text
string | id
string | metadata
dict |
---|---|---|
Pi is an irrational number, and thus cannot be completely represented to its final digit. However, 3.14 is frequently used in formulas to represent pi, thus the "naming" of March 14 as Pi Day. 3.1415926535 is pi to a decent number of digits, but computers have calculated pi to over 1 trillion digits past the decimal. Pi represents the relationship between a circle’s diameter and its circumference.
Pi Day is really a one of those pseudo-holidays, such as "Talk Like a Pirate Day." Larry Shaw (above), who worked as a physicist at the San Francisco Exploratorium, created Pi Day in 1989. That first event was held with both the public and staff joining the activities, marching around a circular space in the building, which makes sense considering pi's relationship to circles. The party then moved on to eating, with participants then feasting on fruit pies.
The Exploratorium continues to hold Pi Day celebrations.
The date has become so well-known that there are numerous Pi Day websites. Among them are what is likely the official site, at piday.org. That one is being hammered to the point of being not usable, though.
In addition, the Exploratorium has its own Pi Day website. Princeton does as well. Ironically enough, March 14 is also the birthday of famed physicist Albert Einstein.
On March 12, 2009, the U.S. House of Representatives passed a non-binding resolution (HRES 224), which recognized March 14, 2009, as National Pi Day. Meanwhile, on Pi Day 2010, Google used one of its familiar Google Doodles to celebrate the faux holiday.
Pi Day 2015 will be an especially significant day for pi, and perhaps pie, enthusiasts. That day, 3/14/15, will represent the first five digits of pi, 3.1415.
Sadly, it doesn't appear restaurants like Baker's Square will be celebrating Pi Day. After all, there was already a National Pie Day (with an e) earlier this year, on Jan. 23.
|
<urn:uuid:769969f0-d28f-458b-8bc6-501fe4da878a>
|
{
"dump": "CC-MAIN-2014-23",
"url": "http://www.tech-ex.net/2013/03/celebrate-your-inner-geek-its-pi-day.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510267865.20/warc/CC-MAIN-20140728011747-00392-ip-10-146-231-18.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9664058089256287,
"token_count": 426,
"score": 3.140625,
"int_score": 3
}
|
As final deadlines for classes approach, sleep is getting more and more valuable (and rare...). Check out this blog post on Alcohol & Sleep originally posted on Harvard's Department of Health Promotion and Education (HPE) blog! For more information visit hpe.huhs.harvard.edu or email email@example.com
Alcohol & Sleep
It’s common knowledge that when someone drinks, their brain is impacted by alcohol. Usually, the effects of drinking are typically seen within 30 minutes or so and last for as long as the person continues to drink... and then some! But what isn’t often thought about is how the alcohol STILL impacts the drinker once they fall asleep. Once the behaviors associated with drinking alcohol stop because someone falls asleep, it’s easy to think that the alcohol is no longer having an impact. Well...
Here are just a few of the impacts that alcohol has on sleep:
When a person has alcohol on their brain, they spend more time in Stage 1 sleep. Stage 1 sleep is when a person drifts in and out of sleep and is awaked easily. Due to the long periods of time spent in this light-sleep stage, people have increased wake periods,, causing sleep disruption. This also impacts the proportions of the other stages of sleep, meaning that people don’t spend nearly enough time in the deeper stages, 2-4, or all important REM sleep cycle.
Shorter Periods of Sleep
When the alcohol is metabolized and is no longer on the brain, a person then will go into REM-rebound, meaning that they will experience longer periods of REM. Depending on the amount of alcohol someone consumes, this can either occur during the night right after someone drinks, or the following evening-- this is why heavy drinking can impact sleep multiple nights after a person drinks! Since it is very easy to wake during REM, when a person is in REM-rebound, they end up waking up much earlier than they wanted, causing them to get fewer hours of sleep.
Alertness and Performance
Alertness, as assessed through the Multiple Sleep Latency Test, is found to be reduced and impaired in individuals who consumed alcohol the prior evening.
Alcohol’s diuretic quality will contribute to more trips to use the bathroom during the night, which is already increased due to liquid consumed with alcohol! And don’t forget that this will add to dehydration the following morning!
We all know how important sleep is (if you want to be reminded, be sure to check out A Better Night’s Rest, HPE’s newest Sleep Program!); getting high quality sleep is just as important as getting the right amount of sleep! If you choose to drink, be sure to keep in mind the ways that alcohol can impact your sleep, and remember that the less you drink, the less your sleep will be impacted!
|
<urn:uuid:219e124b-7c86-434a-b4b2-829468341315>
|
{
"dump": "CC-MAIN-2019-26",
"url": "https://harvarddapa.org/blog/alcohol-sleep",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998690.87/warc/CC-MAIN-20190618063322-20190618085322-00128.warc.gz",
"language": "en",
"language_score": 0.9493812322616577,
"token_count": 602,
"score": 2.9375,
"int_score": 3
}
|
Source: btrfs homepage
The most recent development version of the Linux kernel (2.6.29-rc1) included a pleasant surprise: the development version of btrfs has been added to the kernel source tree.
There has been quite a lot of filesystem work done in the past few kernel versions. The ext4 file system was added as a development version in late in 2006 (Initial git commit) and was declared stable exactly two years later. (commit to rename ext4dev to ext4) ext4 is a nice evolution of the ext series of file systems and provides a number of new features such as larger storage limits, and extent based storage. See the wikipedia article on ext4 for more detail. But ext4 is still just a file system and doesn't really compete with the newest kid on the block, ZFS.
ZFS is the feature rich, "rampant layering violating" file system that Sun has developed for it's version of UNIX, Solaris. ZFS has a few key features that make linux users green with envy: quick and easy snapshots of data, data checksumming, and integration of several tools to manage disks and file systems.
Snapshots: ZFS is based upon a Copy-on-write architecture that basically writes a new copy of the data every time it changes. Once the new version of the data is written the old version is marked as deleted and the space can be reclaimed. To implement a snapshot system on top of this is trivial, all you do is instruct the operating system to not mark the old data as deleted and and changes are preserved. This also means that snapshots do not occupy any more space then just the difference between the two versions.
Checksumming: All data that is written to a ZFS file system is checksummed to ensure it's validity. Lately it has become more critical that hardrives can silently corrupt data. This has always been an issue but due exponential growth in storage requirements corrupted data is much more common. To help mitigate the risk of silent data corruption ZFS stores a checksum of all the data it stores and validates the data again before relaying it onto the operating system. If one copy of the data has been corrupted it is identified on read and seamlessly copied from another source.
Integration of several tools: If you have a server with several hard drives in it you potentially use 3-5 different utilities to abstract away the fact that your data is stored on multiple disks. You would have a RAID setup to make several hard drives appear as one larger, or redundantly stored disk. You would have an Logical Volume created on that disk so you have the flexibility to grow/shrink/move the volume(s), and finally you would have your choice of filesystem setup in to actually allow the os to access the data. On top of this all you may have a backup system implemented so that you can roll back to previous versions of the data (snapshots), and possibly a method to identify and resolve data corruption (checksumming). ZFS unites all this functionality under one system that is more flexible, and easier to manage.
For just the three features listed above you can see why linux users would want to make have ZFS. But there is an issue. ZFS is free software, but it is not compatible with the GPL licence of the linux kernel. ZFS code (and a binary implementation in OpenSolaris) is freely available but it is released under Sun's GPL incompatible CDDL licence. Sun has released a few of their major software projects under GPL and GPL compatible licences (OpenOffice, Java), but as ZFS seems to be a major technological advantage for Solaris it doesn't seem like it will be re-licenced anytime soon.
So with the licencing incompatibility of ZFS and the "that just makes sense" factor of the feature set, Chris Mason started to work on a GPL licenced competitor to ZFS. It's called Btrfs (B-Tree FS, or Butter FS) and it implements most of the major features of ZFS. It has snapshots, checksumming, multiple hard drive support, and a few other features. Btrfs was announced on June 12, 2007 (lkml post) and already implemented a number of the key features. After over a year of development it has been merged into the linux kernel as brtfs-unstable (git commit) and will be part of the general 2.6.29 kernel release. It is still an experimental file system and not ready for production use yet, but having the code in the main kernel tree is major step on the way to becoming a workable filesystem.
Btrfs feature set is squarely aimed at ZFS, but it does have big shoes to fill. ZFS has been in continuous development for over 4 years now and was included as a fully supported production ready filesystem in the 6/06 (june 2006) update to Solaris 10.
Linux development continues on at a breakneck pace...
Oracle Presentation with Benchmarks
Article on Snapshots & Subvolumes
Wikipedia Article on btrfs
Diagrams showing RAID Levels
btrfs utilities gitweb
The last word on ZFS
Tuesday, January 13, 2009
Source: btrfs homepage
Posted by Peter Vander Klippe at 10:01 AM
Monday, April 14, 2008
Source: Using PackageKit in GNOME programs
Yet another flamewar has erupted on the internet. (Surprise!)
A while ago Richard Hughes was looking at the various graphical programs for maintaining a desktop linux system (pirut, pup, Yum Extender, KYum, up2date, synaptic, YaST, Zypper, rpmdrake, Smart Package Manager, porthole) and thought there may be a bit of duplication of work going on here, so he started yet another package management framework.
Now he didn't do this just because he didn't like the other applications, but to combine their effort and to start fresh. By developing a common back end and front end for package management a common interface for the users is realized. By rewriting from scratch the interface can be designed to use newer technologies like PolicyKit to provide additional security. With this PackageKit was born.
"PackageKit is a system designed to make installing and updating software on your computer easier. The primary design goal is to unify all the software graphical tools used in different distributions, and use some of the latest technology like PolicyKit to make the process suck less." - PackageKit intro from the PackageKit Site
Well, as you may know, PackageKit has really taken off. It still is rather bare bones, but so far there are 12 different back ends with at least 6 of them in a usable state. For each one of these backends PackageKit presents a common command line, graphical, library, and DBUS API and therefore also be deeply integrated with other applications such as Gnome and KDE.
So, to help gain interest in this great new library/daemon/gui/API Richard Hughes posted on his blog that he would be willing to code (or help code) package kit based functionality into existing applications.
Imagine, that when you want to install an extension for epiphany you could launch a PackageKit based extension manager that would show you all the extensions available in your distro's repositories and provide all the tools to install, & update these extensions? Now you don't have to leave epiphany to launch a different package management app to install the extension saving you time, and also no matter what backend package system your distro runs (as long as the backend has been coded) the user interface is exactly the same for everyone. This would be a huge leap in usability, and a great idea.
But guess what Jason D. Clinton looked over PackageKit's implementation and declared it to be incompatible with dpkg/apt. But he didn't stop there, he blamed Red Hat for segregating the market by not being able to use anything invented out of house.
Chaos ensued, (as you could imagine.)
A few key points though:
- Richard Hughes started PackageKit before he was hired by Red Hat, so PackageKit is not a Red Hat invention. Red Hat is only guilty of hiring a developer with vision.
Foresight Linux uses PackageKit as their default package manager. If you've ever tried to understand their Conary software packaging system you will soon find out it is unlike anything out there. This proves that PackageKit can be used in systems completely unlike RPM.
Bashing Red Hat like that is unfair. I highly doubt any other company in the world comes close to the contributions Red Hat makes back to Linux and its associated applications/technologies.
I think that tools like PackageKit are the way of the future and it's kind of sad to see such negative press about such a great idea.
The fact that dpkg/apt is designed to allow random terminal input during the package management process is really dumb from a desktop perspective and alternatives should be enforced (such as debconf).
Also, the "problems" with the dpkg/apt backend should be resolved as soon as possible because of the huge political impact. dpkg/apt = Debian = Ubuntu, without those two distributions behind you, your project is really not for every distribution, it is only for distributions that don't use dpgk/apt.
Rob Taylor's response
Jason D. Clinton's initial post
Jason D. Clinton's follow up post
J.M. Maurer response
Richard Hughes' (the main developer for PackageKit) mocking of the whole issue
Further mocking of the issue by Richard Huges
Havoc Pennington's (past Red Hat and Debian Dev) response
Monday, July 23, 2007
Source: My Visions
OpenOffice.org (OO.o) developer Kay Ramme has just posted his visions for the future OO.o. He outlines several major points that will really help bring OO.o into the future. Following is a
Make all of OOo MVC (Model View Controller)
MVC is a long standing application architecture that really helps separate the user interface from the code and data. Major benefits of this approach are a more flexible GUI as it is not tied to the underlying code and the ability to restructure the data without affecting the presentation. The MVC architecture has been around for quite a while and is generally accepted to be a good way to structure your application. This will make OO.o more robust and will greatly help with maintaining OO.o and reducing potential for bugs. Ruby on Rails is a popular example of how a strict MVC structure for you code will benefit your application.
See: Wikipedia: MVC
Unified application with just different work approaches
Currently OO.o is split into a few different application, Draw, Writer, Calc, Base, Impress, etc. These are all the same binary but they show significantly different interfaces and functionality. This vision talks about truly unifying the applications so that no functionality is duplicated and there is less ways to do things. For example, currently in Writer there is a table feature that is completely different from the spreadsheet functionality of Calc. What would be ideal is to unify this functionality so that tables in writer & impress are the same as the spreadsheet in Calc. There will have to additional features added to the spreadsheet functionality to make it a suitable replacement to the table function but this will help unify the application and will reduce code and then potential for future problems. Also this will make the application simpler to use as there will be only one way to interact/create a spreadsheet/table.
OO.o's main competitor Microsoft Office is slowly working on this and has made some improvements in the latest Office 2007, but still does not have this. Koffice the KDE office project is working on this exact idea as the basis for Koffice 2 and could become a major alternative to OO.o in the free software arena.
Event driven architecture
This vision also requires a major architectural shift but will make for a much more robust code base. Event driven architecture is basically changing the code to make it respond only to events. These are usually user events (clicking a button, typing, scrolling the mouse wheel). The alternative to this is batch or flow driven programming where the programmer controls the flow of the application. What this means for the user is a much more reactive application that responds to user input. All interactive application have some of this functionality but by pushing it to the next level OO.o will be much more responsive and user friendly.
See: Wikipedia: Event Driven Architecture
Common threading model
This vision looks to have a common threading model throughout the OO.o code. There is an ongoing push to make all code threaded to help with utilizing new multi-core processors and OO.o is working towards this. By using a common threading architecture you reduce code and bugs by reusing the same functionality throughout the code.
See: OO.o: Uno Threading Model
Declarative Language GUI
This vision relates to the MVC as it requires the adoption of a language to describe the user interface. This allows the presentation to be separated from the code and allows for more flexible UI creation and easier changes/themeing/customizing of the UI. Another benefit of this is that this language is easier to understand then the C++ that OO.o is mainly programmed in so this could allow for people who have trouble with the complicated code base to be able to contribute better to the GUI. In other applications this separation has allowed graphic artists to easier customize the interface and make a much slicker product.
One of the best examples of this is the Firefox/Thunderbird/Sunbird/Sea Monkey programs from Mozilla. All of these applications use a language called XUL to describe the UI. This allows all theses applications to run on a very similar code base (soon to be more the same through the use of xulrunner) with most of the differences in the XUL interface code. All of these applications allow easy customization through the use of extensions and add-ons.
See: Wikipedia: User interface markup language
Improve the Build System
OO.o has the reputation of being hard to compile, and from many reports this is very true. It's immense code base and complicated structure make it one of the largest projects within the open source community. But this reputation also hurts adoption and contribution by external developers as they can have problems modifying the code and then compiling their changes. This vision is looking to make the build process much saner and only require GNU make without any external dependencies (for the building process). This vision also calls for saner output form the compiling process to help with debugging the build process.
So that is one developers view for the future of OO.o. Please check out the original post for more information and the included links. OO.o is a great office suite and bringing ideas and visions such as these to the public eye can only benefit the project as a whole.
Monday, July 16, 2007
Source: Fedora 8 Proposed Features
Fedora 8 is currently under development and is scheduled for release in November of this year (2007). This is a quick overview of the proposed features. As these are proposed features and as it is still about 4 months from release some of these will change.
Better Startup Graphical, smooth and polished startup
This first feature is to bling up the boot sequence. Currently the boot sequence is a mix of text and graphical modes and doesn't look as professional as some of the other competing OS's logins. (Mac OSX, Windows, Ubuntu) This features calls for the hiding of some current boot up graphics such as the GRUB menu and ensuring that there is only one mode switch between text and graphical boot. This will help make the fedora (and the next RHEL) boot up slicker and adds a more professional image to the OS.
Bigboard Replacement for GNOME panel that uses online services via mugshot
This next feature is about integrating the Mugshot Online Desktop Project's bigboard application. Bigboard is basically a sidebar for linux that partially replaces some of the top and bottom panel's functionality but with "greater emphasis to personalization, search, presence and contacts, and documents."
Codec Buddy Helper app promotes Free alternatives and guides users trying to play content under restricted codecs
This is a similar feature to Ubuntu's automatic codec install. When a user tries to play an audio or video file with an uninstalled codec this feature will ask the user if they would like to install the relevant codec. It will also warn the user about illegal use of codecs and will try to educate the user. This is different from Ubuntu's auto codec install as it will recommend the purchase of Fluendo's gstreamer codecs, where as Ubuntu will install the "free" codecs after the user acknowledges that the codecs are illegal in some countries and should not be installed there. This feature will help with usability as often users are confused when they cannot play their audio or video files. This also goes along with Fedora's commitment to a completely free OS as they are pushing the completely legal alternative first.
KDE4 Integrating KDE 4.0, a new major version of KDE
Not much has to be said about this feature as it explains itself. KDE 4 is going to be released in October and Fedora would like to incorporate it as the default KDE version into their 8th release. They are working hard on this feature as KDE 4 is highly desired and with the expected release of Fedora in November it will be one of the first distros to completely incorporate KDE 4. The Fedora developers are also working hard on ensuring compatibility with existing KDE 3 applications by shipping a full set of compatibility libraries.
NetworkManager System wide default network manager integration
This is another feature that Ubuntu currently has. Fedora would like to integrate NetworkManager as the default network configuration method. NetworkManager was started by Red Hat and currently the easiest way to manage wireless networks. It is ideally suited for laptops with wireless cards. It also has plugins for different VPN implementations making it easy to use a VPN. The current weaknesses of the implementation is in the server market or with managing multiple network devices. Also there isn't any easy method to manage the networks without a GUI. Fedora is working on these issues and is hoping to implement NetworkManager as the default and only network manager for Fedora 8.
PolicyKit Easy and painless administration
"PolicyKit provides a flexible framework for granting users access to privileged operations." This will help integrate the various ways distros allow desktop users to preform privileged operations. PolicyKit is completely integrated with HAL and DBUS and will provide a cutting edge desktop-environment agnostic method of securing the desktop. PolicyKit will also fix some implementation flaws of current methods of providing privileged operations to desktop users. (such as running X applications as root)
PulseAudio Feature rich sound server
This is one of the most exciting features slated for inclusion in Fedora 8. PulseAudio is a sound server, which provides for network abstraction for sound. It also provides for full mixing of multiple audio streams and can be used to preform various effects on sound. PulseAudio allows for application independent volume control and also will allow any sound source or output to be shared or mixed over a network. For example with PulseAudio you can have Rhythmbox running of one computer but play the audio over the soundcard of a different computer on the network. It also will work for input allowing for a microphone input on one computer to be used on a different computer. This feature will bring the audio side of the linux desktop into the 21st century and will compliment the advanced visual effects available with Compiz and Compiz Fusion.
Presto Using delta RPM updates by default. Saves heavy amount of bandwidth and time for updates.
This is also an exciting new feature. Presto is a plugin for Yum to allow for the use of deltaRPM's to be downloaded instead of the full RPM's when updating. The current method of updating requires the full packages to be downloaded, this requires a lot of bandwith and often is not required as only a few files in the RPM package are changed. DeltaRPM's are much smaller as they only contain the differences between the two different packages. Currently there isn't an easy way to make use of these deltaRPM's and Presto hopes to change this. By using this plugin the bandwith required by a user to update is greatly decreased this will benefit the users with slow connections and will also decrease the infrastructure required to host a Fedora update mirror.
VirtSecurity Secure remote mangement for Xen, KVM & QEMU virtualization
Currently in Fedora 7 and RHEL 5 their is no secure remote management of installed VM's. This feature will incorporate full TLS for all communication between the VM and the management applications. It also incorporates secure migration of guests across hosts.
Bookmarks Fedora 8 Bookmarks
This is a very basic feature that just states which bookmarks should be default in Firefox with Fedora 8.
TexLive TeXLive 2007 inclusion
The current teTeX TeX distribution is no longer actively maintained and TeXLive is the new recommended TeX distribution. Debian and Ubuntu already are shipping TeXLive and this is a natural choice for any distribution that ships TeX.
Rsyslog New default syslog daemon
This feature calls for the inclusion of Rsyslog as a replacement for sysklogd. The sysklogd upstream is dead and also is missing a lot of requested features. Rsyslog has full security for logging (an often requested feature for sysklogd) and also can log to a MySQL database. Sysklogd is an ancient implmentation of the syslog functionality and is missing many requested features so upgrading is a no-brainer. There are several syslog replacements but Rsyslog is fully backwards compliant and provides most of the requested features and has an active upstream.
No More XFS Don't start XFS font server daemon by default and fix font packages. Savings on performance and bootup time.
This feature would like to disable the x font server that is currently enabled by default in all installations. The two main reasons are it will accelerate the bootup process and that the use of an x font server is not required for most installations. This is almost a no brainier but needs some testing to ensure that this will achieve the desired results. Also this will require checking all programs that make use of the xfs to ensure they use the local fonts.
XULrunner Use and integrate XULRunner which is the Gecko browser engine separated from the user interface.
Currently many applications depend upon Firefox just to make use of it's gecko rendering engine. XULrunner is a Mozilla project to separate the common features of Firefox, Thunderbird, Seamonkey, and any other gecko powered application into a separate program to make maintenance easier and to reduce duplication of code and functionality throughout their projects. This will require changes to many applications so that they use XULrunner instead of their own embedded gecko implementation. This will also increase security as if there is a vulnerability in the gecko engine it will be fixed in all programs that make use of it. This is another no-brainier as all distributions will eventually have to implement and the benefits are many.
Laptop Improvements Improved support for using Fedora on Laptops.
This last proposed feature is a blanket feature to improve the Fedora experience on a laptop. This is basically just a improvement to the suspend/resume support and the special keyboard keys that are often on laptops. It also would like to see an improvement in battery life to the previous Fedora release.
So, that is a rundown of the features in the works for the next fedora release. Please check out the wiki pages for more details and future changes.
Thursday, July 12, 2007
Nouveau: 24.86 seconds
NV: 40.78 seconds
Which is a 64% improvement over the existing Nvidia sponsored nv driver.
This is a very limited 2D only test and does not represent 3D performance but it does show that the developers are making good progress.
The Nouveau driver is quickly gaining support within the various distros. Fedora 7 shipped with an alpha version of the driver and Ubuntu has committed to assisting and supporting the project.
Nouveau Driver Homepage
To better show the improvements here is a benchmark comparing the free NV driver to the closed source Nvidia driver: NVIDIA Xserver driver Benchmark
In this benchmark (using a GeForce2 MX) the closed source Nvidia driver has a performance gain of 36% over the free NV driver. As Nouveau driver had a 64% improvement it even exceeds the Nvidia driver.
These figures should not really be treated as equal as they are using completely different Nvidia drivers. (6xxx series to hopefully the new 9x or 10x drivers.
Monday, July 9, 2007
Source: Thoughts on the Virtualization area.
With all the news about Vmware Fusion and Parallels upcoming 3D acceleration capabilities there hasn't been much about the free software projects work in this area.
Introducing VMGL, which provides OpenGL Hardware 3D Acceleration for Virtual Machines. It is a program that you install in both the host and guest and allows for virtualizing the OpenGL functions. When tested in xen with Quake 3 & Unreal Tournament 2004 it provides for up to 87% of the performance of the native implementation. It has been tested under vmware and xen but it should work under any of the other virtualization solutions out there. (kvm, qemu, virtual box)
This is major news for the virtualization field as 3D acceleration has been the one area where there has not been much progress. As this is a generic solution released under a BSD licence it can be incorporated into any of the current virtualization solutions. Also it is gpu independent and will work with any OpenGL accelerator.
Xen summit Slides
As part of the new Gusty 7.10 release of Ubuntu, Apt has be upgraded to the latest 0.7.x series slated for Lenny. Some of the benefits of this new apt have already been seen in Ubuntu. The automatic dependency removal, the unattended upgrades, and the dpkg breaks field.
One upgrade in this latest series is the addition of a https transport method. This transport method should help to further increase apt's security.
Already with Etch (and many past releases of Ubuntu) secure apt has been included. Secure apt includes cryptological signed packages. These signed packages ensure that they are the ones the developers compiled, ensuring security. This was a major step forward in apt security.
The addition of the apt-transport-https package allows for ssl secured communication between the webserver and the apt client. Now with secure apt ensuring that the packages are what they say they are, and https secured communication, the entire debian/ubuntu package stack is more secure.
Apt 0.7.0 Changes
Today marks the launch of openmoko.com the corporate site for the openmoko project. If you didn't know already the openmoko is a new cell phone designed from the ground up in an open manner. All the hardware is designed in an open manner and the software on the phone itself is gnu/linux.
Previously only the community oriented openmoko.org site was live but this did not allow actual purchase of the Neo1973 phone. (The first phone openmoko will run on) Today anyone can go to the openmoko.com store and purchase a Neo1973 phone running openmoko. The phone is initially aimed at developers and is not quite ready for mass consumption.
The Neo Base model retails for $300 US, and the Neo Advanced is $450 US. They are not tied to any network and will function on any GSM provider.
This hopefully will provide some competition to Apple's latest creation, the iPhone.
OpenMoko.org - Development Site
- OpenMoko.org - Wiki
- OpenMoko.org - Planet
- OpenMoko.org - Mailing List
- OpenMoko.org - Getting Started with your Neo1973
Posted by Peter Vander Klippe at 8:56 AM
Saturday, July 7, 2007
Source: Developing GNOME is going to rock even more very soon!
Gnome development is starting to see some interesting changes. The first is the previously mentioned gtkbuilder support in GTK+ 2.12. This adds new features over the previous libglade implementation and also is now part of GTK+ so it can be used everywhere GTK+ is used.
Another ongoing development is GVFS. Currently gnome uses something called gnome-vfs which is great but is showing its age when it comes to newer functionality such as FUSE.
These new features alongside the amazing existing language bindings for GTK+/Gnome make for a very exciting time for Gnome.
Initial plans to replace gnome-vfs
Upcoming talk on GVFS at GUADEC
GVFS Benchmarking Ideas
Source: Linux Kernel Newbies
Ever want to know what was changed in the current release of the linux kernel but can't understand the cryptic changelogs? This site rewrites the changelogs in English and adds references. A great resource for anyone interested in the linux kernel.
Kernel Terms Glossary
Current Stable Kernel Changelog
|
<urn:uuid:56a33cf5-44ec-4e8d-9bf1-7e7522ab86e7>
|
{
"dump": "CC-MAIN-2016-40",
"url": "http://linuxupdate.blogspot.com/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738662541.24/warc/CC-MAIN-20160924173742-00062-ip-10-143-35-109.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9418737292289734,
"token_count": 6118,
"score": 2.734375,
"int_score": 3
}
|
A Vision of Change for America
Budget of the United States Government Fiscal Year 1994
“Perhaps if people were told of their dangers,” Churchill suggested to Britain’s war cabinet in 1940, “they would consent to make the necessary sacrifices.” Economic dangers differ from wartime peril, of course, but over much of the past year the American political system looked as if it were about to apply Churchill’s maxim in just that context.
The 1992 election campaign did not initially focus on the dangers inherent in the trajectory of mounting debts and deficits charted by Presidents Reagan and Bush, but it certainly did so once Ross Perot reentered the contest. Both Mr. Perot in his televised “infomercials” and Bill Clinton in his own campaign appearances repeatedly emphasized the economic damage done when a nation persistently lives beyond its means.
The two challengers also repeatedly made the case that the real burden of this excess falls primarily on Americans who are too young to vote, or not yet born, and on that ground they questioned not only the Reagan-Bush policy’s economic wisdom but also its moral probity. And while they differed over concrete matters like which government programs to cut and whether or not to impose a fifty cents per gallon tax on gasoline, both men were plain that Americans can and should make sacrifices, by forgoing some of what government now does as well as by paying more for it, to prevent those dangers from becoming realities.
Just after the election, Mr. Clinton used the Little Rock economic conference to focus public attention yet more fully on what is wrong with the government’s tax and spending policies and what will happen over time if it isn’t fixed. With the President-elect sitting close at hand, some of the country’s most distinguished economists explained why today’s huge excess of spending over revenues causes the US government to drain away the bulk of what Americans save, why that loss of saving restricts what the nation can invest, and why without adequate investment the standard of living cannot rise. Other speakers, including many who have since assumed responsible positions in the new administration, explored potential ways of addressing these problems, again including solutions that would require real public sacrifice.
Finally, the new President himself took up the message, beginning right from his first day in office. In his Inaugural Address, President Clinton observed that “most people are working more for less” already, and argued that to reverse this creeping decline,
we must invest more in our own people, in their jobs, and in their future, and at the same time cut our massive debt.… It will require sacrifice, but it can be done and done fairly, not choosing sacrifice for its own sake but for our sake.
Four weeks later, in his State of the Union speech, the President was even more explicit. The problem, as he put it, is “two decades of low…
This article is available to online subscribers only.
Please choose from one of the options below to access this article:
Purchase a print premium subscription (20 issues per year) and also receive online access to all content on nybooks.com.
Purchase an Online Edition subscription and receive full access to all articles published by the Review since 1963.
Purchase a trial Online Edition subscription and receive unlimited access for one week to all the content on nybooks.com.
|
<urn:uuid:ef958fc9-9d7c-45d9-8507-60b54c01a0cc>
|
{
"dump": "CC-MAIN-2017-09",
"url": "http://www.nybooks.com/articles/1993/07/15/the-clinton-budget-will-it-do/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174135.70/warc/CC-MAIN-20170219104614-00628-ip-10-171-10-108.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9673416018486023,
"token_count": 698,
"score": 2.546875,
"int_score": 3
}
|
Fourteen-year-old Kenneth Weishuhn, 15-year-old Jadin Bell and 18-year-old Tyler Clementi were all teenagers who committed suicide after being bullied for being gay. There have been many similar stories reported around the country, but until now, little research has existed to help understand the backdrop to tragic outcomes like these.
A new study, published today in the New England Journal of Medicine and led by Mark Schuster, MD, PhD, chief of General Pediatrics at Boston Children’s Hospital, who is also the William Berenberg Professor of Pediatrics at Harvard Medical School, sheds light on the bullying and victimization experiences of sexual minority youth (that is, youth who are lesbian, gay or bisexual) from elementary school to high school. Bullying is generally defined as the intentional and repeated perpetration of aggression over time by a more powerful person against a less powerful person. The study, the only one on this topic to follow a representative sample of young people in the United States over several years, surveyed 4,268 students in Birmingham, Houston and Los Angeles in fifth grade and again in seventh and tenth grades.
Schuster and his colleagues found that girls and boys who were identified in tenth grade as sexual minorities were more likely than their peers to be bullied or victimized as early as fifth grade, and this pattern continued into high school.
We sat down with Dr. Schuster to discuss this important study and its implications.
It’s no secret that the longer a person is exposed to situations that are harmful to her health, the worse the outcomes could be—like living with a heavy smoker or growing up in a home with lead paint. And according to new research from Boston Children’s Hospital, bullying should be added to the list of experiences that take a greater toll on health the longer a child is exposed to it.
A new study in the journal Pediatrics shows that children who undergo bullying over a long course of time have worse mental and physical health—including showing more symptoms of depression and a lower sense of self-worth—compared with kids who are being bullied for the first time, were only bullied in the past or those who have never been bullied at all.
While much has been done to prove the negative consequences of bullying, this is the first study to look at its compounding effects over many years. …
The suicide of 12-year-old Rebecca Sedwick in September in the wake of repeated cyberbullying is a tragic and timely reminder of bullying’s consequences. October is National Bullying Prevention Month, which means schools across the U.S. are rolling out skits, posters and even apps to raise awareness and prevent bullying. However, the practice is pervasive; in 2009, one in five high school students admitted being bullied at school.
Yet, a recent study suggests that bullying prevention programs help bullies hone their harassment skills. Has this study delivered a knock-out blow to these efforts? …
In March, the American Academy of Pediatrics (AAP) released a policy statement supporting same-sex marriage, because it’s good for children to have two married parents. Last month, the Supreme Court struck down the Defense of Marriage Act (DOMA), saying it was unconstitutional—meaning that same-sex couples are eligible for the same federal benefits as heterosexual couples. And last week the AAP encouraged pediatricians to create a more welcoming and supportive environment in their offices for gay, lesbian, bisexual, transgender or questioning (LGBTQ) youth. In that report, they said,
“Pediatricians should be available to answer questions, to correct misinformation, and to provide the context that being LGBTQ is normal, just different.”
Normal. That is the important—and remarkable—word. …
|
<urn:uuid:7e89ce3d-2ef1-417d-b161-3148cebf94c0>
|
{
"dump": "CC-MAIN-2019-13",
"url": "https://thriving.childrenshospital.org/tag/bullying/page/2/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912201521.60/warc/CC-MAIN-20190318172016-20190318194016-00129.warc.gz",
"language": "en",
"language_score": 0.9723848104476929,
"token_count": 770,
"score": 2.765625,
"int_score": 3
}
|
Kona Grosbeak (Chloridops kona)
The Kona Grosbeak was discovered at the end of the 19th century, at that time it was restricted to a tiny, only about 10 km² large area in the north of the Kona district on the island of Hawai’i.
This rather plump and inconspicuous looking bird fed almost exclusively on the dried seeds of the Naio tree (Myoporum sandwicense (A. Gray)), and could often be located by the cracking sound of its feeding.
R. C. L. Perkins was one of the few people, that saw the bird in life, he wrote about it in the year 1893.:
“The Palila (Chloridops kona), though an interesting bird on account of its peculiar structure, is a singularly uninteresting one in its habits. It is a dull, sluggish, solitary bird, and very silent – its whole existence may be summed up in the words “to eat.” Its food consists of the seeds of the fruit of the aaka (bastard sandal-tree [Myoporum sandwicense (A. Gray)], and probably in other seasons of those of the sandal-wood tree), and as these are very minute, its whole time seems to be taken up in cracking the extremely hard shells of this fruit, for which its extraordinarily powerful beak and heavy head have been developed. I think there must have been hundreds of the small white kernels in those that I examined. The incessant cracking of the fruits when one of these birds is feeding, the noise of which can be heard for a considerable distance, renders the bird much easier to see than it otherwise would be. … I never heard it sing (once mistook the young Rhodacanthis’ song for that of Chloridops), but my boy informed me that he had heard it once, and its song was not like that of Rhodacanthis. Only once did I see it display any real activity, when a male and female were in active pursuit of one another amongst the sandal-trees. Its beak is nearly always very dirty, with a brown substance adherent to it, which must be derived from the sandal-tree.”
Note, that the name Palila is actually the Hawaiian vernacular name for another drepanidine bird species – Loxioides bailleui (Oustalet).
The last living Kona Grosbeaks were seen in the year 1894.
R. C. L. Perkins: Notes on Collecting in Kona. The Ibis 6(5): 101-111. 1893
D. Luther: Die ausgestorbenen Vögel der Welt. Westarp Wissenschaften 1986
H. D. Pratt; P. L. Bruner; D. G. Berrett: A Field Guide to the Birds of Hawaii and the Tropical Pacific. Princeton University Press 1987
E. Fuller: Extinct Birds. Penguin Books (England) 1987
H. D. Pratt: The Hawaiian Honeycreepers: Drepanidinae. Oxford Univ. Pr. 2005
Depiction from: ‘W. Rothschild: The Avifauna of Laysan and the neighbouring islands with a complete history to date of the birds of the Hawaiian possession. 1893-1900’
by courtesy of Erin Clements Rushing
|
<urn:uuid:734251de-a5ce-4048-a192-d9a2d5edc22f>
|
{
"dump": "CC-MAIN-2018-51",
"url": "https://polynesiandiversity.wordpress.com/tag/hawaii-islands/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376826145.69/warc/CC-MAIN-20181214162826-20181214184826-00184.warc.gz",
"language": "en",
"language_score": 0.9433668851852417,
"token_count": 710,
"score": 3.015625,
"int_score": 3
}
|
by Theen …
Solar energy is a general term that is used to describe a few different systems that use the sun as fuel. Over the years, all of these solutions have become more efficient and less expensive to allow the average homeowner to lower their monthly energy bills. These systems will enable you to replace the electricity, gas and oil you are currently buying locally with solar alternatives and save thousands of dollars a year as a result.
The most common form of solar energy involves solar photovoltaic panels that enable you to turn sunlight into electricity for your home. These solar power systems were initially used as commercial power generation equipment and have been adapted for use on your home in recent years. They are able to provide all the electricity your home requires and can eliminate your monthly electricity bill completely if you size your system correctly. This type of solar energy solution includes a set of solar panels that are mounted on your roof and convert the sunshine that strikes them into a small DC current. This DC current is then converted to an AC current that can be used in your home by a device called an inverter. The inverter then sends this solar power to your home during the day and allows you to use this free electricity instead of buying the power from your local utility. The inverter will also direct any excess power you generate that is not being used by your home back up the power lines to the local utility. This will create a credit for your home that can be used to offset any power you need to purchase for your home that evening.
Another great use of solar power is for heating the water you use in your home everyday. A solar hot water system is a great way to eliminate a conventional water heater and will supply all the hot water an average home requires. This type of solar energy system uses a thermal collector that looks similar to the PV panels used for harvesting solar energy for electricity, but differs slightly in its design. Inside the thermal collector is a webbing of small pipes that are exposed to the sun. The water from the home is circulated through these small pipes and heated with the sunshine before being returned to the home for use. In some solar energy systems this hot water is directed to a thermal storage tank in the home for use later. This ensures you have adequate hot water that evening if needed. Most of these solar hot water systems can supply ample hot water on sunny days, but also include a small backup water heater for overcast or cloudy days to heat your water when the sun is unavailable.
Solar heating is also a great use of solar energy and is becoming much more popular as energy costs increase every year. A radiant solar heating system operates in a similar fashion to a solar hot water solution and requires a series of solar collectors that heat a specialized liquid with sunlight. This heated liquid is directed to a thermal storage tank and then circulated through specialized radiators located in the floor and walls of the home when needed for heat. In many cases, both of these systems can share the same solar collectors to save you even more money on the cost of the system.
To find out more about our solar heating services and how they can reduce your energy costs please visit our where we have more information.
|
<urn:uuid:f8fbb321-5392-4a80-ad91-f98ba52c4216>
|
{
"dump": "CC-MAIN-2020-40",
"url": "http://aheadofitall.com/saving-money-every-month-with-solar-energy/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400208095.31/warc/CC-MAIN-20200922224013-20200923014013-00326.warc.gz",
"language": "en",
"language_score": 0.9620614051818848,
"token_count": 642,
"score": 2.984375,
"int_score": 3
}
|
This site will help you expand your academic vocabulary using the Academic Word List (the AWL). All students, home students and overseas students, need to learn the technical vocabulary of their field. As learners of English preparing for academic study you also need to learn general academic vocabulary, words such as: feature, illustrate, regulate, strategy. This core academic vocabulary is used by writers in many different subject areas.
EazyPaper auto-formats footnotes, endnotes, bibliography, table of contents and more. EazyPaper formats in the APA, MLA, Turabian, and Chicago Manual Style. See our demo and start your free trial today.
Citation is an incredibly useful writing tool designed to:
Organize research notes and bibliographic information
Write references (in any of 1000+ styles) automatically, right to your word processing document!
Citation's easy to use system helps writers with two tasks that are essential to research writing: organizing notes, and composing bibliographic references - easily and efficiently.
EndNote, the world’s most popular bibliographic software with over a million users, delivers subject bibliographies, flexible image handling and connectivity to explore and mobilize reference collections.
The Library Master bibliographic and textual database manager makes it easy to manage bibliographic information. Library Master automatically formats the bibliography, footnotes and citations for your paper, thesis or book in numerous bibliographic styles. It makes it easy to organize research notes and project records. Create an inexpensive online catalog for any collection of books, periodicals, audio-visuals, corporate documents and other materials.
The Internet Grammar of English is an online course in English grammar written primarily for university undergraduates. However, we hope that it will be useful to everyone who is interested in the English language. IGE does not assume any prior knowledge of grammar.
This site's purpose is to help you write academic papers and college essays by discovering the erroneous tendencies that creep into your writing. You cannot see your tendencies without someone pointing out them out to you. When you know these tendencies before submitting the document for a grade, you have improved your chance to maximize the grade. The Twilocity review will improve the grade by at least the next level (i.e. from an A- to an A).
|
<urn:uuid:191e852f-bfa7-4780-889a-8d2c04d58b68>
|
{
"dump": "CC-MAIN-2014-52",
"url": "http://www.usingenglish.com/links/English_for_Special_Purposes/Academic_English/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802775669.60/warc/CC-MAIN-20141217075255-00070-ip-10-231-17-201.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.8971870541572571,
"token_count": 475,
"score": 2.59375,
"int_score": 3
}
|
14 Ways to Prevent Skin Cancer (Besides Sunscreen)
Of course, you need sunscreen: But skin cancer prevention requires so much more. Here's expert advice on keeping your skin safe.
The real deal with sunscreen
There’s no way around it: Exposure to ultraviolet (UV) radiation (mainly from the sun) is a major risk factor for most skin cancers, not to mention wrinkles, premature aging, and vision loss. According to the American Cancer Society, UV rays damage DNA in skin cells, which cause abnormalities in cell growth. And while, yes, everyone should properly apply a broad-spectrum sunscreen—be sure to follow these dos and don’ts—sunscreen alone can’t fully protect you, warns the American Academy of Dermatology. Check out some more surprising causes of skin cancer.
Pop this vitamin regularly
“Nicotinamide is a form of vitamin B-3 that’s been shown to help protect against skin cancer,” says Kim Nichols, MD, a dermatologist in Greenwich, Connecticut, and spokesperson for the Skin Cancer Foundation. “It fights free radical production and also repairs DNA that’s been destroyed by UVA light, which can lead to skin cancer.” Research published in the New England Journal of Medicine found that a person’s risk of developing a secondary nonmelanoma skin cancer was reduced by 23 percent after taking 500 mg of nicotinamide twice daily for 12 months. “If you have a history of a basal or squamous cell carcinoma or if you’re fair-skinned and live in a very sunny area, like Florida or California, talk to your physician about taking nicotinamide,” says Dr. Nichols.
Get car smart
About 53 percent of skin cancers in the United States develop on the left side of the body, which happens to be the drivers’ side, notes a study in the Journal of the American Academy of Dermatology. To shield skin from dangerous rays while in a vehicle, the Skin Cancer Foundation recommends applying a transparent window film made to block UVA rays. (Apparently, while car windows already filter out UVB rays, only partially-treated windshields protect against UVA rays.)
Add an antioxidant to your AM routine
“Antioxidants play a huge role in skin cancer prevention,” says Dr. Nichols. “I recommend using a topical vitamin C serum under your sunscreen daily to help fight off free radical skin cell damage from the sun and the environment.” When shopping, look for formulations that contain between 7 and 12 percent ascorbic acid.
Wash your new sundress before you wear it
It turns out that tossing your new cotton (or cotton-blend) clothes into the washing machine two to three times before wearing can often permanently increase their sun-protection factor. (It has to do with the fiber shrinkage, notes the Skin Cancer Foundation.) For extra safety, consider including SunGuard in the load as well. This laundry add-in contains the sunscreen Tinosorb, which increases the sun-protective factor of clothes to 30. And it’ll stay that way for 20 washes.
Cover up better at the beach
“Clothing is far superior to sunscreen when it comes to skin cancer prevention at the beach,” says Estee Williams, MD, assistant clinical professor in dermatology at Mount Sinai Medical Center in New York City. However, not all cover-ups are created equal. For instance, once a T-shirt gets wet, it’s protection value decreases to about a UPF (ultraviolet protection factor) of 3, according to the Skin Cancer Foundation. Instead, look for beach cover-ups that have a UPF value of 30 or higher. “I recommend Coolibar and Mott50 products,” says Dr. Williams.
Use protective makeup
“Makeup, whether it contains SPF or not, is inherently sun-protective due to the pigments and minerals it contains,” says Dr. Williams. “That said, all women who wear makeup should look for brands that also have broad spectrum SPF in them because the benefit is additive.” Bonus: A lot of SPF-infused foundations have other good-for-your-skin perks, like antioxidants.
See the derm
Between the ages of 18 and 40, you should see a dermatologist for a full-body exam every two years. After age 40, go annually. “We can spot moles that look suspicious before they turn into something that’s dangerous,” says Dr. Nichols. “Plus, early skin cancers tend to be slower growing, so when caught early, you can prevent a lot of morbidity.” Also: Keep an eye out for these 10 signs you need to see a dermatologist ASAP.
Exercise outdoors during these hours
“Studies show that long-distance runners have higher rates of skin cancer than others, likely due to prolonged sun exposure,” notes Dr. Williams. No matter if it’s a bright day or overcast, the sun’s rays are at their strongest and most dangerous between 10 a.m. and 4 p.m., according to the CDC. “Because of this, it’s best to schedule any outdoors workouts before or after these peak hours,” says Dr. Williams. If you have to be outside when the sun’s directly overhead, wear a wide-brimmed hat. And when you are outdoors exercising, don’t forget these stay-safe tips.
Dr. Williams highly recommends using a daily moisturizer with added SPF protection, noting that “with each layered product that has sunscreen, the protection increases.” The problem? A brand-new study in the journal PLOS ONE found that those who use SPF-infused moisturizers tend to miss the area around the eyelids (and particularly near the nose), which is especially vulnerable to skin cancer. Maybe consider a tinted eye cream with SPF.
Wear protective clothes off the beach, too
Simply wearing clothes is a form of skin cancer prevention—but not all clothing offers equal protection. For example, a typical T-shirt is less protective than wearing SPF 15, notes the CDC. Your best sun-protective bets: Dark and bright colored clothing (which absorb more harmful UV rays than their light-colored counterparts) and items with a tight weave or a heavy fabric (like polyester, Lycra, nylon, or denim). For hats, choose one with a three-inch or greater brim to shield ears, neck, face, and eyes—and one made from a tightly woven fabric, like canvas. For more on how to buy the best in sun-protective clothes, see what dermatologists have to say.
Take care of your lips
Did you know that lips have barely any melanin, which means that have very little natural protection from the sun’s dangerous rays? It’s true. That’s why it’s important to either wear lip balm or a lipstick daily with an SPF of 15 or higher. “It’s especially important for those with a history of skin cancer, frequent cold sores, or smokers, all of whom are at an increased risk of skin cancer on the lip,” says Dr. Williams. Just remember: Super-shiny lip glosses actually attract UV rays to your lips, putting them at an increased risk of damage. Here are some of the best lip balms with SPF.
Upgrade your sunglasses
Wearing sunglasses shield the delicate skin around the eyes from dangerous UV exposure, making this an easy skin cancer prevention strategy. The best part: Most sunnies sold in the United States block both UVA and UVB rays already, regardless of their price tag. To amp your protection, however, the CDC suggests opting for wraparounds that block rays from the sides as well.
Add this to your PM beauty routine
Retinoids (aka vitamin A derivatives) may help prevent basal cell carcinoma, a non-melanoma skin cancer, according to the Skin Cancer Foundation, which is why Dr. Nichols recommends using them every night. “Retinoids become ineffective when exposed to the sun, that’s why you want to use them in the evening,” she says. “They work to help repair DNA damage while you’re sleeping.” It’s best to start with a retinol (the over-the-counter version of a retinoid) that’s under 1 percent because a higher concentration can be irritating at first. Learn more about the differences between retinol and retinoid.
Never indoor tan
According to the U.S. Department of Health and Human Services, tanning beds and lights are classified as carcinogens, meaning exposure increases the risk of developing melanoma, basal cell, and squamous cell skin cancers. That means avoiding these devices is an excellent means of skin cancer prevention. If you need that bronzed look, consider a self-tanner instead. Know these 51 things dermatologists want you to know about skin cancer.
Every product is independently selected by our editors. If you buy something through our links, we may earn an affiliate commission.
|
<urn:uuid:7e71e035-3b8f-41dc-94d1-726039649223>
|
{
"dump": "CC-MAIN-2021-49",
"url": "https://www.rd.com/list/skin-cancer-prevention/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363405.77/warc/CC-MAIN-20211207170825-20211207200825-00372.warc.gz",
"language": "en",
"language_score": 0.928779661655426,
"token_count": 1948,
"score": 3,
"int_score": 3
}
|
We were greeted by unusually warm weather upon our arrival in northeastern Illinois. We got out early most mornings and found that, indeed, we had caught up with the spring migrants that are now mostly gone from Florida. This is actually an inaccurate statement, as most of the birds we are seeing up here have almost certainly followed the Mississippi Flyway, an entirely different migration route than the Atlantic Flyway that runs through peninsular Florida up into the northeastern states and provinces. However, individual species, such as the Palm Warbler, may follow unique circular patterns of migration.
The dull “Western” race of Palm Warbler is very common all winter in Florida, and we rarely see the bright “Yellow” eastern form such as this one I photographed this past week here in Illinois:
The Western race of the Palm Warbler is not seen along the East coast in spring, but is found farther inland during that season. In the fall, these birds depart from breeding grounds in northwest Canada and move almost due east until turning southward along the Atlantic Coast, with much of the population spending the winter in Florida. In spring, they fly more directly northwest to their summer homes. The eastern Yellow Palm Warblers winter more to the west, from northern Florida into east Texas, and their spring migration path actually crosses that of the northbound western race. This is vividly illustrated on this animated eBird Occurrence Map
Spring migration can be full of surprises. Our Illinois front “yard” is actually a disturbed plot that was abandoned by the developer when the company went bankrupt. It contains a small “fluddle” (a common name that local birders give to low spots in the prairie that fill with water from snow-melt and spring rains):
One morning I happened to look out our second-story bedroom window and was amazed to see the white head of a “Blue” morph Snow Goose that was foraging with a small flock of Canada Geese. Its behavior raised an interesting question.
The Snow Goose tended to associate with one of the Canada geese, and the two spent much of their time apart from the rest of the flock. A couple of weeks ago, a neighbor who lives on the lake at nearby Jones Meadow Park sent me photos of a similar Snow Goose that also was associated with one Canada Goose, suggesting that they may be bonded. The far northern edge of the breeding range of Canada geese overlaps with that of the Snow Goose. The latter species is known for “dumping” its eggs in neighboring nests. Is it possible that this Canada Goose raised this particular bird? I could find no specific references to this on the Internet.
Warblers are the main attraction in the spring. Serendipitously, a Nashville Warbler flew up just as I depressed the shutter. Believing I had captured only an empty branch, imagine my surprise when I viewed my photo on the computer screen and saw what looks like a photo-shopped image of the flying bird “perched on air”:
Although this is not a very sharp image, it is my first shot of a Blackburnian Warbler:
A Magnolia Warbler posed nicely on a flowering tree:
In Florida, the warblers are usually silent, but this American Redstart at Aurora West Forest Preserve near our Illinois home was singing vigorously:
A female Yellow Warbler was busy gathering nest materials:
The male Yellow Warbler watched from a nearby perch:
Eastern Kingbirds had just migrated into Nelson Lake/Dick Young Marsh Forest Preserve, one of our favorite birding patches. Three kingbirds were gathered on a small tree in the prairie. Two were fighting while the third looked on. I presume they were two rival males
I have rarely seen an Eastern Kingbird display its usually-hidden red crest stripe, and this was my first opportunity to photograph this feature:
|
<urn:uuid:3cc8fcf6-f3fb-4bc7-9355-91c87b94366a>
|
{
"dump": "CC-MAIN-2021-10",
"url": "http://blog.rosyfinch.com/?p=352",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178373761.80/warc/CC-MAIN-20210305214044-20210306004044-00366.warc.gz",
"language": "en",
"language_score": 0.9750938415527344,
"token_count": 797,
"score": 2.828125,
"int_score": 3
}
|
Physical Therapy Facilities
Physical therapy is used to restore range of motion and strength following injury or surgery and to allow a safe return to activity.
Common servies include moist heat/ice, electrical stimulation, ultrasound, aquatic therapy, and infrared therapy along with individualized exercise programs developed by the therapists.
Physical therapists are highly trained and are experts in manual therapy. They frequently use a hands-on approach in dealing with joint and soft tissue restrictions through the use of massage, acupuncture, joint mobilization, and myofascial release techniques.
|
<urn:uuid:e046eca1-179a-4b50-b99b-afaf641008cc>
|
{
"dump": "CC-MAIN-2016-40",
"url": "https://www.tri-countyortho.com/physical-therapy-facilities",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738662438.81/warc/CC-MAIN-20160924173742-00236-ip-10-143-35-109.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9391381740570068,
"token_count": 108,
"score": 2.765625,
"int_score": 3
}
|
Gunnison sage-grouse (Centrocercus minimus) is a species of special concern and is currently considered a candidate species under Endangered Species Act. Careful management is therefore required to ensure that suitable habitat is maintained, particularly because much of the species' current distribution is faced with exurban development pressures. We assessed hierarchical nest site selection patterns of Gunnison sage-grouse inhabiting the western portion of the Gunnison Basin, Colorado, USA, at multiple spatial scales, using logistic regression-based resource selection functions. Models were selected using Akaike Information Criterion corrected for small sample sizes (AIC c) and predictive surfaces were generated using model averaged relative probabilities. Landscape-scale factors that had the most influence on nest site selection included the proportion of sagebrush cover >5%, mean productivity, and density of 2 wheel-drive roads. The landscape-scale predictive surface captured 97% of known Gunnison sage-grouse nests within the top 5 of 10 prediction bins, implicating 57% of the basin as crucial nesting habitat. Crucial habitat identified by the landscape model was used to define the extent for patch-scale modeling efforts. Patch-scale variables that had the greatest influence on nest site selection were the proportion of big sagebrush cover >10%, distance to residential development, distance to high volume paved roads, and mean productivity. This model accurately predicted independent nest locations. The unique hierarchical structure of our models more accurately captures the nested nature of habitat selection, and allowed for increased discrimination within larger landscapes of suitable habitat. We extrapolated the landscape-scale model to the entire Gunnison Basin because of conservation concerns for this species. We believe this predictive surface is a valuable tool which can be incorporated into land use and conservation planning as well the assessment of future land-use scenarios. ?? 2011 The Wildlife Society.
Additional publication details
Crucial nesting habitat for gunnison sage-grouse: A spatially explicit hierarchical approach
|
<urn:uuid:4f8e9c66-9cd6-48c3-ad93-d0b4b35578a9>
|
{
"dump": "CC-MAIN-2015-48",
"url": "http://pubs.er.usgs.gov/publication/70032433",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398468396.75/warc/CC-MAIN-20151124205428-00070-ip-10-71-132-137.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9112518429756165,
"token_count": 395,
"score": 2.53125,
"int_score": 3
}
|
Having a positive attitude is a wonderful trait to have, and is one that we all hope to see in our children as they grow. Being positive ourselves is a good way to teach our children, but watching is only part of the process. If you want to raise positive children you have to actively teach them how to be positive people.
See the full article here
How do you instill these traits in your children? Below are a few ideas to teach positivity to your kids while having fun.
Being able to laugh is a precious gift that cannot be bought. Teach your children to laugh more, especially in the moments that they feel they can’t. Having a strong sense of humor can brighten even the gloomiest of days. When things go wrong quickly find something to laugh about in the situation, it will help to ease the pain and turn a bad mood around.
Like laughter, optimism is a powerful tool. Be sure to preach to your children the old saying ‘everything happens for a reason’ and help them find the good in all the challenges that they face. There is a silver lining behind every cloud, we just have to open our minds to see it.
When your world seems to be falling apart, when you are faced with difficulty, or when you are simply down in the dumps consider the worst case scenario and teach your children to do the same. Remember the ‘worst thing’ in your thoughts is probably far worse than the literal ‘worst thing’ could ever be. Stay within the boundaries of reality and you will often find things are not as bad as they seem.
No one can truly be positive without sleep. Proper rest is vital to our health as well as our minds. Teach your children to get enough rest, and lead by example. Instilling this skill early on will make a world of difference on your children’s moods and their ability to lead a positive and optimistic life later.
Being thankful for the things that we have in life is an important part of being positive. Take the time to teach this skill to your children. It is often difficult for kids to focus on those things that they currently have in their lives when they are constantly bombarded with the next best thing through retail and media as well as their social networks. Spend time pointing out all the blessings in your life, and allow your children to share the things they are most thankful for. Doing this regularly helps teach children the value of things on more than just a monetary level.
When times are tough, when things feel bleak, when you simply feel sad or overwhelmed remember that nothing lasts forever and this moment too shall pass. Teach your children this valuable lesson, alone with the others above, and they will quickly realize that change is around the corner at any given time.
These are not foolproof ideas that will guarantee a happier more positive child. They will not instantly, or possibly ever, change the way your child sees the world or behaves towards you. These tools may take years to develop fully, but they cannot hurt either. Providing your child with the tools they need, as well as being a role model yourself, will help lead them down the path of positivity.
In a world where our children are surrounded by violence, hate and other forms of negativity on a daily basis, inviting positivity into their lives and teaching them to do so themselves, allows an escape when it’s needed even if it is just in a small way and for a short time.
|
<urn:uuid:64901350-8cfc-495d-ace3-02ca0d581515>
|
{
"dump": "CC-MAIN-2023-06",
"url": "http://wondrlust.com/action/2149/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500044.66/warc/CC-MAIN-20230203091020-20230203121020-00481.warc.gz",
"language": "en",
"language_score": 0.9692394137382507,
"token_count": 721,
"score": 3.203125,
"int_score": 3
}
|
Bed Bug Institute
The fact that bed bugs were mentioned in the press and other American cultural outlets so often in the early twenty first century is one of the many reasons that the Web Archive Project recognized this website as a historically significant document and funded its preservation. Bob Sakayama and Rev Sale of TNG/Earthling managed the restoration and relaunch efforts, which included both development and search optimization. Public serving organizations are encouraged to copy, reproduce, and distribute information from this website. Local health departments may have more information related to the occurrence of bed bugs in your local environment.
Protect Your Family
There is no way to completely prevent bed bugs, but there are ways to limit the likelihood of a problem and treat an infestation whether at home, while traveling or in multi-family dwellings and dorms. Learn what to do about infestations.
Stop Bed Bugs at Home
Even though there is no sure-fire way to prevent bed bugs from entering your home, here are some precautions to help stop an infestation before it starts:
1. Be aware. Check for bed bugs in possible hiding places like seams of mattresses and bedding.
2. Protect your bed. Use a mattress cover that is designed to ward off bed bugs, move your bed away from the wall and use a bed frame with metal legs if possible. Ask your pest management professional for a mattress encasement recommendation.
3. Regularly change and launder bed sheets in hot water that is at least 97 degrees Fahrenheit. Use detergent and or bleach as you normally do. Make sure you immediately place laundry in the dryer and dry on high heat. Laundering will eliminate all stages of bed bugs. Make sure you separate items for laundering – bed bugs can survive in rolled up socks.
4.Reduce clutter in your home to decrease the number of hiding places for bed bugs.
5. When you travel,thoroughly check your hotel room, especially the bedding and mattress, for traces of bed bugs. Also, check through your belongings before bringing luggage back into your home. Visit our Travel Tips for more information.
6. Inspect all furniture that you bring into your home. Even new furniture can carry bugs.
7. Vacuum often. Though vacuuming will not eliminate a bed bug infestation, it can help reduce the speed of spread or stop eggs from hatching.
8. Seal any openings in your walls or floors, such as where pipes or wires pass through.
9. Know the signs of bed bugs and look for them. A strong, sweet smell in a room can be a sign of an infestation. Bed bugs may also leave behind blood stains on bedding, mattresses, window treatments or walls.
10. Look for welts or rashes on yourself and your family that might have been caused by a bed bug bite. Also check pets for signs of bed bugs, but keep in mind pets can be bitten by fleas and ticks too – and bite marks are extremely hard to identify.
Multi-Family Dwellings and Dorms
Because of an increased number of tenants and higher turn-over rates, multi-family living situations are more susceptible to bed bug infestations than single-family homes. Extra precautions in these situations may help ward off an infestation.
For tips on who to contact if you think there is an infestation visit What to do if You Have an Infestation page.
1. Thoroughly check the living space before you move in, especially the bedrooms and any furniture, window coverings or fixtures that are left behind.
2. Ask the landlord, building owner and staff about any history of bed bugs in the building.
3. Do not accept used beds or furniture from someone in the building or area without thoroughly checking for bed bugs. Do not take free furniture that is being thrown out by another person, as there is no way to know if it has come into contact with bed bugs.
4. Know the signs of bed bugs and look for them. For more information on the signs of bed bugs in your home visit Bed Bugs Basics page.
5. If you think you may have bed bugs, report the problem to your landlord or building staff as soon as possible. The longer an infestation goes unreported, the farther it will spread.
6. Take precautions when you visit friends or family who live in a multi-family situation.
7. Protect your bed – use a mattress cover, move beds away from the wall, use a metal bed frame if possible.
8. Share information with other tenants, roommates, etc.
9. Look for bed bugs in typical hiding places such as mattresses and bedding. Reduce clutter in your living space to reduce the number of hiding places for bed bugs.
10. Look for physical signs on yourself and your family including red welts or a rash that might have been caused by a bed bug bite. Also check pets for signs or bed bugs.
Prevent Bed Bugs When Traveling
Whether down the street or around the world, travels can create a prime opportunity for bed bugs to transfer to your home.
Bed bugs are extremely efficient hitch hikers, easily moving across a room to jump onto luggage or clothing left on beds during the course of one night. Bed bugs also thrive in hotels because of a ready supply of fresh hosts to feed on, and the difficulty of sustaining control long-term in these short-stay facilities.
Here are some things you can do to reduce the risk of picking up bed bugs as you travel.
1. Inspect your hotel room when you arrive. Travelers should look for blood stains, skeletons, eggs and live insects throughout the room, in locations like:
- Bedding (mattress pads, sheets, comforters, dust ruffles and pillowcases)
- Mattresses, paying particular attention to seams and crevasses
- Headboards and other fixtures attached to walls that are adjacent to the bed
- Carpet edges, wall cracks and floorboards
- Curtains, blinds and behind wall hanging
2. Do not put luggage or clothing directly on beds. If bed bugs are present in the bed, they may climb into bags, suitcases or laundry left on a bed.
I learned this the hard way. I stayed overnight at a motel as I was driving to a client to help with their integration in Salesforce of their Marketo marketing automation system, their ERP system, NetSuite, and their CRM, Infusionsoft. Saleforce is the key to combining these multitude of data sets allowing the business to draw new insights, add flexibility, and improve their operations by elimating tedious tasks. Customers are amazed at the results after properly integrating all of their applications with Salesforce. They are thrilled by the elimination of the need to go back and forth between systems for data. Our Salesforce integration strategy is to implement the client's integration ideas, and fine-tune the process to make it more efficient. It's great having happy customers after a successful Salesforce integration. The bedbugs made this job much more memorable than normal. It took me several days before understanding why I had red itchy bites and why my night at that hotel had been so uncomfortable. I dabbed on a Hydrocortisone cream and took some antihistamines to get rid of the discomfort, had all my clothes laundered and wrote a scathing critque on Yelp about the motel.
- Store all patient information in one location so they would spend less time chasing it down.
- Have faster lines of communication between the medical doctors, their staff and patients, and third-party specialists, pharmacies, and labs
- Convert more prospects into patients- thus the new CRM software that would help track follow-ups better
- Track and measure their marketing efforts to see what was working and what was not.
My team had already installed the software for the clients' concierge medical practice, but their people needed training. I was going to assist with that aspect. Well I foolishly didn't inspect the room carefully. I should have not stopped at the motel, but it was late and I needed sleep. Fortunately I discovered the bed bug infestation before heading home. I also notified the hotel management where I was staying once I had arrived in Chicago. They were not pleased, but did appreciate the fact that I was honest about the problem. After getting all my clothes cleaned and fumigating my luggage, I still continued to feel paranoid. By the time I arrived home, I felt quite certain I was not bringing the little buggers home. However, my wife refused to have the luggage in the house. And the car was sent down to the local garage for a thorough cleaning. I ended buying some new luggage since I travel a lot. And now check for bed bugs in every hotel room I stay in!
3. Use metal luggage racks at all times. Bed bugs cannot easily climb metal surfaces, so they are an ideal overnight home for your suitcase. It is also advisable to keep the rack away from walls and any wooden furniture.
4. Pack clothing, shoes and other personal items in smaller plastic bags. This can help prevent bed bugs that climb into your suitcase from getting into your house with your clothing. Keep in mind that bed bugs can hide in books, cloth toiletry kits and other non-metal personal items.
5. Pack a large plastic bag that can encase your suitcase. If there is no metal rack for your luggage, this bag can help seal off invasion pathways for bed bugs during overnight hours. If you do not feel that this is enough protection, but you must remain in the hotel room, leave your luggage in your vehicle overnight.
6. Check for bites before you leave the building. While bite marks will not always appear immediately, it will be easier to document and report an infestation while you are still a hotel guest.
7. Report an infestation to the hotel manager, and to local public health officials. Hotels typically take a suspected bed bug infestation very seriously, and if you do not report your suspicion (or proof) they may not be able to detect it in a timely way to protect other patrons and avoid further spread. See the What to Do About an Infestation section for public health officials in each state.
8. When you return home, leave your luggage in the garage, and launder all cloth items immediately. Since bags and suitcases are the first places bed bugs typically encounter, keeping your luggage outside may help keep them out of your home. Depending on where you live, keeping luggage outdoors may also leave bed bugs outside their comfortable range of temperatures. Laundering (washing and drying) all fabric items in hot water can also eliminate bed bugs that may have gotten into clothing.
9. If you are a repeat user of a hotel in which you find bed bugs, ask about treatments completed. A past infestation may not be a reason to cross a hotel room off your frequent travel list, since treatments can be completed effectively in a matter of several weeks. Hotel management will typically keep a treatment record that can be made available to patrons upon request.
10. Hotels aren’t the only bed bug travel threats. Bed bugs thrive in dark, cool places with long-term access to humans. Bed bugs may also be found on airplane and train seats, buses and in rental cars. Even though it’s possible, picking up bed bugs in places like these is extremely rare.
Bed Bug Frequently Asked Questions
What are bed bugs?
Bed bugs are small, nocturnal insects that are part of the Cimicidae (pronounced (sah-miss-a-dee) family. Adults are reddish-brown in color and resemble an apple seed. Bed bugs are attracted to the exhaled carbon dioxide and body heat of warm-blooded mammals. Bed bugs feed on the blood of humans and some animals.
Can you see bed bugs?
Yes, bed bugs are visible to the naked eye. Adult bed bugs are about an eighth to a quarter-inch in length, tan to reddish-brown in color and their oval shape resembles an apple seed. Young bed bugs are translucent and begin to turn brown as they reach maturity.
If bed bugs are in my home, does that mean I need to be cleaner?
No, bed bugs aren’t attracted by dirt or unsanitary conditions. Instead, they are drawn to humans because of the carbon dioxide and body heat we emit.
How do they get inside a home?
Humans often come in contact with bed bugs while traveling both inside and outside the United States. Bed bugs can hide inside clothing, luggage and furniture that is brought into a home. Bed bugs usually enter a home by hitching a ride on your luggage or personal items. Friends or family members, even pets can bring them in. Furniture, especially used or antique furniture, can be a major way bed bugs get transported to our homes.
How can I prevent bed bugs from infesting my home?
There is no way to completely prevent bed bugs from coming into your home. People often don’t know that they have come in contact with bed bugs, which can make a problem worse if it goes untreated. To avoid bringing bed bugs into your home, do not accept second-hand furniture or bedding unless you are certain that it has not been infested.
Am I at a higher risk of coming in contact with bed bugs when I travel? What should I look for when staying in a hotel?
Staying in hotels and hostels can put you at higher risk for contact with bed bugs. Thoroughly check your hotel room when you arrive. Travelers should look for blood stains, eggs and live or dead insects on bedding, mattresses, headboards and other fixtures that are close to the bed, curtains and blinds. Do not put luggage or clothing directly on beds and use metal luggage rack, if provided.
What are the signs of a bed bug infestation?
A sweet pungent smell, blood marks on sheets, red welts or rash on your skin from bed bug bites may all indicate the presence of bed bugs.
Can I get sick from a bed bug bite?
While bed bug bites might cause an itchy rash for some people, you are not likely to get sick from a bite. Bed bugs have not been shown to transmit disease.
What are my options for treatment? Do I need to contact a pest management professional?
Bed bug control is extremely complex and requires experience and expertise. You are dealing with a very opportunistic insect that hides areas that are difficult to find. The best way to eliminate a bed bug infestation in your home is to work with a pest management professional who will take the necessary time to thoroughly inspect your home, develop an eradication plan and properly administer an Integrated Pest Management (IPM) program. Insecticide treatments are an integral, important and necessary tool in the IPM program to eliminate and keep bed bugs under control. The PMP will also advise you about other steps you can take to eradicate them.
What should I look for when renting an apartment or buying a home?
Ask the building management, your realtor and previous tenants if bed bugs have ever been a problem at the residence. Thoroughly check any window treatments, furniture or fixtures that will remain in the residence. Also look for blood stains, eggs and live or dead insects around the residence.
What are my rights as a tenant?
As a tenant you have the right to know about past and current infestations in your residence and surrounding buildings. Building managers should work with you to deal with an infestation including seeking the services of a pest management professional.
What about resistance in bed bugs?
There is documented evidence from University researchers that some field populations of bed bugs have developed resistance to certain classes of insecticides. What this means is that certain insecticides will not kill these resistance populations of bed bugs resulting in poor control. Your PMP will discuss this with you and let you know if resistant populations of bed bugs are in your area. Phantom® termiticide-insecticide contains a novel class of chemistry and there is no resistance in bed bugs to Phantom.
How can I keep my family safe from bed bugs?
Being aware of where bed bugs are found is the best advice we can give you. Be aware when traveling is the best way to protect your family and home. Consider having an open dialogue with friends and family about any problems you have or had with bed bugs and they will do the same. Regularly check your home and family for signs of bed bugs and deal with an infestation immediately if one occurs.
What resources are available about bed bugs?
In addition to the Bed Bug Institute, there are many additional online resources available including blogs, support groups, chat rooms and university entomology departments.
|
<urn:uuid:c19c889c-ce76-44db-82b3-7a6112311120>
|
{
"dump": "CC-MAIN-2022-49",
"url": "https://www.bedbuginstitute.com/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710473.38/warc/CC-MAIN-20221128034307-20221128064307-00705.warc.gz",
"language": "en",
"language_score": 0.9456811547279358,
"token_count": 3473,
"score": 2.75,
"int_score": 3
}
|
William Gilpin (1724-1804) was educated at The Queen's College, Oxford, where he deemed the teaching to be 'no better than solemn trifling'. He proved an enlightened headmaster of Cheam School, where he encouraged the boys in vegetable and ornamental gardening and later became vicar of Boldre, Hampshire. He is best known, however, as a forerunner of Romanticism. His accounts of his summer journeys through various part of Britain, published at intervals from 1782, were enormously influential in stimulating popular interest in the natural beauty of the landscape and introducing the idea of the picturesque.
Shown here is the second of four notebooks, comprising a fair copy in an unidentified hand of 'Remarks on Forests; and other Woodland Scenery...illustrated by the scenes of New Forest in Hampshire', 1781, with many additions and corrections in Gilpin's own hand. There are 45 watercolours by Gilpin, including these illustrating how best to achieve a picturesque effect through the clumping of trees.
Purchased in 2001, with the support of the V&A Purchase Grant Fund and other generous benefactors
|
<urn:uuid:08384360-d0f2-4272-976b-79245d9c0025>
|
{
"dump": "CC-MAIN-2017-47",
"url": "http://www.bodley.ox.ac.uk/dept/scwmss/wmss/online/1500-1900/gilpin/fol-23-25.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806070.53/warc/CC-MAIN-20171120145722-20171120165722-00579.warc.gz",
"language": "en",
"language_score": 0.9632874131202698,
"token_count": 238,
"score": 2.984375,
"int_score": 3
}
|
Oh, no, there’ll be a Space Age some day, perhaps thirty, forty, or even fifty years from now, and when it comes it will be a real Space Age! But it will depend on the development of some new form of propulsion. The main trouble with the present system – all those gigantic rockets sailing up off the launch pads consuming tons of fuel for every foot of altitude – is that it just hasn’t got anything to do with space travel. The number of astronauts who have gone into orbit after the expenditure of this great ocean of rocket fuel is small to the point of being ludicrous. And that sums it all up. You can’t have a real Space Age from which 99.999 per cent of the human race is excluded.
Far more real – and we don’t have to wait fifty years for it – is the invisible Space Age, which exists already; the communications satellites, literally thousands of them, television relay systems, spy satellites, weather satellites. These are all changing our lives in a way that the average person doesn’t yet comprehend. The ability to pass information around from one point in the globe to another in vast quantities and at stupendous speeds, the ability to process information by fantastically powerful computers, the intrusion of electronic data processing in whatever form into all our lives is far, far more significant than all the rocket launches, all the planetary probes, every footprint or tyremark on the lunar surface.
‘The Space Age is Over’: J. G. Ballard, interview with Christopher Evans, 1979, in Simon Sellars & Dan O’Hara (eds.) Extreme Metaphors: Interviews with J. G. Ballard 1967-2008 (Fourth Estate, 2012).Gagrina
|
<urn:uuid:d94bc822-560b-46d0-b1e5-bf91e53de7ee>
|
{
"dump": "CC-MAIN-2018-09",
"url": "https://drjohnsears.com/2015/10/09/gagarina/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891811352.60/warc/CC-MAIN-20180218023321-20180218043321-00451.warc.gz",
"language": "en",
"language_score": 0.9088209867477417,
"token_count": 364,
"score": 2.578125,
"int_score": 3
}
|
ArticleDownload Worksheet June 13th, 2012
Hot Weather Sparks Deadly Wildfires
Hundreds of miles of forest are on fire in the American West, due to dry weather, the mild winter that left little snow and some clumsy camping. Hundreds of firefighters are battling a Colorado wildfire — one of 19 large fires burning in nine states. In New Mexico, more than 1,500 fire fighters are battling the largest blazes in state history.
The fire in northern Colorado started with a camp stove. U.S. Forest Service investigators say 56-year-old James Weber, a mental health counselor at Colorado State University, tried to stamp out the fire Monday but then fled as the blaze spread. There is no cell phone service in the area where the fire started, and Weber could not contact fire officials right away
The Forest Service issued Weber a citation for causing a fire without a permit. He faces a $300 fine, and perhaps more depending on how much damage is caused.
Weber “is most concerned about what’s going on now,” his lawyer said, adding that he is focused on the well-being of the firefighters, residents and wildlife in the area.
States and Canada send reinforcements to fight the fires
President Barack Obama called Colorado Gov. John Hickenlooper to assure him that the federal government stood ready to provide personnel, equipment and emergency grants for Colorado and other states battling fire.
More than 600 firefighters and nearly 30 aircraft are continuing to fight northern Colorado wildfires blamed for one death and damage to more than 100 structures. The U.S. Forest Service says about 40 fire engines will also be helping contain the fire.
Wyoming diverted personnel and aircraft from two fires there to help with a 60-square-mile Colorado wildfire. Canada also loaned two aerial bombers. And an elite federal firefighting crew is on the scene.
In New Mexico, firefighters made slow progress against the largest wildfire in state history. The blaze has charred 435 square miles of forest since it was sparked by lightning in mid-May. It was 37 percent contained Monday.
Lowest snow-pack in a decade and dry weather blamed
Officials expect this will be a tough summer for firefighters and residents in vulnerable areas.
“There’s zero snowpack left,” explained federal snow-survey coordinator Mage Skordahl.
The amount of snow left on the mountains is at the lowest level in a decade and rivers in Colorado are running around 25 percent of average, she said.
Dry weather and high winds also increase the risks of rapidly spreading fires.
Igniting the West
As of Wednesday, June 13 the Associated Press listed the following fires burning across nine Western states.
- California: A wildfire that briefly threatened homes in Kern County was fully contained.
- Colorado: The 68-square-mile High Park Fire is 10 percent contained. More than 600 people are assigned to the fire.
- New Mexico: Nearly 1,000 firefighters and more than 200 National Guardsmen are battling the 56-square-mile Little Bear fire. Containment is 35 percent. More than 500 firefighters bolstered lines around the Gila fire, the country’s largest at 438 square miles.
- Utah: Two wildfires blackened 4,000 acres in Fishlake National Forest in southern Utah. A third fire believed to have been sparked by target shooting near Centerville, 15 miles north of Salt Lake City, was quickly contained late Monday.
- Wyoming: A 4-square-mile blaze at Guernsey State Park is 80 percent contained. Six helicopters and 600 firefighters are deployed. Firefighters contained 95 percent of a 13-square-mile fire in Medicine Bow National Forest and completely contained a 1,700-acre fire in Weston County.
- Arizona: A wildfire has charred nearly 2,700 acres but is now 40 percent contained; it began Sunday in the Tonto National Forest northwest of Phoenix. In northern Arizona on the Navajo Nation, a wildfire has burned about 600 acres.
— Compiled by Imani M. Cheers for NewsHour Extra
Submit Your Student Voice
Tooltip of RSS content 3
- Religious freedom bill in Indiana causes backlash
DOWNLOAD VIDEO Indiana Gov. Mike Pence signed a state bill into law this week that…IndianalawLGBTLGBTQSocial Issuessocial studies
- How unconscious race bias affects millennials
Are millennials as racist as past generations? A common answer to that question is “no,” but research shows there’s more to the story. Continue readingraceracismSocial Issuessocial studies
- Scientists develop Ebola-fighting robots
As the Ebola outbreak in Africa hits its one-year anniversary mark, researchers are exploring ways robots could help health care workers care for people who get sick. Continue readingEbolaSciencesocial studiesTechnologyWorld
- Satire’s role in current events – Lesson Plan
This lesson asks students to think critically about their relationship to satire and explore the question of how it helps us interpret global events. Continue readingApril Fool's Daycomedycurrent eventsMedia Literacysatire
- Yemen’s president flees country
The collapse of Yemen’s government has raised concerns about the possible effects of a power vacuum in the country and ripples throughout the world. Continue readingal-QaedahouthiIranISILsocial studiesWorldWorld & GeographyYemen
|
<urn:uuid:af159ca0-8f52-45d8-91e6-00faf5b7b152>
|
{
"dump": "CC-MAIN-2015-14",
"url": "http://www.pbs.org/newshour/extra/2012/06/hot-weather-sparks-deadly-wildfires/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131305143.93/warc/CC-MAIN-20150323172145-00222-ip-10-168-14-71.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9243144392967224,
"token_count": 1110,
"score": 3.375,
"int_score": 3
}
|
What are the options available to you when cutting down a tree? How is it done? Well, there are many ways of cutting down a tree, right from the traditional crude ways to the most recent advanced ones.
Environmental experts and many other right groups, however, are against cutting down trees, especially where no replacement is done.
The advancement in technology has enabled the production of many tree cutting tools. This article is going to dwell on the cutting of the trees by the use of a chain saw.
We are going to look at how it is done, the safety tips and any other information as may be required by the user. Please read through the article to find more information.
What is this chainsaw?
Also spelled as chain saw, and also known as a power saw in other parts of the world is a portable mechanical saw. It cuts down the trees using a set of teeth attached to it through a chain. The teeth are rotating with the chain around the guide bar.
How do you cut a tree down using a chain saw?
There are a few important steps to follow, as well as some safety precautions. You will need to do the following:
a) Get a chain saw which is up to the task and check on its health. It won’t be so useful if the chain saw goes off when in the middle of the assignment. Confirm the level of gasoline in its fuel tank. Check on the strength or otherwise of the teeth of the saw.
b) Switch the chain saw on and run it for a short time, to allow it to take oil its inner parts.
c) On the tree that you have earmarked for cutting, identify the direction where you want the tree to fall. The direction selected should be away from things such as:
- Other trees that you do not intend to cut.
- A residential area. Do not fall trees on top of the houses as it may cause fatalities.
- Infrastructure such as roads. You should not cause a public nuisance by falling trees across roads, eventually blocking them.
- Power lines and other means of communication lines.
- Human beings, and from where they are doing their activities.
d) To guide you on the direction with which the tree should fall, you can use a rope and a tractor. Tie the rope at one end to the near top of the tree. Tie the other end to the tractor which should be in the direction where the tree should fall to. The rope should be long enough so that the falling tree does not reach the tractor.
e) Using the chain saw, make a cut to the tree trunk at an angle of about 60 degrees. Cut it into a quarter of a diameter deep. Stop the saw and pull it out. The part that you have cut should be on the reverse of where the tree should fall.
f) Now cut down below where you had cut at 60 degrees. The second cutting should be at 90 degrees. Proceed with the cutting until you notice that it is starting to fall down.
g) Notify the driver of the tractor to pull the rope. The tree would then safely fall in the right direction. Remove the chain saw from the tree when it starts to fall. This is to avoid it breaking just in case the tree does not fall down properly. Exercise care all the way from the start until when the tree is fully fallen down.
h) Switch off the chain saw, or proceed to make more cuttings on the fallen tree.
i) Always remember to replace a cut-down tree with one or even more tree seedlings. That is caring for the environment and securing the future for other generations.
Things not to do when cutting down a tree using a chain saw.
There are a few things that you should avoid when cutting down a tree using a chain saw. They include.
1. Always do not forget to put on protective gear. This is very important.
2. Avoid using a chain saw that has been written off. An old chain saw can cause great harm to the user just in case the saw breaks down. Cutting down a tree also needs a powerful tool, which may not be found in a retired chain saw.
3. Cutting down a tree is a humongous task that cannot be done by one person. So always do not work alone, get help from a friend.
4. Since you may require a ladder, do not lean it against a tree that you are going to cut. You may end up falling down with the tree and the effects may be worse.
5. Always ensure that the fuel tank of the chain saw is full before you begin the work. You won’t like it if you run out of gas when the saw is right deep into the tree.
6. Hold firm to the saw. Do not lose the grip in the course of the duty, as the saw might not stop.
7. Sharpen the teeth of the chain saw before you commence the work. Do not use a dull saw as it may give you irregular cuts. It may even fail to perform the duty correctly.
8. Do not cut many trees using one chain saw before checking on it. All the time, recheck the chain tension.
9. Do not cut the ground using the saw. It will make it go dull and even destroy some parts.
10. When done with cutting down the tree(s), do not leave tree stumps protruding. You will need to grind it to the ground by use of tree stump grinder or even tree stump remover. Protruding tree stumps can cause more hazards to the environment. Hence you need to remove them after work.
Cutting down trees by the use of a chain saw cutter is not a complicated undertaking. A proper procedure needs to be followed. Remember to always fall trees to where it is free of other things such as house and public amenities.
Do not forget as well to replace the cut trees. There are many things to avoid doing when cutting down trees. Familiarize yourself with them as you undertake the task. Finally, always remember to stay safe. Safety is paramount.
|
<urn:uuid:04144348-7c23-4d5e-bf70-0f1d895d3981>
|
{
"dump": "CC-MAIN-2020-29",
"url": "https://toolsever.com/how-to-cut-a-tree-down-with-a-chainsaw/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655880665.3/warc/CC-MAIN-20200714114524-20200714144524-00313.warc.gz",
"language": "en",
"language_score": 0.9516553282737732,
"token_count": 1264,
"score": 3.109375,
"int_score": 3
}
|
Initially used to mop up periods of excess, the consumption of soft drinks has increased steadily over the years. What are also called “soft drinks” are non-alcoholic beverages that attract millions of consumers around the world every day. However, studies have shown the danger of these drinks or their “light” equivalent. According to an article in the Dailymail, consuming two or more glasses a day increases the risk of premature death by 17%.
Also known as “liquid sweets”, these drinks can be very harmful to health and should be consumed in moderation. They consist of carbon dioxide, water, artificial products and colouring agents, sometimes caffeine, but above all a lot of sugar, all of which are unhealthy for the body. Their over-consumption can eventually lead to high health risks and even increase the risk of premature death, according to a study conducted by the Journal of American Medical Association (JAMA).
Numerous studies have proven the harmful effects of these drinks and their possible correlation with the risk of premature death. Indeed, a study conducted between 2005 and 2011 in 47 Japanese prefectures showed that the consumption of soft drinks was linked to heart disease. That’s because, in addition to harmful components such as colorants or artificial products, some soft drinks can contain up to 30 g of sugar per can, or 10 teaspoons of sugar. This large quantity of sugar can cause heart problems but also promote the risk of obesity, diabetes, hypertension in addition to the risks for dental health namely caries or the attack of tooth enamel because of the acids they contain.
All these reasons should normally be enough to slow down the over-consumption of these beverages. However, the average North American would consume nearly 182 liters per year while Europeans are dangerously close to this amount. The NHS has reportedly stated that 20% of the sugar added to the adult diet comes from soft drinks and fruit juices. The experts of the European Society of Cardiology in Paris have strongly recommended to eliminate these drinks from our diet and replace them with water, or to consume them in moderation while some countries such as the United Kingdom have even advised to tax sweetened drinks in order to prevent overconsumption of soft drinks and health risks. Researchers from Oxford University estimated that this tax, which was introduced in April 2018, would have a 9.8% drop in child obesity.
Are light drinks a good alternative?
It is important to read the ingredients before consuming a food. You will notice that in soft drinks, sugar is present in the majority since it appears at the beginning of the list. However, more “dietetic” alternatives have appeared such as the “light” or “zero” versions. This type of drink can be just as dangerous as “normal” drinks. Sugar is actually replaced by chemical substances such as aspartame or other sweeteners which are low in calories, but whose effects are just as harmful, especially for heart health.
These sodas sold in supermarkets can be replaced, for example, by sparkling or fizzy water, mixed with fruit.
|
<urn:uuid:a1b955f8-8a21-4df5-84ab-0637fdda95c4>
|
{
"dump": "CC-MAIN-2020-50",
"url": "https://eaglpro.com/two-glasses-of-soda-a-day-can-increase-the-risk-of-death-by-17/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141188899.42/warc/CC-MAIN-20201126171830-20201126201830-00095.warc.gz",
"language": "en",
"language_score": 0.9661269783973694,
"token_count": 635,
"score": 3.28125,
"int_score": 3
}
|
For Art Week, we studied a painting called Mr and Mrs Andrews, by Thomas Gainsborough.
We listened to a piece of music that went with it and heard lots of birds tweeting in the sky.
We were surprised to see there were no birds in the picture. We think it was because it is a painting and not a photograph, so the artist might have missed the birds out.
We decided to make our own birds to be a part of the picture. We used pasta to add texture to our birds and then finished by painting them. We then designed some paper mache birds. We will be painting our birds after half term once the glue has dried and displaying them in our classroom.
We also think that the background of the picture was part of a farm. We thought about all of the foods we find on a farm and decided to make cheese straws. They were delicious!
As an extra treat because of all our hard work this week, Miss. Greenwell and Mrs. Dryden bought us pancakes to have with nutella spread with us not being in school on Pancake day! These too were also yummy!
|
<urn:uuid:b4f40947-c0cd-4b14-9518-356d8b82b049>
|
{
"dump": "CC-MAIN-2018-30",
"url": "http://staidansprimary.co.uk/blog/2015/02/13/art-week-in-year-2/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676590711.36/warc/CC-MAIN-20180719070814-20180719090814-00053.warc.gz",
"language": "en",
"language_score": 0.991222620010376,
"token_count": 232,
"score": 2.578125,
"int_score": 3
}
|
Today is about the Moon - the main conference hall has a series of presentations throughout the day - the first half being mainly about the European orbiter SMART-1. Mark Burchell (who spoke about Stardust yesterday) talked about simulating the impact of SMART-1 into the lunar surface at the end of its mission. Using the same gas gun that was used to understand the Stardust collection process, he and his team simulated the comparatively low speed, very low angle of incidence impact for SMART-1
Light Gas Gun
The light gas gun used to simulate impacts of comet material into aerogel, and SMART-1 into the Moo
A typical lunar meteorite impact, the sort that are occasionally caught on film, average an angle of about 45 degrees, and a speed of many tens of kilometers per second - perhaps 75 or more. SMART-1 was traveling at just two kilometers per second - and hit the surface at an angle of one degree. The question is, what should we expect that to do in terms of cratering and ejecta, and what might happen to the spacecraft? Mark's team used a lunar regolith simulant based on sand, and a 2-millimeter-diameter aluminium sphere fired down their 5-meter-long gas gun. They did a total of 14 test runs, with two at 10 degrees, four at 5 degrees, four at 2 degrees, and a final four at the SMART-1 impact angle of 1 degree. The morphological changes between these angles are significant.
At 10 degrees, the crater is fairly round and a central peak forms, slightly
|
<urn:uuid:c12836ac-5acd-4204-b5cc-2483eefa5bda>
|
{
"dump": "CC-MAIN-2020-29",
"url": "https://www.planetary.org/blogs/guest-blogs/doug-ellison/1100.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655898347.42/warc/CC-MAIN-20200709034306-20200709064306-00049.warc.gz",
"language": "en",
"language_score": 0.9542421698570251,
"token_count": 331,
"score": 2.515625,
"int_score": 3
}
|
In February, the Chicago Climate Exchange traded more than 480,000 tons of carbon dioxide in its busiest month ever. Since its opening, the two-and-a-half-year-old market - in which companies with more emissions buy "carbon credits" from those that emit less or that sequester carbon - has presided over sales of more than 4.5 million tons of carbon dioxide.
So far, only a few market-based programs to cut greenhouse gas emissions have sprung up, including Chicago's partner exchange in London (even larger, at more than 140 million tons of carbon dioxide traded since it opened last April). But market-based approaches to help stem carbon releases, and in turn climate change, could prove difficult to marshal and enforce.
Carbon credits currently are expected to remain part of the Kyoto Protocol, the agreement between more than 150 nations to limit greenhouse gases. In the United States, which has not signed on to the protocol, the carbon credit markets are voluntary, as are other efforts to cut greenhouse gases. Because of the lack of a unified federal policy, individual states have decided to step into the fray.
For example, a consortium of seven New England states agreed last December to regulate greenhouse gases, specifically carbon dioxide emissions, across the region, with an associated market trading system. Farther west, Minnesota, California, Washington and others have their own emissions rules that take a regulatory approach to cap and fine for emissions (see Geotimes, October 2004).
In the United States, like "most environmental problems in the country," the response has "started with the states," says Elizabeth Wilson, a policy researcher at the University of Minnesota-Twin Cities in Minneapolis. With air quality rules in the 1970s, for example, after states took action, the U.S. industrial community eventually called "for the feds to have a uniform regulatory approach." This important trend is something current carbon emissions planners should pay attention to, Wilson says.
Indeed, says Granger Morgan, a climate policy specialist at Carnegie Mellon University in Pittsburgh, Pa., companies need to decide today how to plan for potential future changes to U.S. policy. They must gamble now as to how radical those changes will be, and what technologies would be most cost-effective for achieving those goals to either avoid emissions fines or refitting costs later on.
Morgan and his colleagues point out that many U.S. coal-fired power plants are between 20 and 40 years old. How operators decide to replace these plants means either "we are going to lock ourselves into quite a few decades of high emissions" or take steps "to clean things up" now, in hopes of saving money later.
"I believe the United States is going to get serious about limiting emissions, and I'm not alone in this," Morgan says, noting that in his interactions with CEOs and public utility commissioners, he has found that they believe the same and that some are taking steps to get ready. "Up until a few years ago," he says, "most industries were adamantly in the corner of climate denial." Now, many companies, such as BP, are "trying to get out front."
At the annual meeting of the National Council for Science and the Environment, held in February in Washington, D.C., Ross Pillari, the chairman of BP's American division, told an audience that "climate change is the most important of issues for policy-makers to deal with today." Looking forward, Pillari projects 200 million new energy customers every year, mostly because of growth in China. Pillari said that means "sustainable" energy is key, in a time when technologies for "renewable and alternative energy are a long way off," and that such expectations will guide his own company's actions.
In the meantime, many developing countries (and also some developed ones) lack the infrastructure necessary to make carbon credit markets or regulatory efforts effective, says Ruth Greenspan Bell of Resources for the Future, based in Washington, D.C. China in particular is only beginning to experiment with laws to address environmental issues, and so far, its rules on emissions have been enforced from the top down - but local governments and businesses seem to regularly flout such rules.
The lack of infrastructure in China and elsewhere to ensure the legitimacy and sustainability of emissions controls or sequestration projects could render carbon credits valueless. If that is the case, "then having the market is kind of irrelevant," Bell says. To reach whatever targets the international community sets for emissions controls, a market-based approach "can't do it without the basics in place," even if such an approach has proven useful as part of emissions control efforts in the United States and parts of Europe. But because the United States remains the top per-capita emitter of greenhouse gases, followed by the European Union, such programs can still be valuable, she says.
The future course for any country "has to be broader than just the trade part of it," Bell says. "There's no world enforcement system that you can turn to," which creates "a certain element of faith involved," she says, in efforts to reduce greenhouse gases. For now, Bell calls carbon credits and trade incentives "a small piece in a larger issue."
"Climate tipping point," Geotimes, October 2004
See the February and March 2005 issues of Geotimes
for parts one and two
of this series about the science and technology surrounding carbon credits.
Back to top
|
<urn:uuid:f4c0752e-c6b1-4e65-b4d6-7c0a81e13448>
|
{
"dump": "CC-MAIN-2016-44",
"url": "http://www.geotimes.org/apr06/NN_carboncreditsIII.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720475.79/warc/CC-MAIN-20161020183840-00355-ip-10-171-6-4.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9664974212646484,
"token_count": 1114,
"score": 3.078125,
"int_score": 3
}
|
Labs are widely considered to be essential to learning science and engineering, because labs can provide a key context in which students experience science as a process of inquiry and get the opportunity to work “hand-on” with authentic tools and materials. However, it is not always easy to provide students with high quality laboratory experiences — labs can be too expensive, dangerous, difficult, or time-consuming. A remote laboratory is an increasingly common alternative that enables a student to conduct a scientific experiment over the internet. A remote laboratory is not a simulation; students control physical scientific equipment and collect data from physical phenomena. Among the many strong reasons to consider remote labs, they can enable students to access sophisticated scientific apparatus at low cost, with greater safety, and more convenience. Further, remote labs can overcome constraints that are hard to overcome in a school lab. Because remote labs are controlled by a computer, then can be precisely executed (whereas students often struggle with the procedures in school labs) and can allow time for students to replicate or extend experiments (because it is easier to precisely vary conditions and efficient to run multiple experiments). Remote labs can be accessed equally well from home and school, and can reduce logistical issues related to scheduling lab time for students. Remote labs offer new possibilities for joint engagement with students, teachers, and mentors, who could use social networking and online communication tools to interact before, during and after labs. Further, displays for remote labs can be augmented (or layered) with additional displays that helps students make sense of what is going on.
The Radioactivity iLab is one example of a remote lab that features pedagogical innovation to enhance students psychological and learning experience. In the lab, students measure radiation from a sample of strontium-90. Obviously, working with radioactive materials is dangerous. In this iLab, students in the United States were able to control apparatus in Australia. Students were able to control a Geiger counter to measure the sample, and could watch what happened over a live video. The learning goal was to observe and infer that the intensity of radiation from a point source decreases proportional to the inverse square of the distance. The iLab is designed as a multi-step, interactive application that supports this learning goal. Research with the lab showed that students prefer the remote lab to a simulation, that the video presence supports their experience of the lab as authentic, and that the video helped them to understand how varying the distance relates to the measured amount of radiation. A follow-on project engages students in the design and development of their own scientific instruments using Arduino-compatible hardware and software, and how that might afford insight into the phenomena (how you measure it, if you’re getting reasonable data, how you calibrate it, etc.)
Another example is the interactive biotechnology project at Stanford. What happens in most schools labs is microscopy, where students passively observe. It’s hard to do experiments and for teachers to bring in biological organisms––harder than physics, for example, where you can put something back in a drawer at the end of the class. The Riedel-Kruse Lab has developed a platform to make remote, two-way interaction between humans and microscopic organisms not only possible, but easy. The platform lets students and teachers to do free-play experimentation, including exploration, guided experiments, making hypotheses and models, and making measurements to test hypotheses — and by being freely available online, it takes some load off of the teacher because students can do experiments anytime, even in the evening.
In higher education, remote labs could be considered to be a mature use of technology to support learning. Labs have been developed in many topics, including astronomy, biology, chemistry, computer networking, earth science, engineering, hydraulics, microelectronics, physics and robotics. For example, the Labshare group in Sidney has a fairly robust strategy where they are using remote labs in their undergraduate engineering curriculum. Research on teaching and learning with remote labs is largely positive. Across many studies that compare remote and local labs in higher education, little or no differences have been found in learning outcomes and students experience remote labs as being equally effective. Research in secondary schools also shows the promise of remote labs, but notes the need to focus on support materials for both teachers and students to frame student learning and that secondary students find the tactile engagement with laboratory equipment motivating.
Further, labs are now being consolidated onto common platforms. These platforms, such as Go-Lab, WebLab-Duesto, LiLa, and PEARL offer the potential for many more users to discover and access remote labs, with greater consistency in the user interface. Consequently, use of remote labs is expanding not only in higher education, but also into K-12 science and engineering education. While Europe, North America, and Australia were earlier leaders in exploring remote labs, use is now spreading to places like remote areas of Brazil, where connections to the internet are available but scientific equipment is scarce. The attractiveness and growing availability of remote labs means now is an ideal time to focus on the pedagogical innovations that will be necessary to realize the full potential of remote labs for developing students’ interest in science and engineering as well as students’ learning of key disciplinary concepts and practices.
One of the appeals of the remote lab concept is that it can appear to be an easy substitution — whereas a teacher and her students previously conducted a lab in their own classroom, now they do the same thing but substituting online apparatus for local apparatus. While this view may make it more comfortable for teachers to consider trying remote labs at first, in the long run, it undermines the potential for pedagogical innovation. Below, we consider some of the ways in which remote labs change the game, and the pedagogical factors that can be important to realizing their transformative potential.
What is the purpose of the lab? For some physical labs, the purpose of the lab is to learn to handle scientific equipment safely, appropriately, and precisely. This work is necessarily taken out of students’ hands in a remote lab. Consequently, educators more often focus on conceptual understanding and inquiry goals in remote labs. Students often appreciate that it is now easier to obtain a high quality data set (and that they may spend less time frustratingly explaining why they could not get the apparatus to work), and it can become possible for students to more easily focus on comparing multiple experiments (as less time may be consumed by setup and cleanup). More generally, the first generation of innovators in remote labs found that sometimes sticking with local, physical experiments is better — not all phenomena merit the complexity of setting up remote equipment and a mix of physical and remote investigations benefits students. For example, in a remote lab students have less opportunity to design how they will evoke and measure phenomena — typically the capabilities of a remote lab are preset or parameterized; however, in a physical lab, students can be challenge to find the best way to set up an experimental condition or to design their own methods of measurement. So there should be a clear reason to choose a remote lab instead of a conventional lab, and the learning objectives should fit the possibilities of the environment.
Presence. Researchers have noted that in successful remote labs, students often feel a sense of presence with the scientific equipment. Indeed, students sometimes report that interacting with remote equipment feels more authentic that using the less sophisticated versions they can access at their own school. To some extent, seeing is believing: it is unsatisfying to merely turn some knobs and receive a data set back. More advanced remote labs often provide a live video that shows students what is happening as they control the experiment. And in the future, virtual reality goggles or glasses may extend the sense of presence. Presence is also not merely a matter of visual perception. Because students did not physically set up the lab, more attention may need to be given to how they will become familiar with the apparatus and to learning how they can control it. Sauter and colleagues (2013) showed that students preferred remote labs to simulation given identical user interfaces because they felt more sense of ownership over the data produced – it was “their data”, not data produced by a simulation programmer. Teachers also have a key role in introducing and orienting students to the remote lab so that it will feel real.
Formative assessment. Researchers have noted that in traditional place-based labs, teachers typically walked around to identify difficulties students were having with the lab, and to intervene appropriately. In a remote lab, students still need the benefit of formative assessment during their engagement with the lab, but the teacher may not be physically present. One approach can be to build formative assessment resources into the lab itself, as an additional digital resource that supports students in checking their own understanding and progress. An area for innovation is to also support human intervention, for example through analytics dashboards and conferencing (chat or video).
Collaborative learning. Likewise, traditional place-based labs could be places where students socially interact in support of each others’ learning, though in practice, this is not always realized (Kozma, 2000). Collaboration can also be challenging with a remote lab. As in the discussion of formative assessment, a basis for communication can be set up via chat or online calling. Yet, research in the area of computer-supported collaborative learning (CSCL) suggests that only providing a communications infrastructure will not be enough. Successful CSCL approaches emphasize defining structures to support students’ collaboration, which can include assigning specific roles to students, providing a shared workspace, orchestrating when students should communicate in the course of their work with the lab, and helping students to monitor and improve the state of their social engagement.
Flipping the classroom. In a conventional K-12 science classroom, most of the classroom time available for doing a lab must be devoted to using the lab equipment. Often students are expected to organize and interpret their data as homework. However, with remote labs it becomes possible for students to run the experiments outside of class (for example, using computers in the school library after school or from home). This potentially can free up class time to focus on making decisions about what to investigate and discussing the resulting data.
Framing the broader learning activity. One literature review observed that prior work in remote labs developed many resources for guiding students during the labs, but most of the resources focused on the process of doing the lab. Much less attention has been paid to the nature of the guidance students need before and after the lab. For example, students need support for orientation to the lab and to plan meaningful experiments and investigations before they begin using the remote equipment. Students need support for conceptualization, such as support for concept mapping and for elaborating hypotheses. They also need considerable guidance in making sense of the data that results, relating the data back to their original driving questions, and deciding what to do next. Overall, pedagogical innovation is needed to support self-regulated learning as student engage with remote labs.
Leveraging unique possibilities. As previously noted, remote labs bring some unique capabilities that are hard to achieve with local physical labs. For example, labs can focus more on comparing data from several experiments, because it becomes easier to run a small series of carefully controlled experiments. Likewise, since the data is collected in an online format, it can be easier to contrast data sets collected by different students or to merge them into one larger data set. Whereas physical labs often consume all the time available just to complete one cycle of data collection, with a remote lab it may be possible for students to design follow up experiments. Remote labs also can augment the displays coming back from real phenomena with additional visualization that may help students to interpret the underlying processes. Further, teachers can support students who want to go farther with a particular lab by letting them continue their investigation after the formal school assignment is completed.
Analytics. Moving the work of experimental design and data analysis online creates “digital breadcrumbs” that provide new opportunities to support students through the learning process — both in automated ways, and by providing teachers with greater insights. Analytics dashboards and other tools operating over these breadcrumbs give teachers new ways to inspect and comment on student work, and can help them gain deeper insights into students learning in ways that may not be possible or easy to do in traditional labs. Digital breadcrumbs also provide researchers with new data (beyond interviews and surveys) to better understand and unpack the learning process.
Supporting teacher learning. Researchers have also noted that remote labs offer some new possibilities for teacher learning. For teaching candidates who are studying at university, they can practice with a remote lab on their university campus and then teach students with the exact same lab during a practical teaching experience in a school. Remote labs can also offer teachers examples of data sets that students collected, so they can anticipate what will happen during the lab. Further, since teachers in different classrooms or in different schools can use exactly the same remote lab, they can more easily engage in discussions of their pedagogical approach to teaching the lab. Tools like ilabstudio supports novice teachers by providing pre-authored feedback that can be used to model sophisticated feedback.
Tradeoffs of place-based vs. remote labs. What is lost and what is gained when moving from hands-on to remote labs? Advocates of place-based labs extol the benefits of real data, unexpected clashes, and opportunities for collaborative learning. Detractors point out that hands-on labs are costly, and observations of students show that lab partners often talk more about equipment setup and procedural problems than concepts of inquiry (Chinn & Malhotra, 2002; Kozma, 2000). Further, in bioscience labs, maintaining live specimens (like microorganisms) in and of itself is a hassle for teachers; there are affordances for having that offloaded to the remote provider that teachers have found very appealing. Other challenges, like accessibility (see below) still exist, just in different ways, in both formats.
Accessibility. While hands-on labs can pose problems for students with special needs, computer interfaces are that are not easy to use can also present difficulties for students. Overall, in choosing (as well as in designing) remote labs, educators should pay attention to both the physical and cognitive demands of interacting with the apparatus through the interface. Computer-based remote lab interfaces could offer increased accessibility for disabled students who would nother otherwise be physically able to access traditional labs — for example, for a blind student, a remote lab coupled with a screen reader and other tools could provide greater access than a physical lab environment. Remote interfaces can support access in ways that may not have been possible (or too dangerous) before, while in other instances, physical, tactile engagement may be preferable.
Complexity. Students in tertiary education are already on the path to specialization and can be expected to manage panels with many different controls and a higher degree of abstraction between the control interface and the apparatus being controlled. As remote labs move to secondary or primary education, simpler controls with less abstraction may be needed. When well designed, remote labs can also adapt to a student’s pace instead of requiring work on a pre-defined schedule –and can allow students to make up labs they missed due to illness. Opportunities for innovation include exploring new interface modalities, such as touch interfaces or haptic (motion-feedback) interfaces. New opportunities for scaffolding are also possible: A layer of software interface that can be tailored to the specific level and pedagogical goals of the student, rather than forcing all students to use a fixed physical interface, provides much greater adaptivity to the teacher and the software designer to introduce professional caliber equipment into classrooms at different levels and hide or release access to different versions of the interface to control that instrument.
Examples of NSF Cyberlearning projects that overlap with topics discussed in this primer.
- EXP: Transforming High School Science via Remote Online Labs
- DIP: Collaborative Research: Taking Hands-on Experimentation to the Cloud: Comparing Physical and Virtual Models in Biology on a Massive Scale
- DIP: Using Dynamic Formative Assessment Models to Enhance Learning of the Experimental Process in Biology
- DIP: Collaborative Research: Mixed-Reality Labs: Integrating Sensors and Simulations to Improve Learning
- EAGER: A Prototype WorldWide Telescope Visualization Lab Designed in the Web-based Inquiry Science Environment
Other relevant cyberlearning-themed projects:
Remote Labs – A Lab in Every Pocket (From the NSF Video Showcase)
References and key readings documenting the thinking behind the concept, important milestones in the work, foundational examples to build from, and summaries along the way.
Andujar, JM, Mejias, A, Marquez, MA. (2011). Augmented reality for the improvement of remote laboratories: An augmented remote laboratory. IEEE Transactions on Education, 54(3), 492-500.
Gravier, C., Fayolle, J., Bayard, B., Ates, M., Lardon, J. (2008). State of the art about remote laboratories paradigms: Foundations of ongoing mutations. International Journal of Online Engineering, 4(1).
Hossain, Z., Bumbacher, E.W., Chung, A.M., Kim, H., Litton, C., Walter, A.D., Pradhan, S.N., Jona, K., Blikstein, P., & Riedel-Kruse, I.H. (2016). Interactive and Scalable Biology Cloud Experimentation for Scientific Inquiry and Education, Nature Biotechnology, 34(12), 1293-1298.
Chinn, C. A., & Malhotra, B. A. (2002). Epistemologically authentic inquiry in schools: A theoretical framework for evaluating inquiry tasks. Science Education, 86(2), 175-218.
Cooper, M & Ferreira, JMM (2009). Remote laboratories extending access to science and engineering curricula. IEEE Transactions on Learning Technologies, 2(4), 342-353
Kozma, R.B., Chin, E., Russell, J., & Marx, N. (2000). The role of representations and tools in the chemistry laboratory and their implications for chemistry learning. Journal of the Learning Sciences, 9(3), 105-144.
Lowe, D., Newcomb, P., and Stumpers, B. (2012). Evaluation of the use of remote laboratories for secondary school education. Research in Science Education, 43, 1197-1219
Ma, J. & Nickerson, J.V. (2006). Hands-on, simulated and remote laboratories: A comparative literature review. ACM Computing Surveys (CSUR), 38(3), 1-24
Myers, A. (2016). Stanford researchers say school kids can do safe and simple biological experiments over the internet. Stanford News, December 7, 2016.
Sauter, M, Uttal, DH, Rapp, DN, Downing, M & Jona, K. (2013). Getting real: The authenticity of remote labs and simulations for science learning. 34 (1), 37-47
Simao, JPS, de Lima, JPC, Rachael, JBdS (2014). Remote labs in developing countries: An experience in Brazilian public education. IEEE 2014 Global Humanitarian Technology Conference.
Singer, SR, Hilton, ML & Schweingruber, HA (Eds.) (2006). America’s lab report: Investigations in high school science. Washington DC: National Academies Press.
Zecharia, ZC, Manolis, C, Xenofontos, N, de Jong, Ton, Pedaste, M., van Reiser, SAN, Kamp, ET, Maeots, M, Siiman, L, Tsourlidaki, E. (2015). Identifying potential types of guidance for supporting student inquiry when using virtual and remote labs in science: A literature review. Education Technology Research and Development, 63, 257-302
Primers are developed by small teams of volunteers and licensed under a Creative Commons Attribution 4.0 International License. After citing this primer in your text, consider adding: “Used under a Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/).”
Roschelle, J., Jona, K., & Schank, P. (2017). CIRCL Primer: Remote Labs. In CIRCL Primer Series. Retrieved from http://circlcenter.org/remote-labs
|
<urn:uuid:bd0a9ae1-b7f6-4064-9c65-ffba6cd0adc0>
|
{
"dump": "CC-MAIN-2017-13",
"url": "http://circlcenter.org/remote-labs/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218191986.44/warc/CC-MAIN-20170322212951-00271-ip-10-233-31-227.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9348569512367249,
"token_count": 4230,
"score": 4.0625,
"int_score": 4
}
|
Commercial Beans vs Specialty Beans
Coffee beans are mainly divided into three species including Arabica, Robusta and Liberica. In terms of output, Arabica comprises 69% of the world’s coffee production, while Robusta and Liberia comprises 30% and 1% of the world’s coffee production respectively.
Arabica is the most popular coffee beans in the market. It takes about five years for Arabica coffee trees to grow from seedling to bearing fruits, and they mainly grow in the highlands of Western Hemisphere, including Brazil, Columbia and other Latin American countries. Brazil and Columbia are the world’s biggest and second biggest coffee producing country respectively; coffee trees in the regions grow at altitudes of over 2,000 feet in optimal and stable climate. Harvest period lasts from May to September in Brazil, and from April to June in Columbia. Coffee produced by the two countries takes up about 70% of the global market.
Robusta coffee trees mainly grow in regions with lower altitudes and warmer climates in Africa and Asia. Ivory Coast is a major production region, followed by Uganda, Indonesia, Vietnam, Thailand and India. Altitudes range between 500 and 2000 feet. Coffee trees in Ivory Coast fruit in two to three years. Harvest period lasts from April to August in Indonesia, and from October to April of next year in Vietnam. Coffee produced by these countries takes up about 30% of the global market.
In terms of properties, Arabica has lower caffeine content (0.9-1.2%). Compared to Robusta, Arabica is 60% higher in fat content and 200% higher in sugar content. Therefore, Arabica has a sweeter and softer flavour, with a hint of plum-flavoured sour taste.
Arabica has a relatively low chlorogenic acid content (5.5-8%). Chlorogenic acid is an anti-oxidant, as it is an important pesticide. As a result, Arabica is more vulnerable to damage by pest and climate, and the coffee trees bear fewer fruits at a slower pace.
A higher quality coffee, the price of Arabica coffee beans is generally twice as high as that of Robusta.
The dry fragrance and wet aroma of a specialty coffee is related to its species, processing, soil, changes in micro-climate and production region. The quality of a specialty coffee may be assessed by its levels of acidity, taste, thickness, aroma and aftertaste. After the roasting begins, the coffee beans give out different aromas at different points in time and varying degrees of oxidation. To feel the changes, one can begin with sniffing the fragrance of coffee grounds when they are still. The next step is shaking the coffee grounds to create exposure to air, as the coffee’s aroma changes every few seconds according to the degrees of oxidation of the grounds. The different aromas will become more pronounced, when the coffee turns from hot to cold when being consumed.
Top premium coffee is distinguished not only by rich and unique aromas but also by complex texture. When identifying coffees, one can start by determining the primary aroma of a coffee before discerning its secondary aromas. The six common types of coffee aromas are as follows:
Our Institute’s mission to cultivate the specialty coffee culture in Hong Kong.……………………………………………………. ………………..
According to Specialty Coffee Association of America (SCAA), specialty coffee is hailed to be gourmet or premium coffee.…………………………..
Similar to wine tasting, coffee cupping is the evaluation of coffee quality by such objective standards as sweetness, acidity, bitterness, aftertaste and aroma.
|
<urn:uuid:d434e2a1-87d9-471c-8590-a41f35457ff1>
|
{
"dump": "CC-MAIN-2018-43",
"url": "http://iscchk.org/from-seed-to-cup/commercial_beans_vs_specialty_beans/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583511889.43/warc/CC-MAIN-20181018152212-20181018173712-00109.warc.gz",
"language": "en",
"language_score": 0.9387797713279724,
"token_count": 752,
"score": 2.8125,
"int_score": 3
}
|
After the German physicist Max Planck first raised the concept of quantum in 1900, the study of quantum physics was advanced through the efforts of many physicists, and a relatively complete set of theories of quantum mechanics had been developed by the 1930s.
Quantum cryptography relies on the foundations of quantum mechanics, in contrast to traditional public key cryptography, which relies on the computational difficulty of certain mathematical functions and cannot provide any indication of eavesdropping at any point in the communication process, or any mathematical proof as to the actual complexity of reversing the one-way functions used. Quantum cryptography was first proposed by Stephen Wiesner, then at Columbia University in New York, who, in 1968 or later, introduced the concept of quantum money and quantum conjugate coding. His seminal paper "Conjugate Coding" was rejected by IEEE Information Theory but was eventually published in 1983 in SIGACT News (15:1 pp. 78–88, 1983). In this paper, he showed how to store or transmit two messages by encoding them in two "conjugate observables," such as linear and circular polarization of light, so that either, but not both, may be received and decoded. He illustrated his idea with a design of unforgeable bank notes: quantum money. A decade later, building upon this work, Wiesner’s friends Charles H. Bennett, of the IBM Thomas J. Watson Research Center, and Gilles Brassard, of the University of Montreal, proposed a method for secure communication based on Wiesner’s conjugate observables. In 1991, Artur Ekert, then a PhD student at Wolfson College, University of Oxford, developed a different approach to quantum key distribution based on peculiar quantum correlations known as quantum entanglement. In the 1990s, as the traditional public key cryptography was threatened by the development of quantum algorithms and quantum computing, quantum cryptography received more attention.
Based on research into the history of quantum physics after World War II, I will advance my research mainly by literature research and interview, and seek more detailed knowledge of Wiesner’s thinking on quantum conjugate coding, effects on Bennett, cooperation between Bennett and Brassard, influence of the E91 to BB84 protocol and quantum cryptography, and the contribution of the scientists involved.
|
<urn:uuid:419ed925-8857-4b2e-bd96-db68b52a5dc8>
|
{
"dump": "CC-MAIN-2023-23",
"url": "https://www.mpiwg-berlin.mpg.de/research/projects/origin-and-development-quantum-cryptography",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648695.4/warc/CC-MAIN-20230602140602-20230602170602-00598.warc.gz",
"language": "en",
"language_score": 0.9470245838165283,
"token_count": 467,
"score": 3.25,
"int_score": 3
}
|
"This holiday commemorates the re-dedication of the holy Temple in Jerusalem following the Jewish victory over the Syrian-Greeks in 165 B.C.E.," reports About.com. Although Hanukkah does not have the religious importance of the Jewish High Holidays, it has gained popularity in modern times due to its proximity to Christmas, and it is celebrated with more festivity than was historically traditional.Continue Reading
In 165 B.C., on the 25th day of Kislev in the Hebrew calendar, the Jewish rebel forces known as the Maccabees successfully reclaimed the Temple in Jerusalem from the Greek forces that had occupied it since 168 B.C. The Temple had been defiled by the worship of pagan gods like Zeus, and by practices such as the sacrificing of pigs upon the altar. Besides being non-kosher, pigs have a uniquely infamous significance under Jewish law, according to Chabad.org, and the Maccabees were intent upon the purification of the Temple.
To accomplish the purification, the Maccabees wanted to burn ritual oil on the Temple's menorah for eight days, but they were only able to find enough oil in the Temple to keep the menorah lit for one day. Miraculously, the menorah remained lit for the entire eight days, and the Jews have celebrated the successful rededication of the Temple ever since.
Hanukkah is the Jewish word for "dedication," and the Jews celebrate this holiday for the entire period of the first dedication. They light the first candle on the first day the menorah was lit, Kislev 25, and continue lighting one additional candle every day until the eighth day. Traditionally, the holiday is also celebrated with spinning the dreidel and eating fried foods like latkes. In modern times, it is also traditional for Jewish parents to give their children small gifts on each of the days of Hanukkah.Learn more about Holidays & Celebrations
|
<urn:uuid:ad5da2ca-ab16-4048-b88b-1181d522e2ce>
|
{
"dump": "CC-MAIN-2018-09",
"url": "https://www.reference.com/holidays-celebrations/jewish-people-celebrate-hanukkah-d2484e4e1adf9c68",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891813109.36/warc/CC-MAIN-20180220204917-20180220224917-00691.warc.gz",
"language": "en",
"language_score": 0.9715086817741394,
"token_count": 405,
"score": 3.78125,
"int_score": 4
}
|
Following several decades of decline, the first increase in union membership in a quarter of a century was recorded in 2007, with women accounting for almost two-thirds of new union members. Women make up roughly 45 percent of union members--and by 2020, women will be the majority of the unionized workforce.
Millions of female workers are getting the squeeze in today's economy. Even as women break the glass ceiling in business and politics, they still earn on average, 78 cents to every dollar earned by men--and unions are a big part of the solution. Women have a great deal to gain from unionization, with union victories working to pave the way for workers to bargain for affordable family health care, fair wages, improved working conditions, and a better life for their families. Did you know that...
- Unionization raises the probability of a woman having a pension (24.7 percent) and having employer-provided health insurance (19 percent)
- Joining a union raises the amount women workers earn by 11.2 percent more than their non-union peers.
- Among women workers in the 15 lowest-paying occupations, the benefits are even greater, with female union members earning 14 percent more than those workers who were not in unions.
Watch SEIU's video tribute to Women's History Month here:
The Employee Free Choice Act could make an even greater difference in the lives of women. "What EFCA means is that women workers and particularly women workers of color, who are of the worst economic situation in this country, can finally move out of the worst jobs and the worst working conditions and into the kind of jobs which would allow them to support a family, buy a home, send their kids to college," says Cornell labor specialist Kate Bronfenbrenner.
|
<urn:uuid:73c06300-c6d0-4305-8d60-3714d2a55552>
|
{
"dump": "CC-MAIN-2014-52",
"url": "http://www.seiu.org/2009/03/the-union-advantage-for-women.php",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802767247.82/warc/CC-MAIN-20141217075247-00033-ip-10-231-17-201.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9747022986412048,
"token_count": 362,
"score": 3.3125,
"int_score": 3
}
|
from The American Heritage® Dictionary of the English Language, 4th Edition
- n. A diverse body of religion, philosophy, and cultural practice native to and predominant in India, characterized by a belief in reincarnation and a supreme being of many forms and natures, by the view that opposing theories are aspects of one eternal truth, and by a desire for liberation from earthly evils.
from Wiktionary, Creative Commons Attribution/Share-Alike License
- n. A religion, philosophy and culture native to India, characterized by the belief in reincarnation and a supreme oneness personified in many forms and natures.
from the GNU version of the Collaborative International Dictionary of English
- n. the dominant religion of India; characterized by a caste system anud belief in reincarnation.
- n. a complex of beliefs and values and customs including worship of many gods, especially the Trimurti composed of Brahma the Creator; Vishnu the preserver; and Shiva the destroyer.
from The Century Dictionary and Cyclopedia
- n. The religion professed by a large part of the inhabitants of India.
from WordNet 3.0 Copyright 2006 by Princeton University. All rights reserved.
- n. the religion of most people in India, Bangladesh, Sri Lanka, and Nepal
- n. a body of religious and philosophical beliefs and cultural practices native to India and based on a caste system; it is characterized by a belief in reincarnation, by a belief in a supreme being of many forms and natures, by the view that opposing theories are aspects of one eternal truth, and by a desire for liberation from earthly evils
Sorry, no etymologies found.
Parallel to that idea in Hinduism is there is also this idea that a person is supposed to perform different things in one or perhaps several lifetimes.
I look forward to the day when people like me can use the term Hinduism without fear of being misconstrued.
As a result, many people prefer not to use the term Hinduism, favoring instead Sanatana Dharma (the original term, commonly translated as "Eternal Path"), or phrases such as "Vedic tradition" or "Indian philosophy."
India's civilisation, intimately bound up from its birth with the great social and religious system which we call Hinduism, is as unique as it is ancient.
I arrived in Hinduism's holiest city on Judaism's holiest day.
Hinduism is tolerant of all religions and beliefs.
In fact, Hinduism is a religion with many gods, is that pagan worship?
Gandhi's pluralistic and creative approach to Hinduism is evident in his reading of the Bhagavad Gita, a pan-Hindu theological text that he wrote more about than any other subject in his lifetime.
I do not “attack” the Hindus for their beliefs on beef and caste but, in return, they accept that Hinduism is just one belief among many — one they are entitled to hold and teach but not to put in a position of privilege over any other belief.
What we call Hinduism is actually so multifaceted that it makes the sects of Christianity look uniform by comparison.
|
<urn:uuid:3f24ca35-812f-4948-906a-cc21e13c61e0>
|
{
"dump": "CC-MAIN-2017-04",
"url": "https://wordnik.com/words/Hinduism",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285337.76/warc/CC-MAIN-20170116095125-00533-ip-10-171-10-70.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9418441653251648,
"token_count": 658,
"score": 2.921875,
"int_score": 3
}
|
A new study using cryoablation to decrease pain for patients who have cancer metastases in the bone is now underway throughout Emory Healthcare. Cryoablation is a process that uses extreme cold (cryo) to destroy or damage tissue (ablation).
Called the “Multicenter Study of Cryoablation for Palliation of Painful Bone Metastases”, or MOTION, the study aims to assess the effectiveness and safety of cryoablation therapy to treat patients with painful bone metastases and document the effects the procedure has on their condition.
The prospective, single-arm study will enroll 60 participants at eight centers in the U.S. and internationally. Twenty participants can enroll at Emory Johns Creek Hospital, Emory University Hospital, Emory University Hospital Midtown, and Emory Saint Joseph’s Hospital. Participants will serve as their own control group in this one-year study.
The clinical trial examines self-reported pain scores from the patients. Investigators are assessing improvement in scores defined by more than a two-point reduction in the worst pain in the last 24 hours, using the Brief Pain Inventory (BPI), from before the cryoablation procedure to eight weeks after the procedure takes place. The trial will assess patients experiencing pain at a level of 4 or above on a scale of 0 (no pain) to 10 (unimaginable pain).
The goal is to freeze cancerous cells and stop the pain signals to the brain. We use image guidance to insert the ablation probe into the middle of a painful cancer lesion. Then, we create an ablation zone by lowering the temperature to minus 40 degrees centigrade for 10 minutes.
Emory interventional radiologists freeze tumors in order to kill cancer cells in contact with the bone and reduce the size of the tumor. CT images obtained during the procedure helps doctors guide needles into the tumor.
Cryoablation provides an alternative for patients who haven’t experienced relief from current pain therapies. Many patients suffering from cancer pain take several medications to cope with the pain.
The outpatient cryoablation procedure takes about an hour.
Galil Medical is funding this clinical trial.
For more information about this study, contact the study coordinator, Maria Rivas at 404-712-7962.
Learn more about other available trials. http://clinicaltrials.emory.edu/
Dr. J. David Prologo
J. David Prologo, MD, is an assistant professor in the Department of Radiology and Imaging Sciences at Emory’s School of Medicine, and director of Interventional Radiology Services at EJCH. Prologo is the principal site investigator for the MOTION study, and one of 10 subspecialty trained, board certified interventional radiologists at Emory.
|
<urn:uuid:d0a5c9e8-8f5c-4e98-b33d-785be94a998b>
|
{
"dump": "CC-MAIN-2016-36",
"url": "http://advancingyourhealth.org/highlights/tag/emory-university-hospital/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982292944.18/warc/CC-MAIN-20160823195812-00248-ip-10-153-172-175.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.8977645039558411,
"token_count": 582,
"score": 2.8125,
"int_score": 3
}
|
Chief of the cardinal virtues is humility, a confession of our own helplessness and submission to God.
The older school had taught that Gotama, who had propounded the doctrine of Arahatship, was a Buddha, that only a Buddha is capable of discovering that doctrine, and that a Buddha is a man who by self-denying efforts, continued through many hundreds of different births, has acquired the so-called Ten Paramitas or cardinal virtues in such perfection that he is able, when sin and ignorance have gained the upper hand throughout the world, to save the human race from impending ruin.
The peculiarity of this work - written, of course, from what is known as the intuitional point of view - is its fivefold division of the springs of action and of their objects, of the primary and universal rights of man (personal security, property, contract, family rights and government), and of the cardinal virtues (benevolence, justice, truth, purity and order).
On this triple division of the soul he founded a systematic view of the four kinds of goodness recognized by the common moral consciousness of Greece, and in later times known as the Cardinal Virtues.
He seems to have taken as a starting-point Plato's four cardinal virtues.
It is interesting to compare Ambrose's account of what subsequently came to be known as the " four cardinal virtues " with the corresponding delineations in Cicero's 3 De officiis which served the bishop as a model.
Under the influence of Ambrose and Augustine, the four cardinal virtues furnished a basis on which the systematic ethical theories of subsequent theologians were built.
In arranging his list, however, he defers to the established doctrine of the four cardinal virtues (derived from Plato and the Stoics through Cicero); accordingly, the Aristotelian ten have to stand under the higher genera of (1) the prudence which gives reasoned rules of conduct, (2) the temperance which restrains misleading desire, and (3) the fortitude that resists misleading fear of dangers or toils.
The four cardinal virtues are represented as forms of wisdom, which again is inseparable from the Mosaic law.
Some authors, combining the two lists, have spoken of the Seven Cardinal Virtues.
preceptive literatures written in that period equated Buddhist morality and the Confucian cardinal virtues.
His father, Dr Jesper Swedberg, subsequently professor of theology at Upsala and bishop of Skara, was a pious and learned man, who did not escape the charge of heterodoxy, seeing that he placed more emphasis on the cardinal virtues of faith, love and communion with God than on the current dogmas of the Lutheran Church.
The word usage examples above have been gathered from various sources to reflect current and historial usage. They do not represent the opinions of YourDictionary.com.
|
<urn:uuid:074c52f0-7338-4fa0-beaa-3c6812cae8c1>
|
{
"dump": "CC-MAIN-2020-50",
"url": "https://sentence.yourdictionary.com/cardinal-virtues",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141216175.53/warc/CC-MAIN-20201130130840-20201130160840-00601.warc.gz",
"language": "en",
"language_score": 0.965956449508667,
"token_count": 590,
"score": 3.328125,
"int_score": 3
}
|
There are a lot of repercussions to the teeth in the mouth of a person battling eating disorders. Such negative effects could include the loss of teeth, gum problems and erosion of the enamel on the tongue side of the teeth due to the acids involved in bulimia. In addition, people with eating disorders lack nutrients that can result in osteoporosis, weakening of the bones in the jaw that support the teeth and this may lead to tooth loss. More so, many individuals with such disorders suffer from bleeding gums, burning of the tongue and dry mouth due to decreased salivary flow and swollen glands.
A dentist’s intervention should take place to treat any damaged teeth. Professional help is received when the dentist knows the patient’s background, particularly regarding an eating disorder, so it’s important to be honest about it.
Eating disorders are on the rise. There are two main kinds of eating disorders, namely, anorexia and bulimia nervosa. Attributed to the fear of gaining weight, people with anorexia nervosa are easily identified with sunken body mass. They usually look very pale, have loose skin and poor dental health. They deprive their body of nutrients which contributes to the reduction in saliva production, an essential process to keep our teeth clean. With dry mouth, cracked lips and eroded teeth, people with anorexia nervosa need a comprehensive dental treatment in order to regain oral health. With bulimia, a person usually goes on a food binge before using various methods to purge the food that has been eaten. Bulimics are at a high risk for tooth decay, tooth loss and gum disease that result from frequent vomiting. The gastric acids erode the enamel of the teeth.
Changes in the mouth are often a physical sign of eating disorders. Regular visits to the dentist would help prevent further damage to eroded teeth. Some treatment options such as crowns, composite bonding or veneers might be recommended to protect the enamel of the teeth from further breakdown.
For more information and other concerns, contact us at 203-612-5529.
|
<urn:uuid:60d72c6e-6157-4da1-a47b-64106bce4c2b>
|
{
"dump": "CC-MAIN-2019-30",
"url": "http://bridgeportfamilydentist.com/2018/09/eating-disorders-affect-teeth/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195524548.22/warc/CC-MAIN-20190716115717-20190716141717-00054.warc.gz",
"language": "en",
"language_score": 0.9414939880371094,
"token_count": 431,
"score": 3.1875,
"int_score": 3
}
|
A dacryocystectomy procedure refers to the complete surgical removal or destruction of the lacrimal sac. It is one of the ways to treat chronic dacryocystitis or lacrimal fistulae when a dacryocystorhinostomy (DCR) procedure is not possible. It is mainly conducted in two ways: an external approach through a skin incision and an endoscopic approach. The two main aims of a dacryocystectomy procedure are –
- To precisely excise the lacrimal sac with minimal concomitant damage to the surround tissues
- To completely excise the lacrimal sac and the nasolacrimal duct without leaving any lacrimal structures behind
Understanding the lacrimal drainage system
The lacrimal drainage system is made up of the puncta, canaliculi, lacrimal sac and the nasolacrimal duct.
- Puncta – These are the small orifices present at the beginning of the canalicular ducts and are known as puncta lacrimalia. Tears or lacrimal fluid produced by the lacrimal glands is collected by the puncta lacrimalia.
- Canaliculi – Ducts connecting the puncta lacrimalia to the lacrimal sac are known as the lacrimal canaliculi. The superior and inferior lacrimal canaliculi are the two types of canaliculi present in each eye.
- Lacrimal sac – This structure is found in the concavity produced by the lacrimal duct and the frontal process of the maxilla. It connects the lacrimal canaliculi, responsible for the collection of tears from the eye, to the nasolacrimal duct that performs the function of transmitting the fluid to the nasal cavity for drainage.
- Nasolacrimal duct – The tear duct, or nasolacrimal duct, acts as the connecting tube between the lacrimal sac and the nasal cavity.
When is a dacryocystectomy necessary?
- It may be a necessary procedure in the case of malignant tumours of the lacrimal sac. It may have significant implications on survival and quality of life
- It may be a necessity for patients with recurrent dacryocystitis with severe dry eyes
- Patients who have severe recurring dacryocystitis concurrent with other medical conditions that predispose nasal scarring such as Crohn’s disease and systematic lupus erythematosus may benefit from a dacryocystectomy
- It is indicated for frail, geriatric patients with dacryocystitis who have other cardiac or neurological problems
- It is necessary in the case of dacryocystitis in elderly patients with other ocular problems such as microbial keratitis, glaucoma or advanced cataract. In such cases, a dacryocystectomy may have impact on visual rehabilitation
- A dacryocystectomy may be necessary for patients who have recurrent dacryocystitis and have undergone multiple dacryocystorhinostomies with poor outcomes.
How is a dacryocystectomy carried out?
- Anaesthetic and adrenaline solution are injected into the area surround the lacrimal sac to be excised.
- An incision is made by the surgeon over the lacrimal sac, along the crease of skin. The incision is kept open with the help of sutures, a small retractor or two retractors. The surgical incision is extended inwards using blunt dissection through the muscle.
- The lacrimal sac is located and carefully dissected, with as much of the associated nasolacrimal duct being excised as far as possible. Any leakage of inflammatory, pus-like substances from the lacrimal sac is cleaned away and disinfected.
- The surgical incision is closed using sutures.
What are the complications associated with a dacryocystectomy?
It is unlikely that you will experience any post-operative complications from the dacryocystectomy procedure. In very rare cases, unintended injury to the angular vein may cause a copious amount of bleeding. However, this is fully avoidable if the surgical incision is made carefully not too close to the location of the angular vein. Other post-operative complications include breaking of the surgical sutures, known as wound dehiscence, infection of the surgical site, increased tearing, and recurring dacryocystitis in the remnant of the lacrimal sac. In some cases, a visible facial scar may remain. In exceedingly rare cases, there may be accidental damage to the surrounding orbital tissues resulting in orbital hemorrhage, hematomas, and potential visual loss.
Although several other surgical procedures such as dacryocystorhinostomy, conjunctivodacryocystorhinostomy have been developed for the treatment of lacrimal drainage disorders, a dacryocystectomy has a very specific set of uses and indications. It can be used as a treatment procedure in the case of lacrimal sac tumours as well as specific cases of recurring dacryocystitis in certain groups of patients.
Dacryocystectomy is a relatively simple and uncomplicated procedure but due to the fragile and sensitive nature of the eye, it must only be performed by an experienced oculoplastic surgeon.
Dr. Debraj Shome is a highly-experience oculoplastic surgeon with several accolades and awards to his name.
|
<urn:uuid:9ce30c4e-3f1a-4048-9c8f-101e7abaf1e0>
|
{
"dump": "CC-MAIN-2019-18",
"url": "http://oculoplastic-eyelid-orbit-surgery.com/service/dacryocystectomy/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578633464.75/warc/CC-MAIN-20190424054536-20190424080536-00310.warc.gz",
"language": "en",
"language_score": 0.9211528897285461,
"token_count": 1165,
"score": 3,
"int_score": 3
}
|
Definition of Azeri in English:
noun (plural Azeris)
1A member of a Turkic people forming the majority population of Azerbaijan, and also living in Armenia and northern Iran.
- Iran has Persian-speaking populations on the central plateau, but on the peripheries are ethnic and religious minorities, including Turkic Azeris, Kurds, Lurs, Arabs, Baluch, Tajiks and Turkmen.
- Approximately 10 million Azeris live in Iran - more than in Azerbaijan.
- Consequently, there are today twice as many ethnic Azeris in Iran as there are in Azerbaijan, with a population of 8 million.
2The Azerbaijani language.
- Today, young people have the greatest chances of getting the best jobs if they speak three languages: Azeri, Russian, and English.
- Linguistically, it is close to Azeri, Turkish, and Uzbek.
- Until 1926, Azeri was written in Arabic script, which then was replaced by the Latin alphabet and in 1939 by Cyrillic.
adjectiveBack to top
Relating to the Azeris or their language.
- But the consortium of oil companies, called Azerbaijan International Operating Company, claimed that they paid Azeri leaders for the same block $400 million in bonuses.
- Because of decades of Soviet rule, she said, few Azeris have a sound knowledge of Islam, although Islam remains an integral part of Azeri identity.
- In the absence of Kazak oil the commercial viability of Baku-Jeyhan will continue to rest solely on the availability of additional Azeri oil.
From Turkish azerî.
Words that rhyme with Azeriairy, canary, carabinieri, Carey, Cary, chary, clary, contrary, dairy, Dari, faerie, glairy, glary, Guarneri, hairy, lairy, miserere, nary, Nyerere, prairie, Salieri, scary, Tipperary, vary, wary
Definition of Azeri in:
- British & World English dictionary
What do you find interesting about this word or phrase?
Comments that don't adhere to our Community Guidelines may be moderated or removed.
|
<urn:uuid:54ff3084-894b-43b0-83d2-3bb76ce851fe>
|
{
"dump": "CC-MAIN-2015-22",
"url": "http://www.oxforddictionaries.com/us/definition/american_english/Azeri",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207924799.9/warc/CC-MAIN-20150521113204-00011-ip-10-180-206-219.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9215472936630249,
"token_count": 467,
"score": 3.1875,
"int_score": 3
}
|
A diverticulum is an abnormal out-pouching or pocket forming off the wall of the gastrointestinal wall. A Zenker’s diverticulum is a pouch that forms in the throat at the very beginning of the digestive tract just above the upper esophageal sphincter (UES).
The cause of Zenker’s diverticulum is abnormal tightening of the upper esophageal sphincter (also called the cricopharyngeus muscle). As a result of tightening of this muscle, pressure builds along the wall of the throat above this sphincter muscle. Just above this muscle there is a relative weak point of the throat wall and the diverticulum forms as a result of the relative increased pressure exerted on this weak area during swallowing. Because the UES below the pouch is tighter than normal, food and liquids are harder to pass into the esophagus and instead tend to pass into the diverticulum pocket or even back into the throat causing regurgitation.
Symptoms include difficulty swallowing, feeling swallowed material sticking in the throat, regurgitation, weight loss, bad breath, choking, and coughing. Swallowed material may accumulate in the diverticulum and be regurgitated long after a meal. Pills may be difficult to swallow. Some people with a Zenker’s diverticulum may have only mild symptoms but over time the pouch continues to grow and becomes more symptomatic.
Zenker's diverticulum is diagnosed during upper endoscopy (EGD) or esophagram (aka barium swallow), or a modified barium swallow study (aka videofluoroscopic swallow study) (see figure). These tests complementary during investigation of swallowing problems.
The goal of treatment of Zenker’s diverticulum is to relieve the obstruction to swallowing caused by the tight UES and eliminate the preferential passage and accumulation of swallowed material into the diverticulum. For a large or complicated diverticulum, open neck surgery may be necessary to remove the diverticulum sac (Zenker’s diverticulectomy), but most patients with symptomatic Zenker’s diverticulum are now treated in a minimally invasive endoscopic approach. Endoscopic cricopharyngeal myotomy (diverticulotomy) has become a primary and important means of treatment of Zenker’s diverticulum. This procedure involves cutting the tight UES muscle and the party wall between the esophagus and the pouch to eliminate the obstruction. This procedure remodels the anatomy of the esophagus relative to the diverticulum so that swallowed material easily passes from the diverticulum into the esophagus.
|
<urn:uuid:6e0607ba-f3ba-48c3-b1f8-caa8b1d7747d>
|
{
"dump": "CC-MAIN-2019-47",
"url": "https://www.uclahealth.org/esophageal-center/zenkers-diverticulum",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496669730.38/warc/CC-MAIN-20191118080848-20191118104848-00015.warc.gz",
"language": "en",
"language_score": 0.9067990779876709,
"token_count": 553,
"score": 3.109375,
"int_score": 3
}
|
Authors: George Rajna
Emotional experiences can induce physiological and internal brain states that persist for long periods of time after the emotional events have ended, a team of New York University scientists has found. Using atomic-scale quantum defects in diamonds known as nitrogen-vacancy (NV) centers to detect the magnetic field generated by neural signals, scientists working in the lab of Ronald Walsworth, a faculty member in Harvard's Center for Brain Science and Physics Department, demonstrated a noninvasive technique that can image the activity of neurons. Neuroscience and artificial intelligence experts from Rice University and Baylor College of Medicine have taken inspiration from the human brain in creating a new "deep learning" method that enables computers to learn about the visual world largely on their own, much as human babies do.
Comments: 40 Pages.
[v1] 2016-12-26 12:36:25
Unique-IP document downloads: 12 times
Add your own feedback and questions here:
You are equally welcome to be positive or negative about any paper but please be polite. If you are being critical you must mention at least one specific error, otherwise your comment will be deleted as unhelpful.
|
<urn:uuid:b15d5c49-7779-4ba3-9a76-798b64918e79>
|
{
"dump": "CC-MAIN-2017-13",
"url": "http://vixra.org/abs/1612.0348",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218186841.66/warc/CC-MAIN-20170322212946-00071-ip-10-233-31-227.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.919822633266449,
"token_count": 243,
"score": 2.71875,
"int_score": 3
}
|
St. James the Less, the author of the first Catholic Epistle, was the son of Alphaeus of Cleophas. His mother Mary was either a sister or a close relative of the Blessed Virgin, and for that reason, according to Jewish custom, he was sometimes called the brother of the Lord. The Apostle held a distinguished position in the early Christian community of Jerusalem. St. Paul tells us he was a witness of the Resurrection of Christ; he is also a "pillar" of the Church, whom St. Paul consulted about the Gospel.
According to tradition, he was the first Bishop of Jerusalem, and was at the Council of Jerusalem about the year 50. The historians Eusebius and Hegesippus relayed that St. James was martyred for the Faith by the Jews in the Spring of the year 62, although they greatly esteemed his person and had given him the surname of "James the Just."
Tradition has always recognized him as the author of the Epistle that bears his name. Internal evidence based on the language, style, and teaching of the Epistle reveals its author as a Jew familiar with the Old Testament, and a Christian thoroughly grounded in the teachings of the Gospel. External evidence from the early Fathers and Councils of the Church confirmed its authenticity and canonicity.
The date of its writing cannot be determined exactly. According to some scholars it was written about the year 49 A.D. Others, however, claim it was written after St. Paul's Epistle to the Romans (composed during the winter of 57-58 A.D.). It was probably written between the years 60 and 62 A.D.
St. James addresses himself to the "twelve tribes that are in the Dispersion," that is, to Christians outside Palestine; but nothing in the Epistle indicates that he is thinking only of Jewish Christians. St. James realizes full well the temptations and difficulties they encounter in the midst of paganism, and as a spiritual father, he endeavors to guide and direct them in the faith. Therefore, the burden of his discourse is an exhortation to practical Christian living.
St. Monica was married by arrangement to a pagan official in North Africa, who was much older than she, and although generous, was also violent tempered. His mother Lived with them and was equally ... continue readingMore Saint of the Day
- "excerpts taken from Victories of the Martyrs," by St. Alphonsus de Liguori Taken from the Acts of St. Anastasia, who is mentioned in the Canon of the Mass, and commemorated by the Church [old calendar] on December 25, St. Anastasia was a spiritual child of St. ... continue readingMore Female Saints
St. Michael the Archangel - Feast day - September 29th The name Michael signifies "Who is like to God?" and was the warcry of the good angels in the battle fought in heaven against satan and his followers. Holy Scripture describes St. Michael as "one of the chief ... continue reading
The name Gabriel means "man of God," or "God has shown himself mighty." It appears first in the prophesies of Daniel in the Old Testament. The angel announced to Daniel the prophecy of the seventy weeks. His name also occurs in the apocryphal book of Henoch. He was the ... continue reading
St. Thomas Aquinas, priest and doctor of the Church, patron of all universities and of students. His feast day is January 28th. He was born toward the end of the year 1226. He was the son of ... continue reading
By Deacon F.K. Bartels
It is true that the creature loves less because she is less. But if she loves with her whole being, nothing is lacking where everything is given. To love so ardently then is to share the marriage bond; she cannot love so much and not be totally loved, and it is in the ... continue readingMore Christian Saints & Heroes
|
<urn:uuid:3110a1f5-eb51-43e6-9c70-30099bf9e41b>
|
{
"dump": "CC-MAIN-2014-35",
"url": "http://catholic.org/saints/saint.php?saint_id=356",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500829393.78/warc/CC-MAIN-20140820021349-00288-ip-10-180-136-8.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9818198084831238,
"token_count": 816,
"score": 2.703125,
"int_score": 3
}
|
62 Pages Posted: 13 Nov 2009 Last revised: 15 Dec 2009
The current eclectic mix of solutions to the juvenile-crime problem is insufficiently conceptualized and too beholden to myths about youth, the crimes they commit, and effective means of responding to their problems. The dominant punitive approach to juvenile justice, modeled on the adult criminal justice system, either ignores or misapplies current knowledge about the causes of juvenile crime and the means of reducing it. But the rehabilitative vision that motivated the progenitors of the juvenile court errs in the other direction, by allowing the state to assert its police power even over those who are innocent of crime. The most popular compromise theory of juvenile justice - which claims that developmental differences between adolescents and adults make the former less blameworthy - is also misguided because it tends to de-emphasize crime-reducing interventions, overstate the degree to which adolescent responsibility is diminished, and play into the hands of those who would abolish the juvenile justice system, since it relies on the same metric - culpability - as the adult criminal justice system. This Article argues that, with some significant adjustments that take new knowledge about the psychological, social, and biological features of adolescence into account, the legal system should continue to maintain a separate juvenile court, but one that is single-mindedly focused on the prevention of criminal behavior rather than retributive punishment.
Keywords: juvenile justice, prevention, retribution, Hendricks
Suggested Citation: Suggested Citation
Slobogin, Christopher and Fondacaro, Mark R., Juvenile Justice: The Fourth Option. Iowa Law Review, Vol. 95, No. 1, 2009; Vanderbilt Public Law Research Paper No. 09-29. Available at SSRN: https://ssrn.com/abstract=1504251
|
<urn:uuid:f9c382e6-427a-479e-aba1-ec623c1a63af>
|
{
"dump": "CC-MAIN-2017-43",
"url": "https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1504251",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187825264.94/warc/CC-MAIN-20171022132026-20171022152026-00540.warc.gz",
"language": "en",
"language_score": 0.9218109250068665,
"token_count": 367,
"score": 2.96875,
"int_score": 3
}
|
This exhibition is part of ATA’s Laffer Curatorial Program, funded by a generous donation from Christine Laffer.
Essay by Ulrikka Mokdad
The Petrovaradin Fortress stands on the top of a cliff on the right bank of the Danube. On the left side of the mighty river lies the city of Novi Sad, the second largest city in Serbia and the administrative seat of the province of Vojvodina. When the fortress that dates back to the 17th century, had no longer any military significance after World War II, the army moved out in 1952 and large parts of Petrovaradin were transformed into artists’ studios.
In 1961, some of the residing artists decided to set up a workshop where professional weavers were to create tapestries from artists’ cartoons. Especially the renowned painter Boško Petrović together with textile artisan Etelka Tobolka took an active share in establishing the Atelje 61, as the workshop was named. Petrović, Tobolka and the others were inspired by the re-creation of European tapestry art, which had taken place in the French tapestry workshops of Aubusson during 1936-1945 under the leadership of Jean Lurcat. An exhibition of French tapestry art that was shown in Belgrade in 1953 made an indelible impression on Petrović, and became crucial for his idea of introducing woven tapestry as an art form in Yugoslavia.
The newly established workshop Atelje 61 came to occupy Boško Petrović’s empty studio in the middle of the Long Baracks of Petrovaradin, where the workshop can still be found today.
During the first decades, the financial situation of the workshop and its staff was often insecure. A number of times Atelje 61 faced the threat of being closed down. In 1980, however, the Atelje 61 was recognized as a Labour Organization for the Making of Tapestries of Special Importance to Society, and the City assembly of Novi Sad signed itself as its founder.
As Serbia and the rest of Yugoslavia had proud traditions of flat-woven rugs in kilim technique, it was not difficult for Petrovic and Tobolka to find capable weavers among the inhabitants of Novi Sad. Opposite to the workshops of Aubusson, where tapestry weaving had been carried out by male artisans since the Middle Ages, weaving was considered women’s work in former Yugoslavia. Thus, the first generation of Atelje 61 weavers working in the 1960es and 1970es were weavers who had learned the craft from their mothers. The present permanent staff of eight talented weavers have a very different background compared to the first generation of weavers. They have all received artistic education at the Novi Sad School of Design “Bogdan Suput”, except for Ewa Kozielska Djukic who is originally from Poland and who has been trained at the renowned tapestry school in Zakopane. Ewa moved to Serbia at a young age and she has worked at Atelje 61 since 1984. She teaches all the weavers how to work at the high-warp loom and quite often, she still weaves the most challenging parts and details of the tapestries. During its more than fifty years of existence, the incredibly skilled weavers of the Atelje 61 workshop have produced more than 800 tapestries designed by more than 200 different artists. Every single artwork produced in the workshop is marked, not only with the cartoon artist’s initials, but also with Atelje 61’s monogram in the lower left corner. On the reverse side of each tapestry, the production year and the weavers’ names are attached.
In the workshop, four very large and solid high-warp looms are located, each one of them can be set up for tapestries up to about 4 meters wide. The looms are set up with a thick un-bleached cotton warp from a Serbian spinning mill. Most tapestries are woven with 7.6 epi, but in special cases cartoons with large amounts of very small details require a closer set up of 10.1 epi and a slightly thinner warp. The tapestries are woven face up, and instead of working with bobbins, the weavers use butterflies of yarn for the weft, which is beaten down by ordinary table forks. Most of the weft yarns are made of wool, sometimes un-raveled, though also linen, cotton, silk and other materials, such as plastic or tapes, may be used depending on the wishes of the authors.
The tapestry colonies
In 1988, the Museum Collection of Atelje 61 was founded, and by that time, a cataloguing began of the almost 100 tapestries in the workshop’s stock. At present, the Museum Collection consists of more than 260 artworks, most of them designed by famous Yugoslav painters. In recent years, however, quite a few foreign artists have been invited to Novi Sad in order to supply the weavers with new cartoons for weaving. After weaving, all cartoons are stored in a special storeroom, while the new tapestries woven from the guest artists’ cartoons enter the Museum Collection. Ten years later, in 1998, The Atelje 61 started to arrange the so-called Boško Petrović tapestry colonies in order to develop and encourage the art of tapestry. Every second year, a small group of artists are invited to stay and work at the Petrovaradin Fortress for ten days. Each participant must prepare a sketch for one cartoon, enlarge it to full size on brown paper and then colour it during the time of the colony. For the first colonies almost all of the participants were artists from the academies of Novi Sad and Belgrade, but recently the tapestry colonies have become more international with invited guests from the Croatia, Slovenia, Finland, Bulgaria, Canada, The Netherlands, Ukraine, Hungary, Romania, Poland and, in 2014, also from Denmark.
Back in June 1962, the 19 very first tapestries produced by Atelje 61 were exhibited at the Army Hall in Belgrade, and already in July the same year, they were presented to the public of Novi Sad at the Matica Srpska Gallery. The first twenty years of the workshop’s existence were characterized by an intense exhibition activity. Thus, the tapestries travelled around the globe and were exhibited in museums as brilliant ambassadors of Yugoslav textile art. The tapestries were sent all the way to Rio de Janeiro in 1963, and the following year they reached Sao Paulo and Mexico City. In 1964, a number of the tapestries were shown in Scandinavia as part of the exhibition “Yugoslav Rugs and Ceramics”. From 1967-1969 a travelling exhibition named “Yugoslavian Tapestries” was shown at 14 different art galleries and museums of the US, including the Smithsonian Institution, Washington DC.
About 1980, however, the number of exhibitions began to decrease and fewer invitations came from the galleries and museums in foreign countries. The 1990es became a quiet decade when it comes to exhibition activity, while the world surrounding the Petrovaradin Fortress and the tapestry workshop broke into flames due to nationalist tensions between different ethnic groups of former Yugoslavia. The tensions turned into a violence that resulted in several wars – and finally led to the division of the Socialist Federal Republic of Yugoslavia. In recent years, the number of exhibitions have begun to increase again, although most shows take place in Novi Sad and Belgrade as well as the neighboring countries Hungary, the Czech Republic, Romania and Slovenia. One can only express the sincere hope that once again the large museums all over the world will send for the tapestries of Atelje 61, thereby allowing new generations of spectators to experience this unique textile heritage.
|
<urn:uuid:69ffe179-5ece-400c-9bb5-9b8d5150b4aa>
|
{
"dump": "CC-MAIN-2019-43",
"url": "https://americantapestryalliance.org/exhibitions/tex_ata/tapiserije-the-art-of-atelje-61-in-vojvodina-serbia/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986672723.50/warc/CC-MAIN-20191017045957-20191017073457-00037.warc.gz",
"language": "en",
"language_score": 0.97215336561203,
"token_count": 1647,
"score": 2.796875,
"int_score": 3
}
|
The Ottoman Empire and Religion
Covering parts of three continents, the Ottoman Empire was at its peak of its power between the sixteenth and seventeenth century. It was also known as the Ottoman state and it existed from around the year February 1299 to the 1st of November the year 1922.It was founded under the leadership of Osman, a man believed to have been given the vision to establish this magnificent empire. It is a myth that is still being held by the people of the region today.
The modern day position of the Ottoman Empire is Turkey.Also, the modern day Turks are the citizens of the Ottoman Empire. The leadership after Osman took up the title Sultan and this together with the Caliphate system formed the highest ranking administrative positions in the empire. Leadership was hereditary meaning that it was transferred from father to son. By many accounts, this empire has been displayed as an Islamic establishment. But it had significant differences with the other Islamic establishments that existed during this time.
The judicial system of this empire was quite accommodative for an Islamic system. It had Islamic courts which were the primary courts and they formed the cornerstone of administration in the empire. But there were also other courts that were not based on Sharia law and were meant for the interpretation of the law as understood by non-Muslims who were part of the empire. They included Jews and Christians who had been welcomed to the empire and lived in groupings called millets. But the Jews and Christians had the freedom to take their cases to the Islamic courts if they wanted to and many did as a way of giving judicial credence to their cases, given the immense unofficial respect that was given to the Islamic courts. It should be noted that this recognition was informal and any decision from the other courts were equally respected in the empire.
The third type of courts was the trade/commercial/industrial or business courts. In these courts, disputes emanating from business within the empire were solved. The parties involved determined the inclination and sometimes, both Islamic law experts and Christian and Jewish judicial officers would sit side by side and decide a case. They were more concerned with securing justice and fairness and religion was never a key consideration. New laws into the three types of courts came from the top leadership as well as the judicial experts of the three courts. The stand of the citizens of the empire was key in coming up with new laws and the emperor always ensured that any new laws were people-friendly.
The differences between the Ottoman Empire and other Islamic establishments of the time include the lifestyle of the people that had both western and eastern European elements instead of Asian or Middle Eastern like most Islamic states of the time. Most Islamic entities of that time detested western cultural influences and made it mandatory for their citizens to adhere to the Islamic way of life. The system was also very tolerant in terms of religion to the extent that they allowed Jews and Christians to worship freely without being persecuted. In other Islamic states of that time it is only Sharia law that was recognized and members of other groups were subjected to great persecution especially on the grounds of religion. Plurality was accepted and considered a strength instead of a weakness that would have torn the empire apart.
|
<urn:uuid:f8c5b338-a22b-45ae-a2c9-949f15018644>
|
{
"dump": "CC-MAIN-2019-04",
"url": "https://specialessays.com/the-ottoman-empire-and-religion/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547584415432.83/warc/CC-MAIN-20190123213748-20190123235748-00347.warc.gz",
"language": "en",
"language_score": 0.9900718927383423,
"token_count": 641,
"score": 3.984375,
"int_score": 4
}
|
Freedom from Discrimination and Electoral Dispute Resolution
- Procedures for the filing and adjudication of disputes must be understandable and easily accessible to all parties.
- The guarantee to equality before the courts extends to judicial bodies entrusted with any judicial task (including customary and religious courts).
- All are equal before the law, and laws should be equally enforced.
- Equality before the courts includes equality in arms and equal access to the courts.
- Fees that de facto prevent access to the courts may violate the obligation of equal access to the courts.
- Redistricting should not discriminate against any citizen on the basis of race, color, sex, language, religion, political or other opinion, national or social origin, property, birth, sexual orientation, or gender identity, disability, or other status.
- The state must perform both its "negative duty" to refrain from discrimination and its "positive duty" to prevent discrimination.
- Discrimination must not be practiced based on race, color, sex, language, religion, political or other opinion, national or social origin, property, birth, sexual orientation, disability, gender identity and expression, migrant, refugee, repatriate, stateless or internally displaced status, genetic trait, mental or physical health condition, including infectious contagious condition and debilitating psychological condition, or other status at any time.
|
<urn:uuid:e56ffce5-c2c4-4215-bfc4-086d53cafa15>
|
{
"dump": "CC-MAIN-2019-26",
"url": "https://eos.cartercenter.org/issues/841",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998339.2/warc/CC-MAIN-20190617002911-20190617024911-00178.warc.gz",
"language": "en",
"language_score": 0.8767135143280029,
"token_count": 269,
"score": 3.25,
"int_score": 3
}
|
Hot flashes can have various causes, ranging in severity from 'worrying' to 'very serious'. Finding the true cause means ruling out or confirming each possibility – in other words, diagnosis.
Diagnosis is usually a complex process due to the sheer number of possible causes and related symptoms. In order to diagnose hot flashes, we could:
|Low Progesterone||4%||Ruled out|
|Adrenal Fatigue||0%||Ruled out|
Do you experience hot flashes and, if so, when do they occur?
Possible responses:→ Not applicable / don't know
→ No, I do not experience hot flashes
→ Yes, during or around time of period only
→ Yes, between periods only
→ Yes, both during and between periods
Adrenal estrogen seems to be necessary to avoid hot flashes during normal menses when the ovarian production of estrogen drops. Hot flashes during menses may be a symptom of mild adrenal cortex deficiency.
|
<urn:uuid:ffa5deaa-ae5a-4e23-924b-5e9beda9c4e7>
|
{
"dump": "CC-MAIN-2018-43",
"url": "https://www.diagnose-me.com/what-causes/hot-flashes.php",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583511314.51/warc/CC-MAIN-20181017220358-20181018001858-00416.warc.gz",
"language": "en",
"language_score": 0.8329626321792603,
"token_count": 206,
"score": 2.9375,
"int_score": 3
}
|
Anatidae is the biological family that includes the ducks and most
duck-like waterfowl, such as geese and swans. These are birds that
are modified for swimming, floating on the water surface, and in
some cases diving in at least shallow water.
They have webbed feet and bills which are flattened to a greater
or lesser extent. Their feathers are excellent at shedding water
due to special oils. Anatidae are remarkable for being one of the
few families of birds that possess a penis; they are adapted for
copulation on the water only and care must be taken when breeding
ducks or geese that a pool is provided for this purpose as attempts
to copulate on dry land will often lead to injury of the drake's
penis. Duck, eider and goose feathers and down have long been popular
for bedspreads, pillows, sleeping bags and coats. The members of
this family also have long been used for food.
While the status of the Anatidae as a family is straightforward,
and there is little debate about which species properly belong to
it, the relationships of the different tribes and subfamilies within
it are poorly understood. The listing in the box at right should
be regarded simply one of several possible ways of organising the
many species within the Anatidae.
All text is available under the terms
of the GNU Free Documentation License
|
<urn:uuid:d675b22b-ac37-4d81-a13d-a75282846a07>
|
{
"dump": "CC-MAIN-2014-23",
"url": "http://www.sheppardsoftware.com/content/animals/groups/profile_long_waterfowl.htm",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997880800.37/warc/CC-MAIN-20140722025800-00222-ip-10-33-131-23.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.952854573726654,
"token_count": 294,
"score": 3.125,
"int_score": 3
}
|
What Eats a Holly Bush?
Hollies (Ilex spp.) are evergreen shrubs hardy in U.S. Department of Agriculture plant hardiness zones 5 through 11, depending on the species. The most recognizable holly is the type used in holiday decor. This variety has dark green foliage and sharp spines along the leaf edges. Female plants will produce red or yellow fruits, which are also valued for their ornamental qualities. The Japanese hollies (Ilex crenata), growing in USDA zones 5 through 8, bear little resemblance to these hollies, and actually look more like a boxwood shrub (Buxus spp.), which grows in USDA zones 6 through 8 depending on species, than a holly. These hollies have small, deep green leaves and are smaller in stature than the ones with spiny leaves, and bear black or cream-colored fruits. They are subject to a number of insect pests.
Scale is an insect that protects itself with a waxy coating, which can be white, tan or brown. The insect resides under the coating it creates, sucking the sap from plants by inserting its mouth parts into the holly leaves or stems. Because of their waxy coating, scales are often difficult to eradicate with contact pesticides. Insecticides are more successful if they contain ingredients that dissolve the waxy shells or if the plant is treated while scale insects are in the crawler stage. Controls include insecticidal soaps, horticultural oils or systemic insecticides.
Leafminers deform holly leaves by leaving serpentine trails between the upper and lower layers of the leaf. The leafminers are the larvae of a small black fly that punctures the leaf to lay its eggs. These eggs hatch, and leafminers tunnel through the leaves, eating the flesh. Because they are inside the leaf, contact insecticides are rarely effective. If infestations are light, simply pick the leaf off and destroy it. Otherwise, systemic insecticides are most effective, because they work through the system of the plant and the leafminer can't avoid the effects.
Spider mites are tiny spider-like insects that may not be easy to spot. They generally reside under the holly leaf and pierce the leaf surface to suck out leaf juices. Symptoms include leaf stippling, leaf yellowing and the presence of fine webbing. Southern red mites are about the same size as spider mites and feed the same way, but are primarily found in the southern United States. Light infestations can be controlled by spraying the plant with a strong stream of water. Other controls include insecticidal soap, horticultural oils or several general-purpose insecticides labeled for mites. Contact insecticides should be applied once and then applied again about 10 days later to kill new hatchlings. Systemic insecticides can be used to prevent further infestations.
Holly loopers are caterpillars that eat the edges of holly leaves, leaving behind unsightly notches. Weevils also leave notches, but they are often round. Weevils live in the soil or in leaf debris and emerge to eat holly leaves at night, making control difficult. Weevil grubs feed on the roots. Insecticidal soil drenches may kill them at the root, while pyrethroids may kill them when they emerge to eat. Spittlebugs leave spittle-like deposits on leaves, and reside under them. They feed on leaves or stems. Spittlebugs can be picked off plants or removed with a strong spray of water. Mealybugs form white, cotton-like coatings over themselves as they suck the plant juices, and can be controlled with insecticidal soaps.
- University of Rhode Island: Hollies
- Clemson Cooperative Extension: Holly Diseases and Insect Pests
- University of California: Holly -- Ilex spp.
- North Carolina State University: Some Major Arthropod Pests of Holly
- Pacific Northwest Insect Management Handbook: Japanese Holly (Ilex) -- Spider Mite
- Fine Gardening: Genus Ilex (Holly)
- Virginia Tech: Japanese Holly
- Jupiterimages/Creatas/Getty Images
|
<urn:uuid:34c67563-144e-4de9-a880-7b428a2aa538>
|
{
"dump": "CC-MAIN-2020-45",
"url": "https://homeguides.sfgate.com/eats-holly-bush-73756.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107890586.57/warc/CC-MAIN-20201026061044-20201026091044-00507.warc.gz",
"language": "en",
"language_score": 0.932030439376831,
"token_count": 864,
"score": 3.546875,
"int_score": 4
}
|
BENEDICT XIII. (PEDRO DE LUNA):
Antipope; born at Aragon about 1334; elected Sept. 28, 1394; died at Peñiscola June 1 (according to some, Nov. 29), 1424. This "unfrocked and spurious pope," as he was termed by the Council of Constance which deposed him (1415), caused much suffering to the Jews. Zealous for their conversion, he shrank from no measures to bring about this result. While he was still a cardinal he forced ShemṬob ben Isaac Shaprut to appear at Pamplona before an assembly of bishops and high ecclesiastics in order to debate the question of original sin and salvation.
This zeal for conversion and controversy was encouraged by the baptized Jew, the unfrocked rabbi Salomon Levi Burgos (called by his Christian name Pablo de Santa Maria), and Benedict's physician, Joshua Lorqui, whose Christian name was Geronimo de Santa Fé. They persuaded their master that they were able to demonstrate from the Bible and the Talmud that the Messiah had already come in the person of Jesus.The Tortosa Controversy.
Benedict, who had perjured himself in order to save his tiara, hoped to atone for his sin before Christendom by a splendid deed, such as the conversion of the Jews en masse. He therefore summoned the Jewish notables to a controversy at Tortosa. Twenty-two of the chief Aragonese Jews answered the summons, and assembled at Tortosa Feb. 6, 1413. At first Benedict treated them with kindness; but seeing, in the course of the debates, that he could not hope to convert them by persuasion, he threw off his mask and vented his wrath on the Talmud. When all means of converting them were exhausted without bringing about the desired results, he dismissed them in anger.Bull of 1414.
The consequence of this unprecedented controversy, which extended over a year and nine months (Feb. 6, 1413, to Nov. 12, 1414), was the issuance of an anti-Jewish bull containing eleven clauses. By the terms of this bull the Jews were prohibited from studying the Talmud and Talmudical literature. All copies of the Talmud were confiscated. The communities were forbidden to build more than one synagogue poorly equipped. The Jews were not allowed to eat, bathe, or trade with Christians. They were not to hold any public office; not to follow any handicrafts, nor even to practise medicine. They were compelled to wear a red or a yellow badge, and three times a year, during Advent, at Easter, and in the summer, they were to attend Christian sermons.
Benedict, being just then deposed by the Council of Constance, did not live to see his bull enforced, but it bore its fruits; and the sad end of the Jews of Spain was due to this schismatic pope and the schismatic rabbi Burgos.
- Ibn Verga, Shebeṭ Yehudah, ed. Wiener, pp. 68-73;
- Halberstamm, in Jeschurun, vi. 45 et seq.;
- Basnage, Histoire des Juifs, vii. ch. 5;
- Beugnot, Les Juifs d'Occident, p. 108;
- Bédarride, Les Juifs en France, en Italie, et en Espagne, p. 276;
- Grätz, Gesch. der Juden, viii. 122 et seq.
|
<urn:uuid:d49c8265-ac51-44d5-8db3-44201a211ee8>
|
{
"dump": "CC-MAIN-2015-11",
"url": "http://www.jewishencyclopedia.com/articles/2924-benedict-xiii-pedro-de-luna",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936464876.43/warc/CC-MAIN-20150226074104-00174-ip-10-28-5-156.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.971287190914154,
"token_count": 755,
"score": 2.765625,
"int_score": 3
}
|
• Briar Lipson is a research fellow for the New Zealand Initiative.
The primary teachers' union NZEI reports that partnership schools attract two to three times as much funding as state schools. But the Ministry of Education, in its role as referee, has always maintained funding is equivalent across both school types. So what exactly is going on?
It appears that when partnership schools were first introduced, the ministry's funding formula, though neutral on paper, was overly simplistic. As a result small partnership schools received more annual funding than comparable state schools. Since then the model has been updated. But so have the formulae for pre-opening funding such that now partnership schools receive less money during start-up than comparable new state schools.
To understand how all of this works, we have to delve into the details.
Partnership schools receive three main funding lines. First is their teaching and operating grant. To ensure neutrality of funding this was originally calculated using the total salary and operating costs of all state schools. However the formula was flawed, because not many state schools are as small as partnership schools in their early years of opening.
This meant the partnership schools that opened with small rolls in 2014, 2015 and 2016 benefited from far more in their teaching and operating grant than similar state schools.
Compounding this was the impact of guaranteed minimum rolls. These are best-estimates of a partnership school's annual roll used to determine yearly funding.
Although in established state schools such estimates are usually pretty accurate, in some new partnership schools they proved to have been set too high. The effect of this was to push up their per-pupil funding above that in similar state schools.
In response, since 2017 the rules have changed so that guaranteed minimum rolls apply only for the first year rather than the first three years, and the formula now generates an accurate match with the funding of small state schools.
Next, partnership schools must be compensated for the fact that, unlike new state schools, they are not given premises. Instead the ministry pays partnership schools an annual property grant beginning six months before they open.
Originally, to ensure equivalence with new state schools' permanent buildings, the property grant was calculated based on the number of children the school would serve when full. But since 2017 this was reduced so that the property grant is now calculated annually, according only to the proposed roll for that year.
Because they are untested, new schools rarely open with their maximum rolls. Accordingly, partnership schools now attract less property funding than before, and less than creates equivalence with new state schools. So much less in fact, that in future some partnership schools may have to open in temporary premises.
The final part of partnership schools' funding is their establishment grant. This covers the costs of set-up, and the principal's salary in the pre-opening phase.
However, although new state schools receive the principal's salary for five terms before opening, partnership schools only received it for two. This finally changed last month so that it is now in line with new state schools, but still large discrepancies remain.
New state schools attract pre-opening funding for an additional two or three senior management staff for up to a year before opening, as well as the balance of teaching staff for one term. These advantages are yet to be extended to partnership schools.
So with some mishaps along the way, the ministry has been learning on the job how to fund partnership schools. From this year their teaching and operating grant aligns with the realities faced by small state schools. But their property and establishment grants now put them at a disadvantage.
Before a new school opens, everything must be in place: from the content of the curriculum, to what shorts students wear for PE; from induction in kaupapa Maori to what number to call when a child is unwell. There are thousands of decisions to be made, from the everyday to the extraordinary.
The opportunity for a principal to delegate some of these to another salaried person, let alone a team, could make a sizeable difference. Similarly, for a child from a chaotic family, the opportunity for a teacher to visit their home during the term before Christmas could make all the difference between a positive or otherwise start at their new school.
It goes without saying that funding for state and partnership schools should be neutral. As referee, the ministry still has work to do to create that level playing field. Once achieved then the game can proceed, and the results be left to speak for themselves.
|
<urn:uuid:8ca12c57-f3aa-490f-bcab-1170398efe71>
|
{
"dump": "CC-MAIN-2021-49",
"url": "https://www.nzherald.co.nz/nz/briar-lipson-charter-schools-no-longer-favoured-by-grants-formula/3C355I6WTSS7K5TEG22US2F5QQ/?c_id=1&objectid=11882077&ref=art_readmore",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363689.56/warc/CC-MAIN-20211209061259-20211209091259-00514.warc.gz",
"language": "en",
"language_score": 0.9791519641876221,
"token_count": 919,
"score": 2.671875,
"int_score": 3
}
|
What major league baseball can and cannot teach us about air pollution impacts.
I am not a follower of major league baseball. I can’t tell you who’s up this season. I don’t know an ERA from an RBI. But this new paper, which takes a deep dive into baseball “sabermetrics”, has piqued my interest in the sport. Turns out, America’s favorite pastime has something to teach us about America’s most important environmental health risk: air pollution.
If you are a follower of air pollution research, you know that air pollution has been linked to a long list of bad outcomes (e.g. premature mortality and dementia). You may also know these studies can be controversial. One reason is that it can be difficult to definitively establish a causal relationship. For example, if people living in areas with bad air quality are also exposed to more than their fair share of other stressors (such as poverty or limited healthcare), we risk confusing the effects of air pollution with other drivers.
A related issue is that researchers often use private data on individuals’ health outcomes and medical histories to help disentangle the effects of air pollution from other factors. A troubling debate is brewing over how research using confidential data, dubbed “secret science” by the recently departed EPA administrator, can be used to inform air pollution standards and regulations.
What does any of this have to do with baseball? Every so often, clever researchers spot the research design equivalent of a four-leaf clover. A situation where variation in pollution exposure is as-good-as randomly assigned, and all the data needed to test for causal impacts are out there in the wide-public-open. One of these rare opportunities has recently been found in major league baseball by economists (and baseball fans) James Archsmith, Anthony Heyes, and Soodeh Saberian.
Bad Calls on Air Pollution?
To understand what this paper is doing, you need to know something about major league umpires. I have recently learned that umpires work 142 games during a typical season. The umpire behind home plate makes about 140 split-second calls between a ball and a strike per game.
This is a high-stress, high-stakes job. It requires skill and effort and sustained concentration. And thick skin given the vitriol of baseball enthusiasts contesting bad calls.
As for research enthusiasts, this provides a terrific setting for assessing how short-term exposure to air pollution affects work performance and cognitive ability. There are at least four reasons I can get excited about this research set-up:
- Pollution exposure varies across games: Air pollution levels vary significantly across time and across baseball stadium locations. This allows researchers to observe umpires performing the same stressful task under very different air quality conditions.
- Random assignment of umpires to game locations!: Where a given umpire is working on a given day is determined before the season starts using an optimization algorithm that rotates umpires across 30 different stadiums (subject to cost and logistics constraints). Upshot is that umpires are as good as randomly assigned to stadiums – and air pollution levels.
- Detailed measures of job performance: Since 2008, MLB ballparks have used high-precision pitch-tracking technology called PITCHf/x to objectively assess umpire performance. Pitch-by-pitch data track every ball thrown and ever call made by every MLB umpire since 2008. That’s a lot of balls and strikes!
- Public data!: If you are an econometrician interested in assessing air pollution impacts, you can download air pollution monitor data from hundreds of active PM2.5 monitors around the country. If you are a sabermatrician interested in umpire performance, you can download PITCHf/x data.
Screen capture of an MLB game taken from Archsmith et al. (2018). The graphic uses the PITCHf/x data to show the locations of all pitches thrown during this at-bat relative to the strike zone.
To sum up, these authors use publicly available data to estimate a causal relationship between air pollution exposure and umpire performance (measured as the share of umpire calls that agree with the computer-based assessment). After controlling for all sorts of factors that could affect an umpire’s judgement (such as venue, day-of-week, temperature, humidity, wind speed, pitch break angle, pitch type, etc.), they find a significant relationship between air pollution and on-the-job error rates:
Figure 4 in the paper plots the comparison of estimated effects of PM2.5 on the probability the umpire makes a correct decision.
These estimates are somewhat noisy. But they imply that a 10 μg/m3 increase in PM2.5 concentrations causes an extra 0.4 incorrect calls per 100. These negative effects show up well below the current national 24hr standard of 35 μg/m3. If you’re curious about where you sit on this concentration continuum, use this map to estimate PM2.5 exposure in your location (thank you Berkeley Earth!).
Any baseball fan will tell you that what happens on the baseball field is just a reflection of society. Umpires are not the only ones who need cognitive effort and sensory attention to do their jobs well. If we extend results from this study beyond the baseball field, the productivity and human capital costs of air pollution exposure could be far-reaching.
The Inside Baseball of Air Pollution
When policymakers set air pollution standards, they’re typically more focused on first-order health impacts versus impacts on job performance. Unlike data on umpire calls, however, data on individuals’ health outcomes and medical history are private. The most rigorous research on health impacts uses confidential data to isolate the effects of air pollution on health. Indirectly, we have these health-based studies to thank for past, policy-induced improvements in U.S. air quality.
However, a recently proposed rule could significantly limit the types of research that the EPA can use when it develops emissions standards and regulations. This may seem like obscure inside-EPA-baseball. But it’s important:
“The proposed regulation provides that, for the science pivotal to its significant regulatory actions, EPA will ensure that the data and models underlying the science is publicly available in a manner sufficient for validation and analysis.”
On the face of it, it’s hard to argue with principles of transparency and reproducibility. But the language of the rule is vague and concerning. Taken to an extreme, the baseball study clears the bar, but essential research that uses data protected under confidentiality agreements to document health impacts would be disbarred, even if researchers provide detailed code and documentation. We can’t make good, evidenced-based policy if some of the best evidence is locked out.
As the editors of leading scientific journals explain in this letter, there are smarter ways to balance the need for transparency and the obligation to base regulations on the best available science. When baseball fans see a bad call, they argue against it and agitate for better. This clean air fan will be arguing against the “transparency rule” as written. The deadline for public comments has been extended through August 5.
|
<urn:uuid:78ab09ac-80b5-4152-b510-6f4b2a2f93ac>
|
{
"dump": "CC-MAIN-2021-17",
"url": "https://energyathaas.wordpress.com/2018/07/09/air-pollution-inside-baseball/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038078900.34/warc/CC-MAIN-20210414215842-20210415005842-00225.warc.gz",
"language": "en",
"language_score": 0.9351617097854614,
"token_count": 1506,
"score": 2.59375,
"int_score": 3
}
|
Milkfish, also called bandeng, or bangos, (Chanos chanos), silvery marine food fish that is the only living member of the family Chanidae (order Gonorhynchiformes).
What is the English name of bangus fish?
Bangus is the national fish of Philippines, called milkfish in English. It is an adaptable, tough, and sturdy fish that can survive in confined spaces, so it is regularly bred on fish farms, which is the reason why it is widely available all over the Philippines.
Is Bangus a freshwater fish?
Milkfish are euryhaline, stenothermic fish. They occur and can be cultured in freshwater, brackishwater, and marine waters but only in the tropical and subtropical Indian and Pacific oceans (rare in eastern Pacific from southern California to Peru) where temperature is >20°C.
Why is it called milk fish?
These fish have white, flaky flesh that is tender when cooked. After being steamed, pan-fried, or seared, the meat has a color closely resembling milk. As a result, locals began to call these creatures milkfish.
Can you eat a milkfish?
Milkfish is known as tropical water fish with silvery body and toothless mouth. … However, just like other fish, milkfish also have a mercury concern although the levels are not as high as tuna or salmon and this is why milkfish is considered to be one of the safest fish that you can eat.
Is milk fish same as Hilsa?
Scientists say Milk Fish tastes similar to Hilsa and is cheaper and affordable. … It could cost around RS 120 to Rs150 in the market, which is quite cheap when compared to other varieties of marine fish.
What is mackerel in Tagalog?
More Filipino words for mackerel. mataan noun. mackerel. alumahan noun. mackerel.
Is bangus fish healthy?
Based on the results of proximate analysis, the profile of amino acids and fatty acids, and the content of minerals and vitamins, it can be concluded that milkfish is a highly nutritious source of animal food. Based on its protein content, milkfish has been classified as a source of high protein.
Is tilapia freshwater or saltwater?
Tilapia are mainly freshwater fish inhabiting shallow streams, ponds, rivers, and lakes, and less commonly found living in brackish water.
Is fish and milk bad for you?
Scientifically speaking, there is no reason why we should avoid eating fish and dairy together. And you can find many recipes that incorporate both together, like baked fish with a cream-based sauce.
What is the most unhealthy fish to eat?
Worst: Fish High in Mercury
- Imported swordfish.
- Imported marlin.
What do milk fish look like?
They can reach a weight of about 14 kg (31 lb). and an age of 15 years. They have an elongated and almost compressed body, with a generally symmetrical and streamlined appearance, one dorsal fin, falcate pectoral fins and a sizable forked caudal fin. The mouth is small and toothless.
Why you should never eat tilapia?
This toxic chemical has been known to cause inflammation and weaken the immune system. It can also increase the risk for allergies, asthma, obesity and metabolic disorders. Another toxic chemical in tilapia is dioxin, which has been linked to the onset and progression of cancer and other serious health problems.
What fish is the healthiest to eat?
- Alaskan salmon. There’s a debate about whether wild salmon or farmed salmon is the better option. …
- Cod. This flaky white fish is a great source of phosphorus, niacin, and vitamin B-12. …
- Herring. A fatty fish similar to sardines, herring is especially good smoked. …
- Mahi-mahi. …
- Mackerel. …
- Perch. …
- Rainbow trout. …
Is it okay to eat milkfish everyday?
Consuming milkfish can meet the protein needs of the body. The high nutrient content in milkfish can prevent coronary heart disease, also increase endurance. Regular consumption of milkfish can prevent micronutrient deficiencies and can help the overall development of the body.
|
<urn:uuid:84854f75-0c2e-46d8-b591-280e1af32c77>
|
{
"dump": "CC-MAIN-2022-05",
"url": "https://winyahguide.com/fish-wikipedia/what-kind-of-fish-is-a-milk-fish.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320303385.49/warc/CC-MAIN-20220121131830-20220121161830-00214.warc.gz",
"language": "en",
"language_score": 0.9465454816818237,
"token_count": 944,
"score": 2.984375,
"int_score": 3
}
|
The industrial revolution is one of those periods in time that are responsible for changing the entire course of our world. You can click on the link here if you’re looking for essays on the Industrial Revolution.
The First Industrial Revolution
It’s genuinely easy to say that before the first industrial, the world was one way, and after that, we’ve been on a completely different trajectory. It serves as the turning point for the emergence of modern society as we know it today. The period started at the end of the 18th century and went on until the beginning of the 19th century. Industries during this time underwent the first wave of mechanization. The introduction of this mechanization proved to be the catalyst for a significant economic shift. Agriculture was no longer the foundation of a strong economy, but industries were.
Where did it all begin?
It all began in England. Due to the climate of Britain, it was an ideal place for the production of textiles. Britain was known for its production of textiles like cotton, linen, and wool. However, it wasn’t until the innovative machines of the industrial revolution that led to Britain genuinely flourishing.
During the middle of the 18th century, the industrial revolution led to the invention of machines such as the power loom and the water frame. Inventions like these made the production of cloth much more accessible. The result was cloth both greater in quantity and quality. Production speeds also saw a massive increase as the entire processes became more mechanized.
The mechanics and the automation inside the industry meant that they could cater to both foreign and local demand. Rapid industrialization, combined with the several colonies under British control, said that it grew to become the most powerful empire in the world — the industrial revolution fueling their success. However, textile was not the only are that underwent great innovation.
The Steam Engine
Perhaps the one invention that single-handedly serves as the icon for the first industrial revolution is the Steam Engine. The prototype for the modern steam engine come about in the early 1700s. It was an invention of Thomas Newcomen.
Later on in the 1760s, Scottish engineer James Watt took one of Newcomen’s model and made it much more efficient. Later on, Watt would combine his work with Matthew Boulton to invent the steam engine. The steam engine was a crucial feature in the industrial revolution. It meant that the power of steam would spread across almost all British industries at that time.
Steam engines need coal function, using the same steam power coal collection became much more manageable. The demand, as well as the procurement of coal, skyrocketed throughout the industrial revolution. Furthermore, the fuel was not only required to power the industries. The demand for coal was also dependent on another byproduct of the steam engine.
Transport during the Industrial Revolution
The birth of the steam engine meant that humans had a power now that they could not harness before. The industrial revolution saw a massive development in Britain’s transportation networks.
The early 1800s saw the inception of the first steam-powered locomotives. Richard Trevithick was responsible for the development of the first locomotive. By the 1830s, these trains became a common sight in the major cities of Britain. Additionally, the inception of steam-powered boats also takes over all maritime transport for the British.
Communication and Banking
The Industrial Revolution was also responsible for advancements in both the banking and communication industry. In 1837, British inventors William Cooke and Charles Wheatstone made the first telegraph system.
Furthermore, both the London and New York Stock exchange came about during the industrial revolution. The inception of both transactions helps form the basis for the modern financial markets we see today. The Industrial Revolution brought about some significant changes in the world. However, there are inevitable consequences that came with rapid development as well.
Consequences of the Industrial Revolution
Among the most immediate negative effects of the industrial revolution was the reaction of the “Luddites.” These were individuals who lost jobs because of the rapid mechanization following the industrial revolution. The responses were incredibly violent; riots and protests were incredibly challenging to deal with during those days. Worker unions would also go on strike regularly to improve their standing.
Additionally, while there may be several effects on the economic gains, there was one significant caveat. Following the industrial revolution, there was a very substantial rise in the level of inequality. While the rich and middle class saw an exponential increase in their income and lifestyle, the lower class suffered. The increasing dependence on technology meant that several working-class laborers lost their jobs. Ever since the industrial revolution, inequality has been on the rise and doesn’t seem to be stopping anytime soon.
Furthermore, the mass urbanization that followed the revolution led to a massive transition to city living. Thus, these cities become overcrowded, and several issues come with the phenomenon.
The revolution ran its course in 1840. However, it was also inevitable that such a revolution would happen again. Humankind’s rate of technological innovation helps ensure that there’s no possibility of being an isolated occurrence.
The Second and Third Industrial Revolution
Almost a century after the first Industrial Revolution, the second began. This time instead of steam energy, electricity, gas, and oil were responsible for spearheading the development. A byproduct was the development of the combustion engine. The results of the engine meant that the aviation industry and automobile industry underwent rapid expansion.
The third industrial revolution began in 1969. As is commonplace with these revolutions, a source of energy typically leads them. This time around, the cause was nuclear energy. Additionally, this revolution also saw a massive increase in the rise of electronics. The world entered into a new phase of computers and telecommunication.
The Fourth Industrial Revolution
Due to the eternal nature of human innovation and development, we’re witnessing the fourth industrial revolution in front of our very eyes. You can find more information on revolution 4.0 here. The emergence of the internet is what drives this revolution. It’s interesting because instead of a new form of energy, a technological phenomenon drives this revolution. That phenomenon is known as digitalization, which involves the creation of a new virtual world
The first industrial revolution marked a tipping point in human innovation. Since then, it has been almost impossible to stunt the rate of technological growth. We may be in the middle of the fourth industrial revolution. Yet, there’s no doubt about the fact that another one will follow. Time will stop before human innovation and development decides to take a break!
|
<urn:uuid:cbf8139a-3522-4ac1-9020-6c3e1a3ff8f3>
|
{
"dump": "CC-MAIN-2020-40",
"url": "https://techlogitic.net/industrial-revolution-and-its-consequences/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400217623.41/warc/CC-MAIN-20200924100829-20200924130829-00439.warc.gz",
"language": "en",
"language_score": 0.9677653908729553,
"token_count": 1353,
"score": 3.515625,
"int_score": 4
}
|
Panning is a photographic technique that can be used to make very effective wildlife photographs depicting your subject's motion. They are also called 'motion blurs'.
The basic idea is that you move (pan) your camera along with the moving subject so that you end up creating a relatively sharp subject with a blurred background.
It is not the easiest technique to master but with a bit of practice and the right conditions you should get pleasing results.
An African safari will provide many appropriate animals to use as subjects. There are animals such as the giraffe, zebra, leopard and cheetah..
that have strong contrasts in their coats and there are others that have unique features or shapes (horns, manes and tusks) that make great subjects.
Also keep a lookout for opportunities to include dust or water being kicked up by the running animals as this will add impact to the photograph.
You subject should be moving in a straight path parallel to you - if the subject is moving toward or away from you then the photograph will not be as effective.
Try and use your tripod if shooting from a camp or your bean-bag and Panning Plate if shooting from a hide or car...
Hand-holding can also work but you must ensure you do not move up or down but just left to right, moving with the subject.
Twelve Tips on How to Shoot Motion Blurs
1. Set the program mode to Aperture priority
2. Set your camera's focus mode to AF-C for Nikon (AI Servo for Canon) and the release mode CH (Continuous-High) or CL (Continuous Low)
3. If your lens has VR or IS set the switch to 'normal' for Nikon (and mode 2 for Canon) as you want the horizontal motion to blur but not the vertical motion. Nikon's 'active' VR switch will stabilize both horizontal and vertical movement.
4. Set your ISO on the lowest - say ISO 100
5. Set a small aperture, say f/16 or f18, depending on the brightness of the day
6. Set a slow shutter-speed of about 1/30th to 1/15th second. Dull overcast days are best for pans but if the day is too bright and you cannot get slow shutter speeds then add a polarizer or neutral density filter to reduce the light and give you a slower shutter speed. If your subject is moving slow you would use a slower shutter speed to accentuate the feeling of speed. If the subject is sprinting (like a cheetah) you may need to use a faster shutter speed otherwise you could have a totally blurred photo.
7. Position yourself in a place where your view of the subject will not be obstructed by anyone or anything else. Also consider the background of your shot. Even though the background will be blurred you don't want distracting shapes or colors. Single-colored or plain backgrounds tend to work best.
8. As the subject approaches track it smoothly with your camera. For extra support of your camera if you’re using a longer lens or are feeling a little jittery you might like to use a monopod or tripod with a gimbal head.
9. Focus on your subject's body or head and use the centre focus point and just keep tracking the subject while shooting
10. Pan (rotate your torso or move your arms) in the same direction of the subject's trajectory
11. Shoot a continuous sequence of images to ensure you get at least one that is pleasing. Keep in mind the your subject's head may be bobbing up and down so you will need to try and get it at the peak of the action when the bobbing has stopped - shooting in continuous-high will help you get this.
12. Once you’ve gently released the shutter continue to pan with your subject, even after you’ve heard the final frame has been taken. This smooth follow through will ensure the motion blur is smooth from start to finish in your photograph. No different to golfers, tennis players and snooker players who 'follow-through'!
You may want to experiment with your flash while panning. If the subject is close enough it will work - set the flash on Slow-rear and the camera release mode to Single-frame or CL as your flash most probably won't be able to keep up with CH! You may also need to dial in minus-half to minus-one stop flash compensation.
Another variation is to fix your camera on a tripod and as the subject enters your frame you press the release cable - this will blur the subject but not the background. It makes an interesting variation to having a blurred background...
Practice your Pan Technique
Our advice is for you to practice photographing motion blurs before you go on safari. You can photograph cars, people walking, athletes running, your pet dogs running - there are so many subjects at home.
In the following B&H video, nature photographers Denise Ippolito and Arthur Morris cover the great variety of techniques that can be used to create pleasingly blurred images, mostly in-camera in the field, and at times, during post processing.
Topics that are discussed and illustrated include pan blurs, vertical panning blurs, zoom blurs, camera movement blurs including flame and jiggles, flash blurs, subject movement blurs including moving water blurs, long exposure blurs, the need for accurate focusing, managing your ISO settings, in-camera multiple exposures, subject to film plane orientation, the role of neutral density and polarizing filters when creating pleasing blurs, choice of shutter speeds and how subject-to-sensor distance affects the degree of blurring.
Denise and Arthur co-authored the very popular eBook, “A Guide to Pleasing Blurs.”
"Your time and money are valuable and the information in this Etosha eBook will help you save both."
-Don Stilton, Florida, USA
"As a photographer and someone who has visited and taken photographs in the Pilanesberg National Park, I can safely say that with the knowledge gained from this eBook, your experiences and photographs will be much more memorable."
-Alastair Stewart, BC, Canada
"This eBook will be extremely useful for a wide spectrum of photography enthusiasts, from beginners to even professional photographers."
- Tobie Oosthuizen, Pretoria, South Africa
|
<urn:uuid:e32809cc-5d8a-4f6b-b8f2-99714d4a7e49>
|
{
"dump": "CC-MAIN-2017-43",
"url": "http://www.kruger-2-kalahari.com/panning.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824543.20/warc/CC-MAIN-20171021024136-20171021044136-00675.warc.gz",
"language": "en",
"language_score": 0.9273287653923035,
"token_count": 1327,
"score": 2.921875,
"int_score": 3
}
|
An apprenticeship is a work placement that provides paid practical on-the-job training, sometimes in combination with classroom-based study, to give people a first step into a career. Traditional apprenticeships involve learning a craft with a skilled practitioner, while modern apprenticeships typically permit school leavers to develop academic qualifications while being trained in a profession. Apprentices usually attend formal training, often at a college, university or training organisation, to gain a related qualification.
In the UK, apprenticeships are available to anyone who is over 16 and not in full-time education. There are three levels of apprenticeship, with different levels of educational equivalence:
• Foundation Apprenticeship (equivalent to 5 GCSE passes): provides them with the skills and qualifications for their chosen career and allow entry (if desired) to an Advanced Apprenticeship.
• Advanced Apprenticeship (equivalent to 2 A-level passes): to start this programme, some industries will require three or more GCSEs and some may want more, whereas other employers don’t specify any formal qualifications. Some may ask for previous experience in the industry or for apprentice to have completed an Foundation Apprenticeship.
• Higher Apprenticeship (which can lead to NVQ level 4 and above, or a foundation degree): Entry requirements can include at least five GCSEs grades A – C, and Level 3 qualifications, including A levels, NVQ/SVQ Level 3, or a BTEC National. Some will expect or require applicants to have subjects related to the particular apprenticeship to start this programme, you should have a Level 3 qualification (A-Levels, Advanced Diploma or International Baccalaureate) or for you to have completed an Advanced Apprenticeship.
Every apprentice follows an approved programme of study, designed for the job they’re training for. Employers decide the structure of training, however, apprenticeships generally combine:
• a detailed training plan
• regular progress reviews
• practical training on the job
• theoretical study at a college
• assessment testing at a training facility
• mentoring and support throughout your apprenticeship
• By the end of the course, you should’ve gained the qualifications, skills and experience required by potential employers within the field.
The main benefit of doing an apprenticeship is the opportunity to learn the skills needed for a career, but there also many other benefits:
• Gain a range of qualifications while working
• Apprentices earn a wage
• Training and work experience in the same time
• Apprenticeships lead to recognized qualifications – and qualifications lead to further opportunities.
• Excellent career progression
• It will Increase apprentices’ confidence
• Apprenticeships provide the opportunity to learn actionable skills – apprentices don’t learn how to do things theoretically, they practice actually doing them.
Benefits for the employer
• Develop company’s own talent
• Make hiring Simpler and Cheaper
• Boost employee retention
• Increase in staff loyalty
• Increased productivity
• Make a positive return on investment collapse
|
<urn:uuid:f6e53765-3736-4c92-91fd-0a11c8a8711f>
|
{
"dump": "CC-MAIN-2019-51",
"url": "https://aneldeyasam.anelgroup.com/en/my-career/our-apprenticeship-programme-in-uk/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540482038.36/warc/CC-MAIN-20191205190939-20191205214939-00168.warc.gz",
"language": "en",
"language_score": 0.9283540844917297,
"token_count": 632,
"score": 3.3125,
"int_score": 3
}
|
Death by Wind
Two recent, peer-reviewed and unimpeached studies explain why wind energy, a 17th century technology, has no sensible place in a 21st century civilization. The energy windmills offer is not free, not clean, not reliable and not consistent. And it doesn’t create new jobs. Here’s why.
The wind blows, except when it doesn’t. And, wind speed varies on a second by second basis. Thus, wind energy produces electricity in fits and spurts. To prevent blackouts and brownouts, we need extremely consistent electricity. The voltage supplied to our electrical grid must exactly meet the demand and the frequency cannot vary by any more than five cycles in 60 (8.3%) or electrical equipment shuts itself down to prevent damage to motors and circuits.
In an effort to make wind energy useful, electricity generators have to “back-up” the wind energy with other generation capacity, like natural gas and sometimes coal power. When the wind goes down, the back-up energy must fill in – on a second by second basis. Thus, building a 150 megawatt wind farm means one must also build a 150 megawatt fossil fueled back-up supply.
They don’t tell you this at the wind energy pep rally.
To understand what this need for back-up energy means in terms of reliability and pollution, Bentek Energy, LLC. took a hard look at the issue, publishing an April 2010 report entitled: “How Less Became More: Wind, Power and Unintended Consequences in the Colorado Energy Market“. It takes the wind out of the wind-power sails. In sum, they conclude that the use of wind energy resulted in increased levels of SO2 (acid rain), NOx (smog) and CO2 (greenhouse gas).
The reason wind isn’t clean is specifically because of the back-up energy needed. Imagine it this way. If you race your car up a hill, then glide down the other side, then speed up, then slow down, then let it idle for a couple of hours, then race back into traffic, then slow down, then . . . . You get the picture. Horrid gas mileage. And guess what else. The pollution control devices were designed to work on a steady emissions stream, not on one that is as variable as the wind. So, it takes more fuel and it doesn’t scrub the pollution out as well.
Voila, dirty air from windmills. And what about cost?
The cost of having to build redundant back-up energy is obvious, but that’s not the end of the accounting. Take a look at the American Traditions Institute’s new report on proposed federal Renewable Energy Standards - the proposal to mandate 30 percent of all electricity to be generated by “renewable” sources under the President’s state of the Union speech plan. Renewables are dominated by wind energy - over 80 percent in the Colorado plan, for example. Thus the report, “The Effects of Federal Renewable Portfolio Standard Legislation on the U.S. Economy” could as easily be called: “The effects of mandatory wind power.”
The costs are massive in any way they are explained. The study examines three levels of wind energy, but to meet the President’s plan, we can concentrate on the 30 percent level. The study also looks at low, medium and high cost assumptions. The high assumptions are based on real world data. The low cost assumptions come from the federal government.
Now, let’s begin with your pocket book. According to this study, to enjoy the increased number of blackouts and brownouts from reliance on wind power, you will have the honor of losing between $350 and $1,300 in disposable family income.
Of course, you still have a job. Maybe. A 30 percent wind energy mandate will reduce national employment by 409,000 to 1.5 million jobs. And if you think a windmill factory is going to take care of that – think again. Think “China.” They have the essential rare earth minerals needed to make the required magnets and they are using this as leverage to force manufacture of the entire windmill on their own shores. At most, we will get some temporary ditch digging jobs.
The real kicker is what these costs mean in terms of health. In addition to the increased acid rain and smog, the fact is that poor people are less able to maintain their health than rich people, so the loss of income also means increased bad health. How much? The 30 percent mandated wind energy would cause from 3,300 to 12,500 additional premature deaths in the nation, mortality rates higher than from operating room errors and HIV, respectively.
So, Governor, the research says you can’t have it both ways. Either you can have reasonable energy costs and reliable, consistent supply or you can have wind power. I’m thinking Virginians want to keep their jobs, their money and their health. You can deep six the windmills somewhere offshore.
Dr. David Schnare, Esq., Ph.D. is an attorney and scientist with 40 years of federal and private sector experience consulting on and litigating local, state, federal and international environmental legislative, regulatory, risk management and free-market environmentalism issues.
|
<urn:uuid:cf6493e1-bcbe-45eb-b14b-aea2daa1571c>
|
{
"dump": "CC-MAIN-2015-11",
"url": "http://www.jeffersonpolicyjournal.com/death-by-wind/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463420.52/warc/CC-MAIN-20150226074103-00227-ip-10-28-5-156.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9480032324790955,
"token_count": 1123,
"score": 2.53125,
"int_score": 3
}
|
(CHAPEL HILL, N.C.) — NEWS: The Walking Classroom Institute (TheWalkingClassroom.org) has released results of a research study conducted in spring 2018 by researchers from the University of North Carolina at Chapel Hill, and funded by the Oak Foundation, confirming that walking while listening to The Walking Classroom podcasts improves student learning as well as retention of information, student mood, and attitudes toward learning.
The study, which tested 319 4th and 5th grade students over a three-month period, had the students complete a series of measures over four testing periods to assess learning, mood, cognitive performance, and attitudes toward learning. The findings were overwhelmingly positive for The Walking Classroom program methodology.
Walking Improves Student Learning and Retention:
Students who walked and listened to The Walking Classroom’s educational podcasts demonstrated significantly higher levels of learning than students who sat while listening to the podcasts. This result was demonstrated both in short-term and long-term retention as measured by performance on a 10-question comprehension quiz on podcast content administered immediately after the walk as well as one week later.
In addition to improvements in learning the material presented in the podcast, walking had a significant positive impact on cognitive test performance. Students were given a 3-minute multiplication test both after walking and after sitting, and the resulting math test scores were significantly higher for the groups that had walked prior to taking the test.
Walking Improves Student Mood and Attitudes Toward Learning:
The study also tested the effects of walking on student mood and attitudes toward learning and found that walking (versus sitting) had similar improvements in those areas. All positive-affect markers (e.g., students describing themselves as strong, happy, alert, excited, and enthusiastic) increased after walking and listening to podcasts and decreased after sitting and listening to podcasts. Similarly, negative-affect markers (e.g., students describing themselves as irritable, nervous, upset, mad, and sad) all decreased after walking, demonstrating a strong positive influence of the Walk, Listen, and Learn program on student mood and attitudes toward learning.
Laura Fenn, CEO and founder of The Walking Classroom said, “We’ve had teachers reporting similar results with their students in our annual surveys for years, but seeing the results confirmed in this study is thrilling. Knowing that The Walking Classroom is actually helping students learn more and retain more information, while also helping them feel happier and more excited about learning, is very rewarding.”
The study was conducted by Erianne Weight, Ph.D. and a team of researchers from the University of North Carolina at Chapel Hill. Its purpose was to test the impact of learning during physical activity on student short-term and long-term learning retention, cognitive performance, mood, and attitudes toward learning. Baseline data was gathered one week prior to listening to the podcasts. Additional results were gathered immediately after walking and listening to podcasts, immediately after sitting and listening to podcasts, and one week after the podcasts were delivered.
For more details or to read the full study, please visit https://thewalkingclassroom.org/research/.
Additional press resources: https://www.thewalkingclassroom.org/walking-classroom-press-kit/
To schedule interviews with The Walking Classroom founder and CEO Laura Fenn, contact her directly at: firstname.lastname@example.org.
About The Walking Classroom:
A national award-winning education program, The Walking Classroom provides students with an innovative way to get exercise without sacrificing instructional time. The Walking Classroom Institute, a 501(c)(3) non-profit, was founded by CEO/Creator Laura Fenn, a former 5th grade teacher with over 15 years of classroom experience. Laura developed The Walking Classroom program as a way to add exercise to the school day without sacrificing instructional time. While all students benefit from the increased activity and educational content of The Walking Classroom, children with low academic achievement and childhood obesity stand to benefit the most. Students with alternative learning styles such as ADHD, dyslexia, or autism also benefit from the program. The Walking Classroom program is now used by tens of thousands of students in all 50 states.
Learn more at TheWalkingClassroom.org.
Photo credit: Laura Fenn.
Related link: https://www.thewalkingclassroom.org/
This version of news story was published on and is Copr. © eNewsChannels™ (eNewsChannels.com) – part of the Neotrope® News Network, USA – all rights reserved. Information is believed accurate but is not guaranteed. For questions about the above news, contact the company/org/person noted in the text and NOT this website.
|
<urn:uuid:8e2946a3-d34e-4f7c-b538-b32ac1ac048b>
|
{
"dump": "CC-MAIN-2022-21",
"url": "https://enewschannels.com/walking-classroom-institute-podcasts-improve-student-learning-retention-and-mood-according-to-unc-ch-study/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662580803.75/warc/CC-MAIN-20220525054507-20220525084507-00769.warc.gz",
"language": "en",
"language_score": 0.959128201007843,
"token_count": 991,
"score": 2.859375,
"int_score": 3
}
|
The steps for writing an essay are not always the same for every writer. Still, a common system can be applied to most writing position for extra help on those writing projects that you find particularly hard. I always tell my college writing students that essay letters is a method. I know the term "process" can be difficult but it is very key to value it and think about how it applies to your essay writing
plan. What is a writing process? Usually speaking, your course is the series of steps you take from idea to drafting to concluding your essay. Although many college writing textbooks and mentor will present the writing process as a linear model (a straight line), this is not for all time the best way to go about it. Again, everyone’s approach is similar and you are no exception. Some writers work well under pressure. Some writers do good work outdoors. Other writers need loud music. Still other writers require collection settings to complete their best work. Whatever your needs, the most main thing is to decide what works well for you. In all-purpose, the majority writing course looks like this: pre-writing, writing, and change. Pre-writing is the work you do to get started with an essay. This includes think, researching, and those types of behavior. Writing is the actual process of write your first draft. I advise my students to complete this step in one sitting. Once you have finished the think or pre-writing steps, you should be able to sit down and complete the bones of your essay for a common outline. Revising is the last step. It is also the most vital step. Fortunately, most students overlook just how central change is to the overall writing process and never really invest adequate time in this last stage.
|
<urn:uuid:edce7e62-c85b-4a24-8be8-57cce8aa01bf>
|
{
"dump": "CC-MAIN-2023-23",
"url": "http://neftekumsk.ru/forum/prostoforum/51424-how-to-write-a-college-level-essay.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653608.76/warc/CC-MAIN-20230607042751-20230607072751-00720.warc.gz",
"language": "en",
"language_score": 0.9648038744926453,
"token_count": 355,
"score": 2.734375,
"int_score": 3
}
|
Façadism, which refers to the act of surgically preserving a building’s street-facing exterior wall during demolition, sounds as though it could be a mental illness right out of the Diagnostic and Statistical Manual of Mental Disorders. But sometimes, it can be the sanest option when attempting to strike a balance between developers and historic preservationists.
“In terms of architectural detail, whenever a façade is salvageable, I guess it’s a good thing,” says Karen Nagher, director of Preservation Wayne. “But I wouldn’t want it to get out of hand.”
In recent years, examples of façadism (sometimes called façadectomies) have been popping up around metro Detroit. Visitors to downtown’s Grand Circus Park can behold an intricate web of steel scaffolding supporting what’s left of the Fine Arts Building on Adams. Built in 1905, the Louis Kamper-designed structure functioned as the lobby for the Adams Theatre, a once-respected movie house that was showing snuff films by the 1980s. The theater closed after a string of violent shootings late in the decade, and both buildings fell into disrepair while several redevelopment plans failed to get off the ground. “The building was not well taken care of,” Nagher says. “And honestly, it probably could not be saved.”
Last year, the Detroit Downtown Development Authority granted the property’s owner, Olympia Development, $2.5 million to raze a number of its downtown structures, including the Fine Arts and the Adams. The façade of the Fine Arts was preserved, without any future plans in place.
“We weren’t happy about that,” says Nancy Finegood, director of the Michigan Historic Preservation Network. “I think it’s frightening that there’s no plan.” Today, the fragile façade stands guarding an empty lot, propped up like a movie-set backdrop.
Farther north, in a residential neighborhood near downtown Birmingham, the former Barnum School was razed to make way for Barnum Park.
The building’s entrance was preserved as a sort of gate — with the Barnum School inscription still at its crest — along with its towering smokestack. A group of preservationists developed plans to save more of the 98-year-old structure, but the effort stalled when organizers couldn’t raise enough funds before the City Commission’s deadline. “From a preservation standpoint, nobody was thrilled about [Barnum Park],” Nagher says. “But at least they did something.”
In Ann Arbor, the University of Michigan integrated the façade of the former Carnegie Library into a new dormitory and learning complex, giving the state-of-the-art facility a historic patina.
“We have to compromise,” Finegood says. “Sometimes not every building can stand. But it’s the entire building that’s important, not just the skin.”
|
<urn:uuid:bfcc59cc-a10d-4485-8948-7745fe71c4bf>
|
{
"dump": "CC-MAIN-2021-31",
"url": "https://www.hourdetroit.com/community/saving-face/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153709.26/warc/CC-MAIN-20210728092200-20210728122200-00433.warc.gz",
"language": "en",
"language_score": 0.9571418762207031,
"token_count": 648,
"score": 2.6875,
"int_score": 3
}
|
Answer: Everything in our environment is formed of matter. Chemistry is significant in our civilization because it affects our basic needs for food, clothing, shelter, health, energy, and clean air, water, and soil, among other things.
What do you usually learn in chemistry?
General chemistry A general chemistry course may cover basic topics such as atomic structure, molecular structure, chemical bonding and acids and bases. Students may also learn about biological chemistry, organic chemistry and nuclear chemistry.
What are 5 reasons why chemistry is important?
- Chemistry helps you to understand the world around you.
- Basic knowledge of chemistry helps you to read and understand product labels.
- Chemistry can help you make informed decisions.
- Chemistry is at the heart of cooking.
- A command of chemistry can help keep you safe!
Why is studying chemistry important?
Chemistry is an important subject for careers in: medicine, environmental science, engineering, toxicology, developing consumer products, metallurgy (studying how metals behave), space exploration, developing perfumes and cosmetics, pharmaceuticals, energy, teaching, science writing, software development and research.
Why is chemistry so hard?
The primary reason chemistry is so hard is because of the topic progression. You really have to fully understand several topics before you can fully understand other topics. It’s important to keep in mind, memorization isn’t the key here. There’s a certain element of memorization.
How hard is chemistry in college?
Chemistry courses are typically more difficult than your average college course. Therefore, do not plan on taking 18 credits every semester. 12 credits of chemistry courses in one semester, for example, is going to be a more challenging semester than most college students ever take.
Where do we use chemistry in everyday life?
Explosives, fuels, rocket propellents, building and electronic materials, etc., are all chemicals. Chemistry has influenced our life so much that we do not even realise that we come across chemicals at every moment; that we ourselves are beautiful chemical creations and all our activities are controlled by chemicals.
What has chemistry done for us?
The industrial applications of chemistry directly affect our daily lives—what we eat, what we wear, our transport, the technology we use, how we treat illnesses and how we get electricity—to name just a few. Research is constantly deepening our understanding of chemistry, and leading to new discoveries.
What is chemistry in simple words?
Chemistry is the branch of science that deals with the properties, composition, and structure of elements and compounds, how they can change, and the energy that is released or absorbed when they change.
What are the 5 types of chemistry?
In a more formal sense, chemistry is traditionally divided into five major subdisciplines: organic chemistry, biochemistry, inorganic chemistry, analytical chemistry, and physical chemistry.
Can we live without chemistry Why?
Chemistry is a central science that permeates all of our lives. Without chemistry our lives would be dull, dark, boring, and short. Without chemistry people would die much younger from diseases such as bubonic plague, since we wouldn’t have antibiotics.
Which is harder chemistry or math?
In general the answer to the question is subjective. If hardcore math like theorems and their proofs interest you, you will feel mathematics is easier than chemistry. If you like the application of these theorems, then chemistry is easier.
Is chemistry easier than biology?
A’level Chemistry is definitely more difficult than A’Level Biology.
What to do if you are failing chemistry?
- Talk to Your Instructor. This should be the very first thing you do because nearly all of the options for minimizing the damage involve your teacher.
- Keep Doing Your Homework.
- Keep Attending Lectures and Labs.
- Take Notes.
- Get Someone Else’s Notes.
- Try a Different Text.
- Work Problems.
What is the most failed college course?
- College Algebra. The evil, despicable and terrible villain of early high school has come back to haunt you.
- Organic Chemistry. The presence of this class on this list might not come as a surprise.
- Anatomy and Physiology.
Is physics harder than chemistry?
Physics is slightly harder than chemistry because it is more math-oriented and has more abstract concepts.
What is the toughest course in the world?
- Engineering. Considered one of the toughest courses in the world, engineering students are required to have tactical skills, analytical skills, critical thinking, and problem-solving abilities.
- Chartered Accountancy.
Can we live without chemistry?
Because everything is made of the chemicals which are needed in our daily life. We can not live without chemistry.
How does chemistry affect our emotions?
The brain controls the release of certain chemicals – called neurotransmitters – which communicate with other areas of the brain to stimulate or calm us. This then has influence on our mood, emotions and behaviour.
What is the most important discovery in chemistry?
Pasteurization. The process of pasteurization has been called one of the most important discoveries in science and chemistry because of the numerous lives that it has saved through preventing disease.
Why should I study chemistry at university?
Studying chemistry will equip you with valuable life skills including reason and logic, communication, presentation, analysis, observation, and many, many more skills which are valued by all job sectors.
What is physics vs chemistry?
Difference Between Physics vs Chemistry Both fields deal with matter, though physics focuses on how matter moves and interacts, while chemistry examines the composition of matter at the atomic level.
Why is chemistry called the science of life?
The study of the structure and function of these biomolecules, as well as their role in biological processes at the molecular, cellular, and organismal levels, is known as the Chemistry of Life.” Cells are made up of organic and inorganic molecules, which are made up of atoms that have been bonded together.
Which part of chemistry should I study first?
The Chemistry section is divided into three major sections: Inorganic Chemistry, Organic Chemistry, and Physical Chemistry. Inorganic Chemistry is the first section to deal with in the Chemistry section of the NEET examination, followed by Organic Chemistry and then Physical Chemistry.
Which country is best for chemistry?
China tops the chemistry ranks, closely followed by the US.
|
<urn:uuid:01c4655f-7eb7-4a77-b17e-6a17d8d3caf6>
|
{
"dump": "CC-MAIN-2023-06",
"url": "https://scienceoxygen.com/what-is-the-role-of-chemistry-in-everyday-life/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499713.50/warc/CC-MAIN-20230129112153-20230129142153-00809.warc.gz",
"language": "en",
"language_score": 0.9296982884407043,
"token_count": 1368,
"score": 3.140625,
"int_score": 3
}
|
MACHINE SHOP CALCULATION - OD1640 - LESSON 2/TASK 3
(2) Find the number of minutes in the extreme right-hand column, reading
from the bottom toward the top.
(3) Locate the proper column for the function, using the headings at the
(4) Find the value of the function in this column at a point directly
across from the given number of minutes.
Find the sine of 46,, 15'; that is, sine 46,, 15' = ?
For angles between 45,, and 90,,, the value of the sine is found in the column
marked "sine" at the bottom. The "minutes" column is followed up to 15',
and then in the "sine" column at a point across from 15', sin 46,, 15' =
Find the tangent of 45,, 48'; that is, tan 45,, 48' = ?
For angles between 45,, and 90,,, the value of the tangent is found in the
column marked "tangent" at the bottom . The "minute" column is followed up
to 48', and then in the "tangent" column at a point across from 48', tan 45,,
48' = 1.02832.
Angle Corresponding to a Given Function
In the preceding examples and problems, finding the value of the
trigonometric function of a given angle has been discussed.
It is also
necessary to understand the reverse of this procedure; that is, how to use
the tables of trigonometric functions to find the angle corresponding to a
given trigonometric function. The procedure is as follows:
Locate the given number (value of function) such as the sine of .69466
in the proper column,
|
<urn:uuid:c3388bb5-bf1e-4a02-9b9b-0a22fe7f1c32>
|
{
"dump": "CC-MAIN-2017-47",
"url": "http://armyordnance.tpub.com/od16407/od164070072.htm",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806586.6/warc/CC-MAIN-20171122122605-20171122142605-00146.warc.gz",
"language": "en",
"language_score": 0.8011944890022278,
"token_count": 384,
"score": 3.484375,
"int_score": 3
}
|
How many times have you started a project and didn't have the exact size Aida cloth that was required? Do you go about your stitching haphazardly only to end up with either not enough fabric for the piece or on the other hand, way too much leftover? Either way, your piece can be ruined.
Before starting a project, you can figure out exactly how much fabric you need with a simple mathematical equation. Below is a little guideline to the different cloth sizes, their meaning and what size your finished project should be.
For the following guidelines and examples, Aida cloth will be the fabric of choice. There are other types of fabric out there to try. Aida is the fabric that many patterns are based on and many designers use. If you enjoy international patterns, they may use different types of linen. This is another reason this equation is so important. You can use the formula to go back and forth between small linen and larger Aida cloth. Although there are a wide variety of fabrics, Aida is the go-to standard.
Aida does come in a variety of sizes if you want to try something smaller or bigger. It also comes in a variety of textures. It is the most common cross stitch fabric and can mostly be found in size 14.
What exactly does 14-count mean? The "count" refers to the number of stitches in an inch. So, 14 count means 14 stitches per inch. The higher the number, the smaller the fabric. If you have something that is 12 count, you will have 12 stitches per inch and thus fairly large whereas an 18 count would be smaller. A linen fabric would be something around 28 to 30 count.
Increasing and Decreasing Size Count
Count the number of stitches across and then divide it by the thread count of your fabric. Do the same down and you have the size of your finished project.
Your stitch count across is 200 and you have 18 count Aida cloth so 200/18 is 11.11 (you should round it up to 12)
Your stitch count down is 160, so again 160/18 is 8.88 (round up to 9).
Your finished piece with 18 count fabric would be 12 inches across and 9 inches down.
Note: Don't forget to add a few inches so you can frame your piece when it is done. The formula above is just for the finished project alone and does not allow for seam allowance. You should add about an inch for seam allowance. If you do not do this, you might run into problems framing or converting the project into a pillow or wearable piece.
|
<urn:uuid:e14a7283-7634-4936-8243-1adf7e6ad3ce>
|
{
"dump": "CC-MAIN-2023-23",
"url": "http://bobzivkovic.com/increasing-or-decreasing-your-pattern-983972.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656963.83/warc/CC-MAIN-20230610030340-20230610060340-00005.warc.gz",
"language": "en",
"language_score": 0.9550089240074158,
"token_count": 536,
"score": 3.09375,
"int_score": 3
}
|
Infection with spirochaetal bacteria of the genus Borrelia through the bite of an infected tick is considered the principle cause of Lyme disease which is contracted by over 20,000 people in the US each year according to The Centers for Disease Control and Prevention (CDC). Lyme disease is transmitted by the ‘hard ticks’ of the Ixodes genus and infection is thought to occur after the tick has been in place for around 24hrs as the Lyme disease bacteria migrate from a tick’s mid-gut to the saliva. This means that a tick usually has little opportunity to spread infection as those bitten will often have brushed off the tick either consciously or accidentally in the first few hours after being bitten. The increased presence of bacteria in the saliva of the Ixodes persulcatus tick however is likely responsible for infections in cases where a tick is removed after only a few hours as opposed to days. Borrelia afzelii, the bacteria considered culpable in many European cases of Lyme disease, is also transmitted faster than Borrelia burgdorferi which is more commonly found in the North American tick population.
Lyme Disease Transmission
Only around 1% of recognized tick bites are thought to result in Lyme disease infection although the incubation period of 3-30 days prior to the bacteria spreading though the skin into lymph nodes and the bloodstream may make it difficult to connect a bite to subsequent symptoms. Furthermore, the bite is easy to ignore as the ticks’ saliva contains substances which inhibit the pain, itchiness, or irritation of a bite and, therefore, allow the tick to continue feeding from the host for longer whilst spreading the infection. Tick saliva also contains substances which control the body’s immune response and likely allow the bacterial spirochaetes to proliferate upon entering the body (Machácková, et al, 2006). For a long time, tick bites were the only proven way of contracting Lyme disease, although in recent months there has been new evidence that Lyme disease could be a sexually transmitted disease. There remains no conclusive evidence in support of Lyme disease transmission during pregnancy via the placenta to the foetus (Woodrum, et al, 1999). The risk of developing the disease through blood transfusion also appears to be low and most scientists regard an infected individual as a ‘dead end’ host at extremely low risk of transmitting the infection to another human (Gerber, et al, 1994).
Seasonal Lyme Disease Infection and the Species Involve
Most new cases of Lyme disease are diagnosed during the summer or fall months following infection in May or June. This is due to the infection being spread whilst ticks are in their nymphal stage rather than as larvae, although this varies according to geographical region. The adults, rather than the nymphs, of the species Ixodes persulcatus, for example, are thought to be largely responsible for transmitting the infection to humans (Kurtenbach , et al, 1998). Borrelia burgdorferi was the Borrelia species first identified in the 1980s as responsible for Lyme disease but this species has now been reclassified as just one of several strains of the bacteria which have come to be known as the group Borrelia burgdorferi sensu lato. This group includes B. burgdorferi sensu stricto, B. afzelii, and B. garinii amongst others. B. afzelii and B. garinii are largely responsible for cases of Lyme disease in Europe whereas the burgdorferi species is considered the causative factor in most cases of Lyme disease in North America. There are at least eleven Borrelia species, five of which are strongly associated with Lyme disease and two more of which are thought to be accountable in a small number of cases (B. bissettii, and B. valaisiana). Those with a strong association to Lyme Borreliosis include B. burgdorferi sensu stricto, B. garinii, B. bavariensis, B. afzelii, and B. spielmanii.
The Nature of the Borrelia Bacteria
The Borrelia bacteria are Gram-negative, spirochaetal bacteria which have both an inner and outer membrane. This affects both their detection in the bloodstream and their eradication as they appear to be able to express different surface proteins in order to mimic a patient’s own cells so as to go undetected by the immune system. This ability to mimic the body’s own cells is also implicated in the possible continuing autoimmune reaction that some Lyme disease patients display and which may be erroneously diagnosed as chronic Lyme disease. There is also considerable genetic variation between the Borrelia bacteria which can make testing imprecise and inaccurate and often requires a two-fold approach to identifying the presence of infection and the nature of the bacteria. Lyme disease is classed as a zoonosis as it is an infectious disease transmitted from another vertebrate animal, in this case by a vector (the tick). Not all infected animals act as a ‘reservoir’ for infection however, with some testing positive for antibodies to the bacteria or evidence of the presence of bacterial DNA but not leading to infection of ticks or larvae feeding from that animal.
Animal Hosts of Lyme Disease Bacteria
The types of tick that carry the bacteria vary between countries, favoring different host animals such as sheep and deer, along with a variety of rodents, birds, cattle, and even feral cats. Lizards also play host to some ticks and were largely thought for many years to have a zooprophylactic action on the Borrelia bacteria, actually cleansing the ticks of the infection. The evidence now supports their role as hosts of ticks infected with at least one kind of Borellia species B. lusitaniae, which has implications for environmental-engineering strategies for disease control (Dsouli et al., 2006). Such strategies are based on the idea that infected tick populations and, therefore Lyme disease incidence in humans, could be controlled by engineering the animal environment. Experiments in Monhegan, Maine, and Mumford Cove, Connecticut appear to have succeeded to some degree in reducing the incidence of Lyme disease by reducing the numbers of those animals (such as deer) which act as hosts of infectious ticks.
Engineering the natural environment is impractical in most areas however, and the focus in Lyme disease prevention has remained on developing awareness of the importance of checking for ticks and promptly, and safely removing those found. Some strategies for medicating wildlife such as deer have been developed such as the 4-poster deer treatment bait station which uses pesticide-impregnated rollers to transfer tickicide to the ears of the deer where most of the tick population resides, this is then transferred to other body parts during grooming and appears effective at reducing the tick population in the areas used although long-term effects on the deer and other wildlife are unknown.
The tick responsible for carrying the Lyme disease bacteria in Europe is known as the sheep tick or castor tick and is of the species Ixodes ricinus. Ixodes scapularis is the predominant carrier of the disease in eastern North America and is referred to as the deer tick or black-legged tick. The disease-carrying ticks are not thought to be endemic in the central states of North America or in the Southeastern US as far as Texas as the tick population here is made up largely of the lone star tick (Amblyomma americanum). The Amblyomma americanum is thought responsible however for a condition with similarities to Lyme disease, but milder, known as southern tick-associated rash illness. Lyme disease also occurs in China and is attributed to the presence of Ixodes persulcatus, known as the taiga tick.
Species-Specific Symptoms of Lyme Disease
The type of tick and the type of Borrelia strain present in an area has implications for the development and treatment of the disease. This is because each strain appears to give rise to specific features of Lyme disease at different stages. The B. burgdorferi senso stricto is most associated with arthritis, for example, whereas B. garinii is associated with neurological symptoms and B. afzelii with acrodermatitis chronica atrophicans (a chronic skin condition). The occurrence of the characteristic erythema migrans ‘bullseye’ Lyme disease rash also varies with a much more rapid appearance following infection with B. afzelli than with B. garinii. The latter is more likely to cause systemic symptoms than the localized rash and may, therefore, lead to an increased risk of misdiagnosis in those infected with that particular bacterial strain (Bennet, et al, 2006), making it doubly important to consider a differential diagnosis for Lyme disease.
Remaining Vigilant Against Deer Ticks
Knowledge of the specific bacterial strains, their favored ticks, and the ticks’ favored animal hosts has progressed rapidly in recent years leading to a vast information network for researchers into Lyme disease. Increasing knowledge of the tick life-cycle and periods of activity or inactivity is also important as this provides an opportunity to give good quality advice on Lyme disease prevention and act as an early warning system for those residing, or holidaying, in high risk areas. General advice is to increase vigilance when engaging in high-risk activities such as gardening, hunting, or hiking, especially when in long grass. Dogs pose little risk of acting as tick hosts unless they are outdoor pets, whereas feral cats can present a risk; checking pets for ticks following outdoor activities is good practice however. The tiny, poppy seed-sized, ticks are also very difficult to spot which is why wearing light clothes can help locate them early. Making sure to check yourself and your children for ticks after returning indoors from outdoor pursuits is also important and it helps to shower thoroughly following outdoor activity in an area where such ticks are present.
Where a tick is observed it is important to remove it carefully with tweezers so as not to detach the head. Keep the tick in a jar and watch for any signs of infection. If Lyme disease is suspected then take the stored tick to the appointment with the doctor as it may prove useful in identifying the type of infection through a tick test. As always, prevention is better than cure, and it is sensible to wear lightly colored clothing including long-sleeved shirts and pants, with pants tucked into boots/socks when walking in long grass. Check frequently for ticks, including on the scalp as they can quickly move up the body, and use specific tick repellent where necessary.
European Union Concerted Action on Lyme Borreliosis (EUCALB), BIOLOGY: The Tick: Seasonality, http://j.mp/laBbOA
Bennet L, Fraenkel CJ, Garpmo U, Halling A, Ingman M, Ornstein K, Stjernberg L, Berglund J. Clinical appearance of erythema migrans caused by Borrelia afzelii and Borrelia garinii – effect of the patient’s sex. Wien Klin Wochenschr 2006;118/1718:5317.
Dsouli N, Younsi-Kabachii H, Postic D, Nouira S, Gern L, Bouattour A, Reservoir role of lizard Psammodromus algirus in transmission cycle of Borrelia burgdorferi sensu lato (Spirochaetaceae) in Tunisia. J Med Entomol 2006. 43(4): p. 737-42.
Woodrum JE, Oliver JH Jr. Investigation of venereal, transplacental, and contact transmission of the Lyme disease spirochete, Borrelia burgdorferi, in Syrian hamsters. Journal of Parasitology 85:426-430, 1999.
Gerber, MA., et al, The risk of acquiring Lyme disease or babesiosis from a blood transfusion. Journal of Infectious Disease 170:231-234.1994.
Machácková M, Oborník M, Kopecký J., Effect of salivary gland extract from Ixodes ricinus ticks on the proliferation of Borrelia burgdorferi sensu stricto in vivo, Folia Parasitol (Praha). 2006 Jun;53(2):153-8.
Kurtenbach K, Peacey M, Rijpkema SG, Hoodless AN, Nuttall PA, Randolph SE., Differential transmission of the genospecies of Borrelia burgdorferi sensu lato by game birds and small rodents in England, Appl Environ Microbiol. 1998 Apr;64(4):1169-74.
|
<urn:uuid:544b0929-28bb-4819-b194-e57fdf74bf57>
|
{
"dump": "CC-MAIN-2018-43",
"url": "http://lymediseaseguide.net/lyme-disease-causes",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583519859.77/warc/CC-MAIN-20181024042701-20181024064201-00025.warc.gz",
"language": "en",
"language_score": 0.9444519877433777,
"token_count": 2655,
"score": 3.890625,
"int_score": 4
}
|
Level 1 Beginning French
French Level 1 is intended for students with no or minimal previous experience with the French language. The course emphasizes communicative proficiency, with special attention to the development of oral and listening skills, self-expression, and cultural insights. Classroom activities are varied and interactive and are focused on acquiring all four language competencies (listening, speaking, reading, and writing) simultaneously-always in the context of a cultural narrative. Each lesson begins with a rapid flow of authentic French presented in realistic, everyday circumstances, supported by video presentations and a comprehensive workbook. Free-form classroom interactions are balanced with structured grammar and vocabulary drills. By the end of this seven-week immersion program, students will be able to easily navigate a variety of real-world situations.
|
<urn:uuid:84c46160-c381-44a0-ba82-776f70d2b786>
|
{
"dump": "CC-MAIN-2014-49",
"url": "http://www.middlebury.edu/ls/french/curriculum/lvl1french",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416400379546.70/warc/CC-MAIN-20141119123259-00152-ip-10-235-23-156.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9295164346694946,
"token_count": 156,
"score": 3.109375,
"int_score": 3
}
|
STEVE WHISENANT, Department of Rangeland Ecology and Management, Texas A&M University, College Station, TX 77843-2126.
Abstract. Since no brush sculpting technique is appropriate for all situations, we must develop the most effective method for each unique situation. That requires an appraisal of resource potential; clearly stated goals for brush composition, size, and density; and a practical assessment of potential treatment alternatives. Our choice of specific brush sculpting methods is influenced by: (1) practical considerations; (2) regulatory restrictions; (3) degree of selectivity needed; (4) the density, age and size of brush; (5) resprouting ability; (6) potential for creating new problems; and (7) maintenance requirements. In general, brush sculpting methods that treat individual plants are more practical in areas with lower plant densities. Broadcast-applied methods, such as burning, certain mechanical methods and aerial spraying, are often restricted by reduced selectivity. Since greater brush changes require more effort (time, money & labor), brush sculpting activities that occur during the preventive maintenance or early intervention stages are most effective.
When developing our brush sculpting plan, we should consider three general topics. What do I have now? What are my brush sculpting goals? How do I achieve those goals? We usually begin with a general concept of our land use goals, which often includes a desire for more quail, whitetail deer, songbirds, or recreation-related income. Or we may simply want to increase livestock production or alter the visual appearance of the area. More commonly, we want to achieve some unique combination of several objectives. Brush sculpting implies an appreciation for both the benefits and problems associated with each species of brush. Since other papers in this symposium address the requirements for specific land uses, I’ll briefly discuss several questions that should be considered when developing brush sculpting strategies. Then subsequent papers will provide more in-depth discussions of specific brush sculpting methods.
What do I have now?
Effective brush sculpting programs have specific goals for brush composition, size, and density. Only after appraising the existing vegetation can we set clear and achievable brush sculpting goals. After determining the current composition, size, and density of brush, we should consider its potential contribution toward our general land-use goals. Which components of the existing brush community are contributing to our land-use objectives and which are not? Are desirable species present in appropriate amounts (density, cover, production)? Do other species reduce our ability to achieve land-use goals because they are undesirable, too dense, or inhibit more desirable species? Are important species missing or less common than desired?
What are my brush sculpting goals?
Our management objectives, or the relative importance of several objectives, are determined by land-use goals, social interactions, economics, management preferences, and the constraints imposed by the biotic and abiotic environment. As a result, brush sculpting programs driven by livestock production economics will differ from those that emphasize wildlife habitat improvement. Our own sense of esthetics will also influence brush sculpting objectives.
Whatever our management objectives, we must decide what brush mixture would most effectively achieve those objectives. That requires site specific brush goals. Thus, land-use goals such as “improve wildlife habitat” must be restated as specific brush sculpting goals such as “reduce juniper cover to less than 5% and mesquite cover to less than 10% without damaging existing redbud, ephedra, and elbowbush plants” and “only the largest juniper and mesquite trees should remain untreated”. Site- specific brush sculpting goals that address species composition, size and density increase the likelihood that an effective brush sculpting strategy will be developed.
Although brush sculpting goals should be established for each site, practical restrictions, i.e., like money and time, require that we set priorities among those sites. Although many factors influence site selection decisions, we should at least consider beginning where it will do the most good. For livestock production that might include reducing pricklypear or juniper coverage on the best soils, or clearing a calving or lambing pasture to make it easier to view the animals. For quail we might develop loafing cover on sandy soils. Whitetail deer management may benefit most from selective brush sculpting that increases the diversity of forbs and quality browse while reducing unused brush and maintaining screening cover. Whatever your goals and priorities, decide what is most important and develop a long-term plan that addresses those priorities.
How do I achieve my brush sculpting goals?
Brush sculpting provides an avenue for reaching our goals by taking advantage of selective strategies for removing (or reducing) certain species while encouraging or even adding others. The next several papers in this symposium describe the strengths and weaknesses of specific brush sculpting tools (mechanical, chemical, fire, and biological). Charles Coffman will discuss methods for propagating and reestablishing various brush species and Dale Rollins will discuss the importance of landscape configuration. Although several technologies are available for brush sculpting, none are appropriate for all situations. Properly selected, sequenced, and applied brush sculpting strategies reduce treatment costs and maximize long-term benefits. Without understanding the unique strengths and characteristic weaknesses of potential treatment methods it will be difficult to achieve brush sculpting goals.
Our selection of specific brush sculpting technologies should be influenced by: (1) practical considerations; (2) regulatory restrictions; (3) degree of selectivity needed; (4) the density, age and size of brush; (5) resprouting ability; (6) potential for creating new problems; and (7) maintenance requirements. In general, brush sculpting technologies that treat individual plants are restricted to areas with low plant densities, although, that may be less restrictive than previously believed–at least with some herbicide treatments. Broadcast techniques–burning, certain mechanical methods, aerial spraying–may have limited selectivity. Those methods may not effectively control target species without damaging desired species. However, there are important exceptions to these general patterns and several other papers in this symposium will provide examples.
Practical considerations. The availability of the necessary equipment, treatment costs, and labor requirements restrict some treatment options while favoring others. Implementation difficulties associated with a particular property will limit other options. For example, the use of fire may be restricted by a shortage of fuel, difficulties in preparing adequate firelines, or a lack of training. I’m often asked by ranchers if they have enough grass to burn. The real issue is whether there is enough fuel to accomplish your brush sculpting objectives. Although there may be enough fuel to burn, there may be insufficient fuel to significantly affect the target plants.
Regulatory restrictions. Herbicides should always be applied according to label instructions, which may vary for each species, herbicide, and even between counties. Local regulations may restrict herbicide use because of the potential presence of endangered species or application cutoff dates. The Texas Air Quality Control Board places several restrictions on rangeland burning. The fire must carry smoke and other pollutants away from any city, town, residential, recreational, commercial, or industrial area, navigable water, public road, or landing strip. It should be conducted in a manner to prevent a shift in wind direction from producing adverse effects to persons, animals, or property during the burning period. They require fires be started after 9 am and completed as soon as is reasonably practical prior to 5 p.m. They also require that fires occur when winds are between 6 and 23 miles per hour. No fire should be started during actual or predicted persistent low-level atmospheric temperature inversions. There are additional restrictions in heavily populated coastal counties with dense cordgrass stands.
Degree of selectivity needed. The importance and pursuit of selectivity are distinguishing features of brush sculpturing programs compared to previous approaches. This addition and/or subtraction of individual plants or species provides a powerful habitat management tool that deserves far more emphasis in the future. Fundamental planning considerations include: (1) what degree of selectivity is desired; and (2) what methods provide that selectivity.
Fire is used as a broadcast treatment that affects all plants to some degree. However, that impact varies with species, season, age, and size of the plant in addition to the intensity and frequency of burning. Skilled practitioners of fire can achieve a remarkable degree of selectivity, but there are still many limitations. Fire is most effective when used to reduce undesirable brush during the preventive maintenance and early intervention stages (Fig. 1).
The major strengths of the new individual plant herbicidal methods are the relatively minor equipment investment, high degree of selectivity, and flexible timing of labor requirements. Broadcast herbicide applications are restricted by adjacent cropland with susceptible crops and by the presence of desirable brush species that may also be susceptible. Fortunately, there are several selective broadcast uses of herbicides for Texas rangelands. It is just as important to understand what species are tolerant of each herbicide as it is to know which species are susceptible to that herbicide. This knowledge provides the basis for developing selective, broadcast applications. Broadcast applications of less selective herbicides may even be applied in specific patterns (strips, grids, along topographic boundaries, etc.) to provide a lesser degree of brush sculpting. Individual plant treatments with hand-applied herbicides or mechanical methods provide the ultimate in selectivity. This allows you to select the species, size, and even location of brush to be killed, planted, or left untreated.
Density, size and age of brush. Treating (or planting) individual plants provides an opportunity for maximum selectivity. However, the practical value of individual plant treatments is restricted by the density and size of plants to be removed (or planted). With individual plant treatments, costs escalate rapidly as the density and size of treated brush increases. Larger trees might be more efficiently treated with selective mechanical methods. Although, broadcast treatments like aerial spraying and prescribed fire are not automatically more expensive on denser, older stands–they may be less effective. Broadcast mechanical methods (such as chaining, roller chopping and rootplowing) may become somewhat more expensive where larger more dense brush are present, but the differential is less than with individual plant treatments. The old adage “an ounce of prevention is worth a pound of cure” is never more appropriate than when planning any brush sculpting program (Fig. 1). It will be far easier and more effective to maintain existing areas than it will be to create major changes in the brush composition.
Resprouting ability. The ability of many brush species to resprout from the base when the top is killed or removed may be either a problem or an opportunity. It is a problem when we are unable to kill mesquite, redberry juniper, huisache, and others with fire, some herbicides, or mechanical methods that only remove the top. It creates opportunities when we use the same methods to reduce the height of desirable browse plants, thus making the browse more readily available to wild or domestic animals.
Potential for creating new problems. Always consider the possibility that a potential brush sculpting method will create additional problems. The most common problems arise following chaining or roller chopping areas with prickly pear. Any mechanical treatment that scatters pricklypear pads or pieces of pads can potentially cause problems. Without follow-up pricklypear treatments, these sites often become dominated by pricklypear. Continued mechanical or non-lethal chemical treatment of strong resprouters–like mesquite–may increase stem density enough to cause greater problems than the original untreated situation.
Maintenance. Effective brush sculpting is not a one-shot affair. We should start thinking about maintaining brush sculptured areas when planning the original treatments. Initial treatments may be relatively expensive, so there is ample incentive for extending the length of treatment effectiveness. One way to extend treatment life is to periodically apply low-cost secondary treatments to maintain original treatment effectiveness. When possible, it will be most effective to use grazing animals and/or prescribed fire to maintain and extend treatment life.
McGinty, A. M., and D. N. Ueckert. 1996. How to Master Cedar. Texas Agri. Ext. Serv. and Texas Agr. Expt. Sta. Pub. L-5160.
McGinty, A.M., and D.N. Ueckert. 1997. How to Beat Mesquite. Texas Agri. Ext. Ser. and Texas Agri. Expt. Sta. Pub. L-5144.
Rasmussen, G. A., G.R. McPherson, and H. A. Wright. 1986. Prescribed burning juniper communities in Texas. Management Note 10. Dept. Range and Wildl. Manage. Texas Tech University.
Scifres, C. J., and W. T. Hamilton. 1993. Prescribed Burning for Brushland Management: The South Texas Example. Texas A&M University Press. College Station.
Welch, T.G., B.S. Rector, and J. S. Alderson. 1993. Seeding rangeland. Texas Agric. Ext. Ser. Bull. B-1379.
Welch, T.G. 1995. Chemical weed and brush control: suggestions for rangeland. Texas Agri. Ext. Ser. Bull. B-1466.Comments: Dale Rollins, Professor and Extension Wildlife Specialist
Updated: Mar. 18, 1997
|
<urn:uuid:4d938985-ecac-45b8-9607-c8a98dc309f4>
|
{
"dump": "CC-MAIN-2017-43",
"url": "https://texnat.tamu.edu/library/symposia/brush-sculptors-innovations-for-tailoring-brushy-rangelands-to-enhance-wildlife-habitat-and-recreational-value/an-overview-of-brush-sculpting-principles/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824894.98/warc/CC-MAIN-20171021190701-20171021210701-00049.warc.gz",
"language": "en",
"language_score": 0.9233219623565674,
"token_count": 2798,
"score": 2.5625,
"int_score": 3
}
|
Fifth in line to the throne, Karl I was not expected to become the Habsburg emperor. By the time he did, in 1916, it was already too late for the crumbling empire.
First World War
The long history of no man’s land, from lawlessness and desolation to hope and regrowth.
A signature in a collection of autographs reveals a story of Indigenous service that extends from Australia to Canada and Trinidad.
The First World War threw widows and their brothers-in-law together, but their marriages were considered incestuous.
The sobering story of the Indian Labour Corps.
A short story written in the earliest days of the First World War became an enduring symbol of British providence.
The global crisis wrought by the First World War prompted the birth of free mental health care.
The First World War offered new opportunities for enterprising female doctors.
As Britain faced the prospect of food shortages in 1917, panic mounted. One solution was to redeploy policemen to plough the land.
How did an executed English nurse become the unlikely protector of the German poet who pronounced her dead?
|
<urn:uuid:45c8b8bf-8c65-4a1b-b1b3-00823403d8f6>
|
{
"dump": "CC-MAIN-2022-49",
"url": "https://www.historytoday.com/period/first-world-war",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710685.0/warc/CC-MAIN-20221129031912-20221129061912-00538.warc.gz",
"language": "en",
"language_score": 0.9627090692520142,
"token_count": 232,
"score": 3.25,
"int_score": 3
}
|
Last week, the U.S. Copyright Office published new exemptions to the Digital Millennium Copyright Act (“DMCA”), making circumvention of certain technological measures for restricting access to copyrighted works legally acceptable. The exemptions took effect on October 28, 2012, and will last until the end of 2015.
Under the new exemptions, for the next three years, one can legally “jailbreak” wireless telephone handsets (e.g., smartphones) purchased before January 2013. Jailbreaking a device is the process by which one bypasses Digital Rights Management (DRM) software installed on a device. Jailbreaking a mobile phone, for example, allows a user to download applications, extensions, and themes that are unavailable through the mobile phone manufacturer’s application store. Further, under the new exemptions, mobile phones purchased between now and January of 2013 can be unlocked (i.e., not tied to a particular service provider) by any party. But, phones purchased after January 2013 can only be unlocked with the cellular carrier’s permission. These exemptions to the DMCA, however, are not applicable to smartphones purchased after January 2013 or to tablet computers (e.g., iPads).
Additionally, the DMCA now contains an exemption to legally rip DVDs “in order to make use of short portions of the motion pictures for the purpose of criticism or comment in the following instances: (i) in noncommercial videos; (ii) in documentary films; (iii) in nonfiction multimedia e-books offering film analysis; and (iv) for educational purposes in film studies or other courses requiring close analysis of film and media excerpts, by college and university facility, college and university faculty, college and university students, and kindergarten through twelfth grade educators.” The DMCA, however, does not contain an exemption to allow circumvention for space-shifting purposes, that is, the act of copying digital content for use on a device other than the one for which it was originally intended.
Last, a DMCA exemption was created to permit people with disabilities “to obtain books through the open market and use screen readers and other assistive technologies to read them, regardless of whether an accessible copy may be available for purchase, but provided the author, publisher, or other rights owners receives remuneration.”
|
<urn:uuid:1eba8bca-eabf-410c-b11f-77138fd5ffe2>
|
{
"dump": "CC-MAIN-2014-41",
"url": "http://www.iplawalert.com/2012/11/articles/copyright/the-copyright-office-expands-dmca-exemptions-to-broaden-the-use-of-technological-controls/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657104119.19/warc/CC-MAIN-20140914011144-00079-ip-10-196-40-205.us-west-1.compute.internal.warc.gz",
"language": "en",
"language_score": 0.9382020831108093,
"token_count": 470,
"score": 2.5625,
"int_score": 3
}
|
Rev. Douglas Taylor
December 7, 2014
“Do not judge me by my successes, judge me by how many times I fell down and got back up.” (Nelson Mandela) If there is any lesson from Nelson Mandela’s life that I would offer up – that I believe he would offer up – to anyone struggling for justice, fighting against oppression, striving for freedom, it would be this: “The greatest glory in living lies not in never falling, but in rising every time we fall.” (Nelson Mandela)
Mandela’s life is a testimony to the complex alchemy of persistence, forgiveness, anger, resilience, and humility that forms the heart of humanity. As a young man he was a political activist and an angry agitator against the South African government. He spent 27 years in prison and emerged a leader for the nation becoming the country’s first black president. He sought reconciliation rather than revenge. When he rose to power and prominence, instead of exacting justice in the form of retribution, Mandela chose to seek justice in the form of reconciliation; notably through the Truth and Reconciliation Commission established under his presidency. Apartheid had taken its toll on the nation; it was no simple thing to begin the work of dismantling. But that is exactly what he did.
Mandela was a truly remarkable individual. He became a symbol for the nation, but he was not just a figurehead or showpiece for the movement. He was the real deal: full of flaws and contradiction as well as conviction, compassion, perseverance, and vision.
There have been half-a-dozen movies about his life or his impact on South Africa. Mandela has been portrayed by Danny Glover, Morgan Freeman, Idris Elba, and Sidney Poitier. Through the 80’s there were numerous concerts and musical events lionizing Mandela and calling for his release. For a time, he was a world-famous prisoner. As a teenager I learned about Apartheid through activist musicians like Peter Gabriel and Bono. The album produced by Little Steven about artists refusing to play at Sun City, South Africa was my introduction to apartheid. That amazing song by The Specials (Free) Nelson Mandela and Johnny Clegg’s Asimbonanga were part of my regular listening in high school. Mandela became a symbol. When they sang “Free Nelson Mandela,” they were also saying “free South Africa and the black South African people.” But he was more than just a symbol, he became the movement.
He became powerfully useful to the anti-apartheid movement while in prison. When he came out of prison he was able to demonstrate that he was not just a symbol of the oppression and injustice, he could be the leader his country needed. And then when he refused to run for a second term in office he helped demonstrate that the people could be the people the country needed without him. He was an activist, prisoner, a president, and a retired statesman depending on what his people needed and circumstances demanded.
He often talked about the poem Invictus by William Ernest Henley as being critically inspiring during the difficult years of his imprisonment.
Out of the night that covers me
Black as the Pit from pole to pole,
I thank whatever gods may be
For my unconquerable soul.
The title, Invictus, is Latin for unconquerable. It was an acknowledgement of strength and of humility. Mandela shared in the gratitude expressed in the poem. Having spent as long as he did in prison, having struggled to achieve freedom for himself and his people before prison, Mandela knew something of the fell clutch of circumstance. The poem continues:
In the fell clutch of circumstance
I have not winced nor cried aloud.
Under the bludgeonings of chance
My head is bloody, but unbowed.
Beyond this place of wrath and tears
Looms but the Horror of the shade,
And yet the menace of the years
Finds and shall find me unafraid
It matters not how strait the gate,
How charged with punishment the scroll,
I am the master of my fate:
I am the captain of my soul.
This poem helped him to stay strong and to persevere through his trials and difficulties. And it helped him to remain grounded when, later in his life, fame and celebrity and power threatened to distract him. There was an earlier time, however, before the fame and recognition. The South African government worked to have the African National Congress and all its leaders including Mandela erased from national memory. After they arrested and convicted Mandela and other ANC leaders in the early 60s, they banned the ANC organization and made it illegal. The history taught to the upcoming generation was devoid of this information.
Angry black South African activists in the 70’s were struggling against the oppressive system of apartheid strangling their communities. They fought back as best they could. They had heard some stories, whispered stories, of organizations that had tried in the past to win freedom yet had failed. When these young activists were arrested, tried, and sent to prison, something unexpected occurred. Many of the political prisoners were sent to Robbins Island – an Alcatraz-like island of rock of the cape. There they encountered Nelson Mandela.
Mandela would take these young activists and agitators under his wing. He would share with them Henley’s poem about the unconquerable soul. He would urge them toward models of protest that were grounded in non-violence and in the inclusion of white allies.
Mandela had not started as a proponent of non-violent protest. His incarceration was for being part of the “Spear of the Nation,” the armed wing of the ANC that attempted to sabotage the government. Mandela’s commitment to non-violence was a tactical decision – he saw how powerful it could be. In fact, several times throughout his imprisonment, he was offered release if he would only renounce violence – and every time he refused, he would not compromise. Margaret Thatcher called the ANC a typical terrorist organization. Our U.S. government kept its distance as well, due to the ANC’s communist connections. Indeed there is reference to the CIA having a role in Mandela’s arrest back in the 60’s.
But one of the marks of Mandela’s greatness was his ability to grow and change as the needs of the situation changed. He shifted to a strong advocacy of non-violence not because he found violence abhorrent or because it went against his conscience. No, he shifted his perspective because he saw that non-violence was a more effective tool for accomplishing his goal of freedom and healing for his country.
After being released in 1990, Mandela went on a campaign to strengthen the international pressure to end apartheid and establish elections. He encouraged every party to participate, even those who had been his enemies before and during his imprisonment. He wanted the freedom to apply to everyone. After winning the election, he launched the Truth and Reconciliation Commission. Again, he insisted that there be no exemptions, so even his own party, the ANC, was investigated and called to account.
There has been a significant amount of study concerning the effectiveness of the Truth and Reconciliation Commission’s work. Often compared against the Nuremberg trials after World War II, the two cases serve as the real-life examples in the debate between restorative justice and retributive justice in terms of human-rights violations. One of the signature pieces of the Truth and Reconciliation process in South Africa was the capacity for people to apply for amnesty. I find it interesting to note that there were just under 850 amnesties granted out of the more than seven thousand cases considered by the commission. That is a little under 12% according the historical records of the official Truth and Reconciliation website.
Which is the next distinctive mark I want to lift up about Nelson Mandela and his impact: it is complex. Peace and prosperity did not just flow in on Mandela’s election day. The Truth and Reconciliation Commission didn’t just thank war criminals for their testimony and let them walk free. Forgiveness is hard work. Freedom is a complicated path to walk. Mandela called South Africa a rainbow nation. He called the people to see themselves as one nation across the different ethnicities and parties. He called them to be something that did not yet exist.
The urge in us toward retribution and retaliation is a powerful drive, a very real part of our nature. Often the oppressed rise up in a fight for freedom, only to trade places to become the new oppressor. Mandela’s capacity to walk out of prison after 27 years without bitterness and a desire for revenge is remarkable. What would you do given similar circumstance? What have you done in your own circumstances? Mandela would not advocate a quick fix, a platitude for the gapping injustice; but neither would he suggest resignation or playing nice.
When I think about the injustice on my heart this week of the series of cases of police officers using deadly force against black individuals with impunity, I wonder what Nelson Mandela would suggest to me. How might he respond?
I recognize that there are a wide range of perspectives and opinions on the anti-racism movement sweeping through our country now. Some here are focused the racism, others seeking to analyses more deeply the particulars, a handful trying to acknowledge the justifiable fears and dangers of police work, a few trying to ferment revolution, and a smattering trying to quietly wait it all out – and of course a good number tangled in their own turmoil such that national issues don’t even break the surface.
If you have not been following – briefly the issue on my heart today stems from the police shooting of Michael Brown in Ferguson and the police strangulation of Eric Garner in New York City. In both cases, the grand jury refused to indict the officer.
Here in Binghamton, as is the case in several cities around the country, there have been protests, rallies, and marches. Here in Binghamton, the Binghamton University students gathered last week to protest with a ‘die-in’ event that blocked traffic on the Vestal Parkway. Here in Binghamton, a small group of BU students and community members met to talk about what we could do together about the problems around us. Here in Binghamton, last night, over 50 people gathered in our congregation’s social hall for a community conversation about race and police brutality and next steps. About ten people from our congregation were present. We talked about our experiences and looked at next steps that might include legislative actions, teach-ins, and actions directed to address police brutality. It was a pretty good conversation. There will be another here next Sunday night at 6pm to determine which of these will be our actual next steps.
In thinking about the life of Nelson Mandela against the backdrop of the current news troubling my heart, I admit it is not overly fair to ask what lessons Mandela’s life offers. But I ask it anyway, just as countless people seek to apply the lessons of saints and sages, prophets and divinities through the ages. Mandela was a man of persistence and vision. He was strategic and adaptable. I think he would caution us to stay true for the long haul. In considering our country’s history of racism and violence he might caution us against demonizing the oppressor or the oppressed.
Are there ways we can bring everyone back to the table for the work of healing and reconciliation? He might ask, are there ways to help the police be better at their job of serving and protecting? It is harder work to insist that all of us need to be part of the solution. It takes persistence, forgiveness, and humility to walk that long road to freedom.
In his autobiography, Mandela writes, “I have walked that long road to freedom. I have tried not to falter; I have made missteps along the way. But I have discovered the secret that after climbing a great hill, one only finds that there are many more hills to climb. I have taken a moment here to rest, to steal a view of the glorious vista that surrounds me, to look back on the distance I have come. But I can only rest for a moment, for with freedom come responsibilities, and I dare not linger, for my long walk is not ended.” (from Long Walk to Freedom, Mandela’s autobiography)
May we have the strength of spirit to walk the long road. May we each find within ourselves and in the support of those around us, the wherewithal to persevere in the face of difficulties and trials and injustices. And may we, most of all, have the vision to see a way forward that includes all of us with no one, not even our adversaries, left behind.
In a world without end, may it be so.
|
<urn:uuid:5c4a4f12-a888-4e82-91ce-6c7942a2f5da>
|
{
"dump": "CC-MAIN-2018-26",
"url": "http://uubinghamton.org/2014/12/mandelas-persistence/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267867095.70/warc/CC-MAIN-20180624215228-20180624235228-00465.warc.gz",
"language": "en",
"language_score": 0.9782679080963135,
"token_count": 2673,
"score": 3.1875,
"int_score": 3
}
|
Many times homeowners forget that a tree was once a living thing and not some type of uniform widget. Each tree is an individual. As a consequence, there is always a degree of physical variation in the amount of pitch contained in each tree. Pitch is a gooey, sticky, resinous substance composed of a mixture of rosin, turpentine, and other volatiles produced in pine trees and other conifers.
When pitch "bleeds" or oozes out of wood it primarily occurs around knots, although sap bleeding can appear in other areas of the log. Oozing pitch will penetrate right through a wood stain causing discoloration of the stain. Its amber color turns white when it dries.
Often discoloration caused by dried pitch is mistaken as a color failure of the wood stain itself because the cause of the discoloration is not understood. Bleeding pitch can be dissolved with turpentine or mineral spirits. If it's hardened it can be sanded to the bare wood beneath. A hot air gun can also help to soften partially hardened resin and once melted the pitch can be wiped with one of the recommended solvents.
After the pitch is cleaned, the area can be touched up with the same color stain. However, there is no guarantee that it will not occur again. In fact, if it's a real active area that contains a large pitch pocket, expect to clean it periodically.
|
<urn:uuid:95fef62f-b46a-4e1b-9cd4-ccb37b3b980a>
|
{
"dump": "CC-MAIN-2020-29",
"url": "https://www.totalwoodcare.com/sap-bleed/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657138718.61/warc/CC-MAIN-20200712113546-20200712143546-00161.warc.gz",
"language": "en",
"language_score": 0.9510029554367065,
"token_count": 292,
"score": 3.03125,
"int_score": 3
}
|
In a new book, Calestous Juma makes the case that Africa can ‘feed itself in a generation.’ Self-sufficiency is ideal, but there are some major roadblocks. Here is the problem:
Global food production has rocketed in recent decades but has stagnated in many parts of Africa, despite the continent having “abundant” arable land and labour, says Professor Juma.
He estimates that while food production has grown globally by 145% over the past 40 years, African food production has fallen by 10% since 1960, which he attributes to low investment.
While 70% of Africans may be engaged in farming, those who are undernourished on the continent has risen by 100 million to 250 million since 1990, he estimates.
The professor’s blueprint calls for the expansion of basic infrastructure, including new road, irrigation and energy schemes.
Farms should be mechanised, storage and processing facilities built, while biotechnology and GM crops should be used where they can bring benefits.
But what was needed above all else was the political will at the highest level.
“You can modernise agriculture in an area by simply building roads, so that you can send in seed and move out produce,” he told the BBC.
The path to agriculture self-sufficiency is filled with obstacles; some are surmountable, others are not. Building roads, irrigation facilities (less than 5% of the arable farmland in Ghana is irrigated), investing in crop and seed research, and bringing in tractors and other mechanized implements fall into the former category. Global trade dynamics, including tariffs and agriculture subsidies among rich nations, belong in the latter.
|
<urn:uuid:3fa64823-bacd-429e-947a-4847d2dc9e02>
|
{
"dump": "CC-MAIN-2017-09",
"url": "http://developeconomies.com/development-economics/the-road-to-agricultural-self-sufficiency-in-africa/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173872.97/warc/CC-MAIN-20170219104613-00089-ip-10-171-10-108.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9615218043327332,
"token_count": 352,
"score": 2.96875,
"int_score": 3
}
|
Chapter 2: Historical Background and Evolution of Physical
- Physical activity for better health and well-being has been an important theme throughout much of western history.
- Public health recommendations have evolved from emphasizing vigorous activity for cardiorespiratory fitness to including the option of moderate levels of activity for numerous health benefits.
- Recommendations from experts agree that for better health, physical activity should be performed regularly. The most recent recommendations advise people of all ages to include a minimum of 30 minutes of physical activity of moderate intensity (such as brisk walking) on most, if not all, days of the week. It is also acknowledged that for most people, greater health benefits can be obtained by engaging in physical activity of more vigorous intensity or of longer duration.
- Experts advise previously sedentary people embarking on a physical activity program to start with short durations of moderate-intensity activity and gradually increase the duration or intensity until the goal is reached.
- Experts advise consulting with a physician before beginning a new physical activity program for people with chronic diseases, such as cardiovascular disease and diabetes mellitus, or for those who are at high risk for these diseases. Experts also advise men over age 40 and women over age 50 to consult a physician before they begin a vigorous activity program.
- Recent recommendations from experts also suggest that cardiorespiratory endurance activity should be supplemented with strength-developing exercises at least twice per week for adults, in order to improve musculoskeletal health, maintain independence in performing the activities of daily life, and reduce the risk of falling.
Chapter 3: Physiologic Responses and Long-Term Adaptations to Exercise
- Physical activity has numerous beneficial physiologic effects. Most widely appreciated are its effects on the cardiovascular and musculoskeletal systems, but benefits on the functioning of metabolic, endocrine, and immune systems are also considerable.
- Many of the beneficial effects of exercise training - from both endurance and resistance activities - diminish within 2 weeks if physical activity is substantially reduced, and effects disappear within 2 to 8 months if physical activity is not resumed.
- People of all ages, both male and female, undergo beneficial physiologic adaptations to physical activity.
Chapter 4: The Effects of Physical Activity on Health and Disease
- Higher levels of regular physical activity are associated with lower mortality rates for both older and younger adults.
- Even those who are moderately active on a regular basis have lower mortality rates than those who are least active.
- Regular physical activity or cardiorespiratory fitness decreases the risk of cardiovascular disease mortality in general and of coronary heart disease mortality in particular. Existing data are not conclusive regarding a relationship between physical activity and stroke.
- The level of decreased risk of coronary heart disease attributable to regular physical activity is similar to that of other lifestyle factors, such as keeping free from cigarette smoking.
- Regular physical activity prevents or delays the development of high blood pressure, and exercise reduces blood pressure in people with hypertension.
- Regular physical activity is associated with a decreased risk of colon cancer.
- There is no association between physical activity and rectal cancer. Data are too sparse to draw conclusions regarding a relationship between physical activity and
endometrial, ovarian, or testicular cancers.
- Despite numerous studies on the subject, existing data are inconsistent regarding an association between physical activity and breast or prostate cancers.
Non-Insulin-Dependent Diabetes Mellitus
- Regular physical activity lowers the risk of developing non-insulin-dependent diabetes mellitus.
- Regular physical activity is necessary for maintaining normal muscle strength, joint structure, and joint function. In the range recommended for health, physical activity is not associated with joint damage or development of osteoarthritis and may be beneficial for many people with arthritis.
- Competitive athletics may be associated with the development of osteoarthritis later in life, but sports-related injuries are the likely cause.
- Weight-bearing physical activity is essential for normal skeletal development during childhood and adolescence and for achieving and maintaining peak bone mass in young adults.
- It is unclear whether resistance- or endurance-type physical activity can reduce the accelerated rate of bone loss in postmenopausal women in the absence of estrogen replacement therapy.
- There is promising evidence that strength training and other forms of exercise in older adults preserve the ability to maintain independent living status and reduce the risk of falling.
- Low levels of activity, resulting in fewer kilocalories used than consumed, contribute to the high prevalence of obesity in the United States.
- Physical activity may favorably affect body fat distribution.
- Physical activity appears to relieve symptoms of depression and anxiety and improve mood.
- Regular physical activity may reduce the risk of developing depression, although further research is required on this topic.
Health-Related Quality of Life
- Physical activity appears to improve health-related quality of life by enhancing psychological well-being and by improving physical functioning in persons compromised by poor health.
- Most musculoskeletal injuries related to physical activity are believed to be preventable by gradually working up to a desired level of activity and by avoiding excessive amounts of activity.
- Serious cardiovascular events can occur with physical exertion, but the net effect of regular physical activity is a lower risk of mortality from cardiovascular disease.
Chapter 5: Patterns and Trends in Physical Activity
- Approximately 15 percent of U.S. adults engage regularly (3 times a week for at least 20 minutes) in vigorous physical activity during leisure time.
- Approximately 22 percent of adults engage regularly (5 times a week for at least 30 minutes) in sustained physical activity of any intensity during leisure time.
- About 25 percent of adults report no physical activity at all in their leisure time.
- Physical inactivity is more prevalent among women than men, among blacks and Hispanics than whites, among older than younger adults, and among the less affluent than the more affluent.
- The most popular leisure-time physical activities among adults are walking and gardening or yard work.
Adolescents and Young Adults
- Only about one-half of U.S. young people (ages 12-21 years) regularly participate in vigorous physical activity. One-fourth report no vigorous physical activity.
- Approximately one-fourth of young people walk or bicycle (i.e., engage in light to moderate activity) nearly every day.
- About 14 percent of young people report no recent vigorous or light to moderate physical activity. This indicator of inactivity is higher among females than males and among black females than white females.
- Males are more likely than females to participate in vigorous physical activity, strengthening activities, and walking or bicycling.
- Participation in all types of physical activity declines strikingly as age or grade in school increases.
- Among high school students, enrollment in physical education remained unchanged during the first half of the 1990s. However, daily attendance in physical education declined from approximately 42 percent to 25 percent.
- The percentage of high school students who were enrolled in physical education and who reported being physically active for at least 20 minutes in physical education classes declined from approximately 81 percent to 70 percent during the first half of this decade.
- Only 19 percent of all high school students report being physically active for 20 minutes or more in daily physical education classes.
Chapter 6: Understanding and Promoting Physical Activity
- Consistent influences on physical activity patterns among adults and young people include confidence in one's ability to engage in regular physical activity (e.g., self-efficacy), enjoyment of physical activity, support from others, positive beliefs concerning the benefits of physical activity, and lack of perceived barriers to being physically active.
- For adults, some interventions have been successful in increasing physical activity in communities, worksites, and health care settings, and at home.
- Interventions targeting physical education in elementary school can substantially increase the amount of time students spend being physically active in physical education class.
| Top of Page |
|
<urn:uuid:9988c11f-9850-4866-8400-ffadab340a8d>
|
{
"dump": "CC-MAIN-2014-15",
"url": "http://www.cdc.gov/nccdphp/sgr/chapcon.htm",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609540626.47/warc/CC-MAIN-20140416005220-00062-ip-10-147-4-33.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9357433319091797,
"token_count": 1620,
"score": 3.625,
"int_score": 4
}
|
Social Science Assignment Help
Social Science is an umbrella term for a number of academic disciplines that are concerned with society and its relationship with individuals and their relationships with each other. Broadly speaking the subjects included in social sciences are anthropology, economics, political science, psychology and sociology. Social science can also include other subjects but it is not explicitly so. As social sciences include such a large number of topics with varying scopes and domain interests, it is often confusing for students to engage with it as a whole. All of the subjects that fall into the category of social sciences have specific areas of interest which often overlap and are sometimes distinct from one another. As an example, the respective domains of economics and political science are quite close to each other. In many cases, their domains are not only inter-related but also interdependent. However, each has a focus that is quite distinct. Economics is focused on socio-economic aspects and issues while political science is focussed on socio-political aspects and issues. Similarly, anthropology and sociology have similar domains in the sense that they are both concerned with the functioning of society. But they differ in terms of scope, approach and application of analytical tools. This grey area is where students are often left without a paddle to row and find themselves losing precious marks which they could have otherwise secured very easily. The main social sciences include:
- Political Science
Realising the academic woes of social science students, Top Grade Assignments best assignment help started its social science assignment help services. Being a service provided exclusively to students in Australian universities, they are proficient in competently meeting all your academic requirements. The reason behind our success is the uniqueness of our services. We assign experts according to universities. So say you are from the University of Sydney, you will receive assistance from an expert with some association with your university. Being familiar with the evaluation criteria, they will help you in writing assignments or case studies that garner you top grades in class and give you academic career some acceleration. Also, being able to work with a field expert is a great learning experience and a discerning student may be able to learn a lot from them. Contact us to know more about our social science assignment help services or send your assignment to us.
|
<urn:uuid:fae7dfb0-c391-416f-a054-7ca17734ac11>
|
{
"dump": "CC-MAIN-2018-13",
"url": "http://universityandcolleges.net/assignment-help-on-social-science",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647885.78/warc/CC-MAIN-20180322131741-20180322151741-00730.warc.gz",
"language": "en",
"language_score": 0.9663920402526855,
"token_count": 450,
"score": 2.75,
"int_score": 3
}
|
New York: Instead of directly causing AIDS, the human immunodeficiency virus (HIV) turns host immune cells into suicide machines, using them to spread the virus and cause the progression from HIV to AIDS, new research has revealed.
HIV can either be spread through free-floating virus that directly infect the host immune cells or an infected cell can pass the virus to an uninfected cell.
The second method, cell to cell transmission, is 100 to 1000 times more efficient, and the new study shows that it is only this method that sets off a cellular chain reaction that ends in the newly infected cells committing suicide.
"The fundamental 'killing units' of CD4 T cells in lymphoid tissues are other infected cells, not the free virus," said co-first author Gilad Doitsh from Gladstone Institute of Virology and Immunology, University of California, San Francisco in the US.
HIV mostly targets CD4 T lymphocytes, a type of T cell involved in initiating an immune response.
"And cell-to-cell transmission of HIV is required for activation of the main HIV death pathway," Doitsh noted.
"This study fundamentally changes our mindset about how HIV causes massive cell death, and puts the spotlight squarely on the infected cells in lymphoid tissues rather than the free virus," senior author Warner Greene, director of the Gladstone Institute of Virology and Immunology pointed out.
"By preventing cell-to-cell transmission, we may able to block the death pathway and stop the progression from HIV infection to AIDS," Greene noted.
The study was published in the journal Cell Reports.
|
<urn:uuid:efff8eb8-20a0-4864-92db-01d1c8280a43>
|
{
"dump": "CC-MAIN-2018-30",
"url": "http://zeenews.india.com/news/health/health-news/how-hiv-infection-progresses-to-aids_1664011.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676590074.12/warc/CC-MAIN-20180718080513-20180718100513-00492.warc.gz",
"language": "en",
"language_score": 0.9320647120475769,
"token_count": 335,
"score": 2.796875,
"int_score": 3
}
|
About Children’s Week
Children’s Week is an annual event celebrated in Australia held around the fourth Wednesday in October. A diverse range of events and activities are organised at National, State and Local levels to celebrate the rights of children to enjoy childhood and for the wider community to rejoice in their talents, skills and abilities.
The aims of Children’s Week are :
- to heighten community awareness of the needs of children;
- to promote knowledge of services which are available to children and their families;
- to stimulate education in quality child care and child rearing;
- to increase communication between children and adults and to provide opportunities for children and adults to share enjoyable experiences.
In 2017, our mission remains the same and thousands of children and their families around the country are involved in activities and events through the participation of schools, playgroups, childcare, kindergartens, cultural groups, libraries, departments and community groups.
This year the celebrations during Children’s Week will focus on Article 29 from the United Nations Convention on the Rights of the Child:
“Children’s education should develop each child’s personality, talents and abilities to the fullest. It should encourage children to respect others, human rights and their own and other cultures. It should also help them learn to live peacefully, protect the environment and respect other people. Children have a particular responsibility to respect the rights their parents, and education should aim to develop respect for the values and culture of their parents”.
Universal Children’s Day is Wednesday 25 October and this will be an opportunity to remind society of the plight of many millions of children around the world who are denied the basic necessities of a happy childhood and the education to fulfil their potential. It also calls on us in Australia, to consider those environments which affect the lives and future of our own children.
|
<urn:uuid:69df7c2e-dbd2-4366-a8c3-313b914c2e33>
|
{
"dump": "CC-MAIN-2018-17",
"url": "http://www.childrensweek.com.au/why",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125947968.96/warc/CC-MAIN-20180425213156-20180425233156-00584.warc.gz",
"language": "en",
"language_score": 0.9597718119621277,
"token_count": 382,
"score": 3.140625,
"int_score": 3
}
|
What is Parkinson disease?
Parkinson’s Disease (PD) is a degenerative brain disorder that affects movements such as walking, writing, and talking. It occurs when nerve cells that are located in a part of the midbrain called the substantia nigra die or get damaged. When this happens, the neurons stop producing a hormone called dopamine. One of dopamine’s tasks in the body is to help the muscles move smoothly, and in a coordinated manner. When about 80% of the cells that produce dopamine are damaged, not enough dopamine is produced and a person starts to exhibit.
The classic signs of Parkinson’s Disease are:
The loss of dopamine production in the brain causes the primary symptoms of Parkinson disease.
* slowed movements
* lack of balance
Some patients exhibit these additional symptoms:
* shuffling walk
* muffled speech
* stiff facial expression
* small, cramped handwriting
Who gets Parkinson’s Disease?
Parkinson’s disease is found in equal numbers in both men and women. It affects every ethnic group and nationality. One and a half million Americans currently suffer from Parkinson’s disease. Approximately 60,000 new cases of Parkinson’s disease are diagnosed each year. In most cases, the disease develops after the age of 65, however 15% of those diagnosed are under 50.
There is currently no clinical test for Parkinson’s. This can make the process of diagnosing Parkinson’s disease a long and difficult one. Various tests, such as blood tests and MRI brain scans are usually performed to rule out other conditions that present with similar symptoms. If Parkinson’s is suspected, you should seek the care of a neurologist who specializes in Parkinson’s disease.
People with mild symptoms of Parkinson’s might not need any treatment in the early stages of the disease. As symptoms progress, patients may be offered some of the following treatments.
Choice of medication must be suited to the individual and his or her condition. Your doctor will take into consideration such things as the severity of symptoms, your age and the presence of other medical conditions. Response to medication is very individual, so it may take some time to get the medication and dosage right. As your Parkinson’s progresses, dosages may need to be adjusted. In certain cases, a combination of drugs is prescribed. It is important to receive care from a doctor who has extensive experience treating Parkinson’s disease in all its stages.
The first medicine prescribed is usually Levodopa. Levodopa is a substance that is naturally found in the body in small amounts. Once Levodopa is in the system, the body converts it into dopamine, a hormone that is lacking in Parkinson’s patients.
Dopamine agonists, another class of drugs, were introduced 20 years ago to help minimize symptoms. It can be used on its own or together with levodopa. Agonists are chemicals that can combine with part of a cell and initiating a reaction or activity.
A new class of medication for Parkinson’s, COMT inhibitors, was approved by the Food and Drug Administration in 1998. COMT inhibitors work by blocking an enzyme that breaks down levodopa. COMT inhibitors prolong the effectiveness of levodopa therapy.
There are a number of surgical options available to severely affected patients: ablation, deep brain stimulation, and pallidotomy.
Ablation is the process of pinpointing and ablating (destroying) the area of the brain affected by Parkinson’s. The tissue that produces abnormal chemical or electrical impulses causing abnormal movements is destroyed. This procedure is performed less frequently than deep brain stimulation.
Deep Brain Stimulation (DBS)
DBS targets and inactivates specified areas in the brain where uncontrolled movements originate. The area is inactivated (not destroyed) by an implanted electrode. The electrode in the brain is connected to a stimulator and battery pack in the patient’s chest through a wire that runs beneath the skin.
Pallidotomy is a delicate surgical operation that targets a part of the brain called the pallidum that controls certain symptoms. During the procedure, a delicate probe measures abnormal electrical activity. A second probe delivers small electrical shocks. The patient, who is conscious during the surgery, provides the surgeon with feedback on the effects of the probe. Having pinpointed the region responsible for controlling certain movement, the surgeon burns a minute hole in the cells. The results can be felt almost immediately.
In this form of treatment, cell that produce dopamine are implanted directly into the brain. These cells may come from embryonic stem cells or from fetal cells.
In addition to medication and surgical options, other therapies and nutritional supplements may provide symptomatic relief and improve the patient’s quality of life. Physical therapy has been shown to strengthen and tone muscles and help increase the range of motion. In addition to building muscle strength, physical therapy improves balance, helps overcome gait problems, and improves swallowing and speaking. Everyday activities such as walking, gardening and swimming can also improve patient’s sense of well-being. For some, massage may afford much needed relief from muscle rigidity as well as providing other neuromuscular benefits.
|
<urn:uuid:7ab8b8eb-5a59-40ef-a3ca-64ff17c1f018>
|
{
"dump": "CC-MAIN-2022-33",
"url": "https://discectomy.net/about-parkinson-disease/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570730.59/warc/CC-MAIN-20220807211157-20220808001157-00563.warc.gz",
"language": "en",
"language_score": 0.9364809989929199,
"token_count": 1119,
"score": 3.578125,
"int_score": 4
}
|
When shipping or receiving a package, look carefully at all of your options and select the environmentally responsible choice.
The bad news
Package delivery trucks travel millions of miles a day, burning tens of millions of gallons of diesel fuel. In addition to dropping off boxes and envelopes, they leave behind smog and global warming gases. Trucks that spew carbon monoxide, nitrogen oxide, hydrocarbons and carbon dioxide are a real problem in densely populated, highly trafficked urban areas where air pollution can be severe.
The good news
Several commercial delivery fleets are beginning to use alternative energy. Already, some delivery trucks run on natural gas, which produces only a quarter of the carbon monoxide emissions and half the nitrogen oxide emissions of their diesel counterparts, according to the National Renewable Energy Laboratory. UPS operates 1,024 compressed natural gas vehicles around the country, and it just deployed a hydrogen fuel cell truck as a test in Michigan. FedEx is in the process of incorporating energy-saving hybrid-powered vehicles into its fleet.
|
<urn:uuid:0278d982-aa03-45a1-9ee4-d861ebff8445>
|
{
"dump": "CC-MAIN-2015-32",
"url": "http://www.motherearthliving.com/health-and-wellness/special-deliveries.aspx",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042987402.78/warc/CC-MAIN-20150728002307-00026-ip-10-236-191-2.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9124516248703003,
"token_count": 206,
"score": 2.96875,
"int_score": 3
}
|
After an amazing night in Florence, the FSP gathered this morning in the Piazza Santissima Annunziata, which was a classicizing portico of the 15th century (built between 1419 – 1425 CE) designed by Brunelleschi. It was a beautiful portico with the familiar interplay between squares and circles, characteristic within the Pantheon and other ancient structures that we studies throughout the term. The blue disks between the arches of the arcade (called rondels) were meant to be empty, but these were filled with pictures of infants wrapped in swaddling clothes. This was because the buildings associated with this Piazza served as an orphanage for abandoned infants, the innocenti, evoking the Biblical story of the “Slaughter of the Innocents.”
In good FSP fashion, we visited the National Museum of Florence at the end of the Piazza. Several of the items were of note. Iron stakes that were actually fire dogs from the Tomb of the Fans (2nd half of the 7th century BCE) from Populonia were amazing to see because they indicated an aristocratic burial; whoever was buried here had the capability to host large feasts and feed many people.
Finally, at the LAST formal day of the FSP, Katelyn got to give her talk on Etruscan granulation techniques, evident on a gold-granulated pin from a 7th century tomb in Marsiliana. Both the sides of the golden beads and their craft in creating this fibula (pin) were spectacular to see firsthand.
We saw several bronze statues: (1) of Minerva of the 3rd century BCE from Arezzo, (2) “Arrigatore” bronze of the 3rd century BCE from Perugia, and (3) the famous Chimaera statue (a lion with a snake and goat emerging from its body) of the early 1st century BCE from Arezzo.
The Amazon Sarcophagus showed Hellenistic painting that could have been sketched by a Renaissance artist or even a modern artist; the painters’ abilities were shown by the preserved figures of soldiers and Amazons! We also saw the Francois Krater of ca. 570 BCE from Chiusi, which had an encyclopedia of Greek myths painted all over the krater, including a centauromacy, the return of Hephaestus, funerary games for Petracolus, the liberation of Athens, and the death of Ajax.
Outside in the garden we visited tombs imported from Etruria including the Tomba Diabolino and a tomb from Volterra. After class, the FSP scattered around the city to eat the famous steak of Florence, go shopping, visit the various museums (including the Ufizzi Gallery), and appreciate the duomo.
It was a bittersweet end of the FSP in beautiful Florence. Time to play, then finish that final paper! Thank you all for following us on this amazing journey. For the last time, Ciao!
Emmanuel J. Kim
Photos by Bridget-Kate (she'll give anyone extra points if they get all the song references in quotations):
“Srgt. Pepper Lonely Hearts Club Band.”
|
<urn:uuid:da91563e-5154-4ea4-8203-3faeb6a9b94b>
|
{
"dump": "CC-MAIN-2017-22",
"url": "https://romefsp2013.wordpress.com/2013/11/23/nov-16th-florence/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607871.54/warc/CC-MAIN-20170524230905-20170525010905-00281.warc.gz",
"language": "en",
"language_score": 0.9678000807762146,
"token_count": 679,
"score": 2.53125,
"int_score": 3
}
|
One useful tip to avoid food poisoning while travelling is to eat fruit you peel yourself. The thinking is that trees and plants filter the water they suck up from the ground so their fruit is unlikely to contain bacteria and other nasties.
That has given Rohit Karnik and pals at the Massachusetts Institute of Technology in Cambridge an interesting idea. Why not create safe drinking water in exactly the same way, using plant xylem filter water-borne bacteria from the mix?
It turns out that while plant biologists have studied plant xylem in detail and measured the rate at which it can transport water from roots to leaves, they’ve never thought of using it as a filter. So Karnik and co got to work to test their idea.
Xylem is the porous tissue that conducts fluid in plants. In woody plants, it is called sapwood. Surrounded by bark, it often surrounds older, inactive heartwood itself. In conifers, it is formed from dead cells called tracheids, which are essentially hollow tubes with diameters of up to 80 µm and lengths of up to 10 mm.
These cells grow in parallel and have closed ends. The water passes from one conduit to another through holes known as pits, which are covered in a membrane with nanoscale pores that act like a kind of sieve. Anything bigger than these pores cannot get through.
So in theory, the plant xylem from conifer trees should be an effective filter.
To find out, Karnik and co cut 1 inch-long sections of branch of the white pine tree pinus strobus. They peeled off the bark and stuffed the remaining sapwood into a tube, sealing any gaps with epoxy resin.
They then filled the tube with 5 millilitres of deionised water under 5 pounds per square inch of pressure, equivalent to a gravitational pressure head of about 2 m or so, and waited to see what happened.
Sure enough, the water filtered through at the rate of 0.05 millilitres per second. That flow rate is equivalent to more than 4 litres per day, enough to keep one person in drinking water. That’s from a filter with an area of about 1 cm².
Next, they studied the material’s filtering properties. They added a red pigment to the water and measured the distribution of particle size within it. This ranged from about 70 nanometres to 500 nanometres in size.
The filtered water was clear, however. And the particle size distribution in the filtrate peaked at about 80 nanometres. Clearly, the xylem filters out particles larger than this. In a separate experiment, they added 20 nanometre fluorescent nanoparticles made of polystyrene and found that the xylem could not filter these out.
The conclusion is clear. “We find that the xylem filter exhibits excellent rejection for particles with diameters exceeding 100 nanometres,“ they say.
To test the material’s ability to filter bacteria, they mixed inactivated Escherichia coli bacteria to water and passed it through the system. E coli are cylindrical in shape with a diameter of about 1 micrometre.
Sure enough, the filter worked well. “Filtration using three different xylem filters showed nearly complete rejection of the bacteria,” they say.
To find out exactly how the xylem works, they cut open the filters and studied the internal structure of the wood. They found that most of the filtering occurs in the first two or 3 millimetres of the filter. That turns out to be more or less exactly the length of the tracheid cells and suggests that the wood filters can be cut even shorter and still function effectively.
They also took electron microscope images of the cell pits, which showed that the bacteria collected near these pits, suggesting that this is indeed the mechanism of filtration.
There are some limitations to this kind of filtration. First, the 100 nanometre limit is too big to filter viruses. Karnik and co say it may be possible to find other plants with smaller pits that could do the job.
Second, the wood must be freshly cut to work as an effective filter. The team say that the conduits in wood that has dried become blocked and so don’t work as filters. That’s a potentially serious problem should these filters need to be supplied on a large scale–distributing them around the world while keeping them fresh will be hard. However, it may be possible to develop drying techniques that maintain the structural integrity of the filters. Clearly, more work is needed here.
Nevertheless, this is impressive work that has the potential to make a big impact in many parts of the world. According to the World Health Organisation, some 1.6 million people die every year from diseases attributed to the lack of safe drinking water and basic sanitation. What’s more, 90% of these are children under the age of five, mostly in developing countries.
Xylem filtration won’t fix this by itself, not least because it can’t presently filter waterborne viruses such as hepatitis, rotavirus adenoviruses and so on. But it could have a big impact by removing bacterial and protozoan pathogens such as E coli, salmonella typhi, vibrio cholera and giardia.
And the system is small, cheap, and easy to make. As Karnik and co conclude: “The simple construction of xylem filters, combined with their fabrication from an inexpensive, biodegradable, and disposable material suggests that further research and development of xylem filters could lead to their widespread use and greatly reduce the incidence of waterborne infectious disease in the world.”
Ref: arxiv.org/abs/1310.4814: Water Filtration Using Plant Xylem
|
<urn:uuid:fce8fc46-46f3-4342-bfc6-4295f6d94ec4>
|
{
"dump": "CC-MAIN-2015-32",
"url": "http://www.technologyreview.com/view/520706/how-to-build-a-plant-xylem-water-filter/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042988311.72/warc/CC-MAIN-20150728002308-00264-ip-10-236-191-2.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9551743865013123,
"token_count": 1225,
"score": 3.8125,
"int_score": 4
}
|
On Sunday, January 6, 1861, in New York, Mayor Fernando Wood proposed that New York City should secede and become a free city, trading freely with both the North and South. Nothing ever became of the proposal.
It was the start of a busy week. On successive days -- Wednesday, Thursday and Friday -- three states would follow South Carolina out of the Union. On Wednesday, war would almost begin when the U. S. government attempted to reinforce and resupply the garrison at Fort Sumter in Charleston.
As states moved toward secession, state authorities acted quickly to seize the Federal property, especially the arsenals and the forts that guarded the harbors. Florida would be the state to secede on Thursday, but on this date in 1861, the Sunday before, state troops seized the U.S. Arsenal at Apalachicola with no resistance.
|
<urn:uuid:53f5deed-1e4f-4b99-a1f6-1a7d123e7057>
|
{
"dump": "CC-MAIN-2018-05",
"url": "http://civilwarmeanderings.blogspot.com/2011/01/150-years-ago-busy-week-ahead.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084887535.40/warc/CC-MAIN-20180118171050-20180118191050-00215.warc.gz",
"language": "en",
"language_score": 0.9545059204101562,
"token_count": 179,
"score": 3.4375,
"int_score": 3
}
|
The Story of WheatStudents learn the story of wheat as they explore its significance in the lives of pioneers and in their own lives.
- Length: 4 30-minute lessons
- Students understand how bread is made from wheat.
- Students recognize differences between past and present daily life.
- Students apply elements of dance to perform and create original dances.
- Students experience different purposes of dance.
“Weevily Wheat,” Program 3 in the KET-produced series Dancing Threads: Community Dances from Africa to Zuni. It is taught by Appalachian storyteller Anndrena Belcher.
Available on DVD from KET or online through KET EncycloMedia.
purposes of dance, recreational dance, shape, space, wheat, harvest, mill
TV/VCR or DVD player, video of and instructions for “Weavily Wheat” from Dancing Threads, classroom musical instruments
Instructional Strategies and Activities
What Is Space in Dance?
Space is the area in which you create a dance. Space includes direction, size, pathways, levels, and shapes.
- Make cornmeal or barley pancakes to share with the class.
- 1/2 cup whole wheat, barley flour, or cornmeal
- 1-1/2 cup all-purpose flour
- 4 tsp. baking powder
- 1/4 tsp. salt
- 2 eggs
- 2 cups milk
- 4 Tbsp. cooking oil
Mix dry ingredients. Stir in wet ingredients. Makes about 24 small pancakes.
- Discuss the types of grain ingredients used in the pancakes. Tell students that grain has long been important in peoples diets. Show students examples of different types of wheat from the CyberSpace Farm (www.cyberspaceag.com/kansascrops/wheat/wheatclasses.htm).
- Ask the class to think of what the pancake and the dance might have in common. Watch the dance Weevily Wheat. The two things they have in common is the circular shape and the wheat or barley.
- Talk about shape and the way circles are important in many social dances. If time allows, practice some social dances that use a circle, such as The Hokey Pokey, The Farmer in the Dell, and Ring Around the Rosie.
- Play music and experiment with the shape of the circle in dance. Have students stand in a circle and hold hands. Give students various instructions to follow for eight counts each. Have students count aloud to 8 after each dance instruction.
Some sample instructions:
- Walk forward to make a smaller circle.
- Step to the right to turn the circle. (Teacher should point.)
- Step to the left to turn the circle the other way.
- Walk backward.
- Drop hands and spin around.
- Practice the dance until students can remember without your verbal instructions.
- Once the pattern is learned, allow students to take turns changing or adding elements to the routine to make new dances.
- Tell the folktale of The Little Red Hen. (Choose a book from the library, or use the handout.) Discuss the steps necessary in making bread from wheat; e.g., planting, growing, harvesting, milling, mixing, and baking. Discuss how at one time many people went through these steps to get bread. Use the web resources listed in the Support section to show how grain is grown and harvested today.
- Use the handout The Little Red Hen to read as a class script. Have the students sit in a circle. Read the story through 2-3 times with different students playing the roles.
- Discuss dance as a form of storytelling. Ask the students to consider how they could turn the story of the Little Red Hen into a dance.
- Read the script again. Discuss how motions and music could help tell the story. Talk about dancing for different purposes. Talk about the dance as a social or recreational dance.
- Using classroom instruments to keep a steady beat, direct students to create a rhythm that dancers can follow. Alternate selecting different students to play the roles in the story. The narrators part could still be read while the other parts are danced. Work toward creating an atmosphere where students respect others efforts and feel free to be expressive.
Support • Connections • Resources
- From the CyberSpace Farm:
Classes of Wheat
How Flour Is Milled
- Wheat Mania! has history, activities, and trivia about wheat production in the U.S.
- Crop Profile for Winter Wheat in Kentucky
Applications Across the Curriculum
Study the history of pioneer farming.
Performance Event: Students create a dance to tell the story The Little Red Hen.
Directions: Use expression and movement to tell the story as cast in The Little Red Hen.
Performance Scoring Guide
|Student shows creativity in expressing the story through dance. Movement is appropriate to the story. Student moves to the beat. Student is respectful of other students movements.||Movement is appropriate to the story. Student moves to the beat. Student is respectful of other students movements.||Movement is appropriate to the story. Student is respectful of other students movements.||Student is respectful of other students movements.||Student does not participate.|
- 1.15: Students make sense of and communicate ideas with movement.
- 2.22: Students create works of art and make presentations to convey a point of view.
- 2.26: Through the arts and humanities, students recognize that although people are different, they share some common experiences and attitudes.
Program of Studies:
- AH-P-SA-U-1: Students will understand that the elements of music, dance, and drama are intentionally applied in creating and performing.
- AH-P-SA-S-Da1: Students will begin to recognize and identify elements of dance and basic dance forms using dance terminology.
- AH-P-SA-S-Da2: Students will use the elements of dance in creating, copying, and performing patterns of movement independently and with others.
- AH-P-PCA-U-1: Students will understand that the arts fulfill a variety of purposes in society.
- AH-P-PCA-U-2: Students will understand that the arts have value and significance in daily life.
- AH-P-PCA-S-Da1: Students will begin to develop an awareness of the purposes for which dance is created.
- AH-P-PCA-S-Da2: Students will observe and perform dance created to fulfill a variety of specific purposes.
- AH-P-PA-S-Da1: Students will be actively involved in creating and performing dance alone and with others.
Note: This lesson also can be used to address social studies standards.
Core Content for Assessment:
- AH-EP-1.2.1: Students will observe dance/movement and describe elements and movements using dance terminology.
- AH-EP-3.2.1: Students will experience dance created for a variety of purposes.
- AH-EP-4.2.1: With a partner or in a small group, students will perform dances using the elements of dance and various movements.
|
<urn:uuid:d66deecf-c4e6-40a7-a6df-b72752f12fa1>
|
{
"dump": "CC-MAIN-2013-20",
"url": "http://www.ket.org/artstoolkit/dance/lessonplan/228.htm",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703728865/warc/CC-MAIN-20130516112848-00025-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.896862268447876,
"token_count": 1505,
"score": 3.6875,
"int_score": 4
}
|
When planting a new tree, don’t just dig up any old tree from a nearby field, plop it in the ground and expect it to grow into the perfect shade or ornamental tree. Give some careful thought to selecting a species or hybrid that will not outgrow its space or will grow into a good shade tree if that’s what is needed.
If a tree must be removed from the property due to damage or disease, permission may need to be granted by the City of Sydney before it is cut down. They usually mandate the planting of a new tree and might specify the new tree species but they might not. The new tree selection could be left up to the property owner.
Take drought tolerance into consideration when choosing a new tree to limit the need for supplemental water after the tree becomes established. Disease resistance should also be considered. Selecting a tree with good disease resistance is especially important if the new tree is replacing one that died of a disease. Some tree disease pathogens and fungi remain alive in the soil long after the infected tree is removed.
Australian willow or wilga trees (Geijera parvivlora) are good shade trees that grow to a height of about 12 meters. They grow in most any type of soil, will grow in moist or dry conditions and are drought tolerant. These are good trees to plant where Armillaria or oak root rot fungus has been a problem as they are resistant to the disease. Kurrajong (Brachychiton populneus) is another good shade tree option that grows to about 20 meters tall. It is drought tolerant and resistant to oak root rot fungus but it is susceptible to Phytophthora root rot.
Sasanqua camellias (Camellia sasanqua) are large shrubs or small trees that range in height from 1 to 4 meters, depending on the hybrid. They are drought-tolerant and will grow in a variety of soil types. Colorful blooms are produced by these trees throughout the fall and winter months. “Verbanica” saucer magnolias (Magnolia x soulangeana “Verbanica”) are smaller trees that grow to about 6 meters tall. They are drought tolerant and bloom in the winter or spring. Both of these trees are good choices when replacing a tree that has died of phytophthora root rot as they have good resistance to the disease.
|
<urn:uuid:a7dfa134-c9c1-4a9f-84a8-83b241fde999>
|
{
"dump": "CC-MAIN-2018-09",
"url": "https://sydneytreecompany.com.au/sydney/trees/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891813622.87/warc/CC-MAIN-20180221123439-20180221143439-00218.warc.gz",
"language": "en",
"language_score": 0.9501820802688599,
"token_count": 498,
"score": 3.015625,
"int_score": 3
}
|
An Exploration of How Fake News is Taking over Social Media and Putting Public Health at Risk
This article reports on a small study which attempted to identify the types and sources of COVID‐19 misinformation.
The authors identified and analysed 1225 pieces of COVID‐19 fake news stories taken from fact‐checkers, myth‐busters and COVID‐19 dashboards.
The study concludes that the COVID‐19 infodemic is full of false claims, half backed conspiracy theories and pseudoscientific therapies, regarding the diagnosis, treatment, prevention, origin and spread of the virus. Fake news is pervasive in social media, putting public health at risk. The scale of the crisis and ubiquity of the misleading information require that scientists, health information professionals and journalists exercise their professional responsibility to help the general public identify fake news stories. They should ensure that accurate information is published and disseminated.
- Fake News Can Be Deadly. Here's How to Spot It
- COVID-19 in Africa: Fighting Fake News about Coronavirus
- KAP COVID: Exploring Knowledge, Attitudes, and Practices for COVID-19 Prevention
- COVID-19 Pandemic Putting Girls at High Risk of FGM in Kenya
- Vaccine Confidence: A Global Analysis Exploring Volatility, Polarization, and Trust
- COVID-19 Vaccination Communication Toolkit
- Innoculating against COVID-19 Vaccine Misinformation
- Anti-Virus: The Covid-19 FAQ
- How to Report Misinformation Online
- Breaking Down COVID-19: The COVID-19 Living Textbook
July 21, 2020
|
<urn:uuid:9b0f1be8-a695-45ac-ae62-68f7302006be>
|
{
"dump": "CC-MAIN-2022-21",
"url": "https://thecompassforsbc.org/sbcc-tools/exploration-how-fake-news-taking-over-social-media-and-putting-public-health-risk",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662534693.28/warc/CC-MAIN-20220520223029-20220521013029-00029.warc.gz",
"language": "en",
"language_score": 0.8659554719924927,
"token_count": 340,
"score": 2.984375,
"int_score": 3
}
|
Cyberstalking generally involves using electronic communication to harass, disturb, threaten, pursue, intimidate, or “follow” someone against their will, without their permission and to the detriment (whether it be psychological, emotional or physical) of the victim(s) in question. Learn about the most important cyberstalking facts.
In general, such pursuits are illegal but it is not always easy to tell without someone suspected of being a cyber stalker has committed a crime. In fact, some of the things cyber stalkers do (bullying, cyber bullying, send gifts, write emails, etc.) are not, per se, illegal but, if the person informs the individual that he/she does not wish to receive such attention, then, if the individual does not stop, then it may be considered cyber stalking.
CyberStalking Facts : Who’s a Victim of CyberStalking?
Anyone can become a victim or cyberstalking. When the words “bullying” or “cyber bullying” are used, however, it generally refers to the victims being children—more specifically students of private or public schools.
Cyber stalking, however, can touch anyone, including adults. Children, however, are popular victims. Other people who might be victims of cyberstalking include:
- Disabled persons
- The elderly
- People who spend a lot of time on the Internet
- People who’ve attempted to break up with someone or divorce them
- Employers (by fired ex-employees)
- People who know or have been introduced to or who have worked with mentally ill individuals (who often form unhealthy or abnormal obsessions or liking for someone else).
Some Other Important CyberStalking Facts
While this list is not exhaustive, the following 25 facts should be kept in mind if developing safety programs, establishing prevention strategies or simply conducting research into cyberstalking, those are top cyberstalking facts you need to consider:
- Cyber Stalking (generally involving fear or threats)
- Cyber Harassment (being more of a nuisance)
- Cyber Bullying (generally involving children or students)
2. Every state has or is working to have laws on the books addressing cyberstalking. In most states, there are already laws pertaining to stalking—when possible, these are used to prosecute offenders but, because of the special nature of Internet crimes, special laws are needed.
3. You should check to see what statutes or laws apply in your state; you can do this by doing a routine search engine search.
4. Cyber stalking can involve humiliation and embarrassment, in addition to harassment.
5. Cyber stalkers have been known to hurt people financially, such as by tampering with their accounts or trying to ruin their credit.
6. Cyber stalkers can also go after friends, family and acquaintances of victims.
7. Social media is a potential place to pick up or run into a cyber stalker.
8. It is best not to show/display fear to stalkers since this is what they may be after.
9. Cyber stalkers can be dangerous—they can turn out to be serial killers, child molesters, or psychotic individuals—yet another reason to take cyberstalking seriously.
10. Although the term cyberstalking is fairly new, the concept of “stalking” has been around for a long time.
11. Most countries, not just the US, are scrambling to deal with the headaches of cyberstalking.
12. Be careful of what computers you use—especially if they are public computers. You may unwittingly give cyber stalkers the information they need to start a harassment campaign against you.
13. Cyberstalking is a form of social terrorism—accordingly, it’s expected that laws dealing with this crime will become more and more stringent and merciless.
14. Clean out your computers and mobile electronic devices before donating, selling or getting rid of them; the information you leave in them can become crucially important in protecting your privacy, identity and peace of mind.
15. In spite of the fact that cyber stalking is a “virtual” crime, there is nothing virtual about it—it’s real and it’s as dangerous as any other type of on-the-streets crime.
16. Not all cyber stalkers are mentally ill or psychotic—some of them just want to get even with someone or they may want to get something out of the victim. These latter stalkers are, accordingly, committing several different types of crimes in addition to blatant harassment.
17. Although it’s difficult to prosecute cyber stalking, authorities do take the crime seriously—in fact, communities are adding departments only to deal with cyber crime. The law enforcement officers manning these jobs are especially trained in these new technologies.
18. Contrary to popular opinion, cyber stalking is never “victim-less” or a white collar crime. Every victim of cyber crime is negatively affected, often in the same way other crimes would have affected them.
19. In spite of law enforcement activities, cyber stalking is getting worse.
20. When you know or experience directly cyber stalking, you must report it. Only by reporting it can you put a dent in this horrible source of crime.
Cyberstalking is a very complicated type of crime. Persons who want to improve safety on the Internet or activate better prevention programs, need to contact organizations working to make the Internet safer.
Additionally, you can contact local politicians and, by letting them know how you feel, compel them to pass tougher, more stringent and more meticulously enforced laws. Society needs to keep up with what’s happening on the Internet—this includes the negative things happening therein.
Do you have information on facebook stalking statistics? have you come across mention of facebook stalking statistics? let us know about those facebook stalking statistics in the comment section below.
|
<urn:uuid:81879fbd-0064-4a17-b92f-7a09a82f7617>
|
{
"dump": "CC-MAIN-2015-35",
"url": "http://nobullying.com/cyberstalking-20-important-facts/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645264370.66/warc/CC-MAIN-20150827031424-00083-ip-10-171-96-226.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9454614520072937,
"token_count": 1225,
"score": 2.9375,
"int_score": 3
}
|
R. Sungenis: In this article, field researcher Mary H. Schweitzer writes in the most prestigious science magazine today, Scientific American, about her discovery of soft tissue and blood cells in the bone of a Tyrannosaurus rex dinosaur that, according to modern evolutionary dating techniques, is about 70 million years old. If it hasn’t struck you already, science tells us that organic tissue could barely last 7,000 years, much less 10,000 times 7,000 years. So what does science do with this anomaly? It pleads ignorance, and it does so while it tries to find a way to dismiss the evidence. When Ms. Schweitzer brought her evidence to Jack Horner, curator of paleontology at the museum and one of the world’s foremost dinosaur authorities, after a long look under the microscope at the nucleated blood cells of the T-Rex, he said to Ms. Schweitzer: “So prove to me they aren’t.” That about sums up the history of the bias and deliberate attempts to twist the evidence in favor of evolution that occurs on a daily basis in our high school and college classrooms. Whereas Ms. Schweitzer’s find should have been hailed as one of the most astounding discoveries in history since Darwin wrote his book on the evolutionary hypothesis in 1879, she is basically assigned the impossible task of finding a way to dismiss the blood cell’s prima facie denial of evolution, and implied in that “request” is the fact that she will lose her job if she doesn’t seek an alternative answer. What does Ms. Schweitzer decide to do? The next sentence in her story tells us loud and clear. She capitulates to the reigning paradigm of modern science, without question: “It was an irresistible challenge, and one that has helped frame how I ask my research questions, even now.” So Ms. Schweitzer, in order to continue to be a member of the status quo and receive her pay check from the powers-that-be, remains an ardent evolutionist, seeking to deny the common sense knowledge her heart and mind scream at her about what it means to see blood cells in dinosaur remains.
“Blood From Stone”
By Mary H. Schweitzer
From Scientific American, December 2010
Peering through the microscope at the thin slice of fossilized bone, I stared in disbelief at the small red spheres a colleague had just pointed out to me. The tiny structures lay in a blood vessel channel that wound through the pale yellow hard tissue. Each had a dark center resembling a cell nucleus. In fact, the spheres looked just like the blood cells in reptiles, birds and all other vertebrates alive today except mammals, whose circulating blood cells lack a nucleus. They couldn’t be cells, I told myself. The bone slice was from a dinosaur that a team from the Museum of the Rockies in Bozeman, Mont., had recently uncovered a Tyrannosaurus rex that died some 67 million years ago--and everyone knew organic material was far too delicate to persist for such a vast stretch of time.
For more than 300 years paleontologists have operated under the assumption that the information contained in fossilized bones lies strictly in the size and shape of the bones themselves. The conventional wisdom holds that when an animal dies under conditions suitable for fossilization, inert minerals from the surrounding environment eventually replace all of the organic molecules—such as those that make up cells, tissues, pigments and proteins—leaving behind bones composed entirely of mineral. As I sat in the museum that afternoon in 1992, staring at the crimson structures in the dinosaur bone, I was actually looking at a sign that this bedrock tenet of paleontology might not always be true—though at the time, I was mostly puzzled. Given that dinosaurs were nonmammalian vertebrates, they would have had nucleated blood cells, and the red items certainly looked the part, but so, too, they could have arisen from some geologic process unfamiliar to me.
Back then I was a relatively new graduate student at Montana State University, studying the microstructure of dinosaur bone, hardly a seasoned pro. After I sought opinions on the identity of the red spheres from faculty members and other graduate students, word of the puzzle reached Jack Horner, curator of paleontology at the museum and one of the world’s foremost dinosaur authorities. He took a look for himself. Brows furrowed, he gazed through the microscope for what seemed like hours without saying a word. Then, looking up at me with a frown, he asked, “What do you think they are?” I replied that I did not know, but they were the right size, shape and color to be blood cells, and they were in the right place, too. He grunted, “So prove to me they aren’t.” It was an irresistible challenge, and one that has helped frame how I ask my research questions, even now.
Since then, my colleagues and I have recovered various types of organic remains—including blood vessels, bone cells and bits of the fingernail-like material that makes up claws—from multiple specimens, indicating that although soft-tissue preservation in fossils may not be common, neither is it a one-time occurrence. These findings not only diverge from textbook description of the fossilization process, they are also yielding fresh insights into the biology of bygone creatures. For instance, bone from another T.rex specimen has revealed that the animal was a female that was “in lay” (preparing to lay eggs) when she died—information we could not have gleaned from the shape and size of the bones alone. And a protein detected in remnants of fibers near a small carnivorous dinosaur unearthed in Mongolia has helped establish that the dinosaur had feathers that, at the molecular level, resembled those of birds.
Our results have met with a lot of skepticism—they are, after all, extremely surprising. But the skepticism is a proper part of science, and I continue to find the work fascinating and full of promise. The study of ancient organic molecules from dinosaurs has the potential to advance understanding of the evolution and extinction of these magnificent creatures in ways we could not have imagined just two decades ago.
Extraordinary claims, as the old adage goes, require extraordinary evidence. Careful scientists make every effort to disprove cherished hypotheses before they accept that their ideas are correct. Thus, for the past 20 years I have been trying every experiment I can think of to disprove the hypothesis that the materials my collaborators and I have discovered are components of soft tissues from dinosaurs and other long-gone animals.
In the case of the red microstructures saw in the T.rex bone, I started by thinking that if they were related to blood cells or to blood cell constituents (such as molecules of hemoglobin or heme that had clumped together after being released from dying blood cells), they would have persisted in some, albeit possibly very altered, form only if the bones themselves were exceptionally well preserved. Such tissue would have disappeared in poorly preserved skeletons. At the macroscopic level, this was clearly true. The skeleton, a nearly complete specimen from eastern Montana—officially named MOR 555 and affectionately dubbed “Big Mike”—includes many rarely preserved bones. Microscope examination of thin sections of the limb bones revealed similarly pristine preservation. Most of the blood vessel channels in the dense bone were empty, not filled with mineral deposits as is usually the case with dinosaurs. And those ruby microscopic structures appeared only in the vessel channel, never in the surrounding bone or in sediments adjacent to the bones, just as should be true of blood cells.
Next, I turned my attention to the chemical composition of the blood cell look-alikes. Analyses showed that they were rich in iron, as red blood cells are, and that the iron was specific to them. Not only did the elemental makeup of the mysterious red things (we nicknamed them LLRTs, “little round red things”) differ from that of the bone immediately surrounding the vessel channels, it was also utterly distinct from that of the sediments in which the dinosaur was buried. But to further test the connection between the red structures and blood cells, I wanted to examine my samples for heme, the small iron-containing molecule that gives vertebrate blood its scarlet hue and enables hemoglobin proteins to carry oxygen from the lungs to the rest of the body. Heme vibrates, or resonates, in telltale patterns when it is stimulated by tuned lasers, and because it contains a metal center, it absorbs light in a very distinct way. When we subjected bone samples to spectroscopy tests-which measure the light that a given material emits, absorbs or scatters-our results showed that somewhere in the dinosaur’s bone were compounds that were consistent with heme.
One of the most compelling experiments we conducted took advantage of the immune response. When the body detects an invasion by foreign, potentially harmful substances, it produces defensive proteins called antibodies that can specifically recognize, or bind to, those substances. We injected extracts of the dinosaur bone into mice, causing the mice to make antibodies against the organic compounds in the extract. When we then exposed these antibodies to hemoglobin from turkeys and rats, they bound to the hemoglobin--a sign that the extracts that elicited antibody production in the mice had included hemoglobin or something very like it. The antibody data supported the idea that Big Mike’s bones contained something similar to the hemoglobin in living animals.
None of the many chemical an immunological tests we performed disproved our hypothesis that the mysterious red structures visible under the microscope were red blood cells from a T. rex. Yet we could not show that the hemoglobinlike substance was specific to the red structures—the available techniques were not sufficiently sensitive to permit such differentiation. Thus, we could not claim definitively that they were blood cells. When we published our findings in 1997, we drew our conclusions conservatively, stating that hemoglobin proteins might be preserved and that the most likely source of such proteins was the cells of the dinosaur. The paper got very little notice
THE EVIDENCE BUILDS
Through the T. rex work, I began to realize just how much fossil organics stood to reveal about extinct animals. If we could obtain proteins, we could conceivably decipher the sequence of their constituent amino acids, much as geneticists sequence the “letters” that make up DNA. And like DNA sequences, protein sequences contain information about evolutionary relationships between animals, how species change over time and how the acquisition of new genetic traits might have conferred advantages to the animals possessing those features. But first I had to show that ancient proteins were present in fossils other than the wonderful T.rex we had been studying. Working with Mark Marshall, then at Indiana University, and wit h Seth Pincus and John Watt, both at Montana State during this time, I turned my attention to two well-preserved fossils that looked promising for recovering organics.
The first was a beautiful primitive bird named Rahonavis that paleontologists form Stony Brook University and Marcalester College had unearthed form deposits in Madagascar dating to the Late Cretaceous period, around 80 million to 70 million years ago. During excavation they had noticed a white, fibrous material on the skeleton’s toe bones, No other bone in the quarry seemed to have the substance, nor was it present on any of the sediments there, suggesting that it was part of the animal rather than having been deposited on the bones secondarily. They wondered whether the material might be akin to the strong sheath made of keratin protein that covers the toe bones of living birds, forming their claws, and asked for my assistance.
Keratin proteins are good candidates for preservation because they are abundant in vertebrates, and the composition of this protein family makes them very resistant to degradation—something that is nice to have in organs such as skin that are exposed to harsh conditions. They come in two main types: alpha and beta. All vertebrates have alpha keratin, which in humans makes up hair and nails and helps the skin to resist abrasion and dehydration. Beta keratin is absent from mammals and occurs only in birds and reptiles among living organisms.
To test for keratins in the white material on the Rahonavis toe bones, we employed many of the same techniques I had used to study T. rex. Notably, antibody tests indicated the presence of both alpha and beta keratin. We also applied additional diagnostic tools. Other analyses, for instance, detected amino acids that were localized to the toe-bone covering and also detected nitrogen (a component of amino acids) that was bound to other compounds much as proteins bind together in living tissues, including keratin. The results of all our tests supported the notion that the cryptic white material covering the ancient bird’s toe bones included fragments of alpha and beta keratin and was the remainder of its once lethal claws.
The second specimen we probed was a spectacular Late Cretaceous fossil that researchers from the American Museum of Natural History in New York City had discovered in Mongolia. Although the scientists dubbed the animal Shuvuuia deserti, or “desert bird,” it was actually a small carnivorous dinosaur. While cleaning the fossil, Amy Davidson, a technician at the museum, noticed small white fibers in the animal’s neck region. She asked me if I could tell if they were remnants of feathers. Birds are descended from dinosaurs, and fossil hunters have discovered a number of dinosaur fossils that preserve impressions of feathers, so in theory the suggestion that Shuvuuia had a downy coat was plausible. I did not expect that a structure as delicate as a feather could have endured the ravages of time, however. I suspected the white fibers instead came from modern plants or from fungi. But I agreed to take a closer look.
To my surprise, initial tests ruled out plants or fungi as the source of the fibers. Moreover, subsequent analyses of the microstructure of the strange white strands pointed to the presence of keratin. Mature feathers in living birds consist almost exclusively of beta keratin. If the small fibers on Shuvuuia were related to feathers, then they should harbor beta keratin alone, in contrast to the claw sheath of Rahonavis, which contained both alpha and beta keratin. That, in fact is exactly what we found when we conducted our antibody tests—results we published in 1999.
By now I was convinced that small remnants of original proteins could survive in extremely well preserved fossils and that we had the tools to identify them. But many in the scientific community remained unconvinced. Our findings challenged everything scientists thought they knew about the breakdown of cells and molecules. Test-tube studies of organic molecules indicated that proteins should not persist more than a million years or so; DNA had an even shorter life span. Researchers working on ancient DNA had claimed previously that they had recovered DNA millions of years old, but subsequent work failed to validate the results. The only widely accepted claims of ancient molecules were no more than several tens of thousands of years old. In fact, one anonymous reviewer of a paper I had submitted for publication in a scientific journal told me that this type of preservation was not possible and that I could not convince him or her otherwise, regardless of our data.
In response to this resistance, a colleague advised me to step back a bit and demonstrate the efficacy of our methods for indentifying ancient proteins in bones that were old, but not as old as dinosaur bone, to provide a proof of principle. Working with analytical chemist John Asara of Harvard University, I obtained proteins form mammoth fossils that were estimated to be 300,000 to 600,000 years old. Sequencing of the proteins using a technique called mass spectrometry indentified them unambiguously as collagen, a key component of bone, tendons, skin and other tissues. The publication of our mammoth results in 2002 did not trigger much controversy. Indeed, the scientific community largely ignored it. But our proof of principle was about to come in very handy.
The next year a crew from the Museum of the Rockies finally finished excavating another T. rex skeleton, which at 68 million years old is the oldest one to date. Like the younger T. rex, this one—called MOR 1125 and nicknamed “Brex,” after discoverer Bob Harmon—was recovered from the Hell Creek Formation in eastern Montana. The site is isolated and remote, with no access for vehicles, so a helicopter ferried plaster jackets containing excavated bones from the site to the camp. The jacket containing the leg bones was too heavy for the helicopter to lift. To retrieve them, then, the team broke the jacket, separated the bones and rejacketed them. But the bones are very fragile, and when the original jacket was opened, many fragments of bone fell out. These were boxed up for me. Because my original T. rex studies were controversial, I was eager to repeat the work on a second T. rex. The new find presented the perfect opportunity.
As soon as I laid eyes on the first piece of bone I removed from that box, a fragment of thighbone, I knew the skeleton was special. Lining the internal surface of this fragment was a thin, distinct layer of a type of bone that had never been found in dinosaurs. This layer was very fibrous, filled with blood vessel channels, and completely different in color and texture from the cortical bone that constitutes most of the skeleton. “Oh, my gosh, it’s a girl—and it’s pregnant!” I exclaimed to my assistant, Jennifer Wittmeyer, She looked at me like I had lost my mind. But having studied bird physiology, I was nearly sure that this distinctive feature was medullary bone, a special tissue that appears for only a limited time (often for just about two weeks), when birds are in lay, and that exists to provide an easy source of calcium to fortify the eggshells.
One of the characteristics that sets medullary bone apart from other bone types is the random orientation of its collagen fibers, a characteristic that indicates very rapid formation. (This same organization occurs in the first bone laid down when you have a fracture—that is why you feel a lump in healing bone.) The bones of a modern-day bird and all other animals can be demineralized using mild acids to reveal the telltale arrangement of the collagen fibers. Wittmeyer and I decided to try to remove the minerals. If this was medullary bone and if collagen was present, eliminating the minerals should leave behind randomly oriented fibers. As the minerals were removed, they left a flexible and fibrous clump of tissue. I could not believe what we were seeing. I asked Wittmeyer to repeat the experiment multiple times. And each time we placed the distinctive layer of bone in the mild acid solution, fibrous stretchy material remained—just as it does when medullary bone in birds is treated in the same way.
Furthermore, when we then dissolved pieces of the denser, more common cortical bone, we obtained more soft tissue. Hollow, transparent, flexible, branching tubes emerged from the dissolving matrix—and they looked exactly like blood vessels. Suspended inside the vessels were either small, round red structures or amorphous accumulations of red material. Additional demineralization experiments revealed distinctive-looking bone cells called osteocytes that secrete the collagen and other components that make up the organic part of bone. The whole dinosaur seemed to preserve material never seen before in dinosaur bone.
When we published our observations in Science in 2005, reporting the presence of what looked to be collagen, blood vessels and bone cells, the paper garnered a lot of attention, but the scientific community adopted a wait-and see attitude. We claimed only that the material we found resembled these modern components—not that they were one and the same. After millions of years, buried in sediments and exposed to geochemical conditions that varied over time, what was preserved in these bones might bear little chemical resemblance to what was there when the dinosaur was alive. The real value of these materials could be determined only if their composition could be discerned. Our work had just begun.
Using all the techniques honed while studying Big Mike, Rathonavis, Shuvuuia and the mammoth, I began an in-depth analysis of this T.rex’s bone in collaboration with Asara, who had refined the purification and sequencing methods we used in the mammoth study and was ready to try sequencing the dinosaur’s much older proteins. This was a much harder exercise, because the concentration of organics in the dinosaur was orders of magnitude less than in the much younger mammoth and because the proteins were very degraded. Nevertheless, we were eventually able to sequence them. And, gratifyingly, when our colleague Chris Organ of Harvard compared the T.rex sequences with those of a multitude of other organisms, he found that they grouped most closely with birds, followed by crocodiles—the two groups that are the closest living relatives of dinosaurs.
CONTROVERSY AND ITS AFTERMATH
Our papers detailing the sequencing work, published in 2007 and 2008, generated a firestorm of controversy, most of which focused on our interpretations of the sequencing (mass spectrometry) data. Some dissenters charged that we had not produced enough sequences to make our case; others argued that the structures we interpreted as primeval soft tissues were actually biofilm—“slime” produced by microbes that had invaded the fossilized bone. There were other criticisms, too. I had mixed feelings about their feedback. On one hand, scientists are paid to be skeptical and to examine remarkable claims with rigor. On the other hand, science operates on the principle of parsimony—the simplest explanation for all the data is assumed to be the correct one. And we had supported our hypothesis with multiple lines of evidence
Still, I knew that a single gee-whiz discovery does not have any long-term meaning to science. We had to sequence proteins form other dinosaur finds. When a volunteer accompanying us on a summer expedition found bones from and 80-million-year-old plant-eating duckbill dinosaur called Brachylophosaurus canadensis, or “Brachy,” we suspected the duckbill might be a good source of ancient proteins even before we got its bones out of the ground. Hoping that is might contain organics, we did everything we could to free it from the surrounding sandstone quickly while minimizing its exposure to the elements. Air pollutants, humidity fluctuations and the like would be very harmful to fragile molecules, and the longer the bone was exposed, the more likely contamination and degradation would occur.
Perhaps because of this extra care—and prompt analyses—both the chemistry and the morphology of this second dinosaur were less altered than Brex’s. As we had hoped, we found cells embedded in a matrix of white collagen fibers in the animal’s bone. The cells exhibited long, thin, branchlike extensions that are characteristic of osteocytes, which we could trace from the cell body to where they connected to other cells. A few of them even contained what appeared to be internal structures, including possible nuclei.
Furthermore, extracts of the duckbill’s bone reacted with antibodies that target collagen and other proteins that bacteria do not manufacture, refuting the suggestion that our soft-tissue structures were merely biofilms. In addition, the protein sequences we obtained from the bone most closely resembled those of modern birds, just as Brex’s did. And we sent samples of the duckbill’s bone to several different labs for independent testing, all of which confirmed our results. After we reported these findings in Science in 2009, I heard no complaints.
Our work does not stop here. There is still so much about ancient soft tissues that we do not understand. Why are these materials preserved when all our models say they should be degraded? How does fossilization really occur? How much can we learn about animals from preserved fragments of molecules? The sequencing work hints that analyses of this material might eventually help to sort out how extinct species are related—once we and others build up bigger libraries of ancient sequences, and sequences from living species, for comparison, As these databases expand, we may be able to compare sequences to see how member of lineage changed at the molecular level. And by rooting these sequences in time, we might be able to better understand the rate of this evolution. Such insights will help scientists to piece together how dinosaurs and other extinct creatures responded to major environmental changes, how they recovered from catastrophic events, and ultimately what did them in.
|
<urn:uuid:88f22407-9d51-4dbf-9c10-f8a1135764c2>
|
{
"dump": "CC-MAIN-2013-20",
"url": "http://catholicintl.com/index.php/catholic/book-review/348-evolution-falsified-once-again",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368699881956/warc/CC-MAIN-20130516102441-00081-ip-10-60-113-184.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9656290411949158,
"token_count": 5098,
"score": 2.859375,
"int_score": 3
}
|
similar to the one shown on the following page, are used to show how fast a breaker will trip at any magnitude of current. The following illustration shows how to read a time-current curve. The figures along the bottom (horizontal axis) represent multiples of the continuous current rating (In) for the breaker. The figures along the left side (vertical axis) represent time in seconds.
Time in Seconds Multiple of In
To determine how long a breaker will take to trip at a given multiple of In, find the multiple on the bottom of the graph and draw a vertical line to the point where it intersects the curve. Then draw a horizontal line to the left side of the graph and find the time to trip. For example, in this illustration a circuit breaker will trip when current remains at six times In for .6 seconds. Note that the higher the current, the shorter the time the circuit breaker will remain closed. Time-current curves are usually drawn on log-log paper. Many time-current curves also show the bandwidth, tolerance limits, of the curve.
From the information box in the upper right hand corner, note that the time-current curve illustrated on the next page defines the operation of a Siemens MG frame circuit breaker. For this example, operation with an 800 ampere trip unit is shown, but, depending upon the specific breaker chosen, this circuit breaker may be purchased with a 600, 700, or 800 amp continuous current rating.
The top part of the time-current curve shows the continuous
Current performance of the circuit breaker. The black line shows the nominal performance of the circuit breaker and the gray band represents possible variation from this nominal performance that can occur even under specified conditions.
Using the example of an MG breaker with an 800 amp continuous current rating (In), note that the circuit breaker can be operated at 800 amps (1.0 times In) indefinitely without tripping. However, the top of the trip curve shows that an overload trip will occur in 10,000 seconds at 1000 amps (1.25 times In). Additionally, the gray area on either side of the trip curve shows the range of possible variation from this response.
Keep in mind that this trip curve was developed based upon predefined specifications, such as operation at a 40°C ambient temperature. Variations in actual operating conditions will result in variations in circuit breaker performance.
The middle and bottom parts of this time-current curve show
Instantaneous trip (short circuit) performance of the circuit breaker. Note that the maximum clearing time (time it takes for the breaker to completely open) decreases as current increases. This is because of high-speed contact designs which utilize the magnetic field built up around the contacts. As current increases, the magnetic field strength increases, which speeds the opening of the contacts?
This circuit breaker has an adjustable instantaneous trip point from 3250 to 6500 amps, which is approximately four to eight times the 800 amp continuous current unit rating. This adjustment affects the middle portion of the trip curve, but not the top and bottom parts of the curve. The breaker shown in this example has a thermal-magnetic trip unit. Circuit breakers with solid-state trip units typically have additional adjustments
True RMS Sensing
Some solid state circuit breakers sense the peak values of the current sine wave. This method accurately measures the heating effect of the current when the current sine waves are perfectly sinusoidal. Frequently, however, the sine waves are harmonically distorted by non-linear loads. When this happens, peak current measurement does not adequately evaluate the true heating effect of the current.
Siemens solid state trip unit circuit breakers incorporate true root-mean-square (RMS) sensing to accurately sense the effective value of circuit current. True RMS sensing is accomplished by taking multiple, instantaneous “samples” of the actual current wave shape for a more accurate picture of its true heating value.
The microcomputer in Siemens solid state trip unit breakers samples the AC current waveform many times a second, converting each value into a digital representation. The microcomputer then uses the samples to calculate the true RMS value of the load current. This capability allows these circuit breakers to perform faster, more efficiently and with repeatable accuracy.
Being able to monitor true RMS current precisely is becoming more important in today’s electrical distribution systems because of the increasing number of power electronic devices being used that can distort the current waveform.
Curves One of the key features of solid state trip unit circuit breakers is the ability to make selective adjustments to the circuit breaker’s time-current curve. The time-current curve shown here is for a circuit breaker in the SJD6-SLD6 family.
Solid State Circuit Breaker
Adjustments The type of trip unit included in a circuit breaker determines the specific time-current curve adjustments available. . The following illustration and associated table describes the adjustments available.
|
<urn:uuid:e97995bf-eda1-44c7-bf98-9017c7e81bb0>
|
{
"dump": "CC-MAIN-2016-40",
"url": "http://aircircuitbreakers.blogspot.com/2009/01/time-current-curves.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738660996.20/warc/CC-MAIN-20160924173740-00056-ip-10-143-35-109.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.8852781057357788,
"token_count": 1015,
"score": 3.859375,
"int_score": 4
}
|
There was a time when we used the Oxford dictionary to learn and understand the “British” English and today, the relevance of the Indian language in day-to-day use is so much that 70 new Indian words from Telugu, Urdu, Tamil, Hindi and Gujarati languages have been added to the dictionary.
These are some of the most commonly used words here in India – Abba, Anna, gulab jamun, vada, jugaad, dadagiri, achcha, mirch masala, keema, funda, timepass, natak, chamcha, chup, bapu, surya namaskar; these and many more are now officially in the dictionary.
Oxford has stated that the September 2017 update adds to the 900 items already covered by the dictionary and "identified as distinctive to Indian English". The words were added to the dictionary as Indians have "a highly specific vocabulary with no direct equivalents in English.”
The seventy words newly added to the OED reflect not only the history of the country, but also the many and diverse cultural and linguistic influences which have shaped and changed the English language in India.
The dictionary publishes four updates a year in March, June, September and December respectively.
|
<urn:uuid:2364a637-8d38-4ace-bc93-5f8051a58d3b>
|
{
"dump": "CC-MAIN-2018-51",
"url": "https://www.sptulsian.com/f/ci/oxford-becomes-more-hinglish",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823348.23/warc/CC-MAIN-20181210144632-20181210170132-00040.warc.gz",
"language": "en",
"language_score": 0.954316258430481,
"token_count": 262,
"score": 3.21875,
"int_score": 3
}
|
From his birth in a shotgun shack in East Tupelo, Mississippi, to his death in a mansion in Memphis, Tennessee, and through all the struggles and triumphs in between, the life of Elvis Presley is a fascinating story. Even now, thirty years after his death, there's still so much to learn about this man who touched so many lives.
Perhaps because of his humble beginnings, Elvis was always accepted by his fans as "one of them," an honor that no amount of fame, riches, or celebrity could change. Elvis gave unprecedented access and sincere thanks to his fans throughout his life, even when those same fans made it impossible for him to live a normal life.
In the pages of this article, you can explore the life of Elvis Presley, starting with his birth and early life, and the heady first days of fame as a musician. Follow along as he serves his country in the army, then returns to the United States to embark on a new phase of his career, this time as a film idol. Experience again the flamboyant spectacle of the 1970s concert years, and explore the lasting fan phenomenon that continues to surround Elvis to this day.
Start at the beginning, with the birth of Elvis Presley. Learn more about the boy who would grow up to be King in the next section.
|
<urn:uuid:5bd55d8f-96fd-4557-814d-0ae80d26b298>
|
{
"dump": "CC-MAIN-2020-24",
"url": "https://entertainment.howstuffworks.com/elvis-presley-biography.htm",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347432237.67/warc/CC-MAIN-20200603050448-20200603080448-00537.warc.gz",
"language": "en",
"language_score": 0.9813207387924194,
"token_count": 271,
"score": 2.53125,
"int_score": 3
}
|
Authors: Chandan Kumar Rai1, Arti2 and Sanjeev Kumar1
1Ph.D. Scholar, Dairy Extension Division, NDRI, Karnal-132001, Haryana, India
2Ph.D. Scholar, DES&M, NDRI, Karnal-132001, Haryana, India
The agricultural sector continues to be an important sector of Indian economy. The Agriculture sector is gearing itself to make optimal use of the new information and communication technologies. At the Government of India level, a number of important initiatives have been taken to provide IT Hardware and connectivity to all organizations involved in Agricultural Education, research, development and dissemination. ICTs or Information and Communication Technologies are emerging as an important tool for the development of societies and have driving forces in the economies world-wide. Farmers often struggle for basic information like weather updates, crop prices and expert advice, ending up often relying on hearsays. A new mobile app “Kisan Suvidha” launched at march 21, 2016 by Prime Minister Narendra Modi will prove helpful for farmers in this regard but they must own a smartphone. The app is likely to have many takers as India is second largest smartphone market in the world with 87 million mobile Internet users in rural areas. Keeping its targets audience in mind, the app is designed with user-friendly interface consisting of important parameters to provide info on. The farmers can get critical and definite information on the weather forecast, dealers detail to sell to, the market price of a commodity in nearest area, information to protect plants from pest, weed and diseases, and expert advice from farm experts. Besides, farmers can directly get in touch with Kisan call centre where technical graduates answer their queries.
The features "Kisan Suvidha" mobile app
- To begin with, a farmer has to register the mobile number, choose a language—at present limited to Hindi and English—and enter details of the state, district and block or sub-district.
- A tap on the weather button shows details of temperature, humidity, wind and rainfall for the current day and the forecast for the next five days. Additionally, a farmer can get extreme weather alerts like hailstorms or unseasonal rains—a useful tool for farmers. For instance, after harvesting, farmers often leave their cereal crops in the field to dry. Prior information on freak rains can help them save their crop.
- The market price button shows latest price of all crops traded in amandi or registered agriculture market of the particular district a farmer belongs to. Additionally, he gets to see the maximum price in the district, state and the entire country on a particular day. For small farmers, who often sell their produce to local traders, this could be an important bargaining tool. Also, farmers can decide on whether to take their produce to the mandi or delay it based on information on current prices. Other information points are useful too.
- The plant protection button gives pest, weed and disease-related information as well as management practices for each stage of crop development—from nursery to harvesting. A farmer from, say Ganganagar district in Rajasthan, can scan the information for all major crops grown in the district like mustard, wheat and vegetables.
- The agro advisory section shows messages for farmers from district agriculture officials and state universities in their local language. These primarily deal with crop management practices based on the prevailing situation, say a remedy for a widespread pest attack or imminent showers. Farmers can also access names and mobile numbers of input dealers selling pesticides, seeds, fertiliser and machinery.
- This is a handy tool—farmers can now make a call and compare prices and availability before they actually head out to purchase these inputs. The agriculture ministry, which developed the app, describes it as an “omnibus for quick and relevant information”. Adding more local languages will take it a step further.
Pusa Krishi application: Pusa Krishi app help farmers know the various types of crops and information about those.
MKisan android Application: The android app allows farmers and all other stakeholders to obtain advisories and information being sent by experts and government officials at different levels through mkisan portal without registering on the portal.
Shetkari Masik Android App: The app can be used to download Shetkari Masik magazine and can be read without internet connectivity. “Shetkari Masik” is one of the most popular monthly magazines in the Agriculture sector, under publication since 1965. It is published by Department of Agriculture, Maharashtra.
Farm-o-pedia App: The app is targeted for rural Gujarat and is useful for farmers and anyone involved in agriculture business. The app can be used to get suitable crops as per soil and season, crop wise information, check whether in your area and manage your cattle.
Crop Insurance Android App: Crop insurance mobile app can be downloaded and used to calculate the Insurance Premium for notified crops based on area, coverage amount and loan amount in case of loanee farmer. The app can also be used to get details of normal sum insured, extended sum insured, premium details and subsidy information of any notified crop in any notified area.
AgriMarket: AgriMarket mobile app can be used to get the market price of crops in the markets within 50 km of the device’s location capture by GPS. There is another option to get price of any market and any crop in case person does not want to use GPS location.
About Author / Additional Info:
I am currently pursuing PhD (Agricultural Extension Education) at ICAR-NATIONAL DAIRY RESEARCH INSTITUTE, Karnal-132001, Haryana (INDIA).
|
<urn:uuid:44bc9689-5107-41d4-b31c-d02cfac9cd3e>
|
{
"dump": "CC-MAIN-2022-49",
"url": "https://www.biotecharticles.com/Agriculture-Article/Useful-Mobile-Apps-for-Farmers-4146.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711001.28/warc/CC-MAIN-20221205000525-20221205030525-00319.warc.gz",
"language": "en",
"language_score": 0.9151008725166321,
"token_count": 1173,
"score": 2.671875,
"int_score": 3
}
|
Life in the intertidal zone along the Overberg Coast
Coastal intertidal zones provide a varied habitat of extremes: amazing animals and plants that have adapted and evolved to combat the pounding waves, desiccation at low tide, changes in salinity and temperature in the estuaries and rock pools. The intertidal region is an important model system for the study of ecology. The region contains a high diversity of species, and the zonation created by the tides causes species ranges to be compressed into very narrow bands. This makes it relatively simple to study species across their entire cross-shore range, something that can be extremely difficult in terrestrial habitats.
Where life began
Rocky shorelines frequently contain tidal pools of varying sizes, and they may have provided some unique conditions that would have made biogenesis possible, (the chemistry that created this primordial soup 4 billion years ago). When gazing into a rock pool, spotting the many different organisms in this ecosystem, it’s worth pondering life’s origins born of this environment of extremes.
A hint at our own aquatic past is suggested in a correlation between the human menstrual cycle and the lunar cycle. Many aquatic species follow the same lunar cycles influence on the tides for reproduction.
Stone-age man’s footprint
When Neanderthal man was still ruling supreme in Europe, modern people were living in caves along the Overberg coast 85/100 thousand years ago. Evidence of this has been found in Klipgat cave in the Walker Bay Nature Reserve, (in De Kelders), one of the most important cultural assets in the Western Cape. One can visit this cave and see how the Khoisan’s way of life set the blueprint for our first steps out of Africa.
Everywhere along the Gansbaai coastline there are heaps of shell’s and other debris that result from early people visiting the shore and collecting shellfish. These refuse dumps of ancient beachcombers give us an invaluable insight into tens of thousands of years of history, a priceless and fragile heritage resource. Shell middens are protected by legislation in South Africa, and no private excavation is allowed.
The Khoisan were the first to discover the healing qualities in the various parts of fynbos plants. Much of this knowledge was embraced by the early European settlers in the Cape; some of this knowledge is still used today by traditional healers and in modern medicine. Wild plants are protected by law in SA, and may not be picked, dug up or destroyed.
An important part of the coastal experience is discovering the benefits of the abundant plant life. Seaweed is mostly edible (but not always palatable), full of protein, calcium, minerals, vitamins and trace elements. It’s an aquatic pharmacy, an untapped sustainable resource. The list of other everyday products derived from seaweed is astonishing: toothpaste, dental moulds, welding rods, audio speakers, gravies and beer are but a few.
Whales and dolphins
Undoubtedly the best place to spot whales from land in SA is De Kelders, near Gansbaai. From June each year large numbers of Southern Right whales, Eubalaena australis, arrive in Walker Bay to give birth and mate. This bay seems to have the perfect conditions for these gentle giants. Dozens can be seen close up from vantage points along the cliff path of De Kelders. Humpback whales, Megaptera novaeangliae, also pay a visit here on their long migration path, and stay to recoup before continuing north. Bryde’s whales, Balaenoptera brydei, can be seen blowing off shore right throughout the year along with sometimes hundreds of dolphins torpedoing across the bay.
The amazing life of limpets
When it comes to limpets southern Africa is the world’s foremost biodiversity and biomass hotspot, with some areas having densities of 2,600 individuals per square meter. Limpets at first glance are static, even boring creatures, but a closer look reveals an evolutionary masterpiece. Cape false-limpet uses chemical weapons as defence; Giant limpets use brute force in territorial battles; Ducks foot limpet develops and tends gardens of algae; Goat’s eye limpets slam their shells down like a guillotine, dismembering ferocious predators, Kelp limpet’s parachute from the canopy when kelp breaks loose in storms before being cast ashore. The Limpets’ shell shape and amazing adhesion has allowed them to become the dominant species on rocky shores exposed to heavy wave action.
Shipwrecks and Ghost ships
Over 140 shipwrecks lie off the infamous coast between Cape Infanta and Danger Point, which is near Gansbaai. H.M.S. Birkenhead’s tale of bravery and honour – coining the phrase “women and children first”- is but one of several tragic stories born of this treacherous coast. Many yarns of lost treasure and ghost ships spun in local communities over the decades have led to several successful salvage operations off the Southern Cape coast, retrieving some of the largest treasure caches ever found. The Flying Dutchman, who according to legend is destined to sail these seas until the end of time, was first seen off Danger Point in 1823.
|
<urn:uuid:db23c508-0a9c-4430-b1d9-ce855e3dca0e>
|
{
"dump": "CC-MAIN-2015-14",
"url": "http://www.clifflodge.co.za/recent_blog.php?id=41",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131302318.88/warc/CC-MAIN-20150323172142-00007-ip-10-168-14-71.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9245097041130066,
"token_count": 1098,
"score": 3.375,
"int_score": 3
}
|
🐇 Meaning: The whole body of a little white rabbit, standing on its two legs, facing left, displaying its entire furry rabbit body from its face at one end with its long bunny ears, black eyes, button nose and long whiskers to its fluffy tail at the other end.
The 🐇 Rabbit emoji signifies notable characteristics of rabbits such as being small in size, and its cute, agile, and harmless innocence. This emoji could also suggest other things rabbits are associated with like Easter, and expressions like “Going down the rabbit hole,” which means uncovering more buried secrets.
Different platforms vary in their depictions of this emoji in terms of design. Some even show the rabbit in grey color instead of white.
How and When to Use the 🐇 Rabbit Emoji
- A sense of innocence can be created using 🐇. So you can use this emoji to portray that your intentions are harmless.
- Someone displaying great speeds at anything (for example being swift in replies) can be represented with the 🐇 emoji.
- A person being shy (even if that person is you) can also be represented through 🐇.
- An implication to “dig deeper” about matters can be conveyed through 🐇. (“Down the rabbit hole”)
- The 🐇 emoji can be used as a metaphor for small and tiny beings. It can be even used to refer to cute and cuddly troublemakers that crawling babies in the home are.
- Any text involving Easter can have the 🐇 accompanying it.
- 🐇 Bunny
- 🐇 Bunny Rabbit
- 🐇 Bugs Bunny
- 🐇 Alice
- 🐇 Hare
- 🐇 Jackrabbit
- 🐇 Coney
- 🐇 Fluffy
- 🐇 Lapin
- 🐇 Peter Rabbit
|
<urn:uuid:2b92f6ca-56f4-4b55-8cf6-49da776cb285>
|
{
"dump": "CC-MAIN-2023-23",
"url": "https://whatemoji.org/rabbit/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649293.44/warc/CC-MAIN-20230603133129-20230603163129-00238.warc.gz",
"language": "en",
"language_score": 0.9427636861801147,
"token_count": 399,
"score": 2.578125,
"int_score": 3
}
|
Repulsive gravity as an alternative to dark energy (Part 2: In the quantum vacuum)
Ex nihilo: Dynamical Casimir effect in metamaterial converts vacuum fluctuations into real photons
New theory suggests way to teleport energy long distances
Is the universe a bubble? Let's check
Perimeter Associate Faculty member Matthew Johnson and his colleagues are working to bring the multiverse hypothesis, which to some sounds like a fanciful tale, firmly into the realm of testable science.
New mathematical model links space-time theories
Researchers at the University of Southampton have taken a significant step in a project to unravel the secrets of the structure of our Universe.
Dark energy hides behind phantom fields
Quintessence and phantom fields, two hypotheses formulated using data from satellites, such as Planck and WMAP, are among the many theories that try to explain the nature of dark energy. Now researchers from ...
How do you know if you ran through a wall? Testing the nature of dark energy and dark matter
(Phys.org)—Researchers from Canada, California, and Poland have devised a straightforward way to test an intriguing idea about the nature of dark energy and dark matter. A global array of atomic magnetometers ...
Lower-cost solar cells to be printed like newspaper, painted on rooftops
Solar cells could soon be produced more cheaply using nanoparticle "inks" that allow them to be printed like newspaper or painted onto the sides of buildings or rooftops to absorb electricity-producing sunlight.
Searching for dark energy with the whole world's supernova dataset
The international Supernova Cosmology Project (SCP), based at the U.S. Department of Energy's Lawrence Berkeley National Laboratory, has announced the Union2 compilation of hundreds of Type Ia supernovae, ...
The day the universe froze: New dark energy model includes cosmological phase transition
Imagine a time when the entire universe froze. According to a new model for dark energy, that is essentially what happened about 11.5 billion years ago, when the universe was a quarter of the size it is today.
Watching solar cells grow
(Phys.org) —For the first time, a team of researchers at the HZB led by Dr. Roland Mainz and Dr. Christian Kaufmann has managed to observe growth of high-efficiency chalcopyrite thin film solar cells in ...
Superconductors face the future
Futuristic ideas for the use of superconductors, materials that allow electric current to flow without resistance, are myriad: long-distance, low-voltage electric grids with no transmission loss; fast, magnetically ...
New jet results tick all the boxes for ITER
Latest results from the Joint European Torus (JET) fusion device are giving researchers increasing confidence in prospects for the next-generation ITER project, the international experiment that is expected ...
Plastic solar cells pave way for clean energy industry
(Phys.org)—A Flinders University researcher has been developing a cheaper and faster way of making large-scale plastic solar cells using a lamination technique, paving the way for a lucrative new clean ...
|
<urn:uuid:5e8b52b4-3ca4-46d9-80bb-49eb4a740ff8>
|
{
"dump": "CC-MAIN-2014-41",
"url": "http://phys.org/tags/vacuum+energy/sort/liverank/all/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410665301782.61/warc/CC-MAIN-20140914032821-00207-ip-10-234-18-248.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.8856629133224487,
"token_count": 639,
"score": 3.015625,
"int_score": 3
}
|
By Hanns Martin Trautner
Read or Download Allgemeine Entwicklungspsychologie (Urban-Taschenbücher) (German Edition) PDF
Best developmental psychology books
The long-awaited revision of the single publication on video game play on hand for psychological well-being execs not just is play a gratifying, certainly happening habit present in people, it's also a motive force in our improvement. rather than the unstructured play frequently used in psychotherapy, online game taking part in invokes extra goal-directed habit, consists of the advantages of interpersonal interplay, and will practice an important position within the variation to one's setting.
Bamba and Haight offer an in-depth figuring out of the typical reviews and views of maltreated young children and their replacement caregivers and lecturers in Japan. Their cutting edge learn software combines techniques from developmental psychology, ethnography and motion learn. even if baby advocates from around the globe proportion definite objectives and demanding situations, there's vast cultural version in how baby maltreatment is known, its origins, influence on young ones and households, in addition to societal responses deemed acceptable.
Guide of Dynamics in Parent-Child kin presents an leading edge, interdisciplinary viewpoint on conception, learn, and method of dynamic methods in parent-child family. Edited through amazing pupil Leon Kuczynski, this available quantity is split into six elements. half I matters dyadic procedures in parent-child relationships and gives the conceptual grounding for the quantity as an entire.
Social interplay is the engine which drives an individual's mental improvement and it could actually create adjustments on all degrees of society. Social kinfolk in Human and Societal improvement comprises essays through the world over well known lecturers from a variety of disciplines together with social psychology, diplomacy and baby improvement.
- Magic and the Mind: Mechanisms, Functions, and Development of Magical Thinking and Behavior
- Handbook of Children's Rights: Global and Multidisciplinary Perspectives
- Ateliers mémoire (Ateliers d'animation séniors) (French Edition)
- Identität im Zeitalter des Chamäleons: Flexibel sein und Farbe bekennen (German Edition)
Additional resources for Allgemeine Entwicklungspsychologie (Urban-Taschenbücher) (German Edition)
|
<urn:uuid:79cc00aa-321c-4f40-8c7e-82951640b598>
|
{
"dump": "CC-MAIN-2018-30",
"url": "http://nguyendinhtho.net/library/allgemeine-entwicklungspsychologie-urban-taschenbucher-german-edition",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589726.60/warc/CC-MAIN-20180717125344-20180717145344-00264.warc.gz",
"language": "en",
"language_score": 0.8705373406410217,
"token_count": 492,
"score": 2.5625,
"int_score": 3
}
|
We were reading about Galileo's thermometer I read this aloud "He filled a number of small glass BALLS (kids say, ewwww that's just wrong) partway with colored water and sealed them shut. The BALLS of colored water all floated in water. Galileo knew that water expands as it warms up......... Then he attached a weight to each BALL. The weights were adjusted to give each BALL a slightly different buoyancy. The result was that when the water was cold (at its densest) all of the BALLS floated. As water warmed up, becoming less dense, BALLS would sink. By placing the BALLS in a column of water in order of their buoyancy., with the least dense on top (BY THIS TIME I AM OMITTING BALLS because of the laughter that will not stop).... It is in the passage 4 more times!
Then in math that same day, we had to work a whole problem with MIXED NUTS ... again laughter and me screaming BE MATURE ABOUT IT! GET OVER IT!
|
<urn:uuid:03662414-3533-46bc-9f6f-5ad4b1180d93>
|
{
"dump": "CC-MAIN-2017-13",
"url": "http://createcookteach.blogspot.com/2012/09/friday-funnies.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218187193.40/warc/CC-MAIN-20170322212947-00468-ip-10-233-31-227.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9752336144447327,
"token_count": 216,
"score": 2.9375,
"int_score": 3
}
|
Aboriginal fire management is a body of ancient traditional practices and knowledge about natural systems that are still practised today in some parts of Australia.
For tens-of-thousands of years before European colonisation, Aboriginal groups performed cool and controlled burns that limited the incidence and severity of wildfires across the Australian continent. Scholars from a range of disciplines concerned with Australia’s environment, including historians, fire ecologists and botanists, have shown how Australian landscapes were shaped by Aboriginal fire practices. Stephen J. Pyne and Bill Gammage (2011) are among those to have shown how prior to both colonisation and urbanisation, Aboriginal peoples had used fire to promote and distribute plant communities (such as grass or open forest) and sought to distribute trees and plants to promote and protect animals, birds, reptiles and insects.
Whereas European settlers deemed the continent a wild and unfamiliar environment, what they encountered was in fact a landscape that had been very consciously and deliberately shaped by fire for millennia in a continent-wide economic and social strategy to support human life and protect fauna and flora species. One ubiquitous feature of human beings’ monopoly over fire has been its social, religious and ceremonial functions. Songs, ceremonies, sacred narratives and stories in Aboriginal languages about fire are used to teach important cultural concepts and practices while traditional seasonal calendars are essential tools in Aboriginal fire management that convey information about weather, wind, dew, precipitation and humidity, and ecological indicators of seasonal change to inform practices that regulate variability and intensity of fires. By burning patches of vegetation in a ‘mosaic’ pattern, achieved with the use of seasonal burning and maintaining a low fuel density in the understories of forests, Aboriginal people regulated the frequency and intensity of burns.
Aboriginal people continue to use their traditional and adapted fire management practices and knowledge. From researchers in fields such as the environmental sciences and history, we know that among its advantages, Aboriginal landscape fire gave every species a favourable habitat, letting them flourish, and averting species extinctions. We now know, for instance, that Aboriginal peoples deployed fire to promote drought-shielding native grasses and shrubs, and to minimise the impact of bushfire (or, wildfire) by reducing fuel, and by creating fire breaks to break up or isolate areas with dangerous fuel loads.
Aboriginal people made fire an ally, a dangerous ally, yet not an enemy. By using fire to fight fire, Aboriginal people managed the wildfire-prone Australian landscapes.
Today, Aboriginal fire practice is no longer possible in many areas of Australia because of the broader patterns of urbanisation, and demographic change. Scientists debate whether these practices can be replicated to control the fierce wildfires that affect current Australian landscapes, and conduct experiments to understand ecological complexity and variation in species response in different communities.
Pyne (1991), Burning Bush: A Fire History of Australia, Henry Holt and Company.
Gammage (2011), The Biggest Estate on Earth: How Aborigines Made Australia, Allen & Unwin.
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
The development of these resources was funded through an Australian Government initiative delivered by the University of Melbourne's Indigenous Studies Unit. The resources include the views, opinions and representations of third parties, and do not represent the views of the Australian Government. They have been developed as a proof of concept to progress the inclusion of Aboriginal and Torres Strait Islander content in Australian classrooms. In drawing on the material, users should consider the relevance and suitability to their particular circumstances and purposes.
|
<urn:uuid:2f3a8af2-951a-43fe-869c-a921abf4f5d4>
|
{
"dump": "CC-MAIN-2020-40",
"url": "https://indigenousknowledge.unimelb.edu.au/curriculum/themes/fire",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400213006.47/warc/CC-MAIN-20200924002749-20200924032749-00275.warc.gz",
"language": "en",
"language_score": 0.9365105628967285,
"token_count": 737,
"score": 4.0625,
"int_score": 4
}
|
Passing stool should be neither a painful, nor a difficult process. With a healthy bowel movement, the passage of stool will require minimal to moderate effort. Straining to defecate, painful intestinal cramps and pain while defecating are abnormal and can be an indication of various disorders affecting the large bowel, rectum or anus. It may also emanate from the other abdominal and pelvic organs, as well as the pelvic and perineal structures or buttocks, groin area, upper thighs or even the lower back. The entire defecation process is outlined in these articles on defecation and the defecation reflex.
Painful bowel movements should be investigated as there are a host of causes, some of which are related to serious conditions, where pain during defecation is the only symptom initially. Monitoring other signs and symptoms related to defecation may also help with diagnosis especially if there is a lack of clinical features indicating a possible cause. Patients should take note of :
- straining to pass stool
- difficulty passing stool despite urging
- rectal bleeding after a bowel movement
- hard and dry feces
- loose or watery stool
- mucus in the stool
- dark or fresh blood in the stool (melena or hematochezia)
- burning of the anus
- itching of the anus
Causes of Painful Bowel Movements
Injury to the anus and/or rectum may occur for a number of reasons and will lead to pain during defecation. Anal intercourse, vigorous cleaning/wiping of the anal area, accidental injuries to the anus, enemas and even the passage of very hard, dry or large feces in constipation may injure the lining of the rectum and anus. Foreign bodies inserted into the anus or rectum may also cause trauma and can contribute to severe pain if it is lodged in the area.
Abscess and Fistula
An abscess within the abdominopelvic cavity, in the organs or around the anus may also be a cause of painful defecation. This may include an intra-abdominal abscess, pelvic abscess, ovarian abscess (women), prostate abscess (men) and perianal abscess.
A fistula is an abnormal passageway that forms between two hollow organs. It may be a complication of an abscess but can occur for other reasons. Certain types of fistulas that affect the abdominopelvic structures may lead to painful bowel movements. This includes an anorectal, rectovaginal (rectum to vagina), vesicorectal (bladder to rectum), and urethrorectal (urethra to rectum) fistulas.
Infection and Inflammation
Inflammation of the lower part of the gut and pelvic organs may also contribute to pain during defecation. It may occur for a number of reasons, including mechanical and chemical trauma, autoimmune factors and infections. This includes the rectum (procititis), colon (colitis), prostate (prostatitis), bladder (cystitis), and small intestine (enteritis), pelvic inflammatory disease, vaginitis (vagina) and endometriosis in women. Although the prostate, vagina, uterus and bladder are not involved in the process of defecation, the increased perineal pressure associated with defecation may irritate the already inflamed organ. Bowel conditions like inflammatory bowel disease and diverticulitis often present with painful bowel movements.
Read more on :
Infectious causes may be due to a host of pathogens with various methods of transmission. Sexually transmitted infections should always be considered when acute infections are seen in sexually active patients. Chlamydia, gonorrhea, syphilis and genital herpes especially may affect the anal region.
Read more on :
Altered Bowel Habit
Constipation and diarrhea may be seen with a number of diseases. The frequency of bowel movements in diarrhea and difficulty in constipation can often irritate the lining of the rectum and anus if it was not involved as part of the primary condition. This can contribute to painful defecation. Furthermore, the dry, hard feces, straining, hemorrhoids and fecal impaction seen in conjunction with constipation may further contribute to painful bowel movements.
Anal Fissures, Warts and Hemorrhoids
Anal fissures are tears in the lining of the anus. It may be minute and extend to the skin around the anus. It is frequently seen with constipation or diarrhea but may also arise with trauma to the anus, allergic reactions, STDs and other infectious and inflammatory disorders. Pain occurs with the passage of stool irritating the underlying tissue that is exposed to the environment.
Anal warts are often associated with the human papillomavirus (HPV) and is commonly transmitted sexually. It is more likely to cause pain with defecation if it is large, inflamed and excoriated.
Hemorrhoids are swollen and inflamed blood vessels in the lower rectum (internal hemorrhoids) and anus (external hemorrhoids). It is seen with constipation and chronic diarrhea, in pregnancy and anal trauma and occurs more frequently in obese people. Itching, bleeding and pain during and after defecation are common symptoms.
A number of skin disease may involve the perianal area, anus or even extend slightly into the anal canal. This can vary from conditions like psoriasis and eczema (read more on the types of eczema) to infectious conditions like cellulitis, necrotizing fasciitis, and fungal infections of the skin.
Tumors and Growths
Benign growths like polyps in the colon may present with painful defecation if it is large and ulcerated although there may be no other symptoms. Malignant tumors like colorectal carcinoma may also be responsible for painful bowel movements, along with rectal bleeding, weight loss and altered bowel habits. Large tumors involving the other organs of the pelvic cavity may also cause pain upon defecation, especially of the uterus, cervix and vagina in women (uterine cancer, cervical cancer and vaginal cancer), prostate in men (prostate cancer) and bladder in both sexes (bladder cancer).
- Lumbosacral back pain (lower back pain)
- Coccydynia (tailbone pain)
- Lumbar neuritis
- Abdominopelvic hernias
- Rectal strictures
- Rectal prolapse
- Ectopic pregnancy
- Polycystic ovarian syndrome (PCOS)
- Sexual abuse
Article reviewed by Dr. Greg. Last updated on April 5, 2011
|
<urn:uuid:ff9c2046-6ce3-40cd-bc0d-bf0f5e773535>
|
{
"dump": "CC-MAIN-2014-23",
"url": "http://www.healthhype.com/painful-bowel-movements-and-causes-of-pain-during-defecation.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997888216.78/warc/CC-MAIN-20140722025808-00164-ip-10-33-131-23.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9216318726539612,
"token_count": 1393,
"score": 2.65625,
"int_score": 3
}
|
Posted by Anjan on Friday, December 31, 2010 at 6:36pm.
1. Describe how the magma is generated for volcanoes parallel to a subduction zone.
2. What two factors result in a volcano at a plate boundary?
3. Why are volcanoes found at mid-ocean ridges but not at ocean trenches?
4. What causes a hot spot in the mantle?
5. Explain why hot spot volcanoes appear as volcanic chains in the middle of an oceanic plate.
6. How are the terms “focus” and “epicentre” linked?
7. Draw a graphic organizer to compare the three categories of earthquake: shallow-focus, intermediate-focus, and deep-focus.
8. (a) At what type of plate boundary are deepfocus earthquakes likely to occur?
(b) What causes them?
9. The three largest earthquakes in recorded
history have occurred in subduction zones. How
does the plate tectonic theory explain this?
Consider the processes that occur along all three types of plate boundaries.
10. (a) What are the two main types of seismic waves?
(b) Explain the difference between the two types.
11. Which type of seismic wave travels farthest through Earth? Why?
12. In 2005 and 2006, several major earthquakes occurred in Pakistan and Iran, located to the
north and west of India.
(a) Why does the theory of plate tectonics support the occurrence of earthquakes in these countries?
(b) What type of plate boundary exists near these two countries?
- Science - Writeacher, Friday, December 31, 2010 at 6:42pm
To quote one of our very good math and science tutors: “You will find here at Jiskha that long series of questions, posted with no evidence of effort or thought by the person posting, will not be answered. We will gladly respond to your future questions in which your thoughts are included.”
- Science - Dr Russ, Saturday, January 1, 2011 at 5:07am
You might find this site useful
- Science - salam, Saturday, January 1, 2011 at 6:32pm
Answer this Question
sci - Describe how plate tectonics is related to the formation of volcanoes. · ...
Sceince - 3. Which of the following physical features are caused by plate ...
Science - Are all of these true? 1. Ocean ridges are not associated with orogeny...
Science - California's volcanoes formed as the result of what type of plate ...
Overdue Science Lesson, Very Urgent. - 1: How does sea-floor spreading occur? A...
Geological Events - Two factors that result in a volcano at a plate boundary are...
Ocean - Locations of hot spots remain fixed for a long time. As plates move ...
volcanoes - what supplies do you need to make a volcanoes lava if you were to ...
science - 1. Why do earthquakes occur along the San Andreas Fault? a. Two plates...
Science - what is the source of the magma that fuels the island arc complex? a. ...
|
<urn:uuid:0aa08728-aba7-49ea-a22d-b067feccbd0c>
|
{
"dump": "CC-MAIN-2015-18",
"url": "http://www.jiskha.com/display.cgi?id=1293838578",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246641468.77/warc/CC-MAIN-20150417045721-00197-ip-10-235-10-82.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.934674084186554,
"token_count": 668,
"score": 4.0625,
"int_score": 4
}
|
Positive things to say to your little ones
The importance of positive reinforcement while raising your little ones cannot be stressed enough. Positivity – in actions, words and advice – helps children develop a positive sense worth there by building a strong self-image and self-esteem right from a young age.
However, many parents get stuck and don’t know the right thing to say to their child, especially during moments of rage. If this has happened to you, don’t worry, it happens to all of us. Here, we have put together some positive things you can say to your child to help him or her through the day!
- Express gratitude: When your little ones do something for you – even if it is as simple as bringing you a glass of water, never forget to express your gratitude to them. Not only do they feel good, they also automatically learn how to be grateful.
- Talk instead of yelling: So your little one spilt your favourite bottle of nail polish all over that brand new white dress you just bought! Are you mad? Of course you are! However, try not to yell at him or her because the words that come out when angry are most often hurtful. Calm your senses down – it was a great dress and a really expensive nail polish, but this is a memory you and your little one may be able to laugh about down the line. Explain to your child that you are upset at what has happened, and why you are upset. You’d be surprised at how careful he or she will be the next time!
- Listen: Whenever your little ones talk, ensure you give them all your attention. Listen to what they are saying and let them know you’re interested in their views or story!
- Use various positive phrases such as:
- I love you.
- You are special.
- We can’t wait to spend time with you.
- Praise them when necessary – that’s a good boy/girl.
- Thank you for being you.
- I love how you said that.
- You have a great imagination.
- Don’t be afraid to be you.
- I could never stop loving you.
- You can say no.
- You can say yes.
- You are important.
- This family wouldn’t be the same without you.
- I know you did your best.
- We are proud of you.
- We all make mistakes. Yes, mum and dad too.
- It’s good to be curious.
- I appreciate you.
- I forgive you.
- Being around you is fun.
- Watching you grow up is amazing.
- We can try (this) your way.
- You did that so well.
- You are helpful.
- You make the family feel full.
- That’s a great question.
- You make my happy.
- That was a really good idea.
- You don’t have to be perfect.
- Whatever you decide to do or be will always be enough.
So remember, super parents, whatever the situation maybe, positive reinforcement and positive words go a long way in helping your little ones during tough times!
|
<urn:uuid:dd72581a-59fb-43aa-baf8-b10abca3d658>
|
{
"dump": "CC-MAIN-2020-10",
"url": "https://www.klayschools.com/blog/positive-things-say-little-ones/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145729.69/warc/CC-MAIN-20200222211056-20200223001056-00417.warc.gz",
"language": "en",
"language_score": 0.9515864849090576,
"token_count": 682,
"score": 2.890625,
"int_score": 3
}
|
MENU TO FIDDLE STYLES:
MIDDLE EAST AND MEDITERRANEAN
contact Chris Haigh
Return to Homepage
To the ear of the western violin player Indian music,
and perhaps the Indian violin in particular, is one of the most
exotic and mysterious of sounds. And this is not merely superficial,
for the more closely you examine the complexity and discipline
of the Indian Classical tradition, the more mysterious and baffling
There are two main branches of classical music in the Subcontinent;
the Carnatic or South Indian, and the Hindustani or Northern.
The two styles diverged around the 14th Century AD, but have common
roots dating back to the 4th Century BC. The biggest difference
between Indian and Western Classical music is that the former
is based very largely on improvisation, with emphasis on the creativity
of the performer rather than on the exact reproduction of a composer's
The performer must work within a rigorous and complex framework
of scale and rhythm; it is the ability to be inventive within
these restrictions that marks out the quality of an artist. In
Carnatic music for example there are 72 main scales or Melakartas,
each of which has its own set of ornaments and Gamakas (grace
notes); and 35 principal rhythms or Talas. A performance or Raag,
which may last for several hours, will specify the use of a combination
of certain melakartas and talas, and will have a simple melodic
line, often from a religious or folk song; this however may not
appear until late in a piece, and most of the performance is spent
in examining and elaborating the particular mood and feel of the
Raag. Raags were originally based mainly around the vocal tradition,
and are not instrument-specific; indeed it is remarkable to hear
the similarity in tone and ornamentation when comparing vocal
and violin performances of a raag.
Probably the most important melody instrument is the Sitar, a
plucked stringed instrument whose characteristic whining and "zinging"
sound comes from the many sympathetic drone strings, and the ability
to bend the strings sideways, thus sliding the note. An instrument called the Ravanastron is said to be the earliest ancestor of the fiddle, in that it was the first stringed instrument played with a bow. King Ravana of Ceylon is said to have invented the bow, and the instrument he used it on was named after him- the date for this is either 3000 or 5000 BC depending on what source you believe. Other stringed
instruments include the Tambura (a four-stringed drone instrument,
the Sarod (a small sitar), the Surbahar (bass sitar) and, from
Hindustan, the Sarangi.
The Sarangi: A hundred colours
The Sarangi is a strange and ancient relative of the European
violin which is both highly expressive and extremely difficult
to play. Its name means "a hundred colours", indicating
the range, depth and subtlety of its voice. The instrument expresses,
according to the late Sir Yehudi Menuhin, "the very
soul of Indian feeling and thought". It has an important
and growing role in North Indian music, but has largely died out
in the south.
It is said that the Sarangi originated in ancient
times when a weary travelling hakim (doctor) lay down under a
tree to rest in a forest. He was startled by a strange sound from
above, which he eventually found to be caused by the wind blowing
over the dried-up skin of a dead monkey, stretched between some
branches. With this unlikely event as his inspiration, he proceeded
home and constructed the first sarangi
It is squat and box-like, carved from a single piece of hardwood
(usually Indian Cedar), with three gut melody strings (tuned do-so-do)
and a baffling array of up to 40 metal tarab (sympathetic strings).
The body has a goatskin face on which rests an elephant-shaped
bridge of ivory or bone. The Sarangi is held vertically, neck
uppermost, and the strings are stopped not with the fingertips
but with the backs of the nails. A characteristic feature of sarangi
playing is the very smooth meend (glissandos) and gamakas (oscillations around the note). Talcum powder is used on the
palms of the hands to facilitate easy sliding on the neck.The
heavy bow is held with an underhand grip, the first and second
fingers placed between the hair and the stick. Among the current
masters of the instrument are Pandit Ram Narayan and Ustad
Sultan Khan; they have achieved conspicuous success despite
a general decline in the fortunes of the sarangi, brought about
both by its poor image (associated as it is with the accompaniment
of dancing-girls), and by competition from the considerably sturdier
and less troublesome harmonium.
Besides the classical sarangi described above,
there exists a whole extended family of instruments either called
by the same name, or structurally very similar, across the whole
of North India, Pakistan and Afghanistan.
The violin may have been introduced to India around 1790 by military bandsmen
in the East India Company, many of whom were Irish. Baluswami Dikshitar learned the instrument from the army bandmaster
at Fort St.George in Madras, and developed new playing techniques
to suit Carnatic music; he became court musician in Attaiyapuram.
It has also been suggested that the violin came somewhat earlier, brought by Portugese Christian missionaries, and taught to converts for use in church services. Either way, the instrument was quickly found to be ideal for use in Indian classical music, with its closeness in timbre and range to the human voice. The violin is played sitting cross legged, the instrument pointing
to the ground with scroll resting firmly on the ankle of the right
foot. Traditionally fingering is based around the middle finger
(which slides up), and the index finger (which slides down); these slides or portamenti, called meend in carnatic music, are sometimes facilitated by oiling the fingers. Open tunings,
such as DADA or FCFC are commonly used in order to incorporate
the drones which are such an important part of Indian music. The
bow is held more in the folk than western classical style. Vibrato
is not used as in Western music, though there are slow, deliberate oscillations (andolan) and faster oscillations called gamak.
The aim of tone production is to imitate the Indian
singing style. Grace notes (sparsha svara or krintan) are frequently used. Hindustani music alone has over a hundred categorised ornaments. There is extensive use of micro-tones,
and a choice of alternative tunings to utilise drone notes; the violin is often tuned in fourths rather than in fifths, eliminating the need to use the fourth finger.
The violin has become well established in Carnatic
music, principally as an accompaniment to the voice, but also
sometimes as a solo instrument.
and Kumaresh- a Carnatic violin duo
It has assumed a similar role alongside the
sarangi in Hindustani music in the hands of such players as VG
Jog and Gajanarao Joshi.
Indian music first became widely known to the
popular audience in the West in the late 1960's, when George Harrison,
with the Beatles, visited India in search of alternative methods
of mind-expanding spiritual enlightenment, and discovered, perhaps
more usefully, the playing of sitar guru Ravi Shankar. Much musical
cross-fertilisation followed, one of the most fruitful results
being guitarist John McLaughlin's group Shakti, which included
the violin genius L.Shankar.
with 10-string double violin
L.Shankar, as well as being a top player in
both the Western and Carnatic classical traditions,uses his dazzling
virtuosity to full effect in rock and jazz fusions with such artists
as Peter Gabriel, Jan Garbarek, Frank Zappa, Talking Heads and
fiddler Mark O'Connor. He has an astounding double-necked,
10-stringed electric violin giving him the full range of the string
quartet- an instrument which would appear ridiculous and totally
pretentious in the hands of almost any other violinist.
His brother is another famous violinist, Dr. L.Subramaniam (and it seems almost de rigeur for every Indian violinist to have
a father, brother, sister and chiropodist who are famous and talented
musicians). L.Subramaniam, like his brother, is a master of both
western and Carnatic classical music, is a prolific composer,
and is involved in East-West fusions, for example with Stephane
recent newcomer to London is S.Harikumar, from Kerala in southern India; having studied with, among others,
L.Subramaniam, he has developed his own Indian Jazz Fusion style,
making good use of a technical mastery of staccato bowing techniques,
and fluent playing up to the fifth octave.
S.Harikumar plays both 4-string acoustic and
7-string electric violins.
Contrary to the popular belief that all leading
Indian musicians are men, one of the greatest of all pioneers
of Hindustani violin in recent times is a woman, Dr.N Rajam ;
her daughter Sangeeta Shankar is also a leading player.
A brief dip into Indian music quickly reveals that it is a deep
and vast subject, its performance requiring great discipline and
spiritual awareness. Consider this quote, next time you reach
for a well-earned pint after scraping merrily through Old Joe
Clark or Drowsy Maggie; "The purpose of Indian music is to
refine one's soul, discipline one's body, to make one aware of
the infinite within one, to unite one's breath with that of space
and one's vibrations with that of the cosmos."
Chris Haigh is a freelance fiddler and writer based in London. He has worked with the leicester Based Bollywood band Diwana Arts and with S Harikumar. He has had several books published: Fiddling Around the World, Any Fool can Write Fiddle Tunes, (Spartan), The Fiddle Handbook (Backbeat/Hal Leonard) and Exploring Jazz Violin (Schott)
Return to fiddlingaround.co.uk
THE FIDDLE HANDBOOK
by Chris Haigh
EXPLORING JAZZ VIOLIN
by Chris Haigh
OFF THE WALL (CD)
By Chris Haigh
Indian Melodies: for Violin (Schott)
An excellent and authoritative introduction to Indian violin playing is provided by Candida Connolly's book. She has studied in India with N.Gopalakrishna Iyer, and teaches at Trinity College London and at the Bharatiya Vidya Bhavan (Indian Cultural Centre). She covers the basic ornaments and ragas of both North and South India, explains Indian musical notation, and provides several studies, songs and ragas, along with a 21-track CD.
|
<urn:uuid:54f10c3d-ad09-4afa-8fe1-63d1aafcd851>
|
{
"dump": "CC-MAIN-2014-49",
"url": "http://www.fiddlingaround.co.uk/india/indiaframe.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416931011032.12/warc/CC-MAIN-20141125155651-00160-ip-10-235-23-156.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9407385587692261,
"token_count": 2425,
"score": 3.25,
"int_score": 3
}
|
Anne Heigham Line was a convert to Catholicism; she and her brother William Heigham were disinherited and disowned by their Calvinist father. In 1586 she married Roger Line, another disinherited convert. Not long after Anne and Roger married, he and her brother William were arrested for attending Mass and were exiled from England. Roger lived in Flanders and died in 1594.
Father John Gerard SJ, author of the famous book Autobiography of an Elizabethan Priest, asked Anne to manage two different safe houses for Jesuits, even though she was ill, but because she was destitute, surviving on teaching and sewing. She was arrested on the Feast of the Presentation, February 2, 1601, when Father Francis Page, SJ was celebrating Mass; he escaped with her help. She was tried on February 26, carried to court in a chair, where she admitted joyfully that she had helped Father Page escape and only regretted that she had not been able to help even more priests escape! After her execution by hanging, Father Filcock kissed her dead hand and the hem of her dress as she still hung from the gibbet and proclaimed, “You have gotten the start of us, sister, but we will follow you as quickly as we may.” Barkworth was first to be hung, disemboweled and quartered. Filcock had to watch his companion suffer, knowing that he would immediately follow.
Blessed Mark Barkworth OSB was born about 1572 at Searby in Lincolnshire. He studied for a time at Oxford, though no record remains of his stay there. He was received into the Catholic Church at Douai in 1593, by Father George, a Flemish Jesuit and entered the College there with a view to the priesthood. He matriculated at Douai University on 5 October 1594.
On account of an outbreak of the plague, in 1596 Barkworth was sent to Rome and thence to Valladolid in Spain, where he entered the English College on 28 December 1596. On his way to Spain he is said to have had a vision of St Benedict, who told him he would die a martyr, in the Benedictine habit. While at Valladolid he make firmer contact with to the Benedictine Order. The "Catholic Encyclopedia" notes that there are accounts that his interest in the Benedictines resulted in suffering at the hands of the College superiors, but the Encyclopedia expresses skepticism, suggesting anti-Jesuit bias.
Barkworth was ordained priest at the English College some time before July 1599, when he set out for the English Mission together with Father Thomas Garnet. On his way he stayed at the Benedictine Monastery of Hyrache in Navarre, where his wish to join the order was granted by his being made an Oblate with the privilege of making profession at the hour of death.
After having escaped from the hands of the Huguenots of La Rochelle, he was arrested on reaching England and thrown into Newgate, where he was imprisoned for six months, and was then transferred to Bridewell. There he wrote an appeal to Robert Cecil, signed "George Barkworth". At his examinations he was reported to behave with fearlessness and frank gaiety. Having been condemned with a formal jury verdict, he was thrown into "Limbo", the horrible underground dungeon at Newgate, where he is said to have remained "very cheerful" till his death.
Father Barkworth sang, on the way to Tyburn, the Paschal Anthem: "Hæc dies quam, fecit Dominus exultemus et lætemur in ea", and Father Filcock joined him in the chant:
Hæc dies quam fecit Dominus; [This is the day which the Lord has made:]
exsultemus, et lætemur in ea. [let us be glad and rejoice in it.]
At Tyburn he told the people: "I am come here to die, being a Catholic, a priest, and a religious man, belonging to the Order of St Benedict; it was by this same order that England was converted."
He was said to be "a man of stature tall and well proportioned showing strength, the hair of his head brown, his beard yellow, somewhat heavy eyed". He was of a cheerful disposition. He suffered in the Benedictine habit, under which he wore a hair-shirt. It was noticed that his knees were, like St. James', hardened by constant kneeling, and an apprentice in the crowd picking up his legs, after the quartering, called out: "Which of you Gospellers can show such a knee?" Contrary to usual practice, the quarters of the priests were not exposed but buried near the scaffold. They were later retrieved by Catholics.
Blessed Roger Filcock (1570-1601) was arrested in England while he was fulfilling a probationary period prior to entering the Jesuits. He had studied at the English College in Rheims, France and then in Valladolid, Spain, but when he asked to join the Society he was encouraged to apply again after ministering for awhile in England.
His journey into England was difficult enough. The ship he was traveling on from Bilbao, Spain to Calais, France, was becalmed just outside the port and fell pray to a Dutch ship blockading the harbor. Filcock was captured, but managed to escape and land surreptitiously on the shore in Kent in 1598. Soon after he began his ministry, he contacted Father Henry Garnet, the Jesuit superior, asking to become a Jesuit. He was accepted into the Society in 1600, but then was betrayed by someone he had studied with in Spain. He was arrested and committed to Newgate Prison in London. His trial did not last long, despite the fact that there was no evidence against him and that the names in the indictment were not names he had used. Before he suffered, he paid tribute to Father Barkworth, saying, "Pray for me to our Lord, whose presence you now enjoy, that I too may faithfully run my course."
St. Anne Line was among the Forty Martyrs of England and Wales canonized by Pope Paul VI in 1970. She, St. Margaret Clitherow and St. Margaret Ward share a separate Feast on August 30 (the date of St. Margaret Ward's martyrdom in 1588) in the dioceses of England. Blessed Mark Barkworth was beatified by Pope Pius XI on 15 December 1929. Pope John Paul II beatified Blessed Roger Filcock on the 22nd of November 1987.
Father Francis Page, whom St. Anne Line had protected at the Mass of the Presentation of Our Lord was later arrested and executed for his priesthood, suffering a little more than a year later, on April 20, 1602. He was beatified by Pope Pius XI on 15 December 1929.
|
<urn:uuid:da4fe666-ac54-4094-9842-e313678a6e24>
|
{
"dump": "CC-MAIN-2017-13",
"url": "http://supremacyandsurvival.blogspot.com/2016/02/from-candlemas-to-execution-st-anne-and.html",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218186774.43/warc/CC-MAIN-20170322212946-00221-ip-10-233-31-227.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.989048182964325,
"token_count": 1433,
"score": 2.71875,
"int_score": 3
}
|
July 16, 2010
In “Daxing County’s Water Gone Forever,” the eleventh in a series of oral histories produced by a team of investigative environmental historians and water experts in Beijing and led by China’s prize-winning journalist Dai Qing and Probe International, Li Zhenwe, a former engineer at the water bureau in the Beijing’s southern Daxing County talks about his childhood in one of the county villages where annual floods and a surfeit of water were once an integral part of village life.
Now, it’s all changed, he says.
In his youth, Mr. Li remembers that rain used to be so plentiful that villagers were scared of it because, “when it started, it never stopped.” To protect their mud houses from becoming sodden with rain and collapsing, villagers would press stalks of sorghum into the mud to direct the water away from the house.
The houses looked like they were “wearing a straw cape,” said Mr. Li, “but it worked” and the houses remained dry.
Villagers were also able to quickly retrieve water from wells that “weren’t deep and, during the rainy periods, we could touch the water just by reaching down with our arms into the wells.”
“In those days,” reminisced Mr. Li, “all the children, young and old, knew how to swim, and the older people could too, so there were no deaths by drowning.”
And when the late autumn rains arrived, the watermelons, for which the area was famous, began to float. To harvest them, villagers put them in shallow baskets and pushed them through the water.
At that time, the nearby Yongding River was high and often flooded the village. With the floods, came fish swimming upstream to fill every hollow and gully by the side of the road. The fish would still be there in the winter, so, “if you cut through the ice, put your hand in and felt around, there were still plenty of fish beneath.”
But, Mr. Li says, the last time the river ran high was 1956. And since then, the once mighty Yongding River and heavy annual rains have steadily receded—with the Yongding River now running dry and Daxing County receiving a fraction of the rainfall it did during his youth.
The changes began, Mr. Li says, with government water programs that started in 1958 under the disastrous Great Leap Forward. Then, Daxing County’s rivers were “straightened little by little” as the villagers were told to dig canals across the region in order to have all the villages in the county “linked up by boat.” But with the water receding, many sections were dry, so people began filling them in again.
“We had worked for nothing,” Mr. Li said. Though they weren’t paid for their efforts, they ate for free. “Socialism was like that,” he added.
Starting in the 1960s the villagers began planting paddy rice—which, previously, would not have been viable in the region, as the area was too wet. But by the 1970’s, the droughts became so common that, by 1978, the village completely depleted its available ground water resources, jeopardizing the rice crops.
At this point, says Mr. Li, the villagers “began using motorized pumped wells” to cultivate and irrigate rice. But after a few years, even the motorized wells weren’t able to provide enough water for the rice plants—forcing the villagers to switch to corn and wheat. Now, says Mr. Li, they must cover all their plants with “plastic sheeting to prevent evaporation and to help crops grow faster.”
Villagers had experimented with a number of irrigation methods, first using piped and sprinkler irrigation and eventually relying on the more water-efficient drip irrigation first introduced by the famous American husband and wife team, Joan Hinton and Sid Engst.
As an example of just how different things are now in Daxing country, Mr. Li says that in order to supply his village with enough water for farming, the local water supply plant has dug more than 20 wells, with an average depth of 300 meters.
“As I remember, it used to rain in all four seasons and there was an annual rainfall of 1000 millimetres,” he said. “Now there wouldn’t be more than a few hundred millimetres.”
From water wealth to water poverty, Mr. Li’s story provides a poignant, and rare, insight to an environmental history of the traditional villages in Beijing’s watershed.
Other Oral Histories:
- A River Returns
- Jiayukou Village on Great Rock River
- Magic Water Village of Mentougou District
- Old Beijing’s Goldfish Ponds
- Remembering Miyun Reservoir
- The Lost Rivers of the Forbidden City
- The Vanishing Haidian
- The Xishan Dajue Temple’s Spring Runs Dry
- Three-Eyed Well in Xuanwu District
- Yongding River in Mentougou District
Categories: Beijing Water
|
<urn:uuid:f4e49a2d-7014-4956-9e44-d1acb3869b22>
|
{
"dump": "CC-MAIN-2020-16",
"url": "https://journal.probeinternational.org/2010/07/16/crisis-when-beijing-was-rich-water/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370515113.54/warc/CC-MAIN-20200403154746-20200403184746-00445.warc.gz",
"language": "en",
"language_score": 0.9783428907394409,
"token_count": 1123,
"score": 2.84375,
"int_score": 3
}
|
By: Kiersten Millman
Last week in my Consumer Behavior class we learned about Decision Making and the three categories within the process. The first category being cognitive decision making which includes deliberately thinking about a product, weighing out the positives and negatives. The second category is habitual decision making which requires not much thought and mostly results in routine purchases. The third category is named collective decision making and has to do with purchases that are made due to the emotions that are felt from the consumer. The chapter then goes on to talk about how families make purchasing decisions as a whole to fit everyone’s needs. Regardless of the product or situation many individuals go through the decision-making process multiple times a day and may not even notice.
In class this week we spoke about each category in the decision-making process and which products would fit into each bucket. Our professor presented different examples and had the class identify which product went with the correct category. One product was a Starbucks coffee in which we identified was a habitual product. This is because many people stop for coffee as part of their routine and do not put any thought into the product, it is just a habit. Another product was a wedding ring and after a deliberation we identified this product as a cognitive product. This is because any consumer in the market for purchasing a wedding ring will go through all steps of the decision-making process because it is not an everyday purchase
While researching decision making even further, I came across a PowerPoint that was straight from our textbook. The 50 slide PowerPoint consists of important information and summarizes the entire Decision-Making chapter. This was helpful to me because I was able to use this as a reference to highlight key topics in which I went back into the textbook and explored the information even deeper. https://slideplayer.com/slide/13106678/
I discovered an interesting article within my research from guidedselling.org that discussed digital advice within the 5 stages of decision-making. The article, written by Chris Wallace, lays out all the steps and how their company uses technology to leverage consumer purchases. The first step being problem recognition, consumers first start the process when they realize they have a need. Guided Selling explains that they use engaging content such as online quizzes that result in advice and products that they may have not known they needed before the quiz. In the second stage which is information search, the consumer will start to do research on the product to learn more about it. Guided Selling reduces the problem by educating the consumer in using interactive product advisors on their website. With the third step being alternative evaluation, the consumer will compare different brands and the specifications of the product they are interested in. Guided Selling helps consumers in this stage by laying out each products attribute, making it easy to identify which product best suits their needs. The fourth step is the purchase decision, and this is where the consumer decides which sale to make. However, the article explains that ¾ of digital shopping carts go abandoned which can be caused by many different reasons. Guided Selling does their best to ensure that this does not happen as they make the consumer feel confident on their purchase and makes the payment as effortless as possible. The final step has to do with post purchase behavior, essentially identifying if the consumer was happy and if they return for future purchases. Guided Selling’s role in this stage is to ensure that their five steps are helpful to consumers and research has proven that 70% of consumers have reported Guided Selling to be highly valuable and important. https://www.guided-selling.org/how-to-leverage-the-5-stages-of-the-customer-decision-making-process/
In conclusion, there is much information and thought that is implemented in the decision-making process. Many consumers have different thought processes depending on the product but overall can be manipulated by surrounding noises. Furthermore, there are plenty of characteristics that are included in purchase decisions such as price, variation of brands, location, etc. that can persuade the purchase decision. We are all consumers, who in the end make our own purchase decisions.. But are we really?
|
<urn:uuid:971b1a18-390f-4ca3-a6e4-c48f4580f55d>
|
{
"dump": "CC-MAIN-2021-25",
"url": "https://consumerbehavior.irresistible.io/tt-dm-p-trust-the-decision-making-process/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487637721.34/warc/CC-MAIN-20210618134943-20210618164943-00076.warc.gz",
"language": "en",
"language_score": 0.970790684223175,
"token_count": 842,
"score": 3.125,
"int_score": 3
}
|
On a bleary day in the plains of eastern Wyoming, a small group of travelers decides to take a detour to a place known as Devils Tower. The group was returning to New York City and had planned a stop-over in the Black Hills for one of their favorite past times: rock climbing. Most of the group was skeptical about the detour, since Devils Tower was not a place for rock climbing.
As Fritz Wiessner stood at the base of Devils Tower, gazing up at its monumental columns, he thought to himself this would be a good place to climb. Although doubtful at first, Custodian (Superintendent) Newell Joyner, soon supported the idea. However, the National Park Service office in Washington, D.C. disagreed. Wiessner left the Tower disappointed that day, but an idea had been planted.
Climbing Devils Tower
In May of 1937, Fritz Wiessner submitted a formal application to the National Park Service to climb Devils Tower National Monument. What he wanted to do was unprecedented: a technical rock climb up the 867-foot monolith, unaided by artificial devices. Although several people had been to the summit of the Tower, all who had done so accomplished the climb by means of a stake ladder built in 1893. Wiessner wanted to use ropes, pitons, and his technical climbing abilities. The park service gave him permission.
On 27 June 1937, Wiessner, along with Lawrence Coveney and William House, arrived to the monument and began scouting for a viable climbing route. They made a short start up a crack on the southeast face, but were held up by vegetation and dwindling daylight. They would return the next day prepared to make the climb, but for the first time Wiessner admitted that "failure was probable."
The following day, Wiessner, Coveney and House began their ascent of the Tower. All of them were experienced climbers, but it was the leadership and skills of Wiessner that made the ascent possible. As Fritz worked his way up along the cracks, Coveney and House watched with "spontaneous and complete but soft-spoken admiration. We knew we were watching an exhibition of leading such as few climbers ever see."
Techniques used for climbing at Devils Tower can be challenging even for experienced climbers. One must jam their body parts - usually feet and hands, but sometimes shoulders, arms, knees and legs - into cracks and use friction and opposing forces to work their way up the columns. Coveney admitted to great difficulty during certain sections, despite his previous climbing experiences.
During his climb, Wiessner inserted only one piton - a fixed anchor device used to enhance climber safety. The expert climber would later proclaim that anchor unnecessary, and modern climbers of the Wiessner Route will testify it was placed after the hardest section of climb. At 11:18 am, June 28, 1937, the three men became the first to summit Devils Tower using traditional climbing techniques.
On the Summit
The climbing party had been asked by Custodian Joyner to collect data and samples from the summit. Exhausted but exhilarated, the three men paced out the dimensions of the summit and examined the soil and types of plants found on the summit. Bill House was a forester and had a keen eye for vegetation. There was an interest in how plants made it to the summit in the first place. House determined that wind could have easily carried the seeds of the various species of grasses and sage they encountered on the summit.
After only a short time on the summit, the three agreed it was time to descend. By inserting pitons and stringing their rope through these anchors the men were able to rappel from the summit. After several series of rappels, the men were back at the base by 1:30 pm.
First of Many
The route pioneered by the first three climbers is named after their leader - Wiessner. It is considered a challenging route, but today there are much harder routes to be found on Devils Tower. The Wiessner Route remains one of the most popular climbs at the Tower.
In a larger sense, it was not just the route he climbed, but the fact that Wiessner proved Devils Tower was indeed climbable. Less than a year later a second route was pioneered. Although climbing was more an exception than a rule for several decades, it became increasingly popular through the last quarter of the 1900s. Today an average of 5,000 people follow in the footsteps of Wiessner, Coveney and House as they embrace the challenge of climbing at Devils Tower National Monument.
For those interested in reading more about Wiessner's climb, the below text is from the report filed by Custodian Joyner shortly after the three men completed their descent.
Devils Tower Climbed
June 28, 1937
First Technical Climb of Devils Tower
This report was filed soon after the climb by Superintendent Newell F. Joyner.
Devils Tower, until Monday, June 28, 1937, unclimbed save by use of rope and stake ladder, has been conquered. Fritz Wiessner, New York, Lawrence Coveney, New York and William P. House, Pittsburgh, Penn., all members of the American Alpine Club, New York City, made the ascent up the almost perpendicular columned laccolith in slightly less than five hours.
The party of climbers arrived at Monument headquarters in the late afternoon of the previous day and spent some time in a reconnaissance of the south side of the Tower and the completion of plans for the ascent. At 6:30 the following morning the climb began, after making their way up over 200 feet of rough talus to a point where the columns rise almost perpendicular. They reached the top 600 feet higher at 11:18, four hours and 48 minutes from the time they began the ascent; 30 minutes was spent exploring the top, collecting requested specimens of the flora as well as samples of the rock found at the summit, taking pictures, and noting in detail points of scientific interest. One hour and forty-two minutes were consumed in the descent which was terminated at 1:30, with a total round-trip time of exactly seven hours. Both ascent and descent were made via the same route on the south side of the Tower.
It was a difficult climb, all three agreed, Wiessner adding that there were few places in the Alps as difficult to climb as one part of the climb where they had to traverse a chimney for eighty feet.
Devils Tower is composed of a granitic rock known as Phonolite Porphyry. At the time of the Black Hills uplift, the up-welling of molten rock in the then overlying layers of sandstone and limestone formed a "lava blister" or Laccolith. Uneven contraction accompanied the rapid cooling of this molten rock causing cracks to be formed which set off huge five or six-sided vertical columns. Erosion has removed much of the blister and left the structure now known as Devils Tower, which stands about 867 feet above the 385 foot hill on which it Tests. The first 250 feet is over the talus slope, or slanting heap of broken stone at the foot of the cliff.
The hard part of the ascent came after the climbers, all of them experienced, started up the crack or chimney, slightly to the west of the old stake and two-by-four ladder constructed by the first climbers, Will Rogers and Will Ripley. Wiessner, who has climbed several very difficult peaks in the Alps and in the Grand Tetons', led the way.
"Wiessner looked over the crack when we got to the overhanging ledge, and said I think it goes." Coveney said. "I wasn't so sure, but Wiessner led us up in as magnificent a piece of mountain climbing as I have ever seen."
A certain technique is required for climbing up cracks and Wiessner is an expert in this line, his companions declared. Using an over and over movement something like the crawl of a caterpillar he led them up the narrow perpendicular seam. Only one piton was used and Wiessner afterward declared that it was unnecessary and wished that he had not used that safety precaution. A piton is a small iron pin, with an eye in the outer end, hand forged and so tempered that it can be bent double twice, before breaking. When used it is driven into a small crack in the rock; into it is fastened a carabiner (snap ring) through which the rope is run. The whole acts purely as a safety device. No actual climbing is done with the aid of the piton or the rope. Both are to serve in case of an accident.
"Every bit of the climb was made under our own power," Wiessner said, "we used no artificial means whatever."
The following scientific observations were made and reported verbally by the members of the party.
After the descent the climbers were met at the top of the talus slope by Newell F. Joyner, custodian of the Devils Tower National Monument, with canteens of water which they received gratefully. "Three cans of grapefruit juice and orange juice doesn't go so very far." House said, "but if we had carried up all the water we wanted, we wouldn't have had any strength left to climb the Tower."
Due to the fact that no announcement of the climb had been made because ethics of mountain climbing forbid it, only a small crowd witnessed the ascent. Tourists who happened to choose that particular day to visit the Tower were rewarded with a rare thrill.
One of the first to congratulate the climbers was Mrs. Alice Hepler, whose first husband, W. L. Ripley, was undoubtedly the first man to stand on the Tower. He aided Will Rogers in building the ladder, carrying the stakes up and pounding them in because he was not afraid of high places, Mrs. Hepler said. The crowd was small in comparison to the climb by Rogers. People came and stayed for several days, and there were probably 500 people who watched it, Mrs. Hepler said, though she declared she had seen some accounts in which the crowd was estimated at 7000. She was the only person at the Tower Monday who had witnessed the first climb.
"I wouldn't recommend that any one except an experienced mountain climber attempt the trip we made," Wiessner said. "It is an extremely difficult climb for 200 feet and to one who does not know mountain climbing it would be practically impossible to reach the top. A serious accident would be very likely to result. There is only one pitch on the north face of the Grand Teton in Wyoming which is as difficult in its way, as this crack is on the Devils Tower."
Wiessner has climbed since his early youth in Europe and in the United States; numbering among these, climbs in the Alps, Himalayas Rockies of Canada, United States, and Mexico. His climb of Mt. Waddington in British Columbia was featured in the December 14, 1937 issue of Life. One of his most difficult climbs was the Kaiserberger in the Alps. Coveney's first major climb was the Devils Tower, although he has climbed extensively and is an experienced climber and highly technical in his climbing technique, we were informed by his comrade. House, a graduate of Yale College of Forestry, has climbed in the Alps, the Tetons, was a member of Wiessner's party in the Waddington climb, and has climbed some in Mexico.
Sunday before coming to the Tower the party stopped in the Needles of the Black Hills, near Harney Peak, climbed two of the spires in order to condition themselves for the more difficult climb of Devils Tower.
The climbers wore ordinary hiking clothes with wool socks and low canvas climbing shoes with heavy hempen soles which not only gave them sure footing but allowed them to feel the crevices with their feet. Each climber carried a 35 meter safety rope made of the best quality Italian hemp, which is tested to 1 1/2 tons and will stretch twenty to twenty-five feet, thus acting as a cushion to the climber in case of a fall.
Wiessner presented his climbing shoes, a piton, and carabiner to the museum at Devils Tower headquarters, and a short piece of the rope used. Special permission for the climb was obtained from the National Park Service. Wiessner and Coveney were here last summer and looked it over but were unable to get permission then. The climbers made the trip out here and the climb entirely at their own expense. We were very grateful to them for the information they brought back.
"And we are grateful to Mr. Joyner for the way the crowd was kept back," Coveney said. "So often we worry more about them than we do about what is above us."
The first climb was made July 4, 1893, when William Rogers a cowboy living near Devils Tower made the ascent. This ascent was made via a ladder which was constructed a short time prior to the climb. Rogers and his neighbor W. L. Ripley, had spent days constructing the ladder, carrying the small stakes up the Tower and pounding them in. Two-by-fours were nailed to the stakes, thus making a crude device which has ever since been called "the ladder."
Two years later Mrs. Rogers climbed the Tower with her husband, again on the Fourth of Juiy. She is the only woman who has ever been up. W. B. Ogden, formerly of Sundance, Cyril Miller, Ivan Hoffer, L. G. Wood, and Henry Hazelbaker., climbed the Tower on the ladder after Rogers had come down on the Fourth of July, 1893. Neil McArthur helped carry material up for Rogers so it is probable that he stood on top at some time.
A rod man, name unknown, in the party of Dr. Herron of the U.S.G.S. made the climb in 1918. Others who have been on top are T. F. Jolley, Spearfish; Seth Boyer in about 1900; Henry Hauber in about 1905; J. Arthur Jobe, July 22, 1906; Dudley Wilkinson, Bates Eccles, Alfred Barr, Lloyd Gay and William McMaster, June 25, 1908, and a so-called human fly, Babe White, in 1927.
Last updated: November 4, 2020
|
<urn:uuid:db44aba7-0511-4cb0-85e2-04dff3d7ed07>
|
{
"dump": "CC-MAIN-2022-05",
"url": "https://www.nps.gov/deto/learn/historyculture/firsttechnicalclimb.htm",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320300573.3/warc/CC-MAIN-20220129062503-20220129092503-00111.warc.gz",
"language": "en",
"language_score": 0.9824910163879395,
"token_count": 2990,
"score": 3.65625,
"int_score": 4
}
|
The Marshall Plan or the European Recovery Program (ERP) was the large-scale American program to aid Europe in which the United States (US) gave monetary support to help rebuild European economies after the end of WWII in order to combat the spread of Soviet communism.
The monies involved were $13 million in US aid (5% of US GDP, a drop in the bucket!) on top of $12 billion in American aid already spent in Europe up to that time.. The monies provided were eventually returned to the United States. In addition, Germany also repaid 16 billion marks of debts from the 1920s which had defaulted in the 1930s, but which Germany decided to repay to restore its reputation.
Former enemies as well as allies were recipients of this aid.
At that time, the US economy was, by far, the most powerful in the world.
During the Eisenhower(R?) administration the Interstate Highway System began as a military asset, but made it was available to every American.
This describes post-war America through the 1950s.
The United States put men on the moon in July 1969. The rescue of the crew in the Apollo 13 mission riveted the world in 1971. The rapid response to a potentially fatal outcome was diverted by United States’ can-do attitude and technological prowess.
The Space Shuttle was first launched in 1981, a heavy lift vehicle that has never been matched. It served for 30 years. It was used to assemble the International Space Station as well as deploy and repair the Hubble Space Telescope.
The collapse of the USSR between January 19, 1990 and December 31, 1991 left the United States as the sole major power on earth.
From then on, the United States has rested on its laurels. Tax revenues from corporations and the rich have been pared to the bone. The Iraqi invasion and occupation has depleted the national treasury simply because there were no “matching funds”. The nation was trying to drive a Lamborghini on a burger flipper’s salary. The solution was to slash entitlement and infrastructure programs which had served the nation very well since the mid 1930s.
Now China has been asked for assistance by European for assistance in support of the economic collapse resulting from weak economies in Greece, Italy and Spain. The US is in a position where it cannot help – the dollar is weak and US manufacturing is struggling at best! And China rebuffed the request until Europe gets its house in order.
Just this week, mainland China demonstrated a first step towards development of its own space station which when completed be truly international – available to all nations (There are nations denied access to the “International” Space Station.).
China is starting the development of naval airpower and stealth aircraft.
This is our Open Thread. Now how did we get into this fine kettle of fish?
|
<urn:uuid:a74b83b8-23c0-4cb2-a6d9-676d6d30eef8>
|
{
"dump": "CC-MAIN-2017-17",
"url": "https://tpzoo.wordpress.com/2011/11/05/the-watering-hole-november-5-then-and-now/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123276.44/warc/CC-MAIN-20170423031203-00612-ip-10-145-167-34.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9785870909690857,
"token_count": 581,
"score": 3.140625,
"int_score": 3
}
|
- to break or fail, as a machine or engine (often followed by out): The engine conked out halfway there.
- to slow down or stop; lose energy (often followed by out).
- to go to sleep (usually followed by off or out).
- to lose consciousness; faint (usually followed by out).
- to die (usually followed by out).
Origin of conk2
- to strike (someone) a blow, esp on the head or nose
- a punch or blow, esp on the head or nose
- the head or (esp Brit and NZ) the nose
Word Origin for conk
as in conk out, 1918, coined by World War I airmen, perhaps in imitation of the sound of a stalling motor, reinforced by conk (v.) "hit on the head," originally "punch in the nose" (1821), from conk (n.), slang for "nose" (1812), perhaps from fancied resemblance to a conch (pronounced "conk") shell.
|
<urn:uuid:524572dc-391f-4dca-9ed3-f085195e6028>
|
{
"dump": "CC-MAIN-2018-47",
"url": "https://www.dictionary.com/browse/conk-out",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039746639.67/warc/CC-MAIN-20181120191321-20181120213321-00112.warc.gz",
"language": "en",
"language_score": 0.9324434995651245,
"token_count": 220,
"score": 2.875,
"int_score": 3
}
|
The struggle of the powers-that-be to get a grip on the most disruptive information technology since the invention of the printing press continues to go on. This time it’s the United Nations making an attempt to get regulatory control over the Internet.
The International Telecommunication Union (ITU), a United Nations body, convenes at the World Conference of International Telecommunications (WCIT) in Dubai, 3– 14 December. The aim of the conference is to renegotiate the International Telecommunication Regulations (ITRs), which were adopted in 1988 in Melbourne.
Together ITRs form a binding treaty for the 193 member states of the ITU. In its current form the treaty only covers telephone, television and radio networks, but now several members are proposing to broaden its scope to include the Internet. If the folks gathering in Dubai agree on this, it would extend government control over the Internet. Pushing back the decentralized, tech-minded, solution-driven coordination that made the Net what it is today.
So. In Dubai the UN will decide if the UN should get control over the Internet. Should it decide in favor of itself the next question it will ask itself is what it should do with its newly gained power. There are many proposals ranging from changing the way the Internet operates to regulating content.
Iran and Russia propose to define the Internet as a ‘international telecommunication service’. As a consequence internet traffic would be billed the same way as international phone calls: paying extra for your data crossing a border.
The proposal of ETNO, a trade organization representing European network operators, exposes a similar nostalgia for the good old days of the telephone. They want to see the implementation of a ‘sending party network pays’ model. This would mean a drastic departure from how data is trafficked now. The Internet is a network of networks that voluntarily connect with each other. The exchange of data takes place based on ‘settlement-free peering’, meaning the networks don’t charge each other for data traveling through their wires. And in most cases no one even keeps count of how much data originates from a particular network.
Besides architectural changes to the networks implied in the proposal it would also affect the spirit of the Internet. Companies with huge data streams like Google or Facebook may decide not to make their content available to certain groups or areas because they expect a negative return on investment.
There is a proposal to define spam as ‘causing harm to the network or personnel’. Consequently member states should actively prevent it. With this proposal the ITU crosses the line from a hardware regulator ensuring interoperability and harmonization to an agency regulating content. The USA objects to the proposal saying: ‘this text suggests that the ITU has a role in content related issues. We do not believe it does’.
Equally, the proposal against online crimes point towards a broadening of the scope from hardware to content regulations.
Lack of transparency
More generally, it can be expected UN-regulations will lead to a bureaucratic lockdown of the technology’s development. Innovation is moving so fast, no one can anticipate the next iteration of the Internet. Let alone a sluggish institution like the ITU keeping up regulatory-wise.
Another concern is the lack of transparency. None of the proposals or working papers that will be treated at the conference have been made public. Even something as general as the agenda is behind a wall requiring a password. Much of the information available has come through wcitleaks.org, a site dedicated to bring transparency to WCIT by making leaked documents available online.
The next two weeks will be yet another decisive episode for the future of the Internet.
Image: source Cesc.kth.se
|
<urn:uuid:289f4e2f-f632-429a-852d-a2a4630cfe9e>
|
{
"dump": "CC-MAIN-2015-40",
"url": "http://www.techthefuture.com/technology/united-nations-threatens-to-regulate-internet-top-down/",
"file_path": "s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443736682102.57/warc/CC-MAIN-20151001215802-00194-ip-10-137-6-227.ec2.internal.warc.gz",
"language": "en",
"language_score": 0.9297059774398804,
"token_count": 770,
"score": 2.65625,
"int_score": 3
}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.