text
stringlengths
189
621k
id
stringlengths
47
47
metadata
dict
By 2030, as many as 107 million workers, 12 million more than before the pandemic, may need to switch their occupational categories as COVID-19 has accelerated the transformation of digitization and automation, disrupting the world of work. To put that shift into context, it will have about the same impact on the workforce as the industrial revolution did. To prepare for this massive shift, organizations will have to put considerable effort and resources into reskilling their employees. What is Reskilling? Reskilling refers to the process of learning new skills so someone can do a different job, or training people to do a different job. Upskilling, reskilling, retraining, and even new-skilling are used interchangeably for the process. Training these workers requires teaching technical skills along with creativity, interpersonal skills, adaptability and the capacity to continue learning. Organizations leading the way - Amazon: Fulfillment-center employees can go through a 16-week certification program in classrooms located inside Amazon warehouses and, if the retailer hires them as data technicians, their wages will rise from an average $15 an hour to $30. - AT&T: 180,000 employees so far have participated in its Future Ready program. Workers can assess their skills, then pursue short-term badges, nanodegrees taking up to a year to complete, or master’s degrees in fields like computer science and data science offered in partnership with institutions such as the Georgia Institute of Technology and the University of Notre Dame. These companies are only the tip of the iceberg. 87% of executives are noticing significant gaps in the skills of their workers due to COVID-19 and the advancement of automation and digitization. The Harvard Business Review even posits that this shift will require adding a new role to the c-suite: a chief skills and learning officer (CSLO) in the same way that the role of chief technology officer became commonplace over the past two decades. Want to learn more about how you can reskill your workforce? View our resources, or connect with one of our experts for a personalized, guided demo that will show you how easy it is to incorporate all of OpenSesame’s innovative tools and features into your training experience. With courses offered in multiple languages, and available on multiple devices OpenSesame helps companies like yours develop the world’s most developed and admired global workforces.
<urn:uuid:70fb03f1-2d68-4520-81cc-4a5d8939dab8>
{ "dump": "CC-MAIN-2023-14", "url": "https://www.opensesame.com/site/blog/reskilling-your-workforce/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943845.78/warc/CC-MAIN-20230322145537-20230322175537-00766.warc.gz", "language": "en", "language_score": 0.9525315165519714, "token_count": 491, "score": 2.5625, "int_score": 3 }
Objectives A nutrient dilution effect of diets high in added sugar has been reported in some older populations but the evidence is inconsistent. The aim of this study was to investigate the association between added sugar intakes (according to recommended guidelines) and nutrient intake, food consumption and Body Mass Index (BMI). Method A cross-sectional analysis of data collected in 2007-09 from participants of the Blue Mountains Eye Study 4 was performed (n = 879). Dietary intake was assessed using a semi-quantitative food frequency questionnaire. Added sugar content of foods was determined by applying a systematic step-wise method. BMI was calculated from measured weight and height. Food and nutrient intakes and BMI were assessed according to categories of percentage energy from added sugar (EAS%<5%, EAS%=5-10%, EAS% >10%) using ANCOVA for multivariate analysis. Results Micronutrient intake including retinol equivalents, vitamins B6, B12, C, E and D, and minerals including calcium, iron and magnesium showed a significant inverse association with EAS% intakes (Ptrend<0.05). In those people with the lowest intake of added sugars (<5% energy) intake of alcohol, fruits, and vegetables were higher and intake of sugar sweetened beverages was lower compared to other participants (all Ptrend <0.001). BMI was similar across the three EAS% categories. Conclusion Energy intake from added sugar above the recommended level of 10% is associated with lower micronutrient intakes, indicating micronutrient dilution. Conversely, added sugar intakes below 5% of energy intake are associated with higher micronutrient intakes. This information may inform dietary messages targeted at optimising diet quality in older adults.
<urn:uuid:1025e294-413f-49a9-bbf3-08a15971a5d2>
{ "dump": "CC-MAIN-2018-17", "url": "http://ro.uow.edu.au/smhpapers/4076/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125945637.51/warc/CC-MAIN-20180422174026-20180422194026-00168.warc.gz", "language": "en", "language_score": 0.9450018405914307, "token_count": 354, "score": 2.53125, "int_score": 3 }
In order to clarify to what extent cultural interactions in African-Chinese relations create a “soft“ influence on new development concepts and how China presents itself by means of public diplomacy to African audiences, the project investigates Confucius Institutes in South Africa. Other than negative media reports suggest, Confucius Institutes act less political. Moreover, it seems inaccurate to describe them as an instrument of China’s policy of expansion. Confucius Institutes adapt themselves to local circumstances in Africa and communicate a rather selective picture of China which normally focuses on traditional notions of culture (calligraphy, tea ceremony) and tends to blind out current political and societal issues. For Africans, Confucius Institutes are a major option to purify their university degrees and thereby to increase their chances on the job market. In this regard, China is a major option for students of African Confucius Institutes as a destination to study and work. Precisely this option is of interest because in China, it becomes obvious whether and how Confucius Institutes prepare their students for such a stay abroad.
<urn:uuid:b74a659d-06a2-4f5f-a56f-0fe0347abb54>
{ "dump": "CC-MAIN-2023-14", "url": "https://www.afraso.org/en/content/s3-chinese-cultural-policies-and-confucius-institutes-africa", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948976.45/warc/CC-MAIN-20230329120545-20230329150545-00694.warc.gz", "language": "en", "language_score": 0.933531641960144, "token_count": 217, "score": 2.53125, "int_score": 3 }
In Oregon, a battle has erupted between farmers growing genetically engineered sugar beets and organic farmers who worry about cross-pollination. The question is whether the farms can be good neighbors. The Cold War phrase "peaceful coexistence" has been revived in a new context: as a potential solution in the clash between organic agriculture and genetic engineering. This agricultural battle is global in scope, but one place where the tension is most tangible — and where its consequences are most concrete — is the valley along Oregon's Willamette River. This valley is a wonderful place to grow things; the soil is fertile and the climate is mild. Settlers who arrived here via the Oregon Trail once called it "Eden." Farmers here can grow almost any crop, and the valley has become a global center of seed production: Seeds for cabbage, spinach, Swiss chard, beets, grass and many other crops are harvested here and shipped all over the world. Since seeds are genetic packages, it is perhaps unsurprising that a battle erupted when some of these farmers started growing genetically engineered sugar beets a few years ago. The beets have a new gene, created in the laboratory, which allows them to tolerate the weedkiller Roundup. On one side of the battle is organic farmer Frank Morton, a relative newcomer to the Willamette Valley's farming community. He grew up in West Virginia, but moved to Oregon in the 1970s to go to college. "This valley is not big enough to have genetically engineered crops and normal crops growing together without cross contamination happening," he says. On the other side is Tim Winn, who has lived and worked on the same farm his whole life, on the banks of the Willamette River just northeast of Corvallis. Winn says government scientists have concluded that there is nothing dangerous in the new gene, and thus no novel risk for Morton or his customers to worry about. "We can invent a perceived risk in our mind; a lot of us do," Winn says. "And if the science doesn't support it, then it's not a risk. And I guess if [Morton] wants to stay in business with those customers, it would be in his interest to educate them." The standoff between these two farmers raises a question: Can genetically engineered crops and organic farms can be good neighbors, no matter where they are grown? Concerns Of Cross-Pollination To understand why the tension exists, I visited the farm where Morton grows his organic seeds: Gathering Together Farm, outside the town of Philomath. Morton takes me on a tour of the fields, showing off enclosures for growing vegetables in winter, piles of compost, and fields of cabbage, arugula, turnips and kale. We stop and get out at a field of chard. This chard, Morton explains, is actually the same species as beets. They're all Beta vulgaris, the way black Labradors and golden retrievers are all dogs. So anyone growing these plants for seed has a special concern: windblown pollen. Those different plants will cross-pollinate, so if you want to produce high-quality chard seed, you do not want beet pollen blowing into your field, either from a neighbor's field or from stray plants along a nearby road. And pollen can blow for miles. As it happens, there's a sugar beet seed grower straight across the fields a couple of miles away, Morton says. This has not, until now, become a problem. "Apparently they aren't finding any of my red chard or golden chard seed in their sugar beets, and I'm not finding any of their genetics in mine. That I know of," Morton says. "There's always some question, and that's the problem — there's always some question." The Willamette Valley Specialty Seed Association has a system for avoiding cross-pollination, and the approach is charmingly low-tech: just a map of the valley with a lot of pins stuck in it to show where each seed crop is planted. For farmers, it's first come, first served — if you "pin" a sugar beet field, nobody else is supposed to grow seed for Swiss chard within three miles. George Burt, the former manager of the West Coast Beet Seed Co. in Salem, Ore., helped set up this system before he retired. "You're really trying to minimize the risk," he says. "And you can get it down to the point where you're relatively sure that you're not hurting anybody else and nobody's hurting you." But seed growers agree: It's almost impossible to guarantee that absolutely no cross-fertilization will ever happen. Finding Common Ground Organic grower Morton didn't worry about this until farmers in the valley started growing genetically engineered sugar beets. For him, those man-made genes are different and require different rules. Morton wants a guarantee that pollen from those genetically engineered beets will not fertilize his chard or red beets. If it did, he says, it would violate his organic principles — and it would destroy his business because his customers wouldn't buy his seeds anymore. In fact, he says, just the possibility of contamination is starting to hurt. "We think that buyers from overseas — organic seed companies — we think they have already started to avoid buying from us," he says. So Morton, together with some environmental groups, went to court and won. A federal judge banned the planting of "Roundup Ready" sugar beets until the USDA does an environmental impact study that examines the economic consequences of cross-pollination, especially for organic farmers. In a similar case, another judge demanded the same thing for genetically engineered alfalfa. Listening to Morton and Winn, there doesn't seem to be an easy solution. Morton says his business cannot survive the presence of genetically engineered crops, often called GMOs. "It will be a valley fit for growing GMOs, but won't be a valley where people from Europe and Japan and Korea come to have seed grown," he says. And on the other side, Winn says Morton's demands could unnecessarily cripple a valuable industry. "Quite honestly, if you regulate this valley to the point where you don't have sugar beet seed production, or production of some other major commodities — that's a huge deal!" Winn says. There is one voice calling for compromise: Secretary of Agriculture Tom Vilsack released an open letter last month calling for a "new paradigm of coexistence and cooperation" between the two sides. Giving in a little, Vilsack said, would be better than litigation that puts one side or the other out of business. Copyright 2011 National Public Radio. To see more, visit http://www.npr.org/.
<urn:uuid:52630ee7-2de8-44df-89d7-aecfb493ffcb>
{ "dump": "CC-MAIN-2014-15", "url": "http://www.scpr.org/news/2011/01/24/23352/a-tale-of-two-seed-farmers-organic-vs-engineered/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609539665.16/warc/CC-MAIN-20140416005219-00645-ip-10-147-4-33.ec2.internal.warc.gz", "language": "en", "language_score": 0.968562662601471, "token_count": 1409, "score": 2.765625, "int_score": 3 }
An all too common and easy assumption made about studying is that the longer time you study for, the more you will learn and the more your overall results will subsequently improve. However, it's often the case that students will feel cheated when they study for 5 hours for an exam and a peer who only studied for 2 hours achieves a higher mark. The question must then be asked: Why do we measure our level of work according to an amount of time when time clearly has no correlation to the effectiveness of our studying? The fact is that 2 hours of distraction-free study, with the right focus and outcomes in mind, can lead to a better understanding than 10 hours of study with an unfocused mind. How then, can the time spent studying, be made most effective? 1. Healthy Body = Healthy Mind Especially as students reach the last few years of their education, it can become extremely difficult to ensure a balance between the many elements of their life, however, it is more crucial than ever in these years to maintain a balance. Ensuring to sleep for at least 8 hours each night is crucial, especially depending on age. Students should find time for exercise every week and maintain a healthy diet. Especially minimising sugar intake, specifically before and during study periods. It is also important to retain a work-life balance between studying and other past times. Social lives do not have to be entirely sacrificed for the sake of study. In fact, it is beneficial to both academic performance and mental wellbeing to maintain this balance as friends are often instrumental in providing support in times of stress and contribute to a healthy, happy and positive state of mind. By student taking care of their bodies, and making sure that they are healthy and happy, the mind is able to maintain greater focus during study periods. As students begin to see their results improving through implementing this healthy work-life balance, studying becomes a more enjoyable experience and instills personal motivation and incentive for students to work harder to achieve their best. 2. Set S.M.A.R.T Goals: Students should make a list of the things aimed to do in a day of study, in order of priority. Consider breaking large tasks down into smaller manageable parts. Aims for a day should adhere to the principle of S.M.A.R.T goals: This means that students can hold themselves accountable for the work that is completed, ensuring they are being effective and efficient. An example of a S.M.A.R.T goal is "complete questions 1-6 in chapter 3". A goal without the S.M.A.R.T criteria, such as "do 2 hours of maths", or "revise algebra", can make it harder for students to achieve what they have set out to do. Goals of this kind are vague, causing students to spend excess time deciding what is to be done, rather than doing it. 3. Remove distractions: Students should ensure their workspace is clean and free of distractions (putting phones in another room). Computers should only be used if needed, and if necessary, should only be used to access what is needed. If students are struggling to stay off Facebook and/or other distractions, they should consider installing an app such as Cold Turkey (https://getcoldturkey.com/ ) that will help to keep away distractions during study periods. 4. Take Regular Breaks & Reward Yourself: The brain fatigues quickly. For the average student who has not practiced good study habits, approximately 30 minutes of uninterrupted study can lead to the brain being half as effective as it was when the student began studying. Over an hour or more of studying without breaks can lead to the brain being anywhere between 10% and 0% effective. By taking regular breaks the brain is rewarded for the study. It associates the study with the reward and therefore is more likely to focus on the work at hand, enhancing retention and understanding. To put this into practice, students should follow these steps: - Set a timer for 25 minutes and work. - When the timer goes off, take a 5-minute break. Return to your desk and repeat the process. - Once you've completed all the work you have to or every 3-4 hours, take a longer more rewarding break. - As you practice this, you will become more able to focus for longer amounts of time, and you can build up the time between breaks. After a couple of weeks at 25 minutes, try 30 minutes. Within a couple of months, you should be able to achieve productive study for about an hour without breaks.
<urn:uuid:27bd9149-540d-4abf-b6db-1bbca897c1b5>
{ "dump": "CC-MAIN-2019-09", "url": "http://evolveeducationgroup.org/blog/work_smarter_not_harder", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550249414450.79/warc/CC-MAIN-20190223001001-20190223023001-00514.warc.gz", "language": "en", "language_score": 0.9680556654930115, "token_count": 942, "score": 3.296875, "int_score": 3 }
Learn something new every day More Info... by email A credit analyst is an individual who reviews the creditworthiness of those applying for credit. The analyst may review the worthiness of either individuals or businesses. This individual will usually be trained on the job, but some credit analyst positions may require a college degree in finance, accounting, or a similar field. In many cases, the decision of the analyst will be the final decision on whether or not a loan is approved. In addition to approving the loan, a credit analyst will also have a great deal of influence in the terms of the loan. The individual may set an interest rate based on certain risk factors. That rate will likely be lower for borrowers who pose a lower risk to the lender, and higher for those who do. The analyst may also set a minimum or maximum term of repayment. This may also be based on financial information received. Typically, a credit analyst's day is filled with doing research about individuals who are applying for a loan product. This may be talking to employers to verify income. It will also likely involve pulling reports from credit reporting bureaus and looking at the borrower's FICO score to determine the risk the potential borrower may be. The overall goal is to find a solution that will sufficiently protect the lender, yet provide the borrower with the capital that is needed. This verification process may be done online and over the Internet. After a decision is made, the credit analyst may then be responsible for transmitting that decision to the client. In many cases, this is done via a letter. Further, the analyst may be off site. If that is the case, the analyst will usually send the information on the decision to the personal banker. That banker will relay the decision to the applicant. Once the decision is made, the applicant may appeal in some situations. The burden of proof will be on the applicant to come up with legitimate reasons why the decision rendered was inappropriate. In most cases, those denied will simply seek loans from another company. Credit analyst salaries are usually paid per hour. Thus, the earnings potential is based on whether the job is part time or full time. In many cases, an analyst will work full time hours. Entry-level positions may start out lower than someone with many years of experience may make slightly more. @pleonasm - I don't mean to be cynical, but I wonder if they are asked to give loans specifically to people who look like they will take a long time to pay them back. I mean, the person would still have to be trustworthy, but it is a legal contract, and now even declaring bankruptcy won't help in some cases. A risk analyst might want the company to have a bunch of people who have to pay more over the long run because they aren't able to finish their payments in the short term. It seems like they were giving out home loans left, right and center a few years ago, and ended up with payments for a while and eventually a house when people defaulted. So, it makes me wonder. I guess credit risk analysts get given a list of things to look for when they start the job. Like a bad credit history, or defaults on payments, or a low paying job and then they have to match that against the payments. I always wonder how much leeway they get to make the decision, although I imagine it depends on the company. Do they look at, for example, the Facebook page of the applicant? If the Facebook page is filled with drunken pictures, would that make a difference? It might make the person look less trustworthy, that's for sure. One of our editors will review your suggestion and make changes if warranted. Note that depending on the number of suggestions we receive, this can take anywhere from a few hours to a few days. Thank you for helping to improve wiseGEEK!
<urn:uuid:853f8801-5681-4765-b109-6a1926a7799d>
{ "dump": "CC-MAIN-2015-06", "url": "http://www.wisegeek.com/what-does-a-credit-analyst-do.htm", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422115856041.43/warc/CC-MAIN-20150124161056-00195-ip-10-180-212-252.ec2.internal.warc.gz", "language": "en", "language_score": 0.96251380443573, "token_count": 788, "score": 2.65625, "int_score": 3 }
International Day of Indigenous Peoples August 9 is declared by the UN to be the International Day for Indigenous Peoples. The online periodical ContraPunto provided a photogallery of members of El Salvador's indigenous peoples commemorating the date. During the 20th century, El Salvador's indigenous communities were almost completely wiped out through massacres and repression. In 2010, Salvadoran president Mauricio Funes made an act of public apology for the country's treatment of indigenous peoples.
<urn:uuid:c9fc1cc3-6fc1-4efd-b07b-450db25b5b37>
{ "dump": "CC-MAIN-2023-06", "url": "https://www.elsalvadorperspectives.com/2016/08/international-day-of-indigenous-peoples.html", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499468.22/warc/CC-MAIN-20230127231443-20230128021443-00553.warc.gz", "language": "en", "language_score": 0.9173774123191833, "token_count": 95, "score": 3.328125, "int_score": 3 }
For the Architecture contest of the US Department of Energy Solar Decathlon, teams are required to design and build attractive, high-performance houses that integrate solar and energy-efficiency technologies seamlessly into the design. A jury of professional architects focuses on: Architectural elements Architectural elements include the scale and proportion of room and facade features, indoor/outdoor connections, composition, and linking of various house elements. Holistic design Holistic design is an architectural design that will be comfortable for occupants and compatible with the surrounding environment. Lighting The jury assesses the integration and energy efficiency of electrical and natural light. Inspiration Inspiration is reflected in a design that inspires and delights Solar Decathlon visitors. Documentation Documentation includes drawings, a project manual, and an audiovisual architecture presentation that accurately reflect the constructed project on the competition site. Channel: Sci & Tech Channel
<urn:uuid:b11bb41a-1785-446d-9074-b1ad9e2f1187>
{ "dump": "CC-MAIN-2019-13", "url": "http://video.territorioscuola.com/video/20352/team-new-jerseys-solar-decathlon-2011-architecture-audiovisual-presentation/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202572.7/warc/CC-MAIN-20190321213516-20190321235516-00160.warc.gz", "language": "en", "language_score": 0.8981589078903198, "token_count": 173, "score": 2.90625, "int_score": 3 }
40 years ago, on 27 June 1980, Itavia Flight 870 (IH 870, AJ 421), a McDonnell Douglas DC-9 (I-TIGI) passenger jet en route from Bologna to Palermo, Italy, crashed into the Tyrrhenian Sea between the islands of Ponza and Ustica, killing all 81 people on board. On 27 June 1980 at 20:08 CEST, the plane departed from Bologna for a scheduled service to Palermo, Sicily. With 77 passengers aboard, Captain Domenico Gatti and First Officer Enzo Fontana were at the controls, with two flight attendants. The flight was designated IH 870 by air traffic control, while the military radar system used AJ 421. Contact was lost shortly after the last message from the aircraft was received at 20:37, giving its position over the Tyrrhenian Sea near the island of Ustica, about 120 kilometres (70 mi) southwest of Naples. Floating wreckage and bodies were later found in the area. There were no survivors among the 81 people on board. The disaster led to numerous investigations, legal actions and accusations, and continues to be a source of controversy, including claims of conspiracy by the Italian government and others. The cause of the tragedy remains one of the Italy’s most enduring mysteries and there was a painful reminder recently that the case has still to be resolved when the stricken plane made its final journey back home to Bologna. When the passenger jet crashed, the immediate theory was that it was a tragic accident caused by some kind of mechanical or structural failure. Then there was the suggestion that terrorists could have planted a bomb, although that theory was rejected, and in 1999 an exhaustive investigation by Judge Rosario Priore, one of Italy’s most respected legal figures and an expert on terrorism cases, gave the definitive version of what happened. He concluded that the plane had probably been caught in a dogfight between NATO jetfighters (in the area there would be US, French, Belgian jets) and Libyan MiGs. On 18 July 1980, 21 days after the Aerolinee Itavia Flight 870 incident, the wreckage of a Libyan MiG-23, along with its dead pilot, was found in the Sila Mountains in Castelsilano, Calabria, southern Italy. On 23 January 2013, Italy’s top criminal court ruled that there was “abundantly” clear evidence that the flight was brought down by a missile during a dogfight between Libyan and NATO fighter jets, but the perpetrators are still missing. Even today, 40 years after the accident, there is no official truth on how the events unfolded. For more infos check the site (in italian): www.stragi80.it/ Full wikipedia article (in english): www.en.wikipedia.org/wiki/Itavia_Flight_870
<urn:uuid:f27dc290-cb0f-4ac3-83e3-268b8e04ec84>
{ "dump": "CC-MAIN-2020-29", "url": "https://1buv.com/looking-for-the-truth-since-1980-itamilradar/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655888561.21/warc/CC-MAIN-20200705184325-20200705214325-00151.warc.gz", "language": "en", "language_score": 0.9706996083259583, "token_count": 606, "score": 2.734375, "int_score": 3 }
Fr.: pression de radiation The → momentum carried by → photons to a surface exposed to → electromagnetic radiation. Stellar radiation pressure on big and massive objects is insignificant, but it has considerable effects on → gas and → dust particles. Radiation pressure is particularly important for → massive stars. See, for example, → Eddington limit, → radiation-driven wind , and → radiation-driven implosion. The → solar radiation pressure is also at the origin of various physical phenomena, e.g. → gas tails in → comets and → Poynting-Robertson effect. solar radiation pressure fešâr-e tâbeš xoršid (#) Fr.: pression du rayonnement solaire
<urn:uuid:831a006b-c1b2-4335-915a-07d1a6a9042a>
{ "dump": "CC-MAIN-2020-10", "url": "http://dictionary.obspm.fr/?showAll=1&formSearchTextfield=radiation+pressure", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875143505.60/warc/CC-MAIN-20200218025323-20200218055323-00349.warc.gz", "language": "en", "language_score": 0.8429524898529053, "token_count": 153, "score": 3.28125, "int_score": 3 }
Rumored Buzz on Hearing Aid Machine Responsible for the ear, likewise referred to as BTE, hearing aids are by far one of the most generally used style of electronic hearing aid. These listening device are actually likewise what the majority of people photo when hearing assistances are mentioned. The electronic devices which create a BTE listening device functionality are housed in a plastic instance which matches behind the ear as well as possesses a cylinder that connects this to an ear mold and mildew which matches in the ear channel. They are actually made to suit the whole entire sphere from hearing reductions, coming from the mild to the extreme. They are more noticeable after that listening to assistances that fit entirely in the ear canal, they possess an amount from perks that appeal to a wide range from hearing reduced people. Furthermore, BTE listening device been available in an amount of dimensions, shades as well as forms. Some responsible for the ear models are actually a lot less obvious then others. Due to the fact that responsible for the ear hearing help are actually larger after that their entirely in the canal, or even CIC, counterparts, they can even more quickly house a bigger amp and a lot more powerful electric battery and also therefore might be particularly useful to people along with an extra intense hearing reduction. BTE listening device are actually likewise rather functional during that they happen in one of the most conventional analog design in addition to in the lately popularized digitally powered style of listening device. When financial restraints are a problem, responsible for the ear tools certainly triumph over listening device which fit totally in the ear canal. Because of their larger size, other teams from individuals to which BTE listening device have even more i was reading this charm then CIC designs include the aged, joint inflammation victims as well as others with fine electric motor management handicaps as well as associated issues. Because CIC models demand the wearing of a heavier tool in the canal after that just the light in weight ear mold fastened to BTE hearing help, there usually tends to be a lot less ear canal annoyance with the previous. In the late 1800s the very first commercially created listening device were actually copyrighted as well as became on call to the community. The 1st behind the ear hearing help loomed over fifty years earlier. Prior to this, hearing assistances were primarily amplifiers used someplace on the physical body and these were costly and also heavy, due partially to quick electric battery intake. With the arrival from the much smaller joint transistor in 1952, extensive BTE listening devices usage ended up being additional from a fact. As a result of to improvements in the modern technology from circuitry,1964 saw one more upsurge in operation of BTE devices and also using body system used hearing assistances fell to a lot less at that point twenty per-cent. Through 1972 prototypes for hearing aids which might be actually programmed to a range from listening circumstances, were being actually made. The complying with twenty years showed ongoing improvements as well as innovations in electronic hearing aid technology. Amount managements were actually contributed to the majority of behind the ear gadgets in the 1990s and digital hearing help started appearing in the mid nineties. There has actually been carried on new kid on the blocks in the listening devices planet ever since such as remanufactured listening devices, disposable hearing help and over-the-counter listening device. Which understands just what the future of responsible for the ear hearing help modern technology keeps, the options are never-ending Behind the ear, additionally known as BTE, listening to assistances are much and also away the very most commonly utilized style of hearing help. These hearing assistances are likewise exactly what most individuals photo when listening to aids are pointed out. The electronic devices which create a BTE hearing help functionality are housed in a plastic situation which matches responsible for the ear and also has a tube that links this to an ear mold and mildew which fits in the ear canal. There has been proceeded brand-new landings in the hearing assistance planet because after that such as remanufactured hearing help, non reusable hearing help as well as over the counter hearing help.
<urn:uuid:049d66d8-7ac2-4442-81d3-41a200ee7260>
{ "dump": "CC-MAIN-2018-47", "url": "http://riveraypgs.alltdesign.com/rumored-buzz-on-hearing-aid-machine-8883955", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039744320.70/warc/CC-MAIN-20181118073231-20181118095231-00147.warc.gz", "language": "en", "language_score": 0.9738895893096924, "token_count": 837, "score": 2.53125, "int_score": 3 }
Its is bad design…. How can we design for something we cannot measure? A wireless design needs to account for signal attenuation, one of the big design requirements is to account for the loss caused by walls, windows etc. We do this by measure the signal loss and accounting for it in our designs. How would one measure this the objects that are located in a false ceiling…? Well it would be extremely difficult to safely, accurately and not to mention costly to measure the HVAC ducts etc located in false ceilings, especially when the everything is already in place, as well how do you measure the impact of reflections etc??? Impact to coverage and efficiency of the WLAN…. In a typical corporate office multi level building the false ceilings can contain, HVAC ducting, water pipes, metal cable trays etc, increasing reflections and sufficiently reducing signal propagation. Reduced coverage will result in extra AP’s having to be used to account for the coverage holes ,which result in an increase to overall cost. Increased multi path caused by reflections can decrease overall throughput for less capable devices. Can cause AP radios to reduce power to account for the reflected signal being detected by the radio elements. Not good when design is based on RRM AP’s can produce a great deal of heat (Cisco 4802) false ceilings are usually hot, contain dust and other material when combined can become a fire hazard. As mentioned above AP’s and false ceilings can be rather hot, when AP’s are installed in false ceiling it is usually on some metal frame or structure, the increase heat can cause AP’s to overheat or fail.
<urn:uuid:13829308-4ae9-4ea8-9e15-76003c4a331f>
{ "dump": "CC-MAIN-2022-49", "url": "https://wifiburns.com/2019/12/17/reason-why-we-do-not-recommend-installing-aps-in-false-ceilings/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710916.70/warc/CC-MAIN-20221202215443-20221203005443-00097.warc.gz", "language": "en", "language_score": 0.9548325538635254, "token_count": 348, "score": 2.78125, "int_score": 3 }
Protesters in Wisconsin torched the inventory of a used car lot, destroyed a municipal truck and smashed the doors and windows of a public library, to protest the death of a man who resisted the police and tried to open the door to his car while being pursued. Protesters in Portland have continued to throw rocks at police, vandalize property, burn down buildings and block public access to streets for months. On 16 August, they attacked a vehicle whose driver was lawfully operating on the street, chased it and kicked the driver in the face after he crashed. Similar violence against property and people has taken place in Seattle, Chicago, Lafayette and across the country. There has been rioting for months. Many people do not want to acknowledge the extent of the looting and rioting. Many media outlets support the George Floyd protests and do not want to risk discrediting the cause of defunding or reforming the police. Others fear being labeled racist or right-wing. But the refusal to condemn rioting is also born of the sincere belief that destroying property is a justifiable—or, at least, excusable—response to police brutality. Many have cited Martin Luther King’s remark that “rioting is the language of the unheard.” Some argue that, since people are dying, we shouldn’t be concerned about property damage. “These protests are more than catharsis; they are an imperfect expression of grief,” Minneapolis teacher Christopher Mah comments in the Minnpost. But these justifications fall apart upon closer analysis. The Choi family, who operate a jewelry store in Miami, had nothing whatsoever to do with the killing of George Floyd or anyone else, and yet their store was burgled and trashed. One tragedy does not diminish another tragedy. Hurley Taylor, operator of Tar Heel Sneakers, has every right to be angry that his merchandise has been stolen, along with his collection of jerseys. The fact that George Floyd died doesn’t make the damage to so many people’s livelihoods caused by rioters any less of a problem for those people and their cities. Nor does attacking an uninvolved person help bring about justice. Apologists for rioting often dismiss it as mere violence against property—as if people did not need to work and earn money in order to afford the food and shelter that sustains them, all of which is made more difficult when one’s place of business has been destroyed. Most of the small businesses that were targeted either lack insurance or have insufficient insurance to cover the damage. And the violence is not limited to property damage. As Portland Mayor Ted Wheeler commented, “When you commit arson with an accelerant in an attempt to burn down a building that is occupied by people who you have intentionally trapped inside, you are not demonstrating, you are attempting to commit murder.” The violence, moreover, is increasing in severity. Over the last week of August, street fights involving guns between protesters and counterprotesters resulted in three homicides. Supporters of the rioters have justified vandalism as a way of venting frustrations and dismissed looting as unimportant. They will now have to justify pulling people out of cars and kicking them in the face. They seem to think that people on the street are incapable of controlling themselves or acting in accordance with social and moral standards. These apologetics for social deviancy are happening across American society and across the political spectrum. The social justice activists who justify resisting arrest and stealing from small businesses are on the left, but the right is justifying obstructing justice, lying to law enforcement officers and looting the Treasury for the personal benefit of the politicians they happen to support. Depravity is a bipartisan affair. The Democrats have their Bill Clintons and their campaigns to broaden sexual norms. The Republicans have their Donald Trumps, who have affairs with porn stars. And Jeffrey Epstein liked to hang out with both. Many Americans have too much tolerance for immoral behavior. Some excuse college-age rapists because “boys will be boys.” Some justify assault and battery, even the taking of a taser by a drunk-driving suspect on the grounds that no one is perfect. This is symptomatic of social decay. America’s moral decay has many causes. Two of the most important of these are the ideas that no one should be judged and that everyone’s opinion—even on matters of fact—is equally valid. It is fashionable to stigmatize successful people with expertise as elites—particularly if they rightly believe that they are more qualified to offer opinions on certain issues than ordinary people. Much of this anti-intellectualism has developed, ironically, in academia. As Kurt Andersen writes in Fantasyland: How America Went Haywire, cultural relativists “convinced [themselves] that all knowledge and especially science are merely self-serving opinions or myths,” while “among the gatekeepers in academia and media and government and politics charged with determining what’s factually true and what’s iffy and false, there has been much more capitulation, voluntary surrenders to the barbarians at their gates.” The tearing down of scientific and moral standards impacts America’s body politic, both our political parties and public health. Much of the focus has been on trite culture wars issues that impact very few people. (Less than 1 percent of Americans identify as trans, despite the controversies on daytime talk shows and internet forums, but 10 percent of Americans think vaccines cause autism, a belief that causes real sickness and death.) During the 2016 presidential campaign, supporters of Donald Trump chanted mindless, authoritarian slogans like lock her up at rallies and wore T-shirts with slogans like Trump that bitch! Yet those who pointed out that some Trump supporters (perhaps a “basket” of them) were hateful and uncivil were derided by the mainstream media—the supposed gatekeeper that has capitulated to mass populism—and political activists as haughty and evil for judging people. At the time, conservatives relished attacking liberals for upholding their values in opposition to Trump supporters who assaulted people at rallies, but now that very same reluctance to uphold moral values is preventing Americans from condemning criminals and rioters. Noncompliance with police orders does not warrant a death sentence, we are told, and nor does property violence. But should defending one’s property—refusing to walk away and let gangsters steal everything—warrant a death sentence for the owner of a business? An elderly man was attacked in Wisconsin just for trying to put out a fire at one of the stores the protesters had looted. Apologists often point out that suspects are unarmed, though police do not always know that at the time. But some apologists are also calling for armed suspects to be able to run free. In Lafayette, a criminal who was carrying a knife and causing a public disturbance in a parking lot was shot as he was entering a gas station, knife in hand. Time magazine, which claims his death sparked outrage, describes the situation: Lafayette Police Department officers responded to a disturbance and found a man, 31-year-old Lafayette resident Trayford Pellerin, allegedly armed with a knife in a convenience store’s parking lot, the state police said. The officers tried to approach Pellerin, but he ran away, and the officers followed him on foot as he walked from the convenience store, which was at a Circle K gas station, to a Shell gas station, according to the Lafayette Daily Advertiser. The officers shot him with tasers, but didn’t manage to stop him, the State Police said … A woman who filmed the shooting, Rickasha Montgomery, 18, confirmed to the Lafayette Daily Advertiser that she watched the officers tase the man, and that he had been carrying a knife. The officers had ordered the man to get to the ground, and shot him when he tried to go inside the convenience store, Montgomery said. If you were working in that gas station, would you want a violent criminal with a knife running around? When we evaluate what we want from our government, law enforcement, society and the country at large, we must consider what the average upstanding, moral citizen would want. We must try to create a better society with higher values, not dumb down our norms and values to meet the standards of deadbeats, criminals and tyrants. Blameless people want to have the right to drive on their roads and fill their cars with gas, not be blocked by economic terrorists surrounding a privately owned gas station in a self-styled form of protest. They want to be able to walk the streets without fear of either being beaten, murdered or infected with coronavirus by science-denying lunatics who refuse to wear a mask because they believe masks are effete or linked to Bill Gates. Enlightened people want a president who makes handwritten notes on his carefully crafted speeches, not a president who rants wildly about ramps, showerheads and injecting oneself with disinfectant and whose contributions to the written record include angry all-caps diatribes full of misspellings. These rational people should not be shamed for their reasonable desires and expectations. Some might disagree with me for condemning people who engage in violence and refuse to follow just laws. But in tearing down all standards of moral and honorable behavior, we deny ourselves the standards by which to condemn racism, corruption and other immoral acts. This is one of the reasons Donald Trump was elected in the first place. This hurts all of us.
<urn:uuid:571e6922-b33b-4931-bd2f-d7c8fcead219>
{ "dump": "CC-MAIN-2021-17", "url": "https://areomagazine.com/2020/09/03/the-bipartisan-decay-of-american-culture/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039610090.97/warc/CC-MAIN-20210422130245-20210422160245-00623.warc.gz", "language": "en", "language_score": 0.9710913300514221, "token_count": 1963, "score": 2.546875, "int_score": 3 }
The SAFEWATER research programme seeks to tackle a global challenge by looking at clean water solutions and the development of smart devices to quickly tell if water is safe to drink. £4.7 million of the funding will be provided by the Global Challenges Research Fund (GCRF) Research Councils UK Collective Fund, and the project will see Ulster University join forces with other partners across the globe to conduct the research. This includes academics in South America and NGOs already working in Colombia and Mexico. Lead researcher, Professor Tony Byrne from Ulster University, said: “This is a very significant project which will play a critical role in helping to address one of the greatest global issues the developing world is facing today.” “In the developed world, we take it for granted that our drinking water is safe yet nearly 25 per cent of the global population drink water that is not safe because of contamination that can cause deadly disease. Clean water saves lives and while we know how to make water safe to drink the cost of doing so may be too high as nearly half the world’s population live on less than £2 per day.” “Ulster University will lead on this cutting-edge research which will form part of the SAFEWATER project. It will involve academics from the University of Sao Paulo Brazil and the University of Medellin Colombia, along with the NGOs Fundacion Cantaro Azul Mexico and CTA Colombia who are already working with, and trusted by, the local people. “Through the NGOs, local people will be involved in the development of clean water solutions from the beginning of the project so the technologies will meet their needs. The project will make a real impact on the ground by bringing direct benefits to the lives of people living in developing countries.” “Ulster University is a world leader in research which delivers across a number of priority disciplines. This work will further develop our links with international partners and reinforce our ability to deliver research that makes a tangible impact to society, both locally and internationally.”
<urn:uuid:0fd70b4a-e3ac-44c9-babb-576c4410aaf7>
{ "dump": "CC-MAIN-2023-23", "url": "https://www.ulster.ac.uk/news/2017/july/6-million-research-project-will-pioneer-safe-water-solutions-for-the-developing-world", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656788.77/warc/CC-MAIN-20230609164851-20230609194851-00666.warc.gz", "language": "en", "language_score": 0.9409650564193726, "token_count": 419, "score": 2.703125, "int_score": 3 }
We have a poorly nurse in the building today. Our very own Steph is complaining (sorry I mean airing her views) about erosion on her teeth. Erosion is usually seen on the inside surfaces of our front teeth. There are several different factors that contribute towards tooth erosion, and I definately know what is causing Stephs……………………. Fizzy pop!! Erosion is almost always associated with high acidity. Watching what we eat and drink can help reduce tooth erosion dramatically. Often, frequent sipping of carbonated drinks or regular consumption of citrus fruits/drinks can cause tooth loss. Another factor is acid reflux. Regurgitation of stomach acids can cause the tooth to wear, sometimes without the patient being very aware of it. The features of tooth erosion can be a smooth, polished appearance to the tooth, or the shape of the tooth is lost or shallow depressions appear. We are all guilty of “grazing” on our can of fizzy drink at our desks, and children and teenagers are especially prone to sipping on the fizzy stuff, so please be aware of what you, friends and family are doing simply from drinking. If you can’t break the habit or change routines, good old H2o is great for rinsing out after consuming acidic or fizzy food/drinks. The water helps neutralise the mouth. Sugar free gum is also great for this. If you want to discuss Tooth erosion with your dentist, Hygienist or one of our nurses then just ask! We are here to help 😉
<urn:uuid:6cfa586c-3f79-4935-9f34-0c0bbf1c3c2d>
{ "dump": "CC-MAIN-2019-39", "url": "https://www.woodboroughhouse.com/blog/acid-attack/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514577478.95/warc/CC-MAIN-20190923172009-20190923194009-00048.warc.gz", "language": "en", "language_score": 0.9532368183135986, "token_count": 322, "score": 3.21875, "int_score": 3 }
This is something you are likely to hear from your children a number of times over the course of the summer holidays. I think children today more than any other generation before are so used to structured after school activities or sitting indoors in front of a screen that they literally don’t know how to keep themselves busy. Parents mistakenly think it is their job and responsibility to keep their kids happy and occupied but children have to learn how to entertain themselves. Unstructured or down time is actually very important for children’s mental health. Your main role as a parent is to set your child up for life as an adult and prepare them to be part of society. Children need to learn to do things for themselves and when they become adults will need to be skilled at managing their time (including leisure time) and pursuing interests that contribute to their happiness. The learning starts now in childhood. Why is unstructured time so important? - Kids learn how to be alone and actually have time to just be, think and contemplate life so they are comfortable in their own company. - Creativity and imagination is more likely to develop if they are not in front a screen and need to occupy themselves. For my younger 2 daughters despite having lots of toys and games at home, their favourite activities are role play (mums and dads, doctors, restaurants) and drawing. - It’s a great advantage for children to have at least one passion, something they have chosen that they really enjoy and work hard at. Without unstructured time they have little opportunity to develop this. For my eldest child it’s music, my second art and the third gymnastics. My youngest has yet to find hers. - Being bored encourages self -reliance How can parents respond when their child is ‘bored’? - Firstly establish whether they are saying this because they are craving your attention. Make sure you are scheduling bursts of ‘special time’ with each child and opportunities to connect with them. - Encourage your child to brainstorm activities they can do when they feel bored and perhaps contribute your own ideas. If they are old enough encourage your child to write the ideas down so they can refer to them next time they are bored. - Limit screen time so they have to get into the habit of finding something else to do. Screens and particularly games on screens are purposely designed to be really engaging and addictive, providing a boost of dopamine so children want to use them and every other activity seems less exciting. - For younger children I love Sean Covey’s book the 7 Habits of Happy Kids with the story about Sammy squirrel and it being his responsibility to make fun for himself. Just to be clear it is mainly your child’s responsibility to keep themselves busy and not yours. You need to give them the experience of being bored and the skills and ideas to handle that feeling rather than just trying to avoid it.
<urn:uuid:a9287a12-e49b-4121-a84c-f3fa27fa183f>
{ "dump": "CC-MAIN-2018-22", "url": "http://www.educatingmatters.co.uk/blog/handling-boredom/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794864725.4/warc/CC-MAIN-20180522112148-20180522132148-00245.warc.gz", "language": "en", "language_score": 0.9731622934341431, "token_count": 603, "score": 3.25, "int_score": 3 }
As actuaries, we are concerned with assessing different risks and quantifying the possible effects. We often hear about the risks involved in carrying out a certain action, or the risks associated with a new business strategy. But what about the wider-scale risks that have the potential to affect everyone? The World Economic Forum (WEF) published a report at the start of the year detailing the major global risks of 2014. These risks spanned from environmental and climate change issues to global economic collapses. We have picked out a few that are relevant to the insurance industry and brought in some external research that we have carried out on the matters. Technological – Cybergeddon The growing dependence on the internet has stemmed a new global threat with the potential of mass systemic failure, the so-called 'cybergeddon'. The threat of a cyber breach appears to be spiralling upward on a daily basis. Technology that provided the perpetual increase in productivity could also be the very poison to destroy it. News reports are showing that anyone from online shoppers to global corporations are being targeted. Research from Zurich’s Beyond Data Breaches report state that the year 2013 was the worst thus far in terms of cyber attacks, with 740 million data files potentially stolen or viewed globally. One of the most serious cyber attacks of this year was the Heartbleed bug that was discovered in April 2014. Heartbleed is found in software called Open SSl, and allows hackers to steal data from computers. Another major cyber incident was the CryptoLocker virus, that was first seen in 2013. This virus is a sophisticated piece of ransomware that targets computers running Microsoft Windows via infected email attachments or websites. The virus encrypts the files on the computer, destroying all data. Newly launched antivirus programmes now detect the virus, but users should nonetheless maintain wariness. A cyber threat must not be narrowly viewed as the theft of customer data. The threat stretches far wider to a global domino effect caused by the interconnectedness of the internet. Almost everything from infrastructure to supply chains are dependent on the internet and therefore a global shock on the scale of the 2008 collapse of the financial system is a possibility. If a major cloud data storage provider were to fail analogous to that of Northern Rock, the knock-on effects could be immense. The insurance industry is very much aware of this issue and is developing new products to meet the cyber protection needs of the market. The cyber insurance market is still an immature market however, and with limited historical data it is difficult to assess how protected society truly is from a cybergeddon. Economic - Fiscal Crises The risk that is most likely to have a global scale impact in the next ten years, according to the WEF report, is the growing income gap between the richest and poorest citizens. Fiscal crises and unemployment are also among the highest rated risks in the report, all of which tend to signal an economic recession. This can cause a whole range of issues for the insurance industry. Recession sparks an increase in fraudulent insurance claims. The ABI detected a record total of £1.3 billion of insurance fraud in 2013, which is a rise of 18% from 2012. These fraudulent claims range from entirely spurious incidents to exaggerated sustained injuries and are seen within any sector, from pet insurance to property or motor insurance. Organised gangs are often behind these events, which cost each UK household an extra £50 in premiums per year. An increase in demand for catastrophe bonds is also seen during times of poor market conditions, as investors look to improve returns. Near zero interest rates, volatile markets and the global economic slowdown all force investors to seek alternative forms of investment. Catastrophe bonds are a form of insurance-linked security that transfer the risk related to certain natural disasters from an issuer to the investors. This form of investment is relatively 'recession proof' in the sense that the occurrence of a natural catastrophe is uncorrelated to the performance of the economy. 2013 saw a 22% increase in the global issuance of catastrophe bonds, to $7.1 billion, according to Fitch. The return obtained on catastrophe bonds has, however, fallen recently as a result of the increase in demand. Environmental - Natural catastrophes Natural catastrophes are a phenomenon that have been occurring throughout history. From cyclones to droughts these events have been affecting mankind on a major scale. The daunting prospect with regards to natural disasters is that they have the potential to wipe out intelligent life eternally, and there is little that humanity can do to prevent them. The WEF report cites the 2011 tsunami at the Fukushima nuclear power plant in Japan as an example. An earthquake triggered the tsunami that resulted in a meltdown of three of the plant’s nuclear reactors, resulting in a large release of radioactive materials. The clean-up process is expected to take decades. The disaster was a combination of natural and man-made forces, and the argument within the report is that a combination on this scale could conceivably trigger existential risks for life on Earth. The magnitude of the losses incurred from natural disasters is difficult to predict and therefore the insurance industry has a vital role to play in aiding the recovery of communities. The insurance industry can help to advise regions on how to prepare for and even prevent an anticipated event. Global insured losses from catastrophes in 2013 were $45 billion, according to research by Swiss Re. Large contributions of this were the severe storms in Europe and super-typhoon Haiyan in the Philippines. The risks faced by society today may require greater attention due to the interconnectedness of the world that we live in. Unlikely incidents, such as 1-in-200 year events are no longer that remote or unimaginable. Individuals may need to be more creative when envisioning the effects of combinations of events occurring simultaneously. Insurance companies will certainly play a role in managing or preventing risks for their clients and their products will have to evolve to meet the market needs for the ever more complex risks.
<urn:uuid:9d26c87c-4e6e-4ac7-b5e1-12dd5e67753e>
{ "dump": "CC-MAIN-2021-49", "url": "https://www.barnett-waddingham.co.uk/comment-insight/blog/cybergeddon-fiscal-crises-and-natural-catastrophes/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964362969.51/warc/CC-MAIN-20211204094103-20211204124103-00143.warc.gz", "language": "en", "language_score": 0.9523943662643433, "token_count": 1220, "score": 2.53125, "int_score": 3 }
Any self-respecting pediatric nutritionist will tell you that breast milk is a key ingredient to having a healthy baby. While some may want to ignore this advice most just do not understand the “why” behind the advice. Understanding breast milk itself can go a long way in improving breastfeeding patterns all around the world. With the introduction of baby formula and other toddler foods most mothers assume that this is a perfect replacement to breast milk. Dead wrong. The truth is that there is nothing quite like breast milk. From how it is made to how it affects the baby’s development, breast milk is quite the a fascinating toddler’s food. All mothers need is to understand breast milk both for their well being and that of their kids. 1. How breast milk is made in the breasts To produce breast milk, mothers melt their own body fat. Are you with me? We literally dissolve parts of ourselves, starting with gluteal-femoral fat, aka our butts, and turn it into liquid to feed our babies. But breast-feeding is more than being a good mom. And breast milk is much more than food: its potent medicine and, simultaneously, a powerful medium of communication between mothers and their babies. It’s astonishing. And it should be—the recipe for mother’s milk is one that female bodies have been developing for 300 million years. 2. Some kids need it more than others Many new mothers have wondered exactly how long it is that they should breast feed and the simple answer to that is: Breast-feeding leads to better overall health outcomes for children, which is why the World Health Organization and the American Academy of Paediatrics recommend that babies be exclusively breast-fed for a minimum of six months. Those outcomes, though, are relative: A premature infant in the neonatal intensive-care unit or a baby growing up in a rural African village with a high rate of infectious disease and no access to clean water will benefit significantly more from breast milk over artificial milk, called formula, than a healthy, full-term baby born in a modern Seattle hospital. It is therefore quite clear that breast milk is a necessity for your toddler rather than an option. The world would be a healthier place if all mothers would breastfeed their babies for the recommended duration after birth. 3. Breast milk bolsters your kid’s IQ Does it really lead to better health and higher intelligence quotient for your kids? We’re also told that breast-feeding leads to babies with higher IQs and lower rates of childhood obesity than their formula-fed counterparts. I understand why people find this appealing, but I don’t plan to raise my daughter to understand intelligence in terms of a single test score, or to measure health and beauty by body mass index. Surprisingly more and more mothers are breastfeeding just because of these two facts. While no one would blame them for it, mothers should be more objective about breastfeeding that they currently are. More compelling to me are the straightforward facts about breast milk: It contains all the vitamins and nutrients a baby needs in the first six months of life (breast-fed babies don’t even need to drink water, milk provides all the necessary hydration), and it has many germ- and disease-fighting substances that help protect a baby from illness. Oh, also: The nutritional and immunological components of breast milk change every day, according to the specific, individual needs of a baby. Yes, that’s right, and I will explain how it works in a minute. Not nearly enough information is provided by doctors, lactation counselors, or the internet about this mind-blowing characteristic of milk. This lack of information is partially why a lot of the mothers today are so clueless about breast milk. More needs to be done to get all this information out there for all mothers to consume and hopefully put to good use. What vital nutrients are contained in breast milk. so what exactly goes into breast milk that makes it so nutritious? Very little is understood about the composition of breast milk by the producer of the milk. Sure scientists and professionals have all the facts. These facts do not really help the mother or the baby if the mother is not aware of them. You can’t really use information you don’t have. This is probably why some women think of breast milk and baby formula as being equal. This could not be further from the truth. While manufacturers (bless their entrepreneurial souls) try to mimic breast milk, they are just not there yet. Whether they will ever get there is another question altogether The nutritional value of breast milk has been perfected over millions of years (if you believe in evolution) to meet baby’s every need. To expect scientist to replicate this in a few years is plain insanity. Nutritionally, breast milk is a complete and perfect food, an ideal combination of proteins, fat, carbohydrates, and nutrients. Colostrum, the thick golden liquid that first comes out of a woman’s breasts after giving birth (or sometimes weeks before, as many freaked-out moms-to-be will tell you) is engineered to be low in fat but high in carbohydrates and protein, making it quickly and easily digestible to newborns in urgent need of its contents. (It also has a laxative effect that helps a baby pass its momentous first poop, a terrifying black tar-like substance called meconium.) Mature breast milk, which typically comes in a few days after a woman has given birth, is 3 to 5 percent fat and holds an impressive list of minerals and vitamins: sodium, potassium, calcium, magnesium, phosphorous, and vitamins A, C, and E. Long chain fatty acids like DHA (an omega-3) and AA (an omega-6)—both critical to brain and nervous-system development—also abound in mother’s milk. Breast milk is very much alive This may sound far fetched but it does have some tiny and interesting microbes n it. And speaking of microbes, there’s a ton of them in breast milk. Human milk isn’t sterile—it’s very much alive, filled with good bacteria, much like yogurt and naturally fermented pickles and kefir, that keep our digestive systems functioning properly. So mother’s milk contains not only the bacteria necessary to help a baby break down food, but the food for the bacteria themselves to thrive. A breast-feeding mother isn’t keeping one organism alive—but actually hundreds of thousands of them. What it says about the mother You may be surprised to find out that breast milk actually depend on the mother, and not all milk will be the same. This goes down to the flavor and texture. Don’t believe me? What do the experts say? Like a glass of red wine, breast milk has a straightforward color and appearance, but it possesses subtleties in flavor that reflect its terroir—the mother’s body. And it turns out that like any great dish of food, mother’s milk holds a variety of aromas, flavors, and textures. The flavors of breast milk are as dynamic as a mother’s diet. In the 1970s, researchers at the University of Manitoba obtained samples of breast milk from lactating women and had them evaluated by a trained panel for taste, quality of sweetness, and texture. There were variations across all samples in all categories, most notably that the milk of a woman who had recently eaten spicy food was described by tasters as being “hot” and “peppery.” It is medicinal When you tell most new moms that their breast milk can be of medicinal value to their kids, they will often give you a blank stare. Some may even tell you straight to your face, “look I get you are trying to prove that it is for the good of the kid but I think you are getting carried away here.” But is it really getting carried away or can breast milk really cure and if so how exactly does this happen? According to Hinde, when a baby suckles at its mother’s breast, a vacuum is created. Within that vacuum, the infant’s saliva is sucked back into the mother’s nipple, where receptors in her mammary gland read its signals. This “baby spit backwash,” as she delightfully describes it, contains information about the baby’s immune status. Everything scientists know about physiology indicates that baby spit backwash is one of the ways that breast milk adjusts its immunological composition. If the mammary gland receptors detect the presence of pathogens, they compel the mother’s body to produce antibodies to fight it, and those antibodies travel through breast milk back into the baby’s body, where they target the infection. Women should save all that money they spend on baby formula and go for the good stuff that they get for free. While you may be worried about boobs sagging, don’t put that on the baby. Age and gravity will get you eventually. It will feel better knowing that you did all you could for your baby in the end. Did you enjoy this article? Read our other articles on breastfeeding:
<urn:uuid:8099319e-68ef-4235-8159-a7e7922f106e>
{ "dump": "CC-MAIN-2017-22", "url": "http://www.babycaremag.com/health-and-nutrition/7-amazing-facts-about-breast-milk-every-mom-needs-to-know/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607849.21/warc/CC-MAIN-20170524173007-20170524193007-00223.warc.gz", "language": "en", "language_score": 0.9603585600852966, "token_count": 1924, "score": 2.75, "int_score": 3 }
SHAIK LALBEE, 29 August, 2020 Capital punishment, also named death penalty, execution of a convicted inmate sentenced to death upon prosecution by a court of law. Capital punishment should be differentiated from extrajudicial killings that are carried out without adequate legal procedure. The word death sentence is often used interchangeably with capital punishment, but execution is not necessarily accompanied by enforcement of the sentence (even though it is enforced on appeal), leading to the likelihood of moving to life imprisonment.The word “capital punishment” reflects the severest type of punishment. While the meaning and nature of these offences vary from country to nation, state to state, age to age, the death penalty has often been the result of capital punishment. Capital punishment implies a death penalty by popular use in jurisprudence, criminology and penology. Human civilisation history reveals that capital punishment has not been discarded as a form of punishment during any period of time. Throughout the 7th century BCE, capital punishment for assassination, insurrection, robbery, and adultery was commonly used in ancient Greek legislation, though Plato maintained that it could be reserved exclusively for the incorrigible. This was often employed by the Romans for a wide variety of offences while civilians were removed during the empire for a brief period. Capitalpunishment is an anciently practiced punishment. Literally, there is no country without the practice of capital punishment. CAPITAL PUNISHMENT UNDER INDIAN LEGAL SYSTEM: “Capital Penalty” or “Death Penalty” is the highest standard of punishment given for upholding law and order in any community or democracy. But murdering another human being is no better than killing others in the name of justice. We will concentrate on doing away with the crime, not the criminal.This is awarded in India for the most serious of crimes. This is rewarded for misconduct and grievous offences. Article 21 states that no individual shall be deprived of the ‘right to life’ that is guaranteed to all Indian people. Article 72 of the Constitution of India authorizes the President to grant pardon, reprieves, parole or revocation of imprisonment or to revoke, remand or modify the sentence of any person convicted of an offence.Only the President is empowered to grant discretion in death penalty situations. If a prisoner is sentenced to death by the Sessions Court in a case, the High Court must confirm the conviction. If the convict’s appeal to the Supreme Court fails then he can lodge a ‘mercy petition’ with the Indian President. DEATH PENALITY CRIMES: The crimes such as - Murder, this is punishable by death as provided for in section 302 of the Indian Penal Code, 1860. - Rape, A person who inflicts injuries in a death-causing sexual assault or is left in a “persistent vegetative state” can be punished with death under the 2013 Criminal Law Act. - Kidnap or abduction, Section 364A of the Indian Penal Code, 1860, specifies that abduction that does not result in murder is a crime punishable by execution. - Treason, Any person who declares or tries to wage war against the government and encourages officers, troops or members of the Navy, Army, or Air Force to commit a mutiny shall be given the death penalty. - Drug dealing, dacoity with murder, espionage and military offense, a person who commits murder during an armed robbery is also punishable to the death penalty. If the murderer is killed, the kidnapping of the murderer for the money is punishable with death penalty. The involvement with organized crime, whether it leads to murder, is punishable by execution. Committing or helping another person to execute Sati is often punishable by the death penalty. The procedure of execution can be two types Hanging and Shooting.Only after a death sentence has been issued by a session trial court must a decision be drawn up by a High Court to finalize it. When certified by the High Court, the convicted person has the right to appeal the Supreme Court. If this is not practicable, or if the Supreme Court dismisses the appeal or declines to hear the petition, the person convicted may send a ‘Petition for Mercy’ to the President of India and the Governor of the State. According to India’s constitutional system, mercy petitioning the President is the last constitutional resort a prisoner may take when convicted by the law court. CLASS OF OFFENDERS EXCLUDED FROM CAPITAL PUNISHMENT: According to Indian law, there is no execution of a minor who is under 18 at the time of committing a felony, pregnant ladies, intellectually handicapped persons are excluded from capital punishment. IS CAPITAL PUNISHMENT CONSTITUTIONAL? India’s constitution grants every person a basic right to life subject to deprivation by the process defined by the statute, it has been claimed by abolitionists that the death penalty in its present nature breaches the right of the individual to live. There are several moral luminaries that contend that under Indian criminal laws the death penalty being maintained being detrimental to one’s right to live. In the case of Jagmohan Singh v State of U.P.the very first time the constitutionality of Capital Punishment has been questioned. Here the plaintiff opposed the death penalty on the grounds of violations of Sections 19 and 21.The Supreme Court held that the selection of death sentences is made in accordance with the law-setting procedure. It is observed that on the basis of circumstances and facts, nature of crime recorded during trial, the judge makes the choice between capital sentence and imprisonment of life. In Rajendra Prasad v. State of U.P.,the judge ruled that capital punishment should not be permissible until it had been established that the convict was harmful to society. The educated judge pleads the removal of the death penalty and has said that it will not be maintained for “white collar offences.” It was also established that the death sentence for the murder crime given under section 302 of the I.P.C. did not infringe the fundamental provision of the constitution. In Bachan Singh v. State of Punjab,it was clarified that the constitutional bench of the Supreme Court, in keeping with a just, fair and equitable process laid down by statute, accepted Article 21 as the privilege of the State to deprive a citizen of his freedom. In fact, the fundamental structure of the Constitution has not been abused by the death sentence for the murder offence provided under Section 302 I.P.C. The Supreme Court’s decision in Mithu vs. State of Punjab 1988 (3) SCC 607, notes that mandatory death sentence is unconstitutional. The Supreme Court, in the case of Machhi Singh v State of Punjab1983 SCR (3) 413, ruled that “the death penalty has a deterrence impact and serves a social function” and claimed that the death penalty is legally legitimate. It is obvious from a review of the above scenario that death penalty is deemed lawful in India, given the failure of many legislative efforts to abolish the death penalty in India, and is prevalent in India to this day, as is evident from the recent scenario of Ajmalameerkasab, which was executed in 2012. When the offender gets a death sentence it is more than just a retribution, in the name of justice and rule we destroy or kill a human. Killing an individual is unethical, and demonstrates a lack of regard for human existence. Yet seeking the death penalty doesn’t mean anyone loves the murderer. When a death sentence is enforced, it removes the possibility of progress that could have improved a person’s existence. Sometimes capital punishment is morally right, because it helps the government. It protects the public. The country’s people will cry out about their rights. Capital punishment is conducted in a civilized manner. This is the only penalty the offences done are comparable. Indian penal code 1860, section 302. 1973 SCR (2) 541 1979 SCR (3) 78 (1980) 2 SCC 684
<urn:uuid:a189aeac-ffb3-4942-9da4-ef25cc86b379>
{ "dump": "CC-MAIN-2022-33", "url": "https://sociallawstoday.com/capital-punishment-in-india/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00756.warc.gz", "language": "en", "language_score": 0.9511258602142334, "token_count": 1708, "score": 3.796875, "int_score": 4 }
The Portland Observatory Learn about the history and use of this Portland landmark. Lessons explore history, communications, science, and museum visits, among other topics. Come inside! Longfellow & the Forging of American Identity Thirty teachers from Maine and Massachusetts have undertaken an intensive two year study of Henry Wadsworth Longfellow's life and poetry through a program created by the Maine Humanities Council with funding from the National Endowment for the Humanities. The program–Longfellow and the Forging of American Identity–is designed to bring the life and work of Maine's Henry Wadsworth Longfellow back into the curriculum–in English, Social Studies, American Studies, Art, Music, and other subjects. See their work! Using Source Documents in the Classroom This lesson plan introduces teachers how to use a source document and the Maine Memory Network in classrooms. It can be used in any grade and will require one or more source documents, which can be found by searching the Maine Memory Network for the topic of your choice. Download the lesson plan (PDF, 16K) Mapping Portland, 1690 - 1900 Historical maps, like all historical documents, can be interpreted in many ways. This lesson plan uses five maps to trace the development of Portland from its earliest settlements. Interested in sharing a lesson plan that you've created?
<urn:uuid:bc8b13bb-4f6e-4141-9d4a-11991dbe37e0>
{ "dump": "CC-MAIN-2016-44", "url": "http://www.mainememory.net/schools/schools_lessonplans.shtml", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718296.19/warc/CC-MAIN-20161020183838-00441-ip-10-171-6-4.ec2.internal.warc.gz", "language": "en", "language_score": 0.8861379027366638, "token_count": 277, "score": 3.34375, "int_score": 3 }
THE HOME OF MARY PHILIPSE, IN WHOM GEORGE WASHINGTON WAS INTERESTED At first glance one would not think that the name Yonkers was derived very directly from the name of the first settlers of the region, de Jonkheer Adriaen Van der Donck. When, in 1646, he secured a large tract of land bounded by the Hudson, the Bronx, and Spuyten Duyvil Creek, this was called ” Colen Donck ” (Donck’s Colony) or ” De Jonkheer’s” (the Young Lord’s). As the Dutch “j” is pronounced “y,” the transition from Jonkheers to Yonkers was easy. On September 29, 1672, after the death of the original owner, 7,708 acres of the princely estate were sold to three men, of whom Frederick Philipse (originally Ffreric Vlypse) was one. A few years later Philipse bought out the heirs of the other two purchasers, and added to his holdings by further purchases from his countrymen and from the Indians. On June 12, 1693, he was permitted to call himself lord of the Manor of Philipsburgh. From that day the carpenter from Fries-land, who had grown so rich that he was called ” the Dutch millionaire,” lived in state in the house he had begun in 1682. This lord of the manor became still more important in consequence of the acceptance of his offer to build a bridge over Spuyt-den-duyvil, or ” Spiting Devil ” Creek, when the city declined to do so for lack of funds. The deed given to him stated that he had ” power and authority to erect a bridge over the water or river commonly called Spiten devil ferry or Paparimeno, and to receive toll from all passengers and drovers of cattle that shall pass thereon, according to rates hereinafter mentioned.” This bridge, which was called Kings-bridge, was a great source of revenue until 1713, when it was removed to the present site. Then tolls were charged until 1759, or, nominally, until 1779. Part of the Manor House was used as a trading post. Everything Philipse handled seemed to turn into gold. All his ventures prospered. It was whispered that some of these ventures were more than a little shady, that he had dealings with pirates and shared in their ill-gotten gains, and that he even went into partnership with Captain Kidd when that once honest man became the prince of the very pirates whom the Government had commissioned him to apprehend. And Philipse, as a member of the Governor’s Council, had recommended this Kidd as the best man for the job! It is not strange that the lord of the manor felt constrained to resign his seat in the council because of the popular belief in the statement made by the Governor, that ” Kidd’s missing treasures could be readily found if the coffers of Frederick Philipse were searched.” Colonel Frederick Philipse, the great-grandson of Captain Kidd’s partner, enlarged the Manor House to its present proportions and appearance. He also was prominent in the affairs of the Colony. He was a member of the Provincial Assembly, and was chairman of a meeting called on August 20, 1774, to select delegates to the county convention which was to select a representative to the First Continental Congress. Thus, ostensibly, he was taking his place with those who were crying out for the redress of grievances suffered at the hands of Great Britain. Yet it was not long until it was evident that he was openly arrayed with those who declined to turn from their allegiance to the king. The most famous event that took place in the Philipse Manor was the marriage, on January 28, 1758, of the celebrated beauty, Mary Philipse, to Colonel Roger Morris. A letter from Joseph Chew to George Washington, dated July 13, 1757, shows thatin the opinion of the writer, at leastthe young Virginian soldier was especially interested in Mary Philipse. In this letter, which he wrote after his return from a visit to Mrs. Beverly Robinson in New York, the sister of Mary Philipse, he said : ” I often had the Pleasure of Breakfasting with the Charming Polly, Roger Morris was there (Don’t be startled) but not always, you know him he is a Lady’s man, always something to say, the Town talk’t of it as a sure & settled Affair. I can’t say I think so and that I much doubt it, but assure you had Little Acquaintance with Mr. Morris and only slightly hinted it to Miss Polly, but how can you be Excused to Continue so long in Phila. I think I should have made a kind of Flying March of it if it had been only to have seen whether the Works were sufficient to withstand a Vigorous Attack, you a soldier and a Lover, mind I have been arguing for my own Interest now for had you taken this method then I should have had the Pleasure of seeing youmy Paper is almost full and I am Convinced you will be heartily tyred in Reading ithowever will just add that I intend to set out tomorrow for New York where I will not be wanting to let Miss Polly know the Sincere Regard a Friend of mine has for herand I am sure if she had my Eyes to see thro would Prefer him to all others.” While it is true that George Washington went to New York to see the charming Polly, there is no evidence that he was especially interested in her. Colonel Morris later built for his bride the Morris-Jumel Mansion, which is still standing near 160th Street. Mrs. Morris frequently visited at the home of her girlhood. The last visit was paid there during Christmas week of 1776. Her father, who had been taken to Middletown, Connecticut, because of his activities on the side of the king, was allowed to go to his home on parole. In 1779 the Manor House and lands were declared forfeited because the owner refused to take the oath of allegiance to the Colonies, and Frederick Philipse, III, went to England. The property was sold in 1785. Until 1868 it was in the hands of various purchasers. To-day the Manor House is preserved as a relic of the days when Washing-ton visited the house, when loyalists were driven from the doors, and when it was the centre of some of the important movements against the British troops.
<urn:uuid:88e47482-0705-4e90-abae-d0f5d6835d98>
{ "dump": "CC-MAIN-2015-48", "url": "http://travel.yodelout.com/the-philipse-manor-house-yonkers-new-york/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398452385.31/warc/CC-MAIN-20151124205412-00220-ip-10-71-132-137.ec2.internal.warc.gz", "language": "en", "language_score": 0.9891726970672607, "token_count": 1396, "score": 2.96875, "int_score": 3 }
Oliver Joseph Lodge |Sir Oliver Joseph Lodge| Vanity Fair cartoon |Born||June 12, 1851| |Died||August 22, 1940| Wiltshire Lake, Wiltshire |Occupation||Physicist and inventor| Sir Oliver Joseph Lodge (June 12, 1851 – August 22, 1940) was a pioneer in the science and technology that led to the development of radio. Besides his work in physics and radio technology, he was known for his interest in the paranormal, and he wrote a book about communicating with his son who perished in World War I. In later life, he lectured widely on the existence of the spiritual world. Born in Penkull, Staffordshire, Lodge was the eldest of eight children of Oliver Lodge, a vendor of supplies to the local pottery industry, and Grace Heath. Among his brothers and sisters were the historian, Sir Richard Lodge; Eleanor Constance Lodge, historian and principal of Westfield College, London; and Alfred Lodge, a mathematician. Lodge attended Adams' Grammar School, but his interest was sparked when, during a visit to London, he was encouraged to attend lectures on scientific subjects. Some of these were given at the Royal Society of London by John Tyndall, the renowned physicist. When Lodge was 16, he enrolled in educational courses in South Kensington, and succeeded in obtaining the highest grade in his class. When it became apparent that he excelled in scientific subjects, his father gave up the idea of having his son work for him, and Lodge was allowed to pursue a career in science. He obtained a scholarship to the Royal College of Science in London, where he studied from 1872 to 1873. In 1873, he entered the University College London, where the curriculum included advanced mathematics. Lodge was inspired by the electrical theories of James Clerk Maxwell, who demonstrated theoretically that light is a form of electromagnetic radiation. During this period Lodge had attended lectures by Maxwell, and would later conduct a brief correspondence with the famous scientist. Lodge graduated in 1875, and was awarded his doctorate in 1877. Lodge then married Mary Marshall, who over the years would bear him six boys and six girls. At this time, he supported himself and his wife by serving as a research assistant at University College, and by giving lectures in physics at a nearby college. In 1881, he was appointed professor of physics and mathematics at University College, Liverpool. Lodge then traveled to Europe to procure equipment for a new laboratory, and there he met Heinrich Hertz, who was at that time an assistant to the famous physicist Hermann von Helmholtz. Hertz would become the first scientist to publish successful results on the production and detection of electromagnetic waves. It was during this period that Lodge developed an interest in paranormal phenomena and spiritualism, which he was to pursue throughout his lifetime. Proving Maxwell's theories After completing his doctorate, Lodge worked with the Irish physicist George Francis Fitzgerald to clarify the implications of Maxwell's theory of electromagnetism, and to explore the way in which electromagnetic waves could be generated from circuitry. At that time, however, Fitzgerald did not believe such waves could be produced, and Lodge, in deference to Fitzgerald's judgment, temporarily gave up his attempt to produce them. In 1883, Fitzgerald reversed his own position and calculated the energy of the waves that could be generated by electromagnetic oscillations. In the late 1880s, Lodge became interested in lightning, and believed that lightning rods would fail to work because of a phenomenon called inductance, which opposes the unfettered conduction of electricity in even good conductors such as copper. As a result, he insisted that a lightning bolt will not always take the path of least electrical resistance offered by a lightning rod. He experimented with the leyden jar, a simple device that holds a static electric charge, and compared its discharge in the form of a spark with lightning. While some of his ideas in this regard proved to be mistaken, they led to his discovery of electromagnetic waves. Discovery of radio waves During a series of lectures on lightning he gave in 1888, Lodge realized that he could create what are called standing electromagnetic waves along a wire in much the same way as a single note and its overtones are produced in a musical instrument. These were radio waves, which were like light waves but of a much lower frequency. In July of 1888 Lodge submitted his results for publication in the form of a paper titled "On the Theory of Lightning Conductors," in which he clearly discusses the velocity, frequency, and wavelength of electromagnetic waves produced and detected in a circuit. Before the paper went to print, however, he discovered that Hertz had already published a memoir in which he described his efforts to generate and detect waves transmitted across space. Lodge credited Hertz in a postscript to his own paper, which was published later that year. In a well-publicized lecture in 1894 on the work of Hertz, who had passed away earlier that year, Lodge demonstrated the possibility of using electromagnetic waves as a medium of communication. He then formed a partnership with Alexander Muirhead, an electrical engineer, to develop commercial applications for his discoveries. Lodge the businessman Lodge, alone and in conjunction with Muirhead, patented several inventions relating to radio communication in Great Britain and in the United States. The two men formed the Muirhead Syndicate in 1901 to manufacture radio equipment, but in 1911, their patents were bought out by radio pioneer Guglielmo Marconi and the partnership was dissolved. In 1943, the United States Supreme Court relieved Marconi of some of his U.S. patents in favor of Lodge and other early inventors of radio technology. In 1900 Lodge moved from Liverpool back to the Midlands and became the first principal of the new Birmingham University, remaining there until his retirement in 1919. Lodge was awarded the Rumford Medal of the Royal Society in 1898 and was knighted by King Edward VII in 1902. In 1917 and 1918, Lodge engaged in a debate with Arthur Eddington over the validity of Albert Einstein's theory of relativity. Lodge proposed his own theory, called the "electrical theory of matter," by which he hoped to explain relativistic phenomena such as the increase of mass with velocity. Lodge continued to write and lecture in the remaining years of his life, particularly on life after death. He died on August 22, 1940, and is buried at St. Michael’s Church, Wilsford (Lake), Wiltshire. To create a detector of radio waves that was more sensitive than a spark gap, Lodge improved a device invented by Edouard Branly. It is called a coherer because it relies on the fact that iron filings enclosed in a glass tube will clump together in the presence of radio waves and conduct electricity. Lodge devised a "trembler," which dislodged clumped filings and reset the device. The coherer served as an on-and-off switch triggered by radio waves, making it possible to transmit alphabetic characters in code. On August 14, 1894, Lodge made what is often considered to be the first demonstration of broadcasting radio signals at the annual meeting of the British Association for the Advancement of Science, at Oxford University. This was two years before Marconi's first broadcast of 1896. Lodge patented the moving-coil loudspeaker and the variable tuner and other devices he had invented in pursuit of perfecting radio technology in the latter part of the decade. The spark plug Lodge also made a major contribution to automotive engineering when he invented the electric spark plug for the internal combustion engine, called the "Lodge Igniter." Later, two of his sons developed his ideas and in 1903 founded Lodge Bros., which eventually became known as Lodge Plugs Ltd. Electric theory of matter Lodge generally opposed Einstein's special and general theories of relativity, and proposed his own, which he called "The electrical theory of matter." Through this theory, Lodge attempted to explain the deviations of Mercury's orbit around the Sun from what is predicted by Newton's theory. Lodge attributed the discrepancy to a kind of inertial drag generated by motion relative to the "ether," the hypothetical medium in which electromagnetic waves are propagated. Lodge is also remembered for his studies of life after death. He first began to study psychical phenomena (chiefly telepathy) in the 1880s through the Society for Psychical Research. In the 1890s, Lodge participated in seances. He wrote several books based on his experiences with the paranormal, including one in 1890 in which he analyzed 22 sittings with a Mrs. Piper, an American psychic and spiritual medium. After his son, Raymond, was killed in World War I in 1915, Lodge visited several psychics and wrote about the experience in a number of books, including the best-selling Raymond, or Life and Death (1916). Altogether, he wrote more than 40 books on topics including the afterlife, aether, relativity, and electromagnetic theory. Lodge was a member of the Society for Psychical Research and served as its president from 1901 to 1904. He was also a member of the British Association for the Advancement of Science. In 1889, Lodge was appointed President of the Liverpool Physical Society, a position he held until 1893. The society still runs to this day, though under a student body. Lodge was an active member of the Fabian Society and published two Fabian Tracts: Socialism & Individualism (1905) and Public Service versus Private Expenditure which he co-authored with Sidney Webb, George Bernard Shaw, and Sidney Ball. In 1898 Lodge was awarded the Rumford Medal of the Royal Society of London. King Edward VII of Great Britain knighted Lodge in 1902. Sir Oliver Lodge's letters and papers were divided after his death. Some were deposited at the University of Birmingham and the University of Liverpool and others at the Society for Psychical Research and the University College London. Lodge, who lived a long life, was a prolific letter writer and other letters of his survive in the personal papers of other individuals and in several other universities and other institutions. Publications by Lodge - Electric Theory of Matter (Oneill's Electronic Museum). Retrieved June 20, 2007. - The Work of Hertz and Some of His Successors, 1894 - Relativity: A Very Elementary Exposition, 1925 - Ether, Encyclopedia Britannica, thirteenth edition, 1926. - Ether and Reality - Phantom Walls - Past Years: An Autobiography ReferencesISBN links support NWE through referral fees - Burns, Russell W. 2003. Communications: An International History of the Formative Years. London: Institution of Electrical Engineers. ISBN 0863413277 - Coe, Lewis. 1996. Wireless Radio: A Brief History. Jefferson, N.C.: McFarland, p. 5. ISBN 0786402598 - Davis, E. A., ed. 1997. Science in the Making. London: Taylor and Francis. ISBN 0748406425 - Eisenstaedt, Jean, and Kox, Anne J. 1992. Studies in the History of General Relativity. New York: Birkhäuser, pp. 62–65. ISBN 0817634797 - Garratt, G. R. M. 1994. The Early History of Radio: From Faraday to Marconi. London: Institution Electrical Engineers. ISBN 0852968450 - Hunt, Bruce J. 2005. The Maxwellians. Ithaca: Cornell University Press. ISBN 0801482348 - Oppenheim, Janet. 1985. The Other World: Spiritualism and Psychical Research in England, 1850–1914. New York: Cambridge University Press. ISBN 0521265053 New World Encyclopedia writers and editors rewrote and completed the Wikipedia article in accordance with New World Encyclopedia standards. This article abides by terms of the Creative Commons CC-by-sa 3.0 License (CC-by-sa), which may be used and disseminated with proper attribution. Credit is due under the terms of this license that can reference both the New World Encyclopedia contributors and the selfless volunteer contributors of the Wikimedia Foundation. To cite this article click here for a list of acceptable citing formats.The history of earlier contributions by wikipedians is accessible to researchers here: The history of this article since it was imported to New World Encyclopedia: Note: Some restrictions may apply to use of individual images which are separately licensed.
<urn:uuid:9d98e533-6c3a-4767-9506-86f1209a7bd2>
{ "dump": "CC-MAIN-2023-50", "url": "https://www.newworldencyclopedia.org/entry/Oliver_Joseph_Lodge", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100739.50/warc/CC-MAIN-20231208081124-20231208111124-00338.warc.gz", "language": "en", "language_score": 0.9685529470443726, "token_count": 2580, "score": 2.765625, "int_score": 3 }
When choosing a grow light it is extremely important to remember that light is as important as water to your plants. It helps them produce chlorophyll and supports photosynthesis. Growing outside in natural sunlight plants receive a “full-spectrum” of light. Reds and blues are the colors at the ends of the spectrum that are key to plant health. Blue light directly affects chlorophyll production, creating strong leaves and stems. Red light is responsible for fruit and flower production and is especially important in the beginning stages of plant growth - seed and root development. Indoor growers seek to create a varied spectrum of lighting as optimally as possible to support their plants at different stages of growth. It’s all about choosing the right lighting for your grow. There are many grow light choices available and several things to consider when you're choosing a grow light. Some of the things you need to consider are: Which one is best for you? Start off by considering a few key things such as your overall operating budget. How much money are you prepared to spend, both in the initial investment, and then the day to day operation? How much area are you lighting? How long will your lights be used? Are you planning a year-round garden? Will you have a perpetual (clone, veg, and flower) grow? What kind of plants are you growing? As you can see, you need to put some thought into choosing a grow light. This is a breakdown of some of the most common lighting options available and by no means a complete list of everything out there. We will discuss the different lighting types, their uses, and their pros and cons to help you narrow the field and determine which one is best for you. T5 Fluorescent Tubes This type of lighting is best for seedlings, clones and small plants, they run cool. T5s typically come in two different lengths, 2 and 4 foot, and have 1, 2, 4, 6, 8 or 12 bulb fixture configurations. Obviously, if you’re growing a few small plants, you’ll be able to use a smaller set up (shorter length, 1 or 2 bulb fixture). Color temperature is also a factor you’ll want to consider. As a general guideline when plants are in the vegetative stage use a 6500K bulb, which emits a bright light like on a summer day. In the flowering stage use a 3000K bulb, which is more like the light at the end of the day - sunset. - Less expensive than most other types of grow lights. - Covers a large area of lighting. - Longer life in comparison to other types of light (+20,000 hours with very little decrease in efficiency). - Runs cool. eliminating the need for ducting and ventilation. - Not as effective in the vegetative and flowering stage as the other types of lights. High-Intensity Discharge (HID) This is a category of lighting that includes: Metal Halide (MH), High-Pressure Sodium (HPS), Double-Ended (DE), and Ceramic Metal Halide (CMH) lamps. These lights require a reflector/fixture, a ballast, and a lamp (often referred to as a bulb). These components are sold separately or purchased as a kit. Buying as a kit ensures compatibility. These lights emit the brightest light and produce high amounts of heat. One of our favorite ballasts is the SolisTek 600/400W SE/DE Digital Ballast 120/240V. - Lamps are dimmable in many instances so you can regulate and customize your lighting. - A digital ballast will operate many types of HID lamps. - Life span of these bulbs can range between 10,000-24,000 hours depending on the type. - Produces much more usable light than a fluorescent. - Lamps produce high heat - you’ll want ducting and ventilation. - Higher energy costs. - Requires additional equipment. Ballast and reflector. You may need different ballasts with different types of lamps (MH and HPS). - Lamp effectiveness and efficiency lessen over time. Metal Halide (MH) - Emit a high output/high quality of light on the blue end of the spectrum (like hot summer sun). - Especially effective in the vegetative stage in plant development. - Lamps themselves are relatively inexpensive. - Shortest life span of all HIDs at 10,000-20,000 hours. - Do not emit the red portion of the light spectrum that plants need to flower. Plants may still flower but the yield will not be as high. - Burn hot. - Quality and quantity of the light lessens with use. High-Pressure Sodium (HPS) - Emits light on the red end of the spectrum (like in the fall), triggering the flowering stage of plant - Life span somewhat longer than MH at 12,000 - 24,000 hours. - No emission of the blue light that plants need in the vegetative stage of development - Burns hot - Quality and quantity of light lessens with use If you are growing plants that flower and fruit you may want to use MH and HPS together to get the benefits of the full-range lighting. DE lighting is a type of HPS that has come onto the market in the last few years. It connects to a ballast at each end (kind of like a fluorescent tube), unlike the single-ended (SE) HPS mentioned above. As with all HIDs, you need to ensure that the reflector/fixture, ballast, and lamp are compatible. - DE lighting has a longer life span and remains efficient longer than the single-ended HPS. Although the SE loses much of its efficiency around 10,000 hours, DE can retain as much as 90% of its efficiency at that same age. - Because DE lamps are thinner, they cast more light over the grow space than SE lamps at the same height. This makes their use more efficient in terms of lighting and energy use. - Emits more ultraviolet and infrared light than SE which, for some plants, increases potency and oil production. - DE lighting produces more heat than SE lighting, leading to possible heat damage to plants. - DE lighting does not tolerate direct contact with air blowing from circulation fans. It will cause a decrease in efficiency. Ceramic Metal Halide (CMH) or Light Emitting Ceramics (LEC) [used interchangeably] We offer complete CMH fixtures such as the SolisTek C2+ 630W Dual CMH Complete Fixture 120/240/277V is a fantastic complete fixture which is controller ready, guarantees high output & consistent spread, has incredible PAR output which replaces 1000W HID systems and comes with 2 x SolisTek CMH lamps. Additional CMH grow lights can be found here. - Life-span is twice as long as MH or HPS. - Energy efficiency. Costs less to run. Some areas offer incentives to offset purchase costs because of the energy efficiency rating. - Burns hotter than MH, emitting light more like natural sunlight but has an insulating value that decreases the heat output which is less likely to burn plants than MH and HPS. - Light quality supports both vegetative and flower stage of plant growth. Both UV and infrared rays creating light close to that of natural sunlight. - Steadier beam. Plants receive more light. - Less electromagnetic interference (EMI) than with other digital ballasts because of the special ballast required to run them. - Only magnetic ballasts can be used. - Positional. They cannot be placed on an angle. They can only vertically or horizontally. - Protection is needed from the UV light. Wear long sleeves and protective sunglasses, or work during a dark cycle with the use of a green LED headlamp. Light Emitting Diodes (LED) Light Emitting Diode (LED) grow lights are a type of energy efficient lights that are an option for indoor growers. Unlike other types of grow lights, LEDs do not burn a filament but instead pass light through semiconductors to create their spectrum. LED grow lights can be used as the sole means of lighting your grow, as a supplement to natural light, or paired with other types of grow lights. Unlike other types of grow lights, light emitted by LEDs can be focused, so no light is dispersed or lost between the bulb and the canopy of the plants. We offer several LED grow lights and are adding new ones all the time. Click here check out our LED grow lights. - Long life-span. They can last over 50,000 hours. - Energy-efficient. Cheap to run. - Generally, produce more light per watt than fluorescents and HIDs. - Run cool. Produce little to no heat. - Good for small growing spaces. - No ballasts required. Just plug into standard outlets. - Spectrum of light is wide and customizable depending on your growing needs. - Wide array of lights with many features and benefits available on the market. - Considered the easiest light to grow with. - Cost. The purchase price is much higher compared to other lighting choices. - May not emit as much light as expected. Always make sure the emitted light is at least 2.0 micromoles/watt of energy. - May not be effective for the flowering stage (depending on the manufacturer). Do your research based on what you are growing. Bottom Line: When choosing a grow light consider what you are growing, your growing needs, the space you are growing in, and the budget you are operating within. There’s quite an array to choose from today.
<urn:uuid:60bf0b20-fa43-4ebf-afff-de6d12582744>
{ "dump": "CC-MAIN-2020-24", "url": "https://yourgrowdepot.com/blogs/gardening-tips/choosing-a-grow-light", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347413551.52/warc/CC-MAIN-20200531151414-20200531181414-00094.warc.gz", "language": "en", "language_score": 0.9312686324119568, "token_count": 2046, "score": 2.65625, "int_score": 3 }
School Food Waste A few years ago WRAP estimated that 72 grams of compostable waste was generated per pupil per day in primary schools and 42 grams per pupil per day secondary schools. If you have contacts with a school that wishes to reduce its total waste and compost the organic portion (including cooked food) a waste audit will enable identify the size of the problem and enable the selection of a composter(s) of a size appropriate to the waste produced. It is possible to get a general idea of the waste produced using an audit conducted on a single day and the Eco-Schools Waste Audit for Schools, to be conducted by pupils, is based on a one-day audit. However if the audit is to provide a estimate on which the selection of the appropriate composter is to be purchased an audit over the five day period of a typical term-time week is recommended. This audit also offers the opportunity to provide a baseline against which a food waste reduction programme can be measured. To enable identification of the success of the food waste reduction programme and the composting project it is recommended that during the waste audit the food corrected from the catering areas is separated into: - uncooked kitchen scraps e.g. peelings, Cooked food & dairy - Plate scrapings - Leftover unsold food - Sandwiches, bread, - Soups. Yogurt and dairy products There is scope for improvement and an opportunity to involve the next generation in dealing with this problem we have dumped on them
<urn:uuid:c546ca54-b946-46af-8544-3dc0ddc0794a>
{ "dump": "CC-MAIN-2018-34", "url": "http://www.carryoncomposting.com/142941483/4463100/posting/school-food-waste", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221210413.14/warc/CC-MAIN-20180816034902-20180816054902-00012.warc.gz", "language": "en", "language_score": 0.9521176815032959, "token_count": 309, "score": 3.21875, "int_score": 3 }
processors in demanding applications? This is a vital question, and its answer shines light on why FPGAs are increasingly proliferating in electronic equipment these days. For starters, programmable logic devices are capable of working at much higher clock rates than eight- and even 32-bit FPGAs easily clock at 200 to 300 MHz, and more specialized devices such as the UltraSCALE™ products from Xilinx (see Figure 2) can handle clock frequencies close to a GHz. This brings with it raw power which is even more magnified when one realizes that FPGAs do not require so many clock cycles to execute algorithms as processors do. Instead, they are simply an interconnection of gates, transforming bits and bytes on-the-fly in real time. Thus, complicated algorithms that require many instructions can be profitably implemented in an FPGA, where processing is only limited by the propagation delay of logic gates (and a small overhead from gate interconnections). These features can and do make FPGAs blazingly fast when compared to microcontrollers. Another advantage that FPGAs have over microcontrollers is in the sheer profusion of I/O pins they have. Whereas a typical microcontroller may give you 20 to 30 I/O pins, even a low-end FPGA typically provides around 50 I/O pins. Larger FPGAs sport hundreds of pins (see Figure 3), so you almost never run out of connectivity with the external world. As an aside, the large number of pins means that FPGAs come in advanced multi-pin packages such as high pin count quad flat packs and dense ball grid arrays. This makes it difficult to solder them to PCBs (printed circuit boards), but as we will see in Part 2, there are ways Added to that is the flexibility with which one can use the I/O pins. Thus, one set of pins can handle signals at 3.3V logic levels, whereas another set handles signals at 2.5V or even 1.8V. You can mix and match I/O banks such that it is easy to perform logic level translation from one standard to another. Note that 5V logic levels are usually not supported on current FPGA chips. Yet another attractive feature of FPGAs is the large amount of logic resources they make available at very reasonable costs. Even a small FPGA costing about $5 comes with the logic equivalent of tens of thousands of gates. Larger devices easily give you access to millions of gates inside a single chip. The logic resources can, of course, be interconnected (configured) in any way you like to realize almost any digital function; be it as simple as a basic AND-OR-NOT logic expression or an entire Ethernet controller. What is more, given the large number of I/O pins and logic elements, you can put a lot of completely different digital designs in a single FPGA. This is very useful where one wants to consolidate a number of different digital ICs into a single physical package. This approach saves money and space, making systems smaller, lighter, and cheaper. Logic consolidation is a big reason for the increasing sales of FPGAs for commercial, industrial, and military products. Finally, over time, FPGAs have grown into veritable SoCs so that other useful functions (besides just an array of uncommitted logic elements) now come integrated on the chip. Commonly available features include phase locked loops (PLLs) for generating almost any frequency on a chip, embedded memory blocks, fixed (and even floating point) multipliers, and analog-to-digital converters High-end FPGAs also feature integrated high speed serial data transceivers. Using these integrated functional blocks with user defined logic, one can build extremely complex digital systems on a single chip. When first introduced, FPGAs may look daunting. How do you go about building useful systems with something that is basically just an array of logic elements? It turns out that this is simpler than one might imagine. You can certainly use a gate-level circuit diagram for simple circuits, but that will probably not end up using even 1% of the logic resources available in modern FPGAs. Proper utilization of the power of FPGAs demands a radically different approach to describing circuit The secret lies in using a hardware description language (HDL) to describe the desired functionality. There are several of these around but two — VHDL and Verilog — are, by far, the most common HDLs; they are employed by 99% of FPGA users around the world. Here is the fun part — an HDL allows a developer to describe the desired system in a high-level form without worrying about its exact implementation in terms of logic gates. 40 October 2017 FIGURE 3. Top and bottom of a ball grid array (BGA) FPGA package showing large numbers of mainly I/O pins. (Courtesy of Lattice Semiconductor Corporation.)
<urn:uuid:edb7a428-c6bb-4a24-879c-544d66234fcd>
{ "dump": "CC-MAIN-2020-16", "url": "http://nutsvolts.texterity.com/nutsvolts/201710/?pg=40", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370515113.54/warc/CC-MAIN-20200403154746-20200403184746-00417.warc.gz", "language": "en", "language_score": 0.8969808220863342, "token_count": 1148, "score": 3.90625, "int_score": 4 }
Energy and Power If an embedded system is to make anything happen in the world, it will have to deploy energy to effect this. Moreover an essential part of the specificiation of an embedded system is that it should cause events to happen at the right time. So the energy required to effect the change will have to be deployed sufficiently fast, that is the embedded system will have to have the appropriate amount of power available. Now operating at low power is a key ingredient of modern processors, so typically there will not be enough power available at the output terminals of a processor to cause the required effects of the system on the world. Thus an embedded system will typically need to make use of power-amplifiers. Likewise, the inputs of most processors are designed to accept digital signals. Many of the devices that an embedded system can use to sense the state of the world do not directly produce digital signals compatible with a processor. So an embedded system may need to embody signal-processing devices to convert the raw output from sensors to a suitable form for input to a processor. Since a processor is electronic in its nature, we will need to have a firm understanding of electricity. But first we must begin by refreshing our knowledge of some basic concepts of physics. The scientific unit of time is the second. For many years scientists measured time in terms of the earth's rotation relative to the "fixed" stars. However the earth's rotation is actually slowing down, and astronomers' clocks have now become good enough to notice. Consequently the time-standard is now atomically based. In our electronic systems things happen rather fast, so it's desirable to subdivide the second. Time can be measured with great precision, a fact that can be very useful in electronics. The best clocks in use by astronomers today have a precision better than one part in 1012. To put it another way, such a clock would lose or gain a few seconds in a million years. While we will not need such precision, it's worth remembering that the most precise electronic component we can buy for a modest couple of dollars is a crystal oscillator that provides an excellent time-reference. A mnemonic for getting a feel of the newton as a unit is that one newton is the weight of an apple - think of it as the force exerted on the palm of your hand by an apply lying on it. The standard physical unit of energy is the joule. It is the energy released when a force of one newton acts through a distance of one metre. Being a mechanical unit, it is quite convenient when we come to think about how electricity can cause mechanical effects, such as turning an electric motor. However it is also basic to understanding the electrical unit the volt, as we shall see. A homely way of thinking about a joule is that it is roughly the energy released when an apple falls one metre. Heat energy is usually measured in terms of the calorie, or the big calorie (Cal) which is the amount of energy required to raise the temperature of one kilogram of water by one degree centigrade. Power is the rate of transfer of energy. The standard physical unit of power is the watt which is a rate of energy transfer of one joule per second. Energy is conserved. That is to say the total amount of energy in a closed system remains constant (unless we're doing high-energy physics experiments). This means that energy is a very useful unifying concept for thinking about systems, such as embedded systems, which have both electrical and mechanical components. Just as money is the universal currency in economic systems, energy is the universal currency of physical systems - electrical, mechanical, hydraulic etc.. Unless you grace the tables of very fancy establishments, you will always have a good idea how much your lunch ought to cost, and be outraged if you are presented with a bill for 50$ when you expected something around 5$. Likewise you should get in the habit of estimating the energy cost of performing a given action (for example switching the track-switches for the train). Analysing engineered systems in terms of the flow of energy provides a unifying principle. Generally any electronic system can be improved by careful attention to energy-flow. A system that wastes energy is likely to be larger and more expensive than one which conserves it. Nowhere is this more apparent than in computation, where the amount of energy required to represent a bit of information in any form has plummeted over the last 40 years. Thus the early vacuum-tube computers consumed several watts of energy to represent the state of one bit of information in a CPU. Modern processor-chips operate at levels of a microwatt per bit. In achieving such high performance, power density, that is the power consumed per unit of volume, is a crucial factor - a modern chip would be instantly vaporised if individual bits-of-memory operated at 1 watt each! If energy is conserved, why is energy supply an issue? The answer to this question is that energy, while it is conserved, is inexorably converted from a more useful form to the less useful form of heat. Generally, if a circuit is producing a lot of heat this is an indication that it might be improved by redesign, or that it has been wrongly designed or built. Beware! components that have been wrongly inserted in a circuit often get hot enough to burn you, so feel your components with circumspection. It is sometimes helpful to think of the flow of electricity as being like the flow of a fluid, say water. While it is important not to take this analogy too far, it can often help us visualise the rather intangible phenomena associated with electricity in more tangible terms. Electrons are the "atoms" of electricity. In fundamental physics the electron carries -1 units of electric charge, just as the hydrogen atom is one unit of mass for chemists However, one electron is a rather small amount of charge to be working with. The macroscopic unit of charge is the coulomb. 1 coulomb is minus the charge carried by 0.624142x1019 electrons. [Why a negative charge on the electron?] Thus the coulomb is the basic measure of quantity of electricity, as the litre or gallon is a measure of quantity of water. Electric charge is conserved - the total charge in a closed region of space remains constant. Indeed, in any work we shall be doing, the total number of electrons in a closed region of space remains constant [exceptions?]. Of course, positively charged particles exist. The protons that are a major constituent of the atomic nucleus are positively charged. However, the solid state is characterised by the immobility of atomic nuclei. Most of the devices we shall encounter use matter in the solid state. In anything we do in this class, positive and negative charges will always be very nearly in balance. This arises from the fact that like charges repel each other, while opposite charges attract. This can be understood (in terms of classical physics) as the existence of a force between any two electrons which acts along the line joining them and which is inversely proportional to the square of the distance between them. So, getting together a large number of like charges costs a lot of energy. This also accounts for the fact that the analogy between the flow of electricity and the flow of water breaks down. Water molecules attract each other moderately (moderately that is compared with the attraction between the atoms that make up the water molecule). So it doesn't take a lot of energy to collect a lot of water molecules together - in normal conditions water vapour will condense to form liquid water. On the other hand it would take an enormous amount of energy to bring a coulomb of electrons together into (say) a litre space that was devoid of positive charge. Current is the rate of flow of electric charge. One ampere(A), or amp, is a flow of charge of one coulomb per second. One milliamp is a thousanth of an amp 1mA = 10-3A. One microamp is a millionth of an amp 1µ A = 10-6A. We also speak of nanoamps 10-9A. and pico 10-12A. amps. Ordinary matter consists of electrons (negatively charged) and atomic nuclei (positively charged). We can safely regard nuclei in a solid as remaining fixed in position and unchanged in nature. Almost all of the mass of matter is attributable to its nuclei. By contrast, some electrons in some solid forms of matter can move over long distances; in doing so, they constitute an electric current. Whether or not some electrons in a given solid material can move over long distances is a fundamental property of the material. A metal is a material in which every atom has some electrons that are so loosely bound to the nucleus that they are free to move. Such electrons are called conduction electrons. An insulator is a material in which all electrons are tightly bound to one specific atomic nucleus, so electric current cannot flow. In a semiconductor electrons can be made to flow in particular circumstances, which property allows engineers to construct all manner of clever devices. Modern electronics depends greatly on the properties of semiconductors. Since electrons repel each other, if a piece of material has excess electrons, energy is required to add even more electrons. Likewise, if a piece of material has a deficit of electrons, energy is required to take electrons away from it. We say that two pieces of metal A and B have a potential difference of one volt (1V) between them if it would require one joule to move a charge of one coulomb from A to B, or more precisely the energy cost of moving a small amount of charge from A to B would scale up to requiring one joule to move a charge of one coulomb. Returning to our water analogy, we can think of a piece of metal as being like a trough of water. If we have two troughs A and B, with B being at a higher level, it costs energy to move a quantity of water from A to B. It follows that when a current of I amps flows through a potential difference of V volts, the power required is given by: This power may appear in the form of heat, light, or mechanical power. Or it may be stored to be released in electrical form later. In a piece of metal free of outside influences the conduction electrons adjust themselves so that the potential difference across any two points is zero. We can think of this in our hydraulic analogy by observing that if we have a trough of water free of outside influence, the water in the trough will be level - that is the energy cost of moving an infinitesimal quantity of water from one place in the trough to another is zero. In the case of an insulator or semiconductor, we still have the concept of electric potential. But for a given piece of insulating material, the potential can vary widely across the surface, so we must always think of the potential at a point in the surface. For example, standard photocopying technology involves creating a pattern of charge on a drum coated with semiconductor material which exactly matches the pattern of black-and-white on the page being copied. We have millivolts(mV), microvolts (µ V) in common use, and kilovolts (kV) too (but not exposed in our lab!). Current goes through a wire or component Voltage exists between two points in a circuit, We also say voltage across two points. Voltage at a point means voltage between that point and "ground" "Ground" can be chosen arbitrarily; it is not necessarily related to the actual earth. In electronics, information is carried in a signal, which is a time-varying value of some physical variable, usually voltage, sometimes luminous flux (in optoelectronics). It always requires energy to establish a signal at a point or transmit it to a remote point, because energy is always required to cause a change in any physical variable. Power is the rate of transfer of energy. Generally, if we are processing information we want signals to have the lowest power consistent with their reliable transmission and processing. However, if we want a signal to make things happen in the big outside world, we will usually need to raise its power level by some kind of amplifier. Among the factors putting a lower limit on usable power is noise, which can be thought of as an unwanted signal arising from sources internal to the circuit (e.g. thermal noise arises from that vibration of atoms which is thermal energy) or external (e.g. signals picked up from radio transmitters or the mains wiring). Electronic circuits are classified as: Kirchoff's Current Law states that in any electrical circuit, the sum of the currents flowing into a node is zero. This is really a statement of the conservation of electrical charge - the number of electrons flowing into a junction must be the same as the number flowing out, so, if we are careful about using the right sign when referring to our currents, the law can be related to basic physics. Kirchoff's Voltage law states that the sum of the voltages taken round any cycle in a circuit-graph is zero. Or, equivalently, suppose A and B are two conductors in a circuit. Then the potential difference between A and B is the sum of the potential differences across device terminals along any path linking A to B. It should be noted that Kirchoff's Laws, while they form the basis for analysis of circuits, are not perfectly exact, since they assume that the devices of which a circuit is made up are connected by perfect conductors which offer no resistance to the passage of electricity and have no capacity to store electrons. For most purposes this is an adequate assumption, though for very high speed circuits we need a more complete model. One approach to dealing with this is to treat conductors themselves as being components in a more complicated circuit. In particular, the voltage law will fail to be true if the circuit as a whole is exposed to intense and rapidly changing magnetic fields. We build an electronic circuit out of conductors and devices. The simplest devices have two terminals. Two-terminal devices are characterised by the relationship between voltage V across the device and current I flowing through it. Resistors have the current proportional to the voltage Capacitors have the current proportional to rate of change of voltage. Diodes allow current to flow in only one direction. Inductors have the voltage proportional to rate of change of current. Photoresistors are light-dependent resistors. A resistor is a device in which the voltage across the device is proportional to the current through it. This is usually written: V = IR Here, R is the resistance in ohms. The equation is known as Ohm's Law. It is also at times to think of a a resistor as a device in which the current through the device is proportional to the voltage across it. This can be written: I = VC = V(1/R) From the equations: we get two more convenient forms by eliminating V and I respectively: Resistors are the cheapest electronic component. Of all components, they are readily available in the widest range of values, from 1 ohm up to ten megohms, (10million ohms), in a range of preferred values which are chosen to divide each decade into values in each successive value is near to being a fixed multiple of the previous one. The most commonly used resistor is a carbon film resistor capable of dissipating a maximum of 0.25W, with a value accurate to 5%. (Horowitz and Hill have a discussion on the extent to which you can believe in this accuracy). We have available in the lab a range of resistors with standard values from 10 ohms to 1 megohm, together with a supply of 10 megohm resistors. The nominal value of a carbon film resistor (in ohms) is indicated by coloured bands on the body of the resistor. Digits are colour-coded as follows: Black 0 Brown 1 Red 2 Orange 3 Yellow 4 Green 5 Blue 6 Violet 7 Grey 8 White 9You can make a model in your head to remember this if you see that the middle digits (2-7) are the colours of the rainbow and then try to hang the whole thing on the idea of a body heating up (when it's cold it's black, when it's very hot it's white). The explanation isn't systematic, but it serves quite well as a mnemonic. The colour code is sometimes used for other devices. It's also worth remembering if you are making decisions about wiring where there is an obvious number associated with some conductors. For example, the 4-bit parallel interface used in the model-train system periphals makes use of 6-wire cable intended to interface modular-telephone style plugs and sockets. The conductor colours are thus pre-determined, but the convention I have adopted is Black ground Red Digit 0 Yellow Digit 1 Green Digit 2 Blue Digit 3 White + 5 V powerIt's easy to remember this convention if you think of the colour-coding convention. The value of the resistor is encoded as D1 D2 E where D1 and D2 are the first two digits of the value of the resistor, and E is the number of zeros which follow. For example a resistor of 4700 ohms is encoded as yellow, violet, red. In addition resistors have a band which indicates its precision. These days this is almost certainly a gold band indicating 5% precision. From suppliers, a range of 0.125W resistors is also available - it is primarily of interest for those who are building circuits with a high density of components - to exploit such resistors we would need to be designing professionally made printed circuit boards. It is also possible to purchase a full range of 0.5W resistors. Generally, if you find that a circuit design calls for such a resistor, it's worth taking a look to see if it can be redesigned to use a lower value, or possibly to use another kind of component entirely. You can also obtain a very limited range of 1W and 10W resistors. Generally, if your circuit requires a low power resistor you can reckon to find just the right value of resistor to meet your requirements, whereas if you need a high power resistor you may have to adjust your circuit to fit the available values. The stability of a resistor is also an important consideration. Resistance varies with temperature (increasing with temperature in the case of metal and carbon resistors). Soldering a resistor in a circuit can cause a permanent change in its value. High precision resistors are available at a price from specialist suppliers. However if you need a resistance whose value can be specified to better than 5%, the combination of a fixed resistor with a "trimmer" potentiometer (q.v.) is often the best option. The time that you will really need to use a precision resistor is when you need a resistor whose value changes very little with temperature or ageing. For example, if you are wanting a precision voltmeter, you will typically be able to buy a 200mv meter quite cheaply, which can be adjusted to register in the range you require by using precision resistors. Let's now consider what happens when we form simple combinations of resistors. Firstly, suppose R1 and R2 are two resistors connected in series, as shown in the diagram. In this configuration the current I through each resistor is the same, while if V1 and V2 are the potential differences across R1 and R2 respectively, from Kirchoff's Voltage Law, the potential difference across the two resistors in series is given by V = V1 + V2 From the application of Ohm's Law, we have V1 = IR1 and V2 = IR2 . Hence Now let's consider the case in which the two resistors are connected in parallel. In this case, the voltage V across each resistor is the same, but by Kirchoff's current law, the current I into the network of 2 resistors is equal to the sum of the currents through each resistor. From Ohms law, we have V = I1R1, V = I2R2 so that R1R2 R = ------- R1 + R2One can sum up these results by saying that for resistors in series the total resistance is the sum of the individual resistances, while for resistors in parallel the total conductance is the sum of the conductances. Assuming we draw no current from the output, the current through the divider is given by Thus the potential divider acts as a circuit which scales down a signal by the above factor. By itself it is of limited use as a signal processor, since it only works as calculated if an insignificant current is taken from the output, which means in effect that it has can only drive a load with insignificant power. What does "insignificant" mean here? It can best be related to the accuracy with which the circuit works. It's fairly clear, for example, that if we want 1% accuracy from the circuit we'd better draw from the output less than 1% of the current flowing through the two resistors. When we come to consider power amplifying devices such as transistors, we'll see how we can buffer a circuit like this one so that its output-voltage is almost independent of load. For example, suppose you want a resistance of 1K ohms with a 1 percent accuracy. An economical way to do this is to put a 1.2K ohm resistor in parallel with a 10K potentiometer. To set the circuit up, the potentiometer can be adjusted until the resistance of the two in parallel is equal to 1K. Why not use just the potentiometer? Well, the above arrangement requires you to set the potentometer with an accuracy of 10%, which is a great deal easier than setting it to 1%. And it's hard to be sure that a cheap potentiometer will hold its setting to 1%, while you can be reasonably sure of 10%. In general, the idea of combining a fixed but inaccurate component with a "trimming" device is of considerable utility in electronics, though of course it's important to have only those adjustments that are strictly necessary in a circuit. Another variation on this theme is the use of potentiometers as position transducers. For this application it is possible to purchase high-accuracy potentiometers. A perfect voltage source is a 2 terminal "black box" that maintains a fixed voltage drop across its terminals, regardless of how much current is drawn out of it. Real voltage sources have a limit on maximum current, and behave like a at best like perfect voltage source with a small resistor in series. Any combination of voltage sources and resistors can be reduced to a single voltage source in series with a single resistor. This resulting simple circuit is called "Thevenin's equivalent circuit". D-size flashlight cell - 1.5volts, 1/4 ohm resistance 10,000 joules (watt-seconds). At end of life, 1.0volt, resistance = several ohms. So we can regard resistors as devices which have a fixed small signal resistance. A diode lets current flow in one direction only. There is a small forward voltage drop, usually around half a volt for general purpose silicon diodes. Usually a diode is realised as a cylindrical body with a lead emerging at each end. The direction in which current flows through such a diode is indicated by a band around the body which is nearest to the negative end of the diode when current is flowing through it. You can remember this as "the bar on the package is the bar in the diode-figure". Small signal diodes can typically capable of passing 100mA in the forward direction. One Amp diodes are quite cheap, and about the size of a 1/4 watt resistor. Power diodes can handle thousands of amps, for example to rectify AC current for full-size trains. In the non-conducting direction, diodes are limited by their peak reverse voltage abbreviated PRV. A PRV of 80V is common for run-of-the-mill diode, but hundreds of volts of PRV are possible. Exceed the PRV and you knacker your diode. Notice that the PRV is the PEAK reverse voltage, which is higher than the Root Mean Square voltage that is usually quoted for alternating current supplies. A diode may allow current to flow in the reverse direction. This current is typically very small. Any diode that passes a reverse current you can measure with an ordinary instrument is knackered. Diodes also have a (variable) capacitance when biased in the reverse direction. These are clever diodes that let current go through backwards while maintaining a near-constant voltage across them. So, if you want to build an electronic voltage-source, a zener diode is likely to be the component which provides a reference voltage. You could think of a Zeer diode as being like a weir with water. They also vary with temperature. The most temperature-stable zener diodes are those around 5-6 volts. Given the limitations of zener diodes, they are seldom used directly as voltage sources, but are incorporated in circuits where they are fed with a reasonably constant current. Amplification of what is in effect a signal from the zener is used to provide as much current as needed from the output of the electronic power source. It's also possible design a circuit which uses a 5-6 volt zener independent of the required output voltage. We'll see how to do this when we learn about the magic of transistors. Electrically these are diodes with a rather high forward voltage drop (say 2V). If you pass current through them (in the forward direction), by magic, they emit light! The rule for the forward drop is is that the bluer the light the higher the forward voltage - blue LED's may take as much as 5V to drive them. There are various versions - arrays of LED's are used to form displays, but usually with limited resolution. Another configuration that is seen is to have two LED's back-to-back in a single package - pass the current through in one direction and you get red light, in the other direction you get green light. You can get any colour between red and green by alternating the direction at a speed the eye can't follow (say 100hz). You should then try to orient your components so that the most positive terminal is highest, with the least positive terminal being lowest. This can be done for the "DC analysis" of the circuit, that is an estimation of the average voltage levels. Of course, when a circuit is doing something, typically levels will be changing as signals pass through it. It would be a mistake to follow this "highest = most positive" rule slavishly, because it may result in circuit drawings which are unnecessarily large. But it's a good rule to follow in general, and certainly at first, until you are used to reading circuit drawings. Only a limited range of metals can be soldered. You can't solder stainless steel or aluminium with standard soldering techniques, because these metals have a thin coating of oxide which gives them their bright appearance. You can solder copper, tinned copper, brass, iron, most steels. It is vital when soldering to heat up both surfaces to be joined to the melting point of solder, and then feed fresh solder from the reel into the joint. Do not attempt merely to transfer solder to the joint using the iron. The solder we use appears to be a thin solid wire. Actually it has a core of flux which helps to clean the metal to be joined. However, if you're soldering a component such as a transistor or resistor directly into the circuit, you should beware of overheating it. We do have available little heat-sinks that can be clamped on the leads of a component to protect it during soldering. Typically only a few seconds of heat need to be applied. While most electronic components and all printed circuit boards have small amounts of metal to be joined, if you are trying to solder heavy conductors or other objects, you will need to feed much more heat in the joint to make it "take". In a properly soldered joint, the solder wets the metal being joined. You can tell that the metal is wetted by the shape of the meniscus - if the solder looks like a little spherical blob on the metal, the joint is a bad "dry" joint. If the surface of the solder is concave as it joins the metal, then you have a good joint. Bad joints are a source of intermittent circuit failures which are hard to find. Some magnifying lenses are available in the lab to allow you to examine soldered joints carefully. Both solid and flexible wire can be soldered. Solid wire is probably easier to work with when making connections in a circuit board. It should not be used for any connection that is subject to flexing, so should not be used for connecting between circuit boards (unless these are rigidly mounted in some kind of card-cage). For solid wire subject to flexing will eventually fail by metal fatigue, giving rise to an intermittent connection that causes malfunctions that are hard to locate. Flexible wire can be used for wiring up a circuit board. A thin gauge is most suitable. The most satisfactory way to make a joint is to tin the end of the wire (which may need to be twisted to make it suitably compact) with solder before attempting to make the joint. If there's a fat blob of solder left at the very end, just snip it off. When you solder flexible wire, the end of the wire in effect becomes rigid. Where the remaining flexible part joins this rigid part the wire is likely to fail, so it must be supported in some way to ensure that most flexing takes place well away from the soldered joint. A short length of heat shrink tubing over the end of the wire is usually enough to prevent this happening. It also serves as insulation if needed. Metal to be soldered should be clean. It can be worth it to burnish up a printed circuit board with a fine-grade abrasive paper before soldering. Old flexible (multi-strand) wire may not take solder easily, even if it was originally tinned. Typically you will have to get it hotter than you might expect for the solder to "take". Care is needed when soldering, because the solder is hot enough to burn you. The most useful instrument for checking your work is the Digital Volt Meter (DVM). Ours are bright yellow. Set the dial to the continuity/diode check position. You should also do a basic check before you apply power to a circuit. Most semiconductor devices will die instantly if you connect the power the wrong way round. One former student in this course destroyed 80$ worth of components by making a wrong connection. Note also that the larger kind of capacitors (above 1 microfarad) are polarised - they also will die if you connect them wrongly. Watch out for excessive current consumption by the circuit. This is usually indicative of a component wrongly wired. Such components can get quite hot enough to burn you, so be careful... It's difficult to remove devices that have many legs, for example most integrated circuits. For this reason, you should always put integrated circuits in sockets when making an experimental board. And you should regard all boards built in this course as experimental. Sockets also make it easier to debug a board, because you can check that you have provided the right "living conditions" for an integrated circuit before you put it in the board, and if necessary you can pull it out and check again, or perhaps replace it if you have knackered it. Occasionally you may need to increase the temperature of the iron to melt enough solder to modify a board as required. Don't forget that desoldering may heat components up enough to knacker them. Using desoldering wick is generally less satisfactory than using a pump. It's difficult to get it hot enough to work, and it's liable to leave odd bits of wire around to cause shorts, or to solder itself to the circuit. When making a board it's desirable to require each connector to be different from the others on the board, so that the board cannot be accidentally connected wrongly, possibly resulting in the total destruction of the components on the board, or even of the board itself. This is something like a hardware equivalent of type-declarations when writing software, with the difference that if you get a type error your program doesn't have its functions shrivel up and die. Unfortunately when we are making prototypes it's difficult to find many different connectors that can be used on a board without drilling a distinctive pattern of holes. Our general purpose boards from Radio Shack are drilled with a pattern of holes on 0.1" centres: most connectors won't fit this pattern. So typically we use male and female headers to connect to boards. Probably the easiest system to work with is to put female headers on the board, and use male headers as plugs to fit into them. You can wire up these male headers as described in the Handyboard manual. Sometimes, particularly with double-row male headers which you'll need for the SSI interface, it's worth putting a blob of epoxy to hold all the pins in position once the basic wiring is done, since the pins of a male header are likely to slip through the plastic. We can try to make these connectors distinctive by using ones that have spare pins and sockets. If one of these spare pins is snipped off and put in the corresponding socket, you've created a connector that will only go in the right way round. With a bit of care we can create conventions which make it difficult to plug a system up wrongly. In some assignments the connections with the circuit board will be specified precisely. You must follow this specification, since this should ensure that boards built by different groups are interchangeable. Specifying "pin-out" is as much a part of specifying hardware as specifying a ".h" file is in specifying C, or specifying an interface is in Java.
<urn:uuid:67c512ca-aaaf-4f00-b915-2fdd2872ca91>
{ "dump": "CC-MAIN-2014-42", "url": "http://www-robotics.cs.umass.edu/~grupen/503/SLIDES/electricity.html", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414119646352.2/warc/CC-MAIN-20141024030046-00033-ip-10-16-133-185.ec2.internal.warc.gz", "language": "en", "language_score": 0.9494128227233887, "token_count": 7164, "score": 3.875, "int_score": 4 }
November 8, 2014 Sometimes, words just complicate things. What if our brains could communicate directly with each other, bypassing the need for language? University of Washington researchers have successfully replicated a direct brain-to-brain connection between pairs of people as part of a scientific study following the team’s initial demonstration a year ago. In the newly published study, which involved six people, researchers were able to transmit the signals from one person’s brain over the Internet and use these signals to control the hand motions of another person within a split second of sending that signal. At the time of the first experiment in August 2013, the UW team was the first to demonstrate two human brains communicating in this way. The researchers then tested their brain-to-brain interface in a more comprehensive study, published Nov. 5 in the journal PLOS ONE. “The new study brings our brain-to-brain interfacing paradigm from an initial demonstration to something that is closer to a deliverable technology,” said co-author Andrea Stocco, a research assistant professor of psychology and a researcher at UW’s Institute for Learning & Brain Sciences. “Now we have replicated our methods and know that they can work reliably with walk-in participants.” Collaborator Rajesh Rao, a UW associate professor of computer science and engineering, is the lead author on this work. The research team combined two kinds of noninvasive instruments and fine-tuned software to connect two human brains in real time. The process is fairly straightforward. One participant is hooked to an electroencephalography machine that reads brain activity and sends electrical pulses via the Web to the second participant, who is wearing a swim cap with a transcranial magnetic stimulation coil placed near the part of the brain that controls hand movements. Using this setup, one person can send a command to move the hand of the other by simply thinking about that hand movement. The UW study involved three pairs of participants. Each pair included a sender and a receiver with different roles and constraints. They sat in separate buildings on campus about a half mile apart and were unable to interact with each other in any way — except for the link between their brains. Each sender was in front of a computer game in which he or she had to defend a city by firing a cannon and intercepting rockets launched by a pirate ship. But because the senders could not physically interact with the game, the only way they could defend the city was by thinking about moving their hand to fire the cannon. Across campus, each receiver sat wearing headphones in a dark room — with no ability to see the computer game — with the right hand positioned over the only touchpad that could actually fire the cannon. If the brain-to-brain interface was successful, the receiver’s hand would twitch, pressing the touchpad and firing the cannon that was displayed on the sender’s computer screen across campus. Researchers found that accuracy varied among the pairs, ranging from 25 to 83 percent. Misses mostly were due to a sender failing to accurately execute the thought to send the “fire” command. The researchers also were able to quantify the exact amount of information that was transferred between the two brains. Another research team from the company Starlab in Barcelona, Spain, recently published results in the same journal showing direct communication between two human brains, but that study only tested one sender brain instead of different pairs of study participants and was conducted offline instead of in real time over the Web. Now, with a new $1 million grant from the W.M. Keck Foundation, the UW research team is taking the work a step further in an attempt to decode and transmit more complex brain processes. With the new funding, the research team will expand the types of information that can be transferred from brain to brain, including more complex visual and psychological phenomena such as concepts, thoughts and rules. They’re also exploring how to influence brain waves that correspond with alertness or sleepiness. Eventually, for example, the brain of a sleepy airplane pilot dozing off at the controls could stimulate the copilot’s brain to become more alert. The project could also eventually lead to “brain tutoring,” in which knowledge is transferred directly from the brain of a teacher to a student. “Imagine someone who’s a brilliant scientist but not a brilliant teacher. Complex knowledge is hard to explain — we’re limited by language,” said co-author Chantel Prat, a faculty member at the Institute for Learning & Brain Sciences and a UW assistant professor of psychology. Other UW co-authors are Joseph Wu of computer science and engineering; Devapratim Sarma and Tiffany Youngquist of bioengineering; and Matthew Bryan, formerly of the UW. The research published in PLOS ONE was initially funded by the U.S. Army Research Office and the UW, with additional support from the Keck Foundation. - Rajesh P. N. Rao, Andrea Stocco, Matthew Bryan, Devapratim Sarma, Tiffany M. Youngquist, Joseph Wu, Chantel S. Prat. A Direct Brain-to-Brain Interface in Humans. PLoS ONE, 2014; 9 (11): e111332 DOI: 10.1371/journal.pone.0111332
<urn:uuid:3fac1f53-9348-4b90-b5f5-2620beefd42b>
{ "dump": "CC-MAIN-2021-31", "url": "https://scienceofsingularity.com/2014/11/08/direct-brain-interface-between-humans/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154500.32/warc/CC-MAIN-20210804013942-20210804043942-00043.warc.gz", "language": "en", "language_score": 0.953724205493927, "token_count": 1103, "score": 3.359375, "int_score": 3 }
Copperheads prefer terrestrial to semi-aquatic habitats, which include rocky-forested hillsides and various wetlands. They have also been known to occupy abandoned and rotting slab or sawdust piles. Overall, the species inhabits the Florida panhandle north to Massachusetts and west to Nebraska. The Northern Copperhead (A. c. mokasen) inhabits northern Georgia and Alabama north to Massachusetts and west to Illinois. The Southern Copperhead (A. c. contortrix) inhabits the Florida panhandle north to Southern Delaware and west to SE Missouri, SE Oklahoma and E Texas. Georgia Wildlife Web Reptiles and Amphibians of Eastern/Central North America. A Peterson Field Guide. Roger Conant and Joseph Collins 3rd Edition. Houghton Mifflin, New York, NY. 1998.
<urn:uuid:582d9942-b7aa-4afa-9ae6-ec5916a21435>
{ "dump": "CC-MAIN-2014-52", "url": "http://www.fernbank.edu/STT/VertBio/pages/Reptilia/copperhead.htm", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802778013.38/warc/CC-MAIN-20141217075258-00002-ip-10-231-17-201.ec2.internal.warc.gz", "language": "en", "language_score": 0.863051176071167, "token_count": 170, "score": 2.78125, "int_score": 3 }
A schematic of a launch loop as imagined by Lofstrom. Advantages of launch loops Unlike conventional rockets, launch loops can have many launches per hour, independent of weather, and are not inherently polluting. Rockets create pollution such as nitrates in their exhausts due to high exhaust temperature, and can also create greenhouse gases depending on propellant choices. Launch loops require power in the form of electricity and as such it can be clean. For example it can run on geothermal, nuclear, wind, solar or any other power source, even intermittent ones, as the system has huge built-in power storage capacity. Additionally, launch loops would be quiet in operation, and would not cause any sound pollution, unlike rockets. Launch loops are also intended for human transportation. It gives a safe 3g acceleration which the vast majority of people would be capable of tolerating well, and would be a much faster way of reaching space than space elevators. Unlike space elevators which would have to travel through the Van Allen belts over several days, launch loop passengers can be launched to low earth orbit, which is below the belts, or through them in a few hours. This would minimize radiation doses and keep them within safe levels. Launch loops wouldn’t be subjected to the risks of space debris and meteorites, unlike space elevators. This is because they are to be situated at an altitude where orbits are unstable due to air drag. Therefore damage or collapse of loops in this way is expected to be extremely rare. Even if an accident does occur the consequences would be much less catastrophic than with a space elevator. If the launch loop is built over an uninhabited area such as a desert or an ocean, then there should be very little risk to human life in case of failure. Finally, their low payload costs of about 3 USD per kg will open up large-scale commercial space tourism and even space colonization. Also the initial costs of construction of 10 billion USD are quite low compared to the other non-rocket spacelaunch methods. This is roughly equivalent to the cost of 20 space shuttle launches. Difficulties of launch loops A running loop would have an extremely large amount of energy in the form of linear momentum (about 1.5×1015 joules or 1.5 petajoules). If a major failure did occur the energy release would be approaching a nuclear bomb explosion (or 350 kilotons of TNT equivalent), although not emitting any nuclear radiation. This is why the magnetic suspension system of the launch loop would be highly redundant, with failures of small sections having essentially no effect at all. Even if the safeties fail and this large amount of energy is released, it is unlikely that it would destroy very much of the structure due to its very large size. Also most of the energy would be deliberately dumped at preselected places when the failure is detected. Steps might need to be taken to lower the cable down from 80 km altitude with minimal damage, such as parachutes. A few technical issues involving the cable’s instability problems would have to be solved before constructing a launch loop. Lofstrom’s design requires electronic control of the magnetic levitation to minimize power dissipation and to stabilize the otherwise under-damped cable. In conclusion, the launch loop concept does have a few technical difficulties, but if those can be solved, the advantages of such a spacelaunch method are great. Lowering the costs of space travel and opening the final frontier to tourism and eventually colonization are just a few of them. Links to the other articles in this series - Non-Rocket Spacelaunch – Space Elevator - Non-Rocket Spacelaunch – Space Elevator Safety Issues - Non-Rocket Spacelaunch – Extraterrestrial Space Elevator Concepts - Non-Rocket Spacelaunch – Space Elevators in Fiction - Non-Rocket Spacelaunch – Tether propulsion - Non-Rocket Spacelaunch – Tether satellite missions - Non-Rocket Spacelaunch – Tether propulsion safety issues - Non-Rocket Spacelaunch – Tether propulsion in fiction
<urn:uuid:70b02a5c-c353-460a-9c15-c04436274cc3>
{ "dump": "CC-MAIN-2017-09", "url": "http://astroblog.cosmobc.com/2011/03/19/non-rocket-spacelaunch-advantages-and-difficulties-of-a-launch-loop/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174167.41/warc/CC-MAIN-20170219104614-00281-ip-10-171-10-108.ec2.internal.warc.gz", "language": "en", "language_score": 0.9454928040504456, "token_count": 845, "score": 3.859375, "int_score": 4 }
You are one of two people on a malfunctioning airplane with only one parachute. you refuse the parachute because you might die in the jump anyway. you refuse the parachute because people have survived jumps just like this before. you play a game of Monopoly for the parachute. you order them to conduct a feasibility study on parachute use in melti-engine aircraft under corde red conditions. you charge one parachute for helping them sue the airline. you tell them you need to run more tests, then take the parachute in order to make your next appointment. you sell them the parachute at top retail rates and get the names of their friends and relatives who might like one too. Internal Revenue Service you confiscate the parachute along with their luggage, wallet, and gold fillings. you strip-tease while singing that what they need is a neon parachute with computer altimeter for only $39.99. you make them another parachute out of aisle curtains and dental floss. you give them the parachute and ask them to send you a report on how well it worked. you refuse to accept the parachute without proof that it will work in all cases. you ask how they know the parachute actually exists. you explicate simile and metaphor in the parachute instructions. Literature: you read the parachute instructions in all four languages. you design a machine capable of operating a parachute as well as a human being could. you plot a demand curve by asking them, at regular intervals, how much they would pay for a parachute. you ask them what the shape of a parachute reminds them of. you tie them down so they can watch you develop the character of a person stuck on a falling plane without a parachute. you hang the parachute on the wall and sign it. as you jump out with the parachute, you tell them to work hard and not expect handouts. you ask them for a dollar to buy scissors so you can cut the parachute into two equal pieces. After reminding them of their constitutional right to have a parachute, you take it and jump out. you tell them not to worry, since it won't take you long to learn how to fix a plane. you issue a warning that skydiving can be hazardous to your health. Association of Tobacco Growers you explain very patiently that despite a number of remarkable coincidences, studies have shown no link whatsoever between airplane crashes and death. National Rifle Association you shoot them and take the parachute. you beat them unconscious with the parachute. you refuse to use the parachute unless it is biodegradable. your only rational and moral choice is to take the parachute, as the free market will take care of the other person. you start betting on how long it will take to crash. as long as you are looking at the plane engine, it works fine.
<urn:uuid:3342004f-3cc1-4ec4-a532-e539a3da4efb>
{ "dump": "CC-MAIN-2023-23", "url": "https://www.janko.at/Humor/Gesellschaft/Das%20Fallschirm-Paradigma.htm", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656788.77/warc/CC-MAIN-20230609164851-20230609194851-00394.warc.gz", "language": "en", "language_score": 0.9160186052322388, "token_count": 694, "score": 2.734375, "int_score": 3 }
Until 1772 Abgunstkampe was located in what was known as Royal Prussia (also known as Polish Prussia) in the Kingdom of Poland. The First Partition of Poland in 1772 resulted in the creation of a new province in 1773, called West Prussia, in which Abgunstkampe was located. The village was situated in the district (Kreis) of Marienburg until the establishment of the Free City of Danzig in 1920. The village came under the control of Nazi Germany during World War II until February 1945, when it was occupied by Soviet forces and returned to Poland. In 1820 Abgunstkampe had 14 inhabitants, of which nine were Mennonite. Mennonites who were residents of Abgunstkampe were members of the Tiegenhagen Mennonite Church. Wolf, Hans-Jürgen. "Familienforschung in Westpreußen." Web. 21 February 2013. http://www.westpreussen.de/cms/ct/ortsverzeichnis/details.php?ID=8412. |Author(s)||Richard D Thiessen| |Date Published||February 2013| Cite This Article Thiessen, Richard D. "Abgunstkampe (Pomeranian Voivodeship, Poland)." Global Anabaptist Mennonite Encyclopedia Online. February 2013. Web. 6 Mar 2015. http://gameo.org/index.php?title=Abgunstkampe_(Pomeranian_Voivodeship,_Poland)&oldid=79136. Thiessen, Richard D. (February 2013). Abgunstkampe (Pomeranian Voivodeship, Poland). Global Anabaptist Mennonite Encyclopedia Online. Retrieved 6 March 2015, from http://gameo.org/index.php?title=Abgunstkampe_(Pomeranian_Voivodeship,_Poland)&oldid=79136. ©1996-2015 by the Global Anabaptist Mennonite Encyclopedia Online. All rights reserved.
<urn:uuid:fdb0596e-7e05-4596-9a5d-4809a78edec3>
{ "dump": "CC-MAIN-2015-11", "url": "http://gameo.org/index.php?title=Abgunstkampe_(Pomeranian_Voivodeship,_Poland)&direction=prev&oldid=94015", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936465456.40/warc/CC-MAIN-20150226074105-00310-ip-10-28-5-156.ec2.internal.warc.gz", "language": "en", "language_score": 0.9148427844047546, "token_count": 458, "score": 2.578125, "int_score": 3 }
What is in this article?: - Over the long-run will supply out-pace demand in the years ahead? - Crop agriculture may once again face long periods of low prices. - Times of excess production could result in low price problems. In the absence of two critical issues, farm bill commodity programs would make little sense. Issue one: crop production can change considerably from year to year due to weather and disease, and issue two: over the long-haul supply increases faster than demand. Governments as far back as second millennium BC Egypt and late first millennium B.C.-early first millennium AD China have recognized that crop failures can have a negative impact on their citizens in terms of food availability and prices and disruption to the economy. China also recognized that times of excess production could result in low price problems for its farmers. With the opening up of the Western Hemisphere to European markets, the problem of supply increasing at a faster rate than demand began to rear its head in the U.S. and elsewhere in the New World. At first, the rate of increase of new agricultural land being brought into production was the cause of this rate differential. By the twentieth century, investment in agricultural research, education, and extension—much of it by governments—became significant factors allowing supply to increase faster than demand and leaving farmers to face long periods of low prices. The recent drought has reminded us that issue one is still in play. But what about issue two? Over the long-run will supply out-pace demand in the years ahead, as it has typically done for centuries? In recent columns, we have described developments that suggest that despite this year’s massive drought in the U.S. and maybe as a consequence of the resulting high prices, crop agriculture may once again face long periods of low prices. But some other analysts see the future differently. In a paper delivered at a Farm Science Review on September 18, 2012, in Ohio, one of our ag econ colleagues, Luther Tweeten, argued that “the era of falling real prices of food is over.” Tweeten wrote, “two ‘megatrends’ are underway, one on the food supply side and another on the food demand side.” Tweeten begins by looking at food supply, writing that “U.S. excess production capacity totaled 6 percent in 1962 and averaged near that proportion throughout the 1960s. In sharp contrast, excess production capacity in U.S. agriculture today is near zero.” While seeing the 2012 drought as “transitory,” he says if global warming is underway, we may see “unusual weather events such as storms and drought.”
<urn:uuid:c63fc689-5b5c-4e53-9002-01afa38cbe30>
{ "dump": "CC-MAIN-2015-11", "url": "http://southwestfarmpress.com/management/commodity-programs-not-needed-if-demand-outpaces-supply?page=1", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463093.76/warc/CC-MAIN-20150226074103-00016-ip-10-28-5-156.ec2.internal.warc.gz", "language": "en", "language_score": 0.9596503376960754, "token_count": 557, "score": 3.296875, "int_score": 3 }
In a New Zealand first, breweries Lion and DB will add nutritional information panels to beer bottles, cans and packaging. These labels will give consumers information about the sugar, calories, dietary fibre, protein and carbohydrate content of their beers. Throughout the year 450 million nutritional labels will be rolled out onto packaging on a wide range of beers including Steinlager, Macs, Speights, Tui and Monteiths. It's the first step of a Brewers Association promotion campaign called 'Beer the Beautiful Truth' that aims to "bust myths and communicate nutritional facts about beer". Brewers Association external relations director Kevin Sinnott said while DB and Lion are on board so far, they welcome other New Zealand breweries to join the campaign. He says the initiative will help keep consumers informed about beer. "Beer gets a bad rap at times, often due to misconceptions around what's in it. "With nutrition information panels, everything is out in the open. And we think people might be pleasantly surprised by the beautiful truth about beer." A press release from the campaign was keen to push the fact that beer is low sugar. "Most people don't know that most beer is 99 percent sugar free. Malted barley is one of the key ingredients in beer, and in the brewing process the starch from malted barley is converted into sugar. This sugar, or sugar from any other ingredient such as wheat, other grains, or natural cane sugar, is then converted into alcohol by the yeast during the fermentation process. As a result, the finished beer is very low in sugar." Janet Weber, senior lecturer at Massey University's institute of food and science, said that focussing on low sugar is "very misleading to the consumer". "Obviously they've chosen to focus on the sugar, it's the buzz thing now isn't it - everyone wants sugar free. But they're sort of ignoring the fact that alcohol provides quite a lot of kilojoules." Ms Weber says it's important for people to think about the total kiloujoules in what they are drinking, in addition to the food they're eating. "Alcohol itself contributes more kiloujoules per gram than sugar does." She says "it seems a bit unusual" that nutrition labels weren't listed on beers already, but thinks the labels will be useful for people to compare across brands. "Alcohol is very important to our society but it is not actually safe at the levels we drink. We can't make it healthy by saying it's low in sugar". All the nutritional information included on participating beers is also available to view on the website beerthebeautifultruth.co.nz.
<urn:uuid:0ae65658-b515-4c33-910c-2a6556b64583>
{ "dump": "CC-MAIN-2017-39", "url": "http://www.newshub.co.nz/home/health/2017/02/beer-to-get-nutritional-labels.html", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818685850.32/warc/CC-MAIN-20170919145852-20170919165852-00042.warc.gz", "language": "en", "language_score": 0.954749345779419, "token_count": 553, "score": 2.5625, "int_score": 3 }
What is the meaning of radioactive dating This document discusses the way radiometric dating and stratigraphic principles are used by looking at the ratio between the original radioactive isotope and. Learn about different types of radiometric dating, such as carbon dating understand how decay and half life work to enable radiometric dating play a game that tests your ability to match the percentage of the dating element that remains to the age of the object. Radiometric dating methods are the strongest direct evidence that meaning particles that can appear in radioactive-series dating could be open to. Learn more about radioactive decay what is meant by the half life of a radioactive isotope how is carbon- 14 dating hands on model to demonstrate the meaning. Radioactive dating definition, radiometric dating see more (rā'dē-ō-mět'rĭk) a method for determining the age of an object based on the concentration of a particular radioactive isotope contained within it. But the radioactive atoms used in dating techniques have been subjected to heat, cold, pressure, vacuum, acceleration, and strong chemical reactions to the extent. Freebase (000 / 0 votes) rate this definition: radiometric dating radiometric dating is a technique used to date materials such as rocks, usually based on a comparison between the observed abundance of a naturally occurring radioactive isotope and its decay products, using known decay rates. Radioactive meaning, definition, what is radioactive: having or producing the energy that comes from the breaking up of atoms: learn more. Start studying radioactive dating learn vocabulary, terms, and more with flashcards, games, and other study tools. Radioactive dating definition chemistry carbon-14 36cl has removed anthony scaramucci from oxford dictionaries all radioactive dating uses of fossil. Radioactive dating is a method for calculating the age of rocks and fossils by considering the concentrations of certain elements. Looking for the meaning or definition of the word radioactive dating here are some definitions. The nitty gritty on radioisotopic dating radioactive decay radioisotopic dating relies on the process meaning that they are very confident that the true. Definition of radioactive dating in the financial dictionary - by free online english dictionary and encyclopedia what is radioactive dating meaning of radioactive dating as a finance term. Radiometric dating is a means of determining the age of a mineral specimen by determining the relative amounts present of certain radioactive elements by age we mean the elapsed time from when the mineral specimen was formed radioactive elements decay (that is, change into other elements) by. Radiometric dating is used to estimate the age of rocks and other objects based on the fixed decay rate of radioactive what is radioactive dating - definition. Radioactive definition is — of, caused by, or exhibiting radioactivity of, caused by, or exhibiting radioactivity how to use radioactive in a sentence. Definition of radiocarbon dating in the audioenglishorg dictionary meaning of radiocarbon dating what does radiocarbon dating mean proper usage of the word radiocarbon dating. Radioactive dating works by measuring the percentage of a radioactive isotope present in a sample if 50% of the radioactive isotope is left one half life has passed. What is the meaning of radioactive dating Radiocarbon dating, also known as the c14 dating method, is a way of telling how old an object isit is a type of radiometric datingthe method uses the radioactive isotope carbon-14. This document discusses the way radiometric dating and stratigraphic by looking at the ratio between the original radioactive (by large i mean. What is the meaning of radioactive carbon dating things absorb c14 at a certain rate, abd they stop when they die what is is radioactive dating based on. Half-life: half-life,, in dating: principles of half-life is defined as the time period that must elapse in order to halve the initial number of radioactive. Radioactivity is the emission of radiation from an unstable atomic nucleusthis emission of energy is called radioactive decaythe radiation can be emitted in the form of a positively charged alpha particle (α), a negatively charged beta particle(β), or gamma rays (γ). Radioactive dating definition, meaning, english dictionary, synonym, see also 'radioactive decay',radioactive series',radioactive tracer',radioactive waste', reverso dictionary, english definition, english vocabulary. Definition of radioactive dating in the definitionsnet dictionary meaning of radioactive dating what does radioactive dating mean information and translations of radioactive dating in the most comprehensive dictionary definitions resource on the web. Radioactive dating no problem for the bible the result would mean nothing every radioactive date has to be interpreted before anyone can say what it means. In the classroom home students gain a better understanding of radioactive dating and half-lives what does it mean when we say an atom has “decayed”. How to use radioactive in a sentence example sentences with the word radioactive radioactive example sentences.
<urn:uuid:62dc6216-3668-4d48-abb7-a721345fb6d2>
{ "dump": "CC-MAIN-2018-43", "url": "http://erhookuponlinelgos.theatre-tak.info/what-is-the-meaning-of-radioactive-dating.html", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583512693.40/warc/CC-MAIN-20181020101001-20181020122501-00525.warc.gz", "language": "en", "language_score": 0.9017165899276733, "token_count": 1000, "score": 3.1875, "int_score": 3 }
Starting at $75 About Craniosacral Therapy Craniosacral Therapy was first developed in 1970, during a neck surgery in which he was assisting, that osteopathic physician John E. Upledger first observed the rhythmic movement of what would soon be identified as the craniosacral system. None of his colleagues nor any of the medical texts at the time could explain this discovery, however. His curiosity piqued, Dr. Upledger began searching for the answer. He started with the research of Dr. William Sutherland, the father of cranial osteopathy. For some 20 years beginning in the early 1900s, Sutherland had explored the concept that the bones of the skull were structured to allow for movement. For decades after, this theory remained at odds with the beliefs of the scientific and medical communities. Dr. Upledger believed, however, that if Sutherland’s theory of cranial movement was in fact true, this would help explain, and make feasible, the existence of the rhythm he had encountered in surgery. It was at this point that Dr. Upledger set out to scientifically confirm the existence of cranial bone motion. From 1975 to 1983 he served as clinical researcher and Professor of Biomechanics at Michigan State University, where he supervised a team of anatomists, physiologists, biophysicists and bioengineers in research and testing. The results not only confirmed Sutherland’s theory, but led to clarification of the mechanisms behind this motion — the craniosacral system. Dr. Upledger’s continued work in the field ultimately resulted in his development of CranioSacral Therapy.Few structures have as much influence over the body’s ability to function properly as the brain and spinal cord that make up the central nervous system. And, the central nervous system is heavily influenced by the craniosacral system – the membranes and fluid that surround, protect and nourish the brain and spinal cord. Every day your body endures stresses and strains that it must work to compensate for. Unfortunately, these changes often cause body tissues to tighten and distort the craniosacral system. These distortions can then cause tension to form around the brain and spinal cord resulting in restrictions. This can create a barrier to the healthy performance of the central nervous system, and potentially every other system it interacts with. Fortunately, such restrictions can be detected and corrected using simple methods of touch. With a light touch, the CST practitioner uses his or her hands to evaluate the craniosacral system by gently feeling various locations of the body to test for the ease of motion and rhythm of the cerebrospinal fluid pulsing around the brain and spinal cord. Soft-touch techniques are then used to release restrictions in any tissues influencing the craniosacral system. By normalizing the environment around the brain and spinal cord and enhancing the body’s ability to self-correct, CranioSacral Therapy is able to alleviate a wide variety of dysfunctions, from chronic pain and sports injuries to stroke and neurological impairment. Jennifer Bull, Michon Lowe, Jennifer Rowe, Amber Gilderoy, and Colette French are the Practitioners at Unlocking The Body who utilize Craniosacral Therapy in their sessions. Each Provider has completed a different level in their Craniosacral training. For more information check out the FAQ's below or read the Bio Page of each Therapist, then email your favorite at the address provided on their page. FAQ's about Craniosacral Therapy: In what way is Craniosacral Therapy different from other forms of Massage? CranioSacral Therapy (CST) is a gentle, hands-on approach that releases tensions deep in the body to relieve pain and dysfunction and improve whole-body health and performance. It was pioneered and developed by Osteopathic Physician John E. Upledger after years of clinical testing and research at Michigan State University where he served as professor of biomechanics. Using a soft touch which is generally no greater than 5 grams – about the weight of a nickel – Practitioners release restrictions in the soft tissues that surround the central nervous system. CST is increasingly used as a preventive health measure for its ability to bolster resistance to disease, and it''s effective for a wide range of medical problems associated with pain and dysfunction. How long are the sessions? Each session is typically 1 hour. However, clients may be seen from ½ hour up to 2 hours. What is a typical session like? First, a history is usually taken and the client’s condition is reviewed by the Pracititoner. The client stays fully clothed and usually lies on a treatment table. The Pracitioner then evaluates the client by placing their hands on various points on the body to locate the areas of restrictions. Once the specific areas are located the Pracitioner will begin working on one of the places of greatest restriction. During the session, the Pracitioner may work exclusively in this one area or move around the body as required to release and ease the competing tensions and restrictions within the body. How does it feel, should I feel anything? During the session clients may feel nothing except the therapist’s hands on their body, or they may feel like things are moving inside their body. They may also feel tingling, pains arising in different parts of their body that quickly disappear, heat, pulls within the body, or pulses. Following the session some clients feel a deep sense of relaxation while others may find immediate relief of pain. Others may at times feel nothing or an increase of pain for a period of time up to 24-48 hours, after which a relief of pain or discomfort improves significantly. What conditions can Craniosacral Therapy help with? - Migraines and Headaches - Chronic Neck and Back Pain - Stress and Tension-Related Disorders - Motor-Coordination Impairments - Infant and Childhood Disorders - Brain and Spinal Cord Injuries - Chronic Fatigue - TMJ Syndrome - Central Nervous System Disorders - Learning Disabilities - Post-Traumatic Stress Disorder - Orthopedic Problems - And Many Other Conditions How many treatment sessions will I need? Response to CST varies from individual to individual and condition to condition. Your response is uniquely your own and can''t be compared to anyone else''s — even those cases that may appear to be similar to your own. The number of sessions needed varies widely — from just one up to three or more a week over the course of several weeks. Your Practitioner will discuss your specific plan with you at the end of your first session. What should I feel after a CST treatment session? Just as individual experiences can differ, so can the immediate results. This relaxed state may cause some to sleep for many hours after a session. Others may experience an increase in energy. Some people report that they feel as if somebody had moved things about in their body. Reduction of pain or an increase in function may occur immediately after the session or it may develop gradually over the next few days. For some there may be a reorganization phase as the body adapts to the release of previously held patterns. Occasionally, certain CST techniques will dredge up “old emotions, memories, or pains” that had gone away. This is a good thing! The old emotions or pains hadn't disappeared; they were simply dormant and waiting to reappear at another time. Our bodies help us by storing away traumatic events so that they can be processed at a safe time later on. By allowing these old emotions and pain to resurface opens the path to healing and release function. Here is a video about brain trauma and the benefits of Craniosacral Therapy in NFL players specifically. For More Information About Craniosacral Therapy Check Out This Link to the Upledger Institute's Website: www.upledger.com
<urn:uuid:e0d62764-12d3-4c7b-a60c-212f9753504c>
{ "dump": "CC-MAIN-2018-43", "url": "https://www.unlockingthebody.com/our-services/craniosacral-therapy/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583517628.91/warc/CC-MAIN-20181024001232-20181024022732-00553.warc.gz", "language": "en", "language_score": 0.947897732257843, "token_count": 1647, "score": 3, "int_score": 3 }
Hearing problems are grouped in a number of ways. The exact section of the auditory system affected is what determines the categorization. The hearing loss may be sensorineural, conductive, central, functional or mixed. The starting point in designing a treatment plan is to accurately diagnose the kind of hearing impairment. Sensorineural hearing loss Sensorineural hearing loss is responsible for more than 90 percent of the cases in which a hearing aid is used. It is the result of damage in the interior of the ear or to the acoustic nerve, which keeps sound signals from reaching the brain. Also referred to as nerve deafness or retrocochlear hearing loss, the damage is generally speaking permanent, though advancements in technology have enabled some formerly untreatable cases to see some improvement. The most common reasons behind sensorineural hearing loss are aging, extended exposure to noise, problems with circulation of blood to the interior of the ear, fluid disturbance in the inner ear, medications that cause injury to the ear, some diseases, genetics and issues with the auditory nerve. Hearing aids are satisfactory for most people who have this type of hearing loss, but in more severe cases, a cochlear implant can help bring back hearing to those individuals for whom a conventional hearing aid is insufficient. Conductive hearing loss When sound waves are not completely conducted to the interior of the ear through the structures of the outer and middle ear, conductive hearing loss occurs. Conductive hearing loss is quite widespread and could be caused by a buildup of ear wax, an accumulation of fluid in the eustacian tube, which keeps the eardrum from moving properly, a middle ear infection, a perforated eardrum, disease of the tiny bones of the middle ear and other obstructions in the ear canal. The majority of cases of this type of hearing loss are reversible, assuming there isn’t any permanent damage to the structures of the middle ear, and with treatment the trouble usually resolves in a short amount of time. In some instances surgery can help to correct the problem or a hearing aid may be fitted. Central hearing loss Central hearing loss occurs when an issue in the central nervous system prevents sound signals from being processed and interpreted by the brain. The person affected can ostensibly hear perfectly well, but can’t decode or decipher what is being said. Many cases involve a problem with the individual’s capacity to adequately filter rival sounds. For example, most of us can have a conversation while there is traffic noise in the background, but people with this problem have a really hard time with this. Functional hearing loss An infrequent situation, this type of hearing loss does not have a psysiological explanation. Functional hearing loss is caused by psychological or emotional problem in which the person’s physical ability to hear is found to be normal, but they do not seem to be able to hear. Mixed hearing loss As the term suggests, mixed hearing loss is a combination of different types of hearing loss, in this case the combination of sensorineural and conductive hearing loss. Though there are a few other types of hearing loss, the combination of these two is most frequent.
<urn:uuid:736e775b-4082-4c96-bacb-18ebf599a780>
{ "dump": "CC-MAIN-2024-10", "url": "https://www.physicianhearingcenters.com/hearing-loss-articles/summary-of-the-5-major-forms-of-hearing-loss/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474676.26/warc/CC-MAIN-20240227121318-20240227151318-00774.warc.gz", "language": "en", "language_score": 0.9497189521789551, "token_count": 653, "score": 3.796875, "int_score": 4 }
By Barbara Boughton Yoga practitioners have long touted the health advantages of their practice, including increased flexibility, improved balance and posture, and stress reduction. Some research studies support these claims although the scientific evidence is far from conclusive. Now, a new study highlights another possible benefit of yoga: It may improve bone health — even for those with osteoporosis. Loren M. Fishman, M.D., a physiatrist at Columbia University and a specialist in rehabilitative medicine, has studied the health benefits of yoga for years. In 2009, Dr. Fishman and colleagues published a pilot study which showed that 11 subjects who practiced yoga regularly over two years showed significant improvements in bone mineral density (BMD) of the spine and hip when compared to seven controls who did no yoga. To study the bone benefits of yoga in a larger study, Dr. Fishman invested his own money and solicited participants via the Internet to perform, over 10 years, 12 assigned yoga poses each day or every other day. The results? Ten years after beginning the yoga program, 227 of the moderately to fully adherent participants showed significant increases in BMD of the spine and femur, but not significant improvements in BMD of the hip, according to the study, published in the journal Topics in Geriatric Rehabilitation in November 2015. The study’s results are striking because most participants were elderly, with a mean age of 68. Moreover, 83% had osteoporosis or osteopenia at baseline. From a DVD, the participants in the study learned the yoga poses. The participants were instructed to hold each pose for 30 seconds. Once the participants learned all the poses, the yoga regimen took just 12 minutes to complete. During the study, the participants used an online program to record how many poses they did and how often. The researchers collected data on the participants’ BMD. The researchers also took X-rays of the spine and hips and took blood and urine chemistry at baseline. Ten years later, the moderately or fully adherent participants underwent repeat measurements of BMD and many also had repeat X-rays. For the yoga regimen, the researchers selected poses that pitted one group of muscles against another and would be most likely to affect BMD of the femur, hip, and spine. They also chose poses that would be safe for elderly patients with osteoporosis. Thus, the poses required, with a straight back, leg lifts, lunges, and/or twists. The poses did not require bending the back. At the conclusion of the study, the researchers wrote, there were no reported X-ray-detected fractures or serious injuries of any type that stemmed from the practice of yoga. Yoga has distinct benefits over other treatments for osteoporosis because it is low cost and the “side effects of yoga include better posture, improved balance, enhanced coordination, greater range of motion, higher strength, reduced levels of anxiety and better gait,” the researchers wrote in their paper. By contrast, elderly women treated with osteoporosis medications frequently suffer gastrointestinal side effects, and these side effects are often barriers to treatment compliance. In fact, a recent study published in Clinical Interventions in Aging (2015) showed that, among 126,188 elderly female Medicare patients, only 28% had initiated and continued treatment one year after being diagnosed with osteoporosis. Gastrointestinal events affected a significant number of patients, including 69% of those patients that were non-adherent. Still, the authors of the new study on yoga and bone health caution that their research has important limitations. Many of the study’s participants had weakened bones at the start and were already performing yoga. The participants’ behavior may have influenced the results. Also, the study did not assess BMD in the thoracic spine, the forearm, or ribs — places where many osteoporotic fractures occur. Most importantly, the design of the study — including the use of the Internet as a recruitment tool and the lack of a control group — may have selected participants likely to benefit from yoga and may have limited the conclusions clinicians can draw from the results. While yoga may have health benefits for patients — and may even improve bone health — clinicians should also consider the potential for injury among elderly participants, especially those with osteoporosis. Many orthopedic surgeons report that women who do yoga can suffer agonizing pain and serious wear and tear on the hip that can progress to arthritis, according to an article — by writer and book author William Broad — published as an editorial in The New York Times in 2013. Among orthopedic surgeons, yoga poses are well known for causing hip injuries. The reason for the injuries — especially among women — is that the extreme leg motions of yoga can cause hip bones to strike one another repeatedly, according to the editorial in The Times. There is much that is still unknown about the true benefits and risks of yoga. Studies on yoga have documented hip damage from the practice, for instance, but research also shows that yoga can help patients cope with the pain of osteoarthritis and fight joint inflammation. To obtain health benefits from yoga and avoid injury, it is crucial to practice gentler forms of this exercise and to moderate poses if they are painful. “Better to do yoga in moderation and listen carefully to your body. That temple, after all, is your best teacher,” wrote author William Broad in the Times’ editorial. - Lu YH, Rosner B, Chang G, et al. Twelve-minute daily yoga regimen reverses osteoporotic bone loss. Topics in Geriatric Rehabilitation. November 2015. - Fishman L Yoga for osteoporosis: A pilot study. Topics in Geriatric Rehabilitation. 2009; 25 (3): 244-50. - Siris ES, Yu J, Bognar K, et al. Undertreatment of osteoporosis and the role of gastrointestinal events among elderly osteoporotic women with Medicare Part D drug coverage. Clinical Interventions in Aging. November 5, - Brody JE. Twelve minutes of yoga for bone health. The New York Times. December 21, 2015. - Broad WJ. Women’s flexibility is a liability (in yoga). Editorial, The New York Times. November 2, 2013.
<urn:uuid:41457155-1a51-4b49-b432-8856dee91ac5>
{ "dump": "CC-MAIN-2017-30", "url": "http://blog.inrseminars.com/yoga-and-osteoporosis/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424756.92/warc/CC-MAIN-20170724062304-20170724082304-00269.warc.gz", "language": "en", "language_score": 0.9534851908683777, "token_count": 1301, "score": 2.8125, "int_score": 3 }
“Slouching Through the Depression” Depression-era tax policies had the unintended consequence of creating a “risk-less economy.” In his 1933 inauguration speech, Franklin Delano Roosevelt famously told the nation, “Let me assert my firm belief that the only thing we have to fear is fear itself—nameless, unreasoning, unjustified terror which paralyzes needed efforts to convert retreat into advance.” Thanks to Roosevelt’s bold and firm leadership, the United States was no longer in fear of dissolving into revolution or anarchy. But although unemployment declined and the economy advanced steadily throughout Roosevelt’s first two terms, the New Deal failed to completely pull the United States out of the depression. The median joblessness rate during the New Deal was 17.2 percent, and until the United States entered the war, it never fell below 14 percent. The country was still in the grip of fear, but it was of a different sort. It was a profound fear to take economic risks. The fact is, the crash of 1929 inflicted deep scars on the psyche of the nation—scars that would not heal until after the war. If Americans were afraid to deposit money in a bank, they were surely in no mood to invest in securities or any other venture that wasn’t as solid as Manhattan bedrock. Despite all the positives of the New Deal, and there were many, Depression-era tax policies had the unintended consequence of creating a “risk-less economy.” A string of tax hikes and new taxes extinguished the nation’s sparks of innovation. On top of the Revenue Act of 1932—one of the largest tax increases in American history, which doubled the estate tax, increased corporate taxes by almost 15 percent, and raised taxes on the highest incomes from 25 percent to 63 percent—the Revenue Act of 1935 raised new taxes on higher income levels, corporations, and estates. The Revenue Act of 1937 taxed short-term capital gains as ordinary income. And in 1936, Roosevelt added a higher top rate of 79 percent on individual income greater than $5 million—a rate that was increased again in 1939. By 1937, the undistributed profits surtax severely restricted the ability of small companies to build up their capital out of earnings, and the large surtax on individual incomes discouraged rich people from investing in new companies. At the 1936 Investment Bankers Association (IBA) conference, MIT president Karl T. Compton warned that the new surtax illustrated “how government regulation has been directed almost entirely at the curbing of exploitation and has generally ignored and sometimes even penalized attempts toward technical progress.” The result was that more and more funds flowed into super-conservative investment trusts, and to insurance companies and pension funds. By the 1938 IBA convention, the financial community began to express deep concern about the nation’s atrophied capital markets. “If investors throughout the land, large and small, refrain from purchasing unseasoned securities of a young industry and refuse to take a business man’s risk, where will new industries obtain needed capital, and would not such a development slow down the economic progress of the country?” asked Dr. Marcus Nadler, a New York University finance professor.
<urn:uuid:51c7f851-8ff9-413c-83cc-5421962266e7>
{ "dump": "CC-MAIN-2017-13", "url": "https://creativecapital.wordpress.com/2008/12/01/part-6-slouching-through-the-depression/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218193716.70/warc/CC-MAIN-20170322212953-00315-ip-10-233-31-227.ec2.internal.warc.gz", "language": "en", "language_score": 0.9558912515640259, "token_count": 675, "score": 3.125, "int_score": 3 }
▪ Mountain huts This short article describes briefly what a mountain hut is. ▪ Mountain forests These articles regulate the conditions under which a land has to be reserved for natural regeneration (“mise en défens”) in mountainous areas. They also provides that measures have to be taken to restore and reafforest mountainous lands when necessary. ▪ Mountain agriculture This article recognises mountain agriculture as an activity of general interest. It provides that this type of agriculture has to be promoted and supported and considers its natural specificities. This article provides that the fact to put a product on the market with the name "mountain" on it without having been given first an administrative authorization is a 3rd classe infraction (out of 5). These articles from the regulation part give further details on the authorization and the products from mountainous areas. These articles provide for instance what products can be granted the authorization and which are exempted from asking it. This chapter regulates the construction of ski lifts and explains what authority is competent to give the authorization and what procedure has to be followed by the builders. This section regulates the use of moving walkways and ski lifts in mountainous areas (construction, security, monitoring, etc.). This article bans the use of snowmobiles for leisure purposes, except on special sites which are dedicated this activity. ▪ Ski areas These articles regulate the spatial planning of ski areas.
<urn:uuid:4620cc1f-7807-434f-aa35-4ac3efb6e806>
{ "dump": "CC-MAIN-2021-43", "url": "https://mountainlex.alpconv.org/index.php/national/13-national/france/codifiedlegislation", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585348.66/warc/CC-MAIN-20211020183354-20211020213354-00378.warc.gz", "language": "en", "language_score": 0.92354816198349, "token_count": 294, "score": 2.953125, "int_score": 3 }
Apr 01, 2014 : 6:00 pm - 9:30 pm Tuesdays & Thursdays, 04/01/14 - 04/10/14, 6:00 pm - 9:30 pm, $799 Learn to hand-code PHP, a widely-used general-purpose scripting language especially suited for Web development and database-powered websites. This course covers a basic overview of PHP, including setting up a development environment, becoming familiar with the PHP interpreter, basic language syntax and variables. Other topics will include operators, handling HTML form data, basic security, and the use of sessions or cookies. Pre-Requisites: Students will benefit from a familiarity with hand-coding HTML/XHTML. For more information, call 801-581-6061 or visit http://continue.utah.edu/edtech/class/edtec_520_php_level_1.
<urn:uuid:3a8dff7e-c9ed-4a82-b64f-24ea7efc7c24>
{ "dump": "CC-MAIN-2015-18", "url": "http://utahbusiness.com/events/view/php_level_1", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246660493.3/warc/CC-MAIN-20150417045740-00078-ip-10-235-10-82.ec2.internal.warc.gz", "language": "en", "language_score": 0.7921198606491089, "token_count": 186, "score": 2.65625, "int_score": 3 }
Below are some tips on how to protect your child, and encourage them to make smart choices in their online life. This information is informed by Childnet.com, and the NDCS' online guide, and we recommend parents and young people visit their websites for more information on online safety. - Have a conversation - Ask your children to tell you about the sites they like to visit and what they enjoy doing online. Ask them about how they stay safe online. What tips do they have for you, and where did they learn them? What is OK and not OK to share? Ask them if they know where to go for help, where to find the safety advice, privacy settings and how to report or block on the services they use. - Respect the fact that as your child gets older they will want more privacy, but make it clear that they can talk to you if anything goes wrong online. - Explain how everything your child puts online about themselves builds up their online reputation - if they wouldn’t share the information in real life, then they shouldn’t share it online. - Sit down with your child and review their privacy settings – make sure they are aware of how much information they are sharing about themselves. You might find the social networks checklists from the UK Safer Internet Centre (www.saferinternet.org.uk/social-network-checklists) useful. - Warn your child that not everything or everyone online can be trusted. Encourage them to question people’s motives and to challenge the idea of online friendship. - If your child has told you they are being bullied online, reassure them that they did the right thing by telling you and that together you can do something about it. Make sure your child knows how to block, report or delete contacts that are upsetting them. You could signpost them to NDCS Buzz (the website for deaf children and young people) where you will find information on how to deal with cyberbullying: www.ndcsbuzz.org.uk/stayingsafeonline. Below is an NDCS guide to online safety aimed at young people. BSL videos on online safety can be found on YouTube, from organisations such as the NDCS and Childline. You can view our e-Safety policy here.
<urn:uuid:209743c1-20f4-4a63-9d9a-bf95f108403e>
{ "dump": "CC-MAIN-2019-51", "url": "http://exeterdeafacademy.ac.uk/school/for-parents/e-safety", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540491871.35/warc/CC-MAIN-20191207005439-20191207033439-00442.warc.gz", "language": "en", "language_score": 0.962998628616333, "token_count": 470, "score": 3.28125, "int_score": 3 }
Helping students gain understanding and self-confidence in algebra. honest_denverco09 wrote:1/ Please help me write a quadratic function whose graph has only one x-intercept, -4 and whose y-intercept, -8 in factored form. honest_denverco09 wrote:2/ If we have a graph of polynomial function, how can we write its equation ? Actually, if i have a graph of cubic or 4th-degree polynomial function, how can i know the sign of their leading coefficient, whether positive or negative ? honest_denverco09 wrote:For EX : I have two following graphs : One is quadratic function : Two is 4th-degree function : How can i write these equations ? honest_denverco09 wrote:I can not open the links that you sent to me....
<urn:uuid:944834f1-3083-4350-8493-a29ad3878932>
{ "dump": "CC-MAIN-2013-20", "url": "http://www.purplemath.com/learning/viewtopic.php?f=9&t=441&p=1415", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704655626/warc/CC-MAIN-20130516114415-00098-ip-10-60-113-184.ec2.internal.warc.gz", "language": "en", "language_score": 0.9239565134048462, "token_count": 190, "score": 3.140625, "int_score": 3 }
Aging is viewed by many Americans as being a process of loss and decay, and late life is often seen as a time of life characterized by dependency and despair. In response to prejudicial views of older persons that pervaded the youth-oriented society in the 1960s, Robert Butler coined the term "ageism" to reflect the similarity of these prejudices to racism and sexism. Like racism and sexism, Butler perceived ageism as a way of "pigeonholing" people and denying older adults the opportunity of being individuals capable of unique ways of living their lives. Aging can be a journey that is profoundly different, depending on one's generation and one's lifestyle during earlier years. This chapter examines important facts about the aging of America and discusses ways to promote successful aging. It also considers the implications of aging for continued involvement in such roles as work and family activities. Finally, it looks at common medical and mental disorders of late life, and what we know about the best ways to manage common disorders of aging. |Title of host publication||Diversity in Human Interactions| |Subtitle of host publication||The Tapestry of America| |Publisher||Oxford University Press| |State||Published - 22 Mar 2012| Bibliographical notePublisher Copyright: © Oxford University Press, 2014. - Mental disorders - Robert butler
<urn:uuid:03d28d56-5936-43e9-9167-6e54e9861d08>
{ "dump": "CC-MAIN-2023-50", "url": "https://pure.ewha.ac.kr/en/publications/the-wisdom-of-years-understanding-the-journey-of-life", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100677.45/warc/CC-MAIN-20231207153748-20231207183748-00656.warc.gz", "language": "en", "language_score": 0.9297727942466736, "token_count": 277, "score": 3.140625, "int_score": 3 }
Because of the wide differences in population among different countries, direct comparisons of numbers of cases, deaths, and tests among countries does not always provide a good understanding of how well each country is doing with respect to the pandemic. Making comparisons in terms of rates is a way to get a better understanding. Sometimes the rates are expressed as percent, sometimes as per 100,000 people, sometimes as per capita. You may use the information about Covid-19 provided by the New York Times (Links to an external site.) or use any other sources. In your report cite the sources and the day the information was consulted. The United States is the third country in the world in terms of population size, so it is not surprising that there are more cases of Covid-19 in the U.S. than in other countries with smaller populations, such as Germany. 1) Using rates to compare the totals in the U.S., the world, and Germany (5 points) Compare the population of the United States with the total population of the Earth as a percent. Compare the total number of Covid-19 cases in the U.S with the total number of cases in the world as a percent. Compare the number of deaths in the U.S. with the total number of deaths in the world. Do the same three calculations comparing Germany with the United Sates Total Population (millions) Covid-19 cases (millions) 2) Using rates for internal comparisons (5 points) Express the number of cases in the U.S. as a percent of the population. Express the number of Covid-19 deaths in the U.S. as a percent of the number of cases. Find the number of Covid-19 deaths in the U.S. per 100,000 people. Find a country that has fared better than the U.S. in these three aspects (it does not have to be the same country for all three). Find a country that has fared worse than the U.S. in these three aspects. Country doing better (name) Numbers for country 1 Country doing worse (name) Numbers for country 2 Cases/population (as %) Deaths/cases (as %) Deaths/population (per 100,000) 3) Using rates for comparisons about testing (5 points) Beyond closures and distancing, countries that have been successful dealing with the pandemic have paid attention to three aspects: testing, tracking, and treating. For this task we will focus in testing. More testing will identify more cases, so an important piece of information is the percent of tests that give a positive result (meaning the person was infected). Find the percent of positive tests in the United States. Find the percent for two other countries, one with a higher percent and another with a lower percent. Name of country % positive tests Because the same person can take the test several times and have a negative result several times, the percent of positive tests may underestimate the problem. Another rate that could provide better insight would be comparing the number of people whose tests turned positive for Covid-19 with the total number of people tested. However, the total number of Covid-19 tests, and the percent of positive results, does not give a complete understanding how well a country is doing with respect to testing. Two other rates may provide additional insights. One is the number of tests as a percent of the total population. The other is comparing the number of tests to the total number of cases. Compare the total number of tests in the U.S. with the total population (%). Compare the total number of tests in the U.S. with the total number of cases. Find two countries who are doing a better job in terms of testing in relation to these two measures. Name of country Number of tests/population Number of tests/number of cases Of course, the total number of cases and deaths does not give the whole picture about the seriousness of the pandemic. An important piece of information are the numbers of new cases and deaths. This information, however, is beyond the scope of this project. 4) Writing a report per team (10 points) Write a brief summary of the situation of the pandemic in the United States. Use the information in other countries as points of reference. Make sure to use the proper units when reporting numbers (see the paragraphs about Principles of Unit Analysis, p. 73 in the textbook). Use the rates you computed in this task to illuminate and support your claims. The reporter will coordinate the writing and post the summary for your group in the whole class discussion, Task for Discussion Covid-19. 5) Feedback to other teams (5 points) Choose a report from another team. Make suggestions for improvement (clarity, structure, voice, etc.) or select an aspect of their report that you found especially interesting, or that you would like to incorporate in your own report. Bennett, J. & Brigs, W. (2019). Using and understanding mathematics (7th ed.). New York, NY: Pearson. New York Times (2020). Coronavirus in the U.S.: Latest map and case count. Available https://www.nytimes.com/interactive/2020/us/coronavirus-us-cases.html (Links to an external site.)
<urn:uuid:2f8ee22c-4564-440b-8a22-bd4d05ceeca2>
{ "dump": "CC-MAIN-2023-40", "url": "https://apaxresearchers.com/blog/compare-the-population-of-the-united-states-with-the-total-population-of-the-earth-as-a-percent-compare-the-total-number-of-covid-19-cases-in-the-u-s-with-the-total-number-of-cases-in-the-world-as-a/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506676.95/warc/CC-MAIN-20230925015430-20230925045430-00653.warc.gz", "language": "en", "language_score": 0.9289485216140747, "token_count": 1155, "score": 3.96875, "int_score": 4 }
Vaping, or e-cigarette use, is becoming more and more popular among teenagers. The results published in Monitoring the Future: National Survey Results on Drug use, 1975-2018 show that increases in vaping among adolescents were “some of the largest absolute increases MTF has ever tracked for any substance.” But how is vaping better or worse for health than smoking cigarettes? To learn more, check out the infographic below created by the Regis College’s Online Master of Public Health program. Add This Infographic to Your Site <p style="clear:both;margin-bottom:20px;"><a href="https://online.regiscollege.edu/blog/vaping-the-cool-and-dangerous-new-alternative-to-cigarettes/" rel="noreferrer" target="_blank"><img src="https://s3.amazonaws.com/utep-uploads/wp-content/uploads/online-regis-college/2019/06/12044753/RC-MPH-2019-Q1-2-Vaping-The-Cool-and-Dangerous-New-Alternative-to-Cigarettes_final.jpg" alt="" style="max-width:100%;" /></a></p><p style="clear:both;margin-bottom:20px;"><a href="https://online.regiscollege.edu" rel="noreferrer" target="_blank">Regis College Online </a></p> Because nicotine is present in most vaping devices, the rise in vaping among adolescents has created a serious public health issue. Studies indicate an increase in vaping among 8th, 10th, and 12th graders from 2017 to 2018. According to the data, 18% of 8th graders vaped in 2018. 32% of 10th graders did the same, as did 37% of 12th graders. There were also increases in specific vaping products such as “just flavoring,” nicotine, and marijuana among the same polled demographics. Risk of E-Cigarette Use and Smoking Among 8th, 10th, and 12th graders, the risk of regularly vaping nicotine has increased to 22%, 23%, and 18%, respectively. Disapproval of vaping nicotine was 69% for 8th graders, 68% for 10th graders, and 71% for 12th graders. Studies reveal a correlation between vaping and cigarette use. In 2017, 30.7% of teens who started smoking cigarettes, cigars, or tobacco within six months were e-cigarette users, compared to 8.1% of non-vaping teens who started smoking. There are two main components to vaping: vapes and vape liquid. Vapes are known as e-cigarettes, but they’re also called vape pens, pod mods, e-hookahs, tanks, and electronic nicotine delivery systems (ENDS). Additionally, vape liquid can go by the name of e-juice, oil, cartridge, pod, and e-liquid. Vapes contain batteries which are used to heat and aerosolize the liquid. The “juice” itself may contain ingredients like glycerol (glycerin), nicotine, marijuana, and flavoring chemicals. Vaping’s Impact on Health and Popularity On December 18, 2018, Surgeon General Jerome Adams issued a statement declaring e-cigarette, or vaping, an epidemic among American youth. The impact on e-cigarettes on health is being researched by many organizations, but some negative impacts have already been identified. What the Research Shows Research concludes vaping is a dangerous practice. According to Yale health researchers, vaping hasn’t been proven to help smokers quit, it increases the risk of teens smoking cigarettes, and vaping nicotine poses the same health risks as cigarette smoking. A separate study led by Dr. Mark Rubenstein of UCSF Benioff Children’s Hospital found that many e-cigarettes contain carcinogenic, volatile organic compounds, even if they didn’t contain nicotine or flavoring. Dr. Rubenstein’s study also determined that high school students have used vaping devices to conceal the smell of marijuana. E-cigarette companies have used various marketing tactics and tools to advertise their product and counter the research. Promoting flavors is a big strategy, as 43% of middle- and high school students tried vaping because of appealing flavors. Some companies have offered school scholarships in exchange for written essays on the potential benefits of vaping. The e-cigarette brand JUUL spent over $1 million in 2015 on campaigns designed to project a cool, sexy, and laid-back brand image. JUUL has also sponsored film festivals across Utah and Washington, as has fellow e-cigarette brand blu. The Cool Kid: JUUL JUUL’s marketing practices have made them especially popular among young adult and youth users, to the point where the brand even inspired a new verb – juuling. This caught the attention of the Food and Drug Administration (FDA), who seized thousands of pages of documents detailing JUUL’s sales and marketing practice in September 2018. The FDA found that JUUL sold 16.2 million vapes in 2017, and that their sales between 2016 and 2017 grew by more than 641%. During the summer of 2018, JUUL had 68% of the American e-cigarette market. The seizure produced a noticeable impact: On November 13, 2018, JUUL posted messages across its Facebook and Instagram profiles stating it will not be posting any future content and will not respond to direct messages. Helping Teens Quit – and Never Start It may be difficult to catch a teen vaping, but parents and educators can look out for signs. However, prevention and honest dialogue are more effective than a reactive response. Signs Your Teen Is Vaping There are several key signs to keep watch for if you suspect your teen may be using e-cigarettes. Some of these signs are behavioral, such as drinking more water than usual or adding extra salt and flavor to food. Other signs may be physical, such as acne around the mouth, nosebleeds, or even pneumonia. Steps to Awareness and Making Wise Decisions The first step in talking to your teen about e-cigarette usage is to avoid scare tactics and discuss accurate vaping data. You should also be aware of the major vaping brands and what they look like. You can also encourage your teen to speak to a pediatrician or adolescent medicine specialist for expert advice. Finally, if your teen is vaping, be supportive and help them find resources to quit. Today, researchers and public health officials are looking into the health effects of vaping and taking this threat seriously. Parents and educators need to stop assuming that vaping is a harmless alternative to smoking and take steps to protect teens and students from developing a vaping-induced nicotine habit.
<urn:uuid:4bfa16aa-37c1-4cb9-965b-4a1f409e7199>
{ "dump": "CC-MAIN-2020-24", "url": "https://online.regiscollege.edu/blog/vaping-the-cool-and-dangerous-new-alternative-to-cigarettes/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590348509972.80/warc/CC-MAIN-20200606031557-20200606061557-00564.warc.gz", "language": "en", "language_score": 0.9230144023895264, "token_count": 1433, "score": 3.34375, "int_score": 3 }
Figure 4. Video photograph from Sørmannsneset at the Norwegian continental break, 220 m depth (16 May 1998), showing a barren landscape with crushed remains of Lophelia skeleton spread over the area. This is a region subject to considerable bottom trawling. A track can be seen stretching from bottom-left to up-right of the photograph, indicating the path of a trawl. damaged coral reef areas varies between 5% (R4) and 52% (R3) (Table 3). There is a connection between the size of the coral areas, the number of reporting fishermen in all regions and the extent of the damage, i.e., the more reports from fishermen, the more corals in the region and higher the percentage of damaged corals (Tables 1 and 3). We have relied heavily on fishermen reports, as they were the only source of information on the largest coral areas. It is thus crucial that the fishermen distin- guish between Lophelia, which they call ‘glass corals’ or ‘white corals’ and other corals such as gorgonians, which they report as ‘red forest’ and ‘bushes’. The chances of confusion between Lophelia, Madrepora and stylasterid hydrozoans was considered minimal as Madrepora and stylasterids don’t build reefs and are by far not as abundant as Lophelia (Dons, 1944; Frederiksen et al., 1992; Mortensen et al., 1995). All ROV-inspections confirmed that the localities pointed out contained Lophelia corals, intact or damaged. We therefore conclude that fisherman’s reports are a reli- able source of information and also have been of great value for the estimation of coral areas. The estimation of the size of intact and damaged areas are based on points, lines (stretches) and areas as reported by fishermen. The estimation of areas from lines between co-ordinates were based on an assumed range of width of the trawl ground, and introduced thus, an uncertainty. However, as the number of re- ported stretches comprised a small fraction compared to the number of points and areas, the total estimates exhibited a moderate range (Table 3) and do not affect the main conclusions. Since the methodology used for the estimation of total coral area and damaged area is the same, the estimates are comparable, i.e., the bias is systematic. Distribution of corals In general the corals occur on substrate of morainic origin (Hovland & Mortensen, 1999; Mortensen, 2000) and the largest densities are found along the continental break and edges of trenches crossing the shelf. Very few records are from levelled parts of the shelf.
<urn:uuid:2116dfe0-4ba5-4a86-a22a-188af9ab175f>
{ "dump": "CC-MAIN-2017-04", "url": "https://www.hitpages.com/doc/4506650396327936/7/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285244.23/warc/CC-MAIN-20170116095125-00390-ip-10-171-10-70.ec2.internal.warc.gz", "language": "en", "language_score": 0.9369007349014282, "token_count": 587, "score": 3.25, "int_score": 3 }
What Is National Maritime Day? If someone were to ask you, what do you know about Maritime Day? Would you be able to answer the question? Most people probably don’t know much about this day in less you live by a large body of open water. This day is celebrated in a lot of different ways, however, most are at sea ports and at merchant marine memorials. The ports have open houses and luncheons. Many of the Merchant Marine memorials have special services to honor the fallen. Why May 22 Is Special This isn’t a random day that Congress decided on for Maritime Day. This day changed the shipping industry forever May 22, 1819. This is the day that SS Savannah left its home port in Savannah, Georgia to sail across the sea to Liverpool, England. SS Savannah was the first steamship to cross the Atlantic. The ship was able to make it to Liverpool in just 29 days, which was record breaking. Historians believe that the ship wasn’t at its full power the whole trip and probably could have made it in even less time. This was a tremendous achievement and one that would bring on the era of steam engines and change shipping forever. What Is A Merchant Marine A Merchant Marine is known as America’s fourth line of defense. They are a fleet of ships that deliver goods and services during peace times, and during war times they help carry military materials and soldiers. The Duties Of The Merchant Marine Officers Merchant marine officers play a key role in our shipping industry. They guarantee the free flowing of goods between countries, which is a critical part of our nation’s security. There are four different levels of a merchant marine officer. - Master Mariner: This is someone who is ranked the highest among the Marine Officers. This person retains all the qualifications to drive the ship. Applicants for this position must be skillful in the use of a barometer, chronometer and sextant. They must be able to use these tools to map a course across open water. - Chief Mate: This is the person in charge of the deck department on the ship. They serve as second in command. Their main responsibilities are maintaining the ship’s cargo operations, and also supervising all of the deck crew. - Second Mate: This person is in charge of the navigation, maintaining the charts and also looking after and maintaining all of the navigational equipment. They also help the Master Mariner in the development of the ships route before they start their voyage. - Third Mate: This person is typically the safety officer. This person is in charge of all emergency equipment such as lifeboats, firefighting equipment and emergency systems on the ship. This person also has watch over the cargo and the bridge. Ways To Give Back This Maritime Day give back to the veterans of the sea by donating a car to Vehicles For Veterans. If you have an unwanted car and would like to get a great tax deduction, then donating a car to help fund veterans programs is a great way to give back. Donate your car by calling 1-855-811-4838 or filling out an online car donation form.
<urn:uuid:29f66047-f2a0-426c-a216-7986817eba36>
{ "dump": "CC-MAIN-2018-26", "url": "https://www.vehiclesforveterans.org/blog/national-maritime-day/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267863830.1/warc/CC-MAIN-20180620163310-20180620183310-00336.warc.gz", "language": "en", "language_score": 0.9720599055290222, "token_count": 655, "score": 3.609375, "int_score": 4 }
A porous silicon membrane that is a few nanometers thick can quickly filter liquids and separate molecules that are very close in size, researchers at the University of Rochester report in this week’s Nature. The new membrane could lead to efficient protein purification for use in research and drug discovery. It could also act roughly 10 times faster than current membranes used for blood dialysis, the artificial purification of blood. In addition, the membrane could be employed as a filter to separate molecules in microfluidics devices used to study DNA and proteins and as a substrate for growing neurological stem cells. The polymer-based membranes currently used for filtering proteins are typically many micrometers thick and have an elaborate pore structure much like a sponge. “[Filtration] takes longer because there’s much longer distance to go through, and the pores are convoluted,” says Philippe Fauchet, the electrical- and computer-engineering professor at the University of Rochester who led the research. “And a fair fraction of what needs to go through remains stuck forever in the membrane.” Researchers end up losing the smaller protein molecules that are lodged inside, says James McGrath, a biomedical-engineering professor at Rochester and coauthor of the Nature paper. The new membrane is 15 nanometers thick, so it filters faster without trapping the molecules that pass through it, which is important if researchers want to retain both the larger and smaller proteins. “Once a molecule gets to the membrane, it takes one step, and it’s on the back side,” McGrath says. To make the membranes, the researchers employ tools that are used to create integrated circuit chips. This should make the filters easy to integrate into silicon-based microfluidic devices that are used for protein research, where they would be useful if scientists wanted to separate a particular protein of interest from a biological fluid sample. The researchers made the membranes by first depositing a stack of three thin layers–an amorphous silicon layer sandwiched between two silicon-dioxide layers–on a silicon wafer. Exposing the wafer to temperatures higher than 700 ºC crystallizes the amorphous silicon, and it forms pores. Then the researchers etch the wafer and silicon-dioxide layers to expose small squares of the nanoporous membrane that are 200 micrometers on each side. The temperature controls the pore diameter, allowing the researchers to fine-tune the membranes: at 715 ºC the membrane has an average pore size of 7 nanometers, while at 729 ºC the average is about 14 nanometers. McGrath says that the membrane would make a good substrate to culture neurological stem cells. Certain “helper” cells nurture stem cells and coax them into turning into neurons. To get a pure culture of the neurons, researchers are looking for ways to physically separate the helper cells from the stem cells while allowing them to exchange chemicals. “[With the new membrane,] the distance they’ll be separated by will roughly be the same size as their own plasma membrane,” McGrath says. “The pores will allow a signaling molecule to diffuse very quickly.” The researchers believe that because of a narrower range of pore diameters, the silicon membranes could separate proteins that are much closer in size than is possible with current sponge-like filters. There are thousands of different proteins serving crucial functions in the human body, and separating an individual protein is key to understanding its structure and function. Fauchet says that by engineering a narrower range of pore diameters, the researchers could get 100 percent separation of proteins–even those that are close in size. In laboratory tests, one-nanometer-wide dye molecules in a solution pass through the nanoporous membrane 10 times faster than through a commercial blood-dialysis membrane. The researchers plan to make the membrane stronger–it can sustain pressures of 15 pounds per square inch–so that they can push more molecules through, potentially improving dialysis speed by a factor of 100 over commercial membranes. Some experts, however, feel that it is too early to say whether the membrane will be useful for large-scale applications such as protein purification and blood dialysis. The drawback of the ultrathin membrane is that it is difficult to make large-area membranes using the technique, says Andrew Zydney, a chemical-engineering professor at Penn State University. Current protein-purification systems in the biotechnology industry effectively use 100 square meters of membrane, he says. Even if the new membrane filters 10 times faster, which means it can filter the same amount of fluid with a 10-times-smaller area, “you’re still talking about 10 square meters of silicon membranes,” Zydney says. “I’m not convinced that that can be done in a cost-effective way.” The big new idea for making self-driving cars that can go anywhere The mainstream approach to driverless cars is slow and difficult. These startups think going all-in on AI will get there faster. Inside Charm Industrial’s big bet on corn stalks for carbon removal The startup used plant matter and bio-oil to sequester thousands of tons of carbon. The question now is how reliable, scalable, and economical this approach will prove. The hype around DeepMind’s new AI model misses what’s actually cool about it Some worry that the chatter about these tools is doing the whole field a disservice. The dark secret behind those cute AI-generated animal images Google Brain has revealed its own image-making AI, called Imagen. But don't expect to see anything that isn't wholesome. Get the latest updates from MIT Technology Review Discover special offers, top stories, upcoming events, and more.
<urn:uuid:7af05ee8-1c9d-4426-b1ec-70eae7c22f9d>
{ "dump": "CC-MAIN-2022-21", "url": "https://www.technologyreview.com/2007/02/15/226708/an-ultrafast-silicon-filter/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652663039492.94/warc/CC-MAIN-20220529041832-20220529071832-00483.warc.gz", "language": "en", "language_score": 0.9259158968925476, "token_count": 1213, "score": 3.65625, "int_score": 4 }
These success attributes are: - Goal setting - The presence and use of effective support systems - Emotional coping strategies. These success attributes can lead to successful life outcomes for everyone, not just those with learning disabilities. By crafting our life story as a Hero’s Journey, we can intergrate these six success attributes into our lives so that we can live our lives at full potential and satisfaction. Crafting our life story enhances our self-awareness as we will be better able to recognize the strengths, weaknesses, passion, and special talents of the lead actor in our own life story - that is us! Writing our own life story is a thoroughly proactive endeavour! We are literally taking our destiny into our own pen (I mean hands), and setting the purpose and desired outcomes in our lives. By writing our own story we are taking total responsibility for our own decisions, actions and results. What can be a greater act of self advocacy and initiative than writing and living our own life story? Writing our own story builds our perseverance as story writers know that “Facing the Ordeal” is a necessary part of the hero’s journey to the “ultimate boon”. Story writers know that difficult situations are valuable opportunities for learning and growing. They know that The Ordeal only makes them stronger and wiser but only as long as they are not overwhelmed by adversity, back away from challenges, or give up. Writing our own life story is a fun way to set goals. Story writers set goals that are specific, with enough flexibility to adjust to specific circumstances and situations. Our story includes our strategy, the direction, and steps we wish to take to reach our goals. Our life story includes our support network of mentors who give us guidance, support, and encouragement on our life journey. Story writers do not simply wait for someone to come to their aid when they need support. They actively seek the support of mentors (who could be family, friends, colleagues, etc) as they are keenly aware that Meeting the Mentor is part of their life story. Story writers recognise that stress laden phases like Crossing the Threshold, Facing the Ordeal and Transformation are part and parcel of the hero’s journey. Therefore, story writers anticipate the situations that trigger stress and have emotional coping strategies already written in their life stories. Story writers have a confident, positive, optimistic outlook as they know that the happy ending to their life story - Returning with the Elixir - had already been written!
<urn:uuid:a3de1f9e-c37b-42da-a521-7c5c82b3c138>
{ "dump": "CC-MAIN-2017-43", "url": "http://itrustican.blogspot.com/2010/12/success-attributes-and-heros-journey.html", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823282.42/warc/CC-MAIN-20171019103222-20171019123222-00790.warc.gz", "language": "en", "language_score": 0.9517536163330078, "token_count": 515, "score": 2.875, "int_score": 3 }
- ANITA LAYTON, University of Waterloo His or Her Mathematical Models --- Understanding Sex Differences in Physiology [PDF] Imagine someone having a heart attack. Do you visualize the dramatic Hollywood portrayal of a heart attack, in which a man collapses, grabbing his chest in agony? Even though heart disease is the leading killer of women worldwide, the misconception that heart disease is a men’s disease has persisted. A dangerous misconceptions and risks women ignoring their own symptoms. Gender biases and false impressions are by no means limited to heart attack symptoms. Such prejudices exist throughout our healthcare system, from scientific research to disease diagnosis and treatment strategies. A goal of our research program is to address this gender equity, by identifying and disseminating insights into sex differences in health and disease, using computational modeling tools.
<urn:uuid:e97e00d2-2d61-4013-aded-11c2ee6fe2c7>
{ "dump": "CC-MAIN-2023-50", "url": "https://www2.cms.math.ca/Reunions/ete21/res/kp", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679099892.46/warc/CC-MAIN-20231128151412-20231128181412-00667.warc.gz", "language": "en", "language_score": 0.9182606935501099, "token_count": 163, "score": 2.71875, "int_score": 3 }
How People Learn Learning takes place in all stages of life: teenagers who go directly from high school to college, adults who stop and then return to school after years of work or family commitments, and even retirees who pursue learning made possible by expanded leisure time. Some education takes place formally within higher education; other opportunities are informal, sponsored by organizations such as museums and libraries or available for free online. This course provides an introduction to the research and science of learning, integrating theory with environments. I did not have to take this course; it was not a requirement. Instead it was one of several options. No, I chose to take this course. And perhaps this says something about me, but I'd like to think it says something about the course. The title made me curious, How People Learn, I mean who isn't curious about how we learn? That made me want to know more, and knowing more was an immediate benefit of this class, and one that continued to grow as each week passed. You are immersed deeply into this world of learning from day one. The first week, before we ever picked up a book we had to complete our first assignment. A map of what we believed learning was. I thought long and hard about it. Made lists. Revised lists. And when I was done it still felt incomplete. In my mind a single map cannot contain it all. I still feel that way. It is simply too large, too dynamic a subject to be held on a single page. You need a globe, no, a galaxy to contain this. It was however, interesting to discover amongst my classmates maps what had been included in all of them, and it was even more interesting to discover what had not been included at all. Soon after that map and following an intense amount of assigned reading we began the true work of learning. Reading, reflecting, discussing, challenging each other and ourselves. Each week some "knowledge changing" piece of the How People Learn puzzle was pulled apart and explored with an eager curiosity. I'll share some of biggest ah-ha moments of the course, so that you too reader, may begin to understand what has made this such an interesting and inspiring course: - "...when learners' expertise increases, physically integrating multiple sources of information (as a means to minimize split of attention) first lost its advantage and then became disadvantageous in comparison to a physically separated presentation" (Schnotz, W., and Kurschner, C., 2007). In other words as a learner moves from novice to subject matter expert the way material is presented must also move in accordance with the level of expertise, otherwise the student becomes distracted by extraneous information and learning is reduced. - Learning is often thought of as something that falls along a continuum. It turns out that this is something that I agree with and caution against as well. I do believe learning lay along a continuum, but not a single continuum. Instead I believe that we each fall along multiple continuum's of learning, where dependent upon subject matter we may be at one end (the novice) or the other (the subject matter expert). - Technology has not killed learning. I repeat. Technology has N-O-T killed learning. There are those who think that technology has changed how people learn to the point where current learning paradigms are methuselah's, long overdue for death. I argue otherwise. Consider please, that the unprecedented technological advances that have dramatically changed our environments do not negate the slow evolution of human biology. Our brains are largely the same; we are working with the same limitations in cognition. And until our bodies adapt to this “new” environment, I believe that current and even classic learning theories remain largely relevant. I have a deeper understanding today of what learning is and how people learn, and it is as much from the materials provided in this course as it is from the communication with peers and our instructor. Through this course I better recognize the methods of instruction that I find in my other courses--where they excel and where they fall short. And without thought, an internal almost instinctual response was to connect this course with a previous course, Culture, Equity, Power & Influence. You see I think how we learn is inextricably tied to who we are, our cultural identities--I further believe that in recognizing this, in taking ownership of it, we take the power to make change, for ourselves and for others. That by understanding ourselves deeply we can forge a new path, no matter where we have come from and no matter the numerous obstacles in our way. And this really, readers, is but a small glimpse into what I have learned in this class and what I will carry with me throughout my life as I continue to engage in the world of learning around me. Learning is not simple. It is deeply complex and nearly impossible to define or contain. Every fiber of who we are, affects how we learn. Learning is not fixed, it is not a finite component of innate talent. Learning is the infinite possibilities of a malleable mind. So go forth good reader, and seek your curiosity. Your mind is waiting for you. My Learning Map: Part I This assignment was the first in the course. Required before any related material was assigned or read. It was to unwrap what we believed as individual students, it was to wrap our minds around what we thought learning was. This is what I thought learning was, here in this colorful map. But this is not all that I believe learning to be. But to contain that, I would have had to have constructed an atlas and that my readers was simply not possible! My Learning Map: Part II We would revisit our maps near the end of the course, after all of the information was ingested, during a period of connecting, reflecting and synthesizing. With our new knowledge we would revise our concepts and create a new map of what learning is. And though there are colorful categories, each of these is linked through the inherent web created in learning. Everything is related. Signature Assignment One: Personal Competency Model Please see Personal Competency Model link to the left. Signature Assignment Two: Case Study and Presentation Visit my Case Study ePortfolio: Big Ideas Blog Please see Big Ideas Blog to the left. Big Ideas Synthesis Paper Please see Big Ideas Synthesis Paper to the left.
<urn:uuid:421787e9-6b93-4a40-8fb5-1687e0282f1d>
{ "dump": "CC-MAIN-2020-34", "url": "https://northeastern.digication.com/elisabeth_cassinari/Course_8", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738603.37/warc/CC-MAIN-20200810012015-20200810042015-00234.warc.gz", "language": "en", "language_score": 0.970517098903656, "token_count": 1310, "score": 3.140625, "int_score": 3 }
How the WTO Can Help Address Climate Change - Elgar International Economic Law series WHEN SHOULD REGULATIONS OR DOMESTIC EMISSIONS TRADING BE USED? Countries attempting to address climate change must find ways to deal with the negative externality that is at its core. As discussed in Chapter 2, individuals and industries obtain the benefits of activities that emit GHGs but do not bear all, or potentially even part, of the cost. Domestic policy must either explicitly impose this cost on individuals and industries or find another means of making them take actions that take these costs into account. There are a range of policy instruments that can potentially fulfil this function, including various types of taxes, subsidies to encourage particular choices and regulations that require individuals or industries to take certain actions. Countries vary in a number of ways, including in their values, priorities, susceptibility to the negative impacts of climate change, and policy preferences, and they need scope to use different policy instruments. Policy flexibility allows adaptation of the type of instrument to the country context. Governments may use regulatory standards in an attempt to specify the type or level of behaviour that takes into account negative externalities. There are a range of different forms of regulatory measures. This chapter will focus on (i) standards, such as emissions levels, for particular goods or activities; (ii) the required disclosure of information, such as through product labelling; and (iii) domestic emissions trading programs. It then turns to how these measures may impact trade. 5.1.1 Types of Regulatory Measures Setting standards Governments may attempt to control... You are not authenticated to view the full text of this chapter or article. Elgaronline requires a subscription or purchase to access the full text of books or journals. Please login through your library system or with your personal username and password on the homepage. Non-subscribers can freely search the site, view abstracts/ extracts and download selected front matter and introductory chapters for personal use. Your library may not have purchased all subject areas. If you are authenticated and think you should have access to this title, please contact your librarian.
<urn:uuid:aee7288d-def1-4e3b-bbff-6e9d7a468f70>
{ "dump": "CC-MAIN-2017-30", "url": "https://www.elgaronline.com/view/9781849800068.00012.xml", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424239.83/warc/CC-MAIN-20170723022719-20170723042719-00001.warc.gz", "language": "en", "language_score": 0.9107999205589294, "token_count": 431, "score": 2.765625, "int_score": 3 }
Role and Mandate of the IPC Office Ontario’s Freedom of Information and Protection of Privacy Act (FIPPA), which came into effect on January 1, 1988, establishes an Information and Privacy Commissioner (IPC) as an officer of the Legislature. The Commissioner is appointed by and reports to the Legislative Assembly of Ontario and is independent of the government of the day. The term “freedom of information” refers to public access to general records relating to the activities of government, ranging from administration and operations to legislation and policy. It is an important aspect of open and accountable government. Privacy protection is the other side of that equation, and refers to the safeguarding of personal information held by government. FIPPA applies to all provincial ministries and most provincial agencies, boards and commissions, as well as to universities and colleges of applied arts and technology. The Municipal Freedom of Information and Protection of Privacy Act (MFIPPA), which came into effect January 1, 1991, broadened the number of public institutions covered by Ontario’s freedom of information and privacy legislation. It covers local government organizations, such as municipalities, police, library, health and school boards, and transit commissions. The Personal Health Information Protection Act, 2004 (PHIPA), came into force on November 1, 2004, and governs the collection, use and disclosure of personal health information within the health-care system. It is the third of the three provincial laws that the IPC oversees. Together, these three Acts establish rules about how government organizations and health information custodians may collect, use, and disclose personal data. They also establish a right of access that enables individuals to request their own personal information and have it corrected if necessary. The Commissioner plays a crucial role under each of the three Acts. In general terms, the Commissioner’s mandate is to: - independently review the decisions and practices of government organizations concerning access and privacy; - independently review the decisions and practices of health information custodians in regard to personal health information; - conduct research on access and privacy issues; - provide comment and advice on proposed government legislation and programs; - review the personal health information policies and practices of certain entities under PHIPA; and - help educate the public about Ontario’s access, privacy and personal health information laws and related issues. The Commissioner delivers on this mandate by fulfilling seven key roles: - resolving appeals when government organizations refuse to grant access to information; - investigating privacy complaints related to government-held information; - ensuring that government organizations comply with the Acts; - conducting research on access and privacy issues and providing advice on proposed government legislation and programs; - educating the public about Ontario’s access, privacy and personal health information laws and access and privacy issues; - investigating complaints related to personal health information; and - reviewing policies and procedures, and ensuring compliance with PHIPA. In accordance with the Acts, the Commissioner has delegated some decision-making powers to his staff. Thus, the Assistant Commissioner (Privacy), Assistant Commissioner (Access) and other designated staff may issue orders, resolve appeals, and investigate privacy complaints.
<urn:uuid:688824e7-c907-4e90-af80-7dc48bcee6a9>
{ "dump": "CC-MAIN-2015-40", "url": "https://www.ipc.on.ca/english/about-us/role-and-mandate-of-the-ipc-office/default.aspx", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443736678861.8/warc/CC-MAIN-20151001215758-00172-ip-10-137-6-227.ec2.internal.warc.gz", "language": "en", "language_score": 0.9416139125823975, "token_count": 647, "score": 2.84375, "int_score": 3 }
By Robert L. Park Published: January 15, 2006 NASA has quietly terminated the Deep Space Climate Observatory, citing ''competing priorities.'' The news media took little notice. Few Americans, after all, had even heard of the program. But the entire world may come to mourn its passing. Earth is growing warmer. Even the most strident global-warming deniers have taken to saying that a little warming is a good thing. If the trend continues, however, it will have catastrophic consequences for life on this planet. Correctly identifying the cause could be the most important problem facing humanity. Most scientists link global warming to unrestrained burning of fossil fuels, which shrouds Earth in a blanket of carbon dioxide, trapping the Sun's energy. Others, backed by industries that spew pollutants into the atmosphere, insist that greenhouse emissions are not the problem. They prefer to attribute warming to natural variations in solar output. Scientists are skeptical, but they don't deny the possibility. The issue cries out to be resolved. Even in a world wracked by wars, battles are not fought over scientific disagreements. In science, nature is the sole arbiter. Disputes are resolved only by better experiments. The better experiment when it comes to global warming was to be the climate observatory, situated in space at the neutral-gravity point between the Sun and Earth. Called Lagrange 1, or L1, this point is about one million miles from Earth. At L1, with a view of the full disk of the Sun in one direction, and a full sunlit Earth in the opposite, the observatory could continuously monitor Earth's energy balance. It was given a poetic name, Triana, after Rodrigo de Triana, the sailor aboard Christopher Columbus's ship who first sighted the New World. Development began in November 1998 and it was ready for launching three years later. The cost was only about $100 million. For comparison, that is only one-thousandth the cost of the International Space Station, which serves no useful purpose. Before Triana could be launched, however, there was a presidential election. Many of the industries favored by the new Bush White House were not anxious to have the cause of global warming pinned down. The launching was put on hold. The disdain of the Bush White House for Triana goes much deeper than just a desire to avoid the truth about global warming. Triana began life in early 1998 as a brainchild of Al Gore, who was then the vice president. Mr. Gore, the story goes, woke up one morning wondering if it would be possible to beam a continuous image of the full Earth back from space to inspire people with the need to care for our planet. The 1972 portrait of the full Earth, taken from the Moon, had inspired millions with the fragile beauty of our blue planet. Why not beam the image live into classrooms, allowing students to view weather systems marching around the globe? Scientists had dreamed of such an observatory for years. They hoped Mr. Gore's influence would make it happen. Mr. Gore's support would end up destroying it. Those who hated him, hated Triana. His dream of inspiring environmentalists and schoolchildren served only to trivialize the project. It was ridiculed as ''Gore's screen saver.'' Triana is terminated, but global warming is not. Someday, there will have to be an observatory at L1. Perhaps the most important lesson from our exploration of the solar system is that the most terrible place on Earth is a Garden of Eden compared to the best place anywhere else. We must find out how to keep it that way.
<urn:uuid:c7c92e6d-bd71-4640-97ba-32ea0a424ba2>
{ "dump": "CC-MAIN-2015-18", "url": "http://query.nytimes.com/gst/abstract.html?res=9907EFD6173FF936A25752C0A9609C8B63", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246642037.57/warc/CC-MAIN-20150417045722-00066-ip-10-235-10-82.ec2.internal.warc.gz", "language": "en", "language_score": 0.9618698954582214, "token_count": 739, "score": 3.125, "int_score": 3 }
|This article needs additional citations for verification. (August 2013) (Learn how and when to remove this template message)| Inline skating is a sport practiced widely internationally. Inline skates typically have 2 to 5 polyurethane wheels, arranged in a single line, although 5 wheel designs are no longer manufactured. The in-line design allows for greater speed than roller skates and better maneuverability. The in-line wheels are coupled with boots designed for skating over and around various obstacles. Inline-skating is practiced and performed using inline skates designed for race tracks, skate parks, Urban areas, and off-road. Inline skating is also known as "roller blading" due to the popular brand of inline skates, Rollerblade. A term used to refer to inline skates on a vert ramp, a half pipe with some vertical in it usually between 6in to 24in. Vert skating is a form of gymnastics performed with skates. The purpose of vert skating is to ride higher than the coping (which is the metal pipe on top of the ramp) and perform spins or flips. It focuses on complicated hard aerial maneuvers, such as spins and flips. The intent of the skater is to build speed until they are of sufficient height above the edge of the ramp to perform various aerial acrobatics. In competitions skaters have limited time, often less than a minute, to impress the judges by landing numerous and difficult tricks. The sport was included in the first X Games in 1995. Vert skating is used in a lot of competitions such as the X Games. Vert ramps are also present in most skateparks of today. In addition to speed, fitness, artistic, or skating for fun, some skaters prefer to skate aggressively. Aggressive skating is referred to by participants as rollerblading, blading, skating or rolling and refers to not only the variety of maneuvers that include a variety of grinds, airs, cess slides, toe/heel rolls and other advanced skating stunts but also the equipment used. Aggressive skates are rollerblades that include aspects of the skate that facilitates grinds, this includes a plastic frame with a space in the middle for grinding, and, sole plates that allow the practitioner to grind on the side of the boot. Types of aggressive skating include Park and Street. The range of wheel size for aggressive inline skates range from 40mm to 60mm, the median ranging in the general vacinty of 53mm - 58mm. Park skating refers to doing tricks within a skatepark, meaning a space that is designed for skating, designed and laid out as such. Street skating specifically refers to tricks performed on non-allocated obstacles (i.e. not skate parks). Freestyle skating is a form of inline skating performed on flatland and refers collectively to the disciplines for which competitions are organized by the International Freestyle Skaters Association. Currently the IFSA has defined three disciplines which must be offered by any competition they sanction: freestyle slalom, speed slalom, and free jump. Two additional disciplines, high jump and jam, are also defined, but are at present considered optional. Hockey performed in a special rink on inline skates Originally thought up by ice hockey players who wanted to continue training in their off season. Hockey rollerblades have wheel sizes generally in the 70-78mm range. The toe end of the boot is characteristically squared off. The feel of the boot is generally the same as ice skates, so the switch off between hockey skates and hockey Five-a-side football on skates taking place in an indoor sports hall or outside space with appropriate demarkation - GmbH, Grindhouse (9 December 2016). "General informations about wheels | Grindhouse Skateshop". www.grindhouse.eu. Retrieved 2016-12-09. |Wikimedia Commons has media related to Inline skating.| |Look up in-line skating in Wiktionary, the free dictionary.|
<urn:uuid:881a1fdd-bf79-4cf7-a623-150364556609>
{ "dump": "CC-MAIN-2017-04", "url": "https://en.wikipedia.org/wiki/Inline_skating", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280485.79/warc/CC-MAIN-20170116095120-00123-ip-10-171-10-70.ec2.internal.warc.gz", "language": "en", "language_score": 0.9425522089004517, "token_count": 828, "score": 3, "int_score": 3 }
If you’ve ever wondered about the difference between a precision scale and an analytical balance then this experiment will be instructive. The document explains the difference between mass and weight and the functioning of the top loading precision scale and the analytical balance. It then goes on to discuss precision, accuracy, significant figures, and error analysis (linked elsewhere), and finally, it explains the experiment that will be used to demonstrate the workings of both these balances. As with instructions on using an analytical balance in other places on our blog, this document too highlights the critical aspect of working with these sensitive measuring devices. For further information visit www.usna.edu.
<urn:uuid:7a1542c9-6791-4ec7-ac59-c3a3e236b474>
{ "dump": "CC-MAIN-2017-09", "url": "http://www.tovatech.com/blog/5293/digital-scales/difference-between-top-loading-and-analytical-balance", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170253.67/warc/CC-MAIN-20170219104610-00565-ip-10-171-10-108.ec2.internal.warc.gz", "language": "en", "language_score": 0.8532140851020813, "token_count": 131, "score": 2.921875, "int_score": 3 }
Aim: To investigate the acute health effects of winter outdoor air pollution (nitrogen dioxide (NO2), ozone (O3), sulphur dioxide (SO2), sulphate (SO42-) ,and particles (PM10)) on schoolchildren in an area of southern England where levels of SO2 had been reported to be high. Methods: A total of 179 children, aged 7–13, from three schools (two urban and one rural location), were included. Peak expiratory flow rate (PEFR) and presence or absence of upper respiratory infections were recorded on 63 school days from 1 November 1996 to 14 February 1997. Air pollution and meteorological data were taken from monitors at each school site. The analysis regressed daily PEFR on pollutant level adjusting for confounders and serial correlation and calculated a weighted pooled estimate of effect overall for each pollutant. In addition, large decrements in PEFR were analysed as a binary outcome. Same day, lag 1, lag 2, and a five day average of pollutant levels were used. Results: There were no clear effects of any pollutant on mean PEFR. In addition, we analysed large PEFR decrements (a binary outcome), observing consistent negative associations with NO2, SO42-, and PM10, although few lag/pollutant combinations were significant: odds ratios (95% CI) for five day average effect: NO2 24 h average 1.043 (1.000 to 1.089), SO42- 1.090 (0.898 to 1.322), PM10 1.037 (0.992 to 1.084). The observed effects of PM10 (only) were stronger in wheezy children (1.114 (1.057 to 1.174)). There were no consistent negative associations between large decrements and ozone or SO2 . Conclusions: There is no strong evidence for acute effects of winter outdoor air pollution on mean PEFR overall in this area, but there is evidence for negative effects on large PEFR decrements.
<urn:uuid:bde16de9-fd80-490c-9259-64e9b7a2d590>
{ "dump": "CC-MAIN-2015-35", "url": "http://pubmedcentralcanada.ca/pmcc/solr/reg?term=author%3A(%22Jackson%2C+P.%22)&filterQuery=journal_str%3AOccupational%5C+and%5C+Environmental%5C+Medicine&sortby=score+desc", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644064538.31/warc/CC-MAIN-20150827025424-00248-ip-10-171-96-226.ec2.internal.warc.gz", "language": "en", "language_score": 0.9615641832351685, "token_count": 418, "score": 2.546875, "int_score": 3 }
Restorative Reproductive Medicine Restorative reproductive medicine (RRM) represents a renewed approach to women’s health disorders that is healing in character and diagnostic in methodology. It is an application of the best in medical and surgical care toward identifying the underlying medical disorder and righting that problem so that the symptoms resolve and the woman's reproductive system functions normally. When applied to infertility, RRM enables the physician to identify the underlying cause or causes of the couple’s infertility in 99% of the cases. This approach is able to help the couples achieve a pregnancy in greater than 50% of cases, sometimes as high as 80% for certain causes. Contrasted with artificial reproductive technologies such as intrauterine insemination, in vitro fertilization (IVF) and intracytoplasmic sperm infiltration (ICSI), RRM techniques are more effective and associated with much fewer: - Premature births - Birth defects - Maternal complications - Twin and multiple pregnancies - Pregnancy complications Moreover, patients feel better and are healthier into the future. After achieving their first pregnancy, many, if not most, of these women are able to achieve second and third pregnancies with little or no intervention, because the underlying problem has been identified and rectified. Commonly found causes of infertility are: Ovarian dysfunction: This means that the ovaries are producing lower amounts of their hormones and ineffective eggs. Endometriosis: Cells from the lining of the womb are now mistakenly occurring in the pelvis outside of the womb, causing the immune system to attack these cells and those inside the womb. This can cause pain, scarring and difficulty achieving a pregnancy. Polycystic ovarian disease: Numerous small cysts are present on the ovary, which impair its function and cause too many testosterone-like hormones to be produced. Low sperm production: This is now fairly easily countered by helping the woman’s body to function at peak performance and by nutritional, medicinal and lifestyle changes for her husband. We are still less likely to be successful, however, if the sperm count is zero, but this is a rare occurrence. Damaged fallopian tubes: This may be the result of previous infection or of endometriosis. Several new studies reveal that this is much more successfully treated by RRM than IVF, and it is much less expensive and safer for the baby to do so. There are several other causes not mentioned here, and there is commonly more than one cause within a specific couple. Those couples whom we cannot help to achieve a pregnancy are often grateful to know the underlying cause; we can often help the woman to feel better and be healthier into the future, and we can guide the couple to adoption services. RRM is about more than just infertility! We very successfully treat premenstrual syndrome (PMS) and post-partum depression. These are likely the result of inadequate production of progesterone or may result from progesterone withdrawal. Restoring normal amounts of progesterone production from the ovary and addressing underlying causes of fatigue and low endorphin production will rectify these debilitating conditions in more than 94% of these women. We do this while listening carefully to the woman and the couple and while respecting the sanctity of marriage, respecting their future fertility and helping to restore health. Regarding infertility, we are helping couples to achieve pregnancy through their loving embrace. NaProTECHNOLOGY™, developed by Dr. Thomas Hilgers 30 years ago, is the first comprehensive model of RRM, and Dr. Carpentier was one of the first physicians whom Dr. Hilgers trained. Dr. Hilgers now trains about 40 physicians per year and is traveling abroad to train physicians in Poland, Mexico and elsewhere. The International Institute for Restorative Reproductive Medicine is striving to add to and complement his work. Dr. Carpentier is one of the directors of this institution.
<urn:uuid:fc6ee303-be5b-40af-a9f1-f392f2af5985>
{ "dump": "CC-MAIN-2021-31", "url": "https://www.chsli.org/restorative-reproductive-medicine", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154089.6/warc/CC-MAIN-20210731105716-20210731135716-00087.warc.gz", "language": "en", "language_score": 0.9484974145889282, "token_count": 807, "score": 2.875, "int_score": 3 }
GLUCOSE is the energy that fuels cells, and the body likes to store glucose for later use. But too much glucose can contribute to obesity, and scientists have long wanted to understand what happens within a cell to tip the balance. To solve this riddle, researchers at UT Southwestern’s Cecil H. and Ida Green Center for Reproductive Biology Sciences examined specialized compartments inside the cell to reveal the role of a molecule termed NAD+ in turning on genes that make fat cells. What is NAD+? NAD+ stands for nicotinamide adenine dinucleotide. It’s a molecule found inside cells in the body that helps transfer energy between molecules. Why is it important? NAD+ is believed to play important roles in longevity, aging, and diseases ranging from neurodegenerative disorders to cancer. UT Southwestern biologists examined individual compartments inside cells that house NAD+ molecules to determine how they control genes that are essential to the fat-storing process – knowledge that could help in a wide range of ailments, including metabolic disorders, neurodegenerative diseases, inflammation and aging, and cancer. “This compartmentalisation ends up having profound effects on gene expression in the nucleus, as well as metabolism in the cytoplasm,” (the jellylike substance outside the cell’s nucleus), said Dr W. Lee Kraus, Director of the Green Center and senior author on the research. “We found that these processes play key roles in fat cell differentiation and in cancer cells.” “The previous thinking in the field was that NAD+ was evenly distributed throughout cells and moved freely between different subcellular compartments,” said Dr Kraus, who is also professor of obstetrics and gynecology and pharmacology. “We showed that NAD+ is actually compartmentalised – there are separate nuclear and cytoplasmic pools of NAD+ whose levels change under certain cellular conditions.” The research team’s breakthrough is reported in the journal Science. Accounting for the levels of NAD+ biosynthesis separately rather than in their totality helped increase the understanding of the biology involved, said first author Dr. Keun Ryu, a postdoctoral researcher in Obstetrics and Gynecology. “Our study provides a new understanding of NAD+ biology,” he said.
<urn:uuid:eccb01ec-cb20-4a65-b1e9-372a6761b7c2>
{ "dump": "CC-MAIN-2018-39", "url": "https://thepetridish.my/2018/06/21/a-new-understanding-of-how-glucose-makes-you-fat/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267156524.34/warc/CC-MAIN-20180920155933-20180920180333-00335.warc.gz", "language": "en", "language_score": 0.9522726535797119, "token_count": 492, "score": 3.234375, "int_score": 3 }
You may have seen the acronym "EOL," but what does it stand for and what could it mean for your websites and servers? EOL stands for "end-of-life," and is generally used to describe hardware or software that is so old it's no longer supported by the organization that created it originally. You've probably experienced end-of-life on your personal computer. Have you ever tried to install software but realized your computer's system was too old to support the program? This lack of compatibility with new systems is a major consequence of EOL products. Just like your personal computer or software can go EOL, your server hardware and software can go EOL, too. This can negatively affect your websites since EOL software is prone to bugs and security issues. Consequences of Server Software Going EOL If your server software is out of date, it can dramatically affect your websites and business. Chances of Website Compromise If your website is on a server with an old operating system, the chance that your server will be compromised dramatically increases. Old operating systems don't receive security patches. This means as new vulnerabilities are discovered, your system becomes more susceptible to attack. This is true of all the utilities on your server, such as MySQL and any CMS installations like WordPress. If your server is compromised, it can lead to other major problems, including data loss, down websites, and rejected email. Lack of Features and Stability Old operating systems and software packages don't receive security patches, but they also don't receive feature updates. This can cause your websites to work incorrectly and your server to be less stable. Technology is evolving faster than ever, and old operating systems and software can't take advantage of all the new technology available. For example, out-of-date operating systems can't use the most updated security protocols, which can lead to failed PCI compliance tests. Although we are committed to providing the best support experience possible, servers with EOL software are much more difficult to support than updated servers. For example, CentOS 5, the oldest CentOS operating system Liquid Web currently has, was first released 10 years ago. Since then, there have been two other major CentOS releases. Each operating system is slightly different, which means it's impossible for every member of our Support team to know everything about a ten-year-old operating system. Preventing Problems Due to EOL Components There is only one way to prevent the problems that are associated with EOL software: update your server! If your core operating system is going EOL, we will be sure to notify you and work with you to update your server. Depending on your current operating system, this could involve migrating to new server with updated hardware, as well. We also recommend you regularly review and update your server software and CMS installations. Although updating may cause short term downtime or development work due to code compatibility, keeping your server updated can save you time and frustration in the long run.
<urn:uuid:9df8f710-5207-47af-9399-b70b09a27cca>
{ "dump": "CC-MAIN-2022-49", "url": "https://support.37solutions.com/hc/en-us/articles/360012210174-What-Does-End-Of-Life-Mean-EOL-For-Me-", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710421.14/warc/CC-MAIN-20221210074242-20221210104242-00764.warc.gz", "language": "en", "language_score": 0.9563484787940979, "token_count": 615, "score": 2.5625, "int_score": 3 }
Performance-based math tasks in Teach to One: Math ensure that students apply their knowledge to solve problems using real-world scenarios. Integrated over multiple sessions, TTO’s math tasks are designed to dive into the conceptual, procedural, and applied understanding of multiple mathematical skills, and to explore the connections between these skills. Getting personalized learning right isn’t just about the technology. A personalized learning environment requires a collaborative and data-driven culture among adults, student-centered instructional practices, and everyone involved must have a growth mindset. What’s the role of teacher leaders in tying these components together? They may have different titles depending on […] This year the federal Every Student Succeeds Act (ESSA) will start rolling out in districts and schools across the country. Here’s our round-up of white papers, toolkits, blogs, and other resources to help tackle ESSA implementation. ESSA was passed in late 2015 and gave states greater flexibility—and responsibility—on policies from […] How significant of a role does mindset play in a student’s ability to learn? New brain research out of Stanford University offers us a reminder of the power of positive thinking in mathematics. Researchers at Stanford’s School of Medicine explored the cognitive connections between students’ attitudes toward learning mathematics and […] With a new year comes reflection, resolution, and fresh starts. Looking for strategies to inspire? As you ring in the second “start” of the school year, check out these personalized learning ideas for mixing up your classroom routine, boosting parent engagement, mastering a new technology, and more! 1. New Year, New Middle school math teachers at Bear Creek Middle School cooked up a creative approach to parent engagement with a food-themed event that immersed parents in their school’s Teach to One program. At “Taste of Bear Creek TTO Math,” more than 80 Bear Creek parents got a taste of how students learn Welcome to the Innovator Interview Series, where we ask educators to share their insights on the future of teaching and learning. In the inaugural interview, we speak to Dr. Albert Sackey, the principal of Nathan Hale Middle School in the Norwalk Public Schools district. Sackey was named Connecticut Association of Mesa Alta Junior High School, one of three New Mexico middle schools to launch Teach to One: Math this year, was profiled in a new article by the Farmington Daily Times. The partnerships are part of a statewide initiative led by the New Mexico Public Education Department, which developed grants
<urn:uuid:93c06eb9-0e71-4ea8-b793-3d1a4694d01e>
{ "dump": "CC-MAIN-2019-47", "url": "https://www.newclassrooms.org/author/gdecker/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496668534.60/warc/CC-MAIN-20191114182304-20191114210304-00342.warc.gz", "language": "en", "language_score": 0.9366406202316284, "token_count": 525, "score": 2.625, "int_score": 3 }
Lectures on the weekly Torah reading by the faculty of Do Priests go to War? Rabbi Judah Zoldan Midrasha for Women The opening verses of this week’s reading deal with the possibility of marrying a beautiful woman taken captive in battle. The gemara (Kiddushin 21b) discusses the question of whether the priests, as well, are entitled to wed a beautiful captive woman, which tells us that priests participated in the battle. We can also deduce from what Parashat Shofetim says about exemptions from fighting in an optional war (Deut. 20:5-7) that the priests, including the high priest, used to go out to battle in optional wars (milhemet reshut): “Then the officials shall address the troops as follows: ‘… Is there anyone who has paid the bride-price for a wife, but who has not yet married her? Let him go back to his home, lest he die in battle and another marry her.’” According to the Mishnah (Sotah 8.3) not everyone who has paid the bride-price for a wife returns home: “The following may not return: … someone who is remarrying a woman he has divorced; the high priest, if he is marrying a widow; and regular priests, if they are marrying a divorcee or a haluzah (childless widow whose brother-in-law does not wish to marry her). However, it could be that a high priest who had become engaged to marry a widow, or a plain priest who had become engaged to a divorcee of haluzah, might be sent home from battle, although this would be for a different reason: he might fall into that category of those who are “afraid and disheartened.” “Rabbi Yose says: a high priest engaged to a widow, or a plain priest to a divorcee or haluzah … [who returns home, does so because] he is afraid and disheartened” (Mishnah Sotah 8.5). [Ed. Note: because such marriages are prohibited, priests who do so will be fearful of heavenly retribution.] Commentators on Maimonides point to an ostensible contradiction in what he says regarding the participation of priests in battle. Regarding a priest who wishes to marry a beautiful woman taken captive in battle, Maimonides ruled (Hilkhot Melakhim 8.4): A priest may have intercourse with a captive woman, since the Torah’s injunction was with reference to restraining one’s lust. However, he cannot marry her later, because she is a convert. Elsewhere Maimonides wrote (Hilkhot Shemitah ve-Yovel 13.12). Why did the Levites not share in the apportionment of land of Israel and its plunder, along with their brethren? Because they were set aside to worship the Lord and to minister to Him, and to instruct the masses in His proper ways and just laws, as it is said: “They shall teach Your laws to Jacob and Your instructions to Israel” (Deut. 33:10). Therefore they were set aside from the ways of the world: they do not go to war, as do the rest of Israel, they do not receive an apportionment of land as an inheritance, and they do not obtain things for themselves by the strength of their bodies; rather, they are the Lord’s host (Heb. hayil), as it is said: “Bless, O Lord, his substance (Heb. Barekh hashem helo), and He, Blessed be He, provides for them, as it is said: “I am your portion and your share” (Num. 18:20). On the one hand, Maimonides ruled that a priest may marry a beautiful woman taken captive in war, from which we conclude that the priests did participate in battle; yet on the other hand he wrote that the Levites do not go to war. This contradiction can be resolved by the explanation that Rav Kook gives for the latter halakhah cited from Maimonides: “Go to war” – this means to fight private wars, such as when one tribe goes to war for the portion of land that it would thereby obtain. But when all of Israel go to war, they must fight as well. And fighting in a war that involves the generality of Israel is also a way of serving the Lord. For whoever is more specially set aside for worshipping the Lord has an even greater part in it [the war] than the rest of the people. When the Israelites entered the land, all the tribes were commanded to participate in the war of conquest, and tribes of Gad and Reuben were even given a special warning in this regard. At a certain point, after most of the country had been conquered, the tribes were allowed to settle in their territories provided that each tribe complete the conquest of its portion independently (Josh. 13). According to Rav Kook, the Levites were exempt from the tribal battles that were intended to complete the conquest, but in the battles of Israel as a whole they too participated. Rav Kook’s interpretation is apparently based on a phrase that Maimonides added emphatically: “they do not go to war like the rest of the Israelites.” Maimonides did not make simply say, “they do not go to war,” but added: “like the rest of the Israelites.” In other words, the Levites are exempt from fighting wars such as the battles of the individual tribes, but they did take part in the combat in the battles that all of Israel fought as one. Indeed, Maimonides’ remarks about the tribe of Levi were made in the chapter dealing with laws pertaining to the levitical cities, those areas that each tribe was obliged to set aside for the benefit of the Levites. The Levites did not inherit these cities, and therefore they were not commanded to fight in their defense. Maimonides did not include this law in his chapter on kings (Hilkhot Melakhim chapter 7), in which he listed those who are to be released or exempted from participating in Israel’s wars; rather he included it in the context of the laws of the Jubilee year (Hilkhot Shemitah ve-Yovel ch. 13), because this law is related to the distribution of the land among the tribes, as was done in the past and as will again be in the future, when the majority of the people of Israel will be in their own land, and each tribe will reside on its land, and the jubilee commandments will be observed once more. In such a situation, when there is a war in which all of Israel will be involved, then also the tribe of Levi will be among those fighting along with their brethren, as Rabbi Kook explained, because due to their serving in the Temple they have an advantage over the their fellows and are more fit and suitable for participating in the war. In that case, there could be a situation in which a priest might marry a beautiful woman taken captive in the war, or might not be released from battle even though he had paid the bride price for a wife, if his destined bride is a woman forbidden him to marry according to Jewish law, as we explained above. When a war breaks out, even if it is forced on us and we have no interest in it, nevertheless its objective is to eradicate the wickedness and cruelty in the world, especially towards the people of This awareness, which is supposed to be the guiding light for every soldier as he goes out to battle, is far from simple, and therefore precisely those who served the Lord by officiating in the References may be found in Maimonides, Frankel edition, Hilkhot Melakhim 8.4. In addition, cf. Rabbi David Ha-Cohen, Megillat Milhamah ve-Shalom, Jerusalem 1968, pp. 27-28; Rabbi Judah Gershuni, “Al ha-Gevurot ve-al ha-Milhamot – Giyyus Kohanim u-Leviim le-Milhamah,” Tehumin 4 (1983), p. 62-63; Rabbi Jacob Ariel, “Yetziat Rav Tzevai le-Milhamah,” Sefer Harel, Hispin 2000, pp. 193-202. This verse is taken from the blessing that Moses gave to the tribe of Levi, and from it Maimonides deduced that the tribe of Levi are the Lord’s host and are exempt from going to war, as it is said: “Bless, O Lord, His host (helo)” (Deut. 33:11). Rashi interprets this to arrive at the opposite conclusion: “He saw that the Hasmoneans were destined to fight against the Greeks, and prayed for them, since they were few in number.” The Lord’s hayil is interpreted here as those who fight the Lord’s wars. Indeed, the Hasmoneans, who were priests, were the leaders in the battle against the Greeks. comes from Rav Kook’s commentary on Maimonides, Hilkhot Shemitah ve-Yovel 12.13. Rav Kook wrote a book, Shabbat Ha-Aretz, in which he explained the laws of the sabbatical year as set forth by Maimonides in chapters 1-8. This book was published in 1910, in Rav Kook’s lifetime. In 1994, Makhon Ha-Torah ve-Ha’aretz, formerly of Kefar Darom (presently in
<urn:uuid:44f6e5e4-f8ee-4d6a-978a-992cba083d4a>
{ "dump": "CC-MAIN-2014-41", "url": "http://www.biu.ac.il/JH/Parasha/eng/kiteze/zol.html", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657137190.70/warc/CC-MAIN-20140914011217-00161-ip-10-234-18-248.ec2.internal.warc.gz", "language": "en", "language_score": 0.973239541053772, "token_count": 2064, "score": 2.703125, "int_score": 3 }
A Delta 4 rocket blasts off with the GPS 2F-1 navigation satellite aboard for the U.S. military and civilian services. Credit: United Launch Alliance While driving in an unfamiliar city, most people take the instructions from their Global Positioning System (GPS) device for granted — never pausing to wonder how the disembodied voice knows their destination is just two left turns away. But GPS, in fact, is a marvel of space-based technology. The GPS receivers in cars and smartphones calculate locations, velocities and directions based on signals pinged out by a constellation of 24 satellites orbiting thousands of miles above Earth. GPS began its life as a strictly military technology, and to this day the United States Air Force operates and maintains the satellites. But GPS has now flooded into the everyday lives of billions of people around the world, letting them know where they are at any moment — and how to get to a better place. The Air Force maintains a constellation of at least 24 working GPS satellites, each orbiting about 12,500 miles (20,117 kilometers) above the Earth's surface. These satellites, which circle the planet every 12 hours, emit continuous navigation signals. Receivers on the ground snag these signals out of the air, using them to calculate time, location and velocity with high accuracy. The technology has also found its way into many spheres of modern life, helping scientists mark their field sites and assisting delivery companies in tracking packages. The roots of GPS technology date back to World War II, when the U.S. and British navies deployed navigation systems that used ground-based radio signals. But the idea really got off the ground when the Soviet Union launched Sputnik — the world's first artifical satellite — in 1957. Just days after Sputnik's launch, American scientists noticed that they could pinpoint the satellite's location based on the Doppler shift of its radio signals — a measure of how the wavelengths seemed to stretch out or contract depending on the satellite's movements. This got the researchers thinking about creating a space-based navigation system. In the late 1950s, they began developing and testing satellite navigation technology, and the U.S. Navy deployed the operational Transit satellite system in the 1960s. Then, in 1973, a group of Pentagon officials decided to create a "defense navigation satellite system," laying the groundwork for a system called Navstar-GPS — what we now know simply as GPS. Getting up to speed The U.S. Air Force sent the first GPS satellite into orbit in 1978, and many other launches followed over the years. By the early 1990s, the system was functioning, and its capabilities were demonstrated during the first Gulf War. Allied troops relied heavily on GPS to navigate the featureless Arabian desert, Air Force officials have said. By 1995, the 24th GPS satellite was in position, marking the system's arrival at full operational capacity. GPS satellites send out two signals — one for military use and one for civilian applications. In the early years, the civilian signal was intentionally degraded for national security purposes. But that changed in 2000, when President Bill Clinton ordered the degradation turned off, making civilian GPS much more accurate. The decision has helped GPS become a more reliable tool for private citizens all over the world. The capabilities of GPS are constantly improving, as the Air Force launches newer, more accurate GPS satellites on a regular basis. The U.S. federal government is committed to providing a minimum of 24 operational GPS satellites on orbit, 95 percent of the time. There are currently more than 30 satellites up, providing some margin for error. While GPS is the most widely used system around the world, it's not the only space-based navigation network out there. Russia has its Glonass system, for example, which the Soviet Union began to devise back in the 1970s. The European Union is planning a navigation system called Galileo, and China has already launched multiple satellites for its Beidou ("Compass") system, which it hopes to have operational by 2012. You can follow SPACE.com senior writer Mike Wall on Twitter: @michaeldwall.
<urn:uuid:22ff1753-a088-47b4-9686-377abf269839>
{ "dump": "CC-MAIN-2013-48", "url": "http://www.space.com/10915-space-technology-spinoffs-gps.html", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164805405/warc/CC-MAIN-20131204134645-00061-ip-10-33-133-15.ec2.internal.warc.gz", "language": "en", "language_score": 0.9474435448646545, "token_count": 853, "score": 3.78125, "int_score": 4 }
CAR T cell therapy, an approach which reprograms patients' own immune cells to attack their blood cancers, may enhance the effectiveness of surgery for solid tumors, according to a preclinical study from researchers in the Perelman School of Medicine at the University of Pennsylvania. In the study, published today in Science Advances, the researchers applied a special gel containing human CAR T cells to surgical wounds in mice following partial tumor removal. They found that in almost all cases, the CAR T cells apparently eliminated the residual tumor cells-;allowing the mice to survive when they otherwise would have succumbed to tumor recurrence. Surgery can be curative when a solid tumor cancer has not spread. However, where a tumor ends and healthy tissue begins is often very difficult for surgeons to discern. Thus, for many cancer types, post-surgical recurrence due to remaining microscopic tumor cells is common. One possible approach to this problem is to apply an anti-tumor treatment to the remaining tissue margins immediately after tumor removal, to kill any residual tumor cells. In the study, Penn researchers tested that approach using CAR T cells. As we continue to advance CAR T cell therapy forward, finding applications for use in solid tumors is a major goal. Based on the promising results in this study, our colleagues have planned a clinical trial in patients with locally advanced breast cancer." Carl June, MD, study senior author, the Richard W. Vague Professor in Immunotherapy and director of the Center for Cellular Immunotherapies at Penn Medicine's Abramson Cancer Center CAR T cells are T cells-;a powerful type of immune cell-;that are engineered to target specific proteins. All the CAR T treatments that have been approved for clinical use target proteins found on cancer cells. Typically, the T cells are harvested from the patient's blood, engineered in the lab, and then put back into the patient to work as a "living drug." June and colleagues at Penn helped develop and test what became, in 2017, the first U.S. Food and Drug Administration-approved CAR T treatment. There are now six approved CAR T cell therapies targeting a variety of blood cancers, which have provided fresh hope for patients who have run out of conventional options. Solid tumors, so far, have been a harder target for CAR T treatments, due in part to tumor bulk and tumor anti-immune defenses. However, another group of researchers showed in a study last year, in a mouse model of brain cancer, that CAR T cells might be useful for the more limited task of clearing up residual cancer cells after surgery. In the new study, June and colleagues tried this same approach against two other cancer types: triple-negative breast cancer, which lacks all of the three major breast cancer markers, and human pancreatic ductal carcinoma, the most common type of pancreatic cancer. Both of these solid tumor types are notoriously hard to cure. The CAR T cells were engineered to home in on the protein mesothelin, a surface marker on both types of tumor cell in the experiments. Without the CAR T cell and fibrin gel, the remaining tumor tissue grew and the mice succumbed within about seven weeks. With the gel, however, residual tumor tissue swiftly disappeared in 19 of 20 mice, and these animals survived without wound-healing complications or other apparent side effects for the remainder of the observation period. Further experiments showed that CAR T cells targeting mesothelin have the potential to attack healthy cells bearing that protein marker after intravenous injection, and the toxicity was decreased by local injection of the CAR T cells compared to direct injection of the cells into the blood. "This study demonstrates the promise of CAR T as an add-on to surgery for solid tumors," June said. "We also think that this approach could be broadened to deliver other cellular therapies and anticancer agents in addition to CAR T cells, potentially boosting the antitumor effectiveness even further." Additional authors include Ugur Uslu, Tong Da, Charles-Antoine Assenmacher, John Scholler, Regina Young, and Julia Tchou. Funding for the study was provided by the Mildred-Scheel-Postdoctoral Fellowship of the German Cancer Aid, the Abramson Cancer Center, and the National Institutes of Health (P01CA214278). University of Pennsylvania School of Medicine Uslu, U., et al. (2023) Chimeric antigen receptor T cells as adjuvant therapy for unresectable adenocarcinoma. Science Advances. doi.org/10.1126/sciadv.ade2526. Posted in: Medical Science News | Medical Research News | Medical Condition News Tags: Adenocarcinoma, Adjuvant Therapy, Antigen, Blood, Brain, Brain Cancer, Breast Cancer, Cancer, Carcinoma, Cell, Chimeric Antigen Receptor, Clinical Trial, Ductal Carcinoma, Education, Food, Health Systems, Hospital, Immunotherapy, Leukemia, Medical School, Medicine, Mouse Model, Pancreatic Cancer, Preclinical, Protein, Receptor, Research, Surgery, Tumor, Wound Source: Read Full Article
<urn:uuid:7fe8b579-feb7-43bf-a31e-8588d2a9dd82>
{ "dump": "CC-MAIN-2023-23", "url": "https://beyondfitnessforever.com/health-news/car-t-cell-therapy-may-enhance-the-effectiveness-of-surgery-for-solid-tumors/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644309.7/warc/CC-MAIN-20230528150639-20230528180639-00093.warc.gz", "language": "en", "language_score": 0.9385878443717957, "token_count": 1060, "score": 2.671875, "int_score": 3 }
From the Microsoft.com/Security website, a revised set of recommendations for parents on mobile phone safety: Mobile phone safety for kids Mobile phones range from the most basic, like those for younger children that can place calls only to restricted numbers, to smartphones that are essentially tiny computers which offer: Internet access to social networks such as Facebook, as well as to games, videos and video chat sites, TV shows, music, and applications (apps). Use of camera and video that are fun, but also provide opportunity for bullies and others, and enable taking and sharing suggestive photos or videos (known as sexting). GPS tracking that makes it possible to pinpoint the location of the phone—and the child. You can use this to monitor where your kids are, but if it is not used carefully, so can others. Furthermore, smartphones may tag a photo (geotagging), revealing precisely where and when it was taken. Pick a service plan with the functionality and mobile phone safety features that are right for each child. Add features such as text messaging, photo-sharing, or Internet access only when you feel your child is ready to take on each new responsibility. Also, note that if you choose a billed plan, versus a prepaid plan, you can better monitor monthly charges, such as “free” offers with hidden monthly charges. Agree on what features kids can use Based on the age and maturity of each child, agree on phone features. Define clear rules for sensible use and the consequences for breaking them. Talk about usage: who they can talk to or text and when, the websites they can visit, and so on. With older kids, discuss cyberbullying and sexting. From time to time, ask your kids to show you what is on their phones. Periodically re-examine rules as children mature and mobile technologies evolve. Teach kids safe and responsible phone use Help kids understand the following: Share their phone number only with family and close friends. Do not put it on social network pages, use it to enter contests, or give it to just anyone who asks for it. Lock the phone with a PIN that your child keeps secret (even from best friends) to prevent others from snooping or misusing it. Don’t say, text, or post anything that would hurt or embarrass someone. Don’t make, send, or accept provocative texts, photos, or videos. Avoid clicking links in ads, contests, text messages (even from friends) offering free prizes and the like. Get help from technology Clearly explain why you are using safety tools and what they will do for your children’s information security. Consider setting them up together. Some protections are provided through the carrier’s service; others can be set on the mobile phone. The most reliable are those on the phone, because when a phone uses a wireless network, it bypasses the carrier and its tools. Filter or block websites and content as appropriate for your child’s age and maturity: Consider blocking Internet access for the youngest; for teens, think about restricting access to gambling, adult, and other inappropriate sites. Filter lyrics, video, and other content that is violent or explicit. Restrict access to forums (including in games) unless they are moderated by humans. Use GPS cautiously. If you use a family location service to monitor your kids’ whereabouts, make sure others cannot locate them. Otherwise, consider disabling the location feature on your child’s phone; at the very least, turn it off in the phone’s camera. Manage contacts, which can include blocking callers and restricting contact to approved numbers only. What to do if there are problems Physical threats, persistent cyberbullying, or any form
<urn:uuid:ed30d8f1-5148-4efc-a0d1-154e1c3e197c>
{ "dump": "CC-MAIN-2017-09", "url": "https://blogs.technet.microsoft.com/privacyimperative/2011/05/31/microsoft-publishes-revised-help-for-parents-on-mobile-phone-safety/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501169769.33/warc/CC-MAIN-20170219104609-00480-ip-10-171-10-108.ec2.internal.warc.gz", "language": "en", "language_score": 0.9399852156639099, "token_count": 789, "score": 3.046875, "int_score": 3 }
Teens who text late at night after the lights are out might suffer from academic setbacks and sleeping problems, a new study reported. Sending out text reminders can effectively combat malaria, a new study reported. A new study found that teens who received sexts were more likely to be sexually active. Texting can help protect people from developing diabetes. Researchers have created a simple phone education program that can help decrease the risk of type 2 diabetes. A Swiss study found that more teenagers are being sexually harassed via the Internet than previously thought. Researchers discovered that changes in word use in the English language reveal shifts in values throughout time. Until recently, patients suffering from common ophthalmic ailments such as retinal disorders, glaucoma, and dry eye have largely been prescribed anti-inflammatory, anti-infective, anti-glaucoma, and anti-allergy agents, in addition to off-label steroidal medications, and warm compresses.
<urn:uuid:55541f30-0ca8-4811-80e9-cb4a18fb8c73>
{ "dump": "CC-MAIN-2021-17", "url": "https://www.counselheal.com/tags/text", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039626288.96/warc/CC-MAIN-20210423011010-20210423041010-00477.warc.gz", "language": "en", "language_score": 0.9375026226043701, "token_count": 198, "score": 2.765625, "int_score": 3 }
Meet Wolfgang Amadeus Mozart and Johann Strauss Son in person! In the colourful Waltz Ride you will enjoy the lightness of ball life at the time of the Congress of Vienna in 1814/15. Be enchanted by the most famous works of the Austrian composers. Find out which composers founded Viennese Classicism and why Vienna became the capital of classical music in Europe until nowadays. Relax at Time Travel to the sounds of the Danube Waltz, the secret hymn of Austria. The Viennese waltz was considered wicked in earlier times. In September 2017, the Viennese waltz has been declared an intangible cultural heritage by the UNESCO. The Viennese waltz has a long tradition and is an important part of the approximately 450 Viennese balls. He makes a long ball night really complete. The Vienna Opera Ball is traditionally opened with a left-sided waltz. Turning in three-quarter time, left or right, is something typically "Viennese" and is nowhere as celebrated as in Vienna. Even at weddings and festive occasions it is common to start with a waltz. The Viennese waltz is derived from the word rolling, which means turning and grinding. It was created in the last quarter of the 18th century in the Bavarian-Austrian area. It is a dance in three-four time for single couples and as a preform we can refer to the "Ländlerisches Dancing". (traditional folk Dance). The dance pair jumps and turns constantly. It is a social and tournament dance in three quarter time, which is danced at a rate of 58-60 cycles per minute. In comparison, there is also the Slow Waltz (English Waltz). The Viennese waltz (formerly known as the French waltz) was first mentioned in early 1770s in Old Viennese folk comedies and became known even before the French Revolution. He supplanted the aristocratic minuet as relevant ballroom dance. At first, the waltz was sometimes heavily criticized because it was considered immoral, too fast and too tight because of the movements. In particular, the left-sided waltz, was initially frowned upon for indecency in the Viennese high society, especially because of the intimate touch of the couple. This also had to do with the fact that the ladies suddenly showed their ankles while dancing. The ladies were also laced quite tightly and some even fainted ue to the fast rotational movements. In 1814/15 the Viennese waltz was often danced during the Congress of Vienna and turned into to a social event in Vienna. After the Napoleonic wars, Europe was restored to its former structures and negotiations were held in Vienna. Besides of the negotiations a lot of waltzing events took place. Not for Nothing, the famous saying "The Congress dances, but it does not move on", arose. During the Biedermeier period, Vienna definitely became the capital of waltz music in Europe. The Viennese waltz gained acceptance and popularity. Johann Strauss, the elder founded the Strauss dynasty and composed mainly waltzes. However, he is better known for his march music, such as the well-known Radetzky March, a tribute to General Radetzky. Joseph Lanner, together with Johann Strauss, the elder , is regarded as the founder of the Viennese waltz. Later, the waltz is brought to its highest perfection by the Strauss sons Johann, Josef and Eduard. Through concert tours he is carried to America. Johann Strauss, the younger (1825-1899) went down in history as the "Waltz King". His tours took him to Russia and even to America. His most famous work is the Danube Waltz, which was premiered in February 1867 in today's Dianabad. The nine-minute original Version of the Danube waltz must not be missed in any New Year's Eve. In Vienna People dance traditionally to the sounds of the Danube waltz into the New Year The danube waltz is also on the program at the New Year's Concert and is considered the unofficial anthem of Austria. Towards the end of the 19th century, the waltz was always in the center of Viennese operetta. The technique of the waltz has it's origin from the ballet technique. It has developed from the very fast rotary motion to today's rather floating dance form. The classic Viennese waltz is still danced with left-sided rotation and is considered the "most Viennese" of all dances. The Viennese Waltz is danced as one of the five standard dances worldwide on standard tournaments. He also occupies a special position on balls and masked balls. The waltz can definitely be described as a dance sport, because it is quite exhausting. Since 2010, "Viennese Ball Culture" has been an intangible cultural heritage in Austria. The origin goes back to the monarchy, where a certain court etiquette was observed. In addition to certain clothing regulations, these include the opening, the ladies' giveaway and the midnight surprise, as well as the ball finish. This tradition has not only been preserved in Austria, but also decisively shaped the style of other balls in Europe. Special balls in Vienna are for example, the "Zuckerbäckerball" (ball of the confectioners) , the "Philharmonic ball" or the "Kaffeesiederball" (ball of the traditional coffeemakers), just to name a few. The ball season culminates with the Vienna Opera Ball, which traditionally takes place on the last thursday before Ash Wednesday. With the Opera Ball, the ball season in Vienna comes to an end, until the following year, when it will be announced again "Alles Walzer". This means "Everyone waltz" which are the traditional opening words at the Opera ball. Update your browser to view this website correctly. Update my browser now
<urn:uuid:11221e60-ecf8-4f7f-8c68-1a1f7dec925f>
{ "dump": "CC-MAIN-2018-39", "url": "https://www.timetravel-vienna.at/en/highlights-history-vienna/viennese-waltz-ride/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267161638.66/warc/CC-MAIN-20180925123211-20180925143611-00045.warc.gz", "language": "en", "language_score": 0.9706829786300659, "token_count": 1275, "score": 2.921875, "int_score": 3 }
STEAM@Stipe is a transitional kindergarten through sixth grade school that provides the earliest access to Science, Technology, Engineering, Arts and Mathematics (STEAM) within project based learning and SEAL educational designs. We inspire and engage all students with a transformational approach where students learn by doing. Through our partnerships with Silicon Valley companies, our purpose is to develop our diverse population into engineers, designers, artists, innovators, and entrepreneurs of the future. Sobrato Early Academic Language Model (SEAL) is designed as a comprehensive model of intensive, enriched language and literacy education designed for English language learners, starting in preschool and continuing through fourth grade. It was designed by Dr. Laurie Olsen, a national expert in English language learner education. A national advisory group provided initial input, and continues to advise the project as the model evolves. http://www.sobrato.com/program-model/ Boys and Girls Club BGCSV takes a holistic approach to creating well-rounded, confident, and healthy youth and aims to provide programs and services that speak to all aspects of a child's development. To achieve these goals, comprehensive curricula are provided within the following Core Enrichment Program Areas that address the academic, linguistic and cognitive growth, and emotional and social needs of youth. Core Program Areas are age and developmentally appropriate; are supportive of the diversity of children and families served, including culture and language; and are operationally efficient and effective. BGCSV is an afterschool service provider for students from grades 2 and up. https://www.bgclub.org/ Little Heroes Program Little HEROES knows the value of providing youth with fun and inclusive games to play at recess time. Little HEROES aim to provide this such atmosphere at elementary schools everywhere. Little HEROES organizes yard and train staff to be more involved during recess times. They also provide youth leadership opportunities which focus on character development, and allow students to gain more pride in their school. The goal of the program is to establish a carnival type atmosphere. With fun, organized games and safe pathways to walk and move from game to game. http://www.littleheroes.org/ Walk n' Roll Walk n' Roll San Jose is funded by the Metropolitan Transportation Commission through its Climate Initiatives Program with the goal of increasing walking and biking to school, fostering a healthy and active lifestyle, and reducing traffic congestion and related air pollution, leading to a safer environment within school zones. http://www.getstreetsmarts.org/walknroll/ Community School of Music and Arts' (CSMA) award-winning, in-school visual arts program, Art4Schools, provides quality art education to students in Grades K-12. Students receive weekly art lessons as part of their regular school day. For over 30 years, CSMA has brought music and art programs to tens of thousands of students in public and private schools in Santa Clara and San Mateo Counties. CSMA's goal is to ensure that all children in the community have access to an arts education. Music for Minors Music for Minors is a nonprofit with over 40 years of expertise in elementary school music education. Their mission is to nurture in children a lifelong love of music. Operatin in the San Francisco Bay Area, their staff provides students in TK - 6 grades with a program of diverse, high-quality musical experiences that is: - Engaging and participatory - Based on state music education standards - A foundation for further choral and instrumental music education The Music for Minors curriculum is sequential and varied, including visual aids, props, and instruments. Lessons include singing, listening, reading, theory, movement, dancing, and playing rhythm instruments and recorders. https://mfm.org/ TutorMate is the nation's preeminent online volunteer tutoring program, helping thousands of primary grade students learn to read. More than 200 of the country's most prominent corporations and organizations partner with Innovations for Learning to recruit an army of volunteers to help young students in schools and communities. http://www.innovationsforlearning.org/tutormate/ Readers are Leaders Readers are Leaders work with teachers and reading specialists to choose books that will engage struggling readers and also match their reading abilities. The goal is to offer a variety of books so that young readers will be able to choose books that feed their interests and stimulate an appetite for further reading. http://www.readersareleadersnonprofit.org/
<urn:uuid:e3407667-568b-48c1-bc6a-a368098917fa>
{ "dump": "CC-MAIN-2023-23", "url": "https://stipe.ogsd.net/about", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224650264.9/warc/CC-MAIN-20230604193207-20230604223207-00471.warc.gz", "language": "en", "language_score": 0.94446861743927, "token_count": 980, "score": 2.609375, "int_score": 3 }
More from Christina Faraday Whittington’s Longhouse: A Medieval Public Toilet One of the largest medieval public toilets stood on this site for over four centuries. Explore the turbulent history of Dick Whittington’s Longhouse, founded by the famous Lord Mayor of London. A little Eden in the heart of the City The story of the church of St Dunstan-in-the-East, surviving and not surviving disaster after disaster since its foundation around 1100. Expect the devil having his nose burnt, the Great Fire doing its worst, and Samuel Pepys narrowly avoiding a couple of armed rogues. More in United Kingdom Frederick’s Place, in the City of London, used to be called Gropecunt Lane in the medieval period due to its many brothels. As nearby Milk Street and Bread Street can attest, medieval Londoners valued pragmatism above all in their naming of streets.
<urn:uuid:760c06c2-7932-4466-897f-ce57242b1556>
{ "dump": "CC-MAIN-2020-40", "url": "https://placecloud.io/viewpoint/unlikely-neighbours-in-tavistock-place/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400189928.2/warc/CC-MAIN-20200919013135-20200919043135-00579.warc.gz", "language": "en", "language_score": 0.918474555015564, "token_count": 193, "score": 2.65625, "int_score": 3 }
Family of British novelists and poets, including Charlotte (1816–1855), Emily (1818–1848), and Anne (1820–1849). In 1846 their first publication was issued, a volume of poetry entitled Poems by Currer, Ellis, and Acton Bell. In 1847 Charlotte published Jane Eyre; Emily, Wuthering Heights; and Anne, Agnes Gray. Charlotte published Shirley in 1849 and Villette in 1853. portrait by Evert A. Duyckinck (1816–1878) based on a drawing by George Richmond
<urn:uuid:5444d444-fd78-4790-8e4e-b39e63dc424b>
{ "dump": "CC-MAIN-2017-13", "url": "http://www.yourdictionary.com/bronte", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189242.54/warc/CC-MAIN-20170322212949-00060-ip-10-233-31-227.ec2.internal.warc.gz", "language": "en", "language_score": 0.9051496982574463, "token_count": 124, "score": 2.625, "int_score": 3 }
1. Make sure students have a clear understanding of schedules, due dates, and assignments. This is one of the most important skills educators should have in any classroom environment. But online, it’s imperative. When students understand how to navigate the course, they can focus their time understanding the material they’re there to learn. 2. Conduct an introductory student survey. In addition to a simple introduction, ask each student about learning styles, their preference in working in groups, or what forms of communications technology they feel most comfortable with. Use this information to tailor the way you deliver information to each class. “When students understand how to navigate a course, they can focus their time understanding the material they’re there to learn.” The great advantage of online classes is that location is no longer an issue. That extends to relationships as well. 3. Be an active participant in the class. Answer questions within one business day. Comment on discussion boards. Praise students. Push the limits of their learning. Just because it’s not face-to-face doesn’t mean students can’t be fully engaged. And that starts with you. 4. Make the most of being online. You don’t have to limit class communication to one or two tools. There’s a world of technology out there that can facilitate relationships and learning. And when you’re already online, it’s right at your fingertips. Here are a few tools you may find useful: What it is: a free, simple app that can be used to text up to 50 people in one group Use it to: send out reminders or discussion questions You can find GroupMe at https://groupme.com/en-US/ What it is: a tool to record screencasts on your own computer Use it to: demo something for students from your desktop You can find Screencast-O-Matic at https://screencast-o-matic.com/ What it is: An app that allows users to show and take control of someone else’s desktop in seconds Use it to: troubleshoot student issues or share your screen in real time “Praise students. Push the limits of their learning. Just because it’s not face-to-face doesn’t mean students can’t be fully engaged. And that starts with you.” You can find Join.Me at https://www.join.me/
<urn:uuid:465aefe5-5851-48af-83c8-6e96ad61a870>
{ "dump": "CC-MAIN-2021-31", "url": "https://cyanna.com/build-relationships-online.html", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153966.60/warc/CC-MAIN-20210730122926-20210730152926-00655.warc.gz", "language": "en", "language_score": 0.9246141314506531, "token_count": 516, "score": 3.09375, "int_score": 3 }
High-frequency trading (or "high-speed trading") encompasses a variety of trading strategies, all of which involve a high velocity of portfolio turnover and the need for extremely fast, high-capacity market data feeds and trade matching and quoting engines. High-frequency trades are executed on electronic algorithmic trading systems at lightning speed. This type of trading occurs when traders position very fast computers as close as possible to the market's computer servers. The proximity minimizes the time it takes for an order to pass through telecom lines. Traders program those computers to analyze and react to incoming market data in fractions of a second. If the trades are done in large enough volume, they can add up to significant profits. It was estimated that as of 2010, high-frequency trading accounted for an estimated 50 to 70 percent of trading. High-frequency traders make markets in equities, exchange-traded funds, options and futures, providing liquidity to markets. However, they have no obligation to support liquidity in difficult market conditions. The super-fast electronic trading systems allow them to arbitrage between minute pricing differences on trading platforms. Definition of HFT At a meeting of the CFTC Technology Advisory Committee meeting on June 20, 2012, a subcommittee working group submitted its draft definition of HFT. According to the subcommittee, high frequency trading is a form of automated trading that employs: - algorithms for decision making, order initiation, generation, routing, or execution, for each individual transaction without human direction; - low-latency technology that is designed to minimize response times, including proximity and co-location services; - high speed connections to markets for order entry; and - high message rates (orders, quotes or cancellations). HFT and Exchange Volume Rosenblatt Securities Inc. estimated in September 2009 that high-frequency traders accounted for 66 percent of the trading volume in the U.S. equity markets but by 2013 the percentage had fallen to about 50 percent. Though the percentage of volume attributed to HFT has fallen in the equity markets, it has remained prevalent in the futures markets. According to a study in 2010 by Aite Group, about a quarter of major global futures volume came from professional high-frequency traders. In 2012, according to a study by the TABB Group, HFT accounted for more than 60 percent of all futures volume in 2012 on U.S. exchanges. High-frequency trading came under scrutiny in the late summer of 2009 when regulators tried to determine whether this type of trading had too much influence over the markets. Some members of Congress asserted that these types of traders were manipulating prices and "front running" customer orders. Others complained that high-frequency traders have better access to the markets than traditional investors. Since then, regulators such as the CFTC and SEC in the U.S. and ESMA in Europe have begun to investigate certain HFT tactics such as "spoofing," "flash trading," and "quote stuffing." Quote stuffing, in which large numbers of orders are sent and immediately canceled, has been suspected as one of the reasons behind the May 6, 2010 "Flash Crash." CFTC staff reviewed the roles of rapid electronic trades in the May 6, 2010 short-term plunge in equity and stock-index futures. At a committee meeting on the matter, CFTC Chairman Gary Gensler, said, "While market participants have the technology to automate trading, we’re really just now moving towards 21st century technology to have automated surveillance looking at trade practices." CFTC commissioner Bart Chilton has pushed for increased supervision of high-frequency trading. He made a comment in July 2011 in which he referred to high-frequency traders as "financial cheetahs." In response to this comparison, CME Group chairman emeritus Leo Melamed wrote in January 2012 that high-frequency trading was not only in need of regulation, but also protection. On May 16, 2013, the CFTC approved a final rule that sets out interpretive guidance on disruptive trade practices, which includes practices that violate bids or offers, demonstrate intentional or reckless disregard for orderly execution, or is of the character of, or is commonly known to the trade as, “spoofing” (bidding or offering with the intent to cancel the bid or offer before execution). In 2013, the FBI began investigating whether high-speed trading firms were engaging in insider trading by taking advantage of fast-moving market information unavailable to other investors. The types of trading under scrutiny include quote stuffing and using high-speed trading to conceal that certain transactions are based on an illegal tip. The FBI, which is working with the SEC and other agencies, is also focusing on whether the waves of orders that flood the market from high-frequency firms are being used to manipulate prices to their benefit. A study released by the Futures Industry Association in August of 2013 found that there was "no evidence to suggest that realized return volatility in electronically-traded futures markets has changed through time." Volatility had instead remained mostly stable despite increased participation from high-speed and algorithmic traders. The study examined volatility from roughly 2006 to 2011 in 15 futures contracts traded on platforms run by CME Group, Intercontinental Exchange, Eurex, and NYSE Liffe. The exchange operators sponsored the study. In June 2014, executives from Intercontinental Exchange, Bats Global Markets and TD Ameritrade, among others, were questioned by the Senate's Permanent Subcommittee on Investigations about some of the more controversial aspects of HFT, including rebate fees and payments for order flow. Brad Katsuyama, president and CEO of IEX Group Inc. whose concerns about high speed trading were highlighted in the Michael Lewis book “Flash Boys,” was one of the first witnesses questioned by the senators. They also questioned NYSE Group President Thomas Farley and Bats Global Markets Inc. CEO Joseph Ratterman. The subcommittee's chairman, Sen. Carl Levin (D-Mich), who called the hearing, said retail brokers have conflicts of interest when they accept payments from wholesale brokers to place their trades with them and that conflicts arise under the maker-taker trading model. In July 2014, Reuters reported that the SEC was investigating Allston Trading LLC; Hudson River Trading LLC; Jump Trading LLC; Latour Trading LLC, (an affiliate of Tower Trading); Merrill Lynch, Pierce, Fenner & Smith, owned by Bank of America Group; Octeg LLC, which has been merged into a unit of KCG Holdings Inc; Tradebot Systems Inc; Two Sigma Investments LLC; Two Sigma Securities LLC; and Virtu Financial. A number of lawsuits have been brought against various stock exchanges for alleged discrimination involving high-frequency trading. A high-profile attorney named Michael Lewis (no relation to the author) filed a class action lawsuit against 13 stock exchanges for high-frequency trading in May of 2014. The exchanges include the NYSE, BATS, NASDAQ and CBOE. The case, on behalf of Harold Lanier, was filed in the U.S. District Court for the Southern District of New York. It charges that the exchanges sold “advance access” to market data through private feeds and co-location services. In September 2014, three big law firms joined a legal action against major U.S. stock exchanges, claiming the exchanges gave unfair advantages to high-frequency traders to the detriment of regular investors. That lawsuit was also filed in the U.S. District Court of the Southern District of New York. The firms leading the case, Robbins Geller Rudman & Dowd LLP, Motley Rice and Labaton Sucharow LLP, are seeking class-action status. Another lawsuit, against CME Group Inc., alleges that it "engaged in agreements with certain high-frequency trading firms to erode the integrity of the marketplace and manipulate prices." For more information on HFT regulation, visit the HFT page in MarketsReformWiki. John Lothian News Interviews HFT Rules: Three Part HFT Harmony High frequency trading (HFT) has been in the financial press a lot over the past several years. From the Flash Crash of 2010 to the collapse of Knight Capital in 2012, trading glitches and the negative impact of HFT on markets and investor confidence is well-documented. In this segment of the Restoring Customer Confidence series, Mayer Brown attorney Zachary Ziliak outlines the three sources that will address HFT and help restore customer confidence. Ziliak says regulatory bodies will likely continue to address HFT guidelines, exchanges are imposing new fees on HFT practices and AT 9000, standards system for HFT practices, will help establish a higher bar for HFT participants. Visit the Restoring Customer Confidence video series page > HFT Rules: Rules for the Algo Highway Customer confidence has been hit by a number of different events over the past several years and high frequency trading (HFT) problems have been among them. Ben Van Vliet, assistant professor of finance, Stuart School of Business, Illinois Institute of Technology has been looking the creation of a standard set of rules high frequency trading participants can use to ensure safer markets. Van Vliet has helped initiate the AT 9000 system, which would implement standards for HFT design, backtesting, implementation and portfolio and risk management. Van Vliet says its important that the industry support such a project, rather than wait for regulators to dictate new standards and rules for participants. Visit the Restoring Customer Confidence video series page > - "Earnhardt Moment:" IIT's Ben Van Vliet Discusses AT 9000, A Proposed Quality Management System for HFT Are high frequency traders ruining the market? Stealing High-Frequency Code In 2009 two financial market participants were arrested for stealing high-frequency trading code. First, Goldman Sachs programmer Sergey Aleynikov was arrested for allegedly stealing proprietary code from the bank’s high-frequency trading platform. Nine months later, Societe Generale trader Samarth Agrawal, was arrested on similar charges that he, too, stole his employer’s source code for software used to make sophisticated, high-speed, high-volume stock and commodities trades. Aleynivov was convicted in 2010, and sentenced to eight years in prison, but the conviction was overturned by an appeals court in February 2012. The overturned conviction has tested the boundaries of the Economic Espionage Act, which makes it a crime to steal company secrets. The challenge came on grounds that Goldman's HFT code was not "produced for interstate commerce," and thus does not constitute a crime under the act. The State of New York prosecuted Aleynivov for "unlawful use of secret scientific material". This resulted in a conviction on May 4th, 2015. In May 2012, programmer Bo Zhang plead guilty to stealing software code from the Federal Reserve Bank of New York. Also that month, former Citadel Investment Group engineer Yihao Pu was indicted on charges of stealing HFT code. In June 2012, Citadel accused HFT firm Jump Trading of stealing some of its trading algorithms. In its court petition, Citadel asked that Jump turn over its algorithms and trading records. Jump called the request "frivolous" and "an effort to win competitive information through the courts." A Cook County Circuit Court judge eventually dismissed Citadel's petition. - Blame High-Frequency Trading. the Big Picture. - Options Industry Leaders Discuss Current Regulatory Issues. Futures Industry Magazine. - CFTC Technical Advisory Committee Sub-Committee on Automated and High Frequency Trading. CFTC. - Making Markets: A Conversation With Five High-Frequency Trading Firms. Futures Industry Magazine. - High-Frequency Trading Less Profitable, Less Prevalent. Traders Magazine. - High Frequency Trading in the Futures Markets. Aite Group. - CFTC finalizes plan to boost oversight of fast traders: official. Reuters. - SIX Swiss eyes high-frequency traders. The Financial Times. - Making Markets: A Conversation With Five High-Frequency Trading Firms. Futures Industry Magazine. - How speed traders are changing Wall Street. CBS News. - Regulator Takes Aim at High Frequency Traders. Forbes. - CME against stricter rules for high-speed traders. Financial Times. - CFTC nears comment period on high-frequency trading. Chicago Tribune. - “Caging the Financial Cheetahs”. CFTC. - Protect HFT cheetahs from regulatory poachers. Financial Times. - FBI Investigates High-Speed Trading. The Wall Street Journal. - High-Speed Trading Firm Tries Charm Offensive. The Wall Street Journal. - High-frequency trading does not raise futures volatility - study. Reuters. - High Speed Trading Incentives Will Face U.S. Senate Scrutiny. Bloomberg. - Lawmaker says high-frequency trading creates conflicts of interest. Investment News. - Exclusive: SEC targets 10 firms in high frequency trading probe - SEC document. Reuters. - Class action suit targets 13 stock exchanges for high-frequency trading. Fortune. - High-Frequency Trading Leads to Lawsuit Against Exchanges. The Wall Street Journal. - HFT Rules: Three Part HFT Harmony. John Lothian News. - HFT Rules: Rules for the Algo Highway. John Lothian News. - Second Banker Accused of Stealing High-Frequency Trading Code. Wired.com. - Court Overturns Conviction of Ex-Goldman Programmer. NY Times DealBook. - Goldman's Self-Defeating Case Against a Programmer. Bloomberg. - Breaking the Code Theft Brain Drain. Advanced Trading. - Citadel accuses Jump Trading of stealing secrets. Reuters. - Citadel loses court effort to pry trading info from Jump Trading. Crain's Chicago Business.
<urn:uuid:ce257ac1-cd3a-49dc-96a5-d6013000044d>
{ "dump": "CC-MAIN-2022-21", "url": "https://marketswiki.com/wiki/HFT", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662531352.50/warc/CC-MAIN-20220520030533-20220520060533-00060.warc.gz", "language": "en", "language_score": 0.9396448731422424, "token_count": 2962, "score": 2.71875, "int_score": 3 }
The Following discussion of Recreational Disturbance of Sage-Grouse in Montana was taken from the Montana Management Plan and Strategies for Sage-Grouse in Montana – Final 2005. Signatory agencies to the plan are the Montana Fish, Wildlife and Parks, Montana Natural Resource and Conservation, USDA, Forest Service, Regional Office, USDI, Bureau of Land Management and USDA, Natural Resources Conservation Service. Hunting is a direct form of mortality to sage-grouse. There is disagreement concerning its overall impact on sage-grouse populations. Some believe that hunting sage-grouse is compatible with healthy sage-grouse populations, while others do not think “surplus birds” should be removed from what they see as a species “at risk.” Sage-grouse abundance is affected by long- and short-term population changes. In Montana, long-term population declines have been related to loss of sagebrush habitats essential to sage-grouse (Martin 1970, Swenson et al. 1987). Although not irreversible in nature, conditions resulting in long-term declines are likely to persist. Within the long-term decline are short-term fluctuations (Eustace 2002) in sage-grouse abundance, which appear cyclic in nature, reaching a low point mid-way through each decade. Variable climatic events, e.g., drought or severe winters, contribute to short-term changes in abundance (Edwards 1988). Sage-grouse hunting is an economically, recreationally, and culturally important tradition in many areas. In sagebrush habitats, sage-grouse often are the only upland bird available for harvest, providing a recreational opportunity that would otherwise be unavailable over millions of acres. Analysis of wings collected from hunters is the best source of information on annual productivity of sage-grouse and the influence of changing climatic conditions on productivity and population composition. Juvenile/adult ratios generated by wing analysis also can indicate approaching changes in male attendance on leks in subsequent years. Lek counts, which determine the number of active leks, are the best source of population trend information. Sage-grouse exhibit relatively low productivity and high survival when compared with other upland birds in Montana, which lends a degree of stability to the population. Nevertheless, sage-grouse have significantly declined or have been extirpated in some areas of the state. Although loss or degradation of habitat, coupled with shifts in weather patterns and changes in predator composition and abundance, is largely responsible for local extirpation and population declines, harvest may be additive to natural mortality in some situations. In such cases, harvest could contribute to local declines or slow recovery of sage-grouse populations. Developing an adaptive harvest management strategy (see Adaptive Harvest Strategy in the Appendix), based on monitoring of population trends, i.e., lek surveys, allows for more liberal seasons where populations are documented to be stable or increasing. If habitat becomes restricted and population trends decline, or the status is unknown because of a lack of monitoring, seasons should be conservative or suspended. Although sage-grouse population status and trends vary across Montana, recent harvest regulations are uniform across the state. More regional flexibility may benefit isolated populations. Please access Montana Plan and Conservation Strategies for Sage-Grouse in Montana – Final on the Sage-Grouse Management page of the Montana Fish, Wildlife and Parks Web site.
<urn:uuid:f3922247-4d76-4ef5-8b88-2e6b7d639719>
{ "dump": "CC-MAIN-2015-11", "url": "http://www.nrcs.usda.gov/wps/portal/nrcs/detail/mt/home/?cid=nrcs144p2_056599", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936461988.0/warc/CC-MAIN-20150226074101-00301-ip-10-28-5-156.ec2.internal.warc.gz", "language": "en", "language_score": 0.8958205580711365, "token_count": 694, "score": 3.453125, "int_score": 3 }
Synopses & Reviews Walter McDougall offers an original analysis of Versailles diplomacy from the standpoint of the power that had the most direct interest and took the first initiatives in the search for a solution to the German problem. The author's new view of the struggle for execution or revision of the Versailles treaty holds sober implications for assessment of the political origins of international anarchy during the 1930s and European integration in the 1950s. He shows that the Treaty of Versailles was unenforceable, and that the French postwar government, far from enjoying predominance in Europe, suffered from financial crisis and economic and political inferiority to Germany. Versailles was thus the "Boche" peace, and the only path to a stable Europe seemed to lie through permanent restriction of German economic and political unity. Originally published in 1978. The Princeton Legacy Library uses the latest print-on-demand technology to again make available previously out-of-print books from the distinguished backlist of Princeton University Press. These paperback editions preserve the original texts of these important books while presenting them in durable paperback editions. The goal of the Princeton Legacy Library is to vastly increase access to the rich scholarly heritage found in the thousands of books published by Princeton University Press since its founding in 1905.
<urn:uuid:a7e1e9e9-6f84-43ff-a1d7-b6407f33065e>
{ "dump": "CC-MAIN-2016-50", "url": "http://www.powells.com/book/frances-rhineland-policy-1914-1924-9780691607191", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698542765.40/warc/CC-MAIN-20161202170902-00093-ip-10-31-129-80.ec2.internal.warc.gz", "language": "en", "language_score": 0.9495074152946472, "token_count": 261, "score": 3.046875, "int_score": 3 }
(Natural News) Goji berries are known by many names, such as “red diamonds” and “wolfberries.” Call them whatever you like, but these superfruits are among the most nutritious foods on the planet. These tasty little berries are native to China and have been used in traditional Chinese medicine (TCM) for over 2,000 years. As such, they are often considered a “longevity food.” Vibrant colors are often a sign of high antioxidant content in fruits and berries. With their signature bright red hue, goji berries are no exception. As a potent source of antioxidants, goji berries can effectively protect your body from oxidative stress and promote your overall health. More than just antioxidants, goji berries are also a delicious source of fiber, phytonutrients, vitamins, and trace minerals. Some of the nutrients found in goji berries include zinc, phosphorus, selenium, germanium, calcium, and vitamins A, B1, B2, B6, and C. (Related: Why goji berries might be the Holy Grail of health.) Health benefits of goji berries With their naturally high content of antioxidants, goji berries contain an array of health benefits. Rich in antioxidants This superfruit’s high content of antioxidants is the main reason why it’s often used in anti-aging creams and treatments. Goji berries contain high levels of potent antioxidant compounds such as carotenoids, lycopene, lutein, and polysaccharides. Supports healthy eye functions Organic goji berries are an excellent source of carotenoids, a vital nutrient for your eye health. Goji berries even contain more beta-carotene than carrots. Most importantly, goji berries are packed with zeaxanthin, a carotenoid known for its superb benefits for the eyes. Supports the growth of healthy, radiant skin Goji berries are loaded with vitamin C, beta-carotene and other antioxidants that promote healthy skin and improve your complexion. In fact, they contain just as much vitamin C as lemons and oranges. Supports a healthy cardiovascular system The high concentrations of antioxidants in goji berries help protect your heart from the harmful effects of oxidative stress. Recent studies note that the intake of goji berry extracts is linked to significant improvements in free radical scavenging activity in the heart. Uplifts and elevates mood This superfruit is also called “the happy berry” as it promotes inner balance and optimism through nutritional support of normal, healthy cognitive function. Consuming concentrated goji berry extract is linked to improved feelings and overall well-being. Supports sensible weight loss plans High in nutrients yet containing few calories and zero fat, goji berries make an excellent addition to your weight management plans. Goji berries are also naturally rich in fiber, which can help you manage your appetite by making you feel full for longer. Supports healthy immune function Since they are naturally high in antioxidants, goji berries are excellent at providing immune support. They are especially rich in vitamins A and C, which play vital roles in healthy immune function. Supports a healthy liver In traditional Chinese medicine, goji berries were used to support healthy liver function. This is why many Asians often add goji berries to medicinal soups and porridge. Supports optimal cognitive health According to research, consuming goji berries can have a positive impact on brain activity. The high quantities of antioxidants in goji berries can also protect your brain from oxidative stress. Nearly all goji berries in the market are grown in China, so you may want to get only organic goji berries grown at high altitudes, far away from the pollution of the cities. That’s why Health Ranger Select Organic Goji Berries are sourced from only the cleanest goji berries in the mountains of Tibet. All product lots are lab tested for microbiology, heavy metals and glyphosate.
<urn:uuid:dc772fe3-c4c4-4655-b897-348e9e431e3a>
{ "dump": "CC-MAIN-2019-43", "url": "https://naturalnews.com/2019-08-15-antioxidant-rich-goji-berries-superfruits-health-benefits.html", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986673538.21/warc/CC-MAIN-20191017095726-20191017123226-00324.warc.gz", "language": "en", "language_score": 0.9321801662445068, "token_count": 830, "score": 2.71875, "int_score": 3 }
mistaking वाक्य"mistaking" हिंदी में mistaking in a sentence - While saying the remark was " a mistake," - I don't make mistakes, " he said. - When a dairy farmer's wife makes a fatal mistake one - The low scores are not ( caused by ) Brazilian mistakes, - But make no mistake, each player will get equal time. - Everyone makes mistakes, but apologies are few and far between. - The scope of such mistakes is a matter of some dispute. - They still do, even after he made a serious mistake. - Cutler said that Nussbaum's advice had been a mistake. - Sitting is a killer-- make no mistake about it.
<urn:uuid:5d88bd5f-139a-44f6-bcfb-b1cf6df9f34c>
{ "dump": "CC-MAIN-2023-23", "url": "https://m.hindlish.in/sentence/mistaking", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652235.2/warc/CC-MAIN-20230606045924-20230606075924-00197.warc.gz", "language": "en", "language_score": 0.9635506868362427, "token_count": 207, "score": 2.546875, "int_score": 3 }
What are Design Patterns? Most of you already know what a design pattern is, but I want to make sure this blog is accessible to everyone. A design pattern is a set of “best practices” for how to structure your code to solve certain problems. It is not a completed library that you an plug in to your code base, but more like a template helping you determine how to structure the code you are writing. There are a couple of good books out there describing Design Patterns. The one most people will point you to is the Gang of Four (Design Patterns: Elements of Reusable Object-oriented Software) book. I know it is probably blasphemy to admit, but I have actually not read that one…I have, however, read the Head First Design Patterns book and I highly recommend it. Today we are going to dive into the Facade pattern. The definition of the word facade helps me remember what this pattern is used for: - an outward appearance that is maintained to conceal a less pleasant or creditable reality. We often use the facade pattern to hide either a complex part of the system (or subsystem) or to simplify the use of some subsystem. And, sometimes we use it to simply hide a subsystem, third-party library, etc. It is obvious why we want to create a class that understands the complexity of a subsystem and keep that complexity out of the other parts of your code. However, it is probably less obvious why you would want to simply hide a subsystem or third-party library behind a facade. If you hide your subsystem, or third-party library behind a facade, it will allow you to more easily switch this system out for a new one, or even a new version without having to do major refactoring. If there is only one place that is dealing with this system, there is only one place where you need to make changes. Secondly, using a facade can help you to mock out systems that you interact with for testing. Sometimes it can be difficult to fake out a system you are interacting with, but if every part of your system uses the facade, then you simply have to mock out the facade in the rest of the application, and only worry about figuring out how to mock the real system out for the tests around the facade. Lastly, when you hide things behind a facade it allows you to delay making major architectural decisions. You can determine what you want the API to this system to look like, and even fake out the interactions until you have had a chance to decide how you want to implement the subsystem.
<urn:uuid:a224c748-bd35-4eaf-8853-98579a07fdca>
{ "dump": "CC-MAIN-2017-34", "url": "https://thesoftwarelife.wordpress.com/2016/08/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886116921.7/warc/CC-MAIN-20170822221214-20170823001214-00456.warc.gz", "language": "en", "language_score": 0.9516155123710632, "token_count": 527, "score": 3.234375, "int_score": 3 }
Great answer above. This is to add on to it: Making a decision on whether to recommend screening tests for the entire population is different from deciding whether to screen an individual patient. The USPSTF uses panels of experts who employ extensive epidemiology and biostatistics and literature reviews to make those recommendations. At the population ... Screening tests such as "blood tests and imaging" have two costs and one benefit: the cost (dollars and possible health problems) of the actual screening, which can in some cases be free the cost (dollars and possible health problems) of the followups required when the screening is positive the benefit of less people dying or their treatment being less ... This line of reasoning expects infectious bacteria to be immobile on their own and "gums" to be isolated from one another in a regularly closed and healthily salivated mouth. If your practitioner would have put the probe into her own mouth before examining yours, then that would be a great way to spread whatever. Your own mouth is an ecosystem where ... I think the closest thing to a "standardization of drugs" are the pharmacopeia: (just some examples) As you will notice, these are not global standards, but each one defines the parameters by which a drug is of adequate quality and purity to be deemed that drug. To generate a global standard, it would be ... The idea that the International Statistical Classification of Diseases and Related Health Problems (ICD) forms an international standard on health problems is contentious within some groups of people when there is the Diagnostic and Statistical Manual of Mental Disorders (DSM), which cross-references the ICD and there can sometimes be conflicting criteria ... Physiology, Chemoreceptor Trigger Zone (StatPearls): Nausea and vomiting are controlled by the vomiting center in the medulla oblongata, which is located between the brainstem and spinal cord. The main part of the vomiting center is the chemoreceptor trigger zone (CTZ), also known as the area postrema (AP), which receives signals from: the blood (uremia, ... It's just a medical hypothesis that because BCG might offer some protection against viruses and bacterial infection, it might offer some protection against SARS-CoV-2. There is an Australian study in progress to see if it helps protect health workers. But given that BCG has been in world wide short supply ... There is no known way to infect yourself with a "safe" dose of SARS-CoV-2. The eyes are listed as a portal of infection which is why health workers wear eye protection (goggles, face shields ). Once the virus infects human cells it starts to replicate creating more virus. At some stage the immune system will ramp up and detect the virus but this takes ... Yes, nicotine replacement therapy is used in multiple forms, including a skin patch and oral dosing with gums and lozenges. The purpose is to help avoid the side effects of nicotine withdrawal, while delivering nicotine at lower doses than is obtained through smoking, to help manage craving and eventually stop smoking entirely. As far as the delivery ...
<urn:uuid:a5b3dbc5-0951-440d-8412-06ebee341647>
{ "dump": "CC-MAIN-2021-21", "url": "https://medicalsciences.stackexchange.com/tags/preventative-medicine/hot", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243988837.67/warc/CC-MAIN-20210508031423-20210508061423-00561.warc.gz", "language": "en", "language_score": 0.9390742182731628, "token_count": 660, "score": 2.75, "int_score": 3 }
Vegetable crops like tomatoes, peppers, corn and cucumbers take a heavy toll on the soil' structure and make-up. They devour valuable nutrients as they grow to produce the very fruits and vegetables we love to eat. Eventually, after a few years - even the best of soils will begin to break down and weaken if not replenished and re-energized. Soil that becomes weak in nutrients will result in successively weaker crop yields that are also increasingly prone to disease and pests. So what is the best way to keep your garden strong? Feed your soil! And no - we're not talking about heaping on generous amounts of expensive synthetic fertilizers. Those are temporary fixes to a problem that can leave your soil weak, unstable, and full of excess salts and chemicals.
<urn:uuid:da1ac203-4a14-4cea-9796-06be49f5fbd4>
{ "dump": "CC-MAIN-2015-32", "url": "http://www.hometalk.com/939288/how-to-breath-life-this-spring-into-your-tired-garden-soil", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042987866.61/warc/CC-MAIN-20150728002307-00234-ip-10-236-191-2.ec2.internal.warc.gz", "language": "en", "language_score": 0.9573360681533813, "token_count": 163, "score": 2.765625, "int_score": 3 }
The scepticalchymist is a science blog, devoted largely to chemistry and chemical biology, by the editors of Nature and the Research journals. Joshua Finkelstein, associate editor of Nature, has a post on yesterday’s news in the BBC, which reported that scientists have found a technique which may lead to a cheap production of the anti-malarial drug artemisinin, which as part of a drug regimen is nearly 100% effective. This work was funded by a $42.6 million grant from the Bill & Melinda Gates Foundation, which was was awarded to the California Institute of Quantitative Biomedical Research at University of California, Berkeley, Amyris Biotechnologies, and the Institute for OneWorld Health (a non-profit pharmaceutical company). It’s an interesting collaboration: To ensure affordability, UC Berkeley has issued a royalty-free license to both OneWorld Health and Amyris to develop the technology to treat malaria. Amyris will transform the Keasling lab’s research into a robust fermentation process and perform the chemistry and scale-up necessary to bring the drug to market. OneWorld Health will conduct pre-clinical studies and implement a global access strategy for the drug.
<urn:uuid:4bc74034-b36a-471b-94d3-8d0586c05b34>
{ "dump": "CC-MAIN-2022-33", "url": "https://3quarksdaily.com/3quarksdaily/2006/04/a_possible_vict.html", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00328.warc.gz", "language": "en", "language_score": 0.9400391578674316, "token_count": 251, "score": 3.125, "int_score": 3 }
Renewable energy sources accounted for 62% (17GW) of the new electricity generation capacity installed in the EU27 in 2009, according to the ‘Renewable Energy Snapshots’ report, published recently by the European Commission’s Joint Research Centre (JRC). The share rose from 57% in 2008. For the second year running, wind energy accounted for the largest share of the new capacity – 10.2 GW out of the 27.5 GW built, representing 38% of the total. In absolute terms, renewables produced 19.9% of Europe’s electricity consumption last year. In 2009, and in absolute terms, about 19.9% (608 TWh) of Europe’s total electricity consumption (3042 TWh) came from renewable energy sources. Hydro power contributed the largest share (11.6%), followed by wind (4.2%), biomass (3.5%), and solar (0.4%). With regards to the new capacity constructed that same year (27.5 GW), among the renewable sources, 37.1% was wind power, 21% photovoltaics (PV), 2.1% biomass, 1.4% hydro and 0.4% concentrated solar power, whereas the rest were gas fired power stations (24%), coal fired power stations (8.7%), oil (2.1%), waste incineration (1.6%) and nuclear (1.6%). If current growth rates are maintained, in 2020 up to 1400 TWh of electricity could be generated from renewable sources, the report concludes. This would account for approximately 35-40% of overall electricity consumption in the EU, depending on the success of community policies on electricity efficiency, and would contribute significantly to the fulfillment of the 20% target for energy generation from renewables. However, the report advises that some issues need to be resolved if the targets are to be met. Particular areas of focus include ensuring fair access to grids, substantial public R&D support, and the adaptation of current electricity systems to accommodate renewable electricity. The study highlights that cost reduction and accelerated implementation will depend on the production volume and not on time. Summary of 2010 Snapshot Findings Wind energy: with more than 74 GW of total installed capacity in 2009, has already exceeded the 2010 white paper target of 40 GW by more than 80%. The European Wind Association’s new target aims for 230 GW of installed capacity (40 GW offshore) by 2020, capable of providing about 20% of Europe’s electricity demand. Biomass: if current growth continues, electricity output from biomass could double from 2008 to 2010 (from 108 TWh to 200 TWh). However, other energy uses such as heat and transport fuels compete for this particular source, which could potentially hinder the development of bioelectricity. Being storable for use on demand increases its importance as a source of electricity. Concentrated Solar Power (CSP): installed capacity is still relatively small in Europe: 0.430 GW in May 2010, about 0.5% of the total, but is steadily increasing. An estimated 30 GW could be installed by 2020 if the European Solar Industry Initiative ESII is realised. Most CSP projects currently under construction are located in Spain. since 2003, the total installed capacity has doubled each year. In 2009 it reached 16 GW, which represents 2% of the overall capacity. The growth will continue, as for 2010, installations of up to 10 GW are expected. Solar photovoltaic has also exceeded the capacity predictions formulated by in the EU white paper on renewable sources of energy. Other sources of power: technologies such as geothermal, tidal and wave power are still at the R&D stage, so they have not yet been included in the Renewable Energy Snapshots. Yet, they are likely to be introduced to the market within the next decade. As far as hydro generation is concerned, no major increase is expected, as most of the resources are already in use. However, pumped hydro will play an increasingly important role as in a storage capacity for the other renewable energy resources.
<urn:uuid:c0f82c5b-17fd-4a95-b839-ab7f21eb7410>
{ "dump": "CC-MAIN-2022-27", "url": "https://eandemanagement.com/2010/07/renewables-account-for-62-of-the-new-electricity-generation-capacity-installed-in-the-eu-in-2009/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104669950.91/warc/CC-MAIN-20220706090857-20220706120857-00269.warc.gz", "language": "en", "language_score": 0.9499954581260681, "token_count": 849, "score": 2.84375, "int_score": 3 }
In high school and college, most students learn a lot about geometry and calculus but very little about taxes and investing. In fact, when tested on financial concepts, only 17% of respondents ages 18 to 34 demonstrated basic financial literacy, according to the FINRA Foundation’s 2018 National Financial Capability Study. It could partly be a lack of exposure. Just 29% of those surveyed by FINRA said they’d been offered financial education at a school, college or workplace. A lack of personal finance education can make navigating money decisions even more intimidating, especially in the face of a $1.5 trillion student loan debt crisis and possible recession on the horizon. Here are four important personal finance topics you might not have learned about in school: “Taxes are a mystery to most of us,” said Billy Hensley, president and CEO of the National Endowment for Financial Education, with a laugh. “Demystifying the language around it is a huge step.” Those who don’t earn enough in income aren’t required by law to file a federal tax return, but you may want to file anyway because you may be eligible for a refundable credit. If you have a simple return – where you take the standard deduction, have taxes withheld from your paycheck by your employer and have limited income from stocks or interest and dividend income – then you likely qualify for a free simple federal tax return. Most major tax preparers, such as TurboTax and H&R Block, offer a free-file service. Here are a few more things you should know about taxes: - File on time: Even if you can’t pay the full amount, you should file your return by the deadline. Most taxpayers have until April 15 to file. If you owe the IRS, there’s a late-filing penalty of 5% per month, up to 25% of your unpaid taxes. The IRS has payment plans if you can’t pay everything you owe immediately. - Know what a deduction is: Deductions reduce the amount of income you have to pay taxes on. If you qualify, you can get tax deductions for student loan interest or medical or dental expenses. Even if you have no other tax deductions, the IRS allows you to take the standard deduction which reduces the amount of income you have to pay taxes on. For tax year 2019, the standard deduction is $12,200 for single filers. - Your W-4 determines your refund size: The W-4 form from your employer calculates how much tax to withhold from your paycheck. If you withhold too little, you might owe when you file your tax return. If you withhold too much, you might get a refund, but you’ll have to live on less of your paycheck during the year. The IRS offers a calculator to help you figure out how much to withhold. Click here to read more. SOURCE: USA Today, N’dea Yancey-Bragg
<urn:uuid:913061b2-afad-40ae-b14c-96a8537a9c3e>
{ "dump": "CC-MAIN-2021-04", "url": "https://blackchristiannews.com/2019/09/four-things-you-should-know-about-money-that-school-didnt-teach-you/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703499999.6/warc/CC-MAIN-20210116014637-20210116044637-00675.warc.gz", "language": "en", "language_score": 0.9562721848487854, "token_count": 622, "score": 2.734375, "int_score": 3 }
Introduction / History The 1995 census of Laos listed a population of more than 92,000 Mangkong people living in the three central provinces of Khammouan, Savannakhet and Borikhamxai. This figure may also include the So group. In Laos the So, Bru and Mangkong are often viewed as one people. Their cultures and languages are similar, but they each possess a separate ethnic identity. The So and Mangkong are also divided by living in different locations. The Mangkong are also located across the border in Vietnam, where they are part of the official Bru-Van Kieu minority group. Although the original home of the Mangkong was in the mountains between Laos and Vietnam, many have moved to the lowlands during the last two generations and have mixed with the inhabitants there. The Mangkong language is part of the Western Katuic branch of Mon-Khmer. Some linguists consider it merely a dialect of the Bru language. The Mangkong, So and Bru can all understand each other. According to a government survey, one-quarter of Mangkong are able to read, including only more than one-tenth of women. More than three-quarters of Mangkong people in Laos have never attended school at any level. The majority of Mangkong are animists. For centuries they have lived in fear of evil spirits, who they make regular sacrifices to in attempts to placate them. Ancestors are also held in high regard. Incense is burnt and prayers are offered for the dead on certain occasions throughout the year. There are approximately 2,000 Christians among the Mangkong in Laos, especially in Khammouan Province. OMF (Overseas Missionary Fellowship) and Mission Evangelique (Swiss Brethren) had missionaries working among the Mangkong in the 1950's and 1960's. They saw whole villages accept Christ, mostly the result of people being delivered from demonic oppression and supernatural healing of sickness. By the time all foreign missionaries were expelled from Laos in 1975, they had left behind a strong and evangelizing Mangkong church. The Mangkong believers have endured great persecution and hardship from the Communist authorities in recent years, but most have stood firm in their Christian faith. * Thank God for the 2,000 Mangkong Christians in Laos. Pray they would zealously share the Gospel. * Ask God to multiply the Mangkong church for His glory. * Pray the Mangkong church would receive God's call to take the Gospel to the lost throughout Laos. |Profile Source: Peoples of Laos, Paul Hattaway Copyrighted © Used with permission|
<urn:uuid:85e59ad5-2d90-432b-bb19-c064a08b939e>
{ "dump": "CC-MAIN-2015-11", "url": "http://joshuaproject.net/people_groups/13506/LA", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936464123.82/warc/CC-MAIN-20150226074104-00140-ip-10-28-5-156.ec2.internal.warc.gz", "language": "en", "language_score": 0.9615498185157776, "token_count": 552, "score": 2.59375, "int_score": 3 }
— "Sturgie" is biding his time, waiting to be introduced to the right female. Caught off Hooper's Island five years ago, the hulking six-foot Atlantic sturgeon passes his days lolling about in a large tank at the University of Maryland's Horn Point Environmental Laboratory near Cambridge. Scientists have been experimenting with him and dozens of other sturgeon here, trying to unlock the secrets of breeding them in captivity and ultimately restore a big, ancient fish that's virtually vanished from Maryland waters. It's been slow going, in part because Atlantic sturgeon, which have been around for 120 million years or so, take more than a decade to reach sexual maturity, and they don't spawn every year. There have been only two chances so far, but no young fish. "We knew coming in it was going to be a very long-term commitment," said Erin Markin, a faculty research assistant who oversees the lab's sturgeon work. But now the 9-year-old restocking effort faces a new, possibly insurmountable, challenge — the federal government recently declared that the Chesapeake's depleted population of the fish is endangered, meaning any efforts to handle or work with them just got tangled up in more red tape. "It's not looking terribly promising," said Steve Minkkinen, sturgeon recovery project leader for the Maryland Fishery Resources Office of the U.S. Fish and Wildlife Service. He questions whether state officials will have the patience or money to continue the quest in the face of strict federal regulation that comes with an endangered designation. Many conservationists hailed the announcement by the National Oceanic and Atmospheric Administration to put four of five East Coast populations of Atlantic sturgeon on the endangered species list. They believe the legal protection that comes with the listing will help shield a remarkable and once-abundant fish from further harm from fishing, dredging or other human activities. Overfishing is mainly what depleted Acipenser oxyrhynchus, though damming their spawning rivers and polluting the water didn't help. The entire coast once teemed with the big fish, which spawn in fresh water and range from Nova Scotia to Florida during a life that can span 60 years or maybe more. From colonial times, they were sought after by fishermen for their flavorful smoked meat, and especially the females for their roe, or eggs, which were prepared as the delicacy caviar. At one time, the Chesapeake Bay was second only to the Delaware River as North America's leading source of caviar, and 700,000 pounds of fish were reported caught in 1890, according to historical records. The bonanza was short-lived, as the baywide catch had plummeted to 22,000 pounds by the 1920s. Small numbers of sturgeon continued to be caught until a coastwide moratorium was imposed in 1998. No one knows how many Atlantic sturgeon remain in the bay. A remnant population apparently survived in Virginia's waters, and biologists have found a couple of less-than-year-old fish, evidence of spawning, in the James River. Though several dozen sturgeon — occasionally even more — turn up annually in fishing nets in Maryland, no little fish have been seen in the state for decades, leading scientists to believe they no longer breed here. Biologists tried stocking the Nanticoke River in 1996 with 3,000 juvenile Atlantic sturgeon that had been bred in a New York hatchery from fish caught in the Hudson River. But since then scientists have turned their efforts toward learning what sturgeon there are naturally in the bay, where they come from and what it'll take to get the fish to stay and reproduce successfully again in state rivers. After a few years of fruitlessly searching for the fish themselves, government biologists opted to encourage commercial fishermen to turn in any sturgeon they caught accidentally, so their location could be logged and the fish tagged for tracking. Fishermen have been paid $25 a piece for an immature fish to $250 for one six feet or longer. Since 1996, biologists have logged in about 2,000 Atlantic sturgeon caught in Maryland waters, most below the Bay Bridge. They're mostly immature fish and all tourists, it seems, as genetic analysis determined they're from Virginia, the Hudson and other rivers along the coast. They're apparently justpassing through, experts say. Like striped bass, shad and other anadromous fish, after spending time in the ocean they typically return to the river where they hatched in order to spawn in summer. "We wouldn't have any information at all on sturgeon in Maryland without the reward program," said Brian Richardson, who heads up sturgeon recovery efforts for the state Department of Natural Resources. The state can't afford the staff time needed to monitor for them, he said. Some of those netted fish have been kept for research and breeding, including a rare pair of mature females used in unsuccessful spawning attempts. But as of Thursday the rewards program will be terminated. Under the federal Endangered Species Act, it's illegal to catch, kill or harass protected animals, and any activity that involves capturing them and might accidentally harm one requires an "incidental take" permit. Officials say it's not clear yet what would be required to get federal approval to continue letting fishermen hold them for tagging, but fear it will be lengthy and costly to do so. Tom O'Connell, fisheries director for the state Department of Natural Resources, said officials tried to get one of those permits in 2000 to tag similar-looking shortnose sturgeons that fishermen also turn in under the reward program. But that species has long been classified as endangered, and O'Connell said the state gave up on seeking the permit after seven years. O'Connell said he's not optimistic about the state's ability to continue with the captive breeding and restocking effort either. Partners in that include the Fish and Wildlife Service, the University of Maryland Center for Environmental Science and GenOn, the Atlanta-based energy company that operates a sturgeon holding facility at its Chalk Point power plant on the Patuxent River in Prince George's County. With the energy company's generosity and limited public funds, it's added up to a multimillion-dollar investment over the past decade. The partnership has collected a couple hundred fish at four facilities, including state-run hatcheries in Oxford and in southern Maryland. Officials with NOAA's marine fisheries service said they would work with scientists to see that they could get the permits. But based on past experience, officials say they're not expecting quick action. "If it's going to take a year, longer probably, to determine if we can get a scientific research permit, is that something the state wants to continue making investments in?" O'Connell asked. "The budget situation is getting tighter and tighter every day, it seems." Kim Damon-Randall, supervisory biologist overseeing protected species in NOAA's Northeast regional fisheries office in Gloucester, Mass., said federal officials could work with state officials to secure a permit that would allow the reward program and subsequent research to continue. But she acknowledged it may need to be suspended until the permit could be processed. Conservationists acknowledge there may be more red tape for scientists. "There is additional paperwork that has to be done, but it's necessary paperwork to ultimately save the species," said Brad Sewell with the Natural Resources Defense Council, which petitioned NOAA to protect Atlantic sturgeon under the Endangered Species Act. David Secor, a fisheries ecologist with the University of Maryland's Chesapeake Biological Laboratory in Solomons, also acknowledges that there's a potential risk for whatever native fish remain in the wild if humans start stocking rivers with thousands of hatchery-reared fish. Those introduced fish, with a limited number of parents, may alter or even dilute the genetic diversity of the species. With the change in the Atlantic sturgeon's legal status, Secor said, "I don't look toward any kind of hatchery-based restoration program in the near future. I think the emphasis is on natural recovery." One thing that should help with that recovery, Secor noted, would be continued cleanup of the nutrient pollution that turns vast areas of the bay into an oxygen-starved "dead zone" every summer. Secor said research indicates Atlantic sturgeon are the most sensitive fish in the bay to low oxygen levels. That could take another 15 years or more, and scientists say it's anyone's guess when, or if, Atlantic sturgeon spawned in Virginia waters become so abundant they spread northward into Maryland. Asked what would become of Sturgie and the other captive sturgeon in the meantime if their keepers don't get the permits to continue with the restocking effort, Richardson said they'd in all likelihood have to be released back into the wild. He makes clear that would be a personal if not official disappointment. "They're really hardy, and they're charismatic," he said. "They do funny things,'' added later. "They're like no other fish we've worked with before." An earlier version gave an incorrect location for the Chalk Point power plant. The Sun regrets the error.
<urn:uuid:230bf768-57ee-4268-9b9c-4f3abc72c615>
{ "dump": "CC-MAIN-2018-22", "url": "http://www.orlandosentinel.com/bs-gr-atlantic-sturgeon-20120211-story.html", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794866511.32/warc/CC-MAIN-20180524151157-20180524171157-00286.warc.gz", "language": "en", "language_score": 0.9657038450241089, "token_count": 1909, "score": 2.9375, "int_score": 3 }
... >> Mathematics >> Abstract Algebra >> Cancellation Law Highest Rated Sign Nobody has posted a sign yet. Definition: Let a, b, c be elements of a group G whose law of composition is written multiplicatively. If ab=ac or if ba=ca, then b=c. If ab=a or ba=a, then b=1. Source: Algebra, second edition by Michael Artin
<urn:uuid:05a1697a-f37e-421a-8131-4b4a64e95530>
{ "dump": "CC-MAIN-2017-51", "url": "http://aslstem.cs.washington.edu/topics/view/5579", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948521188.19/warc/CC-MAIN-20171213030444-20171213050444-00182.warc.gz", "language": "en", "language_score": 0.820411741733551, "token_count": 91, "score": 2.59375, "int_score": 3 }
Notice: the Basilica of San Salvatore is currently not accessible. It is not possible to enter but it is still possible to admire the interior from the main door. According to the great Spoletino historian Sordini, the Basilica of San Salvatore is the finest example of architecture in Spoleto that dates to antiquity. Its origins are most likely funerary and it was initially dedicated to the martyrs Concordio and Senzia, not just because they were buried near one another, but because both were attributed with working wonders. Miraculous healings, which were initially attributed to Senzia, were later linked to the highly salubrious waters that sprung abundantly from Colle Ciciano. In a Benedictine document dating to the year 815, the basilica was dedicated to San Salvatore, a change that can most likely be attributed to the Longobard dukes. It was later cited as the Monasterium Sancti Concordii. In the XVI century, the inner walls of the apse were decorated with frescoes that depicted the cult of the Crucifix, hence its new name, Church of the Crocefisso, or Crucifix. After a major renovation project in the XX century, the basilica finally regained its old name, the Church of San Salvatore. The layout of the building features three naves with a three-part presbytery whose central area has a vaulted ceiling on an octagonal base, which in the post-Renaissance was altered to a resemble a small lantern. There are two ambulatories with apses on either side of the main apse. They were originally service areas for liturgical functions, as dictated by the Eastern-Syrian architectural tradition, and are now two distinct chapels. Because the two ambulatories are longer than the main apse, which is externally straight, they create an arched juncture space which gives the back a particular façade effect. Not much of the decorations have survived beyond some plaster and several elements of the paintings in the apse. Here, at the back of the central niche, they painted a gem-covered cross from whose arms hang chains with “A” and “Ω”, next to faux marble frames that enclose clypei and are very similar to the one depicted between the two angels in the cell of the Clitunno Temple. The Church is rich in reused materials, of various origin, such as columns, basis, capitols, cornices; some of these were reworked, such as the architectural reliefs of the façade, the cornice in the presbytery and the dadoes on the cupola’s shutter, During the last restoration works at the end of last century, it came out that many sculpted elements were actually blocks dating to the classic age, such as the windowsill of the left window (that bears the inscription AVO MATRI), and the architrave of the major portal (part of a cornice used first as soil of a Roman sepulchral monument of the 1st century, whose cast is visible at the Fondazione Cassa di Risparmio di Spoleto, which funded the works). In 25 June, 2011, the Church earned UNESCO World Heritage site protection as part of the serial “Longobards in Italy. Places of Power 568 – 774 A.D” list. The Serial Site includes the most important monuments built by the Longobards in Italy, all along the peninsula where the domains of the most important Longobard Duchies formed that which has been defined as the first ‘nation’ of Italy. In particular the Longobard Temple in Cividale del Friuli (UD), the monastic complex of San Salvatore – Santa Giulia, home to the city’s museum, with the archaeological area of the Capitolium in Brescia, the castrum at Castelseprio-Torba with the Church of Santa Maria foris portas (VA), the Clitunno Temple at Campello (PG), the Basilica of San Salvatore in Spoleto (PG), the Church of Santa Sofia in Benevento with the cloister that houses the Sannio Museum and, finally, garganic Sanctuary of San Michele un Monte Sant’Angelo (FG). When you leave the basilica, you may want to go down to the city cemetery below and see its monumental areas. Designed by the architect Ireneo Aleandri (who also designed the Teatro Nuovo and part of the main road) in 1836, it has retained its Neoclassical flair in the area under the basilica, where the main stairs, conceived to resemble a theatre, serve to connect the elevations of the various levels. The scenic effect as the basilica comes into sight is enhanced when you reach it over the main street from the cemetery. The most important place of the entire site is the area where, on either side of the main stairs and symmetrically placed not unlike a stage setting, are the two wings of the loggia where illustrious men found their final resting place. Although they were not part of the original design by Aleandri, they fit in beautifully with the purist Neoclassical style of the composition as a whole. Framed by pilasters, the tombs sit next to one another and, although each one is singular and different, they all adhere to a single style embellished with the symbols of the Christian tradition: the tree of life, the monogram of Christ, the rose, palm and the heraldic shields of the Zacchei Travaglini, Angelini Rota and Fratellini family. The Antonelli tomb stands out, decorated with an entirely sculpted altar that dates to the XVI century; as does the one of Bachilli, with its painting of Madonna and Saints done by Calvi, who was also responsible for other important works of art in the city; and those of Sansi, Campello and Pucci della Genga, in which the rank of the families is evident by the monumentality of the decorations and embellishments.
<urn:uuid:76af4037-236d-46ee-8c9c-9d22e0753f7e>
{ "dump": "CC-MAIN-2021-43", "url": "http://www.comune.spoleto.pg.it/turismoecultura/en/storia/en/la-citta/chiese/basilica-di-san-salvatore-e-cimitero-monumentale/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585196.73/warc/CC-MAIN-20211018031901-20211018061901-00423.warc.gz", "language": "en", "language_score": 0.9609894752502441, "token_count": 1300, "score": 2.6875, "int_score": 3 }
To re-use the work of another, the format is important. It's difficult to make edits to a PDF file, and some older file extensions (e.g. .wps) can be difficult to use on modern computers. Consider offering your text-based teaching materials in an accessible and editable format like Rich Text File (.rtf) or even a plain text file that can be read by a number of different software programs. An HTML file is a good option too. Making a video for your class? Consider the format and the available players carefully. The .mp4 extension is often recommended for OER because of the many players that read it and its easy reuse for others. Read more about File Formats for OER at the OER Handbook here.
<urn:uuid:57bdff42-4416-465d-9ad9-ad712259b5cf>
{ "dump": "CC-MAIN-2019-30", "url": "https://pitt.libguides.com/openeducation/create", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195525863.49/warc/CC-MAIN-20190718231656-20190719013656-00402.warc.gz", "language": "en", "language_score": 0.9349452257156372, "token_count": 159, "score": 3.34375, "int_score": 3 }
Apologia Exploring Creation with Astronomy is a Bible based science curriculum for elementary students. The book begins with a general discussion of astronomy and then covers each planet as well as the sun, the moon, space rocks, stars and galaxies, and space travel. The information is very detailed, yet explained simply enough for anyone to understand. The book has fourteen lessons and each takes about two weeks to complete. You will read information and have your child narrate or write what he or she has learned for the day. Answers to discussion questions are provided in the back of the book. The book is full of astronomy projects and experiments. You will create a model of a hurricane as an example of what the Great Red Spot on Jupiter may look like, make a model of Mercury, and build a model space station, as well as other exciting, hands-on projects. Most of these are at the end of the lessons. Your child is encouraged to complete various assignments and keep them in a notebook. By the time you complete the book, your child will have an impressive notebook to look back on. It’s a terrific record of what has been learned. The front of the book provides a list of materials needed for each lesson. Most are things you have around the house and the others are easily obtained. You are also given a password to the apologia website. This password gives you access to even more information. The web site will give you dates of astronomical events so you know what you will see in the night sky where you are. It will also provide links to other web sites with interesting photos and information. This book is easily used in a multi-age setting. Most of the assignments and activities can be done at any age, though some will require more guidance for younger children. Occasionally, the book will have an assignment for younger children and one for older. Even these assignments are similar and don’t create any additional work for the parent. With all the reading, notebook assignments, narration, and projects, you will learn an incredible amount about astronomy. Spending an entire school year on the subject allows you and your students to explore the topic thoroughly and become very knowledgeable in this area. Like all Apologia Science books, this book is written from a creationist point of view. The author repeatedly provides evidence of God as creator throughout the text. While each lesson takes about two weeks, there are no specific lesson plans in the astronomy book. This does create a little more work for the parent, but also allows for flexibility. You can decide how much information to cover and how many days each week to study science. Your child will be required to do quite a bit of writing. If they are young, they will narrate, and you will write. This is a big change if you or your child are accustomed to fill in the blank and matching type exercises. I highly recommend this course. If you have been using a more traditional science text, it may take a little while to feel comfortable with the Apologia science curriculum. It is less structured than a typical classroom science course, and yet, my children have learned more and enjoyed science more than the when we used the more traditional curriculum. I used this with my first grade daughter and my fifth grade son at the same time. This truly is a multi-age curriculum. Copyright Learningthings.com. This content may be freely reproduced in full or in part in any online website as long as you include a link to http://learningthings.com and give full attribution to Learningthings.com as the source. © 2013, Learningthings.com. Copyright Learningthings.com. This content may be freely reproduced in full or in part in any online website as long as you include a link to http://learningthings.com and give full attribution to Learningthings.com as the source. For permission to reproduce this content in other media formats please contact us.
<urn:uuid:21511989-d085-4d5d-9f04-1305056f91b7>
{ "dump": "CC-MAIN-2013-48", "url": "http://www.learningthings.com/blog/index.php/apologia-exploring-creation-astronomy", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163039753/warc/CC-MAIN-20131204131719-00089-ip-10-33-133-15.ec2.internal.warc.gz", "language": "en", "language_score": 0.9531305432319641, "token_count": 801, "score": 3.3125, "int_score": 3 }
Article of the month The World History from the time of Creation by Rev. Dr. John Williams In order to get a good understanding of the world history from the time of creation, the best book to read is the Bible, from the point of view of World History, and not just as a Christian Religious book. The world history books which are available in the market do not cover the years 1- 4000 BC, and the interim period between the Old Testament and the New Testament, during which time Jesus Christ lived. It is interesting to note that one can focus on the Kings and Kingdoms, the Patriarchs of the Bible, who were the leaders of that time, the prophets and their lives etc. Another way of studying the history of the world during the time period is to focus on the Bible History, Bible Geography, the countries that existed during this period, the wars fought, the kingdoms overthrown, the tribes of people, who were driven out of their countries, who took journeys in the wilderness in large numbers even for as long as 40 years to reach the final destination as in the case of Israelites, the land promised by God namely the Canaan land. Full details of this journey including all the difficulties they had along their way are descriptively given in the Bible. Further the constant relationship maintained by those who led this journey such as Moses and their constant relationship and communication with God, along the journey are also fully described. The names of different tribes of people that existed in that time, the conflicts they had, and the relationships they maintained are also mentioned. Another important point to note is some important buildings and monuments erected by them in various places during this time, even though many of them have been buried under the ground. Quite a few monumental structures are still in good shape and have been preserved well such as the pyramids, the Temple of Solomon, now called as the Temple of Israel. The names of the countries in existence and the topography of the lands still remains the same such as the boundaries of the countries of biblical times, the rivers, mountains, desserts etc. The names of the Kings, and their battles have been recorded in the Bible. It should also be noted that wherever the term God is used in the Bible, it refers to only one God and that is Jesus Christ. Of course at many places references have been made about man made gods, in gold and silver while the Bible declares that God made men. It should be noted that there are no comments whatsoever in the Bible, specifically commenting about any of the other religions in existence today as false religions or man made religions. However, several references have been made in the current writings and literature about man's desperate search for God, like in the case of Buddha. (will be continued)
<urn:uuid:33458208-e68c-44b1-a802-3bf0043debc6>
{ "dump": "CC-MAIN-2017-30", "url": "http://www.iicmweb.org/novart11.htm", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424239.83/warc/CC-MAIN-20170723022719-20170723042719-00120.warc.gz", "language": "en", "language_score": 0.9792378544807434, "token_count": 566, "score": 3, "int_score": 3 }
More than half of Americans drink coffee daily, according to research at Syracuse University. For many, coffee’s jolt is the best part of waking up. “I couldn’t live without it, I drink it every day,” said a Hartford construction worker who said he drinks at least six cups of coffee before he arrives at work. Dr. Laura M. Juliano, an assistant professor at American University’s Department of Psychology, has studied coffee and its effect on people. “It feels good. It’s a stimulant drug, so it makes people feel happy, more talkative, more sociable, more awake and alert,” she said. “It has a rewarding effect on the brain chemicals. It’s no different really from all drugs taken for recreational purpose, such as tobacco or alcohol.” While typical soft drinks can provide a similar effect, the amount of caffeine they deliver generally is significantly lower. Research has shown that the beneficial effects observed in coffee are not replicated in other drinks.”The caffeine in coffee tends to have a bigger bang for the buck,” Juliano said.Sue Gebo, a registered dietitian in Hartford, Conn., pointed out that coffee tends to serve as the better drink over soft drinks because the typical soda contains more than 100 calories, compared to a cup of black coffee, which has almost no calories.”It’s the stuff people add to coffee — the cream, the extra cream, the sugar — that can add 60 or more calories in a large coffee,” Gebo said. “Then, the flavored syrups add significantly more calories.”Gebo also explained that coffee can camouflage normal hunger signals, but that wears off through the day.”People are more likely to get out-of-control hungry when the caffeine wears off. When people are trying to lose weight, they might get into trouble,” Gebo said.As with anything we consume, however, side effects can accompany the benefits of caffeine in coffee. Read full article.
<urn:uuid:507369e3-6a35-4b93-a170-86fcf0c56e88>
{ "dump": "CC-MAIN-2018-43", "url": "https://www.volcanicacoffee.com/blog/coffee-addiction-hard-to-let-go/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583510749.55/warc/CC-MAIN-20181016113811-20181016135311-00502.warc.gz", "language": "en", "language_score": 0.9609121084213257, "token_count": 439, "score": 2.578125, "int_score": 3 }
Skull Teacher Resources Find Skull educational ideas and activities Showing 41 - 60 of 715 resources Students identify producers and consumers, including scavengers and decomposers, and discuss role each plays in food web. They then make diagram of possible food chain that might include skull pictured on Montana's quarter, and participate in scavenger hunt. Tenth graders observe collections of specimens and discuss their answers to provided questions. They explore common ancestry, homology, analogy, adaptive radiation, and evolution, while formulating creative answers based on their observations. Students focus on the pelts of fur-bearing animals native to Iowa to discover their different adaptations. In this animal adaptation lesson, students work in groups and examine various pelts to find information about the animals habitat and how it survives. Students share information. The images captured by photographer Dorothea Lange were so riveting that they still impact viewers today. Learners examine the Dust Bowl as they consider a series of slides displaying Lange's famous photos. Notes on each slide are provided, but critical thinking questions could be employed to elicit analytical thinking about the Dust Bowl and the Great Depression. Students identify one object that would tell the story of their lives. In groups, they determine what can and cannot be told from objects left behind. After watching a video, they compare and contrast chicken bones to human bones. To end the lesson, they create a timeline of the Cenozoic Era. Students explore small details. In this small details instructional activity, students view posters to locate different colors, count items and use their imaginations. Students pretend to be animals from the poster. Eighth graders consider how immigration impacted the East. In this West Virginia history lesson, 8th graders research the effects of immigration on Wheeling, West Virginia. Students also gather information about immigration on a field trip to the West Virginia State History Museum. Students use their findings to produce videos that highlight the immigrant experience. Students name wetland plant and animal life. In this ecosystem lesson students go birdwatching and interpret native plants through art. Regardless if there's a state test coming up, giving your kids reading passages is always beneficial. This passage is about the Norsemen and six multiple-choice questions follow. The answers are very detailed, describing where each answer can be found in the text. Students compare differences in amino acids in the beta hemoglobin from representative primates, complete a matrix of those differences, and from these data, construct and interpret cladograms as they reflect relationships and timing of divergence. Students explore the relationship between structure and function in the mouthparts of different animals including humans. Students explain characteristics and functions of observable body parts. They identify major bones in the body, list and locate the major systems of the the body through a series of activities such as chalk outlines, body bingo, and toothpick skeletons. Young scholars discuss the many different types of animal signs that can be used to identify and track all types of animals. They examine tracks, trails, homes, territory markings, and even "scat" left by animals and attempt to identify the animal that left them. In this science worksheet, students investigate the human skeletal system. Students read factual paragraphs with details about the bones in the human body and in some other species as well. Students complete a crossword puzzle. In this teeth worksheet, students read about the different types of teeth found in a wolf and a human. Then students label the different teeth on diagrams of a wolf and human. This worksheet has 10 fill in the blank questions. In this brain instructional activity, students read about the brain, its four parts, and their functions, and answer comprehension questions. In this fill in the blank and true and false instructional activity, students answer thirteen questions. Middle schoolers view pictures and videos to compare the structure and function of animal mouth-parts. In this structure and function lesson, students explore online pictures and videos of animal mouth-parts. They compare the structure of the parts with their function and with human adaptations. Students dissect owl pellets. In this dissecting owl pellets lesson, students discuss birds of prey and make predictions about what they may find during the investigation. Students tease out skull and bones and try to make a complete skeleton. For this online interactive reading comprehension worksheet, students respond to 25 multiple choice questions about Virginia Woolf's To the Lighthouse. Students may submit their answers to be scored. Students describe, measure and compare cranial casts from contemporary apes (chimpanzees and gorillas, typically), modern humans and fossil "hominids" (erect and bipedal forms evolutionarily separated from apes).
<urn:uuid:ba444647-564c-46a7-82f8-74d2808962ff>
{ "dump": "CC-MAIN-2014-35", "url": "http://www.lessonplanet.com/lesson-plans/skull/3", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535917463.1/warc/CC-MAIN-20140901014517-00417-ip-10-180-136-8.ec2.internal.warc.gz", "language": "en", "language_score": 0.9179857969284058, "token_count": 954, "score": 4.03125, "int_score": 4 }
“I'm working the late shift tomorrow.” Your friend invites you to play pool tomorrow night, but you can't because you have to work from late afternoon to midnight at the front desk of the hotel you work for. I'm working the late shift tomorrow. Want Video and Sound? Follow us on YouTube A "shift" is the period of time that an employee has to work. Jobs that have "shifts" are usually paid by the hour. One shift is usually between 4 to 16 hours, and can sometimes have a name like: - the late shift - the morning shift - the graveyard shift (a creative name for a shift that starts late at night and goes until early morning) The verb "work" is sometimes used to talk about a shift. In a job with a shift system, you might hear an employee say: "I'm working the afternoon shift tomorrow." You can use "I'm ___ing" to talk about things that are in the middle of happening now: I'm waiting for the bus. ...or about things that are going to happen soon in the future: I'm moving to Sweden in March. People usually talk about the future this way when they're discussing plans that have already been set or chosen.
<urn:uuid:2de3cc85-dfee-4632-8701-47547a01a0fb>
{ "dump": "CC-MAIN-2023-50", "url": "https://www.phrasemix.com/examples/im-working-the-late-shift-tomorrow", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100286.10/warc/CC-MAIN-20231201084429-20231201114429-00268.warc.gz", "language": "en", "language_score": 0.9573538899421692, "token_count": 266, "score": 2.515625, "int_score": 3 }
Encyclopedia of Myths. Monstropedia. God. God. Battleground God Can your beliefs about religion make it across our intellectual battleground? In this activity, you’ll be asked a series of questions about God and religion. In each case (apart from Question 1, where "Don't Know" is a possible answer), you need to answer either True or False. The aim of the activity is not to judge whether your answers are correct. The Brain's God Spot. Scientists searching for the neural "God spot", which is supposed to control religious belief, believe that there is not just one but several areas of the brain that form the biological foundations of religious belief. The researchers said their findings support the idea that the brain has evolved to be sensitive to any form of belief that improves the chances of survival, which could explain why a belief in God and the supernatural became so widespread in human evolutionary history. "Religious belief and behaviour are a hallmark of human life, with no accepted animal equivalent, and found in all cultures," said Professor Jordan Grafman, from the US National Institute of Neurological Disorders and Stroke in Bethesda, near Washington. Scientists are divided on whether religious belief has a biological basis. "There is nothing unique about religious belief in these brain structures. The search for the God spot has in the past led scientists to many different regions of the brain. The Myth of Persephone - Greek Goddess of the Underworld. By Laura Strong, PhD One of the best known characters in the Slavic genre of folklore and fairytales is the deadly guardian of the Underworld, Baba Yaga. Usually found in the deepest darkest corner of the forest, she is commonly portrayed as a hideous old hag with razor sharp teeth who cannibalistically devours those who naively stumble upon her domain. She dwells in a magical hut that is surrounded by a fence made from the leftover bleached-white bones of her victims, which is illuminated by their glowing skulls. This fence is a clear signal to anyone who would dare to pass through its gate that they must be prepared for an initiatory underworld experience, an experience that could end in sudden death or life-altering enlightenment, depending upon the wits and attitude of the initiate. Www.rosicrucian.org/publications/digest/digest2_2009/04_web/02_spretnak/02_spretnak.pdf. Www.stu.ca/~spirituality/documents/RachelSeiler-Re-ImaginingtheMythofDemeterandPersephone_000.pdf. The Narcissus and the Pomegranate: A New Look at Demeter and Persephone by Dawn Work-MaKinne. The Narcissus and the Pomegranate: A New Look at Demeter and Persephone. Io9 - 14 terrifying Japanese monsters myths & spirits. Inuit Mythology Project on the Behance Network. Draconika - Dragons, Dragon Information, and Dragon Pictures. BuddhaNet - Worldwide Buddhist Information and Education Network. Mythical Creatures and Beasts. 3847027500_31b74413b2_b. Women in Greek Myths. Buddhism Religion: Beliefs, History, Rituals. Judaism 101. Where to Start. Essentials of Buddhism - core concepts. All mythologies. Runes, Alphabet of Mystery. Sciencevsfaith.png (PNG Image, 894x700 pixels) - Scaled (92%) Hundreds of Proofs of God’s Existence. NOTE: For real proofs of the nonexistence of any god, see "Why Atheism? " For other evidence, go to Atheists of Silicon Valley debate page . Hundreds of Proofs of God’s Existence Formerly: Over Three Hundred Proofs of God’s Existence Originally adapted from a forum on the Internet Infidels . TRANSCENDENTAL ARGUMENT, a.k.a. . (1) If reason exists then God exists. (2) Reason exists. (3) Therefore, God exists. Internet Sacred Text Archive Home. Religion, World Religions, Comparative Religion - Just the facts on the world's religions. Religion and Sexual Ethics. Personal Mythology. The Five Stages of Personal Myth-Making The natural five-stage sequence around which the tasks and activities of the personal mythology model are organized can be easily summarized: Magickal Myths and Metaphors - Gothic, fantasy, Steampunk, Gifts, Alchemy. Facts & Figures: Enchanted Objects. Enchanted Objects Arthurian Legend. Family tree of the Greek gods. Key: The essential Olympians' names are given in bold font. See also List of Greek mythological figures Notes External links Media related to Family trees of Greek mythology at Wikimedia Commons. IRISH LITERATURE, MYTHOLOGY, FOLKLORE, AND DRAMA. Irish PlayographyIrish Writers OnlineStudy Ireland: Poetry - BBCIrish Women Writers - M. OckerbloomThe Irish and LiteratureLyra CelticaIreland Literature Guide2002 Irish Author RoundtablePoetry Ireland / Éigse ÉireannEarly Irish Lyric Poetry - Kuno Meyer Sonnets from Ireland - E. Native American Legends. Indigenous languages Native American cultures What's new on our site today! This page is our collection of Native American folktales and traditional stories that can be read online. We have indexed these stories tribe by tribe to make them easier to locate; however, variants on the same native legend are often told by American Indians from different tribes, especially if those tribes are kinfolk or neighbors to each other. Sponsored Links Note that since many children use this site, we have tried to avoid linking to any Native American legends or stories which deal explicitly with sex or contain bad language, including slur words for Native Americans. Gods and Goddesses. The Encyclopedia of Arda. Mythologias. Mythology, folklore, and religion. Mythical Creatures List, Mythical Creatures A-Z. Mythologies. Coyote and Opossum appear in the stories of a number of tribes. The mythologies of the indigenous peoples of North America comprise many bodies of traditional narratives associated with religion from a mythographical perspective. Indigenous North American belief systems include many sacred narratives. Such spiritual stories are deeply based in Nature and are rich with the symbolism of seasons, weather, plants, animals, earth, water, sky and fire. The principle of an all embracing, universal and omniscient Great Spirit, a connection to the Earth, diverse creation narratives and collective memories of ancient ancestors are common. Traditional worship practices are often a part of tribal gatherings with dance, rhythm, songs and trance (e.g. the sun dance). Algonquian (northeastern US, Great Lakes) Plains Natives Blackfoot mythology – A North American tribe who currently live in Montana. Muskogean (southern US) and Iroquois (Eastern US) Alaska and Canada See also THEOI GREEK MYTHOLOGY, Exploring Mythology & the Greek Gods in Classical Literature & Art. Ten Types of Goblins. The term “goblin” can apply to many types of magical creatures around the world. However, the one unifying feature is a sense of evil, or at least mischievousness, embodied in a grotesque or off-putting form with a general link to nighttime or merely dark places. Goblins have been around for a very long time to the point of having a specific term for them in Medieval Latin. The English word “goblin” actually comes from the Greek “kobalos” which means rogue. Five Monsters Rooted in Religion.
<urn:uuid:4856305d-428b-450d-a02e-613bc14087e0>
{ "dump": "CC-MAIN-2019-39", "url": "http://www.pearltrees.com/arianamcgrath/mythology/id14568302", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573284.48/warc/CC-MAIN-20190918110932-20190918132932-00115.warc.gz", "language": "en", "language_score": 0.8974055051803589, "token_count": 1597, "score": 2.609375, "int_score": 3 }
Before going for a CT scan, X-ray, or MRI, many patients may have questions regarding the screening. According to new study, at least one in every five persons say they did not receive any information about the scanning procedure beforehand. Dr. Jay Pahade who is a radiology associate professor at Yale School of Medicine said that this study is important in the modern health care system where patient engagement and participation are important. In the study, common patient questions regarding imaging scans included: - What does the preparation for scanning entail? - Does the scanning use radiation? - How much does it cost? - And is the scan really neccessary? During the study, the researchers surveyed over 1,400 patients and caregivers at three adult hospitals and three pediatric hospitals in the United States. The researchers asked the participants whether they had accessed imaging exam information, and what type of information they termed as the most helpful. The findings of the study were published online in the Radiology journal and they include: - Close to 80 percent of the patients said they had not received information related to scanning prior to the procedure. This implies one in every five persons show up for the exam without prior information of the test they should undergo. - The study revealed that patients value etst-related information more than the information that may relate to the dose. Therefore, healthcare providers should focus on providing that kind of information. - In the radiology realm, medical professionals should take charge of the entire imaging process. A big gap exists in the pre-imaging process, and data from the study shows the signficance of closing that gap. - About 50 percent of the respondents reported finding information on their own, from the internet. To help such patients, there is need to enhance the visibility of sites that offer this information. In conclusion, health facilities should step up patient engagement and involvement by offering information about CT scan, MRI, and X-rays to these patients.Leave a reply →
<urn:uuid:80082b83-2900-42e7-8673-2511cd89bf9a>
{ "dump": "CC-MAIN-2018-17", "url": "https://pet-ct-lascolinas.com/study-shows-many-patients-know-very-little-about-their-ct-scans-mri-or-x-ray/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125937161.15/warc/CC-MAIN-20180420061851-20180420081851-00620.warc.gz", "language": "en", "language_score": 0.9459549188613892, "token_count": 408, "score": 2.8125, "int_score": 3 }
Only in the past decade has intraocular lens (IOL) implantation become widely recognized as a safe and effective procedure. It can justifiably be considered one of the most important innovations in ophthalmology in this century. New lens designs, improved manufacturing techniques, and quality controls plus advanced microsurgical techniques have all contributed to this success. Throughout the history of IOLs, much of the original work, both theoretical and applied, has been carried out by ophthalmologists in private practice working in concert with industry. Despite early recommendations,1 federal granting agencies have provided surprisingly little support. With few exceptions, governmental and university-based institutions have played a disproportionately small role in promoting the evolution of lens design and implantation procedures. ECONOMICS AND DISSEMINATION OF INFORMATION In addition to the primary goal of providing good patient care, other considerations have unfortunately often dominated the practice of IOL implantation. Recent hearings conducted by Congressman Claude Apple DJ. Intraocular LensesNotes From an Interested Observer. Arch Ophthalmol. 1986;104(8):1150-1152. doi:10.1001/archopht.1986.01050200056048
<urn:uuid:58f83c75-8469-48df-bcdc-3644b5851145>
{ "dump": "CC-MAIN-2017-22", "url": "http://jamanetwork.com/journals/jamaophthalmology/article-abstract/636209", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607704.68/warc/CC-MAIN-20170523221821-20170524001821-00314.warc.gz", "language": "en", "language_score": 0.9185922741889954, "token_count": 246, "score": 2.53125, "int_score": 3 }
Woman Skips Round of Chemo to Help Cancer Research A Tale of Two Women continued... Koss' breast cancer cells are similar in their potency to Lacks' cervical cancer cells, Jones says. But there is a big difference between Henrietta Lacks and Koss. Lacks' cells were cultured and reproduced without her knowledge or consent, and were later exploited by medical institutions and companies. It's been pointed out, though, that patient consent was not commonplace at the time. One of the consequences of the publicity created by the book was a "unique agreement" reached in 2013 between the National Institutes of Health and the Lacks family. Any successful cell line from Koss would not be exploitive or without consent. It was her idea. 'An Opportunity We Did Not Have Before' Koss suggested entrusting her tumor cells to Jones, her former colleague, when he visited her in an oncology critical care unit. "Dr. Jones is absolutely the smartest researcher I've ever met," Koss says. "I trust him on every level." Jones and Koss control the rights to her cells. In the next 6 months or so, Jones and his Loyola team should know if the cells can live on in lab cultures. There is an outstanding need for more immortal breast cancer cell lines, Jones says. Cancer cell lines are valuable because they aid basic research and set the stage for clinical advancements, Jones says. In the case of triple-negative breast cancer, basic questions are unanswered, such as the source of the cells' abnormality, rapid growth, and invasiveness. The development of cancer cell lines has entered a new era, Jones suggests. And Koss' contribution takes advantage of that. He explains that technologic advancements now allow for more thorough analysis of a tumor. Researchers "can therefore repeat these analyses in the cell lines to confirm their gene structure and expression," he says. The result is better scientific evidence. "This will allow us to confirm that the cell lines used for study reflect the actual tumor tissue the way it was in the body, before it was extracted," he says. "This is an opportunity we did not have before."
<urn:uuid:7a5c3b34-cde6-4472-a6c3-2875f5757c2d>
{ "dump": "CC-MAIN-2016-07", "url": "http://www.webmd.com/cancer/news/20140730/woman-skips-treatment-cancer?page=2", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701159155.63/warc/CC-MAIN-20160205193919-00055-ip-10-236-182-209.ec2.internal.warc.gz", "language": "en", "language_score": 0.9737147688865662, "token_count": 457, "score": 2.53125, "int_score": 3 }
The story of the Annunciation is one of the most frequent themes in Christian art, most notably depicted by the artists of the Middle Ages and Renaissance. This is a story of connection between humanity and infinity, between the known and the unknown – of miracles, birth, and redemption. Is it any wonder that artists such as Sandro Botticelli, Leonardo da Vinci, Caravaggio and many, many others endeavoured to give life to this event through their artwork? These past weeks of exploring this artistic expression has opened my eyes to the breadth of this subject matter. An artist’s interpretation of an event is captured in the facial expressions, the hand positions, symbolism, length of brushstrokes, colours, backgrounds – all combine to allow the viewer to experience a oneness with the artist that breaks down the barriers of time and location. And speaking of locations, paintings have personal journeys and destinations. Once created, they take on a life of their own and can no longer be held by the artist. While they may be owned by collectors for a time, they move from home to home, country to country, crossing oceans and mountains. I have traced the journeys of three paintings: The Annunciation by Sandro Botticelli was painted in Florence, Italy circa 1490-1495. It is now housed at the Kelvingrove Art Gallery and Museum, Glasgow Scotland, bequeathed by Archibald McLellan in 1854. Born in 1795, McLellan was a coachbuilder, art collector, councillor and magistrate – emphasis on the art collector. When he died in 1854, Archibald McLellan’s staggering debts forced his heirs to put his entire collection up for sale. The Glasgow town council had the foresight to purchase the entire collection. The Annunciation by Paolo de Matteis was created in Naples, Italy in 1712 for Aurora Sanseverino, Duchess of Laurenzano. The painting found its way into the collection of Prince Henry of Bourbon-Parma, Count of Bardi (1851-1905), Parma, Italy. Upon his death, the painting was sold to Hirschler and Company, Vienna, Austria. In 1973, the Heim Gallery, in London England gained possession and sold it thereafter to Saint Louis Art Museum. The Annunciation by Bartolomé Esteban Murillo was created in Seville, Spain during the years 1655 – 1660. The painting has found its home at the Hermitage Museum, St. Petersburg. The Hermitage purchased the painting from the collector, W. Coesvelt of Amsterdam. What was created in Seville, Florence and Naples have made their way to distant lands. Wherever they went, they brought their narrative with them. Whether they remain in the places they now reside – well, that is another story for another generation to discover.
<urn:uuid:96c699ae-0a33-4c62-b223-b425aeb5986b>
{ "dump": "CC-MAIN-2021-17", "url": "https://chasingart.com/2018/12/22/the-annunciation-journeys-destinations/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038072366.31/warc/CC-MAIN-20210413122252-20210413152252-00181.warc.gz", "language": "en", "language_score": 0.9665641784667969, "token_count": 595, "score": 2.609375, "int_score": 3 }
Recommended Resources to Support the Teaching of Weather and Climate within this Specification Key Overview Resources RGS-IGB A level subject content overview Weather and Climate Climate change updates for A level geography – supporting the 2016 specifications Causes of climate change through the Quaternary Ice Age including glacials, interglacials and stadial periods and thresholds for change Met Office In Depth introduction to the water cycle. Deforestation, the water cycle, the carbon cycle and climate in the Amazon Met Office In Depth introduction to the carbon cycle. Impacts of recent increases in the atmospheric carbon store on the water cycle and oceans, including: amount, type and patterns of precipitation, extreme weather, river discharge, sea level rise, acidification of the oceans Carbon, water, weather and climate a PowerPoint presentation focussing on recent changes to the carbon and water cycles, and how the two cycles interact. Positive and negative feedback loops, thresholds and equilibrium in natural systems Ecosystem feedbacks on the carbon and water cycles, Climate Change Schools Project Module 2 – climate feedback mechanisms, Carbon Cycle Feedbacks Consequences of change within and between the water and carbon cycles including cryosphere feedbacks, marine carbon feedbacks, terrestrial carbon feedbacks and methane feedbacks. The implications of feedback within and between the two systems for life on Earth, including Arctic permafrost thawing Processes and Patterns of Global Migration 21st Century Challenges, Economic Growth and Challenge Energy Challenges and Dilemmas Weather and Climate Characteristics of the UK’s Climate Extreme Weather events Impacts of human activities on the atmosphere at local and regional scales: Urban Climates Measuring the impact of urban areas on wind flow: a PowerPoint presentation introducing how the wind is affected by urban structures and notes for teachers introducing simple fieldwork which can be carried out in the school grounds, using bubbles. People, climate and the Future Further A level resources. Link to the full WJEC/ Eduqas specification
<urn:uuid:ad798762-0375-4821-b66a-47abd07b2b01>
{ "dump": "CC-MAIN-2022-49", "url": "https://www.metlink.org/resource/2016-wjec-eduqas-a-level-geography/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710978.15/warc/CC-MAIN-20221204172438-20221204202438-00831.warc.gz", "language": "en", "language_score": 0.8356103897094727, "token_count": 432, "score": 3.578125, "int_score": 4 }
A “dangerous dog” is defined in sSection 10-51 of the Gadsden County, Florida, Code of Ordinances under the term “vicious animal.” A dog will be declared dangerous if the dog has, more than once, bitten or scratched a human or other animal without provocation within a 12-month period, which inflicts seriously bodily injury to that human or animal. Once classified as vicious, the dog shall either be confined permanently to its owner’s premises or humanely destroyed at the discretion of the director of animal control. A dog will not be classified as vicious if the injury was sustained by a domesticated animal, which at the time of the injury was teasing, tormenting or otherwise abusing the dog or if the injury was sustained by a person who was committing or attempting to commit a tort or crime upon the dog’s owner or who was committing a willful trespass upon the owner’s premises and was tormenting, teasing or otherwise assaulting the dog. Sec. 10-51. Definitions. The following words, terms and phrases, when used in this article, shall have the meanings ascribed to them in this section, except where the context clearly indicates a different meaning: Vicious animal means any animal which has bitten or scratched a human or other animal without provocation two or more times within a 12-month period of time, or any animal which has attacked a human or other animal with provocation, causing serious bodily injury to that human or animal. Wild animal means any animal normally found outside captivity in the county and the related ecosystems of this area of the United States. The term “wild animal” includes, but is not limited to, such animals as reptiles, raptors, mammals, aquatic animals, and amphibians. (Ord. No. 88-004, § 2; Ord. No. 90-010, § II) Sec. 10-60. Vicious animals. (a) Any animal classified as vicious according to the definition in this article shall be, at the time of being so classified, either confined permanently to the owner’s premises; or humanely destroyed at the discretion of the director of animal control. (b) No animal shall be classified as vicious if injury was sustained by a domesticated animal which at the time of such injury was teasing, tormenting, abusing, or assaulting the attacking animal. (c) No animal shall be classified as vicious if the threat or injury was sustained by a person who at the time was committing or attempting to commit a tort or crime upon the owner of the animal or who was committing a willful act of trespass upon the premises of the owner of the animal or who was teasing, tormenting, or abusing the animal. (Ord. No. 88-004, § 6) Also put the following language in at the end of the article: Florida law does not require the classification of a dog as a “dangerous dog” in order to pursue claim or a case for dog bite injuries. In fact, there is no requirement that Animal Control take any action for a person to pursue a case for medical bills, medical treatment, pain and suffering, and related damges for a dog bite injury. Whether a dog is classified as a dangerous dog or not, it is vital that dog owners maintain control of their dogs for the protection of others. This would include consistent use of leashes and a secure backyard and / or front yard with appropriate fencing. In Florida, a dog bite victim typically need only prove that a dog bite took place. There is no requirement that the dog bite victim prove the dangerous history or propensities of the dog. Even if this was the dog’s first bite every, the dog bite victim can pursue a cause of action against the dog owner for the related damages and injuries. You can read more about the Florida Dog Bite Law at Florida Dog Bite Statute – There is Teeth to this Florida Law – Rights of Injured Children and Adults. The book titled – The ABCs of Child Injury – Legal Rights of the Injured Child – What Every Parent Should Know – has chapters on Dog Bite Injuries, Medical Bills and Treatment, Damages / Compensation, and other topics. You can receive a free child injury book at The ABCs of Child Injury. See also Florida Animal and Dog Bite Injuries at the Wood, Atter & Wolf Website.
<urn:uuid:cccdeb26-1883-4a9d-9b92-290c2f41644c>
{ "dump": "CC-MAIN-2019-13", "url": "https://www.floridachildinjurylawyer.com/how_does_gadsden_county/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202640.37/warc/CC-MAIN-20190322074800-20190322100800-00510.warc.gz", "language": "en", "language_score": 0.949579119682312, "token_count": 909, "score": 2.578125, "int_score": 3 }
Initiative in Zimbabwe pursues holistic and multi-faceted approach to support climate resilience and increase yields. Women in Malawi are inspiring the next generation of smallholder farmers to adopt climate-smart technologies. On the International Day of Rural Women, October 15, meet farmers who are leading their families and their communities to a better life. Long-term research on climate-smart agriculture in Malawi has improved the productivity, resilience and prospects of Mary Twaya, a single mother of three. A recent study from the International Maize and Wheat Improvement Center (CIMMYT) shows that conservation agriculture and other climate-smart technologies are increasing yields and farmer resilience amidst drought episodes in southern Africa. FACASI project explored ways to address access to appropriate mechanization solutions. How green manure and conservation agriculture are transforming the lives of farmers in eastern Zimbabwe. From smart mechanization to nutritious and drought tolerant seeds, partners discover CIMMYT’s latest research and innovations. These technologies, known as high-throughput phenotyping platforms, replace lengthy paper-based visual observations of crop trials.
<urn:uuid:aee6aa79-17e6-4bf0-b011-c631d50fd7a9>
{ "dump": "CC-MAIN-2020-29", "url": "https://www.cimmyt.org/author/schikulo/", "file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655892516.24/warc/CC-MAIN-20200707111607-20200707141607-00038.warc.gz", "language": "en", "language_score": 0.8978152871131897, "token_count": 232, "score": 2.515625, "int_score": 3 }