation/"
}
|
cccc_CC-MAIN-2013-20
|
1. Skip to navigation
2. Skip to content
3. Skip to sidebar
Source link: http://archive.mises.org/18091/a-sticky-situation/
A Sticky Situation
August 15, 2011 by
Tyler Cowen’s recent blog post (“How are nominal wages sticky for the unemployed“) has stirred up quite a discussion on the blogosphere. I thought it proper for an “Austrian” to intervene and offer an opinion from what I think is a fairly unique perspective. This is written on the spot, so I apologize for any confusions or minor mistakes; I hope my general point is understood.
The point of Cowen’s post is difficult to distill. But, I think he is trying to point out a weakness in the “standard Keynesian theory”, in that the unemployed are not really the workers who contribute to any form of wage stickiness. That is, the unemployed are oftentimes willing to work for whatever wage they are offered. The workers who contribute to wage stickiness are the employed, since these are the ones actually earning what Cowen refers to as the “total wage bill” — that is, total aggregate nominal (money) demand is being distributed only to the employed. This may go in conjunction with his hypothesis that the unemployed have a zero marginal product — this is Paul Krugman’s accusation, at least (he wrongly attributes it to the Austrians).
The responses to Cowen have been mixed. Brad DeLong argues that wage inflexibility indeed does play a major role in the creation of mass unemployment, also criticizing what he calls the “Hayekian view” of blaming government institutions on wage inflexibility (and, as a result, largely missing Cowen’s actual point). I feel that Arnold Kling also misses the point, as he agrees that wage inflexibility does not play a major role in the current recession, when I don’t think that’s what Cowen was arguing at all. Scott Sumner is probably more on target than either DeLong or Kling, although he (as I) finds it strange that, if we accept the premise of wage inflexibility, wages are taking so long to adjust. He suggests it has to do with lack of adjustments to more recent macroeconomic problems (whatever those may be).
Cowen’s actual point is fair (although, I am not entirely sure anybody ever disputed it). Those who, in the Keynesian paradigm, affect wages are those who earn them, not those who do not. I think, though, that the problems with any theory of unemployment that rests with natural sticky wages (that is, natural to the market and not a market pervaded by government protectionism) is explaining how the workers have any say. For the most part, I have seen references to labor contracts, but labor contracts — like any contract — can be broken. Today, what disallows firms the flexibility of breaking contracts are the added costs to breaking them by government. This includes the red tape, the added costs of reparations to the worker, and the increased costs of hiring new workers. Oftentimes, it makes more sense to keep an old worker at the same wage than hire a new one, because the costs of doing all of this exceed what money could be earned by paying a lower wage.
This also serves as a response to DeLong. It’s not just a problem with unions, cartelized agreements to prop up wages, or minimum wage. There are various institutional factors which make wage adjustments very inflexible. This should almost be taken for granted, since the modern market is highly regulated — especially the labor market.
I think, though, that Krugman is right in rejecting Cowen’s suggestion that the unemployed suffer from zero marginal product (excepting the role of diminishing marginal returns and the limit to firm expansion in times of depression, any amount of workers can be employed at any level of productivity if wages are low enough). His own rationale, however, is flawed. I think the picture could be made much more accurate by looking at the issue from an Austrian angle. Specifically, I mean if we considered the labor market in conjunction with the structure of production in general, as I suggest in my recent article “Rethinking Depression Economics“.
I am not assuming away wage inflexibility, by the way. I just don’t think that the worker has much say in his wage, except if he empowered by the government. Otherwise, the worker is largely dependent on the employer honoring the contract (and, we should also consider that labor contracts would probably look substantially different if there were a free market in labor). I think there is a degree of “price stickiness”, and I think it is inherent in the theory of price formation. The fact is that the employer will have to weigh the causes of a loss in profitability, and then will have to decide what actions to take to return profitability. This includes lowering wages, but it would be naïve to assume that the employer exercises perfect information. This suggests some short-term wage inflexibility.
This leads me to my greater point. The recession is a period of price and good restructuring. The structure of production is changing in accordance with consumer demands during a period of great chaos and uncertainty. Many investments are being liquidated, and some are being partially liquidated. This will create unemployment, and wages will have to adjust accordingly. Short-term price inflexibility plays a role, but so does the fact that the labor market is tied in with the general market, especially the capital goods market. The productive employment of individuals also relies on the productive employment of capital goods.
What do I blame continued unemployment on? Institutionally-caused inflexibility on wage prices and sub-par productivity caused by continued government intervention in the economy. Without government’s artificial obstacles, I think the labor market would have cleared relatively soon after the initial collapse and the economy would be well on its way towards full recovery (if not already there).
Most will probably disagree with me here, but I think that most economists subtlety agree with my thesis here. I think, though, that most of them simply ignore it in favor of focusing on aggregates. The problem, for instance, is wage stickiness and aggregate demand. Some call the former a “microfoundation”, but there really has been little attention as to why prices are sticky and what this really means. Aggregate demand also assumes the necessity for restructuring, but those who think in terms of AD pay little attention to the way the restructuring takes place (economization of resources by individuals), and thus do not realize the implications of what are really counter-productive fiscal and monetary policies. Besides, few people are willing to openly admit that the problem is not aggregate nominal (money) demand, but the employment of capital goods (which is why biggest criticism of those who support nominal income targeting [since the problem is not nominal income]).
Previous post:
Next post:
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T07:14:38.000Z
|
sljqk7oguqevu6ax57lg3ss3lphmcgtm
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8134",
"uncompressed_offset": 13266127,
"url": "arthritis-research.com/content/14/S1/P49/comments",
"warc_date": "2013-11-22T14:55:26.000Z",
"warc_filename": "<urn:uuid:00f730d0-e727-4c6d-968b-f0ca37218a52>",
"warc_url": "http://arthritis-research.com/content/14/S1/P49/comments"
}
|
cccc_CC-MAIN-2013-20
|
This article is part of the supplement: Proceedings of the 8th Global Arthritis Research Network (GARN) Meeting and 1st Bio-Rheumatology International Congress (BRIC)
Poster presentation
Maintenance of mitochondrial DNA copy number is essential for osteoclast survival
Tsuyoshi Miyazaki*, Shuuichi Mori, Kazuhiro Shigemoto, Nils-Goran Larsson, Takeshi Nakamura, Shigekaki Kato, Tomoki Nakashima, Hiroshi Takayanagi and Sakae Tanaka
• * Corresponding author: Tsuyoshi Miyazaki
Arthritis Research & Therapy 2012, 14(Suppl 1):P49 doi:10.1186/ar3650
No comments have yet been made on this article.
Post a comment
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:44:24.000Z
|
ogl44dyu3x25yplpqm7cavzyuekpghl4
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8178",
"uncompressed_offset": 82372717,
"url": "elinux.org/index.php?oldid=33961&title=Development_Platforms",
"warc_date": "2013-11-22T14:55:26.000Z",
"warc_filename": "<urn:uuid:00f730d0-e727-4c6d-968b-f0ca37218a52>",
"warc_url": "http://elinux.org/index.php?title=Development_Platforms&oldid=33961"
}
|
cccc_CC-MAIN-2013-20
|
Development Platforms
From eLinux.org
Revision as of 06:50, 7 February 2011 by Akhila (Talk | contribs)
Jump to: navigation, search
Contents
Popular Devices
ARM
AVR32
Blackfin
MIPS
PowerPC
SuperH
• Sega
• Dreamcast(SH7091) - Linux-SH Dreamcast Note that only machines with a a model number that begin with MIL-CD are supported. It is highly suggested to use a BBA for communication with the Dreamcast.
• Hitachi ULSI Systems
• MS7206SE01 (SH72060 Solution Engine)
• MS7750SE01 (SH7750(sh4) Solution Engine)
• MS7709SE01 (SH7709(sh3) Solution Engine)
• SuperH, Inc.
• MicroDev
• HP Jornada
• 525 (SH7709 (sh3))
• 548 (SH7709A (sh3))
• 620LX (SH7709 (sh3))
• 660LX (SH7709 (sh3))
• 680 (SH7709A (sh3))
• 690 (SH7709A (sh3))
• Renesas Technology Corp.
• RTS7751R2D CE Linux Forum(CELF)Compliant Evaluation Board
• Renesas Europe/MPC Data Limited
• EDOSK7705 (SH7705 sh3)
• EDOSK7760 (SH7760 sh4)
• EDOSK7751R (SH7751R sh4)
• SH7751R SystemH (SH7751R sh4)
• CQ Publishing Co.,Ltd.
• CQ RISC Evaluation Kit(CqREEK)/SH4-PCI with Linux
• Kyoto Microcomputer Co., Ltd. (KMC or KμC)
• Solution Platform KZP-01 (KZP-01[Mainboard] + KZ-SH4RPCI-01[SH4 CPU Board])
• [http://www.si-linux.com/index.html Silicon Linux Co,. Ltd.
• CAT760 (SH7760)
• CAT709 (SH7709S)
• CAT68701 (SH7708R For A-one CATBUS[Designed for 68000 board] compliant)
• Daisen Electronic Industrial Co., Ltd.
• SH2000 (SH7709A 118MHz)
• SH2002 (SH7709S 200MHz)
• SH-500 (SH7709S 118MHz)
• SH-1000 (SH7709S 133MHz)
• SH-2004 (SH7750R 240MHz)
• IO-DATA DEVICE, Inc.(Network Attached Storage [NAS Series)]
• LAN-iCN (NAS Adapter for IODATA HDD with "i-connect" Interface)
• LAN-iCN2 (NAS Adapter for IODATA HDD with "i-connect" Interface)
• LANDISK (SH4-266MHz[FSB133MHz] RAM64MB UDMA133 USB x2 10/100Base-T)
• HDL-xxxU (LANDISK Series NAS Standard Model)
• HDL-xxxUR(LANDISK with RICOH IPSiO G series print monitor for Windows support)
• HDL-WxxxU(LANDISK with wide body & twin drive support for Heavy storage or RAID1)
• HDL-AV250(LANDISK with Home Network DLNA guideline support)
• LANTank(LANDISK kit SuperTank(CHALLENGER) Series)
• HDL-WxxxU based twin drive bulk NAS kit. LANTank have a special feature witch supported network media server(cf. iTunes etc..).
• TOWA MECCS CORPORATION
• TMM1000 (SH7709)
• TMM1100 (SH7727)
• TMM1200 (SH7727)
• Sophia Systems
• Sophia SH7709A Evaluation Board
• Sophia SH7750 Evaluation Board
• Sophia SH7751 Evaluation Board
• MovingEye Inc.
• A3pci7003 (Using SH7750/ART-Linux [Linux with Realtime Extension])
• AlphaProject Co., Ltd.
• MS104-SH4 (SH7750R/PC104(Embedded ISA Bus) with apLinux)
• Interface Corporation.
• MPC-SH02 (SH7750S: ATX Motherboard Style)
• PCI-SH02xx (SH7750S: PCI-CARD Style)
• TAC Inc.
• T-SH7706LAN another name "Mitsuiwa SH3 board" ["SH-MIN"] (SH7706A/128MHz Flash512KB SDRAM 8MB 10BASE-T)
• SecureComputing/SnapGear (older products, check ebay etc, all can netboot and have a debug header)
• SG530 (SH7751@166MHz RAM16MB FLASH4MB 2x10/100 1xSerial)
• SG550 (SH7751@166MHz RAM16MB FLASH8MB 2x10/100 1xSerial)
• SG570 (SH7751R@240MHz RAM16MB FLASH8MB 3x10/100 1xSerial)
• SG575 (SH7751R@240MHz RAM64MB FLASH16MB 3x10/100 1xSerial)
• SG630 (SH7751@166MHz PCI NIC card RAM16MB FLASH4MB 1x10/100 1xSerial-header)
• SG635 (SH7751R@240MHz PCI NIC card RAM16MB FLASH16MB 1x10/100 1xSerial-header)
i386 and compatible
• CR48 Google netbook
Unclassified
Espow usb 3.0 expresscard
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:21:34.000Z
|
zfejtkchg26o4xfqjlx7qsyrzdoxbdzr
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8179",
"uncompressed_offset": 82394641,
"url": "elinux.org/index.php?oldid=193466&title=RPi_Hub",
"warc_date": "2013-11-22T14:55:26.000Z",
"warc_filename": "<urn:uuid:00f730d0-e727-4c6d-968b-f0ca37218a52>",
"warc_url": "http://elinux.org/index.php?title=RPi_Hub&oldid=193466"
}
|
cccc_CC-MAIN-2013-20
|
RPi Hub
From eLinux.org
Revision as of 09:09, 14 November 2012 by Andybalaam (Talk | contribs)
Jump to: navigation, search
Contents
Raspberry Pi Wiki Hub eng | fra | pt-br
Notice: The Raspberry Pi Wiki pages on this site is collaborative work - the Raspberry Pi Foundation is not responsible for content on these pages.
I need help with...
Buying a new Raspberry Pi
Please visit the Model Wizard to select your Raspberry Pi.
Booting an OS onto my Raspberry Pi
Please visit the OS Wizard to select your Raspberry Pi OS distribution, or if you'd like to compare the OS distros, visit OS Distributions page to select an OS to boot onto your Raspberry Pi.
Now shipping to customers
Update on lead times as of 28 October 2012: The lead time is around 23 days from Farnell and RS.
Don't have an idea on which to buy? Use the Model Wizard to select your Raspberry Pi!
See the Buying Guide on how to order one, or visit the Raspberry Pi Foundation Home Page
About
The Raspberry Pi production board (model B Rev 2.0)
The Raspberry Pi (short: RPi or RasPi) is an ultra-low-cost ($25-$35) credit-card sized Linux computer which was conceived with the primary goal of teaching computer programming to children. It was developed by the Raspberry Pi Foundation, which is a UK registered charity (Registration Number 1129409). The foundation exists to promote the study of computer science and related topics, especially at school level, and to put the fun back into learning computing. The device is expected to have many other applications both in the developed and the developing world (Read more).
Raspberry Pi is manufactured and sold in partnership with the worldwide industrial distributors Premier Farnell/Element 14 and RS Components.
• Products are RoHS, CE, FCC, CTick, CSA and WEEE compliant[1]. In common with all Electronic and Electrical products the Raspberry Pi should not be disposed of in household waste. Please contact the distributor from whom you purchased your Raspberry Pi device for details regarding WEEE in your country.
• Price: 25USD Model A, 35USD for Model B, excluding taxes, postage and packaging. For information about availability and shipping see the Buying Guide.
History
If you are interested in why the Raspberry Pi was created, and why it is what it is, check the General History page, which highlights relevant events in its history. It is not intended to be a detailed history, so it can be read quickly. You could also check the design changes page for how the Raspberry Pi has evolved, and the manufacturing differences page that may help if you are having problems with your board.
Getting Started
Buying Guide
The Model Wizard will help you select your model to buy.
Where can I get one and for how much?
• The Raspberry Pi can no longer only be purchased via their official distribution partners - detailed information can be found on the RPi Buying Guide page.
Basic Setup
First little Raspberry Pi Steps...
• Ensure you have all the equipment you need to go with your Raspberry Pi.
• Become familiar with the board layout and connect it ready for power up.
• If you have not been provided with a pre-setup SD card you will need to prepare one with your chosen Operating System distribution
• Note: On the Debian OS after you log in you need to type startx at the prompt to get a graphic desktop.
• Particularly after first boot its important to do a clean shutdown with the command sudo halt
Beginners Guide
You've just got your new Raspberry Pi device - what now?
• Get started with some basic projects and tutorials:
Raspberry Pi YouTube Tutorials
Another set of video tutorials
My First Raspberry Pi Game
Easy GPIO Hardware & Software - in-progress at the moment
Example projects/tuts which can be linked from here
(or from within a beginners guide page perhaps):
Setup XBMC media centre
Programming tutorials (Liams YouTube etc)
Easy GPIO (when complete or similar thing).
Also links to some basic linux user guides.
• Take a look through the Community section, which contains a range of beginner and advanced tutorials and guides, as well as groups to help you find like-minded developers.
Resources
Hardware & Peripherals
Software & OS Distributions
The Raspberry Pi will run a range of OS Distributions and run a variety of software.
Documentation
Documentation relating to the Raspberry Pi can be found here.
Frambozenier.org Documentation Project Datasheets
Example documents which can be linked from here (or sub page):
Official Datasheets
White Papers
User Manuals
Recommended books (perhaps)
RPi Troubleshooting
Head over to the troubleshooting page for help fixing common problems.
RPi Bugs
Head over to the bugs page for a list of known bugs.
RPi Model B 3D CAD files
Theses are various 3D CAD Versions in both RAR and ZIP.
Community
Projects, Guides & Tutorials
• An important source of information and guides is the Official Forum.
• Knowledgeable users may want to review and help out with the Tasks page.
• Get started by following some of the many Tutorials.
• Common tasks and useful tips are available through the Guides page.
• Projects can be found, and added to, on the Projects page.
Schools, Universities, Clubs & Groups
• The Raspberry Pi Foundation's aims include encouraging education. Several groups including Computing At School aim to bring Computing Science back into schools.
• Go to the Education Page to add your project and find helpful links.
Supporting Communities
The Raspberry Pi Community is steadily growing:
About the RPi Wiki
Do not be afraid to add your bit, content is vital for the wiki to function.
A 3D rendering of the Raspberry Pi logo
We are governed by the RPi Wiki Council (RPWC). New guidelines not made by Ghans alone are currently being drafted. As the RPi wiki is currently a wreck, the council's current goal is to clean up the RPi Wiki!
Translations
The wiki is being translated into several languages, some of which can be seen on the hub banner above. Current languages include:
Any help translating would be greatly appreciated. Thank you to those who have already contributed!
Admins/Contributors
The wiki is governed by the Raspberry Pi Wiki Council.
References
1. http://www.element14.com/community/docs/DOC-44828/l/raspberry-pi-safety-data-sheet
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:32:30.000Z
|
gc6v23wutwghkwwbcqzwi2e7ld6raap7
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8216",
"uncompressed_offset": 132814205,
"url": "itismymind.blogspot.com/2005/02/another-column-on-jesse-jr.html",
"warc_date": "2013-11-22T14:55:26.000Z",
"warc_filename": "<urn:uuid:00f730d0-e727-4c6d-968b-f0ca37218a52>",
"warc_url": "http://itismymind.blogspot.com/2005/02/another-column-on-jesse-jr.html"
}
|
cccc_CC-MAIN-2013-20
|
Monday, February 28, 2005
Another column on Jesse Jr.
In Chicago's press Rep. Jesse Jackson Jr. is really becoming a hot topic. Laura Washington of the Chicago Sun-Times also wrote a column about him. For the most part the mayor's office seems to have become a permanent postion for Mayor Daley and Chicago is run mostly as a dictatorship until Daley. I say dictatorship only becase the aldermen who are supposed to raise opposition basically seem to rubber stamp everything. This is a far cry from the days of Chicago's first black mayor Harold Washington. During that time Chicago came to be called Beirut by the lake.
recent memory, Bobby Rush (he's a committeeman, but he's not really in the Daley camp) and Roland Burris. To be sure she names some other names but that was before I actually paid
In any case I don't know about him not having to face "real contenders". He's ran against in my attention during the 1995 mayoral election. In any event the last election 2003 Daley faced a bunch of political novices.
Could Jesse Jr. prove to be that run for the money Chicago needs? Well he may not have much support of Chicago's black establishment, besides from what I read they don't like him because he didn't "pay his dues". But if I believe he is what Chicago needs for the future and I don't really like his positions on some thing but I would gladly volunteer for his campaign. If he wins his first step is to end that 25,000 signature rule.
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:48:31.000Z
|
qnqraeh7kzntezrs7bp65u2malryfo7u
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8237",
"uncompressed_offset": 189295861,
"url": "openwetware.org/index.php?oldid=652717&title=BISC219%2FF12%3A_RNAi_Lab_10",
"warc_date": "2013-11-22T14:55:26.000Z",
"warc_filename": "<urn:uuid:00f730d0-e727-4c6d-968b-f0ca37218a52>",
"warc_url": "http://openwetware.org/index.php?title=BISC219/F12:_RNAi_Lab_10&oldid=652717"
}
|
cccc_CC-MAIN-2013-20
|
BISC219/F12: RNAi Lab 10
From OpenWetWare
Revision as of 11:45, 9 November 2012 by Tucker Crum (Talk | contribs)
Jump to: navigation, search
Lab 10: Series 3 Investigation of Gene Regulation Using RNAi
Preparation of the Na+ gradient in the Chemotaxis Assay media
The day before lab your instructor will add the chemicals needed to prepare the chemotaxis assay plates.
1. 10 μL of 2.5M NaCl is added to the Na dot you drew on your plate. Once the NaCl is absorbed the Na+ ions will disperse in a gradient away from the dot. The Cl2 is not in a gradient due to the addition of MgCl2 to the media during initial preparation.
2. 10 μL of sterile water is added to the W dot you drew to serve as a negative control.
3. Additional control plates will have 10 μL of sterile water added to both dots on the plate.
Harvesting the C. elegans
Thoroughly washing the worms to remove any residual food and media is critical for the chemotaxis assay to work properly.
1. Label 2 15 ml conical tubes with wild type - treated
2. Label 2 15 ml conical tubes with rrf-3- treated
3. Label 1 15 ml conical tubes with wild type - control
4. Label 1 15 ml conical tubes with rrf-3 - control
5. Label 2 15 ml conical tubes with lsy-2 mutant
6. Wash the worms off of each RNAi feeding plate 3x with 5 ml sterile water - putting each wash in the correct labeled 15 ml tube - store the tubes with worms in them on ice.
7. Once all the worms are collected, put the caps on the tubes and invert a few times to mix the worms.
8. Let the worms settle to the bottom of the tubes - about 10 minutes
9. Remove all but 1 ml of the water with a disposable Pasteur pipette.
10. Add sterile water to 15 ml and cap the tube again. Invert and let the worms settle.
11. Remove all but 1 ml of the water with a disposable Pasteur pipette.
12. Transfer the remaining 1 ml of water + worms to a sterile 1.5 ml microfuge tube.
13. Spin the worms at 10,000 rpm for 1 minute to pellet.
14. Remove all but approximately 50 ul of worms and water at the bottom of the tube.
15. Using a razor blade, cut the end off of a micropipette tip (this will prevent the pellet of worms from being damaged).
16. Pipette the entire pellet of worms to the appropriate assay plate on the central 2 cm circle.
17. Wick away any extra water with the corner of a Kimwipe
While the C. elegans are settling: Add 3 μL of 0.25M sodium azide next to the Na and W dots on your chemotaxis assay plates. The sodium azide will immobilize the worms close to the dots
The Assay:
1. The worms are allowed to move around each plate for 1 hour
2. Take a photograph of each set of plates (rrf-3 from RNAi Feeder and HT115(DE) control plates; N2 from RNAi Feeder and HT115(DE) control plates; and lsy-2 mutants) at the end of the hour using the Bio-Rad imager in the Instrument Room L308. (Directions are found below.) Make sure you carefully organize the 3 plates for the rrf-3 and Ns strains so that the photo of the rrf-3 worm strain has the worms fed dsRNA of lsy-2 and no lsy-2(control) in the same comparative position as the photo of the 3 N2 worm strain plates. There are only be 2 chemotaxis plates of a lsy-2 mutant (replicates) in that set so you can add a photo of the chemotaxis control that got no NaCl (water on both dots).
3. At the end of the hour after photographing the plates, the worms in the two quandrants nearest the Na dot are counted and compared to the number in the two quandrants near the W dot. Counting is best done by inverting the plates and using your dissecting scope and a sharpie making a dot on the plastic surface of the plate for every worm you see. Then dots/quandrant can be counted and recorded and general trends in the worm distribution can be observed and notes recorded in your lab notebook.
4. With a different color sharpie for each strain circle the area of the plate containing the greatest concentration of worms - generally this shape will be a circle or oval.
5. Take a second set of photographs, arranging the plates and quandrants in exactly the same positions as in the first set of photos.
Capturing Digital Images Using the BioRad Imaging System in L308
Instructions for Taking a DNA gel image stained with Sybr Safe using the BioRad ChemiDoc MP System with Image Lab Software
IMPORTANT: Ethidium Bromide stained gels may NOT be imaged in this equipment. Remove gloves and wash hands BEFORE using the computer. DO NOT contaminate the computer. The XcitaBLue Conversion Screen should be kept covering the UV transilluminator and only removed TEMPORARILY when using fluorphores other than Sybr Safe or SybrGreen. Please return the Xcita Blue Screen to the UV transillumintor if you remove it.
Quick and Easy Protocol for photographing your chemotaxis experiment:
1) Make sure the Power Button on the right front of the imager shows a green light. If not press it until the green light comes on and wait 5-10 min for warm up.
2) Open the UV transilluminator drawer on the lower front of the imager and remove the XcitaBlue Conversion Screen. Place it carefully in a save area and don't forget to return it to where you found it when you are done.
3) Position your plates in the center of the drawer.
4) Close the drawer.
5) Open the ImageLab 4.0.1 software by double clicking on the icon on the computer desktop
6) Find and open the Protocol called ????. Double click to open it.
7) Click Position (yellow button) to check the position of your plates.
8) Click Run Protocol (green button) to take the photo.
9) To Save your image, find or make a folder for your work in Documents (NOT on the Desktop). go to File---Export---Export for Publication (use the defaults, e.g. 300dpi). You will see a pop up message reminding you that this option is not optimized for analysis---it doesn’t matter—Click OK. Check the Location where your image will be saved, the FILE Name, and use the drop down menu to SAVE AS TYPE tiff or jpg. Click Save.
10) Close the Image Lab Software 11) Remove your plates 12) The computer AND the ChemiDoc Imager should remain ON. DO NOT Turn OFF the power or shut down or log off the computer.
Links to Labs& Project Info
Series1:
Worm Info
Lab 1: Worm Boot Camp & Sex-Linked or Autosomal Start
Lab 2: Sex-Linked or Autosomal Finale
Series2:
Background: Classical Forward Genetics and Gene Mapping
Lab 2: Mutant Hunt
Lab 3: Linkage Test Part 1
Lab 4: Linkage Test Part 2, Mapping and Complementation
Lab 5: Finish Complementation; Mapping Continued
Lab 6: DNA sequence analysis; Mapping Continued
Lab 7: Complete Mapping: Score
Series3:
Background Information on Project 3: Investigating Gene Regulation Using RNAi
Media Recipes
Lab 7: Identifying a bacterial colony containing our plasmid of interest
Lab 8: Creating the feeding strain of bacteria for RNAi
Lab 9: Induction of feeding strain to produce dsRNA and feeding worms
Lab 10: Phenotypic analysis of treated vs untreated worms
Lab 11: Writing Workshop
Lab 12: Writing Conferences
Personal tools
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T08:03:21.000Z
|
xuhutrvmnikvwoickjz5bv6nsxotbmpk
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8238",
"uncompressed_offset": 189305289,
"url": "openwetware.org/index.php?diff=prev&oldid=523971&title=BioMicroCenter%3AIllumina_Library_Preparation",
"warc_date": "2013-11-22T14:55:26.000Z",
"warc_filename": "<urn:uuid:00f730d0-e727-4c6d-968b-f0ca37218a52>",
"warc_url": "http://openwetware.org/index.php?title=BioMicroCenter:Illumina_Library_Preparation&diff=prev&oldid=523971"
}
|
cccc_CC-MAIN-2013-20
|
BioMicroCenter:Illumina Library Preparation
From OpenWetWare
(Difference between revisions)
Jump to: navigation, search
(RNA)
(RNA)
Line 15: Line 15:
=== RNA ===
=== RNA ===
-
'''mRNA-seq'''-
+
'''mRNA-seq'''- Samples will be QC'd, poly-A purification will be performed using the Illumina Tru-Seq protocol, cDNA will be run on the SPRI-works system using BMC stored adapters, enriched using BMC stored PCR primers, and submitted for sequencing on the Illumina platform.
[[BioMicroCenter:Forms#Downloads|Sample Submission Forms]]
[[BioMicroCenter:Forms#Downloads|Sample Submission Forms]]
Revision as of 16:18, 18 July 2011
Generating high quality data on the Illumina sequencing platform begins with generating high quality libraries that have the desired insert size and required Illumina adapters. Prior to sequencing, these samples must pass the BioMicro Center’s Sequencing Quality Control process. The BMC currently offers genomic DNA library preparation and RNA-seq as a service.
Contents
Sample Submission
DNA
There are three options when submitting samples for library prep:
BMC Fragmented DNA sample prep (SPRI) - Samples will be QC'd, run on the SPRI-works system using BMC stored adapters, enriched using BMC stored PCR primers, and submitted for sequencing on the Illumina platform. All samples submitted for this option will be QC’d using the BioAnalyzer to confirm sufficient fragmentation and concentration.
BMC Intact DNA sample prep (NEXTERA) - Samples will be nanodropped, processed using the Epicentre Nextera kit, enriched using Nextera PCR primers (including molecular barcodes if requested) quality controlled and submitted for sequencing on the Illumina platform. At least 50ng of DNA is required for Nextera. Samples for Nextera cannot be pre-QC'ed on the BioAnalyzer because the large fragments will clog the microchannels.
SPRI-Works Direct Submission- Samples will be run on the SPRI-works system using user supplied adapter mix and then returned for enrichment. If using this option please note that samples will need to be submitted separately for Illumina sequencing.
RNA
mRNA-seq- Samples will be QC'd, poly-A purification will be performed using the Illumina Tru-Seq protocol, cDNA will be run on the SPRI-works system using BMC stored adapters, enriched using BMC stored PCR primers, and submitted for sequencing on the Illumina platform.
Sample Submission Forms
Sample Submission Requirements
Genomic DNA– Samples for Illumina must be submitted in either water or TE. The SPRIworks robot is not highly sensitive to the amount of DNA, however care must be taken in submitting an appropriate amount of adapter for ligation. The Nextera kit requires 50ng of material for preparation.
RNA-Seq – Submission of total RNA samples for RNA-Seq must be submitted in water or TE. Total RNA needs to be between 0.1-4ug and should have a RIN above 9.0.
Barcoding
Samples submitted for Illumina preparation can be barcoded by request to allow sequencing of multiple samples per lane. Full information about barcoding can be found HERE.
Illumina Library Preparation Workflow
• Fragmentation - All samples must be fragmented to the point where the majority of the fragment distribution is between 100 to 300 base pairs. RNA-seq samples are usually fragmented after poly-A selection and before first strand synthesis.
• End Repair and 3’ dA Addition – Any damage end damage that may have occurred during fragmentation is repaired and then an extra A is added to all 3’ ends to increase efficiency during ligation.
• Adapter ligation – The ligation of partial Illumina adapter sequence to the sample fragments, a total addition of 66bp. Each adapter sequence has a T overhang to increase efficiency. It is very important to maintain a good ratio of sample material to adapter, Illumina recommends a 1:10 ratio, to avoid primer-dimer occurrences post enrichment.
• Size Selection – This step, usually consisting of an agarose gel, is designed so that only the fragments within the desired size range (now ~200 – 400bp) are included in the final library. Size selection is very important, fragments that are too large will create large clusters and can result in a loss of read count in the final data.
• Enrichment – The PCR reaction run during this step amplifies using the complete primer construct required for binding and clustering on the flowcell, an addition of 53bp for a final adapter length of 119bp. It is very important to optimize the number of PCR cycles to generate a sufficient amount of material for clustering but limit PCR biases.
Traditional Illumina protocols can be found on our protocols page
Pricing
Priority for Illumina sample prep is currently available for labs associated with the BioMicro Center Core departments. We are able to do Illumina sample prep for other MIT and non-MIT users as space allows on the sequencers. Full pricing information is available at our price list.
Protocols
Protocols for all of the supported technologies can be found by visiting the Protocols page
QC
Quality control is very important to help optimize the number of reads and quality of data produced. For information on QC methods and protocols please visit the Sequencing Quality Control page
All questions about Illumina sample preparation can be directed to Manlin Luo and Ryan Sinapius.
Personal tools
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T07:18:03.000Z
|
dg75yy3gt2b2fif76tp7e6lsrttp6erw
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8239",
"uncompressed_offset": 189315030,
"url": "openwetware.org/index.php?oldid=605833&title=McClean%3APhluorin_Calibration",
"warc_date": "2013-11-22T14:55:26.000Z",
"warc_filename": "<urn:uuid:00f730d0-e727-4c6d-968b-f0ca37218a52>",
"warc_url": "http://openwetware.org/index.php?title=McClean:Phluorin_Calibration&oldid=605833"
}
|
cccc_CC-MAIN-2013-20
|
McClean:Phluorin Calibration
From OpenWetWare
Revision as of 10:33, 5 June 2012 by Megan N McClean (Talk | contribs)
Jump to: navigation, search
Contents
Overview
Ratiometric pHluorin is a pH-sensitive GFP derivative. See Miesenbock, et al 1998 for the original description of this protein. Wild-type green fluorescent protein (GFP) exists in two conformations and therefore has a bimodal excitation spectrum with peaks at 395nm and 475nm. The authors took advantage of these conformation states, and with some clever amino-acid substitutions facilitated pH-dependent switching between the states. Thus, the relative emission of pHluorin when excited at 395nm vs 475nm is dependent on pH.
This protocol describes how to measure a calibration curve for pHluorin in your yeast strain of interest. The relative emission at 395nm or 475nm excitation is measured for permeabilized cells in buffers over a range of pH. This protocol was adapted from Orij 2009. See their paper (Figure 2a) for a good example of what your calibration curve should look like.
Materials
• Strain of interest
• Low Fluorescence Media () with appropriate amino acids for your strain
• Digitonin (Acros Organics, #407565000)
• Phosphate Buffered Saline, pH 7
• Buffers (see below)
Protocol
References
• Miesenbock, G; De Angelis, DA; and JE Rothman (1998) Visualizing secretion and synaptic transmission with pH-sensitive green fluorescent proteins Nature 394 192-195
• Orij, R; Postmus, J; Beek, A; Brul, S; and G. Smits (2009) In vivo measurement of cytosolic and mitochondrial pH using a pH-sensitive GFP derivative in Saccaromyces cerevisiae reveals a relation between intracellular pH and growth Microbiology 155 268-278
Notes
Please feel free to post comments, questions, or improvements to this protocol. Happy to have your input! Please sign your name to your note by adding '''*~~~~''': to the beginning of your tip.
• Megan N McClean 10:33, 5 June 2012 (EDT)Currently, we assay pHluorin with two separate filter cubes (with different excitation filters, but the same emission filter). Eventually we will move the excitation filters and the emission filter onto the microscope's filter wheels, so that alignment of the filter cubes in the turret is not an issue and the to cut down on the switching time.
Contact
or instead, discuss this protocol.
Personal tools
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T05:08:33.000Z
|
tfdkr3iegzabpem3mwwssgxn7nm5agfc
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8240",
"uncompressed_offset": 189331800,
"url": "openwetware.org/index.php?diff=581960&oldid=581959&title=OSDDMalaria%3AOSDD_Malaria_Meeting_Sydney_2012",
"warc_date": "2013-11-22T14:55:26.000Z",
"warc_filename": "<urn:uuid:00f730d0-e727-4c6d-968b-f0ca37218a52>",
"warc_url": "http://openwetware.org/index.php?title=OSDDMalaria:OSDD_Malaria_Meeting_Sydney_2012&diff=581960&oldid=581959"
}
|
cccc_CC-MAIN-2013-20
|
OSDDMalaria:OSDD Malaria Meeting Sydney 2012
From OpenWetWare
(Difference between revisions)
Jump to: navigation, search
(Schedule)
m (Invited)
Line 60: Line 60:
* [http://www.csiro.au/Portals/About-CSIRO/Who-we-are/Executive/Executive-Team/AlastairRobertson.aspx Alastair Robertson], CSIRO
* [http://www.csiro.au/Portals/About-CSIRO/Who-we-are/Executive/Executive-Team/AlastairRobertson.aspx Alastair Robertson], CSIRO
* [http://www.csiro.au/Organisation-Structure/Flagships/Preventative-Health-Flagship/RichardHead.aspx Richard Head], CSIRO
* [http://www.csiro.au/Organisation-Structure/Flagships/Preventative-Health-Flagship/RichardHead.aspx Richard Head], CSIRO
-
* [http://sydney.edu.au/medicine/people/academics/profiles/nhunt.php Nick Hunt], The University of Sydney
-
* [http://www.wehi.edu.au/faculty_members/professor_alan_cowman Alan Cowman], WEHI
-
* [http://www.pharm.monash.edu.au/staff/sacharman.html Susan Charman]
* [http://www.qimr.edu.au/page/Lab/Malaria_Drug_Resist_Chemo/ Michelle Gatton]
* [http://www.qimr.edu.au/page/Lab/Malaria_Drug_Resist_Chemo/ Michelle Gatton]
* [http://politicsir.cass.anu.edu.au/people/visitors/hazel-moir Hazel Moir]
* [http://politicsir.cass.anu.edu.au/people/visitors/hazel-moir Hazel Moir]
Revision as of 06:32, 8 February 2012
OSDD Home Malaria Home The Story So Far GSK Arylpyrrole Series GSK Triazolourea Singleton GSK Amino-thienopyrimidine Series Other GSK Series Under Consideration Links
Contents
Open Source Drug Discovery for Malaria - February 24th 2012
There will be a one-day meeting on Open Source Drug Discovery for Malaria at The University of Sydney, February 2012.
Location Information
The meeting will take place on the main Camperdown campus of The University of Sydney.
Schedule
9 a.m. start Welcome by Mat Todd and opening remarks by Mary O'Kane, NSW Chief Scientist.
Morning session 1: What is the current status of drug discovery and development (with some focus on malaria)? Sessions to be led by Mary Moran and Luigi Palombi.
11 - Coffee
Morning session 2: What is the scientific and economic case for open source drug discovery? Mat Todd and his team will describe what open science is, and how it can be done. Richard Jefferson will demo the patent lens.
1-2 Lunch
Afternoon session 1: What are the most significant types of drugs needed for the treatment of malaria? Paul Willis will lead a survey of current treatments.
3:30-4 Break
Afternoon session 2: Which compounds should we pursue? Who should do it? How?
5 p.m. Drinks and dinner
Sessions will broadly address these questions:
General:
• How is it best to share chemical and biological data in an open project?
• What technical barriers prevent open science?
• Which licence governs an open source drug discovery project?
• What psychological/professional barriers are there to open science?
• Is there a danger that open source drug discovery can be hijacked by people taking all the data and patenting them?
• Who might participate?
• Who will fund later stages such as clinical trials?
• Who will manufacture open drugs?
Malaria-specific:
• Is the GSK arylpyrrole set the best set of compounds to start with?
• What other compounds are promising starting point? Who might want to work on those compounds?
• For hit-to-lead, what data are typically needed, and from which assays? What criteria do we apply to compounds as they progress through such assays?
• Do we only want to look at compounds with both blood and liver stage activity? (e.g. those in recent Novartis screen) How can we access liver stage viability assays?
• Do we want compounds with cross-species activity, e.g. HAT/Chagas. Can we mine this information from e.g. Chembl?
To suggest questions/sessions of interest, please modify this page directly (getting an OWW account is very easy) or contact Mat Todd.
Attending
Invited
Potential Invitees
Possibly interesting list maintained here
Streaming/Archiving
Personal tools
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T07:52:58.000Z
|
aoga7kcjdenkyprombrdbwimpttoyy43
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8259",
"uncompressed_offset": 205147741,
"url": "quotationsbook.com/quote/11517/",
"warc_date": "2013-11-22T14:55:26.000Z",
"warc_filename": "<urn:uuid:00f730d0-e727-4c6d-968b-f0ca37218a52>",
"warc_url": "http://quotationsbook.com/quote/11517/"
}
|
cccc_CC-MAIN-2013-20
|
Quotation added by staff
Why not add this quote to your bookmarks?
That, if then I had waked after a long sleep, will make me sleep again; and then, in dreaming, the clouds me thought would open and show riches ready to drop upon me; that, when I waked I cried to dream again. Shakespeare, William
This quote is about dream · Search on Google Books to find all references and sources for this quotation.
A bit about Shakespeare, William ...
Born ca. 1564 and died ca. 1616 during the Renaissance period (1450-1599). One of the greatest writers of all time, Shakespeare, the peerless poet of the Sonnets and the creator of such dramatic masterpieces as Romeo and Juliet, Hamlet, and King Lear, is a playwright of paradigmatic originality. In his discussion of the Western literary canon, critic Harold Bloom declared: "Shakespeare and Dante are the center of the Canon because they excel all other Western writer in cognitive acuity, linguistic energy, and power of invention." However, one could go a step further and suggest that Shakespeare defines the Western canon because he transcends it. If Shakespeare, as Ben Jonson declared, "was not of an age, but for all time," the great dramatist, one could argue, spoke to the ultimate concerns of humankind, regardless of period or cultural tradition.
These people bookmarked this quote:
More on the author
This quote around the web
Loading...
Search Quotations Book
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T07:07:59.000Z
|
cf2yuektaxea2uhjhcbty5y6uswutbcb
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8260",
"uncompressed_offset": 205154595,
"url": "quotationsbook.com/quote/7688/",
"warc_date": "2013-11-22T14:55:26.000Z",
"warc_filename": "<urn:uuid:00f730d0-e727-4c6d-968b-f0ca37218a52>",
"warc_url": "http://quotationsbook.com/quote/7688/"
}
|
cccc_CC-MAIN-2013-20
|
Quotation added by staff
Why not add this quote to your bookmarks?
Your mind, which is yourself, can be likened to a house. The first necessary move then, is to rid that house of all but furnishings essential to success. Mcdonald, John
This quote is about compromise · Search on Google Books to find all references and sources for this quotation.
A bit about Mcdonald, John ...
We don't have a biography.
These people bookmarked this quote:
• Nobody has bookmarked this quote yet.
More on the author
This quote around the web
Loading...
Search Quotations Book
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T07:08:26.000Z
|
rqnjmziv6v37qcfdutzd7sjuzhf65ny5
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8261",
"uncompressed_offset": 205160744,
"url": "quotationsbook.com/quote/gift/33882/",
"warc_date": "2013-11-22T14:55:26.000Z",
"warc_filename": "<urn:uuid:00f730d0-e727-4c6d-968b-f0ca37218a52>",
"warc_url": "http://quotationsbook.com/quote/gift/33882/"
}
|
cccc_CC-MAIN-2013-20
|
It's easy! Just pick the product you like and click-through to buy it from trusted partners of Quotations Book. We hope you like these personalized gifts as much as we do.
Make and then buy your OWN fantastic personalized gift from this quote
A cosmic philosophy is not constructed to fit a man; a cosmic philosophy is constructed to fit a cosmos. A man can no more possess a private religion than he can possess a private sun and moon. Chesterton, Gilbert K.
Make a fabulous personalised bracelet or other form of jewellery with this quote
Click the banner below to pick the kind of jewellery you'd like ...
Choose something popular ...
Make a custom wrapped canvas ...
Make custom holiday cards ...
Make custom t-shirts ...
Make custom holiday gifts for boys ...
Make custom holiday gifts for girls ...
Make custom holiday gifts for men ...
A selection of more great products and gifts!
212 - The Extra Degree
The one extra degree makes the difference. This simple analogy reflects the ultimate definition of excellence. Because it's the one extra degree of effort, in business and life, that can separate the good from the great. This powerful book by S.L. Parker and Mac Anderson gives great examples, great quotes and great stories to illustrate the 212° concept. A warning - once you read it, it will be hard to forget. Your company will have a target for everything you do ... 212°
Click here to buy this »
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T05:24:56.000Z
|
4kiohslmkkoqqvy5yunsgwf36k3l7jcf
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8262",
"uncompressed_offset": 207407704,
"url": "rationalwiki.org/wiki/Information_technology_and_the_British_government",
"warc_date": "2013-11-22T14:55:26.000Z",
"warc_filename": "<urn:uuid:00f730d0-e727-4c6d-968b-f0ca37218a52>",
"warc_url": "http://rationalwiki.org/wiki/Information_technology_and_the_British_government"
}
|
cccc_CC-MAIN-2013-20
|
Information technology and the British government
From RationalWiki
Jump to: navigation, search
Government bureaucracy and political expediency impose great strains on the implementation of information technology. In the UK there have been many instances of schemes falling short of implementation times, cost overruns and data mishandling.
Every time the UK government has initiated a major IT reform the cost overrun has been enormous. Incompetence on the part of the corporate contractors seems to have been largely responsible, but their excess charges and costs have always been met by tax revenue. The insertion of private, profit oriented corporations into what should be welfare oriented fields (health, taxation, immigration, social security, pension provision) has never succeeded without financial and personal cost. (Although this sounds rather like an attack on government it's actually intended to show that the privatization of public services is always usually catastrophically bad.)
[edit] See also
[edit] Footnotes
Personal tools
Namespaces
Variants
Actions
Navigation
Community
Toolbox
support
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T07:13:00.000Z
|
7n5k5eu46taeg2j66usncjfszh73j76b
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8264",
"uncompressed_offset": 208650898,
"url": "redsarmy.com/tag/boston-celtics/page/556/",
"warc_date": "2013-11-22T14:55:26.000Z",
"warc_filename": "<urn:uuid:00f730d0-e727-4c6d-968b-f0ca37218a52>",
"warc_url": "http://redsarmy.com/tag/boston-celtics/page/556/"
}
|
cccc_CC-MAIN-2013-20
|
boston celtics
“Well, what do we do now?”
Those are the words of Doc Rivers as he and his staff figure out what to do in the short term (golfing) and long term (adding some veterans to the roster). “We clearly have to add to our team,” he said. “One regret — the one thing I look back on this year, though you [...]
May 21, 2009 Chuck - Red's Army Uncategorized 32
Thibodeau now on Sacramento Kings radar
According to the Philadelphia Daily News (via the Boston Herald) The Sacramento Kings, in the market for a new head coach, have expanded their search to include Celtics assistant coach Tom Thibodeau, according to the Philadelphia Daily News. Philadelphia has already asked for permission to talk to the defensive specialist who, according to Doc Rivers, [...]
May 20, 2009 RedsArmyAdmin Uncategorized 11
KG would have played
If the Celtics had beaten Orlando, KG would have played in the Cleveland series. At least, Gary Tanguay says so. "I was told that he was going to play in the Cleveland series, if they got that far. That was an opinion I was told." I have no reason to doubt Tanguay… but the obvious [...]
May 20, 2009 RedsArmyAdmin Uncategorized 16
A Hipster talks about the Lakers
This is just an awesome post from The Blowtorch Why am I a Lakers fan? I'll tell you. When I was a kid, my dad was, like, a HUGE Celtics fan. Like he made me watch all these games with him when I was growing up. He'd always talk about how great Larry Bird was [...]
May 20, 2009 RedsArmyAdmin Uncategorized 8
Reassessing: Mikki Moore
Over the next few weeks, we'll be examining every player on the Celtics roster. We start with Mikki Moore. Chuck's Take:A complete waste of roster space. He committed personal fouls like no player I've seen in my 30+ years of watching basketball. Moore came here in late February as the Celtics were dealing with injuries [...]
May 20, 2009 Chuck - Red's Army Uncategorized 8
The Ray Allen conundrum
Getty Images I was going to save this for later in the offseason, but it came up on the comments yesterday, so we might as well continue this discussion now. The Boston Celtics have an interesting decision to make with Ray Allen. The can either Trade him and his huge expiring contract mid-season. Let him [...]
May 20, 2009 RedsArmyAdmin Uncategorized 11
KG surgery set for next week
The Globe reports Celtics president Danny Ainge told The Globe's Frank Dellapa tonight that forward Kevin Garnett would have surgery some time next week on his right knee. Garnett missed 24 games and the postseason with a sprained right knee. The Celtics have said that the All-Star would have right knee bone spur surgery that [...]
May 19, 2009 RedsArmyAdmin Uncategorized 4
Offseason Questions: Leon Powe
I think my love for Leon has been made clear here since day 1. I’ve said a million times that I think he should be a Celtic forever. But that’s the bleed-green die-hard emotional fan talking. And the NBA is a business. So we need to look at Leon Powe. Leon, like Glen Davis, is [...]
May 19, 2009 RedsArmyAdmin Uncategorized 12
Everyone was hurt, Pierce & Perk might need surgery
Doc Rivers was on Dennis and Callahan this morning, and he revealed all sorts of injury news. Ray Allen had a hamstring problem throughout the Orlando series that was not getting better. Paul had some bone spurs that may need to be removed as well. (Kendrick Perkins) may have to have a procedure on his [...]
May 19, 2009 RedsArmyAdmin Uncategorized 36
Big Baby, Big Contract?
"I'm excited, I'm nervous," Davis said. "I feel a lot of emotions. It's a business. Would this be my first choice? Yeah. I want to win. That's the most important thing." Asked about his ties to the Celtics factoring into a business decision, Davis said, "That's the hardest part, the camaraderie with the team just [...]
May 19, 2009 Chuck - Red's Army Uncategorized 13
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T08:02:21.000Z
|
xs5qm4k6x22sgq7ukwuoqjsb73iowg6v
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8299",
"uncompressed_offset": 258289603,
"url": "thevaultofhorror.blogspot.com/2011/09/many-faces-of-lionel-atwill.html?showComment=1316805986055",
"warc_date": "2013-11-22T14:55:26.000Z",
"warc_filename": "<urn:uuid:00f730d0-e727-4c6d-968b-f0ca37218a52>",
"warc_url": "http://thevaultofhorror.blogspot.com/2011/09/many-faces-of-lionel-atwill.html?showComment=1316805986055"
}
|
cccc_CC-MAIN-2013-20
|
"A REALLY INTELLIGENT INTERVIEWER." -- Lance Henriksen
"QUITE SIMPLY, THE BEST HORROR-THEMED BLOG ON THE NET." -- Joe Maddrey, Nightmares in Red White & Blue
**Find The Vault of Horror on Facebook and Twitter, or download the new mobile app!**
**Check out my other blogs, Standard of the Day, Proof of a Benevolent God and Lots of Pulp!**
Saturday, September 17, 2011
The Many Faces of Lionel Atwill
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:55:24.000Z
|
hokb3kphw3zm3rcjz3x7vxsujsm74hom
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8325",
"uncompressed_offset": 281665523,
"url": "wikitravel.org/wiki/en/index.php?oldid=1940487&title=Chile",
"warc_date": "2013-11-22T14:55:26.000Z",
"warc_filename": "<urn:uuid:00f730d0-e727-4c6d-968b-f0ca37218a52>",
"warc_url": "http://wikitravel.org/wiki/en/index.php?title=Chile&oldid=1940487"
}
|
cccc_CC-MAIN-2013-20
|
Help Wikitravel grow by contributing to an article! Learn how.
Chile
From Wikitravel
South America : Chile
Revision as of 14:43, 12 October 2012 by Shtravels (Talk | contribs)
Jump to: navigation, search
[[File:|250px|frameless|Chile]]
Location
[[File:|250px|frameless]]
Flag
[[File:|108px|frameless]]
Quick Facts
Capital Santiago
Government Republic
Currency Chilean peso (CLP)
Area total: 756,950 km2
land: 748,800 km2
water: 8,150 km2
Population 17,224,200 (May 2011 est.)
Language Spanish
Religion Roman Catholic 70%, Protestant 15.1%, None 8.3%
Electricity 220V / 50Hz
Type C and L plugs
Country code +56
Internet TLD .cl
Time Zone Continent: UTC-4 (UTC-3 summer)
Easter Isl.: UTC-6 (UTC-5 summer)
Chile (officially, Republic of Chile) [1] narrowly stretches along the southern half of the west coast of South America, between the Andes and the Pacific Ocean. The bordering countries are Peru in the north and Argentina and Bolivia to the east. Chile has over 5,000 km (3,100 mi) of coast on the South Pacific Ocean.
Understand
History
Prior to arrival of the Spanish in the 16th century, northern Chile was under Inca rule while the indigenous Araucanians inhabited central and southern Chile. Although Chile declared independence in 1810, decisive victory over the Spanish was not achieved until 1818. In the War of the Pacific (1879–83), Chile invaded parts of Peru and Bolivia and kept its present northern regions. It was not until the 1880s that the Araucanians were completely subjugated. Although relatively free of the coups and arbitrary governments that blighted South America, Chile endured the 17-year military dictatorship of Augusto Pinochet (1973–1990) that left around 3,000 people, mostly leftists and socialist sympathizers, dead or disappeared.
Pinochet was widely reviled worldwide for his methods and legacy, however, a Center-Left Chilean administration came into power after he stepped down when he lost a national referendum. The new government of Patricio Aylwin thought it sensible to maintain free market policies that present-day Chile still harbors.
Chile is a founding member of both United Nations and the Union of South American Nations (Unasur) and is also now in the OECD, the group of the "most developed" countries by current international standards, becoming the first country in South America with that honor.
Argentina's and Chile's claims to Antarctica overlap. Chile also voices a claim to a 1.25 million square kilometre portion of Antarctica, but given the terms of the Antarctic Treaty, no country's territorial claims to Antarctica are ever recognised or permitted to be exercised at any time.
Climate
Chile's unusual, ribbon-like shape — 4,300 kilometres long and on average 175 kilometres wide — has given it a varied climate, ranging from the world's driest desert—the Atacama—in the north, through a Mediterranean climate in the centre, to a rainy temperate climate in the south. The northern desert contains great mineral wealth, principally copper.
Religion
In Chile there is no restriction on religion. Nearly 70 percent of the population which is above 14 years of age are identified as Roman Catholic and nearly 15 percent as evangelical.
Regions
Map of Chile with regions colour coded
Northern Chile (Regions of Arica-Parinacota, Tarapacá, Antofagasta, Atacama and Coquimbo)
Visit the driest desert in the world, archeological ruins and the Andean highlands.
Central Chile (Regions of Valparaíso, Santiago, O'Higgins and Maule)
The heart of the country, you can visit the main cities, famous vineyards and some of the best ski resorts in the Southern Hemisphere
Southern Chile (Regions of Biobío, Araucanía, Los Ríos and Los Lagos)
The land of the Mapuches, lakes, rivers and the mythological Chiloé island.
Extreme South (Regions of Aysén and Magallanes and the Chilean Antarctica)
The Western Patagonia, with its fjords, ice caps, lakes and forests
Easter Island (Rapa Nui or Isla de Pascua)
A lonely island in the middle of the Pacific Ocean, is home of one of the most mysterious civilizations in the world.
Cities
• Santiago, the capital and largest city of the country.
• Concepción, Chile's second largest city.
• Iquique, touristic center in Northern Chile.
• La Serena, a charming city, with many things to do in and around it.
• Valparaíso, main Chilean port and a UNESCO World Heritage Site.
• Vina del Mar, the principal touristic attraction: beaches, casino and an iconic music festival.
• Valdivia, the "City of Rivers", rebuilt after the strongest earthquake on history.
• Punta Arenas, one of the southernmost cities of the world.
Other destinations
Not your average pool
Chile is home to the largest recreational pool in the world. Located at the San Alfonso del Mar resort in Algarrobo, you will want a sailboat to complete its 2 km length
Talk
Spanish is the official language in the country and is spoken everywhere. Chileans use a distinct dialect called Castellano de Chile with a variety of differences in pronunciation, grammar, vocabulary and slang usage. Spanish-speaking foreigners won't have problems understanding it and will only think it sounds funny, but non-native speakers often struggle to understand it, even with years of practice. If you ask people to speak "neutral Spanish" they can do it for you; people only speak this dialect in informal situations and it doesn't translate to a formal difference in grammar (like with Argentine Spanish).
Here are two of the most common Chilean expressions:
• Huevón (pronounced usually as weh-VOHN) could be translated into different words according to its context. Originally a swear word meaning "jerk", it can be used also as "friend" or "dude".
• Cachar (pronounced ka-CHAR) comes from the verb "to catch" and means "understand". Also, is commonly used in a weird conjugated form as cachai' at the end of the sentences, similarly to "y'know".
English is widely understood in large cities, especially in Santiago, but also to a (very much) lesser extent in Valparaíso, Concepción or La Serena. Since English is now mandatory in schools, younger people are far more likely to speak English than older people, the latter (over 40 years old) being unlikely to speak any English, unless they are tourist industry workers.
Various indigenous languages are spoken in Chile like Mapudungun (in Araucanía and Bíobío regions), Quechua (in Atacama and Tarapacá regions) and Rapa Nui (in Easter Island), but only between indigenous people, which are less than 5% of the population. Even a lot of people identifying with one of these groups are not able to speak their native language and speak Spanish instead.
Some people understand some French, Italian and Portuguese (because of its resemblance with Spanish) and also there are some German speakers, especially in the south of the country, where a lot of German migrants arrived in the second half of the 19th century.
Get in
Santa Lucia Park in Santiago
Visa information
Citizens of the following countries may be exempted from tourist and business visa requirements:
1. Up to 90 days: Albania, Andorra, Antigua and Barbuda, Argentina, Australia, Austria, Bahamas, Barbados, Belgium, Bosnia and Herzegovina, Brazil, Bulgaria, Canada, Colombia, Costa Rica, Croatia, Cyprus, the Czech Republic, Denmark, Dominican Republic, Ecuador, El Salvador, Estonia, Fiji, Finland, France, Germany, Guatemala, Haiti, Holy See, Honduras, Hong Kong, Hungary, Iceland, Ireland, Israel, Italy, Japan, Latvia, Liechtenstein, Lithuania, Luxembourg, the Republic of Macedonia, Malta, Mauricio, Mexico, Monaco, Montenegro, the Netherlands, New Zealand, Nicaragua, Noruega, Panama, Paraguay, Poland, Portugal, Romania, Russia, San Marino, Serbia, Slovakia, Slovenia, South Africa, South Korea, Spain, St. Kitts and Nevis, St. Lucia, St. Vincent and the Grenadines, Suriname, Sweden, Switzerland, Thailand, Tonga, Trinidad and Tobago, Turkey, the United Kingdom, the United States, Uruguay and Venezuela.
2. Up to 60 days: Grenada, Greece, Indonesia and Peru.
3. Up to 30 days: Belize, Bolivia, Jamaica, Malasia and Singapore.
4. Up to 21 days: Dominica.
However, citizens of the United States, Australia, Canada, and Mexico must pay a "reciprocity fee" on their first entry to Chile by air. The fee is USD 132 for Canadian citizens, USD 160 (as of August 2012) for US citizens, USD 61 for Australian citizens and USD 23 for Mexican citizens (as of September 2012) and is payable in cash or by credit card at counters prior to passing through immigration. This one-time charge is valid for the life of your passport. Citizens of other countries, such as the UK, do not have to pay a fee.
Full information about tourist visa can be found in this document (Jan 2011). More information up-to-date can be found at the Ministry of Foreign Relations website.
For consulate information, please visit the Chilean Embassy in the U.S. website or the Chilean Embassy in the United Kingdom one.
Other restrictions
When entering Chile (by cruise, vehicle or plane), at customs, travelers will need to fill out a tourist card that allows them to stay for up to 90 days. Keep this card safe: travelers will have to present the tourist card to Customs officials when leaving the country, and you may not be allowed to leave without it. Be aware that hotels waive Chile's 19% room tax when the guest shows this card and pays with U.S. dollars.
On flights leaving Chile, there is an airport tax of USD 30 or the equivalent in Chilean pesos for flights longer than 500 km, but it's included on the ticket http://www.aeropuertosantiago.cl/english/tramites-de-salidas-internacionales/tramites-de-salidas-internacionales.html. On domestic flights, airport tax depends on distance National Flights to distances less than 270 km $1.969 and to distances more than 270 km $4.992 included in the price of the ticket.
Chile is a geographically isolated country, bared from its neighbours by desert, mountains and ocean. This protects it from many pests and diseases that can hit agriculture, one of the biggest national economic sources. Due to this, importation of certain fresh, perishable or wooden goods (such as meat products, fruits & vegetables, honey, untreated wood, etc.) can be either restricted or even prohibited. At your arrival, you will need to fill a form declaring that you are not carrying any restricted product; if you are, declare and show it to SAG officials. If you don't declare them, beware of hefty fines by the SAG, the agricultural oversight body.
A word of warning for families moving to Chile. All documents other than your passports will be considered legally worthless in Chile, unless legalized by specifically a foreign Chilean consulate or embassy before coming to Chile. No certified or notarised document (i.e., birth certificates or school transfers) will be accepted in Chile, if not done so by a Chilean consulate or embassy. This will be especially important if you wish to submit documents for either a temporary residency or permanent residency. For reference see Legalizaciones in the Chilean consulate in San Francisco.
Remember that Chile is a centralized country, so the laws stay the same regardless of region.
By plane
The most common entry point for overseas visitors is the Arturo Merino Benítez International Airport (SCL) in the commune of Pudahuel, 15 km (9.3 miles) north-west of downtown Santiago. It is the largest aviation facility in Chile and the 6th busiest of South America by passenger traffic (over 11 million in 2010). It is a major connecting point for air traffic between Oceania and Latin America.
Santiago International Airport is served by serveral non-stop international service, mainly from Europe, the Americas and Oceania. LAN Airlines is the largest national carrier and flights from the main cities in the Americas, Sydney, Auckland, Papeete, Frankfurt and Madrid. Other airlines serving SCL are Aerolíneas Argentinas, Air Canada, Air France, American Airlines, Avianca, Copa, Delta, Iberia, Pluna and TACA.
Other airports with international services are in Arica, Iquique, Antofagasta, Concepción, Puerto Montt and Punta Arenas, all of them to neighboring countries. The Mataveri International Airport in Easter Island receives only LAN Airlines flights from Santiago, Lima and Papeete.
By bus
If you are already in South America, a cheaper and reliable way is to go by bus to Chile. Buses from Argentina depart daily from Mendoza, Bariloche and San Martín de los Andes, and even from Buenos Aires weekly. From Peru, there are several buses from Arequipa; some taxis also cross the border between Tacna and Arica. There are also several buses from Bolivia to northern cities and Santiago. Also, there are Brazilian buses from São Paulo, on Mondays and Thursdays.
If you are crossing from Bolivia and Argentina through the Andes, be aware that it takes place at high altitude, up to 4000 m (13,000 ft). Also, the roads from Peru and Bolivia are a bit poor in quality, so be patient. During the winter season, which begins in June and ends in August, it is not uncommon for the passage from Mendoza to close for days at a time.
Get around
By plane
Chile has a rather good airport infrastructure. The main hub for flights in Chile is the Arturo Merino Benitez International Airport (SCL) in Santiago, from where several airlines serve even the remotest corners of the country. These airlines are the three chilean airlines: LAN Airlines, Sky Airline and Principal Airlines. Although LAN is by far the largest companies, Sky and PAL offer good services to the main cities.
When travelling within Chile, please consider reserving your tickets before entering the country: flight coupons are recommended and can be bought at LAN when you also purchase your flight to Chile with them. LAN offers a good online reservation service but in the others is not that good yet and mainly in Spanish, although it is possible to use them to compare fares.
Because of the shape of the country, many routes are subject to several time-consuming layovers. You might take this into account as you can have up to 4 stops en route to your destination! (e.g. for a flight from Punta Arenas to Arica you may have stops at Puerto Montt, Santiago, Antofagasta and Iquique). Domestic routes are served by Airbus 318, Airbus 319 and Airbus 320 when flying with LAN, and Boeing 737-200s when flying Sky Airline.
The only airline flying to Easter Island is LAN Airlines from Santiago. Other remote locations are served by regional airlines. In the Extreme South, Aerovías DAP offer daily routes from Punta Arenas to Porvenir in Tierra del Fuego and Puerto Williams. Between November and March, DAP offers very limited and expensive flights to Villa Las Estrellas in Antarctica. To Robinson Crusoe Island, there are weekly flights from Santiago and Valparaíso.
By bus
The bus system is pretty sophisticated and provides a cheap and comfortable way to get from town to town. Keep in mind that local companies will usually stop at many stations along the way, however, you can always ask if there's a non-stop or directo service. Companies that cover almost the entire country include Turbus [2] and Pullman [3] (websites in Spanish only). In Santiago, you can find both terminals and more companies on Universidad de Santiago subway station.
Keep in mind that prices vary on a daily basis, so are usually more expensive on weekends and holidays tickets than on weekdays. Ticket prices are also almost always negotiable - don't be shy to ask for a discount, especially if you are in a group. Always ask around in different booths and make sure the vendors see you are shopping around.
The quality of service varies quite a lot. Check if the bus is "cama" (bed), "semi-cama" (heavily inclining seats) or ejecutivo (executive - slightly inclining seat). Toilets are not always available and if available not always working - especially if you are getting on a bus at a later stage of a long journey (i.e. Arica - Santiago).
La Micro
Micro = transit/local buses. The word is the contraction of microbus. Larger cities have cross-town bus routes at very affordable prices. Only Santiago's system, called "Transantiago", have maps (Map as of October 2010) with all the routes, so a little bit of Spanish and the audacity to ask around can get you places effectively in other major cities. To travel by "micro" in Santiago you will need to buy before a smart contactless travel-card called "BIP" and charge it with money. You can do so in any subway station, in most supermarkets and in some smaller stores. This card also allows you to travel by subway in Santiago. Be careful! You won't be able to travel by bus without money in your BIP card. The card costs US$2.50, and a ticket costs a little over US$1.00, which allows you to make up to four transfers between metro and buses within a 2-hour time period. You only need to scan the card at the beginning of your journey and at every transfer. You should hop off the "micro" through the back doors.
Colectivo
A mix between a micro and a taxi. These small cars have routes and get around quicker and more comfortably. Fares are similar to those on the Micro, and depend on the hour.
Metro
A metropolitan railway system operating in Santiago and Valparaíso. A reliable way to move around in the city. You must pay the fee only once (when you enter the system) and you can ride as much as you want. There are now more stations in Santiago because of the recent construction of two new lines. Visit the website [4] for more information.
By car
• All traffic signs are in Spanish only and their shapes and colors can be very different from the U.S. or European standards.
• Car Rentals are widely available throughout most major cities, but not in smaller towns.
• Usually a credit card, a valid driver's license and a passport, all three issued to the same person, are needed to rent a car.
• Rental rates in Santiago are very similar to those in the U.S., but prices can be much higher in other cities.
• It's a good idea to avoid rush hours, between 7 and 9 AM and between 5 and 8 PM.
• There are several reversible lanes and streets in Santiago and other cities.
• Parking spaces and street lanes are narrower than in the U.S., so it's a good idea to get a small vehicle.
• Fuel prices are about 1.5 times higher than the average U.S. price, yet cheaper than in most Western Europe.
• Several inter-city roads are tolled and don't take credit cards, so keep some Chilean money around.
• Most inter-city roads connecting major cities are rather well designed, almost totally sealed, and well kept.
• Several urban roads in Santiago have electronic free-flow tolls, so make sure that your car is equipped with an electronic radio-transponder, commonly called tag, since there are no toll booths at all on those roads.
• Many urban streets are not in good shape, so you must drive very carefully.
• All corners are supposed to have traffic signs, and in Santiago and most major cities, actually all corners are regulated by traffic signs. If there aren't any visible traffic signs, the preference belongs to the vehicle approaching from your right hand.
• All traffic signals and traffic lights are mandatory all of the time, there are no after-midnight concessions, such as yielding at stop signs or red lights.
• Bribes are never acceptable. (You will get into a lot of trouble by trying to bribe someone)
By thumb
Hitchhiking in Chile is not difficult, given enough time and patience. It is seen as a common form of travel for tourists or young, adventurous Chileans. On large highways such as the Panamerican Highway, hitching is really great and easy because there are many trucks going between big cities. Smaller, more scenic roads such as the Carretera Austral in the south, can leave you waiting for half a dozen hours in the more remote sections but the rides will generally get you a long way and are worth waiting for. If you are a tourist be sure to show it with your backpack, flags attached to your backpack, etc. The locals love chatting with foreign travelers.
See
Do
Buy
Chile's currency is the Chilean peso (CLP). Other currencies are not widely accepted, but most cities have exchange bureaux with resonable rates on euros and US dollars. The rates should be published on widely visible boards.
Never exchange money on the streets, specially if a "helper" indicates you to follow them.
It's not advisable to exchange currency in the hotel or the airport as the rates are awful. Just be patient. Banco Santander has a monopoly on the ATMs of the airport and will add a surcharge of 2500 CLP for retrieving cash - it's still better than the exchange bureaus.
The automatic teller machine (ATM) network in Chile is respectable in coverage--they're all connected to the same service and enable standard transactions. Be aware that different banks will charge you different amounts of money for extracting cash - you will be advised on the screen of the surcharge. The normal fee is 2500 CLP. Banco Estado does not add a surcharge (verified for MasterCard, not verified for VISA - please check and edit).
Credit and debit cards are widely accepted in most of the independent commerce of major cities and in all chain stores, no matter where they are. The pinpass security system has been introduced for credit cards, so you will mostly only need your personal pinpass four digit code as it exists in other parts of the world. For some cards you will not be asked for your PIN and they will use the four last numbers of the credit card entered manually and you will have to show a valid ID.
In mid July 2012 €1 ≡ CLP 600, £1UK ≡ CLP 763, $1AUD = CLP 501 and $US 1 ≡ CLP 490.
Eat
• Pastel de choclo: corn casserole filled with ground beef, onions, chicken, raisins, hardboiled egg, olives, and topped with sugar and butter.
• Empanada de pino: a baked pie filled with ground beef, onion, raisins, a piece of boiled egg and a black olive. Watch out for the pit!
• Empanada de queso: a deep-fried pastry packet filled with cheese. Found everywhere, including McDonald's.
• Cazuela de vacuno: beef soup with a potato, rice, a piece of corn and a piece of squash.
• Cazuela de ave (or de pollo): same as above, but with a piece of chicken.
• Cazuela de pavo: same as above, but with turkey.
• Porotos granados: stew made with fresh beans, squash, corn, onion and basil.
• con choclo: with grains of corn.
• con pilco or pirco: with corn thinly chopped.
• con mazamorra: with ground corn.
• con riendas: with thin sliced noodles.
• Curanto: lots of seafood, beef, chicken and pork, potatoes, cheese, and potato "burguers," prepared in a hole in the ground ("en hoyo") or in a pot ("en olla"); a dish from Chiloé.
• Southern sopaipillas: a fried pastry cut as 10-cm (4-in) circles, with no pumpkin in its dough (see Northern sopaipillas in the desserts section). They replace bread. They are known South of Linares.
• Lomo a lo pobre: a beefsteak, fried potatoes, a fried egg (expect two in restaurants) and fried onions.
Besides typical foods, you should expect food normally found in any Western country. The normal diet includes rice, potatoes, meat and bread. Vegetables are abundant in central Chile. If you are concerned about the portions, consider that the size of the dish increases the farther south you travel.
With such an enormous coastline, you can expect fish and seafood almost everywhere. Locals used to eat bundles of raw shellfish, but visitors should be cautious of raw shellfish because of frequent outbreaks of red tides. Chile is the world's second largest producer of salmon, as well as a number of other farmed sea products, which include oysters, scallops, mussels, trout and turbot. Local fish include corvina (sea bass), congrio(conger eel), lenguado (flounder), albacora (swordfish), and yellow fin tuna.
Sandwiches
• Hotdog or completo. Not similar to the American version. This one includes mayonnaise, mustard, ketchup, tomato, mashed avocado (palta), sauerkraut (chucrut) and chili (ají). These ingredients make a full sandwich, called un completo. With mayonnaise, tomato and avocado it's un italiano with the colors of the Italian flag.
• Lomito. Cooked pork steaks served with anything that can go in a hotdog. Italiano is the preferred form but German purists prefer it with sauerkraut (chucrut).
• Chacarero: a thin beefsteak (churrasco) with tomato, green beans, mayonnaise and green chili (ají verde).
• Barros Luco: Named after President Ramón Barros Luco. Thinly-sliced beefsteak with cheese.
• Choripán: Bread with "chorizo", a highly-seasoned pork sausage. Named that way because the contraction of "Pan con Chorizo" or "Chorizo con Pan".
A common combination is meat with avocado and/or mayonnaise, e.g. Ave palta mayo (chicken with avocado and mayonnaise) or Churrasco palta (thinly-sliced beefsteak with avocado). The strong presence for avocado is a Chilean standard for sandwiches that influences the fast food franchises to include it in their menus.
Desserts
• Northern sopaipillas: a fried pastry cut as 10-cm (4-in) circles, which includes pumpkin in its dough, and normally is eaten with chancaca, a black treacle or molasses. It's customary to make them when it rains and it's cold outside. Sopaipillas as a dessert are only known north of San Javier. From Linares to the South, they are not dessert and pumpkin is left out, so, when it rains, Chilean Southerners must cook picarones. In Santiago, Sopaipillas can be served covered with a sweet syrup as a dessert, or with spicy yellow mustard.
• Kuchen (or cújen, pronounced KOO-hen) is German for pie. In the South ask for kuchen de quesillo, a kind of cheesecake.
• Strudel (pronounced ess-TROO-dayl). A kind of apple pie.
• Berlín. When they translate John Kennedy's famous quote (often mistakenly thought of as a gaffe) they say it's a “jelly doughnut”. The Chilean version is a ball of dough (no hole) filled with dulce de membrillo, crema pastelera or manjar. Powder sugar is added just in case you have a sweet tooth.
• Cuchuflí. Barquillo (tube of something crunchy like a cookie) filled with manjar. The name originally comes from cuchufleta wich means deceipt or trickery, as they used to be filled only at the tips of the barquillos, leaving the middle part empty.
Fruit
Central Chile is a major tempered fruit producer, you can easily get fruit for dessert, including apples, oranges, peaches, grapes, watermelons, strawberries, raspberries, chirimoyas, and several other varieties.
Temperate fruit is of very high quality and prices are usually much lower than in most of the U.S. and Western Europe, while tropical fruit is rather rare and expensive, except for bananas.
Drink
• Wine: Chile produces some excellent wines, competing with France, California, Australia and New Zealand for world markets. Notable are the Cabernet Sauvignon and Carmenere in red, along with whites from the Casablanca valley.
• Mote con Huesillo: A delicous summertime drink made of wheat seeds (mote) and dried peaches (huesillos) boiled, sweetened, and served cold. Typically sold on sidewalk or park stands.[5]
• Chilean Pisco: Brandy made from Muscat grapes. Popular brands are Capel, Alto del Carmen, Mistral and Campanario.**
• Pisco Sour: One of Chile's most popular mixed drinks, this consists of Pisco mixed with lemon juice and sugar. It has a delicious tart sweetness.
• Mango Sour: Pisco mixed with mango juice.
• Piscola: Pisco mixed with Coke.
• Borgoña: Red wine and strawberries.
• Terremoto: ("Earthquake"): a typical Chilean drink that consists in a mix of pineapple ice cream with pipeño (like white wine).
• Schop: Draught beer.
• Fan-Schop: Beer mixed with orange Fanta or Orange Crush soft drink. A refreshing alternative on a hot summer day.
• Beers: Cristal and Escudo are the most popular (light lagers). Royal Guard is a fair bit tastier, Kunstmann is on pair with European imported beer.
• Jote*: wine and Coke.
• There's a very known conflict between Chile and Peru about the origin of Pisco. Although Pisco was registered as a chilean drink for some countries in the last century, it is historically peruvian in origin for much longer. Further, chilean and peruvian drinks are not the same product, they have different manufacturing procedures, different varieties of grape and not the same taste.
Unlike other latin-american countries, in Chile it's illegal to drink in unlicensed, public areas (streets, parks, etc.) The laws also restrict vendor hours depending on the weekday (in no case after 3 AM or before 9 AM).
Chileans drink a lot of alcohol. So don't be surprised to see one bottle per person.
Sleep
Chile has many types of hotels in the cities: some of the most prevalent chains are Sheraton, Kempinsky, Ritz, Marriott, Hyatt, and Holiday Inn. Several hostels and little hotels of varying quality wait to be discovered. On the backpacker trail, a local hostel version can be found in every small city residencial. There is also a variety of accommodations in the mountain ski centers,such as the world-class resort Portillo, 80 km (49 mi) north of Santiago; "Valle Nevado" in the mountains approximately 35 km (22 mi) away from Santiago, and the "Termas de Chillan" ski resort and hot springs, which lies about 450 km (280 mi) south of Santiago.
Learn
Along with Mexico and Argentina, Chile continues to grow as a preferred destination for studies abroad. It is not uncommon to find groups of European or North American students taking interdisciplinary studies in Spanish language or latinamerican culture and history in one of its many reputed universities:
• In Santiago
• Pontificia Universidad Católica de Chile [6] -One of the best universities in Chile with several courses taught in English.
• Universidad de Chile [7] - Another top university in Chile
• Universidad de Santiago de Chile [8]
• Universidad Central de Chile [9]
• In Valparaíso and Viña del Mar
• Pontificia Universidad Católica de Valparaíso [10]
• Universidad Técnica Federico Santa María [11]
• Universidad de Viña del Mar - International Office [12]
• Universidad Diego Portales - International Relations [13]
• Universidad Adolfo Ibáñez [14]
• Universidad de Valparaíso [15]
• In Southern Chile
• Universidad de Concepcion [16]
• Universidad Austral de Chile
• Universidad de Los Lagos
• Universidad de Magallanes
Work
Foreigners need to apply for a work visa before arriving (it can be done after, but it is a lot harder to get one). Temporary permits are issued to spouses and people with a contract. Under-the-table jobs are normally not well paid, lack the mandatory health insurance and retirement plans, and are a reason to get deported.
Another way to work in Chile is to Volunteer for the English Opens Doors Program. It is sponsored by the United Nations Development Program and the Chilean Ministry of Education and places volunteers in schools throughout Chile to be English teaching assistants. The program provides volunteers a home-stay with a Chilean family, meals, a participation bonus of 60,000CLP for each month of completed service, health insurance, TEFL training, and access to an online Spanish course. There is no fee for participation.
Stay safe
As most big cities within South America, Santiago suffers from a high rate of pickpocketing and muggings. It's advisable not to travel in the downtown area wearing expensive-looking jewelry or watches, even during the day. Stay alert and be especially careful in all crowded areas in Santiago. It is recommended to wear your backpack at the front of your body in crowded areas. If you have a laptop it can be relaxing being outside in a café doing some work but thieves may see you. For your own safety, go to a internet café if you need to be connected and leave your laptop at home. It will save you from losing it and it can rescue you from a violent attack from thieves. However, it is much safer to be inside the Metro stations, where you even can use free wi-fi hot spots in Universidad de Chile (L1) and Baquedano (L1-L5 junction) stations.
For tourists or other "beginners" lacking experience in over-the-counter transactions with hard Chilean currency, you can reduce the chance of your wallet getting stolen by following some advice:
• Separate coins and bills. Coins are frequently used when paying for public transport (except in Santiago buses, where you need to board with the Bip card), newspapers or snacks, store them in a small handbag so that your bills will remain concealed.
• 1000-, 2000- and 5000-peso notes should be easily accessible. Notes of higher value should be stored in another, more secure place in your wallet so you don't accidentally pay 10000 pesos instead of 1000, for example. Keep in mind that all notes are the same size, yet, they all are very differently coloured and designed. Chile's Central Bank is in the middle of the process of replacing all notes and its size [17], so you can find two types of 5000, 10000 and 20000 notes, all of which have legal value and are to be accepted everywhere.
• Do not reach for your wallet until the vendor tells you the price.
Chilean Carabineros (National Police) are very trustworthy - call 133 from any phone if you need emergency assistance. Some municipalities (such as Santiago or Las Condes) have private guards; however, they usually don't speak English. Do not try to bribe a carabinero, since it will get you into serious trouble! Unlike other South American police corps, Chilean Carabineros are very proud and honest, and bribery would be a serious offense against their creed.
Regarding driving conditions: Chilean drivers tend to be not as erratic and volatile as those in neighboring countries.
Since Chile is almost racially homogeneous, Chileans get curious and may stare at foreigners. If you are black or Asian, be prepared. There have been reports of racist attacks, but they are infrequent, and the police (carabineros) have become better at handling such situations. If you are from the Middle East, it will be easier to blend in and you will not get the same level of attention.
Leave your mobile phone at home and buy a cheap one from the local store. If getting robbed, you don't have to be worried losing a expensive cell-phone, all your contacts, important numbers and messages etc. Buy a cell-phone so you can contact police or medics in any case for or just calling a friend. Wallets, cameras and cell-phone regardless price and quality are lucrative amongst petty-thieves for own use or sale in the black market.
Avoid taking photographs of navy ships and buildings or other military buildings, ask first. If being caught they have the right to arrest you and expect to get all your photos examined and erased, also expect some questions about why you photographed. Chile lives in peace with its neighbours Argentina, Bolivia and Peru but the country is always preparing for an attack which some Chileans think might happen since it's a small and narrow country compared to its bigger neighbour Argentina for example. Some cities like Talcahuano and Punta Arenas are naval cities and be extra careful when taking photographs. Some marines may speak little English but if not, point at the object you want to take a photo and say "si?". If they reply with a "no" then it's better to just leave.
Since may 2011 there have been ongoing protest from the chilean students who demands better and free education. If you happen to be a foreign student, most universities will allow them to enter classes when there is a protest and occupation is taking place. The chances that something will happen at campus is low. But it's a different story once the protest takes places in the streets. Most of them have ended with violence from protesters and police so even if you may sympathize with the students, avoid demonstrations arranged by students of professors.
Diplomatic representation from the US
embassy: Avenida Andrés Bello 2800, Las Condes, Santiago
mailing address: APO AA 34033
telephone: [56] (2) 232-2600
FAX: [56] (2) 330-3710.
Stay healthy
Having relatively good standards in medicine throughout the country, it is not difficult to stay healthy. However, one will usually find more refined resources at a private medical facility. In case of emergency , call 131, but don't expect an operator fluent in English.
Hepatitis A vaccine is recommended for all travelers. Other potential vaccines, depending on your travel situation include: Hepatitis B, Typhoid, Rabies, and Influenza.
Tap water is safe to drink. Just know that water is produced from the mountains, so it might be harder for foreigners. In that case, it is advisable to buy bottled water.
Respect
• Although modern in many ways, Chile remains basically traditional. You will do far better if you do not openly denigrate or flout those traditions. People speak in conversational tones.
• Unlike other countries in Latin America, the Chilean police force is admired for its honesty and competence. Report any complaints to the police the moment you receive them, including criminal activity. Bribing is not acceptable in Chile in contrast to the rest of Latin America, and you will likely get arrested if you attempt it.
• Do not assume that your hosts in Chile will have a low opinion of Pinochet. May be a surprise, but his government still has many supporters, so be careful when raising the issue. Even if you want to talk other political subjects than Pinochet, people still can get very opinionated and even raise their tone when it comes to politics. Depending on your opinions, they can either call you "communist" or "fascist".
• Chileans are very friendly people. Most of them will be willing to assist you with directions or advice in the street, bus stop, subway station, etc. Just use common sense to avoid danger.
• Be careful: many people can speak and understand English, French, Italian or German, be polite.
• Chileans hate arrogance. Be arrogant and you will have problems; be kind and everyone will try to help you.
• Chileans will know that you are a foreigner no matter how good your Spanish is. Don't get upset if they call you "gringo" - most foreigners are called that, it's not meant to be offensive.
• If you are of black race or dark skinned, you might be called "negro" in a friendly way. This is by no means similar to the n-word. Most Chileans are not racist, but unlike other South American countries, nearly every person of african heritage is a foreigner. Besides, "negro" is a common nickname for people with dark skin. (Negro is the Spanish word for black).
• Between 1879-1883 Chile fought a war against Peru and Bolivia over what is today the country's northern territory. Chile won against both countries but lost a portion of Patagonia since Argentina threatened to attack. Many years later, the Chilean people feel bitter about losing terrain in the south and proud over annexing what is today northern Chile. Bolivia still claims to get back that area, or at least, an "exit to the ocean" which has angered many Chileans and some express racist comments towards guest workers and illegal inmigrants from Peru and Bolivia. On the other hand, there are also many Chileans who do not find any wrong in reaching an agreement with Bolivia and grant them access to the ocean. Ask as many questions as you want, but be careful with phrases like "Peru or Bolivia has the right to the northern territory.
• A few Chileans of German heritage (mostly in the south) are rather proud of being German. Some knowledge in the German language is useful here. Chile has also a 500.000-strong Palestinian community (it's estimated that less than 1% actually speaks Arabic), so be careful when expressing Zionist or Pro-Israel viewpoints - there might be a Palestinian-Chilean that feels offended.
Contact
Phone
• Public phones located on streets are very likely to be tampered or vandalized, so it's better to use a phone located inside a commerce or a station.
• Prepaid cards for mobile phones and landlines are sold at most newspaper kiosks, supermarkets, gas stations, pharmacies and phone dealers.
• Mobile GSM networks are ubiquitous in all major cities and most of the territory of central and southern Chile.
• A basic prepaid cellular phone usually costs about 15000 pesos, most frequently charged with 10000 pesos worth of prepaid minutes. No ID is required to buy a prepaid phone.
• GSM SIM cards from ENTEL, Movistar or Claro are usually available for 5000 pesos, but without credit, so you'll need to buy some prepaid minutes to be able to call.
• Money can be charged into a cellphone from almost any ATM using a credit or debit card and from some pharmacies (Ahumada, Cruz Verde and Salco Brand) on the counter and in cash. Also, one can charge money directly into the phone by using a credit card through an automated service operator, with directions in Spanish or English.
• Chilean phone numbering scheme is very simple and straight.
Internet
There are cybercafes in every major and midsize city and at all tourist destinations. Some libraries are in a program called Biblioredes, with free computers and Internet (they may be very sensitive if you plug in your camera or something like that). In some remote locations, public libraries have internet satellite connections. Also notice if there's a Wi-Fi hotspot around. They're usually in metro stations, airports, malls, cafes, public buildings and several public spaces. (Check for the ones that say "gratis"--for free.)
This article is an outline and needs more content. It has a template, but there is not enough information present. Please plunge forward and help it grow!
This article contains content from Wikipedia's Chile article. View that page's revision history for the list of authors.
Personal tools
Namespaces
Variants
Actions
Navigation
feeds
Destination Docents
Toolbox
In other languages
other sites
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:54:28.000Z
|
bkah6erbbz72czpyqw6bsb64jigrrzti
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8326",
"uncompressed_offset": 281697170,
"url": "wikitravel.org/wiki/en/index.php?diff=425152&oldid=425151&title=Oberlin",
"warc_date": "2013-11-22T14:55:26.000Z",
"warc_filename": "<urn:uuid:00f730d0-e727-4c6d-968b-f0ca37218a52>",
"warc_url": "http://wikitravel.org/wiki/en/index.php?title=Oberlin&diff=425152&oldid=425151"
}
|
cccc_CC-MAIN-2013-20
|
Help Wikitravel grow by contributing to an article! Learn how.
Difference between revisions of "Oberlin"
From Wikitravel
Jump to: navigation, search
(Sleep)
Line 1: Line 1:
'''Oberlin''' is a city in [[Ohio]]'s [[Lorain County]]. The population was 8,195 at the 2000 census.
+
'''Oberlin''' is a city in [[Ohio]]'s [[Lorain County]]. The population was 8,195 at the 2000 census. It is known mainly for Oberlin College and the Oberlin Conservatory of Music.
==Get in==
==Get in==
Revision as of 03:45, 7 December 2006
Oberlin is a city in Ohio's Lorain County. The population was 8,195 at the 2000 census. It is known mainly for Oberlin College and the Oberlin Conservatory of Music.
Contents
Get in
Oberlin is located on Route 58 (North/South) between Amherst and Wellington as well as on Route 511 (East/West). Within the city limits, R58 is known as Main Street and R511 is known as Lorain St. Route 20 (where it is also known as Kipton East Road) runs south of town and connects to R58.
Get around
Due to its small size (approximately 3sq. mi), it is easiest to walk or bike around Oberlin. Navigation is fairly simple as the streets run mostly east/west or north/south in a standard grid system. There are two major east/west streets (Lorain/511 and College St) which are divided by Main/58 into East/West Lorain and East/West College. North/south streets are divided by College St (ex: Pleasant St. is divided into North/South Pleasant by College St.
Downtown Oberlin is located at the corner of Main and College. The central square, Tappan Sqaure, is located across College St. from downtown and is a square block with corners at Main/College Sts., Main/Lorain Sts., N Professor/Lorain Sts., and Professor/College Sts. The Oberlin College campus is located just west of Tappan Square (the Student Union building, Wilder Hall, is located at 127 W. Lorain St).
See
1. The Oberlin College campus 2. Frank Lloyd Wright house
Do
Buy
Eat
There are several restaurants in Oberlin offering a variety of cuisine and price ranges.
For the high end there is Weia Teia (9 South Main St), which offers Asian and American ingredients fused with Asian, French, and Italian techniques. Just outside of town on the west end is Presti's of Oberlin (580 W Lorain St), an Italian restaurant.
For medium-priced food there is the excellent Black River Cafe (15 S Main St, Americana with an emphasis on organic foods), Tooo Chinoise (Asian), the Mandarin (82 S Main St, Chinese and Japanese), and the Feve (30 S Main St, bar and restaurant), the Java Zone (5 W College St), and the excellent Lorenzo's Pizza (52 S Main St, Oberlin).
The low end is Downtown Pizza, Agave Burrito Bar and Tequileria, and several fast food chains.
Drink
There are two bars for non-college students in Oberlin: The Feve (30 S Main St, Oberlin) and the Oberlin Inn bar (officially known as Brewster's) at the corner of Main and College. The Feve is the more popular local hang out.
Sleep
The Oberlin Inn (corner of Main and College) is the only hotel in town, but there are several locally owned and operated Bed and Breakfasts, some of which are located on this page: http://www.lanierbb.com/oberlin-ohio-bed-breakfast.html
Get out
This article is an outline and needs more content. It has a template, but there is not enough information present. Please plunge forward and help it grow!
Personal tools
Namespaces
Variants
Actions
Navigation
feeds
Destination Docents
Toolbox
In other languages
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T08:09:26.000Z
|
dovgq7lyjmo5pcvobwyutkeetz7lc52p
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8333",
"uncompressed_offset": 293946457,
"url": "www.abs.gov.au/AUSSTATS/abs%40.nsf/DetailsPage/7215.0Apr%201996",
"warc_date": "2013-11-22T14:55:26.000Z",
"warc_filename": "<urn:uuid:00f730d0-e727-4c6d-968b-f0ca37218a52>",
"warc_url": "http://www.abs.gov.au/AUSSTATS/abs@.nsf/DetailsPage/7215.0Apr%201996?OpenDocument"
}
|
cccc_CC-MAIN-2013-20
|
Australian Bureau of Statistics
Celebrating the International Year of Statistics 2013
ABS Home > Statistics > By Release Date
7215.0 - Livestock Products, Australia, Apr 1996
Previous ISSUE Released at 11:30 AM (CANBERRA TIME) 04/06/1996
Page tools: RSS Search this Product
Help for : Adobe PDF.
Publications
7215.0 - Livestock Products, Australia
© Commonwealth of Australia 2013
Unless otherwise noted, content on this website is licensed under a Creative Commons Attribution 2.5 Australia Licence together with any terms, conditions and exclusions as set out in the website Copyright notice. For permission to do anything beyond the scope of this licence and copyright terms contact us.
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:54:05.000Z
|
sgieuagy3n4bt6htdksdevpqwnxxeg6e
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8334",
"uncompressed_offset": 294001001,
"url": "www.abs.gov.au/AUSSTATS/abs%40.nsf/ProductsbyReleaseDate/0556FBD355B2719BCA2571C50074ABF2",
"warc_date": "2013-11-22T14:55:26.000Z",
"warc_filename": "<urn:uuid:00f730d0-e727-4c6d-968b-f0ca37218a52>",
"warc_url": "http://www.abs.gov.au/AUSSTATS/abs@.nsf/ProductsbyReleaseDate/0556FBD355B2719BCA2571C50074ABF2?OpenDocument"
}
|
cccc_CC-MAIN-2013-20
|
Australian Bureau of Statistics
Celebrating the International Year of Statistics 2013
ABS Home > Statistics > By Catalogue Number
4906.0 - Personal Safety, Australia, 2005 (Reissue)
Latest ISSUE Released at 11:30 AM (CANBERRA TIME) 21/08/2006 Reissue
Page tools: Print Page Print All RSS Search this Product
Reissue
This release corrects textual information in the Summary of Findings in order to support interpretation of a small number of the statistics presented. Tables 6 and 8 have been amended to correct a small number of cells where figures had been transposed or were incorrect. Footnotes have been added to several other tables to aid users in the interpretation of the data.
NOTES
INQUIRIES
For further information about these and related statistics, contact the National Information and Referral Service on 1300 135 070 or Soula Macfarlane on Melbourne (03) 9615 7374.
SUMMARY OF FINDINGS
ABOUT THIS PUBLICATION
Information presented in this publication is about men's and women's experience of physical or sexual assault or threat by male and female perpetrators. PSS respondents were asked about their experiences of the different types of violence, since the age of 15, by different types of male and female perpetrators (including current partner, previous partner, boyfriend/girlfriend or date, other known man or woman, and stranger). More detailed information, such as where the incident occurred and what action was taken, was then collected for most recent incident of each of the different types of violence by a male and female perpetrator. Additional information was also collected about respondents experience of current and previous partner violence such as frequency and fears of violence, incidents of stalking and other forms of harassment and general feelings of safety.
Details regarding the interpretation of these results and comparison with other sources can be found in the Explanatory Notes and Appendix 2: Comparability between PSS and other sources.
MEASURING VIOLENCE
Measuring violence in the community through household surveys is a complex task. It tests people's memories by asking about events that occurred in the past, which may have been traumatic and which may have involved people closely related to them. The accuracy of the statistics can be affected if respondents feel threatened by the act of providing information or if they are concerned that the information might be used against the perpetrator.
Through consultation with experts in the field and testing, the ABS gave attention to the type of information collected and the manner in which it was collected. Special steps were taken to improve the quality of the survey results including detailed and precise questioning and the use of personal interviews. Respondents were informed that the survey was not compulsory and a specific requirement was that interviews were conducted in private, thus ensuring confidentiality of any information disclosed. The use of specially trained interviewers ensured that rapport could be established with respondents and that the relevant concepts and definitions could be explained as necessary.
The ABS publishes data relating to crime from different sources. Different methodologies can affect estimates. For example, incidents recorded by police are different from those reported in household surveys because not all incidents are reported to the police. Also, responses in surveys may be affected by the ways in which questions are asked. Some of these measurement issues are discussed in: Information Paper: Measuring Crime Victimisation, Australia - The Impact of Different Collection Methodologies, 2002 (cat. no. 4522.0.55.00 1). Appendix 2 provides information about the comparability of the PSS with other data sources.
There are no generally agreed or accepted standards for defining what constitutes violence. In developing the concepts and definitions used in the survey, the ABS was assisted by a Survey Advisory Group, which included members with legal and crime research backgrounds. The definitions used were based on actions which would be considered as offences under State and Territory criminal law.
DEFINITION OF VIOLENCE
Violence is any incident involving the occurrence, attempt or threat of either physical or sexual assault. Physical assault involves the use of physical force with the intent to harm or frighten. An attempt or threat to inflict physical harm is included only if a person believes it is likely to be carried out. Sexual assault includes acts of a sexual nature carried out against a person's will through the use of physical force, intimidation or coercion, or any attempts to do this. Unwanted sexual touching is excluded from sexual assault. Sexual threat involves the threat of an act of a sexual nature which the person believes is likely to be carried out. Refer to the Glossary for more detailed definitions.
COMPARISON OVER TIME
This publication includes comparisons with the 1996 Women's Safety Survey (WSS), where relevant. This survey collected information from approximately 6,300 women over the period February to April 1996. It covered the same broad range of topics as the PSS.
Estimates of physical threat appear to have dropped significantly from 1996 to 2005. Care should be taken when comparing estimates of physical threat between the two surveys. The 2005 PSS specifically instructed respondents to exclude incidents of threat that resulted in assault. For the WSS this was not as clearly defined in the question wording and respondents may have reported the same incident under both the physical threat and physical assault questions. This has not impacted on the estimates of physical violence (or total violence) as both physical threat and physical assault were counted only once in the total for physical violence in both the 2005 PSS and the 1996 WSS.
EXPERIENCE OF VIOLENCE
Violence includes any incident involving the occurrence, attempt or threat of either physical or sexual assault.
The following two charts show the experiences of violence for women and men in the 12 months prior to the survey.
In the 12 months prior to the survey, there were an estimated 443,800 (5.8%) women who experienced an incident of violence compared to 808,300 (11%) men. People were three times more likely to experience violence by a man than by a woman.
A larger proportion of men and women experienced physical violence compared to those who experienced sexual violence in the 12 months prior to the survey.
• 4.7% (363,000) of women experienced physical violence compared to 1.6% (126,100) who experienced sexual violence
• 10% (779,800) of men experienced physical violence compared to 0.6% (46,700) who experienced sexual violence
In the 12 months prior to the survey, younger women and men experienced violence at higher rates than older women and men.
• 12% (117,000) of women aged 18-24 years experienced at least one incident of violence, compared to 6.5% (97,900) of women aged 35-44 years and 1.7% (42,100) of women aged 55 years and over
• 31% (304,300) of men aged 18-24 years experienced at least one incident of violence, compared to 9.4% (138,700) of men aged 35-44 years and 2.8% (62,500) of men aged 55 years and over
In the 12 months prior to the survey, a higher proportion of women aged 25 years or more experienced violence, compared to the proportion of men in that age group who experienced violence.
• Of the 808,300 men who experienced violence, 62% (504,100) were aged over 25 years
• Of the 443,800 women who experienced violence, 74% (326,700) were aged over 25 years
Persons who experienced violence, During the last 12 months
Since the age of 15, there were an estimated 3,065,800 (39.9%) women who experienced violence compared with 3,744,900 (50.1%) men.
• 29% (2,243,600) of women experienced physical assault compared to 41% (3,031,800) of men
• 11% (833,200) of women experienced physical threat compared to 22% (1,675,300) of men
• 17% (1,293,100) of women experienced sexual assault compared to 4.8% (362,400) of men
• 4.6% (353,700) of women experienced sexual threat compared to 0.9% (69,500) of men
Changes over time
A smaller proportion of women reported violence in the 12 months prior to the survey in 2005 than in 1996.
• 5.8% (443,800) of women experienced violence in 2005 compared to 7.1% (490,400) in 1996
• 4.7% (363,000) of women experienced physical violence in 2005, compared with 5.9% (404,400) in 1996
• The proportion of women who experienced physical assault in 2005 was 3.1% (242,000) compared to 5.0% (346,900) in 1996
For those women aged less than 35 years, the proportion who experienced physical violence in the 12 months prior to the survey has decreased, while for those aged over 35 years the proportion increased.
• For women aged 18-24 years the proportion decreased to 26% (95,500) in 2005 from 38% (152,500) in 1996
• For women aged 45 years and over the proportion increased in 2005 to 25% (92,100) from 15% (60,500) in 1996
Women's experience of physical violence, During the last 12 months-1996 and 2005
There has been a change in the incidence of violence reported to the police in the 12 months prior to the two survey periods.
• 36% (70,400) of women who experienced physical assault by a male perpetrator reported it to the police in 2005 compared to 19% (54,400) in 1996
• 19% (19,100) of women who experienced sexual assault by a male perpetrator reported it to the police in 2005 compared to 15% (14,700) in 1996
Women's experience of physical assault by a male perpetrator, Police told, During the last 12 months-1996 and 2005
FEELINGS OF SAFETY
Feelings of safety refer to a respondent's feelings of safety in selected situations when they are alone.
Over the last 10 years, women's feelings of safety in selected situations have increased.
• 15% (1,165,400) of women in 2005 felt safe using public transport alone after dark compared to 11% (721,600) in 1996
• Of those who did not use public transport alone after dark in 2005, 25% (1,477,000) did not use it because they felt unsafe compared to 30% (1,737,500) in 1996
HARASSMENT
Harassment includes incidents such as obscene phone calls, indecent exposure, inappropriate comments about body or sex life and unwanted sexual touching.
• In the 12 months prior to the survey, 12% (864,300) of men experienced some form of harassment compared to 19% (1,459,500) of women
• Since the age of 15, 42% (6,333,400) of persons experienced harassment
• Since the age of 15, 33% (2,499,100) of women experienced inappropriate comments about their body or sex life compared to 12% (871,000) of men
• Since the age of 15, 25% (1,931,100) of women experienced unwanted sexual touching compared to 9.9% (737,000) of men
STALKING
Stalking involves various activities, such as loitering and following, which the respondent believed were being undertaken with the intent to harm or frighten. To be classified as stalking more than one type of activity had to occur, or the same type of activity had to occur on more than one occasion.
Younger people were more likely to be stalked than older people.
• In the 12 months prior to the survey, 28% (31,000) of men and 31% (61,300) of women who experienced stalking were aged 18-24 compared to 11% (12,500) of men and 8.8% (17,200) of women aged 55 years or older
• Since the age of 15, 9.1% (681,700) of men have been stalked (this includes incidents that occurred more than 20 years ago) compared to 19% (1,472,300) of women
PHYSICAL VIOLENCE
Physical violence includes any incident involving the occurrence, attempt or threat of physical assault. Physical assault involves the use of physical force with the intent to harm or frighten. An attempt or threat to inflict physical harm is included only if a person believes it is likely to be carried out.
In the 12 months prior to the survey period, 10% (779,800) of men and 4.7% (363,000) of women experienced physical violence.
An estimated 35% (5,275,400) of men and women have experienced physical assault since the age of 15.
The overall experiences of physical assault for men and women, in the 12 month period prior to the survey were different.
• Of those men who were physically assaulted, 65% (316,700) were physically assaulted by a male stranger compared to 15% (35,500) of women who were physically assaulted by a male stranger
• Of those women who were physically assaulted, 31% (73,800) were physically assaulted by a current and/or previous partner compared to 4.4% (21,200) of men who were physically assaulted by a current and/or previous partner
• 43% (207,100) of men who were physically assaulted were aged 18-24 years compared to 27% (65,800) of women
Experience of physical assault, During the last 12 months
Men were more likely to be physically assaulted by a stranger in the most recent incident since the age of 15, whereas women were more often assaulted by a current and/or previous partner.
• Of those men who were physically assaulted, 65% (1,507,400) were assaulted by a male stranger
• Of those women who were physically assaulted, 46% (780,500) were assaulted by a current and/or previous partner
The location of assaults varied between women and men during the 12 months prior to the survey
• Of the 195,300 women who experienced physical assault by a male perpetrator, 64% (125,100) of incidents occurred in a home
• Of the 79,500 men who experienced physical assault by a female perpetrator, 77% (60,900) of incidents occurred in a home
• Of those women who experienced physical assault by a female perpetrator, 38% (25,300) were assaulted in a home and 22.7% (15,100) at licensed premises
• 35% (148,900) of men experienced physical assault by a male perpetrator in the open, and 34% (145,300) at licensed premises
Location of physical assault, Most recent incident, during the last 12 months
SEXUAL VIOLENCE
Sexual violence includes sexual assault and sexual threat. Sexual assault is defined as an act of a sexual nature carried out against a person's will. Sexual threats are threats of sexual assault which a person believed were likely to be carried out.
During the 12 months prior to the survey 1.6% (126,100) of women and 0.6% (46,700) of men experienced an incident of sexual violence.
• Of the women who experienced sexual violence 81% (101,600) experienced an incident of sexual assault and 28% (34,900) experienced a threat of sexual assault
• 22% (22,100) of women had experienced sexual assault by a stranger in the most recent incident, 21% (21,500) by a previous partner, 39% (39,700) by a family member or friend and 32% (32,500) by an other known person
In the 12 months prior to the survey, 0.6% (42,300) of men reported experiencing sexual assault.
• 44% (18,500) had experienced sexual assault by a family member or friend in the most recent incident, 35% (14,900) by an other known person, and 33% (13,900) by a stranger
Since the age of 15, 5.5% (408,100) of men reported experiencing sexual violence compared to 19% (1,469,500) of women.
VIOLENCE BY CURRENT PARTNERS
People who experienced violence from their current partner were more likely to experience physical, rather than sexual, violence.
• Since the age of 15, 0.9% (68,100) of men and 2.1% (160,100) of women experienced current partner violence
• 10% (16,100) of women who had experienced violence by their current partner had a violence order issued against their current partner as a result of the violence. Of those women who had violence orders issued, 20% (3,200) reported that violence still occurred
Violence which occurs between partners in a home may affect the children who also live in the home.
• 49% (111,700) of men and women who experienced violence by a current partner reported that they had children in their care at some time during the relationship. An estimated 27% (60,700) said that these children had witnessed the violence
VIOLENCE BY PREVIOUS PARTNERS
Since the age of 15, people were more likely to have experienced violence from a previous partner than from a current partner.
• 4.9% (367,300) of men experienced violence from a previous partner compared to 15% (1,135,500) of women
• 32% (368,300) of women and 40% (146,500) of men who had ever experienced violence by their previous partner said there had only been one incident
• 59% (667,900) of women who experienced violence by a previous partner were pregnant at some time during the relationship; of these, 36% (239,800) reported that violence occurred during a pregnancy and 17% (112,000) experienced violence for the first time when they were pregnant
• 61% (822,500) of persons who experienced violence by a previous partner reported that they had children in their care at some time during the relationship and 36% (489,400) said that these children had witnessed the violence
CHILD PHYSICAL AND SEXUAL ABUSE
Child physical abuse includes any deliberate physical injury (including bruises) inflicted on a child, before the age of 15, by an adult. Child sexual abuse is any act, by an adult, involving a child under the age of 15 years in sexual activity.
• The proportion of women and men who experienced physical abuse before the age of 15 was 10% (779,500) and 9.4% (702,400) respectively
• Women were more likely to have been sexually abused than men. Before the age of 15, 12% ( 956,600) of women had been sexually abused compared to 4.5% (337,400) of men
© Commonwealth of Australia 2013
Unless otherwise noted, content on this website is licensed under a Creative Commons Attribution 2.5 Australia Licence together with any terms, conditions and exclusions as set out in the website Copyright notice. For permission to do anything beyond the scope of this licence and copyright terms contact us.
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T08:07:18.000Z
|
ztrhqw3dcuu6ewoeoki6mvjanjvktfor
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8336",
"uncompressed_offset": 294037890,
"url": "www.abs.gov.au/ausstats/abs%40.nsf/Products/1350.0~Dec%2B2009~Chapter~Labour%2BForce%2B%26%2BDemography",
"warc_date": "2013-11-22T14:55:26.000Z",
"warc_filename": "<urn:uuid:00f730d0-e727-4c6d-968b-f0ca37218a52>",
"warc_url": "http://www.abs.gov.au/ausstats/abs@.nsf/Products/1350.0~Dec+2009~Chapter~Labour+Force+&+Demography?OpenDocument"
}
|
cccc_CC-MAIN-2013-20
|
Australian Bureau of Statistics
Celebrating the International Year of Statistics 2013
ABS Home > Statistics > By Release Date
1350.0 - Australian Economic Indicators, Dec 2009
Previous ISSUE Released at 11:30 AM (CANBERRA TIME) 30/11/2009
Page tools: Print Page RSS Search this Product
Contents >> Labour Force & Demography
LABOUR FORCE & DEMOGRAPHY
This section contains the following subsection :
Table spreadsheets
Long time series spreadsheets
Graphs
Links
Previous PageNext Page
© Commonwealth of Australia 2013
Unless otherwise noted, content on this website is licensed under a Creative Commons Attribution 2.5 Australia Licence together with any terms, conditions and exclusions as set out in the website Copyright notice. For permission to do anything beyond the scope of this licence and copyright terms contact us.
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T05:25:11.000Z
|
saw5fj5adpvwg7u45ud3ldwcqt4hzubr
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8337",
"uncompressed_offset": 294044773,
"url": "www.abs.gov.au/ausstats/abs%40.nsf/ProductsbyReleaseDate/64DD711F23A2870DCA2570A40079DFD8",
"warc_date": "2013-11-22T14:55:26.000Z",
"warc_filename": "<urn:uuid:00f730d0-e727-4c6d-968b-f0ca37218a52>",
"warc_url": "http://www.abs.gov.au/ausstats/abs@.nsf/ProductsbyReleaseDate/64DD711F23A2870DCA2570A40079DFD8?OpenDocument"
}
|
cccc_CC-MAIN-2013-20
|
Australian Bureau of Statistics
Celebrating the International Year of Statistics 2013
ABS Home > Statistics > By Release Date
3235.2 - Population by Age and Sex, Victoria, Jun 1998
Previous ISSUE Released at 11:30 AM (CANBERRA TIME) 30/06/1999
Page tools: Print Page Print All RSS Search this Product
• About this Release
ABOUT THIS RELEASE
Replaces: 3207.2
Contains the estimated resident population by age (in five-year age groupings) and sex for each Statistical Local Area, Statistical Subdivision and Statistical Division in Victoria, at 30 June, with changes in Statistical Local Area boundaries since the previous census.
see also 3218.0
© Commonwealth of Australia 2013
Unless otherwise noted, content on this website is licensed under a Creative Commons Attribution 2.5 Australia Licence together with any terms, conditions and exclusions as set out in the website Copyright notice. For permission to do anything beyond the scope of this licence and copyright terms contact us.
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:49:09.000Z
|
ghwysm5mustaepp2q4pts7h3tqu64wmz
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8342",
"uncompressed_offset": 342434957,
"url": "www.biomedcentral.com/1471-2202/12/S1/P311",
"warc_date": "2013-11-22T14:55:26.000Z",
"warc_filename": "<urn:uuid:00f730d0-e727-4c6d-968b-f0ca37218a52>",
"warc_url": "http://www.biomedcentral.com/1471-2202/12/S1/P311"
}
|
cccc_CC-MAIN-2013-20
|
This article is part of the supplement: Twentieth Annual Computational Neuroscience Meeting: CNS*2011
Poster presentation
What decision-making models can tell us about tactile remapping
Larissa Albantakis1*, Krista E Overvliet1,2,3, Elena Azañón1,2, Gustavo Deco1,4 and Salvador Soto-Faraco1,4
Author Affiliations
1 Department of Information and Communication Technologies, Universitat Pompeu Fabra, Barcelona, 08003, Spain
2 Departament de Psicologia Bàsica, Universitat de Barcelona, 08035 Barcelona, Spain
3 Laboratory of Experimental Psychology, University of Leuven, 3000 Leuven, Belgium
4 Institució Catalana de la Recerca i Estudis Avançats (ICREA), Universitat Pompeu Fabra, Barcelona, 08010, Spain
For all author emails, please log on.
BMC Neuroscience 2011, 12(Suppl 1):P311 doi:10.1186/1471-2202-12-S1-P311
The electronic version of this article is the complete one and can be found online at: http://www.biomedcentral.com/1471-2202/12/S1/P311
Published:18 July 2011
© 2011 Albantakis et al; licensee BioMed Central Ltd.
Poster presentation
To locate an object by touch, for example when fumbling around in the dark, or to react to a tactile event on the skin, somatosensory information must be quickly combined with the current position of the hand relative to the rest of the body. Not much is know yet about the time course of this integration between touch and body posture (e.g., proprioception), called tactile remapping. A tactile localization task in which there is a spatial conflict between the somatotopic and the external spatial representations can provide some constraints on the timing of the proprioceptive signal (necessary for the remapping) relative to the tactile input. Here, we construe this localization task as a perceptual discrimination problem. By making use of established models of decision-making, we aim to shed light on the internal processes during tactile remapping.
In the experiment, participants had to make a speeded saccade towards a brief somatosensory stimulus applied to the finger of one hand, while their arms were either crossed or uncrossed about the body midline. The eye movement trajectories were recorded and revealed that especially in the crossed condition fast saccades occasionally started toward the incorrect (anatomically congruent) side and were corrected in-flight, resulting in a turn-around saccade (about 250 ms after tactile onset, which might reflect the completion of tactile remapping). Similar curved traces have been observed recently in a random-dot motion (RDM) discrimination task were subjects had to report their decision by moving a handle to a left or right target [1]. While in the RDM task the curved traces were interpreted as a change of mind, direction-reversal here is thought to be induced by the (delayed) proprioceptive signal. With crossed hands, the current body posture needs to be taken into account and the representation of touch changes through time due to the remapping [2]. In the uncrossed posture remapping is trivial as the anatomical and external reference frames are aligned.
In the framework of decision-making and in line with [1], we treat the initial direction of a saccade as a first choice, caused by crossing a decision-threshold. Accordingly, we apply two computational models able to account for changes of mind, a simple drift-diffusion model [1] and a biophysically-realistic nonlinear attractor model [3], to fit experimental reaction-time distributions and performance. In the models, turn-around saccades originate from a second threshold crossing if the accumulated evidence of the initially losing alternative overtakes the first choice. Remapping only the outcome of the decision to a different motor response in the crossed-hand condition proved insufficient to explain the differences in reaction times and performance to the uncrossed case. This suggests that internal differences between the two conditions are already present prior to the decision-making stage. From the modeling perspective the proprioceptive signal thus changes the input (evidence) for deciding on a saccade to the left or right. Allowing only the model inputs to vary between crossed and uncrossed conditions, we gain predictions on the relative size and timing of the internal proprioceptive signal for tactile remapping.
References
1. Resulaj A, Kiani R, Wolpert DM, Shadlen MN: Changes of mind in decision-making.
Nature 2009, 461(7261):263-266. PubMed Abstract | Publisher Full Text | PubMed Central Full Text
2. Azañón E, Soto-Faraco S: Changing reference frames during the encoding of tactile events.
Curr Biol 2008, 18(14):1044-1049. PubMed Abstract | Publisher Full Text
3. Wang XJ: Probabilistic decision making by slow reverberation in cortical circuits.
Neuron 2002, 36:955-968. PubMed Abstract | Publisher Full Text
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T05:33:23.000Z
|
gxjikmms62udluecakobslogbzgy4kfn
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8343",
"uncompressed_offset": 343850670,
"url": "www.bizsugar.com/published/page/910",
"warc_date": "2013-11-22T14:55:26.000Z",
"warc_filename": "<urn:uuid:00f730d0-e727-4c6d-968b-f0ca37218a52>",
"warc_url": "http://www.bizsugar.com/published/page/910"
}
|
cccc_CC-MAIN-2013-20
|
bizSugar.com Is A Sweet Place For SMB's
Posted by franpro under Resources
From http://www.thefranchiseblog4vets.com 1144 days ago
Made Hot by: robertbrady on April 2, 2010 3:00 am
If you're a small to mid-sized business owner or manager, you may want to add Ohio based bizSugar.com to your top resource list. (Disclosure; I'm the Community Promotions Director for the Small Business Trends website. Anita Campbell owns that site,... Read More
Ask For Directions = More Results & Less Bust-Ups
Posted by bloggertone under Management
From http://bloggertone.com 1142 days ago
Made Hot by: Jed on April 1, 2010 9:54 am
Ask For Directions = More Results & Less Bust-Ups. Ask For Directions = More Results & Less Bust-Ups Read More
Want to help me celebrate my 50th birthday?
As you may know, I have a new book coming out in May. The title of my new book is The Referral Engine – Teaching Your Business To Market Itself and it’s officially on pre-sale today. Read More
Of Design and Function
Posted by bloggertone under Marketing
From http://bloggertone.com 1143 days ago
Made Hot by: elainerogers on March 31, 2010 12:13 pm
Design is a key part of presenting a message out to your customers. Design must be a means to an end however and not the end itself. Read More
How to Optimize Google Buzz for Social Network Benefits
Posted by wchingya under Social Media
From http://www.wchingya.com 1144 days ago
Made Hot by: tuckerleroy on March 31, 2010 11:13 am
Google Buzz can be a network boost instead of a troublemaker. Here are some guides on how you can utilize Google Buzz for your social network benefits. Read More
The Ten Most Common Failures of Bad Leaders
Posted by ZaneSafrit under Management
From http://www.associatedcontent.com 1144 days ago
Made Hot by: jnelson on March 31, 2010 11:09 am
Here's a list by Paul Sloane of the 10 Most Common Failures of Bad Leaders. See anyone you recognize. I saw myself sometimes in some of them. But the sightings were fleeting and destined to be less as time goes on, I hope. Read More
Various forms of mobile marketing, text messaging, mobile ads, mobile apps, and location aware services, are getting lots of buzz currently. Ma Read More
You don’t know, who I know
Posted by careerscoach under Self-Development
From http://bloggertone.com 1144 days ago
Made Hot by: WayneLiew on March 31, 2010 5:07 am
It always amazes me of just how narrow minded and short sighted some people are when networking. Never make assumptions that someone can or can not help you. Read More
How to Use Social Media for Competitive Intelligence
Posted by billrice under Social Media
From http://bettercloser.com 1144 days ago
Made Hot by: sannwood on March 31, 2010 4:34 am
Competitive intelligence is first and foremost about understanding your competitor’s strategy. To do this you need to gain insight into their products, services, finances, partners, and customers. In today’s increasingly open and social Web, there are few better places to gather all of this important data than from social media. Read More
A financial advisor relies on an old school marketing technique
Posted by stephsammons under Marketing
From http://blog.wiredadvisor.com 1146 days ago
Made Hot by: lyceum on March 30, 2010 10:20 pm
A financial advisor uses an old school marketing technique. Financial advisors can benefit from leveraging social media to build relationships and leverage their personal brand. Read More
Subscribe
David Leonhardt: SEO Small Business Writer
Meet David Leonhardt, our most recent BizSugar "Contributor of the Week" on Facebook. It's a little recognition we … More
Editor's Picks
Got small business blog posts? Register and submit them today!
Shazam! Meet Contributor of the Week Paul Cox...Congrats, Paul!
See if you're one of our Top 10 Members this week!
Add BizSugar buttons and plugins to your small biz toolkit!
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T08:02:55.000Z
|
he2gt72h6jf7bwdjjc4v7gchtt3yuauy
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8346",
"uncompressed_offset": 367406212,
"url": "www.ccsenet.org/journal/index.php/jmr/article/view/22085/0",
"warc_date": "2013-11-22T14:55:26.000Z",
"warc_filename": "<urn:uuid:00f730d0-e727-4c6d-968b-f0ca37218a52>",
"warc_url": "http://www.ccsenet.org/journal/index.php/jmr/article/view/22085/0"
}
|
cccc_CC-MAIN-2013-20
|
Stochastic Dependence Modelling Using Conditional Elliptical Processes
Diakarya Barro, Simplice Dossou-Gbété, Saliou Diouf
Abstract
The class of elliptical structures includes a vast field of known symmetric distributions and copulas. This article investigates the properties of the copula underlying a stochastic elliptical process in conditional context. Specifically we characterize the conditional high dimensional copulas of the elliptical process both in non-spatial framework and for space-varying models. A spatial conditional measure is constructed to model the joint dependence of these copulas and distributions with applications to the three most known elliptical structures.
Full Text: PDF DOI: 10.5539/jmr.v4n6p130
This work is licensed under a Creative Commons Attribution 3.0 License.
Journal of Mathematics Research ISSN 1916-9795 (Print) ISSN 1916-9809 (Online)
Copyright © Canadian Center of Science and Education
To make sure that you can receive messages from us, please add the 'ccsenet.org' domain to your e-mail 'safe list'. If you do not receive e-mail in your 'inbox', check your 'bulk mail' or 'junk mail' folders.
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:58:12.000Z
|
w3evledc2xfm4vw4uhjtmvfz3yclr72s
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8347",
"uncompressed_offset": 384990298,
"url": "www.comics.org/changeset/1619112/compare/?collapse=1",
"warc_date": "2013-11-22T14:55:26.000Z",
"warc_filename": "<urn:uuid:00f730d0-e727-4c6d-968b-f0ca37218a52>",
"warc_url": "http://www.comics.org/changeset/1619112/compare/?collapse=1"
}
|
cccc_CC-MAIN-2013-20
|
Spider-Man Comics Weekly (1973 series) (Marvel UK) #132
Highlighted fields represent added, changed, and deleted data. Expand compare view. View the cover
No changes to the issue information / Previous
Volume:
?
Price:
Pages:
?
Indicia frequency:
?
Indicia Publisher:
?
Brand:
?
ISBN:
?
Barcode:
?
Format:
British Magazine Size (21.6 cm [8.5 inches] wide x 28 cm [11 inches] tall; Black and White with Colour Cover and Occasional Interior Colour; Newsprint; Saddle-Stitched; Weekly
Sequence 0
Field Previous Change
Sequence Number 0 0
Title
Unofficial Title? No No
Type cover cover
Feature
Genre
Job Number
Script
No Script X X
Pencils Ron Wilson ? Keith Pollard ?
No Pencils
Inks Mike Esposito Mike Esposito
No Inks
Colors ? ?
No Colors
Letters ? ?
No Letters
Editing
No Editing X X
Page Count
Page Count Uncertain No No
Characters
Synopsis
Reprint Notes
Notes
Keywords
Reprint Links
Comments
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T07:20:19.000Z
|
amblapwktmlmjbm5fg2e5xewdeysjicx
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8352",
"uncompressed_offset": 425815616,
"url": "www.eea.europa.eu/data-and-maps/figures/contribution-to-total-change-in-13",
"warc_date": "2013-11-22T14:55:26.000Z",
"warc_filename": "<urn:uuid:00f730d0-e727-4c6d-968b-f0ca37218a52>",
"warc_url": "http://www.eea.europa.eu/data-and-maps/figures/contribution-to-total-change-in-13"
}
|
cccc_CC-MAIN-2013-20
|
Personal tools
Sign up now!
Get notifications on new reports and products. Currently we have 55538 subscribers. Frequency: 3-4 emails / month.
Follow us
Twitter
Facebook
YouTube channel
RSS Feeds
Notifications archive
Write to us
For the public:
For media and journalists:
Contact EEA staff
Contact the web team
FAQ
Call us
Reception:
Phone: (+45) 33 36 71 00
Fax: (+45) 33 36 71 99
next
previous
items
Skip to content. | Skip to navigation
Sound and independent information
on the environment
You are here: Home / Data and maps / Maps and graphs / Contribution to total change in PM2.5 emissions for each sector between 1990 and 2010 (EEA member countries)
Contribution to total change in PM2.5 emissions for each sector between 1990 and 2010 (EEA member countries)
Created : Dec 21, 2012 Published : Dec 21, 2012 Last modified : Dec 21, 2012 01:42 PM
Topics: ,
The contribution made by each sector to the total change in primary PM2.5 particulate matter emissions between 1990 and 2010.
Download
European data
Metadata
Additional information
'Contribution to change' plots show the contribution to the total emission change between 1990-2010 made by a specified sector/ pollutant. A negative value (-51%) indicates that this sector contributes to the total reduction in emissions of acidifying substances (by 51%). A positive value indicates an increase in emission in this sector and a negative impact on the total reduction in emissions.
Data for Greece, Iceland, Luxembourg and Turkey not available.
European Environment Agency (EEA)
Kongens Nytorv 6
1050 Copenhagen K
Denmark
Phone: +45 3336 7100
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T05:34:21.000Z
|
7fjfygyxvww6jlo5jk2x4jssjm3ixbqr
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8355",
"uncompressed_offset": 431291346,
"url": "www.eoearth.org/article/Yukon_Intermontane_Plateaus_Tayga_Forest_%28Bailey%29",
"warc_date": "2013-11-22T14:55:26.000Z",
"warc_filename": "<urn:uuid:00f730d0-e727-4c6d-968b-f0ca37218a52>",
"warc_url": "http://www.eoearth.org/article/Yukon_Intermontane_Plateaus_Tayga_Forest_(Bailey)"
}
|
cccc_CC-MAIN-2013-20
|
Rate This Article
Average: 0/5
Yukon Intermontane Plateaus Tayga Forest (Bailey)
Yukon Intermontane Plateaus Tayga Forest (Bailey)
This article has been reviewed by the following Topic Editor: Mark McGinley
Interior Alaska, 56,100 mi2 (145,300 km2)
Boreal forest of stunted black spruce in the Yukon Province, Kuskokwim River, Alaska.
Land-surface form
A series of broad valleys, dissected uplands, and lowland basins covered with alluvial deposits extends across interior Alaska between the Brooks and Alaska Ranges. Four major rivers, the Yukon, Tanana, Koyukuk, and upper Kuskokwim, provide the area's outstanding hydrologic features. All four form wide valleys, with extensively braided channels; in some areas, the valleys contain hundreds of small lakes and marshes. Elevations are generally less than 2,000 ft (600 m).
Climate
The semiarid climate has extreme temperatures. Summers are short and hot, with temperatures up to 100F (38C); winters are long and severe, with temperatures as low as -75F (-60C). Average annual precipitation is only 17 in (430 mm). Temperature inversions, frequent in upland areas in winter, result in warmer temperatures on lower slopes than in bottom lands.
Vegetation
The major river bottoms support dense white spruce- cottonwood-poplar forests on floodplains and southfacing slopes up to about 1,000 ft (300 m). The undergrowth is dense shrubbery formed by green and thinleaf alder, willow, dogwood, and berries. The outer valley edges support evergreen and coniferous forests, often with pure stands of black spruce. The undergrowth consists of willow, dwarf birch, crowberry, fern, blueberry, lichens, and mosses. Upland areas are generally covered by a rather dense white spruce-birch-aspen-poplar forest. Pure stands of white spruce grow near streams. Typical undergrowth includes willow, alder, fern, berries, grasses, and mosses. Root systems are shallow. Water balance is likely the factor limiting growth in most of these areas because of the hot, dry summer climate. Old river terraces, ponds, and sloughs contain scattered but extensive bogs where the vegetation is chiefly sphagnum and other mosses, sedges, bog rosemary, and Labrador-tea. Marginal areas may support willow and alder.
Soils
River bottom and lower slope soils are generally deep, well-drained Inceptisols over sands, silts, and gravels that are only slightly weathered. Permafrost is discontinuous in major river valleys. Soils on northfacing slopes are shallow and poorly developed, with continuous permafrost. Upland soils that support spruce-hardwood forests are well-drained, shallow Inceptisols over continuous permafrost. Bog soils are Histosols.
Fauna
The spruce-hardwood forests provide excellent habitat for furbearers and other mammals. Brush zones and immature forests recovering from fires furnish especially good browse for moose. Common game animals in addition to moose include black and brown bear, wolf, wolverine, and caribou. Smaller mammals include lynx, red fox, beaver, mink, muskrat, weasel, river otter, marten, red and northern flying squirrel, and deer mouse.
Woodland game birds find plentiful habitat. Upland birds include northern hawk-owl, spruce grouse, and boreal chickadee.
Return to Ecoregions of the United States
Disclaimer: This article is taken wholly from, or contains information that was originally published by, the United States Forest Service. Topic editors and authors for the Encyclopedia of Earth may have edited its content or added new information. The use of information from the United States Forest Service should not be construed as support for or endorsement by that organization for any new information added by EoE personnel, or for any editing of the original content.
Citation
USFS (Content Source);Mark McGinley (Topic Editor) "Yukon Intermontane Plateaus Tayga Forest (Bailey)". In: Encyclopedia of Earth. Eds. Cutler J. Cleveland (Washington, D.C.: Environmental Information Coalition, National Council for Science and the Environment). [First published in the Encyclopedia of Earth June 2, 2009; Last revised Date June 2, 2009; Retrieved May 18, 2013 <http://www.eoearth.org/article/Yukon_Intermontane_Plateaus_Tayga_Forest_(Bailey)>
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T05:12:34.000Z
|
urc2g4623nwx3u4spxyk5qljm4bm4i52
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8362",
"uncompressed_offset": 475984947,
"url": "www.grandtheftwiki.com/User_talk:LMoyers28",
"warc_date": "2013-11-22T14:55:26.000Z",
"warc_filename": "<urn:uuid:00f730d0-e727-4c6d-968b-f0ca37218a52>",
"warc_url": "http://www.grandtheftwiki.com/User_talk:LMoyers28"
}
|
cccc_CC-MAIN-2013-20
|
User talk:LMoyers28
From Grand Theft Wiki
Jump to: navigation, search
user pagetalk pagecontributionsedit count
Welcome LMoyers28
Contents
Hi Leslie Moyers, welcome to Grand Theft Wiki! I hope you like the place and decide to stay.
We're pleased you've chosen to come to Grand Theft Wiki. We are a little different to many other sites, because we pride ourselves on encouraging every user to pitch in and help out, not just the experts.
Even if you're new and don't know much about how wikis work, we encourage you to get stuck in and start editing away! Any edit can be can be reversed, so don't worry about breaking things too much! Have a practice in the sandbox too if you like.
• If you do need help, check out our Help section.
• If you want to know more about Grand Theft Wiki, see our About page.
• If you're interested in our rules and the way we do things on Grand Theft Wiki, check out our Policy.
• If you'd like to interact with the rest of the community here, check out our Community Hub.
• If you want a safe place to test out editing, have a play around with our Sandbox
Whether you're brand new to wikis or are more experienced, check out our Tasks page, which shows you the sorts of things we need you to help out with on here.
I hope you enjoy being a part of this wiki, and that get involved in the community here! If you need help, ask any of our Staff members and leave a message on our talk/discussion pages. Have fun!
-- gboyers talk 09:52, 20 September 2011 (BST)
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T07:25:54.000Z
|
qqtc5q3bp32lus2yx5s4cn7ccaeje64e
|
{
"content_type": "application/xhtml+xml",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8366",
"uncompressed_offset": 487882608,
"url": "www.hindawi.com/isrn/re/2012/569381/",
"warc_date": "2013-11-22T14:55:26.000Z",
"warc_filename": "<urn:uuid:00f730d0-e727-4c6d-968b-f0ca37218a52>",
"warc_url": "http://www.hindawi.com/isrn/re/2012/569381/"
}
|
cccc_CC-MAIN-2013-20
|
About this Journal Submit a Manuscript Table of Contents
ISRN Renewable Energy
Volume 2012 (2012), Article ID 569381, 10 pages
doi:10.5402/2012/569381
Research Article
Experimental Study on Various Solar Still Designs
1Solar Energy Laboratory, Department of Physics, Sri Ramakrishna Mission Vidyalaya, College of Arts and Science, Coimbatore 641020, India
2Research and Development (Renewable Energy), NSP Green Energy Technologies, Pvt. Ltd. Chennai 603 209, India
3Department of Civil Engineering, Faculty of Engineering, Green Engineering and Sustainable Technology Lab, Institute of Advanced Technology, University Putra, 43400 Serdang, Malaysia
4Centre for Renewable Energy and Environmental Research, P.O. Box-5, Muzaffarpur 842001, India
Received 4 April 2012; Accepted 3 May 2012
Academic Editors: S. P. Ahrenkiel and S. Senthilarasu
Copyright © 2012 T. Arunkumar et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Abstract
Humankind has depended for ages on underground water reservoirs for its fresh water needs. But these sources do not always prove to be useful due to the presence of excessive salinity in the water. In this paper, the fabrication of seven solar still designs such as spherical solar still, pyramid solar still, hemispherical solar still, double basin glass solar still, concentrator coupled single slope solar still, tubular solar still and tubular solar still coupled with pyramid solar still and their performance evaluation in converting brackish water into fresh water for drinking are presented. The experiment was constructed and tested during January to May 2011. All the solar stills were operated in the same climatic conditions to analyze the influence of the modifications on the productivity. From the observations, the compound parabolic concentrator-assisted tubular solar still shows the maximum yield.
1. Introduction
Solar energy can be used either for seawater desalination by producing the thermal energy required to drive the phase change processes or by generating the electricity required to drive the membrane processes. Solar desalination systems are classified into direct and indirect collection systems. As their name imply, direct-collection systems use solar-energy to produce distillate directly in the solar collector, whereas in indirect collection systems, two sub-systems are employed. Conventional desalination systems are similar to solar systems because the same type of equipment is applied. The prime difference is that in the former, either a conventional boiler is used to provide the required heat or mains electricity is used to provide the required electric power, whereas in the latter, solar energy is applied [1]. Many papers have addressed solar stills of various configurations, including [26]. More specific studies include a hemispherical solar still [7, 8], pyramid solar still [9, 10], double-basin solar still [1115], triple basin solar still [16], multiple basin solar still [17, 18], inverted absorber solar still [1922], tubular solar stills [2326], compound parabolic concentrator (CPC) solar still [27], weir-type cascade solar still [28, 29], wick-type [30], inverted absorber solar still [31], portable active solar still [32], integrated basin solar still with a sandy reservoir [33], titled wick-type with flat plate bottom reflector [34], fin [35], active vibratory solar still [36], and a plastic solar still [37].
In this paper, the fabrication and performance evaluation of seven solar still designs are presented. The ASTER GDEM 30 meter digital elevation data was used to derive the study area map in the ArcGIS platform (ArcGIS, version 9). Figure 1 shows the hill shade and contourpatternof the study area. The contour lines show that the maximum elevation is in the North-West zone of the study site, while the minimum elevation is in the East zone.
Figure 1: Themapshowshill shade and contourpatternofthestudyarea.
2. Mechanism
The principle of pure water production from saline water using different designs of a solar water distillation technique is the same. The saline water in the trough mostly absorbs the solar radiation transmitting through the cover. The cover and the trough absorb the rest. Thus, the saline water is heated up to evaporates. The water vapor density of the humid air increases due to evaporation from the water surface. The water vapor condensed at the inner surface of the cover, releases its latent heat due to evaporation. Finally, the condensed water trickles down due to gravity and is stored in a collector [38].
3. Fabrication Details
3.1. Spherical Solar Still
A spherical solar still design with collector area of 0.28 m2 is presented. The still consists of a shallow circular basin of diameter 0.60 m that is made of steel. The circular absorber basin is coated with black paint for maximum absorption of incident solar radiation. The circular basin is fixed at the middle of the spherical aluminum mesh at radial height of 0.28 m. The saline water is stored in a basin with a capacity of 16 liters. The basin in the spherical solar still is fitted without having any physical contact with the top cover made of low-density polyethylene (LDPE) sheet. The LDPE sheet of thickness 0.107 mm is spread over the spherical mesh. A gap of 0.03 m is maintained between the circular basin and top cover. The evaporated water, which is condensed on the top cover, passes between this gap, and drips down towards the distilled water collection segment as illustrated in Figures 2 and 3, shows the pictorial diagram of the spherical solar still with total height of about 0.63 m.
Figure 2: Schematic view of spherical solar still.
Figure 3: Pictorial view of Spherical Solar Still.
3.2. Pyramid Solar Still
A pyramidal glass solar still design with collector area of 1.21 m2 () is presented as illustrated in Figures 4 and 5. The still is filled with saline water to height of 0.05 m. From the economic point of view, the solar still with sawdust insulating material has less cost of fabrication. Consequently, the cost of fresh water production is less. In the view of ecofriendly material, saw dust would be a good alternative for glass wool. The water storage basin of the still is constructed with dimension of mild steel. The water storage segment is provided of diameter 0.90 m, and the remaining 0.05 m is allowed for the water collection segment.
Figure 4: Schematic view of pyramid solar still.
Figure 5: Pictorial view of pyramid solar still.
3.3. Hemispherical Solar Still
The water storage basin of the hemispherical still is constructed with a diameter of 0.95 m and a height of 0.10 m using mild steel as illustrated in Figures 6 and 7. The water storage basin is painted black to increase the absorptivity. The still was filled with saline water to a height of 0.05 m. The top hemispherical cover of diameter 0.945 m and height 0.20 m is constructed of transparent acrylic sheet of 3 mm thickness with solar transmittance equal to 88%. The outer box of the still is constructed of wood of thickness 4 mm with the dimension . The bottom of the basin is filled with sawdust (to support the weight of the basin) up to a height of 0.15 m. The sides of the basin are insulated with the glass wool.
Figure 6: Schematic view of hemispherical solar still [8].
Figure 7: Pictorial view of hemispherical solar still.
3.4. Double-Basin Solar Still
A double-basin experimental solar still is fabricated as shown in Figures 8, 9, and 10. The overall size of the inner basin is and the outer basin is . The solar still has a 3 mm thick top cover, inclined at 17° on all the sides, and supported by steel frames. The upper basin is partitioned into three segments to avoid the formation of dry spots on the higher portion of the inner glass cover. Silicone rubber sealant has been used to seal off and prevent the water leakage between the boxes of the still. A hole in the basin’s sidewall allows saline or wastewater filling, as well as collecting the condensed water. Moreover, this is also used for inserting the thermocouple wires required for temperature measurements. When the still is in operation, the hole is closed with an insulating material to avoid heat and vapor losses.
Figure 8: The cross-sectional view of double-basin glass solar still.
Figure 9: Photographic view of the double-basin glass solar still (front view).
Figure 10: Photographic view of the double-basin glass solar still (side view).
3.5. Tubular Solar Still
A CPC concentric tubular solar still design with a rectangular absorber is presented as shown in Figures 11, 12, 13, and 14 and the specification shown in Table 1. The inner and outer circular tubes are positioned with a 5 mm gap for the flowing water and air to cool the outer surface of the inner tube. A rectangular trough of dimension is designed and coated with black paint using a spray technique. The water level in the trough decreased due to fast evaporation from the basin, so a dry spot appeared in the basin. This is avoided in successive trials by flowing the water continuously in the still with the help of a graduated tube. This tube maintains a constant level of water in the basin independent of the evaporation rate. This continuous supply of water is maintained by a water storage tank, which is kept near the CPC still. The outlet of the storage tank is connected to the inlet of the CPC still.
Table 1: Design parameters of the tubular solar still.
Figure 11: Schematic view of tubular solar still.
Figure 12: Pictorial view of CPC-TSS.
Figure 13: Pictorial view of absorber design in CPC-TSS.
Figure 14: Closeup view of CPC-TSS.
3.6. CPC-TSS-Pyramid Solar Still
The inner and outer tubes are positioned with a 5 mm gap for flowing cold water to cool the outer surface of the inner glass tube. A circular basin of dimension 2 m length and a diameter 0.035 m was designed and coated with black paint using a spray technique. Pyramid solar still of area is designed. The bottom of the still is insulted using saw dust. The solar still insulated with saw dust reduces the cost of fabrication. Consequently, the cost for fresh water production is less. In the view of eco-friendly material, saw dust would be a good alternative for glass wool. The pyramid solar still is coupled with a nontracking CPC with help of insulated pipes. The top cover is cooled by flowing cold water at a constant flow rate of 10 mL/min. It is adjusted by using a pressure head. It is adjusted for maintaining constant water level in the water storage tank initially during the experiment. A graduated measuring jar is used to measure the flow rate. The process is repeated many times until steady cold-water flow in between the tubular cover (See Figures 15 and 16).
Figure 15: Cross sectional view of tubular solar still coupled with pyramid solar still.
Figure 16: Pictorial view of CPC-pyramid solar still design.
3.7. Hemispherical Concentrator Solar Still
A single-slope solar still design with hemispherical concentrator and hemispherical basin absorber are presented as shown in Figures 17 and 18. The basin of a typical single-slope solar still is transformed to a hemispherical shape. It is made up of copper 4 mm thick. The diameter of the absorber is 0.22 m, and it is welded to the bottom of the still without any water leakage. The bottom and sides of the inner surface of the basins and outer surface are painted black for good solar absorption. 6 mm inside diameter inlet pipe is provided for pouring water and inserting the thermocouples to measure the temperature inside the still. The top cover is made up of transparent glass sheet of thickness 2 mm of solar transmittance 90%. The dimension of the glass plate is . The top cover is tilted at a 16° slope.
Figure 17: Schematic view of spherical basin solar still.
Figure 18: Pictorial view of spherical basin solar still.
4. Experimental Techniques and Results
Experimental setup are performed to evaluate the performance of the six solar still designs under the clear climatic conditions of Coimbatore, India (11°N latitude, 77°E longitude). The basins are filled with saline water. The experiment was performed on January 1, 2011 to May 30, 2011 with the readings recorded at 30 minutes interval. In order to avoid rapid decrease of the water level in the basin, due to evaporation on clear sunny days, a water tank is connected to each solar still and the same water level is maintained for the six designs in this study. The distilled output of spherical solar still is frequently measured by a measuring jar at regular intervals with the measuring jar placed at the outlet of the solar still. Figure 19 shows the variation of the average daily water collection with respect to time.
Figure 19: Variation of productivity with respect to total productivity.
5. Results Analysis and Discussion
The seven different designs and operational parameters studied to investigate their influence on still productivity are shown in Figure 19. The distillates yield around 2300 mL/m2/day obtained for spherical solar still. This type of solar still receives radiation that is transmitted from the spherical transparent surface. At the same time, the water vapor is condensed in the larger spherical surface. Hence more water droplets are condensed on the surface. The contact in the spherical surface still with air is more than a single slope solar still. Hence the rate of condensed distillate yield is increased.
The average daily output of the still is 2900 mL/m2/day for the double-basin glass solar still. The evaporation of water in the upper basin is caused mainly by condensation that takes place at the glass cover of the lower basin. As a result, the upper basin continues to produce an appreciable amount of distillate during the night. This demonstrates that the performance of the double-basin solar still is much better than a single-slope solar still. The basin temperature reached to a maximum within a short intervals of time due to the point focusing of the concentrator. At the same time, corresponding glass temperature is also increased. This increase in cover temperature is due to the minimum separation of distance between top cover and water surface in the basin. So the influence of air temperature due to convection increased the top cover temperature. The rate of evaporation increases due to increase water temperature in the basin. The temperature difference between water and cover temperature increased the distillation yield rate.
The distillate output of the pyramid solar still is 3300 mL/m2/day and that from the top cover cooling effect of hemispherical solar still is 3659 mL/m2/day. This is because the surface area of the hemispherical solar still is greater than the pyramid solar still. Hence, the hemispherical top cover is contacted with air in high rate. This increases the condensate of more droplets in the top cover. The yield rate is much improved for this type of still when compared to single-slope conventional solar still. A shadow effect creates a small amount of shadow to fall over the water surface during in the morning time as well as in the evening time. This drawback is diminished by reducing the height of the basin as well as hemispherical shape top cover.
The distillate output of the concentrator-coupled single-slope solar still is 2600 mL/m2/day while that from the tubular solar still is 4500 mL/m2/day. The rapid rate of water productivity is achieved in the concentrator-coupled single slope solar still is 11.00 am to 2.00 pm. The total yield of 6928 mL/m2 is collected for tubular solar still coupled with pyramid solar still. Additionally, the heat extraction of water in the pyramid solar still temperature is further increased by the incoming solar radiation. So the water temperature is increased within a short interval of time. The sudden rise in water temperature induced the evaporative heat transfer in the still. Therefore, the distilled yield increases more than conventional solar still. A further increase in yield rate is also observed for the cooling over the pyramid solar still under same mode of operation. Thus, this result conformed that the assistance of concentrator certainly increased the yield rate of distilled water. The temperature difference () is one of the key parameter that affects the productivity of a solar still.
This fruitful attempt has been made to analyze different types of stills with different modes of operations. These results reveal that the tubular solar still coupled with pyramid solar still produces higher yield rate. These analyses suggest that the method is consistent to produce a low cost distillation unit for acquiring high pure distilled water. At a time when attention is firmly focused worldwide on control and prevention of pollution, efficient use of energy, and more reliance on renewable energy source, these different types of desalination systems are warmly welcome to fight against environmental pollution, and they are packed with energy saving and environmental friendly features.
6. Conclusion
In this paper, the fabrication of seven solar still designs (spherical, pyramidal, hemispherical, double basin, concentrator-coupled CPC tubular, CPC coupled with pyramid solar still) and their performance evaluation in converting brackish water into fresh water for drinking are presented. From the experimental results, tubular solar still coupled pyramid solar still shows the maximum amount of productivity due to the concentrator effect. The productivity of the solar still entirely depends on the climatic parameters as well as increasing the water temperature. This leads to raise the evaporative and convective heat transfer coefficients in the solar still. The concentrator effect plays a vital role to increase the water temperature up to 95°C compared to the other types of designs. So evaporative heat transfer is more for tubular solar still, and it is showing the maximum amount of yield.
References
1. S. Kalogirou, “Use of parabolic trough solar energy collectors for sea-water desalination,” Applied Energy, vol. 60, no. 2, pp. 65–88, 1998. View at Publisher · View at Google Scholar · View at Scopus
2. I. Al-Hayeka and O. O. Badran, “The effect of using different designs of solar stills on water distillation,” Desalination, vol. 169, no. 2, pp. 121–127, 2004. View at Publisher · View at Google Scholar · View at Scopus
3. H. E. S. Fath, “High performance of a simple design, two effects, solar distillation unit,” Energy Conversion and Management, vol. 38, no. 18, pp. 1895–1905, 1997. View at Scopus
4. A. M. Tayeb, “Performance study of some designs of solar stills,” Energy Conversion and Management, vol. 33, no. 9, pp. 889–898, 1992. View at Scopus
5. A. J. N. Khalifa, A. S. Al-Jubouri, and M. K. Abed, “Experimental study on modified simple solar stills,” Energy Conversion and Management, vol. 40, no. 17, pp. 1835–1847, 1999. View at Publisher · View at Google Scholar · View at Scopus
6. M. Abu-Arabi and Y. Zurigat, “Year-round comparative study of three types of solar desalination units,” Desalination, vol. 172, no. 2, pp. 137–143, 2005. View at Publisher · View at Google Scholar · View at Scopus
7. B. I. Ismail, “Design and performance of a transportable hemispherical solar still,” Renewable Energy, vol. 34, no. 1, pp. 145–150, 2009. View at Publisher · View at Google Scholar · View at Scopus
8. T. Arunkumar, R. Jayaprakash, D. Denkenberger et al., “An experimental study on a hemispherical solar still,” Desalination, vol. 286, pp. 342–348, 2012. View at Publisher · View at Google Scholar
9. H. E. S. Fath, M. El-Samanoudy, K. Fahmy, and A. Hassabou, “Thermal-economic analysis and comparison between pyramid-shaped and single-slope solar still configurations,” Desalination, vol. 159, no. 1, pp. 69–79, 2003. View at Publisher · View at Google Scholar · View at Scopus
10. M. A. Hamdan, A. M. Musa, and B. A. Jubran, “Performance of solar still under Jordanian climate,” Energy Conversion and Management, vol. 40, no. 5, pp. 495–503, 1999. View at Scopus
11. A. A. El-Sebaii, “Effect of wind speed on some designs of solar stills,” Energy Conversion and Management, vol. 41, no. 6, pp. 523–538, 2000. View at Scopus
12. A. A. Al-Karaghouli and W. E. Alnaser, “Experimental comparative study of the performances of single and double basin solar-stills,” Applied Energy, vol. 77, no. 3, pp. 317–325, 2004. View at Publisher · View at Google Scholar · View at Scopus
13. Y. P. Yadav, “Transient analysis of double-basin solar still integrated with collector,” Desalination, vol. 71, no. 2, pp. 151–164, 1989. View at Scopus
14. G. N. Tiwari, “Enhancement of daily yield in a double basin solar still,” Energy Conversion and Management, vol. 25, no. 1, pp. 49–50, 1985. View at Scopus
15. M. S. Sodha, J. K. Nayak, G. N. Tiwari, and A. Kumar, “Double basin solar still,” Energy Conversion and Management, vol. 20, no. 1, pp. 23–32, 1980. View at Scopus
16. K. K. Murugavel and K. Srithar, “Performance study on basin type double slope solar still with different wick materials and minimum mass of water,” Renewable Energy, vol. 36, no. 2, pp. 612–620, 2011. View at Publisher · View at Google Scholar · View at Scopus
17. A. A. El-Sebaii, “Thermal performance of a triple-basin solar still,” Desalination, vol. 174, no. 1, pp. 23–37, 2005. View at Publisher · View at Google Scholar · View at Scopus
18. G. N. Tiwari, S. K. Singh, and V. P. Bhatnagar, “Analytical thermal modelling of multi-basin solar still,” Energy Conversion and Management, vol. 34, no. 12, pp. 1261–1266, 1993. View at Scopus
19. Y. Yamaguchi and H. Sato, “Development of small-scale multi-effect solar still,” in Proceedings of the ASME International Solar Energy Conference (ISEC'03), pp. 167–173, Kohala Coast, Hawaii, USA, March 2003. View at Scopus
20. S. Suneja and G. N. Tiwari, “Effect of water flow on internal heat transfer solar distillation,” Energy Conversion and Management, vol. 40, no. 5, pp. 509–518, 1999. View at Scopus
21. S. Suneja and G. N. Tiwari, “Effect of water depth on the performance of an inverted absorber double basin solar still,” Energy Conversion and Management, vol. 40, no. 17, pp. 1885–1897, 1999. View at Publisher · View at Google Scholar · View at Scopus
22. S. Suneja and G. N. Tiwari, “Parametric study of an inverted absorber triple effect solar still,” Energy Conversion and Management, vol. 40, no. 17, pp. 1871–1884, 1999. View at Publisher · View at Google Scholar · View at Scopus
23. S. Suneja and G. N. Tiwari, “Optimization of number of effects for higher yield from an inverted absorber solar still using the Runge-Kutta method,” Desalination, vol. 120, no. 3, pp. 197–209, 1998. View at Scopus
24. A. Ahsan and T. Fukuhara, “Mass and heat transfer model of tubular solar still,” Solar Energy, vol. 84, no. 7, pp. 1147–1156, 2010. View at Publisher · View at Google Scholar · View at Scopus
25. A. Ahsan, K. M. S. Islam, T. Fukuhara, and A. H. Ghazali, “Experimental study on evaporation, condensation and production of a new tubular solar still,” Desalination, vol. 260, no. 1-3, pp. 172–179, 2010. View at Publisher · View at Google Scholar · View at Scopus
26. A. Ahsan and T. Fukuhara, “Condensation mass transfer in unsaturated humid air inside tubular solar still,” Annual Journal of Hydraulic Engineering, Japan Society of Civil Engineers, vol. 53, pp. 97–102, 2009.
27. A. Ahsan and T. Fukuhara, “Evaporative mass transfer in tubular solar still,” Journal of Hydroscience and Hydraulic Engineering, Japan Society of Civil Engineers, vol. 26, no. 2, pp. 15–25, 2008.
28. G. M. Cappelletti, “An experiment with a plastic solar still,” Desalination, vol. 142, no. 3, pp. 221–227, 2002. View at Publisher · View at Google Scholar · View at Scopus
29. F. F. Tabrizi, M. Dashtban, H. Moghaddam, and K. Razzaghi, “Effect of water flow rate on internal heat and mass transfer and daily productivity of a weir-type cascade solar still,” Desalination, vol. 260, no. 1-3, pp. 239–247, 2010. View at Publisher · View at Google Scholar · View at Scopus
30. F. F. Tabrizi, M. Dashtban, and H. Moghaddam, “Experimental investigation of a weir-type cascade solar still with built-in latent heat thermal energy storage system,” Desalination, vol. 260, no. 1-3, pp. 248–253, 2010. View at Publisher · View at Google Scholar · View at Scopus
31. J. T. Mahdi, B. E. Smith, and A. O. Sharif, “An experimental wick-type solar still system: design and construction,” Desalination, vol. 267, no. 2-3, pp. 233–238, 2011. View at Publisher · View at Google Scholar · View at Scopus
32. R. Dev and G. N. Tiwari, “Characteristic equation of thermoelectric cooling in a portable active solar still-an experimental study on winter days,” Desalination, vol. 269, no. 1–3, pp. 67–77, 2011. View at Publisher · View at Google Scholar
33. J. A. Esfahani, N. Rahbar, and M. Lavvaf, “Utilization of thermoelectric cooling in a portable active solar still—an experimental study on winter days,” Desalination, vol. 269, no. 1–3, pp. 198–205, 2011. View at Publisher · View at Google Scholar · View at Scopus
34. F. F. Tabrizi and A. Z. Sharak, “Experimental study of an integrated basin solar still with a sandy heat reservoir,” Desalination, vol. 253, no. 1–3, pp. 195–199, 2010. View at Publisher · View at Google Scholar · View at Scopus
35. H. Tanaka, “Tilted wick solar still with flat plate bottom reflector,” Desalination, vol. 273, no. 2-3, pp. 405–413, 2011. View at Publisher · View at Google Scholar · View at Scopus
36. V. Velmurugan, M. Gopalakrishnan, R. Raghu, and K. Srithar, “Single basin solar still with fin for enhancing productivity,” Energy Conversion and Management, vol. 49, no. 10, pp. 2602–2608, 2008. View at Publisher · View at Google Scholar · View at Scopus
37. K. M. S. Eldalil, “Improving the performance of solar still using vibratory harmonic effect,” Desalination, vol. 251, no. 1–3, pp. 3–11, 2010. View at Publisher · View at Google Scholar · View at Scopus
38. A. Ahsan, M. Imteaz, A. Rahman, B. Yusuf, and T. Fukuhara, “Design, fabrication and performance of an improved solar still,” Desalination, vol. 292, pp. 105–112, 2012. View at Publisher · View at Google Scholar
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T05:59:51.000Z
|
kcajjrev6mn3sslwuytez5vtxztboz5z
|
{
"content_type": "application/xhtml+xml",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8367",
"uncompressed_offset": 487899204,
"url": "www.hindawi.com/journals/ijta/2008/436870/",
"warc_date": "2013-11-22T14:55:26.000Z",
"warc_filename": "<urn:uuid:00f730d0-e727-4c6d-968b-f0ca37218a52>",
"warc_url": "http://www.hindawi.com/journals/ijta/2008/436870/"
}
|
cccc_CC-MAIN-2013-20
|
About this Journal Submit a Manuscript Table of Contents
International Journal of Telemedicine and Applications
Volume 2008 (2008), Article ID 436870, 5 pages
doi:10.1155/2008/436870
Research Article
Development of a Novel Contactless Mechanocardiograph Device
Computational and Integrative Bio-Engineering Research laboratory (CIBER), School of Engineering Science, Simon Fraser University, 8888 University Drive, Burnaby, BC, V5A 1S6, Canada
Received 13 October 2007; Revised 15 January 2008; Accepted 3 March 2008
Academic Editor: Sajid Hussain
Copyright © 2008 Kouhyar Tavakolian et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Abstract
A novel method of detecting mechanical movement of the heart, Mechanocardiography (MCG), with no connection to the subject's body is presented. This measurement is based on radar technology and it has been proven through this research work that the acquired signal is highly correlated to the phonocardiograph signal and acceleration-based ballistocardiograph signal (BCG) recorded directly from the sternum. The heart rate and respiration rate have been extracted from the acquired signal as two possible physiological monitoring applications of the radar-based MCG device.
1. Introduction
The ballistocardiograph (BCG) is a vital signal in the 1–20 Hz frequency range which is caused by the movements of the heart and blood. The BCG can be recorded from the surface of human body by noninvasive means. In the early 1930s, Isaac Starr recognized that the BCG signals closely reflect the strength of myocardial contraction and classified them into four groups to distinguish normal and abnormal heart performances [1, 2]. As a result of his valuable research, clinicians and medical experts for almost four decades studied the effects of different heart malfunctions by means of the BCG and proved that these malfunctions can be related to typical patterns in BCG signals [3, 4]. The ideal BCG waveform consists of seven waveform peaks labeled H through N as defined by the American Heart Association, and this annotation can be seen in Figure 1.
Figure 1: BCG and ECG signals of a single heart-cycle as recorded by the microsensor with the annotation referenced to ECG.
In addition to a number of clinical studies that have been performed with the BCG, specialized BCG instruments, including beds and chairs, have been developed by different research groups [57]. Due to the unrefined nature of the previous BCG signal acquisition technologies, the lack of interpretation algorithms and the lack of practical devices, the current health care systems do not use BCG for clinical purposes. New microsensor and digital wireless technologies provide more accurate BCG signal acquisition and processing, therefore, opening new possibilities to use BCG, and in general mechanical signals of the heart, clinically as a new additional tool in diagnosis and identification of heart malfunctions.
Based on these observations, we are improving the BCG signal acquisition system that reflects the mechanical functioning of the heart. In our first study [8], we used a high-precision accelerometer, which is factory calibrated, weighs 54 g, and is attached to the sternum, the same as used in reference [9]. In our second study, we improved the previous sensor by developing a small mechanically flexible microsensor that could be easily attached to the sternum. It has been proven that all the aspects of a classical BCG signal, (H, I, J, K) waves similar to that measured through a high-precision accelerometer [9], can be identified in the novel microsensor recordings [10].
The current research, reported in this paper, is aiming to go one step further by applying contactless measurement of the mechanical movement of the heart, using a radar-based MCG device operating in the range of 2.45 GHz [11]. The extracted signal is considered a mechanocardiograph (MCG) reflecting the mechanical functioning of the heart and is highly correlated to the BCG signal acquired in previous studies [12].
This paper is organized as follows: in the second section of the paper our signal acquisition methodology is explained and then the comparison of the acquired MCG signal to our previous BCG recordings is presented. In section three, the electronic circuit board design developed for the radar-based MCG device is explained. In section four the results of breathing rate and heart rate measurements using the new technology are presented. The comparison results of the phonocardiograph and the acquired signal are also presented clearly showing the correspondence of our MCG signal to cardiac events.
2. MCG Signal Acquisition
The block diagram in Figure 2 shows the general methodology followed in our research for processing of the radar-based MCG signal. The MCG signal was acquired by a microprocessor controlled, radar-based MCG device placed at distance of 10 cm away from the subject’s chest. The data acquisition, for the results presented in this paper, involved the measurement of ECG and respiration signals too. These signals were acquired by a Biopac biological data acquisition system [13]. The design principle of radar-based MCG device is presented in section three of the paper.
Figure 2: Radar-based MCG signal processing methodology.
While monitoring the heart from the outside of the body contactlessly from the sternal location, the signal passes through only a few layers of different tissues between the sternum and the heart which can be seen in Figure 3. The tissue layers between the sensor and heart muscle include: skin, sternum, lung and pleural tissue, pericardium and pericardial space. From the sternum position, these tissue layers are thinner compared to the other positions. Therefore, the best position to record the heart's MCG signal is from the sternum (normally on the first third of the sternum length, as this is the closest path to get to the heart muscle).
Figure 3: Positioning of different layers of tissues that the radar signal will go through. The layers between sternum and right ventricle include pericardium, pericardial cavity, and thin layers of pleural tissues.
RF signal with the carrier frequency of 2.45 GHz was transmitted toward the subject’s chest, and the reflected signal was band-passed filtered between 0.5 Hz to 25 Hz. The filtered signal was differentiated and then band-pass filtered again between 4 Hz to 20 Hz. The comparison of the processed MCG signal to the BCG signal recorded simultaneously from the sternum can be seen in Figure 4 together with the synchronized ECG signal.
Figure 4: Two cycles of the filtered radar-based MCG signal (bottom), the filtered signal recorded directly from the sternum using a high-precision accelerometer (middle), and the lead I of ECG signal (top).
It can be observed that there is a close correlation between the signal acquired from the radar-based MCG device and the signal acquired from the accelerometer-based BCG device attached to the sternum. The systolic and diastolic phases of cardiac cycle are shown to identify the correlations of these mechanical signals to the heart functioning.
Phonocardiograph signal reflects the heart sounds that can be hared using stethoscope. Heart sound S1 corresponds to systolic phase of the heart cycle, and S2 corresponds to the diastolic phase of it. For the comparison purpose, the MCG signal was acquired synchronously with phonocardiograph signal and it was observed that S1 and S2 sounds of the phonocardiograph signal corresponded to the similar complexes on the MCG signal. The clear correlation of this new signal to the heart cycle’s events can be observed in Figure 6.
Figure 5: Block diagram of the principle design of the contactless MCG device.
Figure 6: Two cycles of synchronous radar MCG, phonocardiograph, and ECG signal showing the correlation of cardiac cycle events to radar MCG signal. Systolic and diastolic complexes can be identified in the radar MCG signal corresponding to S1 and S2 of heart’s sounds.
3. Contactless MCG Device
As stated before, in our experiments heart’s MCG signal was measured by a MCG device operating in the range of 2.45 GHz. At this electromagnetic frequency, the surface of the body is highly reflective to incident electromagnetic field. Biological tissue is very lossy at this frequency, and there is minimal penetration of radiated electromagnetic energy into the body. Therefore, a return signal from a radiated electromagnetic field incident on the body will primarily contain information associated with movement events.
The effects of radio-frequency fields on human health have been monitored and studied by the scientists around the world for about 60 years now. The 2.45 GHz frequency is considered to be safe for human health. This is the same frequency range as emitted from a cell phone [14]. The specific absorption rate, SAR, is 0.42 w/kg which is below the limits as recommended by international commission on nonionizing radiation protection [15].
The principal design of the radar-based MCG device is shown in Figure 5. The antenna mounted in the device is HFMD24 by Siemens and contains a transmitter and a receiver in the same housing. The operating frequency is 2.45 GHz. The transmitter transmits continuous wave radio frequency energy towards subject's body. The returned signal is frequency shifted due to the Doppler effect, which is the apparent change in frequency and wavelength of a wave that is perceived by an observer moving relative to the source of the waves. This effect permits the measurement of slight body movements from which physical heart movement signal can be obtained by the MCG receiver.
The output signal from the receiver is filtered and amplified and is sent to the microprocessor for further processing. The cutoff frequencies for the band-pass filter shown in the schematic are 1 Hz and 100 Hz, and the gain of the amplifier is around 800. After filtering and amplifying, the MCG signal is sent to the A/D unit and then to the ATMEL CPU for further processing. The CPU is connected to a thin-film transistor (TFT) display via its serial peripheral interface (SPI) port. The MCG device operates with two AA batteries (2.45 V).
Considering that the MCG device has its own CPU and monitor, it can be used stand alone to acquire and process the MCG signal. There is also another option of sending the data to a personal computer for more advanced processing of the data using Matlab. To have this option on our device, the digitized MCG signal is transformed to packets and sent through UART to the USB and finally to the host personal computer for possible further processing.
4. Results and Discussion
The data from subjects were acquired at Burnaby General Hospital (British Columbia, Canada) and in all the measurements presented in this paper the distance from the sensor to the chest was set to 10 cm. The processed MCG signal has been superimposed on the phonocardiograph signal, and it has been noticed that S1 and S2 sounds of the phonocardiograph signal corresponded to the similar complexes on the radar MCG signal. The correlation of the MCG signal to the heart cycle’s events is observed, and the results of this superimposition can be seen in Figure 6.
For the heart rate measurement our experimental setup included the acquisition of the MCG signal and two leads of ECG as a reference. For respiration rate measurement, the setup included the acquisition of MCG signal together with the respiration signal as the reference. Eight subjects took part in the respiration measurement tests, and six of these subjects took part in the heart rate measurement tests too. Breathing rate measurement experiments were 60 seconds long while heart rate measurement experiments were 15 seconds long.
For detection of breathing rate, the radar signal was low pass filtered under 0.4 Hz, and the peaks were counted and compared to the results acquired from a strain gauge transducer that measures the changes in thoracic circumference, using a belt which is fastened to the subject’s thorax. As can be seen in Table 1, the accuracy of respiration rate measurement was 91.35 percent over all eight subjects. The heart rate was measured using radar-based MCG device and was compared to the heart rate calculated from the simultaneous ECG signal for six subjects. The average of the heart rate accuracy on these subjects was calculated to be 92.9 percent.
Table 1: The heart rate and respiration rate measurements using the MCG device for eight subjects. The numbers represent the percentage of correctly detected heart beats or breathing cycles to the total number of heart beats or breathing cycles.
As an example, for subject six we had 14 cycles of respiration from which 13 of them where correctly identified. Thus, for this subject, the 92 percent accuracy for respiration rate detection was achieved. For the same subject and out of 19 heart beats, 17 of them were correctly identified. Thus, for heart beat detection for this subject, the accuracy of 89.4 percents was achieved. Using our device, the data can be seen real time and can be processed in near real time. The reason for quick processing time is that the algorithm includes filtering of the data and then peak searching to find the corresponding peaks to the inspiration and heart beat events.
The sources of interference for contactless heart motion signal acquisition can be categorized into two main categories. First, foreign electromagnetic radiation that may disrupt the desired signal on its way back to the antenna, and second, motion interference of nearby subjects. As discussed previously, the radiation frequency of the contactless MCG device is centered about 2.4 GHz. This frequency falls within the Industrial Scientific and Medical (ISM) bands. The ISM bands are recognized internationally, where it has been traditionally reserved for industrial, scientific, and medical purposes excluding communications [16].
The 2.4 GHz ISM band in many urban settings is in fact quite saturated with devices. Examples include the very common wireless local area network (WLAN) devices, Bluetooth devices, microwaves ovens, and household cordless phones. These devices can exhibit relatively high signal broadcast power levels during full power transmission. In the North American/US market, the safe power level is governed by the FCC [16]. As a result, it is possible that other 2.4 GHz, ISM devices operating in the vicinity of measurement could pose undesirable electromagnetic signal interference, particularly when these devices are in-motion. However, most cellular phone devices operate in the Global System for Mobile Communications (GSM) Bands, and thus will not pose electromagnetic interference concerns, in the sense of disturbing the Doppler reading, for the contactless MCG device proposed.
Motion interference is another possible source of signal disruption when operating the device in a high-density, busy setting. The antenna patch on the contactless MCG device is a printed patch antenna and at ranges greater than what is specified operational for this application (i.e., more than 10 cm), its side-lobes begin to pickup motion in its path. Also the main-lobe of the antenna begins to exhibit relatively wide angle. In attempts to acquire useful heart motion signals at longer ranges, more than 10 cm, the motion interference from the subject’s general body movement or nearby movements that are not subject-related will both disrupt the heart motion signal acquisition greatly.
In efforts to evaluate the reliability of this device considering the two major sources of interference, in addition to the measurements at Burnaby General Hospital, as explained previously, measurements on 200-plus participants during the Wired NextFest convention were obtained [17]. The environment of the convention hall naturally provided many possible sources of both electromagnetic interference and motion interference. In fact, the convention hosted more than 150 stations, many equipped with audio-video setup, wireless network stations, and up to thousands of visitors at any given moment, likely each carrying some sort of personal mobile device.
The heart motion measurements were compared simultaneously with the corresponding heart beat of each individual participant as assessed via wrist pulse by research staff members. It was observed that when the subject held still, and without other people within 50 cm of the device radius, approximately only one out of ten subjects during 30 second recording session would exhibit grossly delayed or out-of-sync heart rates between the wrist pulse and device reading.
Although it is unknown how many wireless broadcasting devices, using the 2.4 GHz band, were present during the convention, nor the associated power levels, and hence the random interference power density in the foot-ball sized convention hall, the quasi field-test of the device provided assurance that even in the busiest everyday environments, filled with urban electronics and random motion, when the subject recordings are controlled properly, the reliability of the heart rate detection is seemingly good.
Further testing on the effects of both electromagnetic and motion interference is necessary to fully assess the performance of the proposed contactless MCG device. Though, it suffices to say that the observations through the combined evaluations and field-trials give high-hopes on the performance and for the eventual perfection of this device.
5. Conclusion
In this research work, the MCG signal was extracted from the radar-based MCG device and by using two other heart related signals, BCG and phonocardiograph, it has been proven that the extracted MCG signal corresponds to the mechanical functioning of the heart.
Two physiological signals, heart rate and respiration rate, were measured using the MCG signal and a noticeable accuracy of 91.35% for respiration rate, and 92.9% for heart rate were achieved. It should be noticed that these results are acquired from the first generation of our device, and the accuracy of the detection can be improved by focused targeting of the MCG device on the sternum and further hardware improvements. Another important factor, which is an asset of our device, is the fact that all the electronics and the radar sensor can be fabricated for less than $200 USD which makes our device economical for general heart monitoring purposes.
Considering the short amount of processing and the low cost of the contactless measurement of heart rate and breathing rate as we presented, our device can have numerous applications in the health care system such as, prevention of sudden infant death syndrome (SIDS), sleep apnea, and other areas in which contactless monitoring is desired.
In this research work, we have proposed a new methodology and a new device based on radar technology. We proved the correspondence of our acquired MCG signal to sternal BCG and phonocardiograph signals. Further improvement of the current device can provide us with more accurate MCG signal corresponding to mechanical performance of the heart and ultimately development of an additional contactless heart diagnostic tool.
Acknowledgments
The authors would like to thank Burnaby General Hospital for providing them with subjects and the research environment and also Brandon Ngai, Brent Carmichael, and Tim Snider for their support during signal acquisition experiments.
References
1. I. Starr and E. C. Wood, “Twenty-year studies with the ballistocardiograph. The relation between the amplitude of the first record of “Health” adults and eventual mortality and morbidity form heart disease,” Circulation, vol. 23, no. 5, pp. 714–732, 1961.
2. I. Starr, “Prognostic value of ballistocardiograph,” Journal of American Medical Association, vol. 187, no. 7, pp. 511–517, 1964.
3. J. L. Nickerson, G. H. Humphreys, R. A. Deterling, and T. C. Fleming, “Diagnosis of coarctation of the aorta with the aid of the low frequency, critically damped ballistocardiograph,” Circulation, vol. 1, no. 4, pp. 1032–1036, 1950.
4. B. Phibbs, C. R. Lowe, and R. W. Holmes, “The ultra low frequency force ballistocardiograph in acute cardiomyopathy,” Circulation, vol. 36, no. 1, pp. 92–100, 1967.
5. B. H. Jensen, B. H. Larsen, and K. Shankar, “Monitoring of the ballistocardiogram with the static charge sensitive bed,” IEEE Transaction on Biomedical Engineering, vol. 38, no. 8, pp. 748–751, 1991. View at Publisher · View at Google Scholar
6. S. Junnila, A. Akhbardeh, L. C. Barna, I. Defee, and A. Värri, “A wireless ballistocardiographic chair,” in Proceedings of the 28th IEEE Annual International Conference on Engineering in Medicine and Biology Society (EMBS '06), pp. 5932–5935, New York, NY, USA, August-September 2006. View at Publisher · View at Google Scholar · View at PubMed
7. W. Dock, H. Mandelbaum, and R. Mandelbaum, Ballistocardiography: The Application of the Direct Ballistocardiograph to Clinical Medicine, Mosby, St. Louis, Mo, USA, 1953.
8. B. Kaminska, K. Tavakolian, B. Ngai, Y. Chuo, A. Vaseghi, and B. Carmichael, “Prevention and risk reduction in heart health,” in Proceedings of the Nanotechnology Conference and Trade Show (Nanotech '07), vol. 2, pp. 531–534, Santa Clara, Calif, USA, May 2007.
9. W. P. S. McKay, P. H. Gregson, B. W. S. McKay, and J. Militzer, “Sternal acceleration ballistocardiography and arterial pressure wave analysis to determine stroke volume,” Clinical and Investigative Medicine, vol. 22, no. 1, pp. 4–14, 1999.
10. Y. Chuo and B. Kaminska, “Multiparameter single locus integrated multilayer polymer microsensor system,” in Proceedings of the International Conference on Biomedical Electronics and Devices (BIODEVICES '08), Funchal, Portugal, January 2008.
11. F. M. Zadeh, F. Taghibakhsh, and B. Kaminska, “Contactless heart monitoring,” in Proceedings of the Canadian Conference on Electrical and Computer Engineering (CCECE '07), pp. 583–585, Vancouver, BC, Canada, April 2007.
12. K. Mohri, T. Jinnouchi, and K. Kawano, “Accurate mechanocardiogram sensors using amorphous star-shaped core multivibrator combined with a magnet,” IEEE Transactions on Magnetics, vol. 23, no. 5, pp. 2212–2214, 1987. View at Publisher · View at Google Scholar
13. “Biopac biological signal acquisition systems,” http:// www.biopac.com/.
14. September 2007, http:// www.scientificamerican.com/.
15. December 2007, http://www.icnirp.de/.
16. January 2008, http://www.fcc.gov/.
17. December 2007, http://www.wirednextfest.com/.
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T08:13:24.000Z
|
vuvn4qgeicjwanapyrliyz6hw4ftgmjb
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8374",
"uncompressed_offset": 510063403,
"url": "www.isfdb.org/cgi-bin/title.cgi",
"warc_date": "2013-11-22T14:55:26.000Z",
"warc_filename": "<urn:uuid:00f730d0-e727-4c6d-968b-f0ca37218a52>",
"warc_url": "http://www.isfdb.org/cgi-bin/title.cgi?1455914"
}
|
cccc_CC-MAIN-2013-20
|
Bibliography: Cover: A Espada do Lictor
You are not logged in. If you create a free account and sign in, you will be able to customize what is displayed.
Title: Cover: A Espada do Lictor
Author: Tim White
Year: 1985
Variant Title of: Cover: Hawk of May (by Tim White ) [may list more publications, awards and reviews]
Type: COVERART
ISFDB Record Number: 1455914
User Rating: This title has fewer than 5 votes. VOTE
Current Tags: None
Publications:
Copyright (c) 1995-2011 Al von Ruff.
ISFDB Engine - Version 4.00 (04/24/06)
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T05:25:21.000Z
|
pcwsdkzt3pcqm67ttu6rzmzsnqixmyok
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8380",
"uncompressed_offset": 609023451,
"url": "www.omnilexica.com/?q=stilboestrol",
"warc_date": "2013-11-22T14:55:26.000Z",
"warc_filename": "<urn:uuid:00f730d0-e727-4c6d-968b-f0ca37218a52>",
"warc_url": "http://www.omnilexica.com/?q=stilboestrol"
}
|
cccc_CC-MAIN-2013-20
|
Omnilexica
Search in all dictionaries at once!
Spelling. Are you looking for stilbestrol?
Stilboestrol
Definition of Stilboestrol
What does Stilboestrol mean?
noun
1. a potent estrogen used in medicine and in feed for livestock and poultry
Printed dictionaries and other books with definitions about Stilboestrol
Click on a title to look inside that book (if available):
Undergraduate Surgery
by A.K. Nan
Stilboestrol is the dnvg most commonly used. The dose ...
Close
The Fetal Matrix: Evolution, Development and Disease (2005)
by Peter Gluckman, Mark Hanson
For example, stilboestrol is a synthetic form of oestrogen that was tried in the 1960s as a treatment for recurrent miscarriage. It can be safely used as a replacement oestrogen in non-pregnant adult women but if a female fetus is exposed to it, ...
Close
The Chambers Dictionary (1998)
by Allied Chambers
stilbestrol See stilboestrol. stilbite slil' bit, n a pearly zeolite. [ Gr stilbein to shine] stilboestrol or (US) stilbestrol stil-bes'irsl,na synthetic oestrogen. [Gr slilbos glistening and oestrus] stile1 stil, n a step, or set of steps, built into ...
Close
Concise Dictionary of Pharmacological Agents (1999)
Properties and Synonyms by Dr. Ian Morton, Ian K. M. Morton, Judith M. Hall, Dr. Judith Hall
tsan ANTHELMINTIC stilbestrol diphosphate - fosrestrol Stilboestrol [BAN) ( diethylstilbestrol IINN.USAN); DES...
Close
Lewisʼ Dictionary of Toxicology (1998)
by Robert Alan Lewis
stilboestrol. diethylstilbestrol.
Close
Encyclopedia of Toxicology (2005)
by Bruce Anderson, Ann de Peyster, Shayne C. Gad, P.J. Bert Hakkinen, Michael Kamrin, Betty Locey, Harihara M. Mehendale, Carey Pope, Lee Shugart
resveratrol 2:252 Stilbestrolsee Diethylstilbestrol StilbetinseeDiethylstilbestrol Stilboestroform see Diethylstilbestrol Stilboestrol see Diethylstilbestrol Stilboffral see Diethylstilbestrol Stilkapsee Diethylstilbestrol Stillomicinsee Puromicin Stilrol ...
Close
Chembers 21 Century Dictionary
by Allied
stilboestrol or -.
Close
Online dictionaries and encyclopedias about Stilboestrol
Click on a label to prioritize search results according to that topic:
Loading...
Share this page
On this page: Books Web Share
Content is available under the Creative Commons Attribution/Share-Alike License; additional terms may apply. See Copyright for details.
Privacy Policy
Keyword Tool | Romanian-English Dictionary
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T07:21:32.000Z
|
gejqpyxpcut4yhl4oxtivzvoej2gre23
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8386",
"uncompressed_offset": 617167820,
"url": "www.panarmenian.net/eng/news/143323/",
"warc_date": "2013-11-22T14:55:26.000Z",
"warc_filename": "<urn:uuid:00f730d0-e727-4c6d-968b-f0ca37218a52>",
"warc_url": "http://www.panarmenian.net/eng/news/143323/"
}
|
cccc_CC-MAIN-2013-20
|
UN: over 700,000 Syrian refugees registered in neighboring countries
PanARMENIAN.Net - More than 700,000 Syrian refugees have registered in neighboring countries or await processing there, and aid workers are struggling to keep up with the exodus, the United Nations said on Tuesday, Jan 29, according to Reuters.
"We have seen an unrelenting flow of refugees across all borders. We are running double shifts to register people," Sybella Wilkes, spokeswoman for the UN High Commissioner for Refugees (UNHCR), said in Geneva.
Jordan hosts 167,444 registered Syrian refugees, as well as 51,729 who await processing, many of who fled fighting around Deraa, according to UNHCR figures posted overnight that show an overall regional total of about 705,000 refugees as of January 27.
"We are trying to clear a backlog of people because the numbers have gone up so dramatically (in Jordan and Lebanon)," Wilkes said.
Lebanon has 157,139 Syrian refugees, as well as nearly 69,000 who await processing. "The needs are enormous, we can't get to everyone fast enough," Wilkes quoted Ninette Kelley, UNHCR representative in Lebanon, as saying on Tuesday.
Turkey has 163,161 Syrian refugees in its 15 camps while Iraq hosts 77,415. There are 14,312 in Egypt and 5,417 registered across the rest of North Africa, the agency said.
Partner news
Top stories
Jorge Rafael Videla, an austere former army commander, led Argentina during the bloodiest days of its Dirty War dictatorship.
According to the United Nations, April was Iraq's bloodiest month for almost five years, with 712 people killed.
Reports suggest the rebel fighters may have tried to blow up the walls of the prison, which holds some 4,000 inmates.
Moscow has condemned other nations for supporting rebel forces and failing to condemn what it describes as terrorist attacks on the Syrian regime.
Partner news
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T07:25:29.000Z
|
vrt6hwthrdsxraiw7t4a3uaptnsdrgtp
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8388",
"uncompressed_offset": 637918271,
"url": "www.progressive-charlestown.com/2012/01/study-says-led-lights-can-disrupt-sleep.html",
"warc_date": "2013-11-22T14:55:26.000Z",
"warc_filename": "<urn:uuid:00f730d0-e727-4c6d-968b-f0ca37218a52>",
"warc_url": "http://www.progressive-charlestown.com/2012/01/study-says-led-lights-can-disrupt-sleep.html"
}
|
cccc_CC-MAIN-2013-20
|
Menu Bar
Home Calendar Topics Just Charlestown About Us
Monday, January 16, 2012
Study says LED lights can disrupt sleep
Light At Night Not A 'Bright' Idea
From: Avigayil Kadesh, NoCamels
Moonlight and starlight aren't just romantic, according to a new international study with Israeli input. This natural nighttime light is also healthier than harsh artificial light — especially LED (light-emitting diodes) white light, which suppresses the brain's night time production of Melatonin needed to regulate our biological clocks, behavior and health.
"Light is beneficial, but dark is also beneficial," says Prof. Abraham Haim, head of the Center for Interdisciplinary Chronobiological Research at the University of Haifa.
"We should live in darkness at night, but since early human evolution one of the properties humans wanted to change was the darkness. So we need to ask what type of illumination is less harmful."
That was the goal of the study, recently published in the Journal of Environmental Management by Haim and other researchers using data from astronomers, physicists and biologists at the Light Pollution Science and Technology Institute in Italy and the National Geophysical Data Center in Boulder, Colorado. Haim joined the team about a year ago.
The scientists investigated the effect of different types of outdoor lighting on light pollution and Melatonin, in order to suggest practical steps for balancing productivity, energy expenditure and public health.
Higher wavelength, higher Melatonin
White LED light (which is actually blue light on the spectrum) is emitted at short wavelengths of between 440-500 nanometers. The study showed that this type of light suppresses the body's production of Melatonin five times more than the orange-yellow light given off by traditional high-pressure sodium (HPS) bulbs. Metal halide bulbs, often used for stadium lighting, suppress Melatonin at a rate more than three times greater than the HPS bulb.
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T05:25:18.000Z
|
3c66sg2qwsb346b6t4nkc5nj7bcycik7
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8394",
"uncompressed_offset": 690189821,
"url": "www.sourcewatch.org/index.php/Nick_Lampson",
"warc_date": "2013-11-22T14:55:26.000Z",
"warc_filename": "<urn:uuid:00f730d0-e727-4c6d-968b-f0ca37218a52>",
"warc_url": "http://www.sourcewatch.org/index.php/Nick_Lampson"
}
|
cccc_CC-MAIN-2013-20
|
CMD sent two reporters to track ALEC in Oklahoma
Click here to help support our future investigations.
Nick Lampson
From SourceWatch
Jump to: navigation, search
This is a profile of a U.S. Representative who, due to election loss or retirement, will not return for the 111th Congress. (See the Texas portal for all incumbents, candidates and blogs.)
Things you can do:
Nick Lampson is a former member of Congress
Nick Lampson, a Democrat, represented the Twenty-Second Congressional District of Texas in the U.S. House of Representatives between 2007-2009. He was defeated by Pete Olson (R) in the 2008 general election.
Contents
Record and controversies
General information about important bills and votes for can be found in Congresspedia's articles on legislation. You can add information you find on how Nick Lampson voted by clicking the "[edit]" link to the right and typing it in. Remember to cite your sources!
Iraq War
Lampson voted for the Authorization for Use of Military Force Against Iraq Resolution of 2002 that started the Iraq War.[1]
For more information see the chart of U.S. House of Representatives votes on the Iraq War.
Environmental record
For more information on environmental legislation, see the Energy and Environment Policy Portal
Biography
Early life
A lifelong resident of the oil-producing city of Beaumont, Texas and second-generation Italian-American, Lampson earned his Bachelors Degree in Biology and Masters Degree in Education from Lamar University. In 1976, he was elected property tax assessor for Jefferson County, of which Beaumont is the county seat. He served in that post for 18 years, during which he modernized the office and improved collection rates.
Legislative career
Lampson did not seek a ninth term as tax assessor in 1994, but in 1996 won the Democratic nomination for Texas's Ninth District, which included Beaumont. [1]
Just months into his first term, a family in his district suffered a widely-publicized tragedy. A 12-year-old girl from Friendswood, Texas was abducted and found murdered two weeks later. Lampson was so moved by the family's courage and the caring response of the community in banding together to search for the child, that he established the first-ever Congressional Missing and Exploited Children's Caucus, which now numbers more than 120 members from both parties.
Texas redistricting
Lampson had been reelected three times without serious opposition, but in the 2003 Texas congressional redistricting , House Majority Leader Tom DeLay (R-Texas) orchestrated a controversial, mid-decade effort to get more Republican congressmen elected from Texas and Lampson was one of the targets. His district was renumbered and radically altered. In particular, Galveston, which had been the heart of the district and its previous incarnations for over a century, was removed. In its place, several heavily Republican areas in and around Houston were added to the district.
Lampson's 2004 Republican opponent was Ted Poe, a longtime felony court judge in Harris County, home to most of Houston. Lampson lost to Poe, 43-55%.
Family life
He is married to Susan Floyd Lampson, a special education teacher in Beaumont. The couple has two grown daughters, Stephanie and Hillary.
Health problems
On March 25, 2007 Rep. Lampson, underwent quadrupedal bypass surgery and will remain in the Houston area for 3 to 4 weeks while he recovers. Lampson spokesman Bobby Zafarnia said, "The physicians have indicated that the surgery proceeded well and that Congressman Lampson will make a full recovery". [2]
2006 congressional election
On May 4, 2005, Lampson announced his intentions to run in Texas's 22nd Congressional District (DeLay's district). The 22nd had absorbed several parts of Lampson's former territory, including much of Galveston. DeLay resigned in April 2006 amid several indictments for violating Texas election law in 2002. His name was unable to be replaced on the ballot, and local Republican officials rallied behind Shelley Sekula-Gibbs as their preferred write-in candidate. Texas Governor Rick Perry announced on August 29, 2006, that a special election would take place for the unexpired term of Tom DeLay, coinciding with the general election on November 7, 2006.
Lampson defeated Sekula-Gibbs 52%-42% to win the seat.[2]
2008 elections
2008 superdelegate
This information was gathered by volunteer researchers as part of the Superdelegate Transparency Project on the superdelegates for the 2008 Democratic presidential primary. For more info see the Texas superdelegate tracker or visit the STP homepage.
Before Hillary Clinton conceded the race, Nick Lampson, as a superdelegate, had not endorsed a candidate for President.
For more information and sources, see the state page for this superdelegate linked to in the blue box above.
Money in politics
This section contains links to – and feeds from – money in politics databases. <crpcontribdata>cid=N00005928&cycle=2006</crpcontribdata>
Links to more campaign contribution information for Nick Lampson
from the Center for Responsive Politics' OpenSecrets.org site.
Fundraising profile: 2006 election cycle Career totals
Top contributors by organization/corporation: 2006 election cycle Career totals
Top contributors by industry: 2006 election cycle Career totals
Committees and Affiliations
More Background Data
Contact
DC Office:
436 Cannon HOB
Washington DC 20515
Phone: 202.225.5951
Fax: 202.225.5241
Web Email
Website
District Office
10701 Corporate Dr #118
Stafford TX 77477
Phone: 281.240.3700
Fax: 281.240.2959
Articles and resources
Sources
1. Roll call vote, Authorization for Use of Military Force Against Iraq Resolution of 2002.
2. "Elections 2006," CNN.
3. "Capital Eye: Superdelegates"
External articles
External resources
Local blogs and discussion sites
Corresponding article on Wikipedia and Cause Caller. (If Cause Caller link does not work, pick from its list of senators and representatives.)
Current Office: None
111th Congress
Leadership Position:
Committees Chaired:
Committees,
Ranking Member On:
Caucuses:
Committees:
110th Congress
Leadership Position:
None
Committees Chaired:
House Committee on Science and Technology/Subcommittee on Environment and Energy
Committees,
Ranking Member On:
Caucuses:
Committees: House Committee on Agriculture, House Committee on Agriculture/Subcommittee on Department Operations Oversight Nutrition and Forestry, House Committee on Agriculture/Subcommittee on Livestock Dairy and Poultry, House Committee on Science and Technology, House Committee on Science and Technology/Subcommittee on Energy and Environment, House Committee on Science and Technology/Subcommittee on Space and Aeronautics, House Committee on Transportation and Infrastructure, House Committee on Transportation and Infrastructure/Subcommittee on Aviation, House Committee on Transportation and Infrastructure/Subcommittee on Railroads Pipelines and Hazardous Materials
Congressional Career
First Elected to Current Office:
November 7, 2006
First Took Current Office:
January 4, 2007
Next Election:
none
Term Ends:
Freshman Member?
No
Previous Political Work?
US House of Representatives, Jefferson County Tax Assessor-Collector, Date Re-Elected to the House: November 7, 2006
Other Party Membership: January 3, 2009
District Offices:
1.
Phone: / Fax:
Campaign Contact:
Website:
Webform Email: / Email:
Campaign Offices:
1.
Phone: / Fax:
Zip Code Affiliations:
Misc:
Date of Birth: February 14, 1945
Personal tools
Namespaces
Variants
Actions
Navigation
How To
Other Info
Other Policies
Google AdSense
Toolbox
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T07:19:55.000Z
|
huljfgveucvrsxmnnaieh64ndpaukdlj
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8395",
"uncompressed_offset": 690203572,
"url": "www.sourcewatch.org/index.php/Weapons_of_mass_destruction_investigation",
"warc_date": "2013-11-22T14:55:26.000Z",
"warc_filename": "<urn:uuid:00f730d0-e727-4c6d-968b-f0ca37218a52>",
"warc_url": "http://www.sourcewatch.org/index.php/Weapons_of_mass_destruction_investigation"
}
|
cccc_CC-MAIN-2013-20
|
CMD sent two reporters to track ALEC in Oklahoma
Click here to help support our future investigations.
Weapons of mass destruction investigation
From SourceWatch
Jump to: navigation, search
This article is part of the Center for Media & Democracy's focus on the fallout of nuclear "spin."
See the Countdown Clock to the 9-11 Commission Whitewash by September Eleventh.org.
A so-called weapons of mass destruction investigation is underway, according to a July 2003 article by Robert Dreyfuss -- Could WMD become Bush's Watergate? -- published in the UK's Red Pepper:
Like OJ Simpson looking for his wife's killer, the Pentagon is scouring Iraq for weapons of mass destruction and Iraqi links to al Qaeda. So far, of course, they haven't found any. And some reports claim they've run out of places to look.
But in Washington everybody is looking for a weapon of another kind: a *smoking gun'. Thirty years ago, the smoking gun of Watergate brought down the president.
With at least four separate official bodies conducting investigations into whether the George W. Bush/Bush administration distorted or fabricated intelligence that it used to justify the war in Iraq, it's at least an even bet that the scandal over Iraq's missing weapons of mass destruction will explode in Bush's face later this year.
John W. Dean, the whistleblower who helped unravel Richard M. Nixon's administration in 1973, is already comparing the current situation to Watergate. And Charles W. Freeman, Jr., a former US ambassador to Saudi Arabia, says this scandal is far worse. 'Watergate was an interference with the electoral process,' Freeman says. 'But this involves systematic deception, prevarication and lies in matters of national security.'
At the heart of the matter is a tiny but very powerful team of intelligence people who took root at the Pentagon's Office of Special Plans (OSP). Started as a two-person shop in October 2001, the OSP swelled to 18 under the leadership of Abram Shulsky, a hard-line neo-conservative strategist with close ties to the hawks in the Bush administration.
Operating in utter secrecy, the unit took intelligence developed by the CIA, the DIA and other bodies, blended it with information generated by Ahmed Chalabi's unreliable Iraqi National Congress, and produced intelligence bits and pieces that guided statements by leading administration officials.
So far the scandal has barely hit the political register, however. Polls continue to show that Americans aren't concerned that the Pentagon has failed to uncover WMD in Iraq. And most of the Democratic candidates for president have skittered away from the issue. 'I don't think the failure to find WMD is going to resonate with the US people,' says the campaign manager for one of the Democrats' leading presidential hopefuls.
But that could change quickly. The CIA has brought back four retired officials, led by former CIA deputy director Richard Kerr, to examine the agency's pre-war intelligence and reporting on Iraq. The intelligence committees of both the House of Representatives and the Senate plan to hold inquiries. And Brent Scowcroft, chairman of the President's Foreign Intelligence Advisory Board (PFIAB), is conducting an investigation of his own.
How likely are these investigations to pinpoint evidence that Bush, defence secretary Donald H. Rumsfeld, and vice president Dick Cheney either lied or willfully manipulated intelligence to stampede US opinion into supporting their crusade against Iraq? Let's take them one by one.
The CIA investigation will focus on last October's National Intelligence Estimate, which concluded: 'Baghdad has chemical and biological weapons as well as missiles with ranges in excess of United Nations restrictions. If left unchecked, it will probably have a nuclear weapon during this decade.'
According to The Washington Post, which obtained a still-secret portion of the estimate, the back-up material was far more inconclusive and filled with cautionary notes. The back-up data is developed by mid-level analysts, but the conclusions at the top are prepared by far more senior officials close to CIA director George J. Tenet. The latter is a highly political director, who midway into the build-up to war with Iraq decisively cast his lot in with the Pentagon hawks.
Within the CIA, there is enormous anger about what many agency analysts see as deliberate distortion of their carefully reasoned work product. Some former CIA officials who keep ties with people inside the agency have formed an organisation called Veteran Intelligence Professionals for Sanity (VIPS) to protest against the Pentagon's distortion of intelligence on Iraq.
According to Raymond McGovern, the CIA veteran who founded Vips, Tenet originally tried to resist enormous pressure from Bush, Cheney and deputy defence secretary Paul Dundes Wolfowitz to come up with information to justify war with Iraq. 'But when Tenet sat like a potted plant behind Colin L. Powell at the United Nations Security Council [in February], that was the cave-in.'
Still, the CIA's inquiry will remain secret. Besides, observers say that the individuals conducting the investigation are probably unwilling to accuse the administration of deception or lying anyway.
In Congress some Democrats are pushing hard for a broad investigation. But because the Republicans control both the House and the Senate, and thus both intelligence committees, a full-scale investigation has already been ruled out in favour of a few closed-door hearings.
More promisingly, however, the congressional inquiries have asked for a list of statements made by senior US officials, with back-up intelligence attached to support each statement.
The flat-out, alarmist statements from Bush, Cheney and Rumsfeld will provide grist for the mill. As long ago as August 2002, in the speech that kicked off the US campaign against Iraq, Cheney told a meeting of the US Veterans of Foreign Wars: 'There is no doubt that Saddam Hussein now has weapons of mass destruction.' The relevant back-up document for this speech, which will almost certainly reveal glaring contradictions between official pronouncements and the underlying intelligence, will also remain classified. But there's no doubt that it will be leaked to reporters.
Several members of Congress, all Democrats, continue to pound the issue. Californian Representative Henry A. Waxman has been demanding answers on WMD in a series of angry epistles sent to Rumsfeld. But the war's most outspoken opponent has been West Virginian Senator Robert Byrd, who at 85 is the oldest Democrat in Congress. In a letter to the president last week, Byrd wondered if the WMD claims were 'a manufactured excuse by an administration eager to seize a country'. He added: 'We need a thorough, open, gloves-off investigation of this matter, and we need it quickly.'
Finally, there is the Scowcroft investigation, which could be the most significant of them all. Last August, Scowcroft came out forcefully against the war. As PFIAB chairman he has the power to take a wide-ranging look at the White House and at intelligence across various agencies. But a former State Department official with CIA connections questions whether Scowcroft has the fortitude for such an investigation: 'You almost have to be a junkyard dog,' he says. 'Scowcroft is an establishment voice. So the question is: "How hard will he fight? How far will he go?"'
Driving the inquiry process is the anger, bordering on outrage, among many CIA officials who feel that their intelligence conclusions were distorted by the hawks, including the OSP, Rumsfeld, and Cheney. (Scrambling to defend Bush against charges of deception, The Wall Street Journal noted alarmingly that the CIA has joined the not-so-loyal opposition. 'Within the US,' the paper editorialised on 2 June, 'the role of the French and the European left is being played by elements of the intelligence community.')
Even if the four investigations stall, it's certain that intelligence officials will leak reams of material to the media. The Washington Post's veteran intelligence reporter Walter Pincus says that he expects there to be a 'feeding frenzy' over the WMD scandal this summer.
Already, the media are producing a steady stream of articles undermining the administration's WMD and Iraq-al-Qaeda arguments. The New York Times revealed that the two trailers found in Iraq may have had nothing to do with biological weapons at all.
The Times also reported that al-Qaeda captives have been telling interrogators for many months that Iraq had no truck with Osama bin Laden. The forgery of the papers claiming that Iraq sought uranium for weapons in Niger is being widely investigated by the media. And there are more and more reports of intelligence agency warnings that Iraq's WMD threat was minor or non-existent. Most damning is a DIA report issued last fall that said there was 'no reliable information on whether Iraq is producing or stockpiling chemical weapons or [on whether it] will establish chemical production facilities'.
All of this has led Jane Harman, a moderate Democrat who is the second-ranking member of the House intelligence committee, to raise the possibility that the threat of WMD was a 'hoax', and to pledge to 'review the pre-war intelligence case and the portrayal of intelligence by proponents of military action in Iraq'.
Of course, it's possible that the investigations will run aground, especially if they concentrate on the complex and varied estimates produced by the agencies and fail to focus on the distortion factory in Shulsky's OSP. 'The real issue is Shulsky,' says one former US official. 'They'll want to look at the intelligence output. But what they've got to do is look at what got into the president's in-box.' If that happens, and if the media continue their drumbeat of exposes, then it's very possible that by this fall the scandal will have left the arcane realm of the intelligence world and entered the rough and tumble world of politics.
Then, the question won't be (as it was in Watergate): 'What did the president know, and when did he know it?' Bush, a know-nothing president, apparently had neither the interest nor the intellectual capacity to question the information he was receiving. The question will be: 'What did the president not know, and when didn't he know it?'
• Robert Dreyfuss is a senior correspondent for The American Prospect and a Mother Jones contributing writer.
MSNBC staff and news service reports contributed to the May 17, 2004, headliner "Powell: Prewar intel on Iraq labs was 'inaccurate'. Some information said 'deliberately' misleading."
"Secretary of State Colin Powell says the CIA was wrong about the presence of mobile biological weapons labs in Iraq before the invasion by U.S.-led coalition forces last year."
Powell said that his "February 2003 speech to the United Nations" was based "'the best information that the Central Intelligence Agency made available to me. ... In the case of the mobile trucks and trains, there was multiple sourcing for that. Unfortunately, that multiple sourcing over time has turned out to be not accurate.'
"Powell continued: 'At the time that I made the presentation, it reflected the collective judgment, the sound judgment of the intelligence community. But it turned out that the sourcing was inaccurate and wrong and, in some cases, deliberately misleading.'"
MSNBC also reports that "Current and former U.S. officials, including David Kay, the former chief weapons inspector in Iraq, have said that most of the evidence came from an Iraqi defector code-named 'Curveball.'
"According to newspaper accounts, U.S. officials didn't know the defector's name until after the war, when they learned that he was a brother of one of the top aides of Ahmad Chalabi, the Iraqi exile who was an important advocate for the U.S. invasion of Iraq."
Also see David E. Sanger, "Powell Says C.I.A. Was Misled About Weapons," New York Times, May 17, 2004.
SourceWatch Resources
External links
• 12 June 2003: "C.I.A. Chief Takes Blame in Assertion on Iraqi Uranium" by David E. Sanger and James Rise, The New York Times: "Although Mr. Tenet's statement did not say he had personally cleared the speech, he said in his statement, 'I am responsible for the approval process in my agency.'"
• CEIP resources on Iraq Intelligence
Clinton administration and WMD
Investigation Status "Reports"
• 10 September 2003: "The Stench, Two Years On" by Maureen Farrell, BuzzFlash. Comprehensive overview, with links, of the "facts" ... what we know and what we know that we don't know.
• 31 October 2003: "Senate Faults White House Over Iraq Documents" by Tabassum Zakaria, Reuters: "The Republican chairman of the Senate Intelligence Committee singled out the White House for failing to meet a noon EST deadline on Friday to turn over documents about intelligence on Iraq's weapons of mass destruction used to justify the U.S. invasion."
• 31 October 2003: "Bush Officials Vow Iraq Probe Cooperation" by Ken Guggenheim, AP.
• 31 October 2003: "Analysts Made Accurate Iraq War Estimates" by Matt Kelley, AP: "Months before the U.S.-led war in Iraq, independent and congressional analysts made remarkably accurate predictions of the costs of a post-war occupation, even as the Pentagon refused to do so, or gave very low estimates. ... The discrepancy is gaining new attention with lawmakers complaining of the costs as they approve the president's request for $87 billion to occupy and rebuild Iraq."
• November 2003: "The War in Iraq: An Intelligence Failure?" by Shlomo Brom, Jaffee Center for Strategic Studies, Tel Aviv University: "Many months have passed since the conclusion of the war in Iraq, and despite intensive searching, no evidence of the existence of surface-to-surface missiles (SSM) or weapons of mass destruction (WMD) in Iraq, prohibited by resolutions of the UN, has been found. Likewise, no convincing evidence has been uncovered that projects to develop and produce such weapons were resumed after the suspension of UN inspections in 1998."
• 2 November 2003: "Bush Agrees to Furnish Iraq Intelligence" by William C. Mann, AP.
• 12 November 2003: "Bush's Unreliable Intelligence" by David Corn, The Nation.
• 20 November 2003: "Neocons Leak Bad Intelligence" by Jim Lobe, AlterNet: "The leak of a secret memorandum written by a senior Pentagon official reveals less about the connection between Saddam and al Qaeda than the growing desperation of neo-conservative hawks in the Bush administration." [See Weekly Standard "Case Closed" article below.]
• 24 November 2003 (Issue): "Case Closed" by Stephen F. Hayes, Weekly Standard: "The U.S. government's secret memo detailing cooperation between Saddam Hussein and Osama bin Laden."
• 5 December 2003: "Ex-General Says Israel Inflated Iraqi Threat" by Laura King, Los Angeles Times: "A former senior Israeli military intelligence official asserted Thursday that the nation's spy agencies were a 'full partner' to the United States and Britain in producing flawed prewar assessments of Iraq's ability to mount attacks with weapons of mass destruction."
• 7 December 2003: "Card Dismisses Questions Over Prewar Intelligence as 'moot'" by Scott Lindlaw, AP: "President Bush's chief of staff (Andrew Card) dismissed as 'a moot point' any lingering question about whether Bush relied on faulty intelligence to justify the invasion of Iraq."
• 8 December 2003: "Secrets And Spies" by Robert Dreyfuss, TomPaine: "Calling all spooks and spies. If you want to help Congress get to the bottom of the scandal over Iraq intelligence, now's your chance. Later this week, a key member of Congress will issue an all-points call for intelligence analysts to blow the whistle on President Bush, Vice President Cheney and others in the Bush administration who may have distorted, exaggerated, manipulated or lied about intelligence on Iraq in the run up to war."
• 9 December 2003: "Britain and US Pressed on Iraq Arms Hunt," AFP.
• 9 December 2003: "Editorial: 'Moot point'/Andrew Card goes over the line", Star Tribune: "Such an innocuous phrase, moot point, but it is breathtaking in its significance and damnably outrageous of Card to use it."
• 12 December 2003: "Lawmakers Slam White House for Failing to Monitor Iraqi Weapons Scientists", AFP.
• 17 December 2003: "Still No Mass Weapons, No Ties To 9/11, No Truth" by Derrick Z. Jackson, Boston Globe: "THE INVASION was still a lie. The capture of Saddam Hussein changes nothing about that. There were too many forked tongues in the road to his lair. The way we removed the dictator, we became a global dictatorship."
• 17 December 2003: "Dubious Link Between Atta and Saddam. A document tying the Iraqi leader with the 9/11 terrorist is probably fake" by Michael Isikoff and Mark Hosenball, Newsweek at MSNBC.com: "A widely publicized Iraqi document that purports to show that September 11 hijacker Mohammed Atta visited Baghdad in the summer of 2001 is probably a fabrication that is contradicted by U.S. law-enforcement records showing Atta was staying at cheap motels and apartments in the United States when the trip presumably would have taken place, according to U.S. law enforcement officials and FBI documents."
• 18 December 2003: "Remember 'Weapons of Mass Destruction'? For Bush, They Are a Nonissue by Richard W. Stevenson, New York Times.
• 19 December 2003: "Rumsfeld Visited Baghdad in 1984 to Reassure Iraqis, Documents Show. Trip Followed Criticism Of Chemical Arms' Use" by Dana Priest, Washington Post: "Donald H. Rumsfeld went to Baghdad in March 1984 with instructions to deliver a private message about weapons of mass destruction: that the United States' public criticism of Iraq for using chemical weapons would not derail Washington's attempts to forge a better relationship, according to newly declassified documents. ... then President Ronald Reagan's special Middle East envoy, was urged to tell Iraqi Foreign Minister Tariq Aziz that the U.S. statement on chemical weapons, or CW, 'was made strictly out of our strong opposition to the use of lethal and incapacitating CW, wherever it occurs,' according to a cable to Rumsfeld from then-Secretary of State George P. Shultz."
• 23 December 2003: "Post-Emptive Proof. Right weapons. Wrong country. No matter?," motherjones.
• 23 December 2003: "Rumsfeld Made Iraq Overture in '84 Despite Chemical Raids" by Christopher Marquis, New York Times: "As a special envoy for the Ronald Reagan administration in 1984, Donald H. Rumsfeld, now the defense secretary, traveled to Iraq to persuade officials there that the United States was eager to improve ties with President Saddam Hussein despite his use of chemical weapons, newly declassified documents show. ... Mr. Rumsfeld, who ran a pharmaceutical company at the time, was tapped by Secretary of State George P. Shultz to reinforce a message that a recent move to condemn Iraq's use of chemical weapons was strictly in principle and that America's priority was to prevent an Iranian victory in the Iran-Iraq war and to improve bilateral ties. ... During that war, the United States secretly provided Iraq with combat planning assistance, even after Mr. Hussein's use of chemical weapons was widely known. The highly classified program involved more than 60 officers of the Defense Intelligence Agency, who shared intelligence on Iranian deployments, bomb-damage assessments and other crucial information with Iraq. ... The disclosures round out a picture of American outreach to the Iraqi government, even as the United States professed to be neutral in the eight-year war, and suggests a private nonchalance toward Mr. Hussein's use of chemicals in warfare. Mr. Rumsfeld and other Bush administration officials have cited Iraq's use of poisonous gas as a main reason for ousting Mr. Hussein."
• 23 December 2003: "Video Clip of 'When Donald met Saddam', informationclearinghouse. Requires Windows Media Player.
• 28 December 2003: "Confirmed: UK sexed up WMDs," Times of India: "The British government has confirmed that MI6 had organised Operation Mass Appeal, a campaign to plant stories in the media about Saddam Hussein's weapons of mass destruction."
• 7 January 2004: "Iraq's Arsenal Was Only on Paper. Since Gulf War, Nonconventional Weapons Never Got Past the Planning Stage" by Barton Gellman, Washington Post: "But investigators have found no support for the two main fears expressed in London and Washington before the war: that Iraq had a hidden arsenal of old weapons and built advanced programs for new ones. In public statements and unauthorized interviews, investigators said they have discovered no work on former germ-warfare agents such as anthrax bacteria, and no work on a new designer pathogen -- combining pox virus and snake venom -- that led U.S. scientists on a highly classified hunt for several months. The investigators assess that Iraq did not, as charged in London and Washington, resume production of its most lethal nerve agent, VX, or learn to make it last longer in storage. And they have found the former nuclear weapons program, described as a 'grave and gathering danger' by President Bush and a 'mortal threat' by Vice President Cheney, in much the same shattered state left by U.N. inspectors in the 1990s."
• 9 January 2004: "Powell Admits No Hard Proof in Linking Iraq to Al Qaeda" by Christopher Marquis, New York Times: "Secretary of State Colin L. Powell conceded Thursday that despite his assertions to the United Nations last year, he had no 'smoking gun' proof of a link between the government of Iraqi President Saddam Hussein and terrorists of Al Qaeda. ... 'I have not seen smoking-gun, concrete evidence about the connection,' Mr. Powell said, in response to a question at a news conference. 'But I think the possibility of such connections did exist, and it was prudent to consider them at the time that we did.'"
• 9 January 2004/Also here: "New WMD Report Slams Bush White House" by Jim Lobe, Inter Press Service: "In a 107-page report released Thursday, Jessica Tuchman Mathews, Joseph Cirincione and George Perkovich of the Washington-based Carnegie Endowment for International Peace (CEIP) call for the creation of an independent commission to fully investigate what the U.S. intelligence community knew, or believed it knew, about the true state of Iraq's WMD program between 1991 and 2003."
• 23 January 2004: "Inspector Says WMD Are Vaporware," Reuters: "David Kay stepped down as leader of the U.S. hunt for banned weapons in Iraq on Friday and said he did not believe the country had any large stockpiles of chemical or biological weapons. ... In a direct challenge to the Bush administration, which says its invasion of Iraq was justified by the presence of illicit arms, Kay told Reuters in a telephone interview he had concluded there were no Iraqi stockpiles to be found."
• 26 January 2004: "The Lie Factory" by Robert Dreyfuss and Jason Vest, Mother Jones. Extremely comprehensive article, including details leading up to the invasion of Iraq, personnel involved, and, in particular, the Office of Special Plans.
• 1 February 2004: "Intelligence on the Eve of War," New York Times Op-Ed: "Yet there are reasons to go slow in accepting Mr. Kay's version as the full story of what happened in this intelligence debacle. Only a broad and truly independent investigation can unravel the roots of this colossal failure. ... Without doubt the most important intelligence document leading up to the invasion was a National Intelligence Estimate hastily assembled and presented to Congress shortly before the vote on a resolution authorizing the use of force in Iraq. This document contended that Iraq had chemical and biological weapons in hand, as well as active programs to enhance its capabilities in all areas. ... This pivotal analysis is striking for the way it minimizes dissenting views on Iraq's capabilities."
• 9 February 2004: "WMD Lies Spinning Out of Control" by Jim Hightower, AlterNet: "After months of scouring Iraq to find WMDs, Bush's own chief weapons hunter has resigned, declaring that he doesn't think they existed. So - spin, spin, spin - the new line is that well, OK, Saddam didn't actually have the weapons, but he was well on his way to making them. George himself, in his state-of-the-union dance, used this new spin referring to 'weapons-of-mass-destruction-related-program-activities." Never has a president used so many hyphens in a single phrase!"
• 10 February 2004: "Setting the record straight. Time to draw a line against the rewriting of history" by Molly Ivins, Working for Change: "According to the 500-man American team that spent hundreds of millions of dollars looking for Iraqi weapons of mass destruction, there aren't any and have not been any since 1991. ... Before the war, Rumsfeld not only claimed Iraq had WMD but that 'we know where they are.' U.N. inspectors began openly complaining that U.S. tips on WMD were 'garbage upon garbage.' Hans Blix, head of the U.N. inspections team, had 250 inspectors from 60 nations on the ground in Iraq, and the United States thwarted efforts to double the size of his team. You may recall that during this period, the administration repeatedly dismissed the United Nations as incompetent and irrelevant. But containment had worked."
• 26 February 2004: "No Skunks Allowed" by Raymond McGovern, Tom Paine.
• 2 March 2004: "U.N.: Iraq had no WMD after 1994" by Bill Nichols, USA Today.
• 5 March 2004: "Experts Say U.S. Never Spoke to Source of Tip On Bioweapons. Information From Iraqi Relayed By Foreign Agency, CIA Notes" by Walter Pincus, Washington Post: "The claims about the mobile facilities remain unverified, however, and now U.S. officials are trying to get access to the Iraqi engineer to verify his story, the sources said, particularly because intelligence officials have discovered that he is related to a senior official in Ahmed Chalabi's Iraqi National Congress, a group of Iraqi exiles who actively encouraged the United States to invade Iraq."
• 23 March 2004: "Welcome to Armageddon. A joint investigation by Salon and Rolling Stone reveals why the Bush administration hasn't found any weapons of mass destruction: It's looking in the wrong place" by Miles Harvey, Salon. A must read for the answer.
Personal tools
Namespaces
Variants
Actions
Navigation
How To
Other Info
Other Policies
Google AdSense
Toolbox
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:57:31.000Z
|
peidibxiwoktcqepx5t2pcn4ik4oxvdl
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8408",
"uncompressed_offset": 775372031,
"url": "www.werelate.org/wiki/Place:Homewood,_Cook,_Illinois,_United_States",
"warc_date": "2013-11-22T14:55:26.000Z",
"warc_filename": "<urn:uuid:00f730d0-e727-4c6d-968b-f0ca37218a52>",
"warc_url": "http://www.werelate.org/wiki/Place:Homewood,_Cook,_Illinois,_United_States"
}
|
cccc_CC-MAIN-2013-20
|
Place:Homewood, Cook, Illinois, United States
Watchers
NameHomewood
TypeVillage
Coordinates41.558°N 87.663°W
Located inCook, Illinois, United States
Contained Places
Cemetery
Homewood Memorial Gardens
source: Getty Thesaurus of Geographic Names
source: Family History Library Catalog
the text in this section is copied from an article in Wikipedia
Homewood is a village in Cook County, Illinois, United States. The population was 19,543 at the 2000 census. Homewood is a sister city to Homewood, Alabama. In 2007, Forbes Magazine rated Homewood as one of the three most "livable" suburbs in the Chicago Metropolitan Area.
History
the text in this section is copied from an article in Wikipedia
Homewood sits on the edge of prehistoric Lake Chicago, which was formed by retreating glaciers long before Lake Michigan. One of the main east-west roads through the town, Ridge Road, runs along the old sandy shoreline of that lake. The area is rich in limestone deposits, and neighbors Thornton Quarry. In its beginning, the area featured excellent topsoil making it an appealing place for farmers to settle.
James and Sally Hart were the first confirmed settlers in the area in 1834. They were New Englanders, as were the families that immediately followed them; the Butterfields, the Campbells, the Clarks, and the Hoods. In 1839, German and Dutch families began to move into the area as well. The town began to use the name of Hartford.
The first store in Homewood was Hasting's General Store; Dr. William Doepp was its first doctor. Attracted by the country life after his Chicago practice was burned down, he moved to the area in 1851. His practice extended from Crown Point, Indiana to New Lenox, Illinois, and he was required to keep two teams of horses in order to make all his calls.
In 1853, the Illinois Central Railroad (IC) established a station in Hartford, calling it Thornton Station, as most of the passengers came from nearby Thornton. This began a serious period of confusion, as mail for the two separate towns was regularly mixed up. In 1869, settlers petitioned the post office to be renamed as Homewood, after the woods that the residents lived among.
The 1870s brought a new era to Homewood, ushered in by trains and by the crowded conditions of the city. country clubs such as the Homewood Country Club (later changed to Flossmoor Country Club), Dixmoor, Ravisloe, Idlewild and Calumet brought in trains just for golfers. The IC established the Calumet station specifically for their convenience. Wealthy families impressed by the area, and ease of getting to the city, established residences in the area, as permanent or summer homes.
At the beginning of the twentieth century, it was determined that the small two-room schoolhouse that had been built in the 1880s was inadequate. The Standard school was built in 1904 on Dixie Highway and Hickory for a cost of fourteen thousand dollars. It had four classrooms, two cloakrooms, a tiny office, attic and basement storage. It provided the community with a variety of entertainments in the form of spelling bees, box socials, school entertainment, and a play festival. As many of the children were expected to become farmers, garden and corn clubs were established. Nearby land was turned into gardening plots, but a dry season kept the project from being successful. However, one student, Elizabeth Szanyi made a total of fifty-nine dollars from her produce patch.
Enrollment for the schools continued to grow, and in 1914 the school was forced to convert the cloakrooms into classrooms. In 1918, a nearby residence, the Zimmer house, was rented to house primary grades. In 1923, construction on Central school began. The new school had three more classrooms, an assembly hall, a teacher's room, and a room for health services. By 1928, there were enough students in the district to make a kindergarten class feasible, and extensive additions were made to the school. These renovations included eight new classrooms and a gymnasium-auditorium.
In the 1920s, Homewood became an important railroad depot, and many IC workers and their families moved to the area. Automobiles became a common sight on the streets of downtown. As traffic in the area continued to increase, village officials decided to install the town's first manually operated traffic signal at the corner of Ridge Road and Dixie Highway. This period marks the change from Homewood as a farming community to Homewood as a suburb, as families began to use stores and businesses to supply their needs. The population of town increased from seven hundred and thirteen (713) to fifteen hundred and ninety-three (1593). Thirteen housing developments were recorded in Homewood from 1905 to 1930.
With the crash of the stock market in 1929, life in Homewood changed dramatically. People who worked in factories in Harvey and Chicago Heights lost their jobs, and many almost lost their homes. The Homewood State Bank was closed in the spring of 1932. Optimistic residents who had invested money in the bank until the day before it closed lost everything they had. The flood of trains to and from the city trickled down to three or four trains daily. Those people trying to make an income by were raided, and shut down. Transients were common, and the police officers gave them a place to stay at night, a cup of coffee and a donut before they left in the morning. In 1932 alone, the jail housed twelve hundred and twenty-four people (1224). The schools, which had already been operating in the red, scraped through by cutting programs and by the determined efforts of the PTA, which opened a thrift shop as a fundraiser. The village was reduced to issuing scrip notes to its employees that could not be honored by local business; however, a rental of a large parcel of land by the Illinois Jockey Association ended this problem.
As the factories slowly began to reopen, the city began to tear down old buildings and replace them with new businesses. The most important of these was the Homewood Theater. At its "typical Hollywood opening" it was said, "bright lights will flood the sky, bands will blare, and the theatre will be officially presented to Mayor Fred Borgwordt of the town of Homewood." The opening picture was Double or Nothing with Bing Crosby and Martha Raye. The theater seemed to symbolize the return of hope to the city, and remained an important landmark for many years. In 1983, Richard Haas painted a mural on the backs of several buildings in the business district, matching their fronts to their backs. Most famous among these was on the back of the Homewood Theater, depicting it with three young women waiting to view It's a Wonderful Life. It was demolished in 1992, despite the comparison made by a local student of "throwing away the Mona Lisa just because the frame is broken."
Research Tips
This page uses content from the English Wikipedia. The original content was at Homewood, Illinois. The list of authors can be seen in the page history. As with WeRelate, the content of Wikipedia is available under the Creative Commons Attribution/Share-Alike License.
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:57:24.000Z
|
hwq6kjo2q5s5saucgqjsutih5qsyhfxq
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8409",
"uncompressed_offset": 775387549,
"url": "www.werelate.org/wiki/Source:Mitchell,_Texas,_United_States._1910_U.S._Census_Population_Schedule",
"warc_date": "2013-11-22T14:55:26.000Z",
"warc_filename": "<urn:uuid:00f730d0-e727-4c6d-968b-f0ca37218a52>",
"warc_url": "http://www.werelate.org/wiki/Source:Mitchell,_Texas,_United_States._1910_U.S._Census_Population_Schedule"
}
|
cccc_CC-MAIN-2013-20
|
Source:Mitchell, Texas, United States. 1910 U.S. Census Population Schedule
Watchers
Source 1910 U.S. Census Population Schedule
Author United States. Bureau of the Census. 13th census, 1910
Coverage
Place Mitchell, Texas, United States
Year range 1910 - 1910
Subject Census records
Publication information
Type Government / Church records
Publisher The National Archives
Date issued 19--?
Place issued Washington [District of Columbia]
Citation
United States. Bureau of the Census. 13th census, 1910. 1910 U.S. Census Population Schedule. (Washington [District of Columbia]: The National Archives, 19--?).
Repositories
Family History Centerhttp://www.familysearch.org/eng/library/fhlcatal..Family history center
General Tips
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T07:14:28.000Z
|
hd5fteu7j56pbeu5w4rcr4cbxggqtcme
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8413",
"uncompressed_offset": 2322018,
"url": "abs.gov.au/AUSSTATS/abs%40.nsf/ProductsbyReleaseDate/746C7E4A230AE58DCA25722E001BFE41",
"warc_date": "2013-11-22T14:52:11.000Z",
"warc_filename": "<urn:uuid:0e2dcba0-ff85-44d7-95d3-d8180f7bae34>",
"warc_url": "http://abs.gov.au/AUSSTATS/abs@.nsf/ProductsbyReleaseDate/746C7E4A230AE58DCA25722E001BFE41?OpenDocument"
}
|
cccc_CC-MAIN-2013-20
|
Australian Bureau of Statistics
Celebrating the International Year of Statistics 2013
ABS Home > Statistics > By Release Date
8663.0 - Real Estate Agents Industry, Australia, 1995-96
Previous ISSUE Released at 11:30 AM (CANBERRA TIME) 10/09/1997
Page tools: Print Page Print All RSS Search this Product
Contains information about the real estate industry. The data include: industry analysis, selected performance ratios, income and expenditure, employment, State information, and selected characteristics about the real estate agents industry.
This publication has been converted from older electronic formats and does not necessarily have the same appearance and functionality as later releases.
© Commonwealth of Australia 2013
Unless otherwise noted, content on this website is licensed under a Creative Commons Attribution 2.5 Australia Licence together with any terms, conditions and exclusions as set out in the website Copyright notice. For permission to do anything beyond the scope of this licence and copyright terms contact us.
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T05:33:48.000Z
|
dthzyhl4uikpfoizxyoflt7l3bblcfji
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8419",
"uncompressed_offset": 10703210,
"url": "answers.onstartups.com/questions/3359/iphone-development-startup",
"warc_date": "2013-11-22T14:52:11.000Z",
"warc_filename": "<urn:uuid:0e2dcba0-ff85-44d7-95d3-d8180f7bae34>",
"warc_url": "http://answers.onstartups.com/questions/3359/iphone-development-startup"
}
|
cccc_CC-MAIN-2013-20
|
Tell me more ×
Answers OnStartups is a question and answer site for entrepreneurs looking to start or run a new business. It's 100% free, no registration required.
I have a business iPhone development proposition to someone who is willing to partner. No pay is offered up front, we would both be sacrificing our time to build something big - the rewards are there for the taking.
To the right candidate or candidates, I will offer a significant share of the companies' profits on this project. I will fully disclose the details of these applications and the share you will receive once I have chosen the right person(s) for my team.
I am open to online collaboration if the right team is formed.
Looking forward to hearing from you.
share|improve this question
2 Answers
[ad] List your project on FairSoftware, that's exactly what it's for.
share|improve this answer
I am interested in developing iPhone applications. Do let me know how we can go from here. I am a software developer in the US and am new to iPhone app development. There is a lot for me to learn in this process and I am eager to kick start this learning and the best way is to be a part of a good product/project development as a contributor.
You may kindly contact me through email at shanky.hwr@gmail.com
Thanks and regards, -Shashank
share|improve this answer
Your Answer
discard
By posting your answer, you agree to the privacy policy and terms of service.
Not the answer you're looking for? Browse other questions tagged or ask your own question.
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:03:19.000Z
|
fr6ned4uynvz4eh67r6ukgbbnil5eym2
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8420",
"uncompressed_offset": 10744884,
"url": "answers.onstartups.com/users/14049/paul-filmer?tab=bounties",
"warc_date": "2013-11-22T14:52:11.000Z",
"warc_filename": "<urn:uuid:0e2dcba0-ff85-44d7-95d3-d8180f7bae34>",
"warc_url": "http://answers.onstartups.com/users/14049/paul-filmer?tab=bounties"
}
|
cccc_CC-MAIN-2013-20
|
770 reputation
19
bio website univexsoftware.com
location Melbourne, Australia
age
visits member for 1 year, 6 months
seen May 13 at 3:15
stats profile views 29
Managing Director of Univex Software - the software development arm of The Univex Group. We create software that runs businesses - accounting systems, point of sale, e-commerce, inventory, and more. As part of the broader Univex Group we supply everything: hardware, software, networks, hosting, and the know-how and responsibility to make it all work together. Our software is used by retailers and wholesalers in Australia and New Zealand.
My passion is running the business - growing it in to something great. We are very small and have a startup like atmosphere, but have been in business over three decades.
0 Active bounties
This user has not participated in any bounties.
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T08:13:21.000Z
|
ma4hq5slwcq5kkv3crqchn7rxlvhq6rm
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8421",
"uncompressed_offset": 10752431,
"url": "answers.onstartups.com/users/218/ronga?page=4&sort=votes&tab=answers",
"warc_date": "2013-11-22T14:52:11.000Z",
"warc_filename": "<urn:uuid:0e2dcba0-ff85-44d7-95d3-d8180f7bae34>",
"warc_url": "http://answers.onstartups.com/users/218/ronga?tab=answers&sort=votes&page=4"
}
|
cccc_CC-MAIN-2013-20
|
2,146 reputation
2818
bio website SellInApp.com
location Tel Aviv, Israel
age 31
visits member for 3 years, 7 months
seen Jan 25 at 6:46
stats profile views 414
I am an entrepreneur, with lots of academic and some real world experience.
These days I am building a new company in the mobile app monetization space.
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:31:44.000Z
|
qk3iqkviq6orfwdbbn4rrelcyoniiyny
|
{
"content_type": "application/xhtml+xml",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8449",
"uncompressed_offset": 53783445,
"url": "cnx.org/content/m44804/latest/content_info",
"warc_date": "2013-11-22T14:52:11.000Z",
"warc_filename": "<urn:uuid:0e2dcba0-ff85-44d7-95d3-d8180f7bae34>",
"warc_url": "http://cnx.org/content/m44804/latest/content_info"
}
|
cccc_CC-MAIN-2013-20
|
Connexions
Sections
You are here: Home » Content » Components of the Blood
About: Components of the Blood
Module by: OpenStax College. E-mail the author
View the content: Components of the Blood
Metadata
Name: Components of the Blood
ID: m44804
Language: English (en)
Summary: By the end of this section, you will be able to:
• List the basic components of the blood
• Compare red and white blood cells
• Describe blood plasma and serum
Subject: Science and Technology
Keywords: blood, blood type, circulatory system, coagulation, plasma, platelet, red blood cell, serum, white blood cell
License: Creative Commons Attribution License CC-BY 3.0
Authors: OpenStax College (info@openstaxcollege.org)
Copyright Holders: Rice University (daniel@openstaxcollege.org)
Maintainers: OpenStax College (info@openstaxcollege.org), Cnx Biology (ryan.s.stickney@gmail.com)
Latest version: 1.3 (history)
First publication date: Aug 23, 2012 3:51 pm -0500
Last revision to module: Apr 10, 2013 3:07 pm -0500
Downloads
PDF: m44804_1.3.pdf PDF file, for viewing content offline and printing. Learn more.
EPUB: m44804_1.3.epub Electronic publication file, for viewing in handheld devices. Learn more.
XML: m44804_1.3.cnxml XML that defines the structure and contents of the module, minus any included media files. Can be reimported in the editing interface. Learn more.
Source Export ZIP: m44804_1.3.zip ZIP containing the module XML plus any included media files. Can be reimported in the editing interface. Learn more.
Version History
Version: 1.3 Apr 10, 2013 3:07 pm -0500 by Cnx Biology
Changes:
Review Questions
Version: 1.2 Mar 6, 2013 9:27 am -0600 by Cnx Biology
Changes:
migration spreadsheet changes
Version: 1.1 Aug 30, 2012 3:10 pm -0500 by Cnx Biology
Changes:
Created module
How to Reuse and Attribute This Content
If you derive a copy of this content using a Connexions account and publish your version, proper attribution of the original work will be automatically done for you.
If you reuse this work elsewhere, in order to comply with the attribution requirements of the license (CC-BY 3.0), you must include
• the authors' names: OpenStax College
• the title of the work: Components of the Blood
• the Connexions URL where the work can be found: http://cnx.org/content/m44804/1.3/
See the citation section below for examples you can copy.
How to Cite and Attribute This Content
The following citation styles comply with the attribution requirements for the license (CC-BY 3.0) of this work:
American Chemical Society (ACS) Style Guide:
OpenStax College. Components of the Blood, Connexions Web site. http://cnx.org/content/m44804/1.3/, Apr 10, 2013.
American Medical Assocation (AMA) Manual of Style:
OpenStax College. Components of the Blood [Connexions Web site]. April 10, 2013. Available at: http://cnx.org/content/m44804/1.3/.
American Psychological Assocation (APA) Publication Manual:
OpenStax College. (2013, April 10). Components of the Blood. Retrieved from the Connexions Web site: http://cnx.org/content/m44804/1.3/
Chicago Manual of Style (Bibliography):
OpenStax College. "Components of the Blood." Connexions. April 10, 2013. http://cnx.org/content/m44804/1.3/.
Chicago Manual of Style (Note):
OpenStax College, "Components of the Blood," Connexions, April 10, 2013, http://cnx.org/content/m44804/1.3/.
Chicago Manual of Style (Reference, in Author-Date style):
OpenStax College. 2013. Components of the Blood. Connexions, April 10, 2013. http://cnx.org/content/m44804/1.3/.
Modern Languages Association (MLA) Style Manual:
OpenStax College. Components of the Blood. Connexions. 10 Apr. 2013 <http://cnx.org/content/m44804/1.3/>.
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T07:12:53.000Z
|
cnbvtzrfzcy3ponbc6zmzddremmdmpoa
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8453",
"uncompressed_offset": 59624873,
"url": "crantastic.org/packages/igraph0/versions/22119",
"warc_date": "2013-11-22T14:52:11.000Z",
"warc_filename": "<urn:uuid:0e2dcba0-ff85-44d7-95d3-d8180f7bae34>",
"warc_url": "http://crantastic.org/packages/igraph0/versions/22119"
}
|
cccc_CC-MAIN-2013-20
|
igraph0 (0.5.5-3)
Network analysis and visualization, old, deprecated package..
http://igraph.sourceforge.net
http://cran.r-project.org/web/packages/igraph0
Network analysis package, old, deprecated version. 'igraph0' is the old version of the igraph package, kept alive temporarily, for compatibility reasons. In this package, vertices and edges are indexed from zero, whereas in 'igraph', starting from version 0.6, they are indexed from one. Please do not use this package for new projects.
Maintainer: Gabor Csardi
Author(s): See AUTHORS file.
License: GPL (>= 2)
Uses: Matrix, RSQLite, digest, graph, rgl
Reverse depends: ARTIVA, bootfs, cccd, CDVine, ddepn, ebdbNet, EpiContactTrace, epoc, fanovaGraph, FrF2, G1DBN, gdistance, ggm, GOSim, gRbase, ISIPTA, linkcomm, mfr, mixOmics, pacose, QuACN, rEMM, SEMID, SteinerNet, structSSI, synbreed, timeordered, tnet, VineCopula
Reverse suggests: cMonkey, editrules, igraphdata, isa2, osmar, raster, RGraphics
Reverse enhances: timeordered
Released 7 months ago.
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T07:12:38.000Z
|
bdjmbkqilllutvahzl34yksj7pibs2zf
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8458",
"uncompressed_offset": 63575614,
"url": "dangerouslyirrelevant.org/2008/02/whither-competi.html",
"warc_date": "2013-11-22T14:52:11.000Z",
"warc_filename": "<urn:uuid:0e2dcba0-ff85-44d7-95d3-d8180f7bae34>",
"warc_url": "http://dangerouslyirrelevant.org/2008/02/whither-competi.html"
}
|
cccc_CC-MAIN-2013-20
|
Whither Competition?
Now, this may seem like I’m contradicting the opinion of the guest blogger last week. However, I’m not referring to the endless pursuit of rankings and grades.
I’m meaning the fantastic things that can happen when competition is used as an instructional tool. I’m meaning having students race to solve puzzles, or sort number cards into Pythagorean triples. I’m meaning getting a wild energy in class, and having students speak up who never said a word before.
In most of the work on social technology I’ve been reading, it’s paired with the word "cooperation". What happened to competition? Why is it so wrong?
This concerns me because mathematics is particularly suited to competition. Some competitions are downright legendary. Solving problems in high-level math competitions can lead to thinking that shatters the hierarchy of intelligences, creating wonderful things I still don’t fully understand.
What’s wrong with students competing to solve an Internet math hunt, or students challenging each to ever-harder problems?
I simply implore technology coordinators: please consider the possibilities competition can offer.
Goodness, it’s been a week already? I feel like I’ve just nicked the surface of this territory. I’ll try to continue with things I couldn’t fit next week at my blog. I’d like to thank everyone for their comments; I learned much more than I ever suspected possible, and I’ll be closely following this blog and others for new developments.
Jason Dyer, Guest Blogger
Leave a Reply
Switch to our mobile site
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T04:55:05.000Z
|
xarubmea4b52wipur3q4ojbhjztgrtkp
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8467",
"uncompressed_offset": 78293239,
"url": "ducknetweb.blogspot.com/2010_09_19_archive.html",
"warc_date": "2013-11-22T14:52:11.000Z",
"warc_filename": "<urn:uuid:0e2dcba0-ff85-44d7-95d3-d8180f7bae34>",
"warc_url": "http://ducknetweb.blogspot.com/2010_09_19_archive.html"
}
|
cccc_CC-MAIN-2013-20
|
92648
Rachel Maddow, Jon Stewart and Stephen Colbert Are Entertainers But More Importantly Provide Avenues of Communication for Americans With Congress To Include A Shot of Reality–Especially Healthcare (Opinion)
When you stop and think about the popularity of the 3 above individuals, they all have one thing in common, they are great communicators, and I like and watch all 3 of them. In today’s society I think I have a lot of company in that respect as well. These folks make sense and are talented enough to break through the walls of deaf ears and at least bring about an awareness in areas that others don’t seem to approach. All of them not only make us laugh, but they also make us think.
These are smart folks too and always include technology and in what they speak of too and the public recognizes this and we very rarely get any of that from our leaders but quite the opposite so much of the time. Anyone in the public eye today is open game for comedy, just goes with the territory, but these folks are not just entertainers, all of them share one commonality with all, they remember they are also citizens and when you watch, that message is clear and alive. All of them relate to reality today and are very much aware of the changing world we live in today, and this is why we like them. Jon Stewart even makes the news over at Fox too.
In my opinion politicians should pay attention to what these folks have to say as the American public is tuned in. All of them are very much to the point on bringing to light the old retired paradigms that live in Congress that need to pack up and go away. All of them are vey much in tune with how technology is affecting our lives today, a big gray area of what I call “nonparticipants” with so many members of Congress and why public opinion today is so low, people see this, even though they may not understand everything themselves, the view is clear.
Take a look and see who some of their guests are on the shows, we see Bill Gates, Eric Schmidt and many more from the technology side of the world today, and those folks certainly see the communication avenue here, otherwise they would not be wasting time, they get it and this drives home the point of why “general digital IT literacy” is needed today for all. You can only have your staff do so much and it’s just like driving a car, sometimes you need to shift for yourself like everyone else does. On the other hand too, people like Erick Schmidt and Bill Gates know the crowd and the awareness all 3 of them command and spend time with all of them to bring about the need for consumer digital awareness and technology. In short you have “smarts” working both sides here which is a good thing compared to hearing about mosques in New York and the other non relative distractions that captivate the news and make for the next OMG story.
Stephen Colbert has coined some new terminology, “proofiness” and it has lead the way for a new book, which I am looking forward to reading as I have been talking about this same item for a couple years with healthcare, those algorithms and what is really going on. Politicians can make all kinds of promises but if they are not in tune with what runs behind the scenes on what makes their promises happen, aka the algorithms, they look illiterate, and one of these 3 will capitalize on this. Mr. Colbert this week had the President of Google on the show and what did they talk about: algorithms.
“Proofiness–The Dark Side of Mathematical Deception”–Created by Those Algorithms–New Book Coming Out Soon
Stephen Colbert Talks to Google CEO Eric Schmidt About Algorithms, Data Mining and the Web
Without first hand knowledge and participation you don’t look too smart out there today, and these folks make a living capitalizing on it, and rightly so. We love them for that. If you go back over the 3 years of the Medical Quack you will find embedded videos from all of them as I felt were relative to current day topics and discussions. I have a couple of my own phrases I used here, like “nonparticipants” so I can speak out and be politically correct and hopefully make a point. I think we need a “Department of Algorithms”
“Department of Algorithms – Do We Need One of These to Regulate Upcoming Laws?
One other great show was with Stephen Colbert taking on technology from the “common sense” side of the world, talking about Glow Caps, a pill bottle that is wireless and does the communicating for the patient with medications. What is important about this is the fact that he brings this to light, but also touches on the implementation of how this works, disruptive, or helpful?
The Colbert Report Takes On Vitality GlowCaps (Video) – Check Out the Privacy Issues Here As Medication Data is Created That Can Be Sold To Health Insurance Companies For Use With Underwriting Algorithms
Congress for the most part with being “nonparticipants” is not really aware of how biometric monitoring works, but yet as citizens we are having all of this pushed down our throats without a solid plan sometimes. The vendors and insurance companies think everyone should be tied in to a device that reminds us and keeps us on track, which may or may not be a bad idea, but what if a consumer is already tied into 2 or 3 other devices too, how many can we have room for?
Personally to bring this point home on healthcare and how these devices work whether it is exercise, taking medications, etc. I think every member of Congress should be a pilot and experience some of this so they understand where sensors and software are going today. What if they were in session and received messages saying “your need to move more-get up and walk-you are not meeting your daily exercise goals”. This could make for one heck of a YouTube video and drive home what “participation” is to show both the good and dark side of all of this at once.
All we would need to do would be equip every member of Congress with a device, a Fitbit, Muve Gruve or use a program on a smart phone to keep them in check, and gosh knows you can see some big BMIs up there with those folks too who need a diet or some exercise. These devices even monitor you while you sleep, can you see Congress members looking at their own data? This stands to be a Congressional “don’t tell” issue if used think <grin>. After all they are the leaders making laws today and as citizens we want to know if they are making the most out of their sleep efficiency as this is what is being marketed to the American consumer today and some companies have programs that kind of force feed this for employees to get discounts to afford their healthcare insurance premiums which are going up next month all over the country.
Next time there’s some coverage just look around as fat lives there too and this is something members do have in common with the American public, it lives everywhere so thus the need to kill this paradigm of “its for those guys over there”. I thought maybe the first lady perhaps with not wanting a lot of attention when her program for children and obesity was announced was embarrassed as she was looking at a crowd of adults (all members of he House and Senate) who needed some information in this area too.
Why Was Michelle Obama 'embarrassed' by The Standing Ovation As Obesity Program for Children Was Announced
“Stop that filibuster, device says I’m not getting enough exercise so everything goes on hold for a few minutes while we stop and walk around and answer to our electronic wellness coach that is calling and nagging me with text messages. I make this point as this is what is being sold to the American public marketed via many insurance companies and the users have jobs too, so do they stop and tell the customer on the phone, I can’t talk now my devices says I have to move around right now or my wellness coach won’t give me a passing grade here and if I don’t do this my insurance premiums may go up as my company has a contract that says I have to do this to keep my portion of my health insurance premiums down and I get that discount.
Devices can be helpful but participatory sensing and how they fit into daily life is important for the end users. Marketing and proof of concept today is like a runaway train and this is not happening but rather the chase for the data to analyze is somewhat shoving this down our throats without adequate planning and realizing the effects it has on just living your life. Stuff like this too in the news scares me as there are stores like Best Buy that help everyone with technology and it’s even available for members of Congress as they are consumers too, read up and get that general consumer IT digital literacy going, we do. The word “accelerometer” might scare the daylights out of some of our members and this could be a good lesson on device privacy issues to experience this first hand too! How would members of Congress react to seeing their nutrition and BMI rolled out and charted like this I wonder?
Members of Congress Not Locking Down Their Home Wireless Networks with Passwords Now Angered At Google For Snooping with Street Views?
When I heard one of the members of Congress ask Mr. Colbert this week ask him to leave before he even spoke, well point well made there with “nonparticipation” and lack of curiosity. Curiosity is the key to learning and this member of Congress basically said I am not curious and have all the knowledge I need, sad. He doesn’t get it and in my mind he’s one of those “nonparticipants” as Mr Colbert brought to light in his own way, reality with farm workers. How in the heck do you crack these head that think they know it all already when you hear comments like that? This post below might shed some light here, as the 2 are connected, duh?
The Link between intelligence and Curiosity Is Discovered
“Magpie Healthcare” is another one I use frequently too, those who just repeat what someone else says but offer little or no knowledge of their own as they come back around to number one, being a “nonparticipant”.
The third phrase I include quite frequently is “its for those guys over there” and everyone can relate to that with the feeling we get today with those out of touch with “general consumer digital IT literacy” and we stand back and watch and listen to those who “think” they know what is best for us. They really don’t know as they are “nonparticipants” and live in values and the rhetoric of what made times in the70s work. All of these 3 hit on that big time and entertain us in the process, why, because it’s the truth, and whether it is Congress or a CEO, this stuff sticks out like a sore thumb today and can’t be buried under the carpet.
Personal Health Records (PHR), I don’t do technology said the CEO, “it’s for those guys over there”
We have a lot of what I call judgmental garbage in the news today that admonishes the general public and tells us how stupid we are, when in reality that is not the case but yet with numbers and stats we all get rolled in there, but again these 3 entertainers dissect this and bring the “real” reality to the screen and at the same time roll the leaders in there too with pointing out this is the pot calling the kettle black.
This week Rachel Maddow did a talk about the stimulus money and used one of our California representatives as an example. He put down the stimulus money and now is asking for some. What really brought this home was the fact that the same representative was recently pulled over for using his cell phone while driving. We have had several folks to include our governor’s wife get busted with this, but the real difference I feel this case was the arrogance displayed here in being in the process of doing a “live radio show” while driving and using the cellphone, again we come back around to the fact that cell phone safety “its for those guys over there” and it seemed to project not only arrogance, but the idea of “I’m important and I am above what is for the rest of the general public”. As a side note too, watch the blank expression on Dan Lungren ’s face while Stephen Colbert testifies, he looks very confused and very much resembles a “nonparticipant” as the camera was spanning and caught him on film.
US Congressional Representative Gets Pulled Over for Using a Cell Phone While Driving And Was Live on the Air Doing Radio Interview
This is a device at the link below that I use for hands free in the car and it works well, it plugs into a cigarette lighter and is portable so for those renting cars, etc. a mobile solution once matched with a blue tooth smartphone, and I might hope that members of Congress have graduated to this point with mobility for the jobs they do require them to move around a lot. Too bad the Oprah police were not on hand for this one.
Black Series™ by Shift3® Bluetooth® Hands-Free Auto Speaker – It Works!
I’m just noting this fact as the rest of the country was watching as this was all over the news when it happened and stop and give this some thought, do you get any other alternate views of this situation? He didn’t get a ticket but if this had occurred back in the home state of California, he would have. You can’t hide anymore as we live in the world of sensors and transparency and occurrences like this I believe just tend to drop one’s popularity down a notch or two and again makes for great entertainment and once again shows the world of the “nonparticipants” at work with the paradigm of “its for those guys over there’ once more kicking in. I guess the “nonparticipants” have not come to the reality of all these sensors surround them too.
Rachel Maddow had a very revealing story this week about digital literacy and blew it up on the screen for all to see with the lack of knowing how to work with pdf files and how the writer of the information simply took one right click on the document. When you stop and think of the point made here, are these folks “participants” with general consumer literacy? It sure didn’t look like it, so again it was there for the world to get a look at reality and shows what goes on, this is the day of transparency we live in today. Those not in the know just slip further down the ladder and digital illiteracy shows once again.
The Properties of an Adobe pdf Document -Rachel Maddow Rips the GOP on Lack of General Consumer IT Knowledge And Exposes the Input and Authors of the Content–Lobbyists
This is the big story of the week to show that former lobbyists are writing some missions that others follow? You may not always agree with what Rachel has to say but this is just cold hard facts here and the truth so it serves to bring folks out of denial and shows what is happening and how many choose to live in the past and can’t get up to pace with technology and how it is affecting our day to day lives. It is what it is. Tech denial affects both Democrats and Republicans although the latter seems to be having even a more difficult time with curiosity and learning today as we seem to see reported in the news. We have companies like Intel too warning use on this fact, but doesn’t sink in does it much in Congress as they need to get educated too.
Intel CEO States the US Faces Decline in Tech Jobs–Announces Purchase of German Wireless Chip Company Infineon
In summary I hope I have outlined why these 3 individuals play such an important role today with US citizens and Congress, especially in the area of healthcare, they are the voices that help break through the “nonparticipant” barriers with their humor and can one by one break down some of the bricks in the wall. As consumers we do feel like just one more brick in the wall when it comes governing bodies that are out of touch and have lost the element of curiosity as no learning takes place when this happens and it’s on the news, in the papers every day. We need a lot of studies due to non participation and the inability of those to contribute with the paradigm of it’s for those guys over there.
HHS To Conduct Study on Patient Perception on Health IT – Got A Better Idea Why Don’t They Become E-patients Role Models, and Participants – Make IT Personal and Believable
Rachel, Jon, and Stephen are more than just broadcasters, they take an interest and use their talents as entertainers to speak for us and they educate us too in the process.
Nobody is the king of all knowledge today and it’s working together and getting rid of those old stuffy paradigms and and stopping the unnecessary judging of people.
If we didn’t have their voices being heard and bringing this lack of curiosity and knowledge of our leaders to our door everyday, things would be much worse so I applaud and very much appreciate all their efforts. BD
Doctor Given Security After Hedge Fund Investor Threatened Some Type of Verbal Retaliation After a Negative Vote on Lorqessa Anti-Obesity Drug Panel at the FDA
We have heard stories of such and this makes me think back to the drug Provenge which in itself was one huge soap opera with a little bit of everything thrown in. This is pretty bad when a doctor on the panel is giving his opinion to be verbally and or otherwise abused.
There may be more of this that occurs but this according to the article below occurred right after the vote, so when money is at stake and you have a physician on the panel doing what he feels is right, unfortunate incidents like this can occur as the pressure today to make money is like something we have never seen in the US and who knows if this hedge fund guy had already run his business intelligence software to project what a potential return would be too, that fuels the fire today for sure. We are addicted to the data analysis processes to the point where some begin banking on numbers even before decision are made.
The article from BNET below continues on to speculate who the doctor could have been and says it could have been one of the experts from Cedar Sinai in California, and again that is speculation but the FDA did give him added security. BD
A doctor who voted against approval of Arena (ARNA)’s Lorqessa anti-obesity drug in an FDA advisory committee was threatened by a disgruntled hedge fund investor after the vote, according to The Healthcare Channel. The incident underlines the fact that while pharmaceutical investing is often arcane, academic and dry to the point of being boring, tensions run high under the surface. A company’s entire fate can rest on a single vote at the FDA. Indeed, Arena’s stock was more than halved by the FDA vote.
Here’s what happened at the FDA meeting, which was held in a hotel conference room, per HCC TV:
The doctor, who wishes to remain anonymous, was approached in the hallway of the hotel where the AdCom was held by a Caucasian man, approximately 5’10”, mid-40’s, balding, dressed in an “expensive suit”, when the man began to use obscenities. He said, “You are a pompous asshole … you are wrong…you better get the hell out of here fast.” He repeated the comments. The doctor then called security.The circumstances and description of the man indicate that he might have been a disgruntled hedge fund investor.
Fear and Loathing at the FDA: Doc Given Security After Hedge Fund Threat | BNET
Pfizer Consumer Healthcare Recall of One Lot of ThermaCare HeatWraps Menstrual Product–Get A Better Recall System
Here we go once again and we all know the answer if you read this blog. We all know what success you have had with Microsoft Share Point and how it has increased information and efficiencies, and actually I mentioned that with my interview with Mike Naimoli from Microsoft Life Sciences and gave Pfizer some real nice brownie points too back in 2009, so let’s think about the consumer here and offer some value here to the people who buy your products. Pfizer of course is not alone as I address any company in healthcare with recalls.
A Deep Dive into Microsoft Life Sciences Today and in the Future – Interview with Michael Naimoli
The instruction are here to make a note of this lot number and then look at your product and see if you have a match. Using a cell phone to find this would be a lot more convenient and gee as a consumer I get “instant value” here with not having to do a bunch of time consuming research! I don’t this this recall is as big as the Abbott Labs one where it overloaded servers, but we never know what could be next and what drug or device, could be anyone, but the deal here is to be prepared and not be a BP of the pharma business with being prepared.
Microsoft Tag Bar Codes–Who’s Been Scanning the Medical Quack–The Bing Heat Map Tells All And Could Help Find Stolen or Expired Drugs and Devices With This Methodology
There will be more recalls in both food, drug and device products so we need a system that can work for everyone and especially the consumer as we are the ones affected. When you look at this map, and when products were scanned, guess what, it could give Abbott even more intelligence in knowing where the product was due to “spots” on the map so they in turn could be more pro-active here too with finding the product quicker! What technology that is available today for implementation can do and save lives too. Click on the Bar Code Campaign image to read more.
Here’s a hint from a Mom who recently had to check products from another company, she wanted the convenience and value. The technology is here today and needs to be designed and requires collaboration of the FDA, DEA and other government entities and a pilot program would sure be nice to give this a try. Also I have a poll going here and consumers seem to like the idea too, look at the votes! BD
The company said it is taking this precautionary step after finding a potential for a leak of the components contained in the wrap, which could cause skin injury such as irritation or burn. The issue is limited to the recalled lot. No other ThermaCare products are impacted. Pfizer has notified the U.S. Food and Drug Administration.
The lot number of the product involved is:
Lot #
Exp. Date
Product Name
E06831
8/2012
ThermaCare HeatWraps Menstrual
This lot number is listed on both the outer carton and the foil pouch. The lot number may be followed by either an S or an N. For more information on the recall and where to find this information on the package please visit www.thermacare.com or call 1-800-323-3383, Monday through Friday, 9am to 5pm EDT.
Pfizer Consumer Healthcare is removing the product in question from store shelves and asking consumers who have purchased and are still in possession of the affected product to record the lot number, throw the product away in its entirety without opening the foil pouch, and call 1-800-323-3383 for replacement.
Pfizer Consumer Healthcare Issues Voluntary Recall of One Lot of ThermaCare HeatWraps Menstrual... -- NEW YORK, Sept. 24 /PRNewswire/ --
Health Insurers Spending Millions to Update IT Infrastructure to Comply With Federal Laws–New Software, Algorithms and Other Health IT Systems To Provide Accurate Information
This is an expense where there’s no getting around the need as new algorithms will be needed in order to assist customer service individuals and agents to give you the correct answers and information. After all we all know that any information you received today via a question that is asked comes right off the computer screen. The algorithms for enrollment, for example on children need to be changed so when an agent is taking information to qualify an individuals, those updated decision making algorithms will appear correctly on the computer screens and calculate additional information as needed.
Companies like United Health Group I’m sure are maybe ahead of the game here as they own a technology company that built it’s business on the algorithms and software they provide as with subsidiaries too they are also able to mine and combine data from other available sources. This article even confirms this as it sates United did their work in advance. Algorithms will also need to be adjusted to allow claims to go through on office visits that are preventive to where there is no longer a co-pay. This is all an automated process today and there are not big rooms of people looking at paper for the most part. In addition, Ingenix is preparing to also sell you more software on how to code better if you are a healthcare provider.
Ingenix (Wholly Owned Technology Subsidiary of UnitedHealth to Acquire A-Life Coding Software/Services–Tons of Money and Profit With Coding Transactions and Algorithms - Subsidiary Watch
Also don’t forget to get your claims in for the under payment legal suit settlement that was based around the Ingenix algorithms used for customary fees for a number of years. It’s all about those “algorithms” or formulas used to calculate accurate or “desired” results that we have to deal with.
AMA Has Online Assistance and Forms For Filing Claims For UnitedHealthCare/Ingenix
Blue Cross had some challenging times too with getting their algorithms in line to comply and their issue in California was the amount of an increase they were going to provide to consumers.
HHS to California Blue Cross – Bring Your Algorithms to Washington And Explain
The connecting of data too goes beyond just the commercial end as some Medicare contractors are owned by insurance companies too, so we have more data to bring together here too. At the link below a reader of the Medical Quack took a lot of time to provide some history and information on how some of this works so check out the comments too.
Medicare Contractor Gets Deal to Monitor Physician Incentive Payments–Same Folks Earlier This Week Admonished For Not Doing Enough for Fraud Prevention?
In summary as you can see, once new laws go into place, it is a lot of work to make sure all the data flows correctly and consumers are given accurate information. We of course don’t see how the processes are done since this is all outsourced if you will and not housed internally with government software, so how they do all of this to remain compliant is that we need to somewhat take their word and do audits to make sure everything is correct.
One other note that was kind of disheartening too was the fact that the Senate cut “cloud computing” from the budget, so what you have here is basically the idea that you are going to get your Cheerios with web services but without the cloud, you have no milk to pour on so laws like this make it even harder at times for our government to move quicker in many areas of IT, and Health IT in particular.
Senate Cuts Cloud Services From Budget That Would Allow for Data Center and IT Infrastructure Consolidation–Back to the 8 Track Tapes Next?
Anyway, just be prepared and know that it’s the mathematical processes with computers that need to be in place for all of this to happen and the information you are given depends on it. BD
Sept. 24--Health insurers are spending tens of millions, are overhauling health plans they offer and are reconfiguring the technology used to assist customers to comply with federal health reform laws passed in March.
Thursday was a major deadline, ushering in new mandated benefits for consumers. Insurers now pay for the full cost of preventive services such as mammograms and colonoscopies. They also must accept children regardless of their medical conditions, as well as waive the cash spending limits they had on customers for each year and for each person's lifetime.
"The removal of cost share on preventive services was a major change that impacted a lot of plans," said ConnectiCare spokesman Stephen Jewett. "That's a broad one. ... I suspect it impacted a lot of different plans at a lot of different insurance companies."
The public's first glimpse of changes related to reform was a batch of proposed rates announced in recent weeks -- increases of much more than 20 percent in some cases -- for health plans sold directly to individuals and families. Those rates take effect Oct. 1, and primarily affect new customers to the individual market. Rates for 2011 are expected in October and November.
Insurance News - Insurers Spend Millions To Comply With Reform
Amgen and J and J Product Recalls–Time to Go Search the Web and Find Out Where the Products Are and Who Has Them- Big Hassle-Bar Code Technology Would Make This Much Easier
It doesn’t matter why the recall is being done, but whether it is a consumer, a pharmacy, pharmacy benefit manager or a hospital, here goes the long pain-staking process once again and stuff can get missed too. I’m not going to elaborate again and re-type the solution but will copy and paste a solution. Some nice heat maps to find the drugs when scanned would be be very cool.
But we don’t choose to investigate this and still drive individuals to the long pain staking process of looking up lot numbers etc. when a simple cell phone scan could do the trick. My bar code campaign would be an effort of the FDA, DEA and drug and device companies working together and everyone benefits if collaboration were able to be facilitated, the key to data resolutions today. Here’s my heat map where I can see who has scanned my Tags (bar codes). Pretty neat and in real time.
Abbott Recalls Certain Similac® Brand Powder Infant Formulas–Bar Codes and Heat Map Technology Would Have Made the Process Easier-Scan for Recalls with Cell Phones
I just read over at the Wall Street Journal the Abbot Recall Site and Hotlines are over whelmed so be prepared to wait. In the meantime, there’s other technologies like Microsoft Tags that could have (if used) enabled consumers the opportunity to scan for recalled products by using their cell phone. If you like this idea, give it a positive vote on the poll. There’s a long write up summary on the image above and it can be found at the top of my blog where it has a permanent resting spot.
Microsoft Tag Bar Codes–Who’s Been Scanning the Medical Quack–The Bing Heat Map Tells All And Could Help Find Stolen or Expired Drugs and Devices With This Methodology
There will be more recalls in both food, drug and device products so we need a system that can work for everyone and especially the consumer as we are the ones affected. When you look at this map, and when products were scanned, guess what, it could give Abbott even more intelligence in knowing where the product was due to “spots” on the map so they in turn could be more pro-active here too with finding the product quicker! What technology that is available today for implementation can do and save lives too.
I’m actually surprised to see investors not demanding a better recall system too as this affects their profits and of course we know Wall Street uses the most coveted and highest performing technology with data and algorithms available today. BD
The recall of the Puerto Rico-manufactured drugs is not expected to disrupt the availability of Epogen to patients, according to Amgen spokeswoman Emma Hurley.
She also said the biotechnology company does not expect a material financial impact from the recall.
Amgen manufactures Epogen, used mostly for kidney dialysis patients, and Procrit, used mostly for cancer patients. Amgen sells Epogen in the United States and J&J's Centocor Ortho Biotech unit distributes Procrit in the United States. J&J has been dealing with a rash of recalls of its consumer medicines.
Amgen, J&J anemia drugs recalled over glass flakes | Reuters
The Properties of an Adobe pdf Document -Rachel Maddow Rips the GOP on Lack of General Consumer IT Knowledge And Exposes the Input and Authors of the Content–Lobbyists
She talks about the GOP Pledge and the pdf format that was used for the original presentation. We all deal with pdf documents all the time and she of course brings something forward we all probably use, “right click’ properties. The properties show the some of the folks who created input here to include AIG, Pfizer, some oil companies and others so it appears they all had input and this is the Republican pledge that came from a staffer who was formerly a big time lobbyist. Do lobbyists have influence, sort of looks that way when the properties of his document show the sources here.
This is one more example of the folks living in the 70s and not up to date with what is happening in current times. We have a good example of what I call the “non participants” with technology, basic understandings. This is the world of transparency and open data folks and it’s good to know how your document creation can be tracked back to origins.
It doesn’t matter much what you say today if you don’t have the appropriate algorithms in place to back you up, read it every day in the news with the OMG stories. I wrote my own analogy about some of this and flat out we have lawmakers trying to create laws that govern technology that they have no clue on how it works, dangerous. I see this rhetoric of going back to the 70s and I guess it appears to be a time when folks seem to find a subject they feel qualified to talk about, best I can figure. In another video you can listen to Rachel talk about the GOP talk about those wanting to privatize Medicare, Social Security and the VA. This one will get your blood pumping.
Cheap Soap Opera Political Antics Again With Newt Gingrich Suggesting to Force Kathleen Sebelius out of HHS And Other Extra Ordinary Tales of Non Participating Illiterates
Wendell Potter knows algorithms and is trying to help and give some inside information on how this all works after years in the business, but we focus on a mosque in New York instead. Big business loves this distraction as they use their elevated intelligence to keep moving their algorithmic plans for profits forward.
Wendell Potter Tell All Book–Deadly Spin–One to Put On My List as “He Knows Algorithms and How they Create Profits”
There’s a lot of talk about improving health literacy, well first of all all members of Congress and other leaders should expand their own. Last year at the stimulus testimonies I watched the Senate Finance committee listen to Kaiser and Microsoft and none of them had one clue on what a PHR (personal health record) is, rest my case and it’s back to we can be fat, ignorant, but the American public has to be up to date and literate, big fat role models that are short changed in the technology department and have to guess at how laws might work with some of this.
Visit msnbc.com for breaking news, world news, and news about the economy
How important are the algorithms and computer code we use for decision making processes, check out what happened at Goldman, they had cows and were on a huge hunt here. This is highly sophisticated technology and not a pdf document that Rachel discusses that we all use in business today.
Somebody Stole Goldman’s Algorithms – Code that Makes Their Money Just Like Health Insurers Use
All you are going to get from insurers are more algorithms that create profit and the lobbyist appear to be there in number even to helping produce the “pledge” for what their profit interests represent.
Health Care Insurers Suggest Algorithms and Business Intelligence solutions to provide health insurance solution
I talk about backing up with your say with technology and algorithms to support, but in this effort here some are having problems with even the simplest forms of documentation and keeping things straight, a pdf. I don’t feel comfortable with folk so far out of reality here and low levels of participation to make decisions. Sad this is the reality of the soap operas and scary antics we see today. It’s no longer a dog and pony show, it’s a technology and ethics show for those who have not figured this out. BD
http://www.msnbc.msn.com/id/26315908/ns/msnbc_tv-rachel_maddow_show/#39336480
ClickFreeMD Selling Software EHR, Practice Management Bundled Records Solution–Emphasis on AMA Endorsement And Software “Powered” by Ingenix–Tethered or Untethered
This is a new one for me but new medical records folks pop up all the time. I looked and saw a street address, but the big thing, nothing on where your records are stored. We all know what Care Tracker EHR is from Ingenix but “powered” seems to indicate the records are stored……hmmmmm…..where? ClickFreeMD “represents” Ingenix Care Tracker, so record server where might you be?
Here’s some information from the website area where the a pdf links:
“ClickFreeMD is a leading provider of internet based software and business services for physician practices. ClickFreeMD represents Ingenix
CareTracker software and uses it to power its medical billing, practice management and EHR services. Since 1996 Ingenix has been a leader
in health care data, analysis and solutions with more than 200,000 physicians and providers, 1,500 payers, and 100 FORTUNE 500®
companies relying on their software, services, and expertise. ClickFreeMD is headquartered in Ridgewood, NJ, with an office in Chevy Chase,
MD. For more information, please visit www.clickfreemd.com or call (888).548.4150”
I did a search and came up with more press release copies and the home page, and I looked there to find out more and again a lot about what Ingenix Care Tracker does but little about ClickFree MD by comparison.
I’m a different of hybrid person with both coding and marketing in my background and this seems to have the look of some fancy marketing here, my opinion and I may not be correct, but it sure looks like it with what I am seeing here. A few weeks ago we had the announcement of a new marketing strategy department so I am just pondering if this is maybe part of that effort?
Ingenix Consulting Adds New Consulting Gig–Strategic Technology Solutions–Focus on Health IT Executives On How to Invest and Implement Algorithmic Performance Strategies
They also have this subsidiary that bought a company in China that works with regulatory agencies for approval and distribution of devices and drugs a couple months ago. You can read between some lines here if you like.
UnitedHealth subsidiary (Ingenix Subsidiary I3) Acquires ChinaGate – Working to Sell Chinese Products Globally
Data is being integrated today and new algorithms are showing up daily with everyone trying to build the better mouse with data systems being aggregated and integrated like we have never seen before and companies that in the past you would not have even given any thought of any strategic alliances, private equity folks are doing the same all over the place. I call this type of reading “subsidiary watch”.
Nobody buys a company today without digging into the value of their data, it is what it is. If they can plug in some algorithms and make a buck at it, they do it and much of this runs behind the scenes and moves along while we are in emotional turmoil over the mosque in New York, strategists love this distraction so they can lay low and keep working the data.
I tell everyone whether it is a PHR or an EHR to find out where you data is and who has access. Who knows maybe the AMA has the data on their servers here as there’s no other information shown. Many places that used to be heavy on support don’t seem to be that way today and are turning into just one more software house.
I see better opportunities than this out there and would rather do business with having everything up front and the way this whole site and the information's presented does not make me feel comfortable at all and again it somewhat reeks of some new marketing models someone is trying out to see if folks bite. This could be where that new coding company software fits in too?
Ingenix (Wholly Owned Technology Subsidiary of UnitedHealth to Acquire A-Life Coding Software/Services–Tons of Money and Profit With Coding Transactions and Algorithms - Subsidiary Watch
We are focused here on the billing, transactions where all the big bucks are made when software systems feed each other with layers and the new cha chings add up. I am starting to see this new corporate title creep up a lot today, the Chief Growth Officer, interesting name for marketing.
This also could allow for the solicitation of more data to mine to create anonymous name study information to substantiate what will be paid for in the way of certain medications and procedures too, Ingenix mines and does data as a business model. We had something along those lines with the Oncologists earlier this year where they cranked their data and sent out letters as it all goes into the big United pocket book in the long run with dividends and investor reports and earlier this year too come to think of it they decided to pay dividends more frequently too and the board said no caps on executive pay. BD
ClickFreeMD today launched the Nation's first unlimited use, medical billing, practice management and electronic health records solution that works together and includes all services, software and support for a low monthly flat fee. The quickest and easiest way for busy group practices to six figure savings, Federal HITECH Act incentives and getting paid more, faster. Physicians can see their flat fee and savings calculated in just seconds at www.clickfreemd.com
ClickFreeMD Saves Medical Practices Six Figures with First All-Inclusive, Unlimited Use, Flat Fee Medical Billing, Practice Management and EHR Solution
California Health Insurance Rate Increases In Effective October 1, 2010
If you have just digested the new rules that went into effect today with healthcare reform and live in California, here’s the roll of news. The California Insurance Department does not have to give prior approval for rate increases. An outside agency was used to review the increases. In California the state Legislature voted down a bill that would require carriers to submit increases like the automobile and home owners insurers presently comply with. I think the Insurance Department was able to lean on using the outside agency as a way of having the rates reviewed in some form or another. The federal government is also in support of helping states in this effort as well. Here’s what is on the agenda for 3 of the largest carriers in California.
Aetna – 19% average
Health Net –16% average
Blue Cross – 14-20% average
Here’s a recap of what changes went into effect this week. BD
Recap of New Healthcare Reform Insurance Provisions That Take Place On September 23, 2010 From HealthCare.Gov
The California Department of Insurance has given the green light for Aetna to raise premiums rates an average of 19% on individual health insurance plans, impacting about 65,000 people in the Golden State.
Aetna was the last of the four major health insurers in California whose double-digit rates increases were approved by the insurance regulator.
Over the past several weeks, the department also approved premium rate hikes for Health Net, which was cleared for an average rate increase of 16% on its individual health plans; as well as Blue Shield of California and Anthem Blue Cross. All of the rate increases take effect Oct. 1.
Insurance News - Aetna Last of Four Insurers Approved in California for Double-Digit Premium Rate Hikes
Alleged Shoplifter Hides In Dumpster–Compacted by Garbage Truck and In Hospital in Critical Condition (VIDEO)
This is one of those strange tales but he’s lucky to be alive after surviving several compacts from the trash truck. Dumpster is NOT a good place to hide. BD
A suspected Walmart shoplifter who hid from police in a dumpster may have chosen too good of a hiding spot.
At 6:00 AM Wednesday morning, police say they saw a man exiting through a side door of the Alliance Walmart with a shopping cart full of merchandise, according to local news station WKYC.
James Brienzo, Alleged Walmart Robber, Hides In Dumpster, Gets Compacted (VIDEO)
FCC Approves White Space Frequencies - Google’s TV White Space Hospital Experiment in Ohio
If you have not heard the news today, the FCC has given the go ahead to use white spaces for Super Wi-Fi. Granted this is still operating with our current wireless standards, but this unused airspace is not tied to phone companies and has the ability to connect at greater distances and faster speeds.
Google already has a pilot program that was announced last week using white spaces for a hospital. All will be equipped with high speed wireless access over white spaces. The program will explore and demonstrate the many uses of white spaces in healthcare. This is working with a new smart grid network. This comes at a time when the hospital is just closing their OB Department.
They will be able to use Google Power Meter for efficiencies in utility use to lower bills as well as having the fast WiFi connection. The approval for the use of white spaces has been on the burner for quite a while now and other companies besides Google were pitching for the approval as well such as Microsoft and Cisco for a couple examples. BD
The small pilot program, announced a week before the FCC votes on final technical rules governing white spaces, will use the spectrum to deploy a broadband network. The program is the first of its kind for a hospital. First responder vehicles, the hospital’s ground and the health department will be equipped with high-speed wireless Internet access using the TV white space. According to a post on Google’s public policy blog, the search engine giant and Spectrum Bridge — a company its already partnered with in another white space-to-wireless broadband program — will use this demonstration project to show off the many uses for TV white space.
What Google’s TV White Space Hospital Experiment Means for the Smart Grid | BNET
Hot Flash Havoc–Menopause Exposed and Explained Documentary For Anyone Who Is A Woman or Knows a Woman–Interview With Heidi Houston, Executive Producer
I had the opportunity recently to speak with Heidi Houston, the Executive Producer of Hot Flash Havoc the new documentary about menopause. We had a great conversation and having been though a lot of the same types of situations myself I could relate. I had a great doctor who after my surgery came through the hospital the day after surgery and slapped a patch on me, she knew and was pretty well informed. After Heidi and I chatted, she was kind enough to send me a preview copy so I could do a complete review and high light both our conversation and the movie itself. Be sure to watch the entire move to include the credits at the end as the movie had a special song created called “Power Surge” and it will get you motivated and is a perfect fit, written by Grammy Award Winner Siedah Garrett. If you visit the HOT FLASH HAVOC website you can also hear the sound there as well. The documentary is making its Washington DC premier next week.
Hot Flashes Coming To Washington D.C. - Controversial New Film About Menopause, “Hot Flash Havoc”- Exclusive Premier Screening–September 28th - Men are Invited
The movie first of all is a complete delight and presents information with a taste of humor (and we all need to laugh here and there), but uncovers and talks about so many topics relating to menopause that have somewhat been taboo for discussion. As the movie states, menopause is not a disease, but if not treated properly it can lead to other types of diseases like osteoporosis for one simple example.
The movie begins with the history of menopause and how went back ancient Greek times. The video below is a quick preview.
History of Menopause
Heidi said the reaction of many when she talked about making the movie was mixed and some didn’t respond to her at all. Heidi stated the purpose of this movie was to educate and offer information so women could make decisions and become aware of what was happening and be able to gain better “Quality of Life”. The decision making process comes back to us, the patient and our doctors with knowledge we are gaining over the years and it’s not over yet as new information becomes available all the time.
She told me none of the funding for this documentary was free from any pharmaceutical company so it is free from any potential influence from pharma and her hope was to show the history and both sides of the story. All money generated from the sale of the DVD goes to agencies to further the research and development of hormone replacement therapy and treatment.
What was really of interest to me was the additional information about the Women’s Health Initiative she provided. I have done a bit of research and a couple interviews on the Medical Quack about hormone replacement therapy but I did not have the whole story on the how the initiative took place and further more the details on how the results of the study today are still under lock and key with nobody able to get their hands on the data. In the movie you will see a couple comments here with some researchers stating that fact and who would also like to have that opportunity to look at and analyze the data. The Women’s Health Initiative was started at the NIH when there was a woman at the top of the helm, but as you watch the movie you will be enlightened at to what occurred after she left and it’s not really a pretty story to say the least as women throughout the world and US stopped using their hormone replacement therapy.
Heidi used a full panel of experts that you see discussing their points of view and just some plain actual fact that you may not be aware of. One expert seen quite frequently throughout the films is Dr. Alan Altman, President of the International Society for the Study of Women’s Sexual Health and former Assistant Clinical Professor at Harvard Medical School. One other expert who is interesting here too is Joanne Manson, the WHI principle investigator and professor at Harvard Medical School, who still stands by the findings but has mellowed a bit and as a woman shares some of the same feelings with the fact that more education is needed.
The WHI trial was flawed in the fact that it used women who were over 70 starting HRT for the first time in their life and only looked at Premarin and Prempro for the study, no other replacement therapies. The results were generalized to the entire female population of all ages across the US and the study was initially for studying to see if heart disease was affected by hormones. If you fast forward a few years we now have statins that handle much of the fear with heart disease treatment. Women in their 40s and 50s were not adequately represented, who are the ones going through menopause. The WHI stated age didn’t matter but in fact it does. Over a billion dollars of government money was used and yet the data is still locked up and researchers today have a problem with that and for good reasons when the era of today is to share data.
One part of the movie that was done very well was the using of animations with the brain talking to the rest of the body and using today’s’ methodologies of communication the points are made as you watch the brain chewing out the ovaries for non production and trying to wake up the libido.
New laws were passed to allow for natural supplements to be created to take the place of hormone replacement therapy and as the movie states, the ones who benefited most here were the “snake oil sales” reps. I do remember all of this myself and buying my share.
In her efforts, Heidi tried to see if the NIH would release any information as to whether or not they have changed their views in light of new and updated information with hormone replacement therapy and it was denied.
However, recently they have admitted that estrogen does not increase the risk of breast cancer; however hormone therapy remains a viable option for women. It does contribute to the growth though if it is present.
In addition, Heidi brought to my attention the “Bloom Study” which is a clinical study for women which is a testosterone cream applied once a day to see if it can help increase testosterone levels.
She went on to further tell me that there are only about 1000 certified doctors in the US to treat women going through menopause and how the need is there for more to enter into this area as a normal primary MD first of all doesn’t have the time and many do not have the additional training/knowledge on how to advise and treat menopause.
In addition the California National Organization for Women spoke with Heidi this month and you can also see what was said during their interview and at the Doctor’s Channel.
What is hormonal shock – the hysterectomy –watch the video below as I know this one well too.
Hormonal Shock!
I appreciate the time Heidi took to speak with me and further more for making this documentary as it does answer a lot of questions and brings so much more into the open. Without some type of treatment, we can just literally dry up.
I think the movie is excellent and would make for a great viewing at a hospital, a theatre, anywhere were women go, in other words there’s a lot of information here that has not been talked about or exposed, and after watching the movie, you will get it and it’s a good idea for men to watch as well so they can increase their awareness as they have to live with us. BD
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:56:57.000Z
|
mz4z56vq76woz7qlfi5cshsev3josg7k
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8468",
"uncompressed_offset": 78536362,
"url": "dungeons.wikia.com/wiki/Badger",
"warc_date": "2013-11-22T14:52:11.000Z",
"warc_filename": "<urn:uuid:0e2dcba0-ff85-44d7-95d3-d8180f7bae34>",
"warc_url": "http://dungeons.wikia.com/wiki/Badger"
}
|
cccc_CC-MAIN-2013-20
|
Wikia
SRD:Badger
Talk0
9,503pages on
this wiki
Redirected from Badger
This material is published under the OGL
BADGEREdit
Size/Type: Small Animal
Hit Dice: 1d8+2 (6 hp)
Initiative: +3
Speed: 30 ft. (6 squares), burrow 10 ft.
Armor Class: 15 (+1 size, +3 Dex, +1 natural), touch 14, flat-footed 12
Base Attack/Grapple: +0/–5
Attack: Claw +4 melee (1d2–1)
Full Attack: 2 claws +4 melee (1d2–1) and bite –1 melee (1d3–1)
Space/Reach: 5 ft./5 ft.
Special Attacks: Rage
Special Qualities: Low-light vision, scent
Saves: Fort +4, Ref +5, Will +1
Abilities: Str 8, Dex 17, Con 15, Int 2, Wis 12, Cha 6
Skills: Balance +5, Escape Artist +7 +9, Listen +3, Spot +3
Feats: Agile, TrackB, Weapon FinesseB
Environment: Temperate forests
Organization: Solitary, pair, or cete (3–5)
Challenge Rating: 1/2
Treasure: None
Alignment: Always neutral
Advancement: 2 HD (Small)
Level Adjustment:
The badger is a furry animal with a squat, powerful body. Its strong forelimbs are armed with long claws for digging. An adult badger is 2 to 3 feet long and weighs 25 to 35 pounds.
COMBATEdit
Badgers attack with their sharp claws and teeth.
Rage (Ex): A badger that takes damage in combat flies into a berserk rage on its next turn, clawing and biting madly until either it or its opponent is dead. It gains +4 to Strength, +4 to Constitution, and –2 to Armor Class. The creature cannot end its rage voluntarily.
Skills: A badger has a +4 racial bonus on Escape Artist checks.
SEE WIKIPEDIA ENTRY: Badger
Back to Main PageSystem Reference DocumentCreatures
Advertisement | Your ad here
Photos
Add a Photo
1,231photos on this wiki
See all photos >
Recent Wiki Activity
See more >
Around Wikia's network
Random Wiki
|
v0
|
2024-06-03T21:29:47.544Z
|
2013-05-18T06:22:01.000Z
|
rmnojbddog72uyxkstbmu742bhputcix
|
{
"content_type": "text/html",
"provenance": "cccc-CC-MAIN-2013-20-0000.json.gz:8472",
"uncompressed_offset": 82731079,
"url": "elinux.org/index.php?oldid=11591&title=User_talk%3ARobertCNelson",
"warc_date": "2013-11-22T14:52:11.000Z",
"warc_filename": "<urn:uuid:0e2dcba0-ff85-44d7-95d3-d8180f7bae34>",
"warc_url": "http://elinux.org/index.php?title=User_talk:RobertCNelson&oldid=11591"
}
|
cccc_CC-MAIN-2013-20
|
User talk:RobertCNelson
From eLinux.org
Revision as of 19:12, 11 May 2009 by N6pfk (Talk | contribs)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search
Hi,
I installed gnome and added Driver "fbdev" to xorg.conf. How do I change the screen resolution. It is at only 800x640.
Mike Westfield
|
v0
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.