text
stringlengths
263
344k
id
stringlengths
47
47
dump
stringclasses
23 values
url
stringlengths
16
862
file_path
stringlengths
125
155
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
57
81.9k
score
float64
2.52
4.78
int_score
int64
3
5
Conscience Perspectives: The Roman Catholic View Fr Frank Brennan SJ The human person is a moral agent who is shaped by his actions. By forming and informing her conscience, the human person is deciding not only what she wants to do but also who she wants to be. It is not only the mind or the will that acts morally but the whole person. As the person changes and grows, the conscience is formed and grows too. So each conscience is unique as each person is unique. For the Catholic, the conscience is sacred ground where the person meets God; all others (including church authorities), unless invited in, are trespassers in this place. Pope Pius XII described conscience as "a sanctuary on the threshold of which all must halt, even, in the case of a child, his father and mother". John Henry Newman had earlier defined conscience "not as a fancy or an opinion, but as a dutiful obedience to what claims to be a divine voice, speaking within us". The Catholic view of conscience holds in tension the dignity and freedom of the human person, the teaching authority of the Church, and the search for truth and the good. The tension arises because the Catholic concedes not only the possibility but also the common reality of the incompletely formed conscience which may receive guidance from the Church"s teaching authority. This tension accounts for the Catholic Church"s unequivocal affirmation of the primacy of individual conscience against the State, together with its occasional ambivalence about the role of conscience in relation to Church authority. The conscientious Catholic would deviate from church teaching on moral issues only with deep regret and after careful attention to the developing and changing situation, and only on condition that he is satisfied that he has a greater command of the facts or of his situation than the Church authority issuing universal declarations faithful to a constant tradition. The Second Vatican Council in its Declaration on Religious Freedom said, "In the formation of their consciences, the Christian faithful ought carefully to attend to the sacred and certain doctrine of the Church. For the Church is, by the will of Christ, the teacher of the truth." However, in changing times or particular personal circumstances, there may be true doubt about the certain doctrine of the Church and its application to the changing circumstances. Changes to church teaching about slavery and usury were preceded by persons of good conscience acting at variance with traditional teaching. Conscience is engaged when the person looking ahead asks, "What should I do or not do?", or when the person looking back asks, "Should I have done that or not done that?" There are two extremes to be avoided in answering these questions. The person may be tempted simply to do his own thing, choosing according to his own preference on the basis that there is no objective truth or verifiable good. Or the agent may woodenly apply the prescriptions of authority without attending to the voice of conscience urging him to do the greater good or to be prophetic, not just complying with the mores of his society or church community. Ideally, the actor will follow his conscience. In the New Testament, Paul takes up the idea from the prophetic literature of the Old Testament that God"s moral law is inscribed in the human heart. In his letter to the Romans, Paul writes: When Gentiles who have not the law do by nature what the law requires, they are a law unto themselves, even though they do not have the law. They show that what the law requires is written on their hearts, while their conscience also bears witness and their conflicting thoughts accuse or perhaps excuse them. (Rom 2:14-15) One does not have to be a natural law theorist to affirm a law implanted in the human heart commanding the person, in freedom, to seek the truth, to do good and to avoid evil. In the very act of seeking the truth and trying to do good, the person further forms and informs her conscience. But what is truth? What is the good in this particular situation? In the Catholic tradition, the person is guided and even directed in the formation and informing of conscience by the Church authorities. Traditionally, the church authorities claim to teach not only that which is revealed in the scriptures but also that which can be derived from the natural law by reflecting on the ends for which man is created. Many Catholics now share the contemporary era"s pessimism about an all-embracing natural law based on a single static human nature that permits a wholesale determination of what is right and wrong in each and every situation. Ultimately every person is obliged to follow their conscience even if that conscience be erroneous. When making a decision to act or to refrain from an action, in good conscience, the Catholic actor is obliged to consider the church teaching on the matter at hand. Before becoming pope, Pope Benedict XVI provided us with a good rule of thumb on conscience: "A man of conscience is one who never acquires tolerance, well-being, success, public standing, and approval on the part of prevailing opinion at the expense of the truth." Saint Augustine taught that "there is no soul, however perverted, . . . in whose conscience God does not speak." Thomas Aquinas taught that a person must always follow their conscience even if that conscience be erroneous. For "when a reason which is in error proposes something as a command of God, then to dismiss the dictate or reason is just the same as dismissing the command of God." The possible conflict between conscience and church authority was highlighted in the dispute between Prime Minister W Gladstone and John Henry Newman after the First Vatican Council in 1870 taught and defined that the Pope could define infallibly "a doctrine of faith or morals". Gladstone feared that "no one can now become (a Catholic) without renouncing his moral and mental freedom, and placing his civil loyalty and duty at the mercy of another". Newman refuted this fear conceding that there may be "extreme cases in which conscience may come into collision with the word of a Pope, and is to be followed in spite of that word". He asserted that "infallibility alone would block the exercise of conscience" but that "the Pope is not infallible in that subject matter in which conscience is of supreme authority" and thus "no dead-lock, such as is implied in the objection ...can take place between conscience and the pope". Thus his notorious declaration: Certainly, if I am obliged to bring religion into after-dinner toasts, (which indeed does not seem quite the thing) I shall drink - to the Pope if you please, - still, to Conscience first, and to the Pope afterwards. The Second Vatican Council in its Declaration on Religious Freedom in 1965 teaches: In all his activity a man is bound to follow his conscience faithfully, in order that he may come to God, for whom he was created. It follows that he is not to be forced to act in a manner contrary to his conscience. Nor, on the other hand is he to be restrained from acting in accordance with his conscience, especially in matters religious. The Church teaching on conscience gives no consolation to the uninitiated, thinking they can simply do their own thing. But neither does it accord religious authorities the liberty of insisting upon wooden compliance with their instruction or view of the world. Good conscience must always be accorded primacy even by bishops who would act differently in the circumstances, bearing in mind John Henry Newman"s observation that "conscience is not a judgment upon any speculative truth, any abstract doctrine, but bears immediately on conduct, on something to be done or not done", and Aquinas"s view that conscience is what I genuinely personally believe, even if mistakenly, that God is asking of me. As the Vatican Council said in its 1965 Pastoral Constitution on the Church in the Modern World (with some modification out of consideration for those offended by non-inclusive language): In the depths of our conscience, we detect a law which we do not impose upon ourselves, but which holds us to obedience. Always summoning us to love good and avoid evil, the voice of conscience can when necessary speak to our hearts more specifically: do this, shun that. For we have in our hearts a law written by God. To obey it is the very dignity of the human person; according to it we will be judged. Conscience is the most secret core and sanctuary of a person. There we are alone with God, whose voice echoes in our depths. We must always accord primacy to the conscientiously formed and informed conscience, regardless of the person"s place in the church hierarchy. The Christians" contribution to the contemporary world would be greater if there were more attention to the formation of conscience and to the injunction: educate your conscience and to that conscience be true. For most people, the questions of conscience will not be: am I to believe this church teaching? But "Am I to do this particular act or refrain from it?" That act may be one relating to personal relationships; it may be about political engagement and a commitment to make a difference in the public forum. It may even be the decision to endorse a war or to condemn it or to remain silent. Each of us must ensure that we have a formed and informed conscience as we decide not only what we will believe, as that is probably the less problematic part, but also as we decide what we will do. Before acting we will search for the truth insofar as the truth is discoverable. But we will then make prudential decisions about what to do, having applied whatever moral principles might apply to the matter under consideration. In his World Day of Peace Address in January 2002 Pope John Paul II said: Respect for a person"s conscience, where the image of God himself is reflected (cf. Gen 1:26-27), means that we can only propose the truth to others, who are then responsible for accepting it. To try to impose on others by violent means what we consider to be the truth is an offense against human dignity, and ultimately an offense against God whose image that person bears. There are many complex issues in the world today which are not susceptible of unequivocal answers about what is true and what is good or what is the greater good in terms of actions and outcomes. In these situations, I cannot acquit my conscience simply by pleading that I followed what the bishops said, did or failed to do. All of us, like the bishops, are obligated to play our respective roles in the societies of which we are a part, forming and informing our consciences, and acting according to our consciences. The Second Vatican Council"s 1965 Pastoral Constitution on the Church in the Modern World made clear that often it is the laity and not the church leaders who are the experts about moral quandaries in the world. The laity were not to expect that the bishops would have all the answers. The Council stated: Laypeople should also know that it is generally the function of their well-formed Christian conscience to see that the divine law is inscribed in the life of the earthly city; from priests they may look for spiritual light and nourishment. Let the laypeople not imagine that their pastors are always such experts, that to every problem which arises, however complicated, they can readily give them a concrete solution, or even that such is their mission. Rather, enlightened by Christian wisdom and giving close attention to the teaching authority of the Church, let the laypeople take on their own distinctive role. Often enough the Christian view of things will itself suggest some specific solution in certain circumstances. Yet it happens rather frequently, and legitimately so, that with equal sincerity some of the faithful will disagree with others on a given matter. Even against the intentions of their proponents, however, solutions proposed on one side or another may be easily confused by many people with the Gospel message. Hence it is necessary for people to remember that no one is allowed in the aforementioned situations to appropriate the Church"s authority for their opinion. They should always try to enlighten one another through honest discussion, preserving mutual charity and caring above all for the common good. After the Second Vatican Council, many Catholics made decisions in conscience not to follow Pope Paul VI"s teaching on birth control Ð a teaching which varied from the teaching of other Christian churches whose hierarchy being free to marry often had personal experience of married life, and a teaching which was at variance from the recommendations made by the majority of theological experts and married persons appointed to advise the pope on the question. Paul VI taught "that each and every marital act must of necessity retain its intrinsic relationship to the procreation of human life". Many Catholics in good conscience accepted the position set out in the Papal Commission"s majority report of 1966 that "the morality of sexual acts between married people takes its meaning first of all and specifically from the ordering of their actions in a fruitful married life, that is one practised with responsible generous and prudent parenthood. It does not then depend upon the direct fecundity of each and every particular act". Their consciences are untroubled and even fortified by the fact that other Christian churches whose clergy are often married teach such an ethic. They find unconvincing Catholic hierarchical claims to superior insight into the natural law (as distinct from Revelation) when such insight is proclaimed to be available to every thinking person with insufficient regard for the experience of married Catholics, and contrary to the considered reflection on that experience by competent moral theologians. They are convinced that Pope Paul VI would not have overruled the majority of the Commission but for his conviction that the Church"s previous teaching on the natural law of marriage could not be changed. In his 1993 Encyclical Veritatis Splendor, John Paul II stated: Like the natural law itself and all practical knowledge, the judgment of conscience also has an imperative character: man must act in accordance with it. If man acts against this judgment or, in a case where he lacks certainty about the rightness and goodness of a determined act, still performs that act, he stands condemned by his own conscience, the proximate norm of personal morality. The new Pope"s published views on Conscience In his 1972 lecture "Conscience in its Age", Joseph Ratzinger (now Pope Benedict XVI) took as his starting point for reflection Hermann Rauschning"s Conversations with Hitler in which Hitler pledged to liberate man "from the filthy and degrading torments inflicted on himself by a chimera called conscience and morality, and from the claims of a freedom and personal autonomy that only very few can ever be up to". The future Pope Benedict said: The destruction of the conscience is the real precondition for totalitarian obedience and totalitarian domination. Where conscience prevails there is a barrier against the domination of human orders and human whim, something sacred that must remain inviolable and that in an ultimate sovereignty evades control not only by oneself but by every external agency. Only the absoluteness of conscience is the complete antithesis to tyranny; only the recognition of its inviolability protects human beings from each other and from themselves; only its rule guarantees freedom. In his 1991 essay "Conscience and Truth", Ratzinger says, "It is of course undisputed that one must follow a certain conscience, or at least not act against it". Reflecting on actions of the SS during World War II, Ratzinger distinguishes conscience from "firm, subjective conviction and the lack of doubts and scruples" which do not justify man. Though one is obliged to follow an erroneous conscience, "conscience"s reduction to subjective certitude betokens at the same time a retreat from truth". Ratzinger happily adopts Newman"s approach to authority and conscience noting that Newman embraced "a papacy not put in opposition to the primacy of conscience but based on it and guaranteeing it". For Pope Benedict XVI: The true sense of the teaching authority of the pope consists in his being the advocate of the Christian memory. The pope does not impose from without. Rather he elucidates the Christian memory and defends it. For this reason the toast to conscience indeed must precede the toast to the pope because without conscience there would not be a papacy.
<urn:uuid:ce6ffbc1-68c4-4819-ba6a-d9cabe1fe9c5>
CC-MAIN-2023-14
https://www.jcrelations.net/de/artikelansicht/conscience-perspectives-the-roman-catholic-view.html?tx_extension_pi1%5Baction%5D=detail&tx_extension_pi1%5Bcontroller%5D=News&cHash=f0d431225705ae589d2697cfe7f0d25e
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296946637.95/warc/CC-MAIN-20230327025922-20230327055922-00420.warc.gz
en
0.966509
3,305
2.640625
3
Kent Jaffa created a great genealogy video explaining how Family History research is like being a detective. It's entitled "Is Your Great Uncle Really Your Great Aunt?" In the video Jaffa explains some of the basic rules for good research while tackling a case where good detective work proved that Philander M. Sawyer was really a female and not a male as was shown in the 1850 US Census. In a follow up video entitled "Advanced Detective Studies" learn why relying on transcripts of records can lead to mistakes, why you cannot trust a single document by itself and then solve a more complex problem where children were assigned to the wrong family.
<urn:uuid:bc0e380c-955f-4015-bf75-8cb0f4cff340>
CC-MAIN-2017-43
http://relativedetective.blogspot.com/2014/12/training-video-on-being-good-detective.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187820487.5/warc/CC-MAIN-20171016233304-20171017013304-00171.warc.gz
en
0.964125
132
2.796875
3
- International Agreement on the Neutrality of Laos International Agreement on the Neutrality of Laos is an international agreement signed in Genevaon July 23 1962between 14 states and Laos. It was a result of the International Conference on the Settlement of the Laotian Question which lasted from May 16, 1961to July 23, 1962. Burma, Cambodia, Canada, the People's Republic of China, the Democratic Republic of Vietnam, France, India, Poland, the Republic of Vietnam, Thailand, the Soviet Union, the United Kingdom, and the United Statessigned a Declaration which together with the statement of neutrality by the Royal Government of Laosof July 9, 1962, entered into force as an international agreement on the date of signature July 23, 1962. The 14 signatories pledged to respect Laotian neutrality, to refrain from interference — direct or indirect — in the internal affairs of Laos, and to refrain from drawing Laosinto military alliance or to establish military bases in Laotian territory. The Laotian government pledged to promulgate constitutionally its commitments which would have the force of law. However, the agreement was violated in when the Democratic Republic of Vietnamestablished a supply line through "neutral" Laotian territory for supplying the Viet Conginsurgency against the government of South Vietnam. More specifically, during the Second Indochina War the North Vietnamese obtained the cooperation of the Lao People's Revolutionary Party ( Pathet Lao) in constructing and maintaining the Ho Chi Minh Trailwhich passed through the length of Laos. Thousands of Vietnamese troops were stationed in Laos to maintain the road network and provide for its security. Vietnamese military personnel also fought beside the Pathet Lao in its struggle to overthrow Laos' neutralist government. Cooperation persisted after the war and the Lao communist victory. * [http://www.taipeitimes.com/News/editorials/archives/2005/03/30/2003248384 Taipei Times, Wednesday, Mar 30, 2005, Page 8] * [http://www.hinduonnet.com/2003/12/24/stories/2003122401601000.htm The Hindu of Wednesday, Dec 24, 2003] * Working Paper Sites of Political Science Wikimedia Foundation. 2010. Look at other dictionaries: Neutrality (international relations) — For other uses, see Neutral. A map of the world showing the countries in question: neutral countries in green, countries claiming to be neutral in yellow, and countries neutral in the past in blue. A neutral power in a particular war is a… … Wikipedia international relations — a branch of political science dealing with the relations between nations. [1970 75] * * * Study of the relations of states with each other and with international organizations and certain subnational entities (e.g., bureaucracies and political… … Universalium International Red Cross and Red Crescent Movement — Red Cross redirects here. For other uses, see Red Cross (disambiguation). Ibrahim Foundation The Red Cross and Red Crescent emblems, the symbols from which the movement derives its name. Founded 1863 Location Gen … Wikipedia International recognition of Kosovo — Kosovo This article is part of the series: Politics and government of Kosovo Political status of Kosovo Declaration of independence … Wikipedia Laos — This article is about the country. For other uses, see Laos (disambiguation). Lao People s Democratic Republic Sathalanalat Paxathipatai Paxaxon Lao … Wikipedia List of Laos-related topics — This is a list of topics related to Laos. This is so that those interested in the subject can monitor changes to the pages by clicking on Recent changes in the sidebar.The list is not necessarily complete or up to date if you see an article that… … Wikipedia Role of United States in the Vietnam War — The role of the United States in the Vietnam War began soon after the Second World War and escalated into full commitment during the Vietnam War (1956 1975).TimelineHarry S. Truman (1945–1953)Milestones of U.S. involvement under President Harry S … Wikipedia Military history of Laos — Contents 1 Early history 2 Colonial era 3 Royal Lao Army 4 References Early history Historically, Laos … Wikipedia History of Laos since 1945 — Good luck charms of Prince Phetxarāt, who many Lao believe possessed magical powers, are widely sold in Laos today For Laotian history before 1945, see History of Laos to 1945. Note: this article follows the system for transliterating Lao names… … Wikipedia Foreign policy of the United States — United States This article is part of the series: Politics and government of the United States … Wikipedia
<urn:uuid:f64d83e1-f254-4512-aa90-adc5734b2530>
CC-MAIN-2020-24
https://en.academic.ru/dic.nsf/enwiki/3003874
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347441088.63/warc/CC-MAIN-20200604125947-20200604155947-00527.warc.gz
en
0.892925
968
3.15625
3
Coding and 3D printing online course Learn how to code and 3D print with this online course. There are 30 video tutorials with teacher voice-over, teaching you how to code, and 3D print. Work at your own pace at home or at school with expert tuition. Become confident in creating designs via scratch coding for 3D print. Watch the video below to learn more. This course is designed for; - Parents or teachers who want to give their children the latest skills - Kids and beginners who want to learn to code and learn 3D printing - Anyone new to coding or 3D printing who wants to learn how to create their own models to print. An Introduction to 3D printing The 3D printing process The basics of Code Developing Coding Skills 3D printing coding challenge
<urn:uuid:51916722-af2a-42d4-9dbf-a2fb6c00e6de>
CC-MAIN-2023-23
https://www.learnbylayers.com/courses/coding-3d-printing-course/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644571.22/warc/CC-MAIN-20230528214404-20230529004404-00402.warc.gz
en
0.89019
190
3.609375
4
Aluminium metal is the most abundant in the earth’s crust but found only in combination, chiefly as an ore called bauxite. It also occurs in gemstones such as topaz, garnet, ruby and sapphire. It is found combined in over 270 different minerals. The metal is highly conductive and has great thermal properties and these properties are used for the various needs of the industries. Aluminium is silvery-white in colour. The metal is used in various industries like building and construction, power transmission lines, photoengraving plates, cookware and other consumer goods, tubes for ointments and pastes. Global production of aluminium in the year 2005 was 31.9 million tonnes. This comes after iron consumption that was 837.5 million tonnes in the same year. Pure aluminium has a low tensile strength, but if they are processed with proper heat and mechanics, they can be the strongest metal. Alloys formed with copper, zinc, magnesium, manganese and silicon are used in various industries. Aluminium metal is extensively used in transportation industry. The use in aircrafts and automobiles are well-known. A wide range of household items ranging from cooking utensils to baseball bats and watches are made of aluminium and its alloys. The consumer electronics are enclosed in the shells made of aluminium as they would not add to the weight of the equipment. Aluminium is used for making drinking cans, foil wrappings, bottle tops and foil containers that are extensively used in food and beverage industry. This is more effective as the metal is non-toxic and aromaless. Powdered aluminium is used in paint and also forms an essential ingredient of the pyrotechnics like solid rocket fuels. The combination of properties light weight and great strength makes it useful in construction industry like window, doors, street lighting poles and sailing ship masts. The highly conductive property of the metal makes it ideal to be used in electrical transmission lines for power distribution, heat sinks for electronic appliances such as transistors and CPU. About 1 kilogram of aluminium conducts almost twice as much electricity as 1 kilogram of copper. However, use of aluminium in household wiring has been found to be hazardous. Due to its ductile nature and corrosion resistance, the metal is used for electrical applications like TV aerials, satellite dishes and is the standard base for bulbs. Aluminium is a recyclable material and many products can be made from the old form. Even the silver helium balloons that are commonly seen in birthday parties are covered with a thin, evaporated coating of aluminium metal over the tough plastic. It is however, imperative to realize the fact that aluminium is a very reactive metal and in combination with some food acids may produce more harm than good. People sensitive to aluminium are prone to ulcers in the mouth, spasms of the foodpipe, gastric ulcers, slow progressive vision impairment, skin rash and itching, glandular dysfunctions or cancer.
<urn:uuid:ea16cfb9-38d2-4337-ae04-1bdc1feb339f>
CC-MAIN-2014-15
http://insulatingmaterials.org/aluminium-metal-the-highly-conductive-property/
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223205375.6/warc/CC-MAIN-20140423032005-00129-ip-10-147-4-33.ec2.internal.warc.gz
en
0.953773
611
3.109375
3
(Last Updated on : 31/01/2012) Astrology during Mughal Dynasty formed a rather important element in the decision-making process. The Ptolemic system was the accepted theory of the time. A number of convictions were followed religiously by various rulers and their entire life and administration was based on the advice of the astrologers and the soothsayers. All the events, from birth to the fighting of mighty battles to death were governed by the stars. For instance, the planetary signs prevailing at the time of birth were believed to foretell the future of a king or even a dynasty. The influence of astrology was so deeply ingrained in the Mughals that the dynasty had adopted the fish, a primordial symbol of life, as one of their emblems. The impact and importance of astrology under the various Mughal Emperors is discussed below. Astrology Under Humayun ascended to the throne in 1530, he divided all the government departments into four categories corresponding to the four elements- earth, air, fire, and water. In the latter category were placed the irrigation canals, which were so vital for the arid parts of the country that they were the concern of the sovereign. In the category of earth came agriculture and architecture; fire encompassed all military affairs and artillery; all other departments, kitchen, wardrobe, hunting animals, etc., came under the heading of air. Each day was dedicated to a planet and the activity it ruled over, and clothing had to match the astral sign. Sunday was devoted to affairs of state and the sovereign`s garments had to be golden or yellow, Monday was for pleasure and recreation and the colour was green, etc. Red signified Mars and the sovereign`s anger. Humayun sat on a throne which represented the sun, and under it was a large circular carpet with the signs of the zodiac all around. The courtiers sat at the foot of these various symbols, Jupiter, Mercury, or whatever, according to their religion or the departments they were in charge of. Humayun died a victim of his passion on Friday, 24 January 1556. He had spent the night on the terrace of his observatory in Delhi , the Sher Mandal, waiting to see the rise of Venus. On his way down he slipped on the stairs and fell, injuring his head. He died three days later. Astrology Under Akbar ascended the throne, he immediately put an end to this system and ruled in a more realistic manner. However, belief in astrology was ingrained among the Mughals, and Akbar too relied on predictions. He feared the apparition of an ancestor in his dreams, for that could be an omen of death, or the pardoning of a wrongdoer, for that would be immoral. Astrology Under Jahangir , astrology gained impetus again. He prided himself on being born under the brilliant conjunction of Mercury-Jupiter-Venus in the sign of Scorpio. He had coins struck showing the signs of the Zodiac along with the date of issue and the titles of the Emperor. These gold Mohurs were distributed from 1020 to 1030 AD. It was said that he rewarded astrologers by paying them their weight in gold. He had been very impressed by them when they correctly predicted the death of his grandmother Hamida Begum. Astrology Under Shah Jahan was said to have been born under the same signs as his ancestor Tamerlane. He was very proud of this. On his grave, alongside that of his beloved wife in the Taj Mahal , is engraved, `He was born a ruler,` However, some opposing courtiers spread the rumour that actually some opportunistic astrologers had moved the occurrence of the birth by some hours, maybe even days or months, in order to obtain this auspicious conjunction. This may explain the uncertainty over the exact date of Shah Jahan`s birth. It is said that Prince Khurram was born the same month as the Prophet and Jahangir, and in the first year of the second millennium. The court astrologers and the chronographs drawn up at the time of his birth predicted that he would attain the `the citadels of glory`. Astrology Under Aurangzeb Under Aurangzeb, astrology played a relatively moderate role, being of academic relevance to philosophy and religion and an aid to decision-making for the ruler and administrators. Aurangzeb was somewhat less inclined than some, sometimes believing in and following these practices, sometimes agreeing to the convictions of his followers, and sometimes rejecting them altogether and following a more puritanical religious doctrine. He did adopt the fish emblem when he became Emperor, but merely as a wise gesture, to follow an already accepted custom. In those days chronographs were taken very seriously. The numbers of the date of birth were taken and, using calculations similar to the esoteric methods previously mentioned, the diviners would ascertain the character, tastes, and destiny of the subject. In the absence of proper laws of succession, these predictions contributed to deciding who was to be the future Emperor. Certain days were supposed to be auspicious days to be born, especially during the months of Shawwal or Shaban, while others were considered not so fortunate. There have been various instances of the importance given to astrology during the Mughal era. Once, before the rebellion of the Rajput Prince Champet Bundhela, the Emperor Shah Jahan was advised to ride at the head of his troops, otherwise he would be defeated. The astrologers won the confidence of the Emperor when he emerged victorious and the Raja fled into the jungle. Later these same astrologers also warned him of danger. In another incident, in order to ensure the success of his expedition to conquer Qandahar in 1653, Dara Shikoh engaged Yogis to protect him. The influence and use of astrology was thus rather prominent under the Mughals. Even though there were some, like Aurangzeb, who were quite unpredictable in their attitude towards the role of astrology in the administration of Mughal Dynasty , the role of astrology was nevertheless quite important under the Mughals.
<urn:uuid:a3351027-f106-4609-9276-0d2f8db36f35>
CC-MAIN-2013-48
http://www.indianetzone.com/50/astrology_during_mughal_era.htm
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163057146/warc/CC-MAIN-20131204131737-00097-ip-10-33-133-15.ec2.internal.warc.gz
en
0.982503
1,287
3.09375
3
When is English not English? When it’s used in Japanese. You see, the Japanese language includes a plethora of English loanwords that might be sliced, diced, and reinvented to suit Japanese sensibilities and needs. Although there are a number of sources on the internet that talk about so-called Janglish or wasei-eigo, we would like to introduce a number of terms here categorized into five types. Type A: Truncated and Shortened Term The most common driving force behind Janglish is the need to shorten loanwords. Let’s take the first item in this list, ice cream, for example. Read in English, it’s only two syllables. But when transliterated into Japanese it’s Aisukurīmu (pronounced eye-sue-koo-ree-moo, for five syllables). This is what you’ll find in the dictionary. But in real life, Japanese people will often shorten this to just Aisu. Others like Apuri (for Application) are the short forms listed in the dictionary, much the way “App” has gained formal recognition in the English-speaking world. Further down the list, you will notice Kentucky Fried Chicken being shortened to Kenta (ケンタ), and McDonald’s trimmed down to Makku (マック). Although these short forms are even used by the brands themselves, what’s interesting is that there are some regional differences in how those names are shortened. For instance, people in Osaka are likely to say Makudo (マクド) for McDonald’s, and Kenchiki (ケンチキ) for KFC. * Swipe the image to view the rest of the list The Japanese tendency to shorten loan words in such a way may stem from a centuries old tradition of shortening phrases written in kanji. Take the Japanese term for United Nations. The long form is 国際連合(kokusai rengō, United Nations), but this is regularly shortened to 国連 (kokuren). And it’s official. Whereas “United Nations” can be shortened to its initials, “UN” can also stand for “University of Nebraska,” “User Network” or “Uranium Nitride.” By contrast, 国連 is unique to the United Nations. In similar fashion, 東京大学 (Tōkyō Daigaku, Univ. of Tokyo) becomes 東大 (Tōdai), and 健康診断 (kenkō shindan, health check) becomes 健診 (kenshin) with essentially no loss of resolution. Reducing スケートボード(sukētobōdo, skateboard) to スケボー (sukebō) is the same basic idea. Type B: New Term or New Meaning Some words, on their way from English to Japanese, gain new meanings. Other words are sort of made up in Japan. Perhaps using a bit of imagination you’ll be able to get from “Baby car” to “Stroller,” or from “Gasoline stand” to “Gas station.” But others are far more challenging. You’d be hard pressed to get from “Hotchkiss” to “Stapler,” from “Magic tape” to “Velcro,” or from “Pension” to “Cottage” on your own. Hotchkiss was the brand of stapler that stuck as the generic name, the way Kleenex and Xerox did in English. “Magic tape” is a colorful way of describing Velcro (which is a product name), and the etymology of “Pension” comes from pensioners who opened bed and breakfasts in their homes after retirement. Some Japan-invented words actually make sense when you think about it. Take “Plus driver” and “Minus driver,” for instance. The “Driver” here is not driving a vehicle, but a screw. Knowing that, would you be able to tell which is a flat-head and which is a Phillips head screwdriver? Did you have your aha moment? Finally, “Salaryman” is not a superhero that fights for a fixed wage, he’s just a white-collar office worker. The Clark Kent side of Superman. * Swipe the image to view the rest of the list Type AB: Shortened with New Meaning This group mixes the characteristics of the previous two. As a result, these Janglish phrases are among the most cryptic of them all. It also features a few phrases that can have multiple meanings, such as Morning (to mean either a Morning coat or a Breakfast set) and Soft (to mean either Software or Soft-serve ice cream). Although a bit tricky, the experienced translator should have no problem choosing the correct meaning based on context. Type C: Initialisms and Pseudo-initialisms Sometimes English phrases are initialized in different ways than you would expect in your home country. Some aren’t even initialisms or acronyms at all. Would you know what a Japanese person is praising if he or she says “Wow, nice BGM,” or who you might expect at the door when told “I invited OB and OG to the party”? It should also be pointed out that “OL” is the female counterpart to a “Salaryman,” not LOL with a missing L. Type D: The Mistake Then there are a few noteworthy common mistakes that Japanese people make. “Abogado” means “lawyer” in Spanish. But if you come across this in Japan it’s most likely an erroneous version of “Avocado.” Likewise, it’s not at all rare to find “Jacuzzi” winding up “Jaguzzi,” or “Simulation” being “Sumilation.” These mistakes are actually the result of Japanese speakers subconsciously “correcting” a difficult-to-pronounce sound into an easier one. To understand this phenomenon, it’s necessary to look at the katakana. アボガド(abogado) vs. アボカド(abokado). In the first one, the dakuten dots on the カ character changes “ka” into a voiced “ga” sound, like the “bo” before it and “do” after it. This is a lot easier to pronounce than a-bo(voiced)-ka(not voiced)-do. Likewise, with ジャグジー(jagujī) vs. ジャクジー(jakujī), having the voiced “j” “g” “j” sounds in a row is easier to pronounce than having the non-voiced “k” in the middle. What’s more, the Japanese word for a faucet is Jaguchi (蛇口), a false friend that the mind winds up associating with the hot tub’s name. With シュミレーション(shumirēshon) vs. シミュレーション(shimyurēshon) it’s all about familiarity. Whereas the incorrect シュミ(shumi) rolls off the tongue with ease (because there’s a common word with the same pronunciation), the correct シミュ(shimyu) takes some tongue contortions to get out. It’s not a sound that occurs natively in Japanese. So like an obnoxious auto-correct when you’re tweeting, the mind auto-adjusts to the natural sound. With all three of these examples, the mistake is so prevalent that if you are writing a Google ad, it would be a smart move to include the misspelled version in the keywords. The Janglish listed in this blog post is not exhaustive. There are more, and they’re growing and evolving each day. Some are legit words you’ll find in a Japanese dictionary, while others are more slangy. When translating, these Janglish terms post a double threat. First, the translator or MT engine obviously needs to know them. But the real threat is more hidden. Translating Manshon as “mansion,” Hāfu as “half” or Panku as “punk” might be embarrassingly wrong because of the unique meanings given to them in Japanese. Understanding these potential pitfalls is key to effective Japanese-to-English or English-to-Japanese localization.
<urn:uuid:bdfd4892-d42e-4f6a-b517-6527ff77269b>
CC-MAIN-2023-23
https://www.crestecusa.com/blog/breaking-down-janglish-japans-unique-take-on-the-english-language/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224645089.3/warc/CC-MAIN-20230530032334-20230530062334-00598.warc.gz
en
0.92759
1,925
3.484375
3
In episode 56, Teru Clavel—author, speaker, and global mom—joins us for a discussion about world-class education for kids and the role that technology plays in the classroom. Together, we discuss the difference between learning with and without computers, tablets, and other forms of technology, and how that affects kids’ retention rates. Teru Clavel’s upcoming book World Class out August 20th, is a mix of a memoir, research, and takeaways. In this book, she takes us on the journey of raising her kids in 3 different countries. She explains how every education system (and it’s technology use) is very different based on its history and culture. What’s most important is that we all learn from one another, and grow in ways that will benefit kids in the school system. Some Questions I Ask: - What have you learned from kids around the world? (4:48) - How do cultures around the world handle kids’ use of technology? (9:51) - How is technology introduced to children in schools? (11:41) - What can teachers do at school to help with technology use in the classroom? (30:11) - What key things have you learned from your experiences around the world? (37:54) What You’ll Learn: - What strategies help mindfully separate your work-life from your home-life. (0:54) - Examples of how culture affects education systems around the world. (5:38) - What the US could learn from other countries. (15:01) - What “personalized learning” really means in the classroom. (18:10) - About the correlation between children’s technology use, learning outcomes, and overall development. (21:47) - How using technology to learn impacts long-term retention. (36:44)
<urn:uuid:fa9abcc2-3836-4580-924b-dd5d06ea1443>
CC-MAIN-2020-05
https://technologyformindfulness.com/podcast/56-with-teru-clavel/
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250628549.43/warc/CC-MAIN-20200125011232-20200125040232-00126.warc.gz
en
0.943389
404
3.03125
3
- Diseases, Disorders & Conditions What Is Strabismus and How Do You Cope? Since I can remember, I've been using my strabismus (or wandering eye) to my advantage by entertaining people with a demonstration of my condition. Reactions range from, "oh that's so cool," to "eek, please stop, you're freaking me out!" I am fortunate that my condition has not significantly affected my eyesight and is intermittent (more on that later), but for some, the diagnosis can mean permanent sight loss in one eye or permanent misalignment of the eyes. This hub will explain what exactly strabismus is and how to cope if you think your child or another loved one has the condition. What is Strabismus? Strabismus is a misalignment of the eyes in which one eye looks in one direction (usually straight ahead) while the other eye looks in another direction. The misalignment can be constant or intermittent (can switch or alternate between the eyes) as in my case where I can swap which eye is turning out and which is staying straight. The four main types of strabismus are esotropia (eye turns inward or crossed eyes), extropia (eye turns outward; this is what I have), hypertropia (eye turns upward), and hypotropia (eye turns downward). This common eye condition affects approximately 4 percent of the U.S. population, generally in children but can develop later in adulthood or as a result of an accident or other health condition. If left untreated or undiagnosed, a person can lose vision as a result of amblyropia, which is when vision doesn't develop normally (in childhood) because the brain and eye are not properly working together. Amblyropia generally develops in children with one weaker eye (sometimes called "lazy eye") with decreased vision causing the brain to eventually ignore the weaker eye because it is not receiving normal stimulation from it, favoring the stronger eye. If amblyropia is not caught and treated early on, the weaker eye can lose sight altogether. Convergence insufficiency is also related to strabismus, often with an intermittent extropic misalignment. This condition is specifically the misalignment of eyes when focusing on a near object (for example, when reading). As in my case, intermittent extropia can be present when focusing at near or distance with convergence weakness and be well controlled, but primarily the misalignment is spontaneous and uncontrolled when focusing on close objects. Causes and Symptoms of Strabismus Strabismus results when the six external eye muscles (extraocular muscles) that control eye movement and position are uncoordinated or no longer work together. The interruption in coordination can be from neurological or anatomical problems, such as problems with the muscles themselves or problems with nerves or vision centers in the brain. Strabismus can also result from conditions like thyroid eye disease, cerebral palsy, Duane syndrome, Moebius syndrome, cataracts, or neurological and muscular abnormalities. Children of parents with strabismus also have a greater risk of developing the condition. There is still a lot unknown about the causes of strabismus and the most common type is idiopathic strabismus (arising spontaneously or from an unknown cause). Strabismus is easy to spot because the misalignment of the eyes is usually obvious; however, small-angle strabismus (when the turn of the eye is less visible) has symptoms such as fatigue when reading, having a hard time reading, squinting or tilting the head, and unstable or jittery vision. It is common an infant's eyes to occasionally wander as their eyes haven't always completely aligned, but if it is happening often or the eyes cross inward, contact an optometrist or ophthalmologist for an eye exam. Convergence insufficiency has similar symptoms like squinting or having a hard time reading, but it also can include headaches, blurred vision, double vision, sleepiness, sore eyes, and difficulty concentrating. Because people with convergence insufficiency can have normal, 20-20 vision, the condition is frequently unnoticed in routine exams. Often this condition is diagnosed after evaluations for learning disabilities due to reading problems. Treatment for Strabismus Treatment for strabismus includes surgery or non-surgical treatments like vision therapy. Surgery is generally the most effective treatment for constant misalignment, but an ophthalmologist specializing in strabismus can determine if that is the best course of treatment. During surgery, eye muscles are detached and then reattached in the proper place to realign the eyes. Depending on the severity of the misalignment, more than one surgery may be necessary. Generally surgery recovery is quick and children are able to get back to normal kid activities within a few days. For more mild forms of strabismus (intermittent and small-angle strabismus), non-surgical treatments such as eyeglasses, patches, and vision therapy. Patching works by placing a patch over the stronger or normally functioning eye for a few hours a day to make the brain pay attention to both eyes rather than just the stronger one. Vision therapy includes several types of exercises or activities prescribed by a doctor such as use of prisms, filters, computerized activities, "pencil pushups," and metronomes. Pencil pushups are when you focus on the small print on a pencil held at arm's length and then slowly move the pencil closer, while still focusing on the print, until coming close or in contact with the nose. This was the only treatment I ever used or needed when I was a child. Rather than using a pencil, I actually used a She-Ra doll, which was far more entertaining. Pencil pushups are often recommended for convergence insufficiency and are most effective when performed at home as well as at supervised doctor visits. Another rare treatment option is Botox injections. According to Children's Hospital in Boston, there are a few places in the country that will use Botox rather than surgery or if surgery has not worked. Complications with Strabismus Other than potential amblyopia mentioned previously, complications from strabismus include diplopia (double vision), attention deficit hyperactivity disorder (ADHD), learning disabilities, problems socializing, increased risk for myopia (nearsightedness), and possible increased risk of mental illnesses. Two studies done by the Mayo Clinic showed an increased risk of mental illness in children with extropia (3.1 times more likely) and congenital esotropia (2.6 times more likely) than the controls (children included in the study with no strabismus diagnosis). The first study, published in 2008, studied children in Olmsted County, Minnesota for a 10-year period. It concluded that children with intermittent exotropia and convergence insufficiency were 3.1 times more likely to develop mental illnesses, such as schizophrenia (particularly with a family history of the illness), depression, adjustment disorder, and eating disorders. The second study, published in 2012, retroactively studied a group of children also in Olmsted County for a 30-year period and found children with congenital esotropia were 2.6 times more likely to develop mental illnesses similar to exotropia patients (except for schizophrenia). Both studies admit there are limitations to the findings of the studies, for example only studying a single geographic area and a homogenous population (Olmsted County was almost 96 percent white at the time of the studies). More studies will need to be done to find out if the findings are due to environmental factors, hereditary factors, or in fact the condition. Living with Strabismus If caught early on, a child with strabismus can lead a relatively normal life. While I can't speak to more severe cases, I can say that my education and work has been minimally affected by my condition. I do have reading glasses to help with eye strain when reading or staring into a computer for long periods, but I am otherwise not inhibited. My eyes do fatigue more easily than most, but I find it is mostly when reading or staring at a screen close up, rather than every day looking around. I also suffer from migraines, but thankfully I get far fewer in my adulthood than I did as a child. I'm not sure if there is any correlation between strabismus and migraines or if some of my more minor headaches are from strabismus. I am also sensitive to light (common among red heads with pale eyes), which can often trigger a migraine and/or eye strain (because I have to squint a lot) resulting in my eye wandering more frequently.
<urn:uuid:e1a6a13c-6bc7-4499-96d9-b69db2d87bb7>
CC-MAIN-2017-34
https://hubpages.com/health/What-Is-Strabismus-and-How-Do-You-Cope
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886112533.84/warc/CC-MAIN-20170822162608-20170822182608-00320.warc.gz
en
0.94711
1,827
3.234375
3
A spinning neutron star is tied to a mysterious tail - or so it seems. Astronomers using NASA's Chandra X-ray Observatory have found that this pulsar, known as PSR J0357+3205 (or PSR J0357 for short), apparently has a long, X-ray bright tail streaming away from it. This composite image shows Chandra data in blue and Digitized Sky Survey data in yellow. The position of the pulsar at the upper right end of the tail is seen by mousing over the image. The two bright sources lying near the lower left end of the tail are both thought to be unrelated background objects located outside our galaxy. PSR J0357 was originally discovered by the Fermi Gamma Ray Space Telescope in 2009. Astronomers calculate that the pulsar lies about 1,600 light years from Earth and is about half a million years old, which makes it roughly middle-aged for this type of object. If the tail is at the same distance as the pulsar then it stretches for 4.2 light years in length. This would make it one of the the longest X-ray tails ever associated with a so-called "rotation- powered" pulsar, a class of pulsar that get its power from the energy lost as the rotation of the pulsar slows down. (Other types of pulsars include those driven by strong magnetic fields and still others that are powered by material falling onto the neutron star.) The Chandra data indicate that the X-ray tail may be produced by emission from energetic particles in a pulsar wind, with the particles produced by the pulsar spiraling around magnetic field lines. Other X- ray tails around pulsars have been interpreted as bow-shocks generated by the supersonic motion of pulsars through space, with the wind trailing behind as its particles are swept back by the pulsar's interaction with the interstellar gas it encounters. However, this bow-shock interpretation may or may not be correct for PSR J0357, with several issues that need to be explained. For example, the Fermi data show that PSR J0357 is losing a very small amount of energy as its spin slows down with time. This energy loss is important, because it is converted into radiation and powering a particle wind from the pulsar. This places limits on the amount of energy that particles in the wind can attain, and so might not account for the quantity of X-rays seen by Chandra in the tail. Another challenge to this explanation is that other pulsars with bow- shocks show bright X-ray emission surrounding the pulsar, and this is not seen for PSR J0357. Also, the brightest portion of the tail is well away from the pulsar and this differs from what has been seen for other pulsars with bow-shocks. Further observations with Chandra could help test this bow-shock interpretation. If the pulsar is seen moving in the opposite direction from that of the tail, this would support the bow-shock idea. These results were published in the June 1st, 2011 issue of The Astrophysical Journal. The first author is Andrea De Luca of Institute of Advanced Study in Pavia, Italy (IUSS), the National Institute of Nuclear Physics (INFN) in Rome, and the National Institute for Astrophysics (INAF) in Milano. The co-authors are M. Marelli of INAF, Milano and the University of Insubria in Italy; R. Mignani of University College London, UK and University of Zielona Gora, Poland; P. Caraveo of INAF, Milano; W. Hummel of ESO, Germany; S. Collins and A. Shearer of National University of Ireland; P. Saz Parkinson of University of California at Santa Cruz; A. Belfiore of University of California at Santa Cruz and University of Pavia; and, G. Bignami of IUSS, Pavia and INAF, Milano.
<urn:uuid:86f11ed0-153f-4ef4-b12f-ba3cf3b206d6>
CC-MAIN-2023-40
https://xrtpub.harvard.edu/photo/2011/psrj0357/index.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511351.18/warc/CC-MAIN-20231004020329-20231004050329-00126.warc.gz
en
0.943102
830
3.53125
4
Sometimes it pays to dig in your parent’s basement when you’re home for the holidays. The final drill for the 2021 season comes to you from The Coach’s Collection of Field Hockey Drills published in 1982 and edited by Donna Fong! We’ve adapted a great small-sided attacking drill created by Judith Davidson for you to try at your next #ThrowbackThursday practice. Objective: For attack — to cross the opposite line by utilizing give-and-gos with the sideline passing options. For defense — to dispossess attacker and cross the opposite line with the ball. - Create a dribbling grid 15-25 yards long and 10-15 yards wide with two passing lanes outside of the grid - Place two ball piles at either end of the grid - Split team into two lines on either end of the grid with two passers (P) in the passing lanes - Player A starts with the ball, passes to Player B who is 5 yards away - Player B passes back to Player A to start the 1v1 - Player A and Player B play a 1v1 within the grid, Player A can utilize either passer (P) to create a give-and-go - Player A works to cross the opposite line with the ball, under control - Passers cannot enter the grid and cannot dribble the ball - As soon as Player A successfully crosses the line, Player C starts the next ball with Player D playing defense - If Player B comes up with the ball, they automatically become the attacker and work to cross the opposite line, they may also use the passers in give-and-gos, once Player B successfully crosses the line, Player D starts the next ball with Player C playing defense Points of Emphasis: - For defenders — approaching the ball in the line of one pass, marking the attacker to intercept the go pass (of the give-and-go) - For attackers — playing fast and creating space to receive the go pass, attacking on angles, reading the stick of the defender - For passers — positioning themselves to be available for a pass, giving the ball quickly after reception - If you have a large team, create several grids so that everyone gets a lot of repetitions - For beginners, make it directional (players only attack from Player A’s side) rather than continuous to focus on 1v1 skills and give-and-go opportunities
<urn:uuid:eb82082f-d1fd-403b-9a2f-eb535382d307>
CC-MAIN-2023-14
https://nfhca.org/drill_of_the_week/more-than-one-way/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948708.2/warc/CC-MAIN-20230327220742-20230328010742-00607.warc.gz
en
0.933259
518
2.65625
3
- Study Abroad - About Us Conservation Biology is run concurrently with the two ecology and conservation courses (terrestrial and marine) and integrates conservation theory and practice across all the ecosystems we visit. Course activities focus on human impacts, threats, conservation problems and management solutions within the biological, ecological and social context of each site. The goal is to address first-hand the complex and interdisciplinary nature of conservation in practice, and teach students how to devise creative solutions to environmental problems. Theoretical topics covered during this course include population biology, conservation genetics, landscape ecology, island biogeography, habitat fragmentation and climate change. We also cover topics in applied conservation and environmental economics, such as population monitoring, reserve design and management, in-situ and ex-situ conservation, community-based resource management, ecotourism, agroforestry and alternative/sustainable production systems, and market-based approaches such as carbon credits and ecosystem service payments. Students have the opportunity to learn methods of biological and social assessment for conservation planning, and design their own conservation and resource management plan for the projects we visit. This course uniquely bridges conservation science and practice in real-life settings to build skills for careers in conservation
<urn:uuid:5ab13b90-0858-4e79-aa63-f43d1cfa10b3>
CC-MAIN-2020-10
https://ceiba.org/study-abroad/tropical-conservation-semester/tcs-courses/tcs-conservation-biology/
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145774.75/warc/CC-MAIN-20200223123852-20200223153852-00464.warc.gz
en
0.913177
249
2.765625
3
I was back down at the future river park on South Reinway Avenue, where the bluff overlooks the Tuolumne River. I've seen more than twenty species of birds in my few trips so far, and added two more today. But every time I've been down there, I've seen a Northern Flicker (Colaptes auratus). Today there were two of them, a male and female. The males have the red cheek spots, and the females don't. I didn't see them interacting, as they were on opposite ends of the park property. The Flickers are woodpeckers, but they don't search for much of their food in trees. They mostly consume ants and other insects on the ground (note the behavior in this previous post). They will peck at the ground in the way other woodpeckers peck at trees. Like many other birds in North America, the Flickers, while still common, are in steep decline, due for the most part to habitat loss. There are approximately half as many as there were fifty years ago. The Northern Flickers are beautiful colorful birds. I was pleased to be finally getting some sharper photos of them. There's a Downy Woodpecker lurking in the vicinity that I would like to catch next time.
<urn:uuid:3e1057c4-a666-479f-83db-777ed4996d1b>
CC-MAIN-2017-34
https://geotripperbirds.blogspot.com/2015/02/northern-flicker-on-tuolumne-river.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886118195.43/warc/CC-MAIN-20170823094122-20170823114122-00008.warc.gz
en
0.987189
267
2.53125
3
Chronic inflammation is a major factor in a wide range of problems from arthritis to cardiovascular disease, and DHA (found in fish oil) is known to temper this problem. A new research report appearing in the July 2013 issue of The FASEB Journal, helps explain why DHA is important in reducing inflammation, and provides an important lead to finding new drugs that will help bring people back to optimal health. Specifically, researchers found that macrophages (a type of white blood cell) use DHA to produce "maresins," which serve as the "switch" that turns inflammation off and switches on resolution. "We hope that the results from this study will enable investigators to test the relevance of the maresin pathway in human disease," said Charles N. Serhan, Ph.D., a researcher involved in the work from the Brigham & Women's Hospital and Harvard Medical School in Boston, Mass. "Moreover, we hope to better understand resolution biology and its potential pharmacology so that we can enhance our ability to control unwanted inflammation and improve the quality of life." To make this discovery, Serhan and colleagues deconstructed the biosynthetic pathway for maresin biosynthesis and found that human macrophages are responsible for converting DHA to the novel epoxide intermediate "13S, 14S-epoxy-maresin." Then, they learned how to synthesize the molecule and found that maresins caused macrophages to change their "type" so they no longer caused inflammation (switching them from M1 to M2 phenotypes). "We've known for a long time that DHA tames inflammation, now, we learn exactly how DHA works: via new substances called maresins," said Gerald Weissmann, M.D., Editor-in-Chief of The FASEB Journal. "We encounter inflammation almost daily, but our body has ways of turning it off. This is an important step toward understanding exactly this happens. You're likely to be hearing a lot more about maresins if, or when, new therapies arise from this discovery." Materials provided by Federation of American Societies for Experimental Biology. Note: Content may be edited for style and length. Cite This Page:
<urn:uuid:937acb1a-1a3a-4eea-b0dc-c8f90508b973>
CC-MAIN-2023-40
https://www.sciencedaily.com/releases/2013/07/130701135442.htm
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511351.18/warc/CC-MAIN-20231004020329-20231004050329-00420.warc.gz
en
0.940574
462
2.875
3
If your website is not accessible to people with disabilities, then it is not compliant with the law. With ADA-related lawsuits continuing to rise every year, it is more important now than ever to familiarize yourself with ADA guidelines and find out if your website violates them. Even if these violations are completely unintentional, website owners will still be held completely liable. As a result, non-compliant websites risk hefty fines, lawsuits, potential settlements, and damage to their brand reputation. Unfortunately, many websites today have accessibility barriers that prevent people with disabilities from effectively using their website and services. What are the most common accessibility violations cited in ADA-related lawsuits? Common Website Accessibility (ADA) Violations Low Contrast Text Your website’s color contrast matters. In fact, low contrast text is actually the most common accessibility issue, and it is frequently mentioned in website accessibility lawsuits. An example of low contrast would be light-gray text overlaid on a light-colored background. Low color contrast can make it very difficult for people with visual impairments to differentiate words from images, graphics, or backgrounds. As a result, web users with color blindness or low vision rely on sufficient color contrast in order to read text. The same reasoning applies to small, unreadable font sizes. Missing Image Alt. Tags People with eyesight-related disabilities rely heavily on screen readers to dictate webpage content aloud to them, including images. Since assistive technology like screen readers cannot yet scan and describe images to users on its own, websites must provide written text to describe the image. Missing alternative text is another common ADA violation that has been cited in many digital accessibility lawsuits. Image alternative text (also known as, alt. text or alt. tags) provide a written description of visual content. Alt. text is essential for blind or vision-impaired individuals because it describes the appearance and function of an image they cannot see. These descriptions are then read aloud to blind or vision-impaired individuals via a screen reader. Not everyone can use a computer mouse or see a cursor on the screen. As a result, users with motor impairments or visual impairments opt for keyboard navigation or voice-controlled navigation to effectively browse a website. Consequently, to comply with ADA guidelines, a website must be fully operable with a keyboard alone. The Department of Justice (DOJ) specifically cites “mouse-only” navigation as a major accessibility concern on its ADA Guidance page. Forms are a great way to encourage people to interact with your website. They’re also commonplace online and necessary to carry out everyday activities, such as online shopping or filling out a job application. However, people with visual disabilities may not be able to fill out, understand, or submit a form on your website without clear instructions, labels that screen readers can read aloud, and error indicators. As a result, forms missing labels and forms that use color-based error indicators are not ADA-friendly. Without labeled form elements, users don’t know what they are navigating to or what kind of response the form is expecting. As a result, visually-impaired users may not be able to fill out their credit card or delivery information to complete a transaction, barring them from using a business’s services. Is Your Website Inaccessible? What’s the Solution? By making a good-faith effort to achieve reasonable accessibility for people with disabilities, businesses can avoid potential fines, lawsuits, and losing valued customers. Ensuring that individuals with visual, hearing, motor, or cognitive impairments can effectively use your website may sound overwhelming and complicated—but there is a fully-compliant solution all businesses can easily integrate onto their website. AI-Powered Accessibility Widget Sun Sign Designs offers the digital accessibility solutions needed for your website to meet ADA Compliance. There’s no need to overhaul your website and rewrite code—we will seamlessly integrate our AI-powered accessibility widget onto your website, so your business can remain accessible to all individuals. We offer an easy, secure compliance solution that doesn’t require reworking your entire site.
<urn:uuid:21142be9-32ba-4207-ba36-9b3ff15b5d35>
CC-MAIN-2023-40
https://www.sunsigndesigns.com/ada/the-most-common-website-accessibility-ada-violations/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511002.91/warc/CC-MAIN-20231002164819-20231002194819-00147.warc.gz
en
0.919116
857
2.546875
3
Millennials know one thing: a life with access to social media. In today’s world, college students are connected on a level that no prior generation could compete. This affects almost every aspect of their lives. According to a report from UCLA’s annual survey, today’s college students are spending less time partying than those in the past. Instead, they are interacting more often through social media. The Atlantic reported in 2014 that the research found 18 percent, compared to the 37.9 percent in 1987, of incoming freshmen socialized at least 16 hours per week, and 38.8 percent socialized five hours or less, when in 1987 it was 18.1 percent. The survey shows that college students are spending less time with friends, or partying, and more time on social media. “When I was coming up, we didn’t have all the social media constantly in front of us, with different things to distract us,” Director of the Plattsburgh State Center for Diversity, Pluralism and Inclusion J.W Wiley said. He also teaches a class called “Examining the Dimensions of Cool,” which focuses on the aspects of culture that influence what young people consider “cool.” Wiley said social media has impacted our society on “profound levels,” and that when he scrolls his newsfeeds, he always finds something that jumps out at him that he is interested in reading. “It has really changed the game,” said Wiley. “I could almost argue that students in some majors have more time to play because they don’t have to go to the library to do research in that there are so many ways to find it now.” Reported by The Atlantic, lead author of the study, Kevin Eagan, said they found that students are now going to college for different reasons than generations in the past. “Years ago, it may have been wanting to become a cultured person and having a fulfilling social life that motivated students,” Eagan said. “Now we’re seeing more concerns from them about finance while enrolled in college and getting a high-paying job after graduating.” Social media use has been on the rise since the technology became available, and now students have complete access and connection to people near and far, something that could be called a social life to Millennials. Wiley said on a college campus, where everyone is connected, if you go out, you never know who is watching. Someone could even be recording you, even without your knowledge, and it could end up on social media, again without your knowledge. “There is a heightened level of paranoia that didn’t exist 20 to 30 years ago,” he said, “which makes some students more cautious and methodical.” He said that could be a factor for students spending less time partying and having less face-to-face interaction when analyzing this study. Senior psychology major Sarah Randall said people go out to hang out with their friends and to be a part of something. “I don’t think people go out less,” Randall said. “I don’t think people should care about what other people think.” Both in person and on social media, people have the power to say whatever they are feeling, which could be beneficial or not. “I think it would be wise for students to seek out interests, to grow and expand through social media,” Wiley said. “The beauty of social media are all of the connections you can make and maintain. Without social media, those relationships go away.” Email Lisa Scivolette at email@example.com
<urn:uuid:dcb5171a-eebe-4753-b10c-d10c9720ef5d>
CC-MAIN-2023-14
http://cardinalpointsonline.com/some-students-partying-less-often/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950030.57/warc/CC-MAIN-20230401125552-20230401155552-00253.warc.gz
en
0.973498
792
2.5625
3
Mladic earned the nickname the “Butcher of Bosnia” for his part in authorizing a record-breaking siege and the largest mass murder since World War II. He is currently on trial for genocide. In 1992, Bosnia and Herzegovina separated and declared their independence from Yugoslavia. The Serbs, however, wanted to create a new Serbian state that would include land that the two countries claimed. Under Mladic’s command, Serbian forces surrounded the capital city of Sarajevo and laid waste to it with amounts of artillery that the newly independent countries could not match. According to census records, Sarajevo had a population of 525,980 before the siege. By the end of the four-year conflict, almost 100,000 of those people were gone. About 12,000 people were killed — including more than 1,000 children — and more than 50,000 people were injured. Serbian forces used snipers, mass killings, and hundreds of missile attacks a day to try and break the city. In July of 1995, Mladic oversaw the Srebrenica Massacre. During the massacre, more than 8,000 Bosnian Muslims were killed. Thousands of others were held in deplorable POW camps, raped and tortured — often in front of peacekeeping soldiers, who many times did nothing to stop it.
<urn:uuid:d1c8bde2-283a-412d-a292-84cfb6087a67>
CC-MAIN-2013-48
http://uptownmagazine.com/2012/06/the-most-egregious-war-criminals-of-all-time/3/
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1387345776439/warc/CC-MAIN-20131218054936-00044-ip-10-33-133-15.ec2.internal.warc.gz
en
0.981986
275
3.296875
3
"the Russians, thought Dostoevsky, would set the basis for “the universal reconciliation of peoples” and the “renewal of men upon Christ’s true principles” Philosopher Nikolai Lossky (1870-1965) outlines Fyodor Dostoevsky’s vision of Russia’s transcendent mission – to bring the world to the God-Man Christ, Whose fullest expression is found in the ancient faith upheld by Byzantium and adopted by Grand Prince Vladimir in 988. Salvation comes from the East. Translated by Mark Hackard. Knowing the deep religious basis of the Russian spirit, Dostoevsky, despite all the shortcomings of the people, believed that it stood to the Russians to carry out a great mission in Europe. He saw “the essence of Russia’s calling” in “revealing to the world the unknown Russian Christ, Whose principle lies in our native Orthodoxy” (Letter to Strakhov, 1869, No. 325). In view of the breadth of the Russian mind and character, Dostoevsky was confident that the Christian spirit would be expressed in the ability to develop a synthesis of opposing ideas and aspirations that divide the peoples of Europe, whence would be achieved not only theoretical but practical reconciliation of all disputes. It is remarkable that this ability and passion of the Russian mind for all-encompassing synthesis was noted long before Dostoevsky, as B. Yakovenko shows in his History of Russian Philosophy, by many Russian writers, such as Prince V.F. Odoevsky, Belinsky, Kireevsky, and Shevyrev.[i] In the 1861 magazine Vremya, Dostoevsky wrote that the basic aspiration of Russians was “universal, spiritual reconciliation.” “The Russian idea with time will become the synthesis of all those ideas that Europe for so long and with such persistence produced in its individual nationalities.” Western peoples seek to “find a universal human ideal in themselves and by their own powers, and therefore they altogether harm themselves and their cause.” “The idea of universal humanity ever more wears away between them. Among each of them it takes a different type, dulls, and assumes in consciousness a new form. The Christian bond that up to this time united them loses strength with every day.” To the contrary, in the Russian character, “the capability for high synthesis, a gift for universal reconcilability and humanity is predominant.” “He gets along with everyone and is accustomed to all. He sympathizes with all that is human regardless of nationality, blood, and soil. He finds and immediately allows for reasonableness in all, if only there is to be some universal human interest.” “This is why Europeans completely do not understand Russians, and the greatest feature of their character they have called impersonality” (Ibid, III). In the work of Russia’s greatest poet, Pushkin, this “Russian ideal – integrality, universal reconcilability, and humanity” was incarnated (Ibid, V). Namely the Russians, thought Dostoevsky, would set the basis for “the universal reconciliation of peoples” and the “renewal of men upon Christ’s true principles” (Diary of a Writer, 1876, June). The Eastern ideal, i.e. the ideal of Russian Orthodoxy, is first the spiritual unity of humanity in Christ, and then, by virtue of this spiritual uniting of all in Christ, surely the proper sovereign and social unification” (Diary of a Writer, 1877, May-June). Such an ideal is the application of Khomyakov’s formulated principle of catholicity [sobornost] not only to the order of the Church, but also to the sovereign order, the economic system, and even to the international organization of humanity. The Pushkin Speech that Dostoevsky delivered on June 8th, 1880, in Moscow was a supreme expression of his conviction that “Russian populism’s force of spirit” was the “its drive toward universality and universal humanity as a final goal.” Concerning the interior order of the Russian body politic, here Dostoevsky also saw something akin to catholicity, pointing to the democratic ethos of all classes of Russian society. “Honesty, selflessness, directness, and the openness of a democratic ethos in the majority of Russian society are not subject to any doubt,” says Dostoevsky. In Europe, this ethos “up to this time announced itself everywhere only from below and is still barely fighting, while the vanquished (supposedly) upper classes still put forth terrible resistance. Our upper class was not vanquished; our upper class itself became democratic, or more accurately, of the people.” Therefore, in Russia “temporary adversities of the demos will be improved under the tireless and constant influence henceforth of such tremendous elements (for to call them otherwise is impossible) such as the universal democratic temperament and general agreement with this of all Russians, starting from the very top” (Diary of a Writer, 1876, May). In the chapter “Dostoevsky’s Religious Life,” I posed the question whether Orthodoxy was for Dostoevsky a value in itself or only a means necessary for Russian political life. The answer given was the following: loving the Russian people, Dostoevsky began to look into what was dear to them and how their virtues were expressed; through this he discovered the inherent value of Russian Orthodoxy. The current chapter on the character of the Russian people should serve as a final confirmation of the notion that division of means and ends doesn’t have any meaning here: love for the Russian people and love for Russian Orthodoxy composed in Dostoevsky’s soul an organic unity, the two sides of which support and substantiate each other. The course of Russian history seemingly disproves Dostoevsky’s conviction that the Christian spirit is the expression of the Russian people’s essence. Namely the Russian people enacted the most savage anti-Christian and principally atheist revolution. In answer to this apprehension it is worth reminding that revolution is a transitory condition of society. The Great French Revolution, despite brutal persecutions of the Catholic Church, did not destroy Catholicism in France. According to information from Russia, the Bolsheviks themselves admit that the Russian people’s religiosity is strong to this day. We can hope that after severe trials, Russian Orthodoxy will not perish, but will rather ascend to an even higher stage of consciousness and spiritual purity. Then shall the words of Elder Zosima be fulfilled, even if not in the way that Dostoevsky hoped: The people shall meet the atheist and overcome him, and Orthodox Rus shall be as one. [i] Б. Яковенко. «Dejinyruske filosofie», pg. 17. This website is how the Gleason family and the Silva family earn a living. Maintaining this website is a full time job, and this is how they feed their families. Both families now live in Russia, and they appreciate your support.
<urn:uuid:8032e2e2-4946-4a62-a9d5-c5263f475450>
CC-MAIN-2020-16
https://russian-faith.com/philosophy/dostoevsky-russia%E2%80%99s-mission-bring-salvation-world-n1385
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370494331.42/warc/CC-MAIN-20200329105248-20200329135248-00131.warc.gz
en
0.952279
1,548
2.5625
3
These tests can be used to accompany the Support for Basic Science series as the contents of both series are identical or as a separate means of providing SATs-style science practice test questions. Each unit contains 3 books A, B and C which are at different levels of the National Curriculum to facilitate work with pupils of varying ability. Unit 1: Life processes and living things Book 1A (Level 1) Book 1B (Level 2) Book 1C (Level 3) Unit 2: Materials and their properties Book 2A (Level 1) Book 2B (Level 2) Book 2C (Level 3) Unit 3: Physical processes Book 3A (Level 1) Book 3B (Level 2) Book 3C (Level 3) Unit 4: Extra activities for KS 3 Book 4A (Level 1) Book 4B (Level 2) Book 4C (Level 3)
<urn:uuid:18872e3f-6d8d-4ea4-b997-6eee711f89c5>
CC-MAIN-2020-24
http://www.learningmaterials.co.uk/8209-Tests-for-Basic-Science-Book-3C
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347385193.5/warc/CC-MAIN-20200524210325-20200525000325-00161.warc.gz
en
0.874555
188
3.859375
4
1918. A committee petitioned the state to erect a graveside monument of Roane. Will Hackney, left, and Mathew Russell, 4th from left, are buried in Pleasant Forest. Archibald Roane is without doubt the most famous burial at Pleasant Forest. His life was one of public service and family while serving as the second governor of Tennessee. The Archibald Roane monument weighed 13 tons and was made out of Blue Winnsboro Granite Archibald Roane, second governor of Tennessee, was born in 1760 in Lancaster County, Pennsylvania. He became a lawyer and served with distinction in the Continental Army during the Revolution. Roane arrived in Tennessee in 1788 in the aftermath of the Franklin movement and prior to the creation of the Southwest Territory. He settled first in Jonesborough and established a law practice there before moving to Jefferson County. Roane's professional skills soon attracted the attention of Territorial Governor William Blount, who appointed him attorney general for the Washington District and confirmed his position as one of Blount's protégés. Roane enhanced his reputation when he became the tutor of Hugh Lawson White, son of the founder of Knoxville and a future presidential candidate. In 1796 Roane was selected as a delegate from Jefferson County to the Tennessee constitutional convention. Roane became one of the first three judges of the Superior Courts of Law and Equity. In 1801, when John Sevier retired after his constitutional three terms in office, Roane was the nearly unanimous choice to replace him as governor--his opponent received fewer than a dozen votes statewide. During Roane's administration, Tennessee expanded to three congressional districts, but his term of office is generally remembered more for factional confrontation and controversy than for growth. The first controversy centered on the vacant position of major general of the state militia. An election among the field officers to fill the position resulted in a tie, and Roane, as governor, was required by law to break the deadlock. The two candidates, John Sevier and Andrew Jackson, were well placed, ambitious, and unwilling to concede the highest military position in the state. Roane eventually gave the appointment to Jackson, a decision that surprised few, given the close friendship between the two men. Sevier believed his past military record made him the more qualified candidate, though, and his feud with Jackson escalated sharply. More importantly, Roane's support for Jackson prompted Sevier to seek reelection as governor in 1803. In an attempt to assist Roane in his campaign against the popular Sevier, Jackson provided information which implicated the former governor in a series of land fraud schemes dating back to 1795. The evidence was embarrassing for Sevier but inconclusive to voters; Sevier won the election easily. Following his defeat, Roane returned to his law practice until 1811, when he was elected as Circuit Judge. In 1815 he was elected as judge of the Superior Court of Errors and Appeals. He held that position until his death on January 18, 1819. Roane County is named in his honor. Archibald Roane may have been responsible for one of the most unusual duels ever fought. When he selected Andrew Jackson over John Sevier as State Militia Major General. Governor Roane solidified the hatred Sevier and Jackson had for one another...ultimately resulting in a duel.....of sorts. As Middle Tennessee grew in size, a rift developed between Nashville and Knoxville. This was personified by a feud between Jackson and Sevier. Jackson had wanted the post of major general of the state militia, but had lost to a candidate favored by Sevier. Then Jackson tried for the post again in 1802. This time his opposition was Sevier himself. Governor Archibald Roane broke a tied vote in favor of Jackson. When Roane was up for reelection, he was challenged by Sevier. Despite being accused of land fraud by both Roane and Jackson, Sevier won. The hard feelings between Sevier and Jackson led to a verbal argument between the two that resulted in a duel in 1803 near Kingston. There Sevier and Jackson shouted insults at each other, but fired no shots. Wagon used in Roane inaugural parade. Archibald Roane was born in Derry Township, Pennsylvania, then a part of Lancaster County. He was the son of Andrew and Margaret Walker Roane. Andrew Roane, who was born in Ireland, was one of four sons of Archibald Gilbert Roane, a Scotsman who had been awarded land in Ireland in return for his British military service. All of the sons of Archibald Gilbert Roane emigrated to America. After Andrew and Margaret Roane both died when young Archibald Roane was about eight years old, he was raised by an uncle, John Roane, Presbyterian minister, who provided him with a good education. During the Revolutionary War, Archibald Roane served in the Continental Army as a member of the Lancaster County Militia (5th Company, 9th Battalion, Pennsylvania Volunteers). He was among the troops who took part in Washington's crossing of the Deleware River and the subsequent Battle of Trenton in December 1776, and was present at the surrender of Yorktown in 1781. In the 1780s he settled for a time in vicinity of Lexington, Rockbridge County, Virginia, where he studied and later taught at Liberty Hall Academy, a predecessor institution to Washington and Lee University. In Virginia, he married Ann (or Anne) Campbell, whom he had met there, in 1788.Shortly after his marriage in 1788, Roane moved to Jonesborough, Tennessee, then still a part of North Carolina, where he was admitted to the bar and began the practice of law. He died at his plantation "Grassey Valley" nine miles south of Knoxville, Tennessee, near Campbell Station Tennessee. Governor Roane was the father of James, David, Mary, Andrew, Archibald, Annie, Margaret, & William Roane. Governor Roane was proceeded in death by his parents and several of his children. His son Dr, Andrew Campbell Roane was in charge of closing his estate. His wife Ann Campbell Roane lived with their son James Roane in Nashville Tennessee until her death in 1831 & is burried in Nashville Tennessee.
<urn:uuid:14dac82b-ee6c-4ac0-94d0-12c7c54818b3>
CC-MAIN-2023-14
http://pleasantforestcemetery.com/archibald-roane
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948817.15/warc/CC-MAIN-20230328073515-20230328103515-00328.warc.gz
en
0.981135
1,308
3.296875
3
This poem is from the ‘Gruesome and Gory Bible Story’ collection of poems for 7-11 year olds. King Nebuchadnezzar was a very proud royal. He wanted to make sure all his subjects were loyal. He thought to himself, “I know just what I’ll do. I”ll build something gold; a giant statue! The statue it stretched around ninety feet tall, it made the biggest of men feel a little bit small. The king he called all his most exceptional men, to come to his unveiling of the statue right then. The people all stood right in front of the gold, from different nations, some young and some old. The messenger cleared his throat now to say something that was going to spoil their day. A noise would go out from the horns and the pipes – A great way to control all the moans and the gripes! The officials and judges would all have to bow, this grievous act was far worse than a vow. “If you don’t bow down,” the messenger then said, “you’ll be thrown in a furnace and you will be dead.” Of course, they all bowed for they feared for their lives. For some, it was the thought of leaving their wives. Now can you imagine how they must have looked, throwing themselves down as if they were hooked?! Worshipping idols that were just made of gold – it must have been incredibly strange to behold! But three fearless men didn’t think of the threat and they didn’t break out in a spot of a sweat. They just stood as all the officials then bowed. They were humble about it, they weren’t at all proud. Astrologers saw that these three fearless men did not fall to the ground, not then or again. They cried out, “My Lord have you seen what we see? More than one man who could now be your detainee! Those Jews they don’t fear and don’t treat you with awe. We’re afraid their behavior is unquestionably poor. These men you’ve appointed in very great places don’t worship your idols or get down on their faces!” Then King Nebuchadnezzar, (his face was bright red) stood absolutely furious, almost losing his head. He called the three men to see what they’d say. What excuse would they give? They better now pay! “Is it true?” The king snapped just like a mad man. If it was, he had planned to shorten their lifespan. “Let’s try it again and see now how you perform!” The King never knew that this would be the norm. “Oh king, we’ll not bow to your big piece of junk! If you try to now make us, you’re going to flunk! Our God will deliver us from your fiery furnace. We don’t have to worry that the fire will burn us. If God doesn’t save us from your scary fire, we know that the end of our lives won’t be dire. We won’t ever worship a false or fake god. We won’t even give them a wink or a nod!” Then Nebuchadnezzar with his anger all flared, decided that their lives would not be spared. Seven times hotter the furnace was made hot. He would kill them and he would enjoy it a lot! The furnace melted the men that threw them all in, from their head to their toes, their shins to their chin. But Shadrach and Meshach and Abednego, the fire, it never touched one of them so. Those were the names of the three fearless men who were chucked in a fire but what happened then was a momentous occasion of an epic scale – even better than escaping a flood or a whale! Inside that furnace the men walked and talked. I wonder if they felt like they were being stalked? King Nebuchadnezzar looked very gobsmacked. He realized that, the wrong god he had backed! “Now didn’t we throw only three men in there?” The king started to squint, to peek and to glare. “There’s four men inside, one like a son of the gods! Now unbound and walking, what were the odds?!” The men hadn’t been touched by a flame or a spark. While inside that furnace they were having a lark! “Servants of God, Shadrach, Meshach, Abednego, come out of the furnace, ‘cos I have said so!” They came out of the fire, the mob were aghast. The three dauntless men were simply steadfast. Their hair wasn’t singed, their robes were not scorched, they didn’t smell one bit like they had been torched. King Nebuchadnezzar he changed on that day. “Praise God the Most High!” he would start to say. “He sent down an angel for three fearless men. No more will I mock them or try to kill them again. But if anyone talks down about God the Most High they’ll be cut into pieces and into rubble to pass by. For no god I have seen could ever save in this way,” the three fearless men were promoted that day. If you ever face an infamous dictator like this, be aware that your life he may want to dismiss. But know that if you have God by your side, you can face anything when with God you abide. Jesus will be with you through the fires of life. Though those fires they may be especially rife. Just trust that no matter what ever you face, He’ll always be with you in every single place. ©Katy Hailes 2017. All rights reserved. What did you think of this bible story poem? Please rate or share this post!
<urn:uuid:1677e15b-4355-4b1b-8e19-1e88c2aeb6e9>
CC-MAIN-2020-16
https://ministryark.com/poem/three-fearless-men-bible-story-poem/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370506673.7/warc/CC-MAIN-20200402045741-20200402075741-00098.warc.gz
en
0.975188
1,362
3.03125
3
Wheat without husk, corn, rice, and some other grains can be used as feed for most fish. These are nutritious and easily digestible by the fish. All fish food does not contain the same ingredients. There are different categories and types of fish food available according to the type of fish you have. There are particularly three types of fish, carnivores, omnivores, and herbivores. So you need to categorize your fish in your aquarium or fish tank before giving them the food. Now the answer to the question, what grains do fish eat? Different grains can be fed to fish according to their species. Wheat, rice, and some other grains are on the list that fish can digest. In the upcoming sections of this article, we will discuss this aspect in detail. We will also cover how these grains and fish food with multigrain ingredients can help the fish to grow healthier and stronger. This article is going to be full of information so let’s not delay any more. Are Grains Healthy for Fish? Before addressing or getting into the details of which grain is more beneficial for the fish, let us discuss this aspect. Are grains really helpful for the overall health and growth of the fish? There are many types of research in which it has been found that grains are good for fish, but it depends at which age you are feeding grains and grain fish food to your fish. Also, it depends on which type of fish you have in your fish tank. Can we Feed Flour to Fish.? Let us consider it with an example. Fishes are predators meaning that they eat other small fishes and amphibians as their food. Fishes are not that attracted to grains and grain fish foods. They mainly have the name of carnivorous fish. They love to have meat as their food. On the other hand, small fishes, which are particularly in the category of omnivores and herbivores, like to have grains in their diet. Grains, primarily wheat, rice, and corn, are healthy for fish, and they are also digestible. Wheat is digested, but the husk is very strong and cannot be easily digested, so it gets removed. And also, feed your fish with boiled rice. They can easily be broken down, and fish stomachs can digest it. Wheat and Wheat Bread Wheat and wheat bread can be fed to fish, and they can be digested easily. The grains of wheat are very nutritious, and they have very significant dietary fibers and minerals. If you do not want to overindulge or go easy with your fish, then we suggest you remove the husk of wheat grains. Secondly, wheat bread is also very good and if your fishes are very small, then wheat bread can be a very good option to feed them. It goes very light on the stomach of your fish. Only you need to be mindful when you are purchasing your wheat fish food for your fish, the tough bran or husk gets out from the wheat grains. Otherwise, your fish won’t be able to eat the food. It is also a very commonly asked question whether we can feed rice grains to our fish. Rice grains are also very tough, and they cannot be easily broken down. In this regard, it is easy to boil them for approximately 5 minutes. This boiling will soften the rice grains, and you can feed your fish. Ultimately it would be easy for them to grind it and digest it. Rice grains have many nutrients and important dietary fibers along with carbohydrates. These are also a good source of energy and boost the growth and strength of your fish. If you are feeding rice grains or any other grain to your fish, make sure that you do not give excessive amounts. This will hinder the growth of the fish, and the nutrient requirement will also not be fulfilled. For that purpose, you need to switch between different fish foods with different nutrient content. Make sure you are feeding them the right amount of proteins, carbohydrates, dietary fibers, and other essential vitamins and minerals. So that they can grow at their maximum and have a healthier and prolonged life cycle. Whole Grain Bread In the categorization of grain fish food, we will be discussing this last fish food. Whole grain bread is also a very common food for many fishes. Still, there are many people who question whether they can feed whole-grain bread to their fish. Definitely yes, you can feed them whole-grain bread. It is full of nutrients, and it does not have any kind of problem with digestion as well. Whole grain bread has the necessary level of carbohydrates as well as dietary fibers and vitamins. These breads are not gluten-free, so if your fish is allergic to gluten or does not digest any kind of starch, then we suggest you switch to another kind of food to feed them. On the whole, it is best to feed your fish different kinds of grains as they are full of nutrients and minerals. The dietary fibers present in these grains help them grow faster and facilitate them very efficiently in their reproduction. If you are looking for some good quality grain fish food, there are numerous brands who are manufacturing these fish foods with very good grain combinations. Ultimately providing the best combinations of nutrients, vitamins and minerals to your fish. The Final Statement If you want your fish to grow well and their nutrient requirement to be fulfilled then you must be careful about their diet and the food you are feeding them. Corn, wheat, rice, and whole-grain bread are very good and nutritious options for your fish. In order to make sure you are giving the right food to your fish, you need to be more careful about the fish you have. We hope that the facts depicted above might prove very helpful as per your interest. Everyone needs a good night's sleep to get rid of tiredness and give the mind a rest so that it can keep on working properly without having any sort of issues. However, do aquarium fish... Can 2 betta fish live together ? All you need to know about betta fish Betta fish is always at the top of the list when it comes to choosing fish that are adorable and easy to care for. They’re so cute that any fish lover would like to have them in their home...
<urn:uuid:5906ce6d-4027-45ae-bdea-28a16945e0a9>
CC-MAIN-2023-14
https://fishclans.com/what-grains-do-fish-eat/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945288.47/warc/CC-MAIN-20230324180032-20230324210032-00285.warc.gz
en
0.968674
1,302
2.65625
3
In 1712, M. Billerez, Professor of Anatomy and Botany in the University of Besancon, communicated to the Academy an account of a visit made by him to this cave in September 1711. He found 3 feet of ice on the floor of the cave, in a state of incipient thaw, and three pyramids, from 15 to 20 feet high and 5 or 6 feet in diameter, which had been already considerably reduced in size by thaw. A vapour was beginning to pass out from the cave, at the highest part of the arch of entrance; a phenomenon which, he was told, continued through the winter, and announced or accompanied the departure of the ice: nevertheless, the cold was so great that he could not remain in the glaciere more than half an hour with any sort of comfort. The thermometer stood at 60 deg. outside the cave, and fell to 10 deg. when placed inside; but thermometrical observations of that date were so vague as to be useless for present purposes. The ice appeared to be harder than the ordinary ice of rivers, less full of air-bubbles, and more difficult to melt. M. Billerez enunciated a new theory to account for the phenomena presented by the cave. He observed that the earth in the immediate neighbourhood, and especially above the roof of the grotto, was full of a nitrous or ammoniac salt, and he accordingly suggested that this salt was disturbed by the heat of summer and mingled itself with the water which penetrated by means of fissures to the grotto, and so the cave was affected in the same way as the smaller vessel in the ordinary preparation of artificial ice. He had heard that some rivers in China freeze in summer from the same cause. In 1726, a further communication was made to the Academy by M. des Boz, Royal Engineer, describing four visits which he had made to the grotto near Besancon at four different seasons of the year, viz., in May and November 1725, and in March and August 1726. In all cases he found the air in the cave colder than the external air, and its variations in temperature corresponded with the external variations, the cold being greater in winter than in summer. M. des Boz ascribed the existence of ice in the cave to natural causes. The opening being towards the north-east, and corresponding with a gorge in the hills opposite, running in the same direction, none but cold winds could reach the mouth of the grotto. Moreover, the soil above was so thickly covered with trees and brushwood, that the rays of the sun could not reach the earth, much less the rock below. Credible persons asserted that since some of the trees had been felled, there had not been so much ice in the cave. In order to test the presence of salt, M. des Boz melted some of the ice, and evaporated the resulting water, but found no taste of salt in the matter which remained. He denied the existence of the spring of water which previous accounts had mentioned, and believed that the water which formed the ice came solely from melted snow, and from the fissures of the rock.
<urn:uuid:bc9175a7-d0f3-42e3-b713-36abdd1a8cc0>
CC-MAIN-2014-23
http://www.bookrags.com/ebooks/14012/172.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510270528.34/warc/CC-MAIN-20140728011750-00197-ip-10-146-231-18.ec2.internal.warc.gz
en
0.980199
661
3.5
4
Valentine’s day is undoubtedly the most romantic day of the year. It is, after all, dedicated to celebrating love. While a great number of the population worldwide celebrate the holiday, not a lot of people are familiar with its origin. The actual origin story of the holiday or the man behind the holiday is actually shrouded in mystery, legend and inaccuracies. While a lot is not known about the history of the holiday per se, you will find a few things about the holiday you might want to know here. Valentine’s Day Holiday February 14th is the annual anniversary of the commemoration of Saint Valentine who is regarded by some as the Patron Saint of Love. However, the holiday wherein love is celebrated actually evolved from Lupercalia – an old traditional Roman Festival. Lupercalia was a fertility festival to the Roman god of agriculture – Faunus. To start the festival, the priests would sacrifice a goat (for fertility) and a dog (for purification) to Remus and Romulus who are believed to be the founders of Rome. Then the priest would dip the goat’s hide into the sacrificial blood and go into the city where he will gently slap the women with the hide as it was believed to make the women more fertile. After which the women would put their names in a big box or urn. During the festival, the bachelors would draw out the names of women from the box or urn and the pair would then be partners for the festival and for the next year, this match usually led to marriage. Lupercalia as a holiday was later outlawed and Valentine’s day was declared by Pope Gelasius in its stead. The Man Behind Valentine Valentine is described, from an account from the 1400s, as a priest who had wed couples in secret after the Emperor had outlawed marriage because it was believed that single men made better soldiers than married men with wives and children. Of course, Valentine felt this was unfair and he took it upon himself to unite couples in secret matrimony. When the Emperor found out, Valentine was thrown in jail and sentenced to death. He was later beheaded by order of Emperor Claudius II around 270.A.D. Why Is He Associated With Love? What is more romantic than helping couples get married in secret? Dying for helping couples get married in secret, which can be interpreted as dying for love if you want. For this reason, he is considered the most romantic of saints and the representation of love worldwide. St. Valentine Could be Two Different Men The St. Valentine being celebrated today is actually a composite of two men, maybe. The first real candidate is the one described above who was beheaded by Emperor Claudius II near Rome. The second candidate for the composite is Valentine – Bishop of Terni – who was also beheaded by Emperor Claudius II near Rome; but on the 14th of February 273.A.D. For the most part, both men are thought to be the same person because of the similarities and the closeness in their date of death; however, there is no confirmation to this. His Skull Is Currently In Rome His skull, which has been adorned with flowers is currently kept for display in Rome at the Basilica of Santa Maria in Cosmedin. His skeletal remains were excavated from a catacomb near Rome in the early 1800s. As it is usually done, the remains were split and shared to reliquaries (where relics are kept) around the world. Other parts of his skeleton can be found in France, England, Czech Republic, Scotland and Ireland. There Is A Good Chance This Was All Made Up By Chaucer Geoffrey Chaucer is largely considered the Father of English Literature. He is also referred to as greatest English poet of the Middle Ages. He is also the first person to have ever acknowledged Valentine’s day. Before 1375, when Chaucer wrote his poem, there was no record of the holiday anywhere. In his poem – Parliament of Foules, he wrote “For this was sent on Seynt Valentyne’s day / Whan every foul cometh there to choose his mate,” referring to February 14th. The poem received widespread acclaim and is probably the true origin of the holiday of love. Why Is Cupid The Mascot of The Holiday? Believe it or not, Cupid is the Roman god of erotic love, desire, attraction and affection. He is also the son of the goddess of love – Venus and the god of war – Mars. The Latin translation of Cupid is ‘Amor’, which means love. Basically, he is the personification of love.
<urn:uuid:6fcc17b4-e334-495b-a214-a35c507671c9>
CC-MAIN-2023-40
https://buzzsouthafrica.com/valentines-day-everything-you-wanted-to-know/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510284.49/warc/CC-MAIN-20230927071345-20230927101345-00453.warc.gz
en
0.979885
982
3.140625
3
River otters holding hands. Cats chasing their own tails. Animals seem like they demand our attention. But plants (and their tree friends) have a lot more going on than you’d think. Sit with them a while. Plants Know When They Are Being Eaten. (And They Fight Back.) October 27, 2016 Plants have long employed a variety of defensive strategies against herbivores, but the scope and sophistication of these defenses is still being understood. Meet the Man Behind the Peony July 12, 2019 In China, gramophone and camera in tow, botanist and explorer Joseph Rock collected seeds from the tree peony that bears his name. America’s Mysterious Lost Tree April 27, 2018 Extinct in the wild, the Franklinia tree is still cultivated in botanical gardens, private homes, parks, even cemeteries. It's also got an interesting Revolutionary-era backstory. Plant of the Month: Turmeric March 4, 2020 The plant’s golden color has inspired a long—and potentially deadly—fascination. The Accidental Invention of Terrariums December 9, 2018 Victorian London became obsessed with Ward's cases, which protected plants from the city's toxic pollution -- and piqued peoples' imaginations. Four Flowering Plants That Have Been Decidedly Queered January 29, 2020 The queer history of the pansy and other flowers. The Marvelous Experiments of Amateur Plant Breeders April 10, 2020 Over 100 years ago, a horticulturalist introduced hybrid plants to California gardeners. Up sprouted a movement of amateur experiments in plant biology. Plant of the Month: The Sensitive Plant February 5, 2020 This plant’s animal-like behavior and alleged love-provoking abilities have sparked the imagination of everyone from early modern yogis to today’s scientists. The Mysteries of Crown Shyness August 25, 2018 In some forests, trees grow in a manner that keeps their branches from touching one another. Despite decades of study, scientists aren't exactly sure why. The Beloved, Bedeviled Banana September 2, 2019 The Cavendish banana is currently threatened by a fungal disease. A similar disease all but wiped out its predecessor, the Gros Michel banana. Wollemi Pine, Dinosaur Tree November 10, 2018 The Wollemi Pine is an ancient tree, virtually unchanged since herbivorous dinosaurs last munched on them. Why We Need Seagrass June 25, 2018 Seagrass meadows are habitats for a variety of marine life, and a vital link between land and sea. But these crucial plants are increasingly under threat. Why the Sandplain Grasslands Are So Special January 15, 2016 Sandplain grasslands, a kind of East Coast prairie, are some of the rarest habitats in the world, and sheep-grazing may be key to their survival.
<urn:uuid:c3dce3c8-40e6-40fa-bd99-ddc1a7d02f23>
CC-MAIN-2023-23
https://daily.jstor.org/amazing-plants/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646181.29/warc/CC-MAIN-20230530230622-20230531020622-00071.warc.gz
en
0.9076
627
2.953125
3
Modern Homes Burn 8 Times Faster than Past Homes Little Rock, AR -- Modern homes are built to withstand storms and earthquakes better than older homes; however, the construction materials used and cost-efficient furnishings allow these homes to burn 8 times faster than they used to burn. When fires spark, they move quickly in homes, not always giving time for everyone to escape. "I asked her where her husband was, and she said in the hallway," said a Good Samaritan, following a Little Rock fire. The woman was able to escape, assisted, but her husband wasn't as lucky. Firefighters arrive at fires between 5 and 8 minutes after it is reported; however, that is not enough time to keep the fire contained. "Even in between the five to eight minutes we might respond in, a fire has a lot of times extended to two or three rooms in the home," said Captain Randy Hickmon, Little Rock Fire Department. Recent research has shown that seconds count all the more during a house fire. "We're talking about two minutes, probably at the most, to escape. Whereas, before synthetic furnishings and lightweight construction, you typically had around 15 to 18 minutes [to escape]," said Hickmon. The newer materials are more cost-efficient and, sometimes, stronger than older construction materials. However, researchers at Underwriter Laboratories found homes that have synthetic materials and lightweight construction materials reach flashover eight times faster. "[Synthetic materials] are burning a lot faster and giving off a lot more toxic gases. When those materials reach a certain temperature they are off-gassing chemicals that were never intended to come from that item because it was never put to that extensive heat," said North Little Rock Fire Marshal John Pflasterer. Hickmon added, "Smoke inhalation is the biggest killer in the fire. That gets most people before the fire. A house will fill up with smoke very quickly." Those issues have fire safety organizations recommending new fire protection strategies. Sprinkler systems have been effective in multi-unit residences like apartments and businesses. There's some reluctance for residential because they don't understand the costs. "The system is maintained, they're going to work 100% of the time," said Pflasterer. "But, the issue comes back to the dollar. Contractors and construction companies are afraid it will drive prices up. But, what we're seeing is a sprinkler system run about $1.50 a square foot, which is a nominal cost when you think about how many lives and how much property it might save." You Might Also Like...
<urn:uuid:922c6f45-faa1-4306-b0b3-e0f68272f570>
CC-MAIN-2017-30
http://www.femoranfp.com/modern-homes-burn-8-times-faster-blog/
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549425117.42/warc/CC-MAIN-20170725082441-20170725102441-00088.warc.gz
en
0.969927
535
2.515625
3
Death of Lee Shocked the City As No Other News of the death of Robert E. Lee, beloved chieftain of the Southern army, whose strategy mainly was responsible for the surprising fight staged by the Confederacy, brought a two-day halt to Richmond's The general died in the peace of his home at Lexington at 9:30 A. M., October 12, 1870. His end marked the close of his efforts, as president of Washington College, now Washington and Lee University, to educate the youth of the country, a task he selected above all others after the surrender at Appomattox. Died Paroled Prisoner Five years had passed since he last gave orders to his army, but Lee never was pardoned by the Federal Government. He died a paroled soldier of a quondam enemy force. During his last few years, the white-haired old man manifested no bitter feeling for the North. In fact, he tried whenever opportunity afforded to restore peace and harmony, urging people of the South to forget their Lost Cause and to work diligently to restore the country which the enemy had torn down. Lee never took the oath of allegiance. He once told General Meade he had no personal reasons for not doing so, but that he did not intend to end his standing as a paroled prisoner of war until he knew what policy the Federal Government would pursue toward the South. Then came President Jackson's proclamation, offering amnesty and pardon to all except a few who were required to make special application. Lee was among this latter group. Accordingly, he wrote both General Grant and the President, but his pardon did not come. Crepe on Every Door Richmond was affected deeply by the death of the man who had kept the Yankees away from her door for so long a time. Public buildings were draped and almost every home in the city had crepe upon its door. The United States Flag was placed at half mast here. Although the burial was held at Lexington on October 15, Richmond observed the day as if interment were to follow here. Bells were tolled from morning until night. The City Council held a special session and asked that Lee's body be brought to Hollywood, where already lay several other heroes of the Confederacy, but the remains were kept at Lexington and later were placed in a crypt at the Lee Memorial Chapel on the campus of Washington and Lee, where they lie beneath the recumbent statue of the great soldier prepared by Edward V. Valentine, Richmond sculptor.
<urn:uuid:7fb28572-14c5-47fb-8ae9-ef2a2026db73>
CC-MAIN-2017-34
http://myirishroots.net/leeobit.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886110485.9/warc/CC-MAIN-20170822065702-20170822085702-00166.warc.gz
en
0.98249
551
2.6875
3
“From the beginning, even before Singapore became independent, we sought to build a world-class living environment here through greenery. At first we aimed to be a “Garden City” – parks, reservoirs, Kallang River cleaned up, Singapore River, later cleaned up… The next phase from being a “Garden City” is to make ourselves into a “City in a Garden”. It is a play on words, but it means something different, because it means connecting our communities and our places and spaces through parks, gardens, streetscapes and skyrise greenery.” Lee Hsien Loong, Singapore Prime Minister Singapore’s current Prime Minister delivered a clear message of his aspiration to make the small country an even better place to live in, built on the very foundation his father – the late founding father of Singapore, Lee Kuan Yew – had laid, upon which the nation propelled itself from a mere colonial trading port into a rich country whose influence transcends its geographical boundaries. Home to more than 3,000 hectares of nature reserves, more than half of Singapore’s main island today is covered in green, a significant increase from only a third of the island’s area three decades ago. And that happened to a city-state whose population almost doubled in the same period of time. Singapore’s vision to be a garden city was conceived by Lee Kuan Yew himself three years after the nation’s reluctant independence from Malaysia, an event Mr. Lee fervently tried to prevent for he believed the Merger with Malaysia was the right thing for the tiny city-state. But had Singapore not been expelled from the union with its neighbor to the north, the story would have been much different today. Surrounding, and inside, the city’s downtown are numerous parks providing not only shelter and convenient jogging tracks, but also open air museums, home to some of the most significant historical sites on the island. Fort Canning Hill, once known as Bukit Larangan – forbidden hill in Malay – for its strictly royal-family-only premises, sits right at the heart of Singapore’s business and shopping districts. Excavation works uncovered precious artifacts buried on the hill, believed to be those of Malacca Sultanate’s. The artifacts now find a new home at the National Museum of Singapore, but one relic from the time of the sultanate still baffles historians today: the tomb of Sultan Iskandar Shah, the last king of Singapura before the Java-based kingdom of Majapahit took the island by storm. Today a lone tomb, resting at a shaded pavilion under tall, old trees bears the marking ‘Keramat Sultan Iskandar Shah’, or the tomb of Sultan Iskandar Shah, in spite of theories that he was buried either in Malacca or near Port Dickson, both in Peninsular Malaysia. When Stamford Raffles came to Singapore in the early 19th century, he commissioned the construction of the British governor’s residence as well as the island’s first botanical garden on the hill – no other nation, it seems, is as passionate as the British when it comes to botanical gardens. In the following decades a fort was built in response to the perceived growing threat to the British colonial rule on the island. The park now protects what is left from the time the European power gripped a full control of the island. However there is no other garden in the city which can quite measure up to the sheer size of the modern architecture wonder that is Gardens by the Bay. Constructed over a 101-hectare piece of land to the south of Singapore’s iconic waterfront at Marina Bay, the $829 million artificial gardens become the nation’s most prominent icon for its aspiration to become truly a city in a garden. Designed by an international architecture firm, two massive columnless glass conservatories are the highlights of the mega-project. Dubbed the Flower Dome and the Cloud Forest, each replicates the warm and dry Mediterranean climate and the cool and humid tropical montane forest respectively. As James and I stepped inside the Cloud Forest, an impressive wall covered in lush green vegetation and colorful blossoms towered under the arched curves of the glass dome. Acting like a curtain were the awe-inspiring waterfalls coming down from multiple levels of the artificial wall, or ‘mountain’. The cool air, and the minuscule droplets from the waterfalls, brushed against my face, a refreshing break from the tropical heat and humidity outside. The multi-tiered mountain hosts different display themes, from replicas of stalagmites to walkways around a wall festooned with wild orchids and a plethora of other colors. A glance out through the glass, Singapore’s skyscrapers rose above the river under the midday sun. Impressive was an understatement. As we walked through the last hanging walkway before descending to the bottom of the artificial forest, mist started wafting from the bridge’s sides, bringing moisture to the air to keep the plants green and alive. At the forest’s floor, I couldn’t help looking up towards the 42 m mountain – a bizarre yet astounding centerpiece of the glass-encapsulated man-made wonder. As though the conservatories were not mind-blowing enough, there was the Supertree Grove – a group of giant tree-like structures covered in vines and flowers – measuring between 25 m to 50 m in height. As the night fell, lights in a myriad of colors painted the colossal trees, bringing the magical landscape of Pandora from James Cameron’s Avatar to life. Set against the pretentious backdrop that is Marina Bay Sands, Supertree Grove not only is Singapore’s spirit of kiasuism at display, but also a manifestation of the tiny nation’s dream and ambition to inspire. Photovoltaic panels atop the trees provide power to light up the structures when night falls; cleverly-designed tree canopies collect rainwater for irrigation within the gardens; their overall gigantic size acts as the conservatories’ cooling system. Any Na’vi would certainly be proud of these environmentally-friendly structures. However I didn’t hear anyone speaking Na’vi that night, nor did I see any ikrans scouring the overcast sky, the Hallelujah Mountains, too, were nonexistent. Only the evocative tunes of a great light and sound performance, a rhapsody of crimson, turquoise, teal, and violet, under the grey skies at eventide. An overture to the the majestic gardens’ lullaby, an engineering feat made to dream and inspire.
<urn:uuid:51b802eb-8782-4668-8e75-feb2c9fffd47>
CC-MAIN-2017-43
https://harindabama.com/2015/05/10/creating-a-city-in-a-garden/
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187826642.70/warc/CC-MAIN-20171023202120-20171023222120-00233.warc.gz
en
0.937782
1,419
2.515625
3
Another iconic image that simply has to be included in bridges of the world. It's of course the coat hanger itself, Sydney Harbor Bridge. Again the bridge comes with its own history as well as its ongoing journey as a major Australian landmark, particularly renowned for its backdrop for New Year's Eve firework celebrations. Plans to build a bridge to join Sydney's Central Business District with its North Shore began way back in 1815. Convict and noted architect Francis Greenway apparently put forward a proposal to Governor Lachlan Macquarie that a bridge be built from the northern to the southern shore of the harbour. In 1825, he wrote a letter to the then "The Australian" newspaper stating that such a bridge would "give an idea of strength and magnificence that would reflect credit and glory on the colony and the Mother Country". Although Greenway's proposal was not accepted the idea of a bridge remained of interest and many proposals were developed and thwarted over the next 100 years. Promises were sometimes made and then reneged due to changes of government or priorities. The official ceremony marking the "turning of the first sod" occurred on 28 July 1923, at Milsons Point on the north shore. An estimated 469 private homes and commercial buildings on the north shore were pulled down so that construction could proceed. Apparently little or no compensation was paid. Work on the bridge finally commenced and by September, 1926 concrete piers to support the approach spans were in place on each side of the harbor. Construction of the arch didn't begin until 1928 and the it took until 15th January, 1932 for the last stone to be set. Testing by the first steam train to cross the bridge successfully took place on the 19th January, 1932. The bridge was officially opened not log after on the 19th March, 1932. The opening is particularly memorable in Australian history because just as the Premier was about to cut the ribbon a man in a military uniform on a horse came through and cut it first with his sword. The man was arrested, the ribbon re-tied and the official ceremony began. Another story of Australian larrakinism to share with generations to come.
<urn:uuid:5b6f4f54-bb58-411c-a6bc-8181934eb430>
CC-MAIN-2020-29
http://darlingshe.com/bridges-of-the-world-6/
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655902377.71/warc/CC-MAIN-20200709224746-20200710014746-00413.warc.gz
en
0.983575
443
2.890625
3
Physiological observations (or “obs” ) are recorded from patients in acute settings at various intervals, depending on how closely they need to be monitored for any potential changes. During and for 24hrs after thrombolysis, a patient’s obs are recorded every 15 minutes. Usually obs are taken every 4 hours although if one physiological aspect is fluctuating this is increased to hourly to keep a closer check on indications of any conditions which may adversely affect the patients health eg infection, dehydration, haemorrhage etc. Usual obs taken for acute patients are: Heart Rate– usually 50-80 bpm, recorded by pulse or heart monitor Respiratory Rate (RR)– usually 14-20 breaths/minute, recorded by counting chest movements Temperature – usually 36-37’C O2 saturation– usually 95- 98% although smokers/COPD may have a lower target saturation set by doctor eg 85% AVPU– Alert/responds to Verbal/ responds to Pain/Unresponsive; measuring drowsiness with a shortened version of the Glasgow Coma Scale Glasgow Coma Scale (GCS)– patient’s level of consciousness cored out of 15. Note that a coma patient or toaster will have a minimum score of 3. Aphasic patients are scored out of 10, and you should test a stroke patient’s unaffected side since a side with hemiparesis does not truly reflect their level of consciousness. Blood Pressure (BP)- usually 120/80 (systolic over diastolic) although expected to be higher in stroke patients. BP is often higher in stroke patients, up to 220/110. A sudden drop in BP can cause patient to faint/collapse, known as syncope. A fluctuation in BP during sit to stand can also cause patient nausea and dizziness, and lying down can reduce these symptoms in this circumstance. According to NICE guidelines, BP should be ideally be 185/100 or lower for patients who are potentially suitable for thrombolysis. Blood Glucose– 5-7 mmol/litre is normal, 7-11 mmol/l indicates impaired glucose tolerance. Above 11 mmol/l indicates diabetes. Medication such as steroids can increase the blood glucose level in a patient. Higher blood glucose leads to reduced immunity and increased risk of seizures in stroke patients. According to NICE guidelines, patients with acute stroke should be treated to maintain a blood glucose concentration between 4 and 11 mmol/l. There are a lot of medical latin-sounding words used to describe the different stroke symptoms. Below is a list together with the way that I remember them. In brackets is (Ph) or (M) to indicate whether the symptom is physical or mental. Physical could be movement or sensation; and Mental means cognitive processes such as perception or attention. Around 40% of the brain is actually involved with vision, since it includes ocular motor movement, planning of these movements, receipt of the visual information, processing of it and then decisions made on the visual information – these decisions could be visuospatial, emotional etc. Hemianopia (Ph) (hemi=half; plegia=paralysis) Loss of vision in either L or R half of both eyes. So not loss of vision in left eye, but loss of left visual field in both eyes. The information from one side is not transmitted to the brain. The information from eyes is being transmitted to the brain, but information for one side is ‘ignored’ or not processed by the brain. Diplopia (Ph) (diplo=double; op=eye) Continuous uncontrolled eye movements, seen with involuntary flickering movements of the eyes either L-R or up-down. A stroke is similar to how a heart attack stops the blood going to the heart -but for the brain. So like a ‘brain attack’ or a sudden ‘strike’ to the brain. Depending where the blood is stopped from getting to in the brain, depends on what effect it’ll have on the person. Once deprived of blood and therefore oxygen, parts of the brain begin to die after only a few minutes and so a stroke is classed as a medical emergency. Causes of stroke Ischaemic– blood vessel blocked by clot, stopping flow. Most common 85% cases. Clot could be due to narrow arteries, clot in artery, or clot travelling from somewhere else to the brain. Brain area that dies is called aninfarct… ‘the naughty clot “schemes” to injure the brain’ Haemorrhagic-blood vessel ruptures and blood leaks out. 15% cases. The leaking blood building up also causes extra pressure inside the skull. Leak could be due to high blood pressure or a weakened/bulging blood vessel wall (‘aneurysm’)…‘haemorrhage of blood’ Where the brain dies dictates which abilities will be lost. The right side of the brain controls the left side of the body, and vice versa.This means an injury to the left side will affect movement in the right side of the body. The different areas of the brain control different tasks: Frontal lobe (front) initiation and motivation appropriate socialising & interactions with others Broca’s area -produce spoken language Parietal lobe (top middlestrip: like saddle on a horse on the prairies, you experience a lot of unusual sensations as you ride through the desert like heat, smells, sore bum etc!) perception: processing sensation from touch/pressure/temp/pain Wernicke’s area-understand received language: spoken & written Occipital lobe (back: why a blow to back of the head often affects vision) processing visual input from eyes Temporal lobes (front either side:where your temples are located, a lot of old artefacts are stored (memory) and labelled (different things identified) in an old temple) distinguishing different smells & sounds apart visual & verbal memory (for words & names) Cerebellum (bottom underneath, Latin for ‘little brain’) controls smooth (involuntary) muscles like gut or maintaining balance Brain stem (stick at bottom, joining onto spinal cord)
<urn:uuid:b359e308-d047-4747-9cf8-4c07a48f68ef>
CC-MAIN-2017-34
https://lifelonglearningwithot.wordpress.com/tag/acute-stroke/
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886124662.41/warc/CC-MAIN-20170823225412-20170824005412-00713.warc.gz
en
0.901606
1,340
2.5625
3
Tropical cyclone Idai has made headlines across southern Africa throughout the month of March. Lingering in the Mozambique Channel at tropical cyclone intensity for six days, the storm made landfall in Beira, Mozambique in the middle of the month, then tracked in a westerly direction until its dissipation. The greatest impact of the storm was experienced on landfall. It caused flooding, excessive wind-speed and storm surge damage in the central region of Mozambique. Adjacent countries of Malawi and Zimbabwe experienced severe rainfall, flooding and damage from the high wind speed. Madagascar also experienced bouts of high rainfall during the storm’s pathway to Beira. The flooding has left hundreds of thousands of people homeless and displaced across the region while the death toll has continued to rise in the week following landfall. The effects of the cyclone were felt as far south as South Africa and introduced rolling blackouts due to damaged transmission lines that supply the country with 1100 MW of power from Cahora Bassa in northern Mozambique. Historically, nine storms that had reached tropical cyclone intensity made landfall on Mozambique. A larger number of weaker tropical systems, including tropical storms and depressions affect the region, with a total landfall of all tropical systems of 1.1 per annum. The most severe tropical cyclone to make landfall in Mozambique was tropical cyclone Eline in February 2000. It had a category 4 intensity on landfall and resulted in 150 deaths, 1000 casualties from flooding, 300 000 people displaced and four ships sunk. The storms off Africa’s east coast are weaker than their northern hemisphere counterparts. Category 4 and 5 tropical cyclones make landfall at a near-annual rate in the North Atlantic and North Pacific. Why the wide impact Why have so many countries been affected? Tropical cyclones are large storm systems. Immediately surrounding the eye of the storm – a region of calm weather, no wind and no rain – are spirals of storm clouds that span a minimum radius of ~100km. These cloud bands represent the thunder storm conditions, with the rain and winds typical of a tropical cyclone. A ~100km radius is typical of category 1 tropical cyclones, the lowest intensity ones. As the storms intensify to categories 2, 3, 4 and 5, the size increases significantly. This means that a high intensity storm, such as tropical cyclone Idai, has a range of impact significantly larger than the storm track that it follows. In recent years concerns have been growing about the impact of climate change on cyclones. Research has shown that changes to the world’s temperature, as well as ocean warming, are responsible for an increase in the severity of tropical cyclones. This has recently been researched for the South Indian Ocean. As the ocean is warming, the region which experiences temperatures conducive to tropical cyclone formation is expanding and temperatures in the tropical regions are becoming warm enough for cyclone intensification. Category 5 tropical cyclones, which have been experienced in the North Atlantic for almost a century, started to occur in the South Indian Ocean since 1994, and have occurred increasingly frequently since then. This means that as climate change continues and intensifies, so too do these storms. This will mean a greater frequency of not only severe damage from storms, but damage over a larger region. In addition to the impact of warming on the storm intensity, climate warming has also been found to increase the expanse of the storms within any given intensity. So how intense was tropical cyclone Idai? Storm track records, which include the geographic location of the storm at set time intervals, the wind speed and the atmospheric pressure, are documented by a number of regional climatological organisations. This data is synthesised by the National Oceanographic and Atmospheric Association, providing a useful resource for scientists to explore storm behaviour. Tropical cyclones are classified on the basis of their wind speed and central pressure. The weakest storms to be classified as tropical cyclones – category 1 – have a minimum sustained wind speed of 119km/hr. At category 3 the storms have a minimum wind speed of 178 km/h. As the category increases, so too does the potential for damage. Category 1 storms are classified as resulting in dangerous winds that cause some damage, whereas category 3 storms are expected to cause devastating damage. The history of tropical cyclone Idai is documented in these records. The cyclone reached category 3 intensity between 03:00-06:00 on the 11th March 2019, while positioned at its most easterly extent of the storm track. By 03:00 on the 12th March the storm had dissipated to category 2 intensity, and it fluctuated between intensities of categories 2 and 3 over the 36 hours that followed. From noon on the 13th March the storm maintained a category 3 intensity which persisted until landfall on the 14th. What needs to be done Storms that affect many countries present particular challenges. They clearly have no regard for political boundaries. The fact that they affect lots of countries presents challenges in both preparing for storm events in a proactive way and responding to prevent loss of life and livelihood. This requires countries to communicate effectively with one another, to provide coherent messages about the forecasting of the storm track and potential damage, and to facilitate effective evacuations. This storm provides a grim prospect of the future of tropical cyclones in a region under continued threat from climate change. Effective adaptation to minimise storm damage is essential in preparing the region for an increase in the severity of these storms. Disaster risk management plans are also very important to minimise the loss of life.
<urn:uuid:535cb76e-b2b6-410b-8043-2d5cd0d56066>
CC-MAIN-2023-50
http://researchcluster-humansecurity.info/tropical-cyclone-idai-the-storm-that-knew-no-boundaries/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100381.14/warc/CC-MAIN-20231202073445-20231202103445-00033.warc.gz
en
0.950258
1,156
3.84375
4
(1) His system admits no contradiction between free will and determinism , the God of philosophy and that of the Quran.(2) Such a view reconciles free will not with determinism but with the highly plausible thesis of universal event causation.(3) Conferences of philosophers on determinism and freedom aren't the same as they used to be.(4) Compatibilist philosophies seek to reconcile free will and determinism in a modern time.(5) So, would you like to go again on your attempt to explain why you think I was wrong to call you on this, or do you want to talk about free will and determinism ?(6) Thus the choice between a dual aspect theory and a functionalist theory brings with it a choice between sophisticated libertarian and sophisticated determinist conceptions of freedom.(7) Most previous studies have assumed that allele frequencies evolve deterministically and so are restricted to strong selection.(8) Except where there are minds interfering with it, matter proceeds deterministically , in its own right.(9) A deterministic or pantheistic universe does not allow magic.(10) So we've got free will, randomness, and deterministic behaviour - all in one.(11) How, in your view, does mainstream Christianity deal with the deterministic side of the paradox?(12) What Epicurus said is that a determinist cannot criticize the doctrine of Free Will because he admits his own criticism is itself determined.(13) Although this was a small, exploratory analysis, our findings suggest the need to consider that traditional norms of masculinity and femininity may not deterministically lead to desires for traditional scripts.(14) The rest of the theory of chancy causation follows the outlines of the theory of deterministic causation.(15) In speaking of Hume as a determinist , we must, however, bear in mind that this does not in his case carry any pledge of allegiance to a reign of necessity in nature.(16) This was the issue I was raising with my statement that ‘the Christian Church sometimes understates the determinist viewpoint because it makes such harsh punishments seem more merited.’ English to Japanese Dictionary: determinism Meaning and definitions of determinism, translation in Japanese language for determinism with similar and opposite words. Also find spoken pronunciation of determinism in Japanese and in English language. Tags for the entry "determinism" What determinism means in Japanese, determinism meaning in Japanese, determinism definition, examples and pronunciation of determinism in Japanese language.
<urn:uuid:10ae59d4-3eb3-4c2c-93d4-131c221805c2>
CC-MAIN-2020-05
http://japanese.english-dictionary.help/english-to-japanese-meaning-determinism
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251687725.76/warc/CC-MAIN-20200126043644-20200126073644-00555.warc.gz
en
0.939619
513
2.6875
3
What are Muscle Cramps? A muscle cramp occurs when your muscle involuntarily contracts and does not relax, and becomes locked in a spasm. It can occur at any time, most often when you least expect it during activities such as exercising, swimming, playing golf, sleeping, or after sitting too long in one place without moving or flexing a muscle. Muscle cramps can last anywhere from a few seconds to fifteen minutes or longer, and can recur several times before going away. Cramps can affect any muscle under our voluntary control known as skeletal muscles such as the legs, feet, hands and arms. They generally occur in three different muscle groups including the back of the lower leg or calf called the gastrocnemius muscle, the back of the thigh or hamstrings and the front of the thigh, quadriceps. Muscle cramps can also affect various organs of the body such as the stomach, uterus, blood vessel wall, intestinal tract, biliary system, bronchial tree and urinary passages. Muscle cramps have different degrees of intensity and vary from a slight twitch to excruciating pain. Cramps can affect anyone but they are more common in adults than in children. Endurance athletes such as marathon runners and tri-athletes get muscle cramps regularly because they exert themselves physically. Older people, specifically over the age of 65, are also more predisposed to cramps because they become less active and lose muscle. People who are ill, overweight, take drugs or certain medications, or people who perform strenuous physical activities are at risk of developing cramps. Diagnosing Muscle Cramps The common signs and symptoms of a muscle cramp include: - Muscle pain - Loss of muscle function - Abnormal muscle rigidity - Loss of muscle contraction control - Pain in the affected area What Causes Muscle Cramps? Muscle cramps can occur as a result of: - Electrolyte imbalance (not enough fluid in the body and lack of sodium, magnesium, calcium and potassium) - Numerous medications - Vitamin deficiencies - Inactivity and poor circulation Help for Muscle Cramps Muscle cramps are usually not serious and can be easily treated. Anti-inflammatory medication may sometimes be recommended to relieve inflammation and ease the cramps. If muscle cramps are severe and occur often, it is advisable to consult a doctor to discover the underlying cause. They could be indicative of more serious conditions such as osteoporosis, thyroid disease, cirrhosis of the liver and Lou Gehrig’s disease. Using herbal and homeopathic remedies as a natural approach to treating muscle cramps, can alleviate symptoms without the harmful side effects of conventional medicine. Herbs such as Passiflora incarnata and White Willow can help to relax the muscles and provide pain relief, while biochemical tissue salts such as Mag. phos. can treat and prevent recurring muscle cramps. Complementary therapies can also provide all round support and encompass holistic healing, addressing physical, mental and emotional health. There are various natural and alternative therapies to relieve recurring muscle cramps and pain. These include: - Ayurvedic practices - Relaxation and meditation More Information on Muscle Cramps Tips to Relieve Muscle Cramps Additional tips to help relieve muscle cramps: - Gently stretch and massage the cramping muscle holding it in stretched position until the cramp stops. - Apply heat packs to tense, tight muscles, or ice to sore, tender muscles. - Drink plenty of fluids at regular intervals, so as not dehydrate. - Increase your intake of calcium, magnesium and Vitamin E supplements. - Massage therapy and acupuncture can increase the blood flow.
<urn:uuid:29eab33b-c0e0-4cb8-86f0-303ff7bcbd04>
CC-MAIN-2013-48
http://m.nativeremedies.com/ailment/what-causes-muscle-cramps.html?mobile=1
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163043499/warc/CC-MAIN-20131204131723-00014-ip-10-33-133-15.ec2.internal.warc.gz
en
0.933379
763
3.46875
3
The US Environmental Protection Agency’s Region 9, covering the Pacific Southwest, has contracted Global Footprint Network to conduct an Ecological Footprint analysis of California, which will be the first such in-depth look at the Footprint of a US state. The agency plans to incorporate the Ecological and water Footprints into a dashboard of sustainability indicators. EPA’s Region 9 serves Arizona, California, Hawaii, Nevada, Pacific Islands and 147 Tribes. Global Footprint Network’s data will contribute to an analysis that will explore issues such as how much of harvested land is irrigated, how much of California’s biocapacity is occupied by built-up land, and what are the main drivers of ecological demand in the state. It will also explore new areas in Footprint and biocapacity research, such as how demand on biological and water resources could affect the state’s ecological productivity. Using data from NASA’s plant growth index, the EPA will explore whether variations in Ecological Footprint have an impact on plant growth – a relationship that could suggest whether higher Footprints lead to lower biological productivity. The EPA also plans to use data from the state Department of Water Resources and other sources to assess how much of California’s biocapacity is at risk due to water stress. The project could provide a starting point for analyzing the US’s ecological demand on a state by state level. “The agricultural and trade data for California are quite well defined, and offer us a level of resolution that can enable us to evaluate the state with the same methodology as a country analysis,” said Senior Project Manager David Moore. The resulting analysis, “could serve as a template for analyzing the Footprint that we could replicate across all 50 states.” Post Comments • Read Comments (0)
<urn:uuid:6a635051-b91c-4c4d-a391-c7ba5889654a>
CC-MAIN-2014-10
http://www.footprintnetwork.org/en/index.php/newsletter/det/california_epa_to_add_footprint_to_its_dashboard
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394009829804/warc/CC-MAIN-20140305085709-00070-ip-10-183-142-35.ec2.internal.warc.gz
en
0.926751
379
3.0625
3
After two centuries of burning fossil fuels and emitting greenhouse gases at an exponentially increasing rate, the earth’s climate is changing. Human-induced warming is disrupting a number of natural systems that we depend on. Predictions are that a temperature increase above 2°C is almost inevitable, and with that will come more extreme weather events, sea level rises, precipitation changes, disappearing coral reefs and ocean acidification. International climate change negotiations are not delivering sufficiently on the challenge to avoid catastrophic climate change, which make accelerated investments in solutions by business, financial institutions, countries and cities even more crucial. It is clear that renewables must assume the full share of the global energy supply market to avoid 2°C global warming whilst preventing major water pollution, hazardous waste for generations, poor human health, proliferation of nuclear weapons and unnecessarily high costs. WWF’s Energy Report shows that all of the world’s energy needs can be provided cleanly and renewably by 2050, in ways that can be sustained by the global economy and the planet, and that such a transition is not only possible but cost-effective. Such an energy transition must put energy savings at the core which is also proven necessary in the latest reports from Intergovernmental Panel on Climate Change, International Energy Agency, UN Environmental Programme and others. Solutions exist and can be enacted with the right combination of political, social and financial will. But the major innovation challenges ahead include the acceleration of business models that take solutions to market and the continuous cost-cutting of key technologies. We must deliver energy services in much more innovative ad smarter ways in a future of decentralised sustainable energy rather than the current centralised unsustainable energy. In order to accelerate progress we need to look at the conditions surrounding our large and small solution providers. We will need to see a wide range of innovative cleantech solutions quickly scale up over the next 10-30 years. Agencies, governments, investors and business need to proactively collaborate as forces for change in transitioning towards a sustainable energy future on a global level. Understanding these innovation processes is important in order to accelerate increase of the “good” as a complement to the establishment of national climate targets and carbon caps that address a more rapid decrease of the “bad.” Tracking the innovation activity of smaller cleantech disruptors that carry the hope of enabling a shift to more good solutions is the impetus for the Global Cleantech Innovation Index 2014 which is published today. The index demonstrates that countries get ahead if they - are able to adapt to the growing demand for renewable energy (at home and abroad), - are connecting start-ups with multiple channels (e.g. multinational corporates, public procurement) to increase their success rates ” and - are increasing international engagement to spur widespread adoption of clean technologies. Together we must help enterprises with pieces to the 100% renewable energy future puzzle to grow more rapidly. And around the world we must join hands in creating a more attractive future for all and be clear to decision-makers that we are ready and able to do so. Stefan Henningsson is a senior advisor on climate innovation for WWF International. Stefan is based in Stockholm, Sweden.
<urn:uuid:bece4ffc-df4d-47d4-8999-fe895f6359e3>
CC-MAIN-2014-41
http://climate-energy.blogs.panda.org/2014/06/25/cleantech-coming-age/
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657140379.3/warc/CC-MAIN-20140914011220-00207-ip-10-234-18-248.ec2.internal.warc.gz
en
0.923706
654
3.1875
3
The present disclosure is generally related to two-component siloxane-based coatings. Polyurethane topcoats are the current technology used to provide protective camouflage, exterior color stability to UV/sunlight, chemical agent resistance, hydrocarbon and chemical resistance, flexibility, first line corrosion resistance, and a host of other properties for a variety of military assets. The majority of polyurethane topcoats utilized by the military are qualified to either MIL-DTL-53039E (Coating, Aliphatic Polyurethane, Single Component, Chemical Agent Resistant), MIL-DTL-64159B (Camouflage Coating, Water Dispersible Aliphatic Polyurethane, Chemical Agent Resistant), or MIL-PRF-85285E (Coating, Polyurethane, Aircraft and Support Equipment). Unfortunately, these polyurethane coatings contain toxic isocyanate-based materials that can cause serious health issues for both coating applicators and the environment, and the development of coating technologies that are both non-toxic and provide equivalent or greater performance (i.e., functional properties and exterior durability) than polyurethane coatings are highly desired by all branches of the military. Most isocyanates are highly reactive molecules with a high vapor pressure, and airborne exposure to individuals can often result in severe irritation to the eyes, nose, throat, and skin. The spraying (aerosolized particles), brushing, or rolling of materials that contain isocyanates can induce symptoms of asthma, such as coughing, shortness of breath, wheezing, swelling of the arms and legs, and tightness of chest, in addition to hypersensitivity pneumonitis, which is a lung disease whose symptoms include fever, body aches, and cough with phlegm or sputum. The Department of Health Services of California estimates that about one in twenty people who work with isocyanates become "sensitized", meaning that an individual can experience a variety of adverse health conditions from subsequent exposures, even if the exposure is at extremely low levels. To reduce exposure, special personal protective equipment (PPE), such as Tyvek.RTM. suites, nitrile gloves, and forced air respirators must be worn by individuals when applying isocyanate-containing materials, such as the current polyurethane topcoats used by the military. Advances in organosilicon chemistry have led to the large scale production of "hybrid" materials that contain both organic (e.g., carbon, hydrogen) and inorganic (silicon) segments. Coatings that contain silicon-oxygen bonds possess an inherent durability advantage over traditional organic-based materials. Organosilicon-based materials, such as polysiloxanes, are also relatively non-toxic to humans. Two-component (2K) polysiloxane coatings, also referred to as "siloxanes", are commercially available by several manufacturers for use in the protective and marine coatings markets. These coatings offer good exterior durability, hardness, and chemical resistance. However, these coatings suffer from low flexibility due to their high crosslink density, which prohibits them from being used as topcoats for military aerospace and vehicle applications. Disclosed herein is a coating composition comprising: an amine-functional compound, an alkoxysilane-terminated polyurea, and an epoxy- or acrylate-functional compound. The coating composition is a two-component system.
<urn:uuid:c6b32aa7-ef4e-4975-899b-b71abff0630d>
CC-MAIN-2017-34
https://www.dsiac.org/resources/news/two-component-siloxane-based-coatings-containing-polymers
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886107720.63/warc/CC-MAIN-20170821060924-20170821080924-00486.warc.gz
en
0.929016
730
2.546875
3
The self-becoming of the United States’ national identity has been formed from a religious worldview that imagined itself as a new Israel taking a land given by heaven. It is interesting how this religio-political thinking has informed American opinions on the State of Israel. Zionism is by no means a recent nationalism. Writing before the Nazi genocide of the 1930s and 40s Josef Roth discusses the forming nationalistic ideas within the former Austro-Hungarian Empire, and connects this golden age as one of the formative periods of Zionism in Europe. It was of course within this imperial milieu that Theodor Herzl lived and worked. Judaism has always entertained a cultural memory of a homeland, but the religious Jewish resistance to secular Zionism during the end of the nineteenth century and the early twentieth century points to this being an imaginative homesickness rather than the politicisation of the right of return. True, modern political Zionism, rather than being a Jewish nationalist aspiration, was first the product of English and American Protestantism. English Puritans, from the earliest colonisation of North America, conceptualised their new home as a new Israel, a ‘City on a hill;’ a New Jerusalem. Around their settlements lived their Canaanites, godless barbarians to be cleansed from their holy land. This sacralisation of colonialism gave rise to the American mythos of the nation’s Manifest Destiny, the divine blessing on their subjugation of that new world God had given them. It is not difficult to see how from this religious and colonial expansionism, taken with their literal reading of the Bible, these pioneers identified themselves with the Israelites of yore. Western imperialism, of which the nascent United States was a product, constructed its own identities against the background of its Orientalisation of the Middle East. It was this Arab, Islamic other that gave geopolitical meaning to their Judeo-Christianity. As America grew to see itself as the fruit of the God’s will, the spread of American, Western religious and political values became an extension of their God’s will for the ordering of the world. Thus imperialism and colonisation were rationalised as good and as indeed the work and will of God made real through the work of white men. Long before the birth of a particularly Jewish political Zionism Evangelical Christians were postulating the return of the Jews – as a Western (good and godly) people – to the home this God had promised them. It is a fascinating history in that from the beginning this Christian Zionism was always a confluence of religious fundamentalist fanaticism, political power, and imperial ambition. William Eugene Blackstone (1841-1935), as noted by Lawrence Davidson, “drew up a petition addressed to President Benjamin Harrison and Secretary of State James G. Blaine” advocating the return of Jews to Palestine; a document supported by over four hundred influential and powerful Americans “including the Speaker of the House of Representatives, the Chief Justice of the Supreme Court, J. P. Morgan, and John D. Rockefeller.” This relationship of Christian fundamentalism and US politics has continued in US foreign policy towards Israel and Palestine to the present. Lawrence Davidson, “Christian Zionism as a Representation of American Manifest Destiny,” Critique: Critical Middle Eastern Studies 14, no. 2 (2005): 157–69.
<urn:uuid:68a08771-4397-479b-b2f0-180ea49de158>
CC-MAIN-2020-24
https://randompublicjournal.com/2016/05/13/americas-manifest-americas-manifest-destiny-and-christian-zionis/
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347414057.54/warc/CC-MAIN-20200601040052-20200601070052-00416.warc.gz
en
0.957882
690
2.703125
3
CAGED Minor Guitar Chords Learn To Play Minor Guitar Chords Using The CAGED Sequence! Welcome to this lesson. We are going to take what we learned in the lesson about the CAGED chord sequence and apply it to minor chords instead of major ones. The CAGED sequence can be applied to minor chords just like you applied it to major chords. If you don’t know the minor chord shapes presented in this lesson that’s okay, we have supplied you with the diagrams. Once you learn the minor chord shapes we will put them in the CAGED sequence to give you a greater understanding of how the guitar fretboard is laid out. We will be in the key of E minor for this lesson so all of the chords in the CAGED sequence will be E minor chords. The five minor chord shapes that we will be using are the fundamental shapes for a lot of minor chords. Start on the E of the CAGED sequence by playing a regular open E minor chord. The second chord in the CAGED sequence is D make an E minor chord using the D minor chord shape. Place your 1st finger on the 2nd fret of the 4th string, 2nd finger on the 3rd fret of the 1st string, 3rd finger on the 4th fret of the 3rd string and 4th finger on the 5th fret of the 2nd string. C is the next chord in the sequence. Make an E minor triad by placing your 3rd finger on the 7th fret of the 5th string, 2nd finger on the 5th fret of the 4th string and 1st finger on the 4th fret of the 3rd string. Play those three notes. Make an E minor chord using the A minor bar chord shape for the fourth chord in the sequence. Odds are your probably already know this shape. If you don’t, just check out the chord diagram. The last chord in the CAGED sequence is a G so lets make an E minor chord based off of a G minor shape. Place your 4th finger on the 12th fret of the 6th string, 2nd finger on the 10th fret of the 5th string and make a bar across the 9th fret of the 3rd and 4th strings. Play those four notes. Round out the sequence by coming back to the E shape and playing an E minor bar chord with your bar on the 12th fret and your 3rd finger on the 14th fret of the 5th string and your 4th finger on the 14th fret of the 4th string. Start over on the first E minor chord that you played and try to visualize the next shape in the sequence before you take that open E minor chord off to move to the D minor shaped E minor chord. Try to do this all the way up the sequence. It is very important that you visualize where the next chord shape is before you try to move to that next chord. It is also very important that you try to visualize and be aware of where all of the root notes of the chords are. In this case those notes will be all E notes. We have included a diagram of the fretboard with all of the E minor chords in the CAGED sequence. All of the E notes are in black so that you can easily see where all of the root notes for the chords are. Try going through the CAGED sequenc for every minor key that you can think of. You don’t have to wear yourself out on this stuff but do try to make it a part of your regular practicing to some extent. Have fun and play more guitar!
<urn:uuid:dd4b59df-1406-42f1-baf8-7e11ed885b40>
CC-MAIN-2013-48
http://www.guitarlessons.com/guitar-lessons/exercises-and-fretboard-navigation/caged-minor-guitar-chords/
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164033807/warc/CC-MAIN-20131204133353-00091-ip-10-33-133-15.ec2.internal.warc.gz
en
0.961543
756
2.703125
3
If you want to get insights on how laser printers such as the Beste laserprinter from https://printq.nl/laserprinter/ work, this ultimate guide will help you in more than just a way. It is surely surprising how laser printers like the Beste laserprinter from https://printq.nl/laserprinter/ work when you press that print button on the computer. There are however complicated sub-processes behind the entire functioning process that involves mirrors, carbon, heat, lasers, and static. Let us find out how laser printers such as the Beste laserprinter from https://printq.nl/laserprinter/ work. The image or text is beamed on to a certain metal cylinder inside the drum by the laser inside the printer, which gives it a static charge. The carbon toner particles, with opposite static charge, get attracted to the drum when it rolls around. It is then transferred to the paper as it passes through that is then heated to fuse the printer toner to the page. If you want to get a good technical explanation including all the ins and outs on how a laser printer works, read on. Information is sent to the printer memory where the data is stored as soon as you press the print button the computer, mobile device, or tablet. After this, the printer starts to warm up. During this process, the corona wire is heating up and gets ready to pass its positive static charge to the drum. A positive charge is created across the whole surface as the drum starts to roll. Thereafter, the laser gets activated and then beam against a series of different mirrors for reflecting across the surface of the drum to imprint the shape of your print. This is done via use of an opposite negative electrical charge. Sitting next to the drum, the hopper and cartridge then release positively charged carbon toner parties slowly on to the drum as it turns. The toner is attracted to any area of negative charge to leave positively charged areas of the drum untouched. The paper is then rolled through the printer by the transfer belt to give it a positive charge. The negative charged tone, as paper passes through the drum, gets attracted to the page in the shape of the print. The toner then gets melted by the hot rollers known as the fuser unit to the paper. The page is printed! If you want to get premium-quality printouts, it is best to go for the amazing laserprinter from Beste that assures you of top performance year after year. It is undoubtedly one of the most power-packed and trusted products in today’s online market. Buying printers from Beste will help you get the best value out of your hard earned money, besides helping you get awesome prints of text, graphics, and images in absolutely no time. It is always recommended to carefully read and analyze product specifications of the printer that you intend to purchase. This will assist you in making the right decision that will ensure improved productivity and returns on investment.
<urn:uuid:e4bbb7fa-5851-439c-9ff7-c22587d9f73c>
CC-MAIN-2023-14
http://www.raonanolab.net/how-laser-printers-work.htm
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943747.51/warc/CC-MAIN-20230321225117-20230322015117-00570.warc.gz
en
0.936085
622
2.609375
3
Camelopardalis | Cancer | Canes Venatici | Canis Major | Canis Minor | Capricornus | Carina | Cassiopeia | Centaurus Cepheus | Cetus | Chamæleon | Circinus | Columba | Coma Berenices | Corona Australis | Corona Borealis | Corvus Crater | Crux | Cygnus | Delphinus | Dorado | Draco | Equuleus | Eridanus | Fornax | Gemini | Grus | Hercules | Horologium Hydra | Hydrus | Indus | Lacerta | Leo | Leo Minor | Lepus | Libra | Lupus | Lynx | Lyra | Mensa | Microscopium | Monoceros Musca | Norma | Octans | Ophiuchus | Orion | Pavo | Pegasus | Perseus | Phoenix | Pictor | Pisces | Piscis Austrinus Puppis | Pyxis | Reticulum | Sagitta | Sagittarius | Scorpius | Sculptor | Scutum | Serpens | Sextans | Taurus Telescopium | Triangulum | Triangulum Australe | Tucana | Ursa Major | Ursa Minor | Vela | Virgo | Volans | Vulpecula Precisely the least, the softest, lightest, a lizard's rustling, a breath, a flash, a moment - a little makes the way of the best happiness. – Friedrich Nietzsche |Area:||201 square degrees| |Co-ordinates:||Right Ascension 22h 30', Declination +45°| |Origin:||Modern (17th Century)| Lacerta is a small northern constellation, invented by Hevelius in the 17th Century. The constellation is rather faint, with no stars brighter than 4th magnitude. The Milky Way 'flows' through part of the constellation, and there is one interesting object, BL Lacertae, although it is only visible in very large telescopes. Lacerta is tucked in between Cygnus to the west and Andromeda to the east, and borders with Cassiopeia and Cepheus to the north and with Pegasus to the south. The constellation's most distinctive feature is a small 'W' of five stars, made from the stars beta, alpha, 4, 5 and 2 Lacertae. More than half the constellations we use today were devised by the Ancient Greeks. Lacerta the Lizard is in an area of the sky fully visible from Ancient Greece, but the Greeks did not consider it interesting enough to merit a constellation. In the 16th - 19th Centuries, astronomers tried to fill in all the gaps betweeen the Greek constellations so that every star would be in a constellation. The Polish astronomer Johannes Hevelius (1611 - 1687) invented seven new constellations, including Lacerta. Hevelius wasn't the only astronomer to consider this piece of sky. Augustin Royer, in 1679, had already invented the constellation Sceptrum et Manus Iustitiae, literally 'the sceptre and hand of justice' from the same stars as Lacerta plus some of the stars from Andromeda. Johann Bode, a century later, invented the constellation Frederici Honores (the Honours of Frederick) to commemorate Frederick the Great of Prussia, but the constellation was not popular. When the International Astronomical Union decided upon the official set of 88 constellations, they chose Lacerta as the constellation for this region of the sky. None of the stars of Lacerta are noticeable enough to have acquired proper names, so they are known either by their Bayer designation (Greek letter plus constellation name) or Flamsteed designation (number + constellation name). |α Lac||Alpha Lacertae||+3.77||80||A1V||Double star| |1 Lac||1 Lacertae||+4.13||1,000||K3II-III| |5 Lac||5 Lacertae||+4.36||500||M0II+B8V| |β Lac||Beta Lacertae||+4.43||160||G8.5IIIbCa1| |11 Lac||11 Lacertae||+4.46||300||K3III| New General Catalogue (NGC) The NGC catalogue is a list of interesting deep-space objects (that is, objects outside our solar system). It was compiled by Dreyer at Armagh Observatory based on the observations of Sir William Herschel. Lacerta has only three objects in the catalogue. |NGC 7243||Open Star Custer||6.4||2,300||Cluster mass is about 450 times that of the Sun.| |NGC 7209||Open Star Cluster||6.7||3,300||About 25 blue and white stars.| |NGC 7296||Open Star Cluster||9.7| The object known as BL Lacertae was discovered in 1929 by Cuno Hoffmeister (1892 - 1968). It was thought to be a variable star, so it was given a standard variable star designation, with two letters followed by the constellation name. Later it was found to be a rather unusual object which is not yet fully understood. It has given its name to a whole class of similar objects throughout the cosmos, which are called BL Lacertae objects, BL Lacs, or just Lacertids. In 1968, John Schmitt was looking at the region using a radio telescope and discovered that BL Lacertae is a strong source of radio waves. Detailed examination later showed that it is not a star at all, but something much odder. There are four main findings: The light that comes from BL Lacertae does not have the 'thermal' spectrum of a hot body which normal stars and galaxies have. Instead it has a 'synchrotron' spectrum, with radiation right across the spectrum, in the radio, light, ultra violet and X-ray regions, with no noticeable emission or absorption lines. Such radiation is associated with electrons being accelerated to near the speed of light in a magnetic field. There are very faint traces of normal stars around BL Lacertae, although they are almost hidden by the glare of the synchrotron spectrum. Redshift studies of these stars show that BL Lacertae is very far away: 900 million light years. That's as far away as distant galaxies. For it to be visible at all from Earth, it must be pumping out vast quantities of energy, the equivalent of an entire galaxy. The variations in brightness which caused it to be originally categorised as a variable star happen very quickly, over the course of a few hours. This indicates that BL Lacertae is very small - changes in an object must start at one point and propagate across it at not greater than light speed, so if a change in brightness happens within a few hours, the object can be at most a few light-hours in diameter, which makes it smaller than our solar system. That may sound big, but it is a small region to be pumping out as much energy as an entire galaxy. So what could be producing that sort of energy? The only known source of that sort of power is the destruction of matter as it falls into a black hole, so this is the current explanation offered by astrophysicists for all BL Lacertae objects. They imagine a giant spinning black hole, with a mass the equivalent of 100 million suns. Orbiting around it is a disc of dust and gas known as an accretion disc. Due to random collisions in the disc, there is a continuous stream of matter falling into the black hole. For reasons not fully understood, there are two 'jets' shooting away from the black hole along the axis of rotation, carrying matter and high energy particles at speeds close to the speed of light. Such jets have been seen coming out of the axis of some distant galaxies. If a jet of a distant black hole were lined up in such a way that we were looking straight into the jet, then the energy would match that of a BL Lacertae object. Since this is the only known cause of something that bright, this is the preferred explanation. But it is not entirely satisfactory since the cause of the jets is not understood. There is currently much research being done on this topic by astronomers and astrophysicists. Extrasolar planets are ones outside our solar system, orbiting other stars. They are a hot topic for astronomers, with new ones being discovered all the time. Because the distances involved are so huge, the planets have to be detected by indirect means, such as by analysing the effect their gravity has on their parent star. One planet had been discovered up to the time of writing within the Lacerta constellation. This star was discovered by the Hungarian Automated Telescope Project (HAT-P), so it has been given the name HAT-P-1 b (the letter b is standard for the first planet discovered in a star system). The project looks for stars which dim regularly as a planet goes in front of them. The information gathered gives the diameter of the planet as well as its orbital period. Doppler shift in the star's spectrum can be used to estimate the mass of the planet. This yields an interesting result: the planet is one of the least dense ever discovered, with a density less than half that of water. Because this planet orbits around its parent star in only four days, it must be very close to the star, so the surface temperature is likely to be far too hot for life as we know it. More extrasolar planets have been discovered recently. Extrasolar Planets Table |Star name or |Year of discovery||Comments| |ADS 16402 B||HAT-P-1 b||0.524||4.465||2006||Density = 0.378 (water = 1) |HAT-P-40||HAT-P-40 b||0.6||4.46||2012||Hot gas giant| |HD 216536||HD 216536 b||1.47||148.6||2015||Superjovian| The space debris which creates a meteor shower usually comes from the tail of a comet, as the Earth crosses the point where the comet has passed previously on its own orbit. Imagine a trail of breadcrumbs; now imagine breadcrumbs travelling at kilometre per second speeds and burning up in the Earth's atmosphere. The meteor shower connected with this constellation is called the Alpha Lacertids, because they appear to radiate from a point in the sky close to the star alpha Lacertae. The meteor shower is visible in the period 3 - 12 July, but does not have an observed maximum. Hourly rates of meteors are typically less than eight.
<urn:uuid:ba62c4d4-2664-404d-81c2-d3b333f6c648>
CC-MAIN-2020-29
https://h2g2.com/edited_entry/A39787023
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657138718.61/warc/CC-MAIN-20200712113546-20200712143546-00118.warc.gz
en
0.908902
2,293
2.625
3
New Antarctic Crustacean Species A new species of Antarctic deep-sea crustacean armed with spines, large claws and the raptorial mouthparts of a predator has been described by the U.K. National Oceanography Centre (NOC) taxonomists. The description of the species has been published in the Zoological Journal of the Linnean Society and is based on specimens collected during a research expedition led by the British Antarctic Survey on board the RRS James Clark Ross in 2016. The joint lead author of this research taxonomist Dr. Tammy Horton from the NOC said, “We were excited when we noticed these newly collected specimens were the same as one collected by scientists on board the RRS Discovery II back in 1937 and kept in the NOC’s Discovery Collections ever since. Having multiple specimens allowed us to finally describe this new amphipod species, 82 years after it was first collected. The enlarged gnathopods (claws), spines along the back and sides of the body, and elongated mouthparts, along with the grasping legs, suggest that this new species is an ambush predator which likely perches on larger seabed-dwelling invertebrates to sit and wait for prey. This species is in the very rarely collected family Podosiridae, which has just two species described to date and is known only from waters deeper than 650 m. Sequencing of the genetic material of the new species suggests that podosirids may be part of a completely different amphipod lineage than they are currently classified in. The new species has been named Acutocoxae ogilvieae after the maiden name of the wife of one of the lead authors, Dr. Oliver Ashford. It was collected from the seabed in the icy waters of the Southern Ocean between 775 and 1,140 m deep.
<urn:uuid:70f4f148-d4f2-4c2a-af63-19c7e1e56cf0>
CC-MAIN-2023-40
https://sea-technology.com/new-antarctic-crustacean-species
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511002.91/warc/CC-MAIN-20231002164819-20231002194819-00245.warc.gz
en
0.960435
392
3.46875
3
CHILDREN are watching too much television, eating junk food and feeling lonely in a society where parents have less time for them. That's how Dr. Sonia Caprio explains a disturbing problem: the nation's children have been gaining weight. Dr. Caprio, an associate professor in pediatric endocrinology at Yale, has spent the last few years looking at markers and predictors of childhood obesity for a National Institutes of Health study. She also contributed to the ''The Yale Guide to Children's Nutrition,'' recently published by Yale University Press. At Yale-New Haven Hospital, she is responsible for the Pediatric Weight Management and Lipid Clinic. There, she works with an exercise physiologist, a nurse, a nutritionist and a social worker to help children who weigh 30 percent to 50 percent more than they should at their age and height. But the clinic can only help a small fraction of the children who are in trouble, Dr. Caprio says. Many parents don't realize that even children who are 10 to 15 pounds overweight are at risk for childhood obesity, related diseases and weight problems that continue into adulthood, she adds. Dr. Caprio talked about her work one day in her office at Yale-New Haven Hospital. Following are some excerpts from the conversation. Q. Why are more and more children overweight? A. I believe there are two factors. The genetic factor is important. It could be that in 30 to 80 percent of cases there is an important genetic factor. But that can't explain the increased incidence of obesity that we're having now, so there must be some environmental factors. What I'm really seeing is that there is basically a lack of good nutrition. There are excess calories, increased fats and lack of exercise. Those factors, I think, are acting on an already predisposed person. Q. Are there societal problems making children being less active? A. I think it's also because of the structure of the family these days. You get home at 6, 7 o'clock. You're tired, there are other things you have to do, something went wrong during the day. And there you are feeding them a hot dog or pizza that's full of fat. Those are extra calories. It's easy to get an extra 100 calories every day, and then you can easily gain 10 pounds. Obviously there is room for improvement. Another thing for a lot of these children is that when they go home, they're alone. Loneliness is not something we want to consider. But a lot of these children, they turn on the TV, and that's company for them. Or the parents are working, so they put on a tape or something. Q. Has there been much research on children and weight? A. No. There should be more people looking into it. Maybe they're just starting to realize how hard it is to deal with the problem when you're an adult, and there is now good data showing that indeed obesity starts very early. Medicine is changing a lot. Not only obesity, but diabetes, hypertension and even cancer should be addressed very early. That's part of preventive medicine. Q. What medical problems do overweight children face? A. Many obese adolescents have high triglicerides and low HDL cholesterol, the good cholesterol. With the increased weight, the risk for type II diabetes is higher. If they are severely obese, obviously, then they have a really hard time. They have sleep apnea. Breathing is sometimes a problem. They have bowed legs because of the weight. Arteriosclerosis starts very early, so we have to intervene if a child has a family history of coronary artery disease. Especially if there is one relative who has had an early heart attack -- before their 60's -- that child is at risk. He should have a fasting lipid profile after the age of 2, and if it's abnormal, the child should be referred to a clinic. The impact of obesity on psychological well-being is terrible in these children. In school they are mistreated and labeled. They get teased and they don't have friends. So they are isolated sometimes. We find a lot of depression in these children. So, I think it's important for them to love themselves and understand that not everybody is going to be slim. Yes, being overweight is not healthy, but even a modest weight loss makes a big difference in your health. One does not have to create the concept that we all have to be twigs to be healthy. Q. Are people aware of how serious extra weight is in children? A. They think the child will outgrow obesity, especially if they're very young. That may well be, but there is a very high chance that the child will stay obese. And obesity in adolescence especially is tracking very well into adulthood. So, I would say take care of the problem now. Q. At what age should parents consider treating their child for a weight problem? A. If I had a child who was 2 or 3 and his weight was off the chart, I'd be alarmed, and try to modify it. Especially since we know now that genetics is playing a role. Say you have a child who is 2 years old and chubby, and you have parents who are overweight or with a history of diabetes. What we should really do is take that child, use very good nutrition and try to make this kid more active -- and bring that child into a normal range. We must prevent excessive weight. Q. What about genetics? Some people are talking about a fat gene. Might that be a future direction in treating this problem?
<urn:uuid:e4dabb33-ed71-4d0f-90dd-d9b51b093dc7>
CC-MAIN-2014-10
http://www.nytimes.com/1997/07/06/nyregion/ways-to-eat-wisely-to-get-active-early-on.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999665814/warc/CC-MAIN-20140305060745-00087-ip-10-183-142-35.ec2.internal.warc.gz
en
0.979116
1,153
3.046875
3
The question naturally arises: “How large a region and how many points must be used in generating sea surface realizations?” Not surprisingly, the general answer is, “It depends on your application.” It is computationally possible to create 2-D surfaces with sufficiently large values in the and directions, but run times are prohibitive. Kay et al. (2011) created 2-D surfaces with = points in each dimension, which sampled the variance spectrum for wavelengths from 200 m gravity waves to 3 mm capillary waves. However, it took 6 hours to create just one surface on a 3 GHz computer. Note also that the storage of this surface requires numbers. Many ray tracing applications need to use tens of thousands of surface realizations to get good statistical averages. Thus, the specific answer for brute-force scientific calculations is usually, “A bigger than you can run on your computer.” This page shows one way to finesse certain calculations so that large- calculations can be avoided. For creating visually appealing sea surfaces for rendering into a movie scene, or perhaps at most is usually adequate. This is because the visual impression of a sea surface is, to first order, determined by the height of the waves, which in turn is governed by the largest gravity waves for the given wind speed. If you are rendering an image, you don’t need to have a finer resolution for the sea surface than maps to an image pixel. For example, if you are going to simulate what a CCD with pixels would record, and you are looking down onto the sea surface from above at an elevation where one CCD pixel sees a patch of the sea surface, then you need to resolve the sea surface with a grid spacing of at most 0.1 m. Modeling a patch of sea surface with a spatial resolution of gives a grid spacing of 0.1 m, which would be adequate for the CCD image simulation. Unfortunately, for accurate scientific calculations of sea surface reflectance, may have to be much larger. This is because the surface reflectance depends to first order on the surface wave slope, and the slope is strongly affected by the smallest waves with spatial scales down to capillary size of a few millimeters. The value of the peak of the Pierson-Moskowitz spectrum is easily obtained from setting and solving for the value of . This gives which corresponds to a wavelength of . Table shows the values of and for a few wind speeds. If we use for the size of the spatial domain, we will resolve the large gravity waves, which contain most of the wave variance. (Keep in mind that density functions do not have a unique maximum: the location of the maximum of a density function depends on which frequency variable is chosen. See the discussion of this on the page A Common Misconception. Differentiating the Pierson-Moskowitz spectrum and using the dispersion relation leads to , which gives 73 m at . However, either version of gives adequate guidance for our present purpose.) Now consider how many points it takes to almost fully resolve, or account for, the variances of elevation and slope spectra when they are sampled for a DFT. For a specific example, take and and use the omnidirectional, or 1-D, part of the Elfouhaily et al. spectrum presented on page Wave Variance Spectra: Examples. This is given by Eq. (5) and the associated equations on that page. This variance spectrum and the corresponding slope spectrum are plotted as the blue curves in the next 3 figures. As we have learned on page Wave Variance Spectra: Theory, the expected variance of the sea surface is given by and the mean-square slope is given by Such integrals usually must be numerically evaluated with the limits of and being replaced by some small value and some large but finite value . The present example uses and , with evaluation points in between these limits. That gives an accurate evaluation of Eqs. (3) and (4) for the spectra. The results are and . Now suppose we sample the spectrum using points, which leads eventually to a sea surface realization with 1024 points. For the fundamental frequency is . This point is shown by the left-most red dot with the black center in Fig. 1. For this and , the Nyquist frequency is , which is shows by the right-most black and red dot. These two end points and the red vertical lines in between show the discrete points where the variance spectrum is sampled. The elevation and slope variances that are accounted for in a sampling scheme with points are given by In the present example, these integrals are and . Thus the finite range of the sampled frequencies includes the fraction of the total variance of the sea surface elevation. However, the corresponding fraction of the sampled slope variance is just . Thus is sampling 98% of the elevation variance but only 43% of the slope variance. This sampling is acceptable if we are interested only in creating a sea surface that looks realistic to the eye. The large gravity waves will be correctly simulated, and that is what counts for visual appearance. However, if our interest is ray tracing to simulate the optical reflectance and transmission properties of the sea surface, then we must also sample almost all of the slope variance. This is because, to first order, reflectance and transmission of light are governed by the slope of the sea surface, not by its height. If we under sample the slope variance, then the generated surface will be too smooth at the smallest spatial scales, and the computed optical properties will be incorrect. The brute-force approach to sampling more of the slope spectrum is to increase . Figure 2 shows the sampling points when . Now the sampled points extend into the capillary-wave spatial scale: the smallest resolvable wave is 0.006 m. (Note that the fundamental frequency is fixed by the choice of , which also fixes the spacing of the samples, .) The elevation variance integral over the sampled ranges is unchanged (we are still missing a small bit of the variance from the very longest waves with frequencies below . However, the slope integral is now . Thus we are now sampling a fraction of the slope variance. The resolution of both the elevation and slope spectra are now acceptable for almost any application. Although using a very large is computationally feasible in one dimension, such a large is computationally impracticable in two dimensions, when we would need a grid of size . In the present example, this would would require of storage for just one real array, as well as a corresponding increase in run time for the FFT. Another approach to resolving the slope variance is therefore needed. As we have just seen, the unsampled frequencies greater than the Nyquist frequency can account for a large part of the slope variance. These frequencies represent the smallest gravity and capillary waves. The amplitudes of these waves are small, so they contribute little to the total wave variance, but their slopes can be large. One way to account for these “missing” waves is to alias their variance into the waves of the highest frequencies. The highest frequency waves that are sampled will then contain too much variance, i.e., they will have amplitudes that are too large for their wavelengths, which will increase their slopes. One way to do this is as follows. We seek an adjusted or re-scaled elevation spectrum such that the integral of over the sampled region equals the integral of the true over the full spectral range. Then sampling the re-scaled spectrum will lead to the same slope variance as would be obtained from sampling the correct spectrum over the entire range of frequencies. We can choose so that the low frequencies are well sampled starting at the fundamental frequency . There is thus no need to modify the low-frequency part of the variance spectrum, which if done, would adversely affect the total wave variance. We want to modify only the higher frequencies of the sampled region, which contribute the most to the wave slope but little to the wave elevation. A simple approach is to take to be a linear function of between the spectrum peak and the highest sampled frequency , and zero elsewhere: is a parameter that depends on the spectrum (i.e., the wind speed), the size of the spatial domain, and the number of samples . We must determine the value of so that this “adds back in” the unresolved slope variance. The added variance will be zero at the peak frequency and largest at the Nyquist frequency. That is, the function will make only a small change to the variance spectrum at the low frequencies, and the change will be largest near the highest sampled frequencies, which is consistent with the idea that the high frequency waves have the largest slopes. (There is nothing physical about the functional form of Eq. (6); it is simply a single-parameter ad hoc function that works reasonably well in practice. Nonlinear functions could be used, e.g. to concentrate more of the variance into the frequencies closest to the Nyquist frequency. However, those functions could have more than one free parameter to determine and, in any case, the end result is the same: a sea surface that reproduces the height and slope variances of the fully sampled spectrum.) To determine we thus have The right-most terms of these equations give (after recalling that for ) Figure 3 shows example 1-D surface realizations created with samples and both the true and scaled variance spectra. The upper two panels reproduce Fig. 1, except that the sampled points of the re-scaled spectra are shown in green. It is clear that the function has added progressively more variance to the higher frequencies. The re-scaled variance spectrum does of course contain somewhat more elevation variance over the sampled region than does the true spectrum. As the green inset number shows, this re-scaling has increased the fraction of sampled/true variance from 0.982 to 1.020. However, the number in the upper-right panel shows that we are now sampling 99.5% of the slope variance, as opposed to 43% for the true spectrum. Having a bit too much total elevation variance is a good tradeoff for being able to model the optically important slope statistics. The row 2 panel shows random realizations of the 1-D surfaces generated from these two spectra (with the same set of random numbers). The surface elevations generated using the true spectrum (red line) and the re-scaled spectrum (green line) are almost indistinguishable at the scale of this figure. These significant wave heights for these two surface realizations compare well with the significant wave height of for a Pierson-Moskowitz spectrum. The row 3 panel shows the surface slopes computed from finite differences of the discrete surface heights. The Cox-Munk along-wind mean square slope is given by , which compares well with the value of 0.032 obtained with the re-scaled spectrum. However, the value obtained from the true spectrum is only 0.022, or 70% of the Cox-Munk value. The bottom two panels replot the 0-10 m sections of the and figures for better display of the details. We thus see that when using the correction to a variance spectrum, we can generate a surface that reproduces, to within a few percent of the theoretical values, both the surface elevation and slope statistics that would be obtained from the underlying true variance spectrum if it were sampled with enough points to fully resolve the elevation and slope variances.
<urn:uuid:8265eb4c-2aca-4e3c-9834-bf23f853257f>
CC-MAIN-2023-23
https://oceanopticsbook.info/view/surfaces/level-2/numerical-resolution
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647810.28/warc/CC-MAIN-20230601110845-20230601140845-00182.warc.gz
en
0.928802
2,517
3.109375
3
Software development has this concept of “loosely coupled” components, which are components that reduce to the absolute minimum their dependence on other components. Actually, the definition is even stricter, saying that components should reduce to the minimum their knowledge of other components: In computing and systems design a loosely coupled system is one where each of its components has, or makes use of, little or no knowledge of the definitions of other separate components. The main advantage of these systems is that they are much easier to manage. For example: - you can change the behavior of one component without breaking the whole system; - you can replace a component without breaking the whole system; - you can easily test a component because it’s isolated from the others Recently, there has been a growing interest in asynchronous communication, like Message Queue or Publish/Subscribe systems, where the component that sends the request doesn’t block waiting for a response. Again, this is the “loose coupling” principle put in practice. There are some producers who produce messages and there are some consumers who consume messages. What makes it loosely coupled is that fact that producers don’t have a clue on who are the consumers and vice-versa. This makes it possible to build applications in completely parallel branches. You can have two independent teams who are completely oblivious of the existence of the other, one developing a producer and another developing a consumer. The application is worthless without these two pieces, but each one can function by itself. The advantages of these systems are well understood and recognized by experienced software developers, but I wonder if the same principles wouldn’t apply to project management in general. One of the most difficult things to manage in a project is task dependencies. That’s where you’ll find the bottlenecks: some people have to stop their work because their tasks depend upon completion of another task. In other words, the tasks are as tightly coupled as they can get: they not only depend on other tasks, they have to know about the other tasks (at least, they have to know which tasks they depend upon and when those tasks finish). What if you could manage the project in a completely loosely-coupled fashion? You would setup a simple rule: everyone in the team must be able to finish their tasks without depending on someone else. This means that when two tasks have a dependency between themselves, you have to mercilessly remove that dependency at all costs by: - Trying to redesign the system so that it can work asynchronously or - Simulating the output of the task you depend upon (in software development, this means using mocks or stubs) If you fail to remove that dependency, then those two tasks must be done by the same person. Now, I won’t lie to you: this comes at a price. Removing the dependencies will probably make the tasks longer, because you have to develop additional mechanisms, like simulating the output of other tasks. Assigning a sequence of tasks to the same person is also a risky move – that person may be doing a series of mistakes but since she doesn’t depend on anyone, you’ll only notice it later than in a typical project. However, if you have a talented small team, it will work really well. It will be like watching several high-speed trains running in parallel, leaving a complete finished component from time to time. Maybe one of the trains is going faster than the others. It doesn’t matter. The project manager just keeps picking the finished components, until they can connect to each other (for example, until you have a producer and a consumer). It’s a great feeling. Try it.
<urn:uuid:00d8cd70-8c94-4779-9885-3208ac3bf986>
CC-MAIN-2017-43
http://www.inospito.net/page/2/
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187825497.18/warc/CC-MAIN-20171023001732-20171023021732-00078.warc.gz
en
0.95969
771
3.21875
3
Electronics and Communications Engineering Project Title “LASER COMMUNICATION SYSTEM ” is given with full details.This Project document may help you for “Mini Projects” or for generating newproject Ideas. Keep viewing our site or subscribe for updates for more B.Tech Final Year Projects and Mini Project Ideas.You can also submit your project Ideas or Share Your Project Abstract with us at Comments Sections. Laser Communication System works on the principle of “Amplitude Modulation” process. In this the amplitude of the carrier is varied according to the instantaneous amplitude of the modulating signal (Input Signal ) “Carrier Signal refers to Lase Beam” “Amplitude refers to Intensity of Laser Beam” “Input Signal refers to audio signal” The intensity of the laser beam is varied according to the instantaneous value of audio signal and the same is sensed by the optical sensor at the receiver. This simple Laser Communication System consists of two sections Transmitter and Receiver. At the Transmitter any audio device can be coupled to the laser light by using a transistor operating in common collector mode. Since, In common collector mode transistor acts as Impedence matching device. Due to this intensity of the laser beam changes proportional to audio signal strength. At the receiver this varying intensity can be sensed by any optical sensors like Light Dependent Resistor (LDR) or photo transistor or Solar cell. The photo transistor is biased and connected to the input of audio amplifier (LM386) which drives the loud speaker. > Full project document will be updated soon. - Wireless TV Head Phone | Engineering Mini Projects | Btech Project Ideas - Sound to Light Converter | Engineering Mini Projects | Btech Project Ideas - Laser Guided Door Opener | Engineering Mini Projects | Btech Project Ideas - Spy Ear | Engineering Mini Projects | Btech Project Ideas - Fire Alarm using LDR | Engineering Mini Projects | Btech Project Ideas - Automatic IR TAP Controller | Engineering Mini Projects | Btech Project Ideas
<urn:uuid:96111d45-a491-463c-9d0a-4b802c941c8d>
CC-MAIN-2014-15
http://blackcap.in/949/laser-communication-system-engineering-mini-projects-btech-project-ideas.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609530136.5/warc/CC-MAIN-20140416005210-00329-ip-10-147-4-33.ec2.internal.warc.gz
en
0.817191
424
2.890625
3
Interesting Questions, Facts and Information - There are a total of 235 general entries. We are selecting 30 for display. Interesting Questions, Facts, and Information Top of South Island. Farewell Spit is a 30km stretch of sand that reaches north-east from the top of the South Is. Southern Alps. This range almost runs the length of the island and has a great affect on the region's weather. Auckland. At least one quarter of the total population of the country lives in or around Auckland. |New Zealand's highest mountain has been known by two names over the years. Can you tell me either one of those names?||New Zealand Geography Mount Cook . Although Mt Cook had a landslide which reduced its height in 1992, it is still the highest in NZ. It is also known as Aoraki, the name by which the Maori people know the mountain. The official name is now Aoraki Mount Cook, gazetted as a compromise. Waikato. The Waikato River is also the longest in NZ. All Blacks. Their uniforms are black in color. The Wallabies are from Australia and the Lions hail from Britain. Queen Elizabeth II. Queen Elizabeth is head of state in New Zealand, which is a member of the Commonwealth. Chinese Gooseberry. The term Kiwifruit did not come into use until the 1970's. The Netherlands. Abel Tasman, the Dutch explorer gave New Zealand its name. Originally Australia was named New Holland. 12. New Zealand lies just west of the international dateline. Wellington. Auckland is the largest city in New Zealand and the major entry point but Wellington is centrally located for both the North and South Islands. Kiwi . The flightless bird is nocturnal and eats worms and other bugs. It has short brown feathers and sharp claws. It can only be found in New Zealand. |The country's worst earthquake was in 1931. When the town was rebuilt after that earthquake, what style was used?||All About New Zealand Napier/HawkesBay. It killed more than 250 people, devastating the area around the Napier region. This occurred in 1931. Bill English. Bill English is a member of the National Party. Gisborne. Gisborne is the easternmost place in New Zealand. It is full of beautiful beaches, and personally, I think it is the best place in New Zealand. Silver Fern. The Silver Ferns is also the name of the New Zealand netball team. It is also the icon on a lot of New Zealand sports teams uniforms, e.g the All Blacks. |What is the bird found only in New Zealand that is famous for its cheekiness and intelligence, and can be found in the South Island?||All About New Zealand Kea. The Kea is the world's only alpine parrot. Found in the Southern Alps, they have been known to wreck heaps of things like the doors of your car and the aerial, or damage trampers' backpacks. Aotearoa. It means 'Land of the long white cloud'. The Queen gives the right for all Maoris to have free range to any land the British buy. Other things in the Treaty were, The Chiefs give to the Queen pre-emption, and Maori have rights/privileges as British subjects. There have been a few problems with the 'Treaty' but if you have a grievance then you can take your claim to 'The Waitangi Tribunal' who will help you to fix it. Treaty of Waitangi. It was signed on 6th February, 1840. There were 512 signatures altogether - 482 on the Maori version and 30 on the English version. Auckland. Russell was capital for a short period in 1840, while Auckland was capital from 1840 - 1845. |It is the first urban area in the world to see the sun each morning. What is the longitude of Gisborne ?||A Mixture of New Zealand 178 degrees east. My atlas says 178.02, I have had information from fellow players saying anywhere from 178.01 through to 178.10. |We know that Invercargill is the southern most of New Zealand's cities. However, who was it named after ?||A Mixture of New Zealand William Cargill . William Cargill was one of the Scottish pioneers. He was heavily involved in the Otago and Southland area with settlement and administration. |According to the Guinness Book of Records, the world's steepest street is located in Dunedin. What is its name ?||A Mixture of New Zealand Baldwin Street . The gradient is 38 degrees.
<urn:uuid:8ad94a58-b588-409b-b1c1-073f610f1734>
CC-MAIN-2013-20
http://www.funtrivia.com/en/Geography/New-Zealand-4376.html
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705284037/warc/CC-MAIN-20130516115444-00083-ip-10-60-113-184.ec2.internal.warc.gz
en
0.967896
987
2.6875
3
Marshall, like many of his contemporaries, used long titles. §1. How should one price two goods that share common elements in their costs (e.g., a machine or management time) but are sold into different markets (e.g., passengers and freight on ships). Pricing from the cost side is tricky. Pricing from the demand side (“what the market will bear”) makes more sense, but it’s ultimately linked to costs, since competing firms selling similar goods and services must also cover their costs. §2. A manufacturer will want to allocate marketing expenses among goods in proportion to their marketing “needs” but that manufacturer may cut that allocation in the most competitive markets (e.g., for loss leaders). Manufacturers who achieve economies of scale will have falling per unit costs but rising marketing costs based on trying to differentiate similar goods (e.g., cola advertising). §3. Insuring against risk is often wise but allocating those costs can be difficult when they rise and fall with other actions. The price of fire insurance, for example, will fall if a building is built to reduce fire risks. Are those additional building costs part of construction or insurance? §4. Marshall points out that risk aversion (the loss of bad outcomes outweighing the gains from good outcomes) is more prevalent than risk seeking behavior (p332): It is true that an adventurous occupation, such as gold mining, has special attractions for some people: the deterrent force of risks of loss in it is less than the attractive force of changes of great gain, even when the value of the latter estimated on the actuarial principle is much less than that of the former… But in the large majority of cases the influence of risk is in the opposite direction; a railway stock that is certain to pay four per cent. will sell for a higher price than one which is equally likely to pay one or seven per cent. or any intermediate amount. §5. In some cases, the cost of reproducing a good will be similar to its cost of production, with both closely tracking its price, but that relation weakens if production technologies or input prices have changed, and it breaks down if demand races ahead of supply (e.g., “quinine on a fever-stricken island”). Marshall ends the chapter with the advice that non-economic readers skip the next seven chapters (!), but I won’t. Fasten your seatbelts! This post is part of a series in the Marshall 2020 Project, i.e., an excuse for me to read Alfred Marshall’s Principles of Economics (1890 first edition/1920 eighth edition), which dominated economic thinking until Van Neumann and Morgenstern’s Theory of Games and Economic Behaviour (1944) and Samuelson’s Foundations of Economic Analysis (1946) pivoted economics away from institutional induction and towards mathematical deduction.
<urn:uuid:ab4733dc-a356-4250-809a-1e3da0c222bb>
CC-MAIN-2023-40
https://one-handed-economist.com/?p=2248
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510238.65/warc/CC-MAIN-20230927003313-20230927033313-00519.warc.gz
en
0.952721
607
2.71875
3
As a therapeutic agent, most people are familiar with the palliative effects of the primary psychoactive constituent of Cannabis sativa (CS), Δ9-tetrahydrocannabinol (THC), a molecule active at both the cannabinoid 1 (CB1) and cannabinoid 2 (CB2) receptor subtypes. Through the activation primarily of CB1 receptors in the central nervous system, THC can reduce nausea, emesis and pain in cancer patients undergoing chemotherapy. During the last decade, however, several studies have now shown that CB1 and CB2 receptor agonists can act as direct antitumor agents in a variety of aggressive cancers. In addition to THC, there are many other cannabinoids found in CS, and a majority produces little to no psychoactivity due to the inability to activate cannabinoid receptors. For example, the second most abundant cannabinoid in CS is the non-psychoactive cannabidiol (CBD). Using animal models, CBD has been shown to inhibit the progression of many types of cancer including glioblastoma (GBM), breast, lung, prostate and colon cancer. This review will center on mechanisms by which CBD, and other plant-derived cannabinoids inefficient at activating cannabinoid receptors, inhibit tumor cell viability, invasion, metastasis, angiogenesis, and the stem-like potential of cancer cells. We will also discuss the ability of non-psychoactive cannabinoids to induce autophagy and apoptotic-mediated cancer cell death, and enhance the activity of first-line agents commonly used in cancer treatment. A syringe loaded with a dose of CBD oil is shown in a research laboratory at Colorado State University in Fort Collins, CO. (Credit: AP Photo/David Zalubowski) A World Health Organization (WHO) report has found no adverse health outcomes but rather several medical applications for cannabidiol, a.k.a. CBD, despite U.S. federal policy on this cannabinoid chemical. According to a preliminary WHO report published last month, naturally occurring CBD is safe and well tolerated in humans (and animals), and is not associated with any negative public health effects [PDF]. Experts further stated that CBD, a non-psychoactive chemical found in cannabis, does not induce physical dependence and is “not associated with abuse potential.” The WHO also wrote that, unlike THC, people aren’t getting high off of CBD, either. “To date, there is no evidence of recreational use of CBD or any public health related problems associated with the use of pure CBD,” they wrote. In fact, evidence suggests that CBD mitigates the effects of THC (whether joyous or panicky), according to this and other reports. The authors pointed out that research has officially confirmed some positive effects of the chemical, however. The WHO team determined that CBD has “been demonstrated as an effective treatment for epilepsy” in adults, children, and even animals, and that there’s “preliminary evidence” that CBD could be useful in treating Alzheimer’s disease, cancer, psychosis, Parkinson’s disease, and other serious conditions. In acknowledgement of these kinds of discoveries in recent years, the report continued, “Several countries have modified their national controls to accommodate CBD as a medicinal product.” But the U.S., the report noted, isn’t one of them. As a cannabis component, CBD remains classified as a Schedule I controlled substance, meaning it has a “high potential for abuse” in the federal government’s view. Nevertheless, the “unsanctioned medical use” of CBD is fairly common, experts found. For many CBD users in the U.S., the substance’s mostly unsanctioned and illegal state creates problems, especially as a wave of online (mostly hemp) and store-bought CBD oils and extracts have allowed patients to take the treatment process–and the risks involved in buying unregulated medicine–into their own hands and homes. While CBD itself is safe and found to be helpful for many users, industry experts have warned that not all cannabis extracts are created equally, purely, or with the same methods of extraction. And while reports of negative reactions to pure CBD are very few and far between, researchers are able to say that the cannabinoid wouldn’t be to blame alone. “Reported adverse effects may be as a result of drug-drug interactions between CBD and patients’ existing medications,” they noted. As the cannabis reform nonprofit NORML reported, the WHO is currently considering changing CBD’s place in its own drug scheduling code. In September, NORML submitted written testimony to the U.S. Food and Drug Administration (FDA) opposing the enactment of international restrictions on access to CBD. The FDA, which has repeatedly declined to update its position on cannabis products despite a large and ever-growing body of evidence on the subject, is one of a number of agencies that will be advising the WHO in its final review of CBD. Perhaps this time around the FDA will listen, and learn something. The report was presented by the WHO’s Expert Committee on Drug Dependence, and drafted under the responsibility of the WHO Secretariat, Department of Essential Medicines and Health Products, Teams of Innovation, Access and Use and Policy, Governance and Knowledge. Cannabidiol induces programmed cell death in breast cancer cells by coordinating the cross-talk between apoptosis and autophagy. Breast cancer is the second leading cause of cancer-related death in women in the United States (1). Conventional treatment options are often limited by toxicity or acquired resistance, and novel agents are needed. We analyzed the effects of the Cannabis sativa constituent, cannabidiol (CBD), a potent, natural compound with reported activity in breast cancer cell lines, and elucidated its effects on key neoplastic pathways. CBD belongs to the cannabinoid family, a group of pharmacologically active compounds that bind to specific G-protein–coupled receptors (2). Phytocannabinoids are plant-derived products from Cannabis sativa; endogenous cannabinoids are made in animal and human tissues; and synthetic cannabinoids are laboratory produced. The G-protein–coupled receptor CB1 is found mainly in the brain and nervous system, whereas CB2 is expressed predominantly by immune cells (3). Recent data suggest that some cannabinoids also signal through the vallinoid receptor (4), whereas others may function in a receptor-independent manner (3). Cannabinoids can modulate signaling pathways central to the growth and spread of cancer. They inhibit cell-cycle progression and chemotaxis, and block angiogenesis (5). Recent studies have shown that cannabinoids also induce autophagic cell death (6). Δ9-tetrahydrocannabinol (THC) is one of the best-characterized cannabinoids; however, its therapeutic applications are limited by its psychoactive effects. We focused our work on CBD, a phytocannabinoid devoid of these properties (3). Although CBD is reportedly effective against various tumors, its molecular mechanism of action is not fully characterized. CBD is cytotoxic to gliomas and inhibits tumor cell migration in vitro (7–9). In addition, CBD induces apoptosis in human leukemia cell lines by activating classical caspase pathways, and enhancing NOX4 and p22 (PHOX) function (10). A recent study reports that CBD inhibits breast cancer growth (11) and downregulates ID1, a regulator of metastasis in breast cancer cell lines (12). Furthermore, CBD, in conjunction with THC, induces programmed cell death (PCD) in glioma cells (13). PCD, a cell suicide program critical to development and tissue homeostasis, can be classified according to the morphology of a dying cell. Apoptosis is a type I PCD involving caspase activation, phosphotidyl serine inversion and DNA fragmentation (14). More recently, autophagy, a process traditionally considered a survival mechanism, was also implicated as a mode of PCD, when excess de novo–synthesized, double membrane-enclosed vesicles engulf and degrade cellular components (15). The relationship between apoptotic and autophagic death is controversial (16). They may cooperate, coexist, or antagonize each other to balance death versus survival signaling (16). We found that CBD induced both apoptosis and autophagy in breast cancer cells, and evaluated further the effects of CBD on the complex interplay between these 2 types of PCD in breast cancer cell lines. Characterizing more precisely the manner by which CBD kills breast cancer cells will help define the optimal applications of CBD as a cancer therapeutic. Cannabidiol (CBD), a major nonpsychoactive constituent of cannabis, is considered an antineoplastic agent on the basis of its in vitro and in vivo activity against tumor cells. However, the exact molecular mechanism through which CBD mediates this activity is yet to be elucidated. Here, we have shown CBD-induced cell death of breast cancer cells, independent of cannabinoid and vallinoid receptor activation. Electron microscopy revealed morphologies consistent with the coexistence of autophagy and apoptosis. Western blot analysis confirmed these findings. We showed that CBD induces endoplasmic reticulum stress and, subsequently, inhibits AKT and mTOR signaling as shown by decreased levels of phosphorylated mTOR and 4EBP1, and cyclin D1. Analyzing further the cross-talk between the autophagic and apoptotic signaling pathways, we found that beclin1 plays a central role in the induction of CBD-mediated apoptosis in MDA-MB-231 breast cancer cells. Although CBD enhances the interaction between beclin1 and Vps34, it inhibits the association between beclin1 and Bcl-2. In addition, we showed that CBD reduces mitochondrial membrane potential, triggers the translocation of BID to the mitochondria, the release of cytochrome c to the cytosol, and, ultimately, the activation of the intrinsic apoptotic pathway in breast cancer cells. CBD increased the generation of reactive oxygen species (ROS), and ROS inhibition blocked the induction of apoptosis and autophagy. Our study revealed an intricate interplay between apoptosis and autophagy in CBD-treated breast cancer cells and highlighted the value of continued investigation into the potential use of CBD as an antineoplastic agent.
<urn:uuid:aa4bb538-654d-4369-b299-9ae138283d80>
CC-MAIN-2023-14
https://cancerzen.com/category/cancer-resources-posts/cbd/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949689.58/warc/CC-MAIN-20230331210803-20230401000803-00051.warc.gz
en
0.936024
2,176
2.71875
3
Laser Skin Resurfacing What is a laser ? Laser stands for Light Amplification by the Stimulated Emmission of Radiation.Laser work by producing an intense beam of bright light that travels in one direction. The laser beam can gently vaporize and/or ablate skin tissue to improve wrinkles,scars,blemishes,seal blood vessels or cut skin tissue. What is skin resurfacing ? Laser resurfacing to improve cosmetic flaws,such as wrinkles,acne scars,aging and sun-damaged skin,is the latest scientific breakthrough in the skin rejuvenation. By this procedure undesired skin cells and wrinkles disappears and are replaced by fresh skin cells. Erase fine lines and wrinkles of the face. Soften pucker marks and frown lines. Repair smoker's lines . Remove brown spot and splotchy,uneven skin colour. Improve skin tone and texture. Improve and flatten scars. Improve crow's feet around the eyes. Smooth and lighten eye skin. How does the co2 laser works ? It delivers short bursts of extremely high energy laser light.This technique actually vaporize the undesired skin tissue revealing fresh skin underneath. The laser's high focused aim enable the derma surgeon to gently remove the skin surface with low risk of scarring and complication in properly selected patient.
<urn:uuid:2118a254-d944-41b9-88e2-600fa0ff54ce>
CC-MAIN-2023-40
http://shivaniskinclinic.com/co2laser.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511002.91/warc/CC-MAIN-20231002164819-20231002194819-00730.warc.gz
en
0.842844
294
2.625
3
One of England's leading astrophysicists. Thomas Gold, will become a professor of Astronomy here on Feb. 1, Dean Bundy announced yesterday. Gold is at present Visiting Professor at Cornell University, where he has been teaching cosmic radiation and radio-astronomy. He is one of England's Cambridge group of cosmologists which put forward the thesis of continuous creation of matter in the universe. Gold has also been responsible for a number of mechanical explanations of physical phenomena, having worked out the mechanics of a possible shifting of the north and south poles. The shifting of the pole is one hypothesis advanced to explain how ice once covered regions now in the tropics. Gold has also demonstrated the possibility that dark regions on the moon are great dust layers, rather than massive flows of lava and has advanced an explanation of their origin. These dust clouds could have been formed, he said, by the constant bombardment of meteors pulverizing the surface. For the past four years Gold has been Chief Assistant to the Astronomer Royal of Great Britain, making important studies of cosmic rays. He entered astronomy less than ten years ago, for until then he had been studying the ear's ability to analyze sound waves by their frequency. His first paper in astronomy was "The Steady-State Theory of the Expanding Universe," in collaboration with H. Bondi, in 1948. Gold was born in Austria in 1920, but now is a citizen of Great Britain. He received the A.B. degree in Mechanical Science from Cambridge University in 1942, the M.A. degree in 1946 and became a Fellow of Trinity College in 1947. Cecilia Payne-Gaposhkin, chairman of the Department of Astronomy, said yesterday that the exact nature of his work here has not yet been decided, but that he will probably teach a course next semester relating to some aspect of his recent research.
<urn:uuid:01cbc1a4-e2da-4a30-b69a-8381a5359eea>
CC-MAIN-2017-43
http://www.thecrimson.com/article/1957/1/18/british-astronomer-thomas-gold-to-join/
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823839.40/warc/CC-MAIN-20171020063725-20171020083725-00216.warc.gz
en
0.977053
385
2.78125
3
Dr. Seuss Week at Liddle Bites Play Cafe! March 2 - 6 On Dr. Seuss Day, it is customary to read a favorite book with your child. It could be one of Dr. Seuss’s books or it could be another children’s book author. The whole point of the day is to engage children in reading and to get them to read on a regular basis. Dr. Seuss Day is held annually on March 2, Dr. Seuss Day is a holiday that celebrates the birthday of Theodor Seuss Geisel - better know as Dr. Seuss. From March 2 - 6 we will have Dr. Seuss books available to read as well as some FREE fun and sticky crafts! Come join the fun! (During open play hours) While supplies last.
<urn:uuid:4720374f-a1e4-4903-87d2-1ceb38113822>
CC-MAIN-2023-23
http://www.liddlebites.com/past-events.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646652.16/warc/CC-MAIN-20230610233020-20230611023020-00260.warc.gz
en
0.962498
174
2.640625
3
Parents get upset when kids got some skin changes as they think it is rash. But not all skin change is a rash. If you suspect it is a rash then get some pediatric advice. In most cases those changes are just a dryness in baby skin. Because babies are more prone to get skin dry. In this condition just needs a extra care of their skin products and hydration. Some baby products tend to increase skin dryness. Soap also gives some dryness. Baby's skin is very soft and still mutating so it can loose water through skin. When choosing baby skin products consider mildness and pH levels of them. Specially bathing stuff like shampoo and soap. Bubble bath also a key to skin dryness in kids. Another reason for dry skin is less water intake of babies and toddlers. If they drink enough water skin will well hydrated and will protect becomes dry. Most parents face difficulty in feeding water to kids. Preparing pure natural fruit juices is a good option. Soft baby skin can't hold much sun. So avoid sunbathing for babies and toddlers. Excessive exposure to sun will dry up skin and will get sun burning too.If your kid has dry skin apply some baby moisture lotion or cream. It will prevent some dryness. Together in next pediatric visit get an advice regarding babies dry skin.
<urn:uuid:1814a3b0-8d8c-4496-96de-44c44372e941>
CC-MAIN-2017-47
http://favoriteeverbook.blogspot.com/2016/01/
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934808254.76/warc/CC-MAIN-20171124142303-20171124162303-00672.warc.gz
en
0.945338
273
2.578125
3
A method based on solid principles At the basis of the method there is knowledge of the system osteo-articular, biomechanical laws, a new conception of movement and the use of innovative equipment How does the body move? The movement, coordinated and controlled by the nervous system, takes place in the structures, that is, the frame constituted by the myo-bundle-skeletal system. The muscles and tendons activate the bones, articulated together through cartilages and ligaments. The rest of the body is in solidarity thanks to the stretched beams, making the body assume different positions in relation to the movements performed. What happens if the movement is not correct? Any change in the position of the structures, which is regulated by biomechanical laws similar to those of physics, affects the other end. If the movement of a joint is disturbed, this has repercussions on the connective tissue with continuity, because the characteristic of man to move in an upright position, involves extremely meticulous interventions to adapt the balance.
<urn:uuid:861eec4a-b608-4d6f-94b3-4c92214a7e28>
CC-MAIN-2020-29
https://en.bodycodesystemeducationonline.com/bodycode-system
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657176116.96/warc/CC-MAIN-20200715230447-20200716020447-00353.warc.gz
en
0.925551
212
3.484375
3
1 P1: Explain the role of effective communication and interpersonal interaction in a health and social care context. 1.1 1: Introduction 1.1.1 Explain what is meant by effective and interpersonal communication 184.108.40.206 Provide details of the different forms of communication, link each communication form to an example using the health and social care sector. 220.127.116.11.1 Example: Good body language is an effective form of communication. A care worker for example would turn and face the individual that they are working with as this may help them to better understand, this is also more professional. 18.104.22.168.1.1 Example: Proximity is where an individuals personal space is respected. A care worker must be able to enter someones personal space without dominating. 2 P2: Discuss theories of communication 2.1.1 How well do the two communication theories explain communication? 22.214.171.124 Consider all the different forms of communication discussed in your P1, can the theories link in with any of these? How or How not may they link? 3 M1: Assess the role of effective communication and interpersonal interaction in health and social care with a reference to theories of communication 3.1.1 Look at all the strengths and weaknesses of eveything that your have included in your work for P1 and P2 126.96.36.199 Take into consideration how effective you think the different forms of communication are and how good you think the theories are at explaining communication.
<urn:uuid:1ac615ae-5690-495d-b387-ce1635dabca3>
CC-MAIN-2020-29
https://www.goconqr.com/mindmap/6542808/unit-1-effective-communication-assignment-1
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655933254.67/warc/CC-MAIN-20200711130351-20200711160351-00306.warc.gz
en
0.923889
323
3.421875
3
A phrasal verb is formed when a verb combines with a preposition (at, on, over) or an adverb or both. This preposition or adverb is called a particle. Some examples of particle are at, in, away, back, down, off, on, over, up. Such a combination creates a new verb that has its own special meaning. Most phrasal verbs are two-word phrases. There are phrasal verbs that consist of three words. - He lived off his parents until he got married. (Phrasal verb is lived off; lived is a verb; off is a preposition. Meaning of this phrasal verb: depended on someone or something for money, food, etc.) - Her dog was knocked down by a bus. (Phrasal verb is knocked down; knock is a verb; down is an adverb. Meaning: injured or killed someone or an animal with a vehicle.) - She can't put up with her boyfriend for long. (Phrasal verb is put up with; with is a preposition; up is an adverb. Meaning: to tolerate someone or something that is bad, annoying, etc.) Phrasal verbs are described as idiomatic, that is their meanings cannot be arrived at by looking at the individual words that make up the phrasal verb. - I look forward to get away this summer. (The phrasal verb get away means escape or go somewhere for a holiday. It consists of the verb get and the adverb away is a particle.) - I'll speak up, so those of you at the back can hear me. (The phrasal verb speak up means speak louder. It consists of the verb speak and the adverb up is a particle.) Some phrasal verbs retain the meaning of the original verb while some others have meaning completely different to the original verb. - I asked them to come in. (The phrasal verb come in means enter which is easily understood as the meaning of the word come is very familiar.) - The deal fell through at the last minute. (The phrasal verb fell through means not completed successfully which is different in meaning to the verb fell.) Phrasal verbs can be separable or non-separable. The words that make up a phrasal verb can be separable or non-separable. When it is separable, a noun or a pronoun object comes between the verb and the particle. If a phrasal verb is non-separable, a noun or pronoun object always comes after the particle and verb that make up the phrasal verb. More details can be found in the individual sections:
<urn:uuid:0d721ef8-3928-4f0b-8cea-4316efdcc0bf>
CC-MAIN-2020-24
http://www.myenglishgrammar.com/lesson-20-phrasal-verbs.html?tmpl=component&print=1
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347410352.47/warc/CC-MAIN-20200530200643-20200530230643-00289.warc.gz
en
0.973024
567
3.734375
4
The Advantages And Disadvantages Of Global Alliances Tourism Essay As a matter of survival, airlines within the current environment are constantly reviewing and altering their strategies. An important component of any airlines’ strategy to remain viable and maintain competitive advantage in today's setting is to pool resources and share risk, known as an alliance. A broad definition of an alliance that occurs in the aviation industry is the “collaboration between two or more firms that retain their autonomy during the course of their relationship” (Kleymann & Seristö, 2004). To that end, there are certain variations of airline alliance in vogue today, in particular the Global Airline Alliance. Starting with a synopsis and identification of these alliance groups, the discussion will move to a selection and analysis of benefits and shortcomings that can be associated with global alliances from a business and consumer perspective. From here, an appreciation will be gained of the major airline alliances and typical rationale of alliance strategies. Currently, the most popular forms of coalition in the airline business are the non-equity marketing alliances known as Airline Alliance Groups (Kleymann & Seristö, 2004) or Global Multicarrier Alliances (Cools & Roos, 2005). At the present time, the main global multicarrier alliance networks are Star Alliance, One World, and Skyteam (UBM, 2010). These alliances are predominantly a massive global network of multilateral codesharing and joint resource Air Service Agreements (ASA’s) between carriers. This allows a central point of contact for the passenger to “ensure a convenient, smooth and efficient worldwide travel experience” (Star Alliance, 1997). Although individual airlines are aligned under the umbrella of a single corporate entity, distinct airline brand identities and cultures are retained. These alliances have set out to revolutionise seamless air travel for the international passenger from hub to hub and beyond. Additionally, the synergies created were only possible due to astute governance of previously implausible collaboration. To that end, airline conglomerates now understand “The best way to generate real business growth and expansion is by forging the appropriate strategic partnerships” (Borovich & Yeheskel, 2001). From an airline business perspective, membership in a global alliance has one distinct, instantaneous and strategic advantage. Almost overnight, all member airlines’ geographic route structures will have expanded without costly capital investment in infrastructure and assets. This allows airlines to service routes that were previously deemed non-profitable or inaccessible, albeit on other alliance members’ aircraft. This “complementary alliance” (Oum & Park, 1997, as cited in Chen & Ross, 2000, p. 328) has the flow on effect of generating untapped markets within the domestic environment and yielding higher load factors for all alliance members aircraft operations. Henceforth, this produces larger revenues which in turn diminishes overhead costs and maintains more efficient airlines by lowering unit cost base (Doganis 2001, p. 76). While this contributes to diversification and larger profit margins for collaborating airlines, the traveller can be confident airfare cost will remain relatively reasonable assuming competition remains viable on any given route. This is a beneficial outcome for all involved, both airline businesses and the consumer. A comparable example where alliances between two airlines operating on the same route is however, considered anti-competitive (Chen & Ross, 2000, p 328). Here the competing airlines could strike a codeshare accord, typically after a tenuously long and protracted battle attempting to gain market share. This is routinely known as a “parallel alliance” (Oum & Park 1996, p. 190), however this is unfortunately likely to result in cartel type price fixing. This form of alliance generally benefits the airlines as it narrows competition and has a propensity to create a higher demand for a particular service, hence higher airfares (Chen & Ross, 2000, p 328). Conversely, the pre-alliance scenario utilising “capacity dumping” (NZ Parliament, 2006), where supply exceeds demand, only profits the consumer with ridiculously low and unsustainable airfares. This invariably serves to strengthen the dominant market leader’s position by financially eliminating the competition in the long term. These types of alliance are inherent of predatory behaviour with very little consumer benefit and require antitrust immunity (Bilotkach, 2005, p. 168). An example of this type of arrangement within the global alliance networks does exist, although on the exceedingly competitive North Atlantic route between Lufthansa and United Airlines (Kleymann & Seristö, 2004, p. 23). While codesharing is one weapon with which to condense costs, create better margins and maintain a reasonably priced service, it is not the only resource available to benefit allying partners and the consumer. One only needs to visit any of the global airline network’s websites to see a large scale joint marketing experience. Consequently, “Extensive market presence plays an essential role in major airlines’ plans for survival and prosperity” (Kleymann & Seristö, 2004, p. 113), and this influence is an effective tool when multiple powerful brands are combined. For the smaller airlines within the alliance groups, association with some of the mega-carriers alone is a sufficient marketing device to increase recognition and augment passenger numbers. This is simply a case of “if passengers do not find you, they will not fly you” (Bammer, 2000, as cited in Kleymann & Seristö, 2004, p. 121). For the bigger carriers in the group, enhanced economies of scale (Doganis, 2001, p. 76), scope and density (Kleymann & Seristö, 2004, p. 39) beckon, to provide growth quickly while mitigating a host of regulatory and economic barriers. This coincides with the global alliance concept “To contribute to the long-term profitability of its members beyond their individual capabilities” (Star Alliance, 2010, p. 6). Another advantage of such extensive market sway is the collective consumable and asset purchasing power. Doganis states, the Star Alliance group is estimated to save between five to seven percent each year with this strategy (2001, p. 78). In contrast, these combined marketing regimens can be inflexible and force a loss of individual brand identity. As the global alliance brand builds its own characteristics, it will be perceived by the customer to deliver a certain expectation, and if not all of the alliance members fit the model, they may be forced to compromise their own identities to conform, or risk being extricated. This is known as the “domino effect” (Kleymann & Seristö, 2004, p. 17). The airlines are not the sole profiteer from this vast marketing onslaught. Customer satisfaction, retention and relationship quality is the target of any marketing strategy, and with immensely large global brands and reputations at risk, standards will always be under scrutiny. The consumer perception of these alliance groups is that of a “seal of quality” (Kleymann & Seristö, 2004, p. 39), and all members are logically required to exact some consistency over the service spectrum. To that end, the global alliance groups have combined value adding resources to meet or exceed the expectations of the “high value international traveller” (Star Alliance, 2010, p. 6). Some pertinent examples are: priority check-in, lounge access, additional baggage allowances, priority boarding, global ticketing, common terminals and priority baggage handling. As aforementioned, the consistency and variation with which these additional benefits are delivered can provide a potential drawback. Products vary from brand to brand, for example; Air New Zealand has a premium economy seat (Star Alliance, 1997), of which not all airlines utilise. A customer that purchases this seat flying from New Zealand to Germany with alliance codeshare partner Lufthansa (McCaw, 2010), would in all likelihood be downgraded to an economy seat from England or the United States. Furthermore, differing cultures can also play a role with service delivery. Once again, the customer flying from New Zealand to Germany may enjoy the relaxed Kiwi attitude, but may be overwhelmed by the clinical and formal German approach, or vice versa. Henceforth, Kleymann and Seristö suggest successful brand image and customer fulfilment is particularly relevant to quality and consistency of service (2004, p. 121). Global alliances offer many joint benefits to consumers from airlines prospering within their own niche, which could not be possible without reliance on international partners. While the phenomenon of globalisation is a reality and people seek to condense and simplify work, time and travel experiences, global airline alliances fit the mould as a reaction to seek balance. At present, the rules of international aviation preserve sovereignty and do not endorse a truly competitive environment. While grandfathering provisions of landing rights at major airports and governmental influence in survivability of flag carriers ensues, the only room for growth from independents is to collude. At this point in time, global alliances serve the needs of both consumers and airline businesses. As with every decision, there are good and bad consequences and not all choices will gratify everyone. Global alliances endeavour to satisfy the majority, while sustaining the future of the alliance members to provide a useful service. Until all nations relax rules around freedoms of the air and airline foreign ownership, so as to furnish a genuine open skies policy, these mega-conglomerates will flourish. Word Count: 1343 Need an essay? You can buy essay help from us today!
<urn:uuid:6672e213-ee25-4615-9961-c4533dc39a91>
CC-MAIN-2013-48
http://www.ukessays.com/essays/tourism/the-advantages-and-disadvantages-of-global-alliances-tourism-essay.php
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163933724/warc/CC-MAIN-20131204133213-00023-ip-10-33-133-15.ec2.internal.warc.gz
en
0.911975
1,962
2.59375
3
Juneteenth is the oldest known celebration commemorating the ending of slavery in the United States. Traditionally Juneteenth is known as a cultural event that celebrates the emancipation of slaves in America in 1865. Brought to Kansas City in 1980 by Horace M Peterson III, founder of the Black Archives of Mid-America INC, Juneteenth is an annual heritage celebration and platform that celebrates the emancipation of enslaved Africans in America and provides the backdrop to pay tribute to the founders of our community. 2023 Events & Activities The health and safety of our community are a top priority. Due to the COVID-19 pandemic, many Juneteenth events have moved online. During each event and activity, we are taking time to remember loved ones who have been impacted. Activities and Events Coming Soon! If the Emancipation Proclamation was signed by Abraham Lincoln in 1863 why weren’t slaves freed until 1865...??
<urn:uuid:15da7892-9786-4f02-b0a9-85fc9c6cc5a5>
CC-MAIN-2023-23
https://www.juneteenthkc.com/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649302.35/warc/CC-MAIN-20230603165228-20230603195228-00365.warc.gz
en
0.959325
191
3.125
3
In the space of a decade in the early 16th century, three teenagers succeeded to the most powerful thrones in Europe and ruled over three-quarters of the continent and two-thirds of its people. The intense competition between them generated constant wars, propelled the reformation forward and moved the focus of the cultural Renaissance northwards from Italy. Henry VIII of England, Francis I of France, and Charles V of Spain and the holy Roman empire filled such large canvases, both literally and figuratively, that historians long ago pegged them as "new monarchs". Ruling directly with professional advisers, more efficient bureaucracies and larger armies, they subdued rival aristocrats and planned the absolutist monarchies of the 17th and 18th centuries. And yet. These two new textbooks in Renaissance history tell a common story of resilient aristocracies, enduring local traditions and largely conservative monarchs who governed more by the seat of their robes than by proto-absolutist theory. In Renaissance Monarchy , Glenn Richardson compares Henry, Francis and Charles as military leaders, governors and patrons. He compares each monarch's handling of these three areas, explaining the traditional structures within which they had to work, the success or failure of their efforts to establish both personal authority and a dynasty, and the way each took the others as a model and rival. The negotiations of each with the others and with his own, often factious, aristocrats is clearly described, and Richardson conveys considerable contextual information on English, French, Spanish and Dutch society without weighing down the narrative. It is genuinely transnational, interdisciplinary and comparative, and Richardson's skill at conveying the dynamic between structures and personalities makes it a particularly readable, useful and persuasive textbook. In Renaissance and Reformation France , six authors contribute chapters on 16th-century French social structure, economy, politics, gender and religious life before, during and after the wars of religion. Editor Mack Holt opens with a chapter sketching the cultural and political situation c. 1500, and concludes by carrying the collection's themes forwards to 1648, when royal pretensions triggered revolt. The separate chapters are effectively woven into a single text and style, and the authors' treatment of themes is ample enough to make this a useful text for courses in early-modern European history generally, and not simply the history of France. Both texts are advanced surveys aimed at undergraduates in the early to middle years of university. These students now tend to have a stronger grounding in social than in political history and are usually perplexed by religion, which shapes so much in the period. The two texts here are thoroughly informed by recent research. They convey the political background without getting weighed down by excessive detail, and explain religious culture without trivialising the subject or patronising students. Largely synchronic, they nonetheless show how certain events move traditional societies in new directions. The reader learns how early-modern society worked, an excellent preparation for more advanced work. Both have topical bibliographies to direct students to that work. The single shared weakness: few illustrations of a very visually minded period. Nicholas Terpstra is associate professor of history, University of Toronto, Canada. Renaissance and Reformation France 1500-1648. First edition Editor - Mack P. Holt ISBN - 0 19 873166 3 and 873165 5 Publisher - Oxford University Press Price - £37.50 and £14.99 Pages - 263
<urn:uuid:3197c780-a3be-49bc-a8a3-3aaa1254fe25>
CC-MAIN-2017-34
https://www.timeshighereducation.com/books/textbook-guides/8-november-2012/making-of-the-modern-monarch/174836.article
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886123312.44/warc/CC-MAIN-20170823171414-20170823191414-00142.warc.gz
en
0.940918
706
3.140625
3
15 Sep 2020 Ransomware is nothing new! It’s been around for many years and more than likely you’ll know of someone or a business who’ve been infected by it. What has changed is the tactics used when carrying out these attacks. These have made ransomware attacks more damaging, difficult to recover from and significantly increased the pressure on victims to the cyber criminals’ demands. Cyber security experts have nicknamed this Nuclear Ransomware. Ransomware is a type of malware that prevents you from accessing your computer by locking it or your files by encrypting them with a random key. Some ransomware will also try to spread to other machines on your network, such as the Wannacry ransomware that impacted the NHS in May 2017. Ransomware infections are normally followed up by a demand from the cyber criminals to make a payment (often in a cryptocurrency such as Bitcoin) in order to unlock your computer or access your data. Cyber Security has often been equated to a game of cat and mouse with cyber criminals and security practitioners constantly battling to counter and subvert one another. Previously, if you were infected with ransomware, had your files encrypted and received a ransom note you could simply restore your system from a backup, recover your files and avoid the need to pay any of the ransom. Cyber criminals have cottoned onto this, realising that this was the reason the profits from their ill-gotten gains were tumbling and they needed to carry out their attacks in such a way that restoring from a simple backup wouldn’t undo their naughty work. In recent months cyber criminals have begun deploying their new tactics. After gaining access to your system ready to deploy their ransomware, they first steal the most sensitive and private data they can find. Then as part of their ransom, they threaten to release the stolen data on the Dark Web unless they’re paid, resulting in a data breach. They have combined Ransomware Attacks with Data Breaches; ransomware has gone NUCLEAR! As with many things in Cyber Security, you can never completely 100% protect yourself against ransomware, but there are some simple practical steps you can take. The National Cyber Security Guidance have produced a comprehensive guide on mitigating malware and ransomware attacks which highlights some of the simple steps you can take to make it as difficult as possible for Cyber Criminals to do their dirty work. If you believe any data relating to you or your business has been stolen in a Ransomware Attack or any Data Breach, there are some simple practical steps you can take to keep yourself safe. – Keen an eye on your banking – Stolen financial data may be used to take money from your accounts. If you see anything suspicious, contact your bank or card company immediately. – Beware of phishing messages and calls – Stolen contact details can lead to unsolicited phishing emails, messages and calls trying to trick you into parting with your personal and financial details. If you receive an email you’re just not quite sure about, forward it to the Suspicious Email Reporting Service (SERS): email@example.com – Report any fraud – If you think you’ve been a victim of fraud or cybercrime, report it to Action Fraud at Actionfraud.police.uk or call 0300 123 2040.
<urn:uuid:66afcae2-5a04-4ce4-90fc-b5da97682401>
CC-MAIN-2023-50
https://www.sthelenschamber.com/news/ransomware-has-gone-nuclear/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100989.75/warc/CC-MAIN-20231209233632-20231210023632-00509.warc.gz
en
0.962203
687
2.671875
3
Once upon a time there was a little bird… She was a happy bird! Until one day the mother told her: “Now you are old enough; you have to go to school to learn how to fly!” The little swallow didn’t want to go to school. She said: “I like to jump in cool grass or in soft sand. I like to go around and search for food!” But no way, she had to go to school. The first teacher was talking a lot. The little swallow had to sit and listen. She had to repeat, with the others: “wings open – jump – fly!” So for hours and hours they were shouting: “wings open – jump – fly! Wings open – jump – fly! Wings open – jump – fly!” “How was school?” asked her mother. “It was boring! It was terrible! And I cannot even fly. And I don’t want to fly,” the swallow cried bitterly. “I don’t want to go to this school anymore. I only like to jump in cool grass or in soft sand. I like to go around and search for food!” “All right,” said the mother: “I’ll find you another school!” The second teacher said that talking is not enough. If you want to fly, you have to practice. Go up there… Open wings! Jump! Fly! The swallow falls down. And the teacher says: “ok, try again, it will come.” But the swallow is tired and cries bitterly at home: “I don’t want to fly, I’m hurting myself. I only want to jump in cool grass or in soft sand. I like to go around and search for food!” “All right,” said the mother: “I’ll find you another school.” The third teacher was different, had new ideas. She organized class in a different way. They were not even busy on flying! They were doing projects on jumping: how to use the legs, counting how far you jump… They were doing projects on grass and sand: about nature and preservation… And they learned all about food: what to eat to be a healthy swallow, where to search for food… The little swallow enjoyed! This didn’t even look like school. And every week the bigger swallows were showing what they had learned about flying… Our little friend become curious anyway: how would it be to go out flying to find food?
<urn:uuid:c6dd4f66-7fa2-490a-a9b5-c4c42ec02515>
CC-MAIN-2023-23
https://theswallow.org/about-us/the-story
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647639.37/warc/CC-MAIN-20230601074606-20230601104606-00701.warc.gz
en
0.988309
550
2.53125
3
At the ACM/IEEE International Conference on Human Robot Interaction (HRI) in Chicago last week, researchers from Naver Labs and Seoul National University in South Korea presented a robot called Shelly, which is designed to teach children that they shouldn’t abuse robots. The idea is to reduce or eliminate aggressive behaviors when interacting with the device. Shaped like a tortoise, Shelly is fun to play with, unless you smack it, at which point it hides inside its shell until it’s safe to come out again. Shelly is designed to be large enough that five to seven children (under 13 years old or so) can interact with it simultaneously. The top part, Shelly’s shell, has embedded LEDs along with vibration sensors that can detect touches and impacts. Shelly’s body consists of a cute little head and four limbs that wiggle around, all of which can be retracted back inside the shell. Using its LEDs and limbs, Shelly conveys different emotional states, including happy, sulky, angry, and frightened. The frightened behavior gets triggered when a kid hits, kicks, or lifts the robot, and when that happens, Shelly retracts inside its shell and stays there for 14 seconds. Before playing with Shelly, children are explicitly told that if they abuse the robot, it will get scared and hide for a little bit. The researchers weren’t testing whether the hiding behavior itself would make the kids less abusive; rather, they figured that the most significant effect would come from the robot being much less fun to play with while it was hiding. Stop breadboarding and soldering – start making immediately! Adafruit’s Circuit Playground is jam-packed with LEDs, sensors, buttons, alligator clip pads and more. Build projects with Circuit Playground in a few minutes with the drag-and-drop MakeCode programming site, learn computer science using the CS Discoveries class on code.org, jump into CircuitPython to learn Python and hardware together, TinyGO, or even use the Arduino IDE. Circuit Playground Express is the newest and best Circuit Playground board, with support for CircuitPython, MakeCode, and Arduino. It has a powerful processor, 10 NeoPixels, mini speaker, InfraRed receive and transmit, two buttons, a switch, 14 alligator clip pads, and lots of sensors: capacitive touch, IR proximity, temperature, light, motion and sound. A whole wide world of electronics and coding is waiting for you, and it fits in the palm of your hand.
<urn:uuid:47577c93-7788-4951-9a29-6b44dc649c91>
CC-MAIN-2020-10
https://blog.adafruit.com/2018/03/19/robotic-tortoise-helps-kids-to-learn-that-robot-abuse-is-a-bad-thing-makerobotfriend/
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145859.65/warc/CC-MAIN-20200223215635-20200224005635-00513.warc.gz
en
0.936874
528
3.453125
3
Mindyourmind is an online interactive webpage for youth between the ages of 14 and 24 who are interested in learning more about or are dealing with mental illnesses. The website includes information on different mental health related problems, as well as daily tips and online interactive pages. The Ontario Federation of Friendship Centres has resources for children and youth on their website, including Healthy Babies, Healthy Children, resources for urban youth and children and Cultural Connections for Aboriginal Youth. The Aboriginal Sport and Wellness Council of Ontario are striving to create healthier communities. Their goal is to promote health, wellness and spirituality through the use of sports tournaments and wellness activities. They also offer training in healthy living and other sports related certifications. As an Indigenous young person, you have rights! Learn about what they are. Your Legal Rights is an Ontario database that provides the reader with information about their legal rights on a variety of subjects, including (but not limited to): housing, family, education and human rights. The Native Youth Sexual Health Network is an organization throughout Canada and the United States that is aiming to work through issues related to sexual relationships and reproduction through the continent in a human rights perspective. Their website includes information on fighting homophobia and transphobia, as well as different projects such as the Grandmother Spirit Project and School Pushout. Also listed on the website is phone numbers for help-lines and different useful centres/circles. The Native Women's Association of Canada strives to better the lives of Indigenous women, girls and their families through advocacy and policy work. Some of their main areas of interest are: education, health, justice, violence protection and human rights. Their website explains the issues within each area - for example, the high numbers of Aboriginal women in prison is listed under justice. They provide documents and resources on how change can be achieved. The YOUCAN website provides leadership resources for youth and educators on non-violent conflict resolution to improve community relations. The website also offers publications of how programs by YOUCAN have been making change in their communities. Taking Action is a youth-led project by Aboriginal communities across Canada that explores healthy sexuality, structural inequalities, and culture. The youth learn about HIV and create artwork to share with their communities as a form of health promotion. The Public Health Agency of Canada provides many educational resources and activities on children's rights for children aged 4 and above. The site has a section for child and youth, parents and caregivers, as well as educators. There are also links to events across the country for National Child day.
<urn:uuid:24bf9c4a-f455-484d-b317-899ca2c8104e>
CC-MAIN-2020-24
http://indigenouskidsrightspath.ca/taxonomy/term/41
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347390448.11/warc/CC-MAIN-20200526050333-20200526080333-00510.warc.gz
en
0.961705
517
2.96875
3
The Hollow Men (Monument voor de vluchteling) Brons en cortenstaal Koningin Marialaan, Den Haag 52.086154197957, 4.3327425200989 View on map When you look through someone, who is empty? The one you don't see or yourself? That is the thought that this monument represents. Inspired by the poem 'The Hollow Men' by English poet T.S. Eliot, sculptor Linette Dijk has created a monument to the refugee. In memory of the thousands of migrants who died at sea or in the desert during their flight to Europe. The two-part monument is placed in the garden next to the Roman Catholic Church of Our Saviour on the Koningin Marialaan. The idea for a monument to the refugee came from pastor Sjaak de Boer. He launched it during the annual commemoration for the fallen refugee on 10 December 2020. Aid organisation Cordaid offered funding and at the same time called on artists to submit a proposal. More than twenty responded. Linette's design was chosen. Besides painting portraits, figures and landscapes, Linette also makes bronze sculptures. All her work is about beauty, stillness and awareness. The posture and movement of her sculptures show that dance is an important source of inspiration. She also dances herself. Only for the Monument to the Refugee does she seem to be tapping from a different keg. Although the figure's skin is just as 'rough' as in her other sculptures, there is no question of a light-hearted pose here. Here we see an adult man with a bag on his back slightly hunched over the small child he is carrying in his arms. Seen from the Bezuidenhoutseweg, the busy road between the Royal Palace and Parliament, you look straight through the first part to this father figure with child. In this way, the artist shows us that we often look straight through refugees. As if they do not exist.
<urn:uuid:25c91b43-f45a-4a36-abe5-73369f5f946d>
CC-MAIN-2023-40
https://bkdh.nl/en/kunstwerken/the-hollow-man-monument-voor-de-vluchteling/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506029.42/warc/CC-MAIN-20230921174008-20230921204008-00620.warc.gz
en
0.953108
456
2.859375
3
The Diabetic Diet: Common Myths So you’ve been diagnosed as pre-diabetic or with type 2 diabetes and your doctor has suggested you manage your condition with diet and exercise. This news can be overwhelming and trying to navigate through all the information can make it even worse. Thankfully, we’ve identified two great resources for you today. First from Ms. Charlotte Hayes, a Certified Diabetes Educator and Registered Dietitian, as well as some helpful information from nutrition411.org. Remember that Fresh ‘n Fit Cuisine’s healthy mix and low carb menus are great for managing diabetes. With a low glycemic index, low sodium, and low sugar levels, our meals provide balanced nutrition, convenient eating, and delicious flavors. Sign up for our blog and receive 10% OFF your first order with promo code BLOG 10! Need to exercise but scared to start? In her book titled, The “I Hate to Exercise”, Charlotte Hayes, MMSc, MS, RD, CDE gives you ways to turn every day home activities into a low impact fitness plan you’ll love. Buy the book HERE and get started on your path to wellness! Common Myths of Diabetes Diets from nutrition411.org Myth: Carbohydrates are “bad. Avoid them. Fact: Carbohydrates are an integral part of any diet, including the diet for diabetes. Carbohydrate-rich foods provide energy (calories), vitamins, minerals, fiber, and phytonutrients. You are asked to monitor your carbohydrate intake because carbohydrate has more of an impact on blood glucose levels than either fat or protein. Carbohydrates are found in starches, fruits, vegetables, and milk, making it very difficult to eliminate them from the diet. Some carbohydrates are better than others. Whole grains are always a better choice than refined carbohydrates, but you can incorporate all carbohydrates into a healthful meal plan. Myth: You can never, ever eat another cookie. Fact: All foods are “allowed” on the carbohydrate counting plan. You can work any food into the plan, in moderation. Of course, many foods are better choices than cookies on a daily basis, but you still can eat an occasional cookie. Myth: You will need to prepare “special meals” for yourself. Fact: You can eat with your friends and family. You may need to monitor your portion size or make wise choices when a varied selection of food is available, but you can eat the same meals as anyone else, as long as you have planned for it. You can dine in restaurants, eat at home with your family, or attend parties/events with buffets. Once you have dedicated yourself to the idea of integrating your diet into your current lifestyle, you can choose from many options of where and what to eat. Myth: You need to buy “sugar-free” foods. Fact: “Sugar free” does not mean “carbohydrate free.” Many sugar-free foods contain as many, or more, carbohydrates as “regular” versions. Your best bet is to carefully scrutinize all food labels. Remember that 15 grams (g) of carbohydrates equals 1 carbohydrate choice. It does not matter, for the sake of carbohydrate counting, what form those 15 g of carbohydrate come in—natural sugar, added sugar, grain, etc. Myth: As long as you count carbohydrates, you can eat as much protein and fat as you want. Fact: Unfortunately, people with diabetes have a much higher risk of developing cardiovascular disease. This is why it is so important not to focus exclusively on carbohydrate intake. The amount and type of fat that you consume is also very important to your health.
<urn:uuid:4fb7eded-5cb4-4c7e-9baa-da81cd657fcd>
CC-MAIN-2017-39
https://freshnfitcuisine.wordpress.com/2014/11/13/the-diabetic-diet-common-myths/
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818687837.85/warc/CC-MAIN-20170921191047-20170921211047-00665.warc.gz
en
0.946325
775
2.5625
3
Academic journal article By Weaver, Karol Kovalovich Nursing History Review , Vol. 13 In 1764, the French ministry sent a group of trained and licensed French midwives to Saint Domingue (now known as Haiti), a French colony on the western half of the island of Hispaniola in the Caribbean.1 The French state empowered these women to practice midwifery in Saint Domingue in order to improve the birth rate, but the midwives encountered opposition from colonial medical practitioners. Leading colonial physicians criticized the midwives for their use of birthing practices unsuitable to the climate and people of Saint Domingue. They asserted that the midwives, who had been trained in France, knew nothing of the dangerous diseases of the island environment or the uniqueness of the colonial body. By invoking a distinctive colonial medical identity and emphasizing acceptable professional mores, the medical men of Saint Domingue fought against the 1764 midwifery expedition and doomed it to failure. Midwifery has been a popular topic for historians of gender and of medicine. We know a great deal about the history of midwifery in France as a result of the efforts of scholars like Jacques Gélis and Nina Gelbart. Gélis recounts the characteristics and skills expected of French midwives in early modern Europe and shows how the ritual of birth coincided with the change of the seasons.2 Gelbart focuses her study of French midwifery on a specific individual-Madame du Coudray-and creatively recounts the triumphs and difficulties the 18th century midwife experienced in a 22-year struggle to educate women and men in the proper ways of delivering children. Her nation, its citizens, her students, and her colleagues feted her for her educational techniques, her invention of an obstetrical machine used to demonstrate birthing positions, her book, and her dedication. Yet du Coudray endured numerous setbacks and much criticism. Medical men resented both her skill and her outspokenness. Her strong personality also did not endear her to town leaders with whom she had to deal as she made her way across France. Finally, du Coudray suffered criticism from village women who practiced midwifery without benefit of formal training.3 Thanks to the research of scholars, we also know something about the history of midwifery in other Western nations. Jean Donnison studies the uneasy and competitive relationship between female midwives and male medical practitioners in England from the 18th to the 20th century.4 Jane B. Donegan examines how obstetrics developed in the United States in the 19th century and discusses how male obstetricians aimed to wrest control of childbirth from midwives in the midst of fights over women's proper sphere and the nascent women's rights movement.5 Laurel Thatcher Ulrich employs the diary of Martha Ballard and other primary sources to show how male physicians challenged midwifery in late 18th and early 19th century America by learning from the midwives themselves how to deal with ordinary births.6 Despite the tremendous work undertaken by these historians, however, we still know little about the practice of midwifery in the colonies Western nations held in the 18th and 19th centuries. Who were the women who traveled to colonial outposts to ply their medical trade? How were they trained? What did they accomplish? What difficulties did they experience? My study of the 1764 midwifery expedition to Saint Domingue shows that, despite the need for their services, these women endured professional criticism from male medical superiors who set out to gain control of colonial medicine through the development of a colonial medical ideology. The sources on which the story of the midwives of 1764 is based are rich and varied. 18th-century medical books that analyze the disease environment of Saint Domingue describe the illnesses that colonial residents, both free and enslaved, suffered and the health patterns of white, biracial, and African women. Travel accounts provide information about the customs, climate, and social life. …
<urn:uuid:56232f7a-781b-4f28-a1ff-e61aa64f7550>
CC-MAIN-2014-23
http://www.questia.com/library/journal/1P3-917874751/the-king-s-midwives-the-1764-midwifery-expedition
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510263423.17/warc/CC-MAIN-20140728011743-00349-ip-10-146-231-18.ec2.internal.warc.gz
en
0.962972
821
3.546875
4
|This theodolite looks precisely like the ones made in the nineteenth century in England. Its design and dimensions are similar to antique theodolites. To this day, surveyors all over the world still use theodolites. Theodolites are said to be a surveyor's most important and essential friend. They are the only instruments that simultaneously measure the horizontal angles between two points and their angle of elevation. The compass in the centre has a locking device. A little lever presses down to lock the needle for safe transport when not in use. There is a groove under the stand with threads to mount the piece on a surveyor's tripod. For precision levelling there are three adjustable screws in the base and a spirit level. The two vernier scales can be read through the magnifiers. The image is viewed through an inverting telescope with a lens cover in front. The telescope has a double focusing. A side knob to get the image into focus and the screw near the eyepiece for fine adjustments. This piece is made of solid brass and comes in its own wooden box. It weighs 9 kg and 12 kg when packed. It stands 36 cm tall and the diameter of the base is 15 cm. It's telescope is 20 cm long, and it has a triangular base with each side of the triangle 12 cm in length.
<urn:uuid:2f76b3f4-b15b-499a-b7fc-8a2579fcd919>
CC-MAIN-2020-24
http://www.ahuracollectables.co.uk/14-inch-large-brass-theodolite-c2x13218448
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347399820.9/warc/CC-MAIN-20200528135528-20200528165528-00140.warc.gz
en
0.94901
275
3.65625
4
HIV: Basics of the disease HIV or Human Immunodeficiency virus is a pathogen of the retrovirus family responsible for causing the HIV infection which subsequently develops into the highly dreaded and fatal disease called AIDS or Acquired Immunodeficiency Syndrome. HIV infection can be acquired upon contact with the body fluids of an infected individual. Unprotected sexual intercourse with an infected person, infection from infected pregnant mother to fetus and infection that spreads through the use of infected needles and syringes; comprise the various commonly known modalities of transmission of HIV infection. HIV attacks the CD4 or T cells in the body. These cells constitute a key element in the body’s defence mechanism towards diseases, opportunistic and secondary infections in particular. As the copies of HIV in the bloodstream of the infected person keep increasing, one can expect a progressive decline in the CD4count. This in other words implies that with a growing viral load, the immune system of the body and the person’s ability to guard against infections and several other diseases; is progressively depleted. Opportunistic infections like tuberculosis and certain cancers like Kaposi’s sarcoma are common among HIV positive patients. What’s the difference between HIV and AIDS? HIV is a virus and causes an initial infection which begins to attack the immune system. HIV infection over a period of time may progress into AIDS; a full blown disease which increases the patient’s vulnerability to several disorders. AIDS stands for acquired immunodeficiency syndrome. AIDS is the final stage of HIV infection, and not everyone who has HIV advances to this stage. AIDS is the stage of infection that occurs when your immune system is badly damaged and you become vulnerable to opportunistic infections. When the number of your CD4 cells falls below 200 cells per cubic millimeter of blood (200 cells/mm3), you are considered to have progressed to AIDS. (Normal CD4 counts are between 500 and 1,600 cells/mm3.) You can also be diagnosed with AIDS if you develop one or more opportunistic infections, regardless of your CD4 count. Without treatment, people who are diagnosed with AIDS typically survive about 3 years. In case of a dangerous opportunistic illness, life expectancy without treatment falls to about 1 year. From HIV to AIDS: Slow Progressors versus Fast progressors The progression from HIV to AIDS takes place at a different pace for different patients. A small percentage of HIV-infected individuals rapidly progress to AIDS if they fail to take the medication within four years after primary HIV-infection and are termed Rapid Progressors. Indeed, some individuals have been known to progress to AIDS and death within a year after primary infection. Another subset of individuals who are persistently infected with HIV-1, but show no signs of disease progression for over 12 years and remain asymptomatic is classified as Long Term Non-Progressors. In these individuals, it seems that HIV-infection has been halted with regard to disease progression over an extended period of time. Globally, as per a fact sheet released by the UNAIDS in 2014: People living with HIV In 2013, there were 35 million [33.2 million–37.2 million] people living with HIV. Since the start of the epidemic, around 78 million [71 million–87 million] people have become infected with HIV and 39 million [35 million–43 million] people have died of New HIV infections New HIV infections have fallen by 38% since 2001. Worldwide, 2.1 million [1 .9 million–2.4 million] people became newly infected with HIV in 2013, down from 3.4 million [3.3 million–3.6 million] in 2001 AIDS-related deaths have fallen by 35% since the peak in 2005. In 201 3, 1.5 million [1.4 million–1.7 million] people died from AIDS-related causes worldwide compared to 2.4 million [2.2 million–2.6 million] in 2005 India has the third largest HIV epidemic in the world. In 2013, HIV prevalence in India was an estimated 0.3%. This figure is small compared to most other middle-income countries but because of India’s huge population (1.2 billion) this equates to 2.1 million people living with HIV. In the same year, an estimated 130,000 people died from AIDS-related illnesses.1 Overall, India’s HIV epidemic is slowing down, with a 19% decline in new HIV infections (130,000 in 2013), and a 38% decline in AIDS-related deaths between 2005 and 2013. Despite, this 51% of deaths in Asia are in India. The significance of screening for HIV among high risk groups and suspected individuals Worldwide, it has been known and established that certain sections of society have a higher prevalence of HIV/AIDS. These include commercial sex workers, prostitutes, the lesbian/gay/transgender (LGBT) community, intravenous drug abusers, prisoners, truck drivers and migratory workers. Besides these vulnerable groups, the risk of HIV infection is higher among people who have unprotected sex with multiple sexual partners. It is in such high risk subgroups of society that HIV screening assumes tremendous significance. It helps early detection of HIV infection which can make treatment more effective and improve the overall outcome, quality of life and life span of an infected individual. Tests to screen for HIV infection HIV antibody testing is used to screen and diagnose HIV infections. Most people develop detectable HIV antibodies within 6 to 12 weeks of infection (this can take up to 6 months in rare cases). Rapid card tests are most commonly used for HIV antibodies detection; different immunoassay techniques mainly Enzyme Linked Immunoassay (ELISA) or automated immunoassays are also been used for detection of HIV antibodies Regardless of the type of screening test used, a positive result requires follow up with a second test to establish a diagnosis of HIV. Current testing protocols usually involve an initial screening by two different rapid card tests. If positive, the HIV antibody immunoassay test is repeated by more specific immunoassays. Recently, a combination of antibody and antigen test also known as 4th generation tests are used for early diagnosis. They are recommended four weeks after exposure as compared to antibody-only tests that are recommended after six weeks. 4th generation tests detect over 95% of infections at four weeks after exposure. Tests for monitoring the infection Once a patient is diagnosed, following two key tests are used to monitor the infection: CD4 count – CD4 lymphocyte cells (also called T-cells or T-helper cells) are the primary targets of HIV. The CD4 count and the CD4 percentage mark the degree of immunocompromise. It is used to stage the patient’s disease, determine the risk of opportunistic illnesses, assess prognosis, and guide decisions about the urgency of starting antiretroviral therapy (ART). The CD4 percentage is the percentage of the lymphocyte population that is CD4+; it is measured directly by flow cytometry. The mean normal value is approximately 500-1,300 cells/µL Illness, vaccination, diurnal variation, laboratory error, and some medications can result in transient CD4 cell count changes, whereas the CD4 percentage remains more stable. Because CD4 counts may vary, treatment decisions generally should not be made on the basis of a single CD4 value. A change between two test results is considered significant if it is a 30% change in absolute CD4 count or 3% point change in CD4 percentage. In an untreated HIV infection, the CD4 count declines by approximately 50-80 cells/µL per year. HIV-1 Viral Load – HIV-1 viral load measurement indicates the number of copies of HIV-1 RNA per milliliter of plasma. Although HIV ultimately resides within cells, the plasma measurement is an accurate reflection of the burden of infection and the magnitude of viral replication. It is used to assess the risk of disease progression and can help guide initiation of therapy. It is critical in monitoring virologic response to ART. After initial infection with HIV, the viral load quickly peaks to very high levels, usually >100,000 copies/mL. Generally, 3-6 months after primary infection, the viral load declines and then remaining in a steady state. Among patients who are not on ARV medications, a small number maintain a low or even undetectable viral load, but the vast majority of those patients have relatively high HIV RNA levels. Higher plasma viral loads are associated with more rapid declines in CD4 cells and with increased risk of progression to symptomatic disease and AIDS; they also are associated with higher risk of HIV transmission. In untreated persons, the CD4 cell count is more useful in determining the urgency of ART initiation, but once a patient has started ART, the viral load is used to monitor the response to therapy. A key goal of ART is to achieve a viral load that is below the level of quantitation (e.g., <40 copies/mL). Because CD4 and clinical responses may lag behind changes in viral load, viral load testing is essential for detecting virologic failure in a timely manner. With an effective ARV regimen, a decline of at least 10-fold (1 logarithm) is expected within the first month, and suppression to undetectable levels should be achieved within 3-6 months after initiation of therapy. The HIV viral load should be checked at least twice at baseline, before the patient starts an ART regimen. Follow-up viral load measurement should be performed at regular intervals usually over 3-6 months intervals. Viral loads, like CD4 counts, are affected by laboratory variation, assay fluctuations, and patient variables such as acute illness and recent vaccinations. Variations of <0.5 log10 copies/mL (threefold) usually are not clinically significant. Recent illnesses or vaccinations can transiently increase viral load. If a patient has had a recent illness or vaccination, the viral load measurement should be deferred for 4 weeks, if possible. Different methodologies (Real Time PCR, NASBA, TMA, Automated Real Time PCR etc) are available for HIV Viral Load monitoring, due to inherent technical difference between these methodologies, ideally monitoring is done by using same technology and preferably same laboratory. Among available technologies US FDA approved automated Real Time PCR (Roche and Abbott) are most popular. HIV Drug Resistance – As HIV multiplies in the body, the virus sometimes mutates (changes form) and produces variations of it. Variations of HIV that develop while a person is taking HIV medicines can lead to drug-resistant strains of HIV. Drug resistance can cause HIV treatment to fail. A person can initially be infected with drug-resistant HIV or develop drug-resistant HIV after starting HIV medicines. Genotypic testing is recommended as the preferred resistance testing to guide therapy in antiretroviral (ARV)-naive patients. Standard genotypic drug-resistance testing in ARV-naive persons involves testing for mutations in the reverse transcriptase (RT) and protease (PR) genes. Most genotypic assays involve sequencing of the RT and PR genes to detect mutations that are known to confer drug resistance. Interpretation of test results requires knowledge of the mutations selected by different antiretroviral (ARV) drugs and of the potential for cross resistance to other drugs conferred by certain mutations. Generally genotype resistance tests are recommended when first diagnosed and before most treatment changes. Usually they can detect mutations responsible for 24+ different antiretrovirals from 6 classess. HIV vaccine: A hope for many The development of an effective HIV vaccine that could either prevent HIV infection from occurring or would have a therapeutic effect on patients already infected, has been the quest of the medical and research fraternity globally, for several decades. Several large clinical studies have been conducted in the past and several are underway, to come up with a sustainable HIV vaccine. Unfortunately, research in this filed hasn’t borne any substantial success. This is largely due to the characteristic of HIV which allows it to mutate its form very rapidly. Millions of patients across the globe as well as the medical community are waiting hopefully for a potential vaccine to be offered as a robust solution to the HIV predicament.
<urn:uuid:56531a0a-4f14-4072-ae18-ea338d796fe3>
CC-MAIN-2017-39
http://medchrome.com/patient/hiv-basics-of-the-disease/
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818691476.47/warc/CC-MAIN-20170925111643-20170925131643-00710.warc.gz
en
0.939774
2,552
3.609375
4
Saturn’s largest moon Titan is often called an analogy to early Earth, with its thick, chemical-rich atmosphere and widespread system of flowing rivers and north polar lakes. But located almost a billion miles away from the Sun, everything on Titan is shifted into a completely different—and frigid—level of existence from that found on Earth. With surface temperatures of 300 degrees below zero F, the lakes are filled with liquid methane and what’s life-giving water here is literally solid rock there. Even the rain on Titan falls as oversized drops of ethane. But even in this extreme cryo-environment it’s possible that life may right now exist…life relying on an entirely different chemistry than what’s possible on our planet. Recently scientists have identified a molecule on Titan called vinyl cyanide, or acrylonitrile. To Earthly life acrylonitrile is toxic and carcinogenic; luckily for us it isn’t naturally-occurring here. But on Titan it is and apparently in quantity; it’s possible that vinyl cyanide, raining down from Titan’s atmosphere into its vast hydrocarbon lakes, could even help form methane-based cell structures in much the same way phospholipids do here. The molecule (C2H3CN) has the ability to form membranes and, if found in liquid pools of hydrocarbons on Titan’s surface, it could form a kind of lipid-based cell membrane analog of living organisms on Earth. In other words, this molecule could stew in primordial pools of hydrocarbons and arrange itself in such a way to create a “protocell” that is “stable and flexible in liquid methane,” said Jonathan Lunine (Cornell University) who, in 2015, was a member of the team who modeled vinyl cyanide and found that it might form cell membranes. Further evidence of life “not as we know it?” Read more on Ian O’Neill’s Astroengine blog here: Vinyl Cyanide Confirmed: Weird Form of Alien Life May Be Possible on Saturn’s Moon Titan and in a Gizmodo article by Maddie Stone here: Potential Building Block of Alien Life Spotted in Titan’s Atmosphere
<urn:uuid:a1da7300-993b-41e3-bb91-26bad4e46806>
CC-MAIN-2020-24
https://lightsinthedark.com/2017/07/28/this-toxic-compound-on-titan-could-support-life-not-as-we-know-it/?like_comment=34988
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347428990.62/warc/CC-MAIN-20200603015534-20200603045534-00095.warc.gz
en
0.926483
474
3.71875
4
The Center for Advanced Study MillerComm 2016 lecture “Corals and Climate Change: Life after Death on a Remote Pacific Reef” is by Kim Cobb, Professor of Earth and Atmospheric Sciences, Georgia Institute of Technology, on Thursday, April 20, 2017 at 4:00 p.m. in the Knight Auditorium, Spurlock Museum, 600 South Gregory, Urbana. In this talk, Professor Kim Cobb will share her experiences from recent field expeditions to Kiritimati Island, exposing the extreme coral bleaching effects of the largest El Niño event ever recorded in the winter of 2015-16. Cobb’s research on corals illustrates how climate change is contributing to severe coral bleaching and mortality, and how science can help protect the reefs of the future. Hosted by: Institute for Sustainability, Energy and Environment In conjunction with: Center for East Asian and Pacific Studies, Center for Global Studies, Department of Agricultural and Consumer Economics, Department of Atmospheric Sciences, Department of Geology, Department of Plant Biology, Natural Resources and Environmental Sciences, School of Earth, Society and Environment, School of Integrative Biology, Spurlock Museum Thanks to the Center for Advanced Study for this information item.
<urn:uuid:11854d50-dbc5-4c2c-b18f-d587af2651a4>
CC-MAIN-2017-26
https://illinois.edu/blog/view/6115/489021
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320338.89/warc/CC-MAIN-20170624203022-20170624223022-00433.warc.gz
en
0.84658
248
2.53125
3
Hereditary Causes of Anemia There are many reasons people develop anemia. Sometimes people become anemic if they have a chronic condition, such as cancer or kidney disease. For these patients, treating anemia is part of the overall care of their condition. Other times, anemia can be caused by a hereditary condition that occurs because of small variations in a patient’s genes. Genes are located in every cell and are instructions that your cells follow to complete different processes that take place in the human body. Each person receives a copy of genes from their parents and sometimes variations or flaws in the genes can be passed along as well. In this case, some very specific flaws that are inherited from your parents can lead to anemia. Making Red Blood Cells Like many processes in the human body, making new red blood cells is very complicated with many steps. Because it is so complex, there are many things that can go wrong. When something in the process of making new red blood cells (called erythropoiesis) goes wrong, a patient can develop anemia. How your body uses the iron and vitamins it acquires from food is also an important aspect of making red blood cells. When the body cannot absorb iron or certain vitamins properly or is unable to incorporate them into hemoglobin, red blood cells may not be created fast enough or created at all. Hemoglobin is the iron-rich protein in red blood cells that carries oxygen from the lungs to all parts of the body. Also, doctors determine if a patient is anemic by measuring their hemoglobin level. These articles explain how anemia can develop, list related symptoms and provide advice for talking with your doctor. Anemia Symptoms and Resources Anemia is a condition that can make you feel tired, fatigued, weak, dizzy, irritable, short of breath or depressed. With anemia, you may also have pale skin, brittle nails, chest pain, a coldness in your hands or feet, or a rapid heartbeat. Some people with anemia also have a desire to eat ice or other peculiar things, experience sexual dysfunction, or have trouble concentrating or performing mental tasks. We focus on anemia that is caused by iron deficiency, vitamin deficiency, aging, surgery or by acquired chronic conditions like cancer, diabetes, inflammatory bowel disease, kidney disease, heart disease, hepatitis C, HIV/AIDS, and rheumatoid arthritis. These types of anemia are known as iron deficiency anemia, vitamin deficiency anemia and anemia of chronic disease. There are numerous resources devoted to these types of anemia, including basic education in our Information Handouts, Anemia FAQs, and Symptoms Quiz. For a more in-depth look at anemia as it relates to specific conditions, check out some of the other Feature Articles. Several other organizations listed in our More Health Resources section deal with many types of anemia that are caused by hereditary conditions. Some of these hereditary conditions are briefly described below. Hereditary Conditions Causing Anemia Certain hereditary variations in a person’s genes can lead to incorrect or decreased production of red blood cells. This can cause red blood cells to not last as long in the blood, not be as effective transporting oxygen from the lungs to different parts of the body, or not be created at all. Listed below are some hereditary conditions that cause anemia through various genetic mechanisms. Sickle Cell Anemia is a disease where the body makes red blood cells that are shaped like a crescent moon or the letter “C” when they are depleted of oxygen. These abnormally-shaped cells do not flow as well through the circulatory system and last for only 10-20 days compared to about 120 days for healthy, normal-shaped red blood cells. The body continually makes new red blood cells, but anemia develops because sickle cells do not last very long. Sickle cell disease affects 72,000 people in the United States and is most common in people of African descent.1 Thalassemia is a condition where the body does not properly construct one of the proteins needed to make hemoglobin. Moderate to severe anemia can occur if one of these proteins is defective or missing. Hemoglobin is located in red blood cells and transports oxygen from the lungs to muscles and organs throughout the body. Thalassemia can be treated with transfusions and iron chelation therapy and may be curable with a bone marrow transplant.2 Fanconi Anemia is a condition in which the bone marrow can fail to produce red blood cells, white blood cells and platelets. The lack of enough red blood cells will lead to anemia, but can be treated with a bone marrow transplant. These patients are also often born with a variety of other genetic defects and are also very susceptible to developing cancer, including acute myelogenous leukemia (AML), head and neck, esophageal, gastrointestinal, vulvar and anal cancers. Diagnosis of Fanconi Anemia normally occurs in children 10-15 years old, but may be first recognized in adults.3 Diamond Blackfan anemia is a condition in which the bone marrow fails to produce enough red blood cells. The condition usually develops at an early age, with most patients being diagnosed within the first year of life. Several types of facial or physical abnormalities can also be present in patients with the condition. Diamond Blackfan anemia is also referred to as congenital pure red cell aplasia, congenital hypoplastic anemia and Aase syndrome.4 Shwachman Diamond syndrome is a rare condition affecting the digestive enzymes in the pancreas and the creation of blood cells in the bone marrow. Decreased red blood cell production and white blood cell production can lead to anemia and recurrent infections, respectively. Infants four to six months often begin to show symptoms, including feeding problems and slowed growth. The pancreatic aspects of the condition are similar to cystic fibrosis and it is usually diagnosed within the first few years of life.5 Red cell membrane disorders can cause instability in cellular structure, resulting in abnormally shaped red blood cells. The most common form is hereditary spherocytosis. Characterized by round or sphere-shaped red blood cells, hereditary spherocytosis is the most common inherited anemia in people of northern European descent.6 Hereditary elliptocytosis, a different form which can vary widely in severity, causes patients to have a large number of oval or elliptical-shaped red blood cells. This form is common in people of African and Mediterranean descent.6 Hereditary stomatocytosis is a third form of these disorders that can cause patients to have mouth-shaped red blood cells which do not properly transport sodium and potassium in and out of the cell. Some patients with these membrane disorders may not have noticeable symptoms.6 G6PD deficiency is a hereditary condition in which the body cannot produce enough glucose-6-phosphate dehydrogenase (G6PD), an important enzyme that protects red blood cells from destruction by certain chemicals or drugs. G6PD deficiency is the most common enzyme deficiency in the world, affecting more than 400 million people usually of African, Asian, Mediterranean or Middle-Eastern descent. Patients with this condition often develop anemia that is triggered by an infection or an exposure to toxins, drugs or chemicals.7,8 Hereditary hemorrhagic telangiectasia is a condition where patients are predisposed to bleeding at places where their arteries and veins are improperly connected. Due to significant blood loss or reoccurring bleeding, often from the stomach or intestines, patients can develop anemia.9 - Cooley's Anemia Foundation - Daniella Maria Arturi Foundation - Diamond Blackfan Anemia Foundation - Fanconi Anemia Research Fund, Inc. - Hereditary Hemorrhagic Telangiectasia Foundation International - Iron Disorders Institute - Shwachman-Diamond Syndrome Foundation - Sickle Cell Disease Association of America - Sickle Cell Society - Thalassaemia International Federation - The American Sickle Cell Anemia Association Additional Hereditary Conditions Although this article listed some of the more common hereditary conditions that can lead to anemia, patients with any condition which can decrease the function of the bone marrow, red blood cell production or the ability of the digestive system to absorb vitamin B12 or iron are at-risk of developing anemia. Other notable conditions and classes of conditions which can affect patients in this manner include dyskeratosis congenita, congenital dyserythropoietic anemias, and congenital B12 malabsorption syndromes. Although not a cause of anemia, hemochromatosis is an iron-related hereditary condition in which the body absorbs more iron from the food than it needs. Because there is no way for the body to get rid of the excess iron, it is stored in various organs like the liver, heart and pancreas. If untreated, the increasing levels of stored iron can cause organs to become diseased. Also known as iron overload disease, hemochromatosis is one of the most common genetic disorders in the United States.10 The Iron Disorders Institute, which specializes in hemochromatosis, is the spotlight organization for the July 2009 issue of Anemia Watch. Screening and Treatment of Hereditary Anemias Because hereditary anemia is determined by the make-up of your genes, there are various ways in which your doctor can detect if you have one of these genetic variations. The presence of anemia, as determined by a below normal hemoglobin level, is one important indicator that you may have a hereditary or chronic condition that causes anemia. These methods of detection are usually referred to as genetic screening tests and involve precise analysis of the structure of your genes, but are not available yet for all hereditary anemias. To help your doctor diagnose your anemia, be sure to tell him or her if your family has a history of any of the hereditary conditions listed above. This history can indicate if you are at-risk for carrying one of the genetic variations which can cause anemia. There are many different types of treatment for hereditary anemias which counteract the body’s inability to sustain healthy levels of red blood cells and minimize the anemia-related symptoms patients often experience. If you are diagnosed with a hereditary anemia, close communication with your doctor will help him or her provide additional information and the treatment that is best for you based on what is causing the anemia. To find out more about screening methods, treatments and patient support groups, browse the different organizations listed in the More Health Resources page which specialize in these hereditary conditions. - American Sickle Cell Anemia Association. FAQ: How common is Sickle Cell Anemia? Link. Accessed: July 12, 2009. - National Heart Lung and Blood Institute. Diseases and Conditions Index: Thalassemias. Link. Accessed: June 25, 2009. - National Cancer Institute. Inherited Bone Marrow Failure Syndromes: Fanconi Anemia. Link. Accessed: June 25, 2009. - Diamond Blackfan Anemia Foundation, Inc. About DBA: What is Diamond Blackfan Anemia? Link. Accessed: July 16, 2009. - Shwachman-Diamond Syndrome Foundation. Understanding SDS. Link. Accessed: July 16, 2009. - Gallagher PG. Red cell membrane disorders. Hematology Am Soc Hematol Educ Program. 2005:13-18. Link. - Frank JE. Diagnosis and management of G6PD deficiency. American Family Physician. 2005 Oct 1.72(7)1277-82. Link. - Cappellini MD, Fiorelli G. Glucose-6-phosphate dehydrogenase deficiency. Lancet. 2008 Jan 5;371(9606):64-74. Link. - HHT Foundation International, Inc. About HHT. Link. Accessed: July 15, 2009. - MedlinePlus. Health Topics: Hemochromatosis. Link. Accessed: June 25, 2009.
<urn:uuid:769ac2f3-df97-49c0-9727-a6492370a17c>
CC-MAIN-2013-20
http://www.anemia.org/patients/feature-articles/content.php?contentid=000414&sectionid=00015
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705305291/warc/CC-MAIN-20130516115505-00043-ip-10-60-113-184.ec2.internal.warc.gz
en
0.931848
2,497
3.4375
3
|Skip Navigation Links| |Exit Print View| |man pages section 3: Basic Library Functions Oracle Solaris 11 Information Library| - initialize/open a named semaphore #include <semaphore.h> sem_t *sem_open(const char *name, int oflag, /* unsigned long mode, unsigned int value */ ...); The sem_open() function establishes a connection between a named semaphore and a process (or LWP or thread). Following a call to sem_open() with semaphore name name, the process may reference the semaphore associated with name using the address returned from the call. This semaphore may be used in subsequent calls to sem_wait(3C), sem_trywait(3C), sem_post(3C), and sem_close(3C). The semaphore remains usable by this process until the semaphore is closed by a successful call to sem_close(3C), _Exit(2), or one of the exec functions. The oflag argument controls whether the semaphore is created or merely accessed by the call to sem_open(). The following flag bits may be set in oflag: This flag is used to create a semaphore if it does not already exist. If O_CREAT is set and the semaphore already exists, then O_CREAT has no effect, except as noted under O_EXCL. Otherwise, sem_open() creates a named semaphore. The O_CREAT flag requires a third and a fourth argument: mode, which is of type mode_t, and value, which is of type unsigned int. The semaphore is created with an initial value of value. Valid initial values for semaphores are less than or equal to SEM_VALUE_MAX. The user ID of the semaphore is set to the effective user ID of the process; the group ID of the semaphore is set to a system default group ID or to the effective group ID of the process. The permission bits of the semaphore are set to the value of the mode argument except those set in the file mode creation mask of the process (see umask(2)). When bits in mode other than the file permission bits are specified, the effect is unspecified. After the semaphore named name has been created by sem_open() with the O_CREAT flag, other processes can connect to the semaphore by calling sem_open() with the same value of name. If O_EXCL and O_CREAT are set, sem_open() fails if the semaphore name exists. The check for the existence of the semaphore and the creation of the semaphore if it does not exist are atomic with respect to other processes executing sem_open() with O_EXCL and O_CREAT set. If O_EXCL is set and O_CREAT is not set, the effect is undefined. If flags other than O_CREAT and O_EXCL are specified in the oflag parameter, the effect is unspecified. The name argument points to a string naming a semaphore object. It is unspecified whether the name appears in the file system and is visible to functions that take pathnames as arguments. The name argument conforms to the construction rules for a pathname. The first character of name must be a slash (/) character and the remaining characters of name cannot include any slash characters. For maximum portability, name should include no more than 14 characters, but this limit is not enforced. If a process makes multiple successful calls to sem_open() with the same value for name, the same semaphore address is returned for each such successful call, provided that there have been no calls to sem_unlink(3C) for this semaphore. References to copies of the semaphore produce undefined results. The sem_init(3C) function is used with unnamed semaphores. Upon successful completion, the function returns the address of the semaphore. Otherwise, it will return a value of SEM_FAILED and set errno to indicate the error. The symbol SEM_FAILED is defined in the header <semaphore.h>. No successful return from sem_open() will return the value SEM_FAILED. If any of the following conditions occur, the sem_open() function will return SEM_FAILED and set errno to the corresponding value: The named semaphore exists and the O_RDWR permissions are denied, or the named semaphore does not exist and permission to create the named semaphore is denied. O_CREAT and O_EXCL are set and the named semaphore already exists. The sem_open() function was interrupted by a signal. The sem_open() operation is not supported for the given name, or O_CREAT was set in oflag and value is greater than SEM_VALUE_MAX. The number of open semaphore descriptors in this process exceeds SEM_NSEMS_MAX, or the number of open file descriptors in this process exceeds OPEN_MAX. The length of name string exceeds PATH_MAX, or a pathname component is longer than NAME_MAX while _POSIX_NO_TRUNC is in effect. Too many semaphores are currently open in the system. O_CREAT is not set and the named semaphore does not exist. There is insufficient space for the creation of the new named semaphore. The sem_open() function is not supported by the system. See attributes(5) for descriptions of the following attributes:
<urn:uuid:dccfcbc3-3959-4cc3-a2b0-618101308f6e>
CC-MAIN-2017-43
http://docs.oracle.com/cd/E23824_01/html/821-1465/sem-open-3c.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823214.37/warc/CC-MAIN-20171019012514-20171019032514-00840.warc.gz
en
0.861348
1,195
2.609375
3
Love him or loathe him, there's no denying the achievements of William Henry Gates III. You may not agree with Microsoft's business practices but it's questionable that you would be sat here reading this today without the vision and sheer determination of one bespeckled über-geek from Seattle. Gates transformed himself from Harvard drop-out to World's Richest Man within two short decades, witnessing the death of the traditional mainframe and minicomputers and the birth of the Personal Computer (PC). A brief history of a visionary Identifying the enormous potential of this new era of computing, best summed up by famously aiming to put "a computer on every desk and in every home," Gates landed the deal to provide the operating system to the very first IBM-PC. Keen followers of IT history will recall that Microsoft didn't even write PC-DOS 1.0 itself - it bought QDOS from Seattle Computer Products for just US$50,000 and simply repackaged the OS for resale to IBM. In a stroke of genius, the deal Gates struck with IBM allowed him to license DOS to other manufacturers - hardly an issue in 1981 as IBM had created an entirely new market with their PC. Big mistake. Less than a year later, Microsoft released MS-DOS v1.25 - the first version for non-IBM hardware, hardware which was appearing rather quickly. (left) A young Bill Gates holding Windows on a 5.25-inch floppy disk. (right) remember Windows 3.1? Throughout the Eighties, Microsoft grew at an incredible rate, riding high on MS-DOS' dominance of the burgeoning "PC-compatible" era of IBM clones. After failing to get users to switch en masse to a GUI with Windows 1.0 and 2.x, the 1992 release of Windows 3.1 saw a fresh resurgence of Microsoft dominance. By striking deals with manufacturers to pre-install Windows on the hard drives of new computers, Gates ensured that Microsoft operating systems became the default choice of the vast majority of, well, everyone, everywhere. Having stitched up that area, Microsoft then cranked out version after version of Word and Excel (and later, Microsoft Office) long before EA figured out they could flog you the same sports games year after year just by changing the last digit of the title. Fast forward to 1995. Austria, Finland and Sweden enter the European Union. Britain's oldest investment company, Barings Bank, collapses after Nick Leeson misplaces US$1.4 billion on the Tokyo Stock Exchange. And at 9:02am on Wednesday 19th April, a rented truck containing some 2,300KG of explosive, kills 168 people including 19 children, in Oklahoma City. Windows 95 brought us the Start button, and the Blue Screen of Death Microsoft celebrates its 20th birthday and come August, replaces the aging combination of MS-DOS and Windows 3.11 with the bells & whistles of Windows 95, triggering mass upgrades worldwide and prompting the adoption of an all-new, whizz bang version of Microsoft Office. Gates turns 40 and, clearly feeling on top of his game, he collaborates with Microsoft's Chief Technology Officer, Nathan Myhrvold, and Peter Rinearson, to write his vision for the future - titled The Road Ahead. The book is pitched as Bill's "bird's-eye view of the undiscovered territory on the information highway - an authoritative, thought-provoking, and very readable travel guide for the journey. In this optimistic and refreshingly realistic book, Gates looks ahead to show how the emerging technologies of the digital age will transform all our lives." It occupies the top slot on the New York Times' bestseller list for more than seven weeks and goes on to sell over 2.5 million copies. Of course, attempting to predict the future in any aspect of life, let alone a fast-paced industry like IT, is fraught with danger. Sensibly, Gates acknowledges this in his Foreword: I'm writing this book now as part of my contribution to the debate (about the information highway) and, although it's a tall order, I hope it can serve as a travel guide for the forthcoming journey. I do this with some trepidation. We've all smiled at predictions from the past that look silly today. you can flip through old Popular Science magazines and read about conveniences to come, such as the family helicopter and nuclear power "too cheap to meter." History is full of now ironic examples - the Oxford professor who in 1878 dismissed the electric light as a gimmick; the commissioner of US patents who in 1899 asked that his office be abolished because "everything that can be invented has been invented. This is meant to be a serious book, although ten years from now it may not appear that way. What I've said that turned out to be right will be considered obvious and what was wrong will be humourous. Well, William, it is indeed now ten years later. Let's take a stroll down memory lane and see how many changes you correctly predicted and how many were wide of the mark.
<urn:uuid:e6714df0-8f24-4499-b70f-d303da9c684b>
CC-MAIN-2014-23
http://www.bit-tech.net/bits/2006/02/08/road_ahead_billgates/1
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510273676.54/warc/CC-MAIN-20140728011753-00482-ip-10-146-231-18.ec2.internal.warc.gz
en
0.941219
1,052
2.53125
3
Emerging in the first part of the XXe century and aiming to reject the traditional way of thinking in art, architecture, society and education, the Bauhaus, is both an academy school and one of the most iconic sub-movements of Modernism in art. One century after its creation in 1919 by Walter Gropius, the Bauhaus’ vision is still transcending artists and designers’ creations. Aiming to bring its aesthetic and functional principles within all spheres of the arts, we retrieve Bauhaus’ positions in the work of the most acclaimed painters, sculptors, architects, graphists and designers from the WWI until nowadays. To celebrate the Bauhaus’s anniversary, we will go through the school’s major phases, meet its most iconic members and understand how its different localisations had been impacting the movement. The origins (up to 1919) The Bauhaus roots itself in the thought of William Morris (1834–1896), a British designer who argued that art should meet society’s needs and that form should not be distinguished from the function. Since the late XIXe century, the migration of ideas and artists influenced the pre-war “Art & Craft movement” in Germany which encouraged multidisciplinary practices within art (total work of art) and initiated progressive education concepts in aesthetics. Henry Van de Welde, artist and architect who played an important role in the emergence of Art nouveau in Belgium founded and directed the Weimar Saxon Grand Ducal Art School from 1901 to 1915. Carrying progressive ideas, Van de Welde initiated the transitional step from craftsmanship techniques to industrial technology since 1910. In 1915 he must cede the school direction and recommended Walter Gropius to take it back. Also architect, urbanist and designer, Walter Gropius inherited from the school’s direction plus its training workshops, machines, and materials. Greatly influenced by the modernist ideas celebrating mankind’s intelligence, creativity, and capability for experimentation and radical thinking, Walter Gropius wanted to bring all the art practices under the same roof. He also drew in the guidelines of the German national designers' organization, which harnessed, since its creation in 1907, the rationality and functionality associated with mass production processes in design furniture. In 1919 he managed to merge the Grand Ducal Art school with the Academy of Fine Art under the Bauhaus (literally house of construction) and proclaimed his goal to ”create a new guild of craftsmen, without class distinctions which raise an arrogant barrier between craftsman and artist." Bauhaus Weimar (1919–1925) Aiming to intertwine art, crafts and architecture while including all the arts in the curriculum, Walter Gropius invited from 1919, visual artists, sculptors, dramaturgist, designers, architects and craftsmen to teach at the Bauhaus. The painters Johannes Itten and Lyonel Feininger, and the sculptor Gerhard Marcks present since day 1 were joined the following years by the artist Oskar Schlemmer and the famous painters Paul Klee, and Wassily Kandinsky. Starting to become quite important on the international, Theo van Doesburg came to Weimar in 1922 to promote his movement De Stijl ("The Style"), followed by the visit of El Lissitzky, a Russian Constructivist artist and architect. From 1919 to 1922 the school was shaped by the pedagogical and aesthetic ideas of Johannes Itten, an expressionist painter who favoured a more theoretical fine art practice and redounded the influence of expressionism, especially at the arrival of Kandinsky in the faculty. This started to change in 1922 when the hungarian architect László Moholy-Nagy replaced Itten and rewrote the mandatory introduction course. Joining Gropius’s leaning for the early German modernist style in design and architecture (“New Objectivity” or “New Sobriety”) Moholo Nagy emphasized the practical side of the teaching, the use of industrial material and the further rapprochement between art and crafts. This shift reflects the importance for Germany to compensate its lack of raw material - mainly available to the USA and UK - with skilled labor force capable to conceive innovative and high quality goods. It placed designers and artists as key actors in the international radiation of Germany. From this moment, the school's philosophy stated that the artist should be trained to work with the industry. Showing capacity to innovate within economic constraints, the Bauhaus’s designers dealt with the 20’s great depression by recycling cheap materials such as vinyl, chrome or plywood in design furniture. Feeling the rise of political tension and already impacted by the radical thought of certain members of the school, Gropius prepared a relocation even before 1925, date the Weimar school had to close due to insufficient funds. Already pretty acclaimed by his fellows architects for his work in Alfeld- i.e the Fagus-Werk shoe last factory - Gropius easily got commissioned by the city of Dessau to build a futuristic glass building which will welcome from 1926 the school and its faculty. Bauhaus Dessau (1925–1931) The Bauhaus and Gropius had long been struggling with the divide between individual artistic expression and industrial mass production. If the school had an expressionist legacy epitomised by Klee and Kandinsky, Gropius has been continuously encouraging the creation of a new creative professional kind, driven to shape new solutions for living. The Bauhaus relocalisation fostered its consolidation on the path to the design of new industrial products for the masses. The majority of the products and buildings that still define the image of the Bauhaus today were created in Dessau. In 1928, on Gropius’s recommendation, the director’s post was handed over to the Swiss architect and urbanist Hannes Meyer, previously the head of the architectural department established in 1927. Meyer’s clear calculations and cost-efficient proposals came to be attractive to potential clients. As a director, Meyer brought to the Bauhaus two of its most important building commissions: a five apartments building in Dessau and the ADGB Trade Union School in Bernau ; in 1929 the Bauhaus turned a profit for the first time. However, his strict functionalist vision banishing any aesthetic endeavour added to his radical communist thought compounded the internal tensions and in 1930, he was dismissed by the city council for supposed ‘communist practices’. Pursuing the school’s architectural momentum, Mies Van der Rohe, the new Bauhaus director’s was also its last and least politically minded. Just one year after Mies van der Rohe took office, the city council of Dessau was already dominated by the NSDAP. Trying to save the school and the material, Mies Van der Rohe organized the relocation of the Bauhaus in an old telephone factory in Berlin in 1932. Bauhaus Berlin (1932–1933) If the students were already suffering from the lack of socio-political reference and cuts in product lines under Mies Van Der Rohe’s direction, the creative production became almost impossible after the relocalisation in Berlin. Due to the repressive political situation and the drastic cutbacks in funding, many professors and students left Germany. Forced to let the regime control the school production, Mies Van der Rohe preferred to dissolve the school in July 1933. The aftermath (from 1933) Ironically, the break of the institution led to the continuity of the idea: with the emigration of faculty the Bauhaus agenda spread worldwide, especially in the USA. If the institution became history, its ideas remained highly active and transformed the American pedagogy, and the practice of art, design, and architecture. Moreover, the American’s ambition for artistic dominancy, technological evolution and architectural productions constituted a fertile ground for the Bauhaus’s style development in American institutions and constructions. From the first Bauhaus’s exhibition in 1930 in Harvard, to the second one in 1932 at the MoMa, the Bauhaus became quickly types and models for the New World. In 1937, Walter Gropius joined the Harvard Graduate School of Design’s faculty and brought modern designers, including Marcel Breuer to help revamp the curriculum. The same year, it came to Chicago where the “IIT Institute of Design (ID)” was founded as “The New Bauhaus” and established a program in art led by László Moholy-Nagy. In 1938, Mies van der Rohe was called to join Moholy Nagy and head the architecture school at the Armour Institute in Chicago. The New Bauhaus still has massive influence in design and technology today, for instance, the globally adopted design thinking movement emerged there in the 2000’s. Also called the “international style”, the Bauhaus style marked a paradigm change. In a context of Industrial Revolution, when the machine replaced the craftsman and mass-produced goods replaced individually made artefacts, the Bauhaus had a avant-garde agenda striving for the closest connection between art, people, and technology.” Halfway between the western modernism, rethinking perspectives and color theories, and the eastern’s constructivism rejecting autonomous art, the Bauhaus was a hub for artistic reinventions, and a bridge between the eastern socialism and the western liberalism. At Convelio we can confirm that the Bauhaus’ style has never been so popular,. Indeed, we used to ship reproductions of Bauhaus’ products everyday. For instance, the Josef Albers' fruit bowl, the Jucker-Wagenfeld table lamp, Marcel Breuer's and Mies van der Rohe's chairs and tables, Marianne Brandt's tea kettle and ash tray stand side-by-side…
<urn:uuid:fe644f7b-54a4-40be-8f05-ec3f0f10284a>
CC-MAIN-2020-29
https://www.convelio.com/blog/blogpost/bauhaus-100-anniversary/
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657139167.74/warc/CC-MAIN-20200712175843-20200712205843-00031.warc.gz
en
0.940381
2,084
3.109375
3
What is a VPN and how does it work? - What is a VPN and how does it work? - 10 Reasons Why You Need a VPN - 1. It Protects You When You’re Connected to a Public Wi-Fi - 2. It Unblocks Geo-Restricted Content - 3. It Ensures Data Protection From Internet Service Providers - 4. It Can Help To Prevent Government From Obtaining Your Private Data - 5. It Protects You From Apps That Track Your Information - 6. VPN Offers Protection When Working Remotely - 7. VPN Can Help You In Cutting Cost - 8. VPN is Easy & Convenient To Use - 9. VPN Can Be Adapted Diverse Smart Devices - 10. It Secures Your Online Transactions - Shortcomings about Making Use of VPN - Other Geopolitical Factors Affecting Use of VPN The term VPN stands for Virtual Private Network, which is something quite a large number of people often assume to be some sort of sophisticated high-tech tool meant for tech gurus. However, the reality is entirely different. A VPN is a necessity not just for companies and IT professionals, but also for every individual out there who regularly uses the Internet and various online services. So, it now brings us to the question, why should one use a VPN? Contrary to widely held opinions, VPN is indeed a necessary tool every individual should have in order to: - Have access to online content that is restricted to certain geographic locations; - Ensure your personal data is safe when using public Wi-Fi; - Stop unauthorized third-party agents or individuals from tracking your online activities; - Unlimited access to cyberspace even while traveling abroad. When you consider that lots of activities now take place online than ever before, the need to travel from place to place and coupled with the fact that access to some online platforms are limited to only certain geolocations, then VPN becomes the utility tool that could make things a lot more convenient for you. If you’re wondering how VPN protects you, this can be explained in simple terms. VPN software encrypts your data, routes it through secure networks by using private servers that may be situated in very far places, and also hides your device’s IP address, all in a bid to mask your online identity. By providing anonymity to the user, it ensures easy and secure access to platforms that would ordinarily have been restricted to the user due to their location. 10 Reasons Why You Need a VPN Below are the various reasons why you should seriously think about getting a VPN tool peradventure you don’t have one already. 1. It Protects You When You’re Connected to a Public Wi-Fi All large public places such as airports, bus/train stations, hotels, malls, cafes, etc., now provide Wi-Fi services. Even though it can be quite convenient for individuals to make use of such a facility, but the downside is the issue of security. Therefore, going through your emails, social media accounts or opening any sensitive site without first setting up your VPN could put you at risk because someone out there might be invading your privacy and extracting your sensitive personal information. Yes, these things happen – for example, someone with a laptop and a packet sniffer tool sitting in such public area can analyze the network traffic and possibly extract sensitive data that you’re sending over public Wi-Fi, especially if you connect to insecure websites. However, with the use of a VPN while using such public network, you will be able to protect your data and other sensitive personal details such as account login credentials, banking details or personal information. 2. It Unblocks Geo-Restricted Content Many streaming platforms and services are geo-restricted nowadays. Let’s face it; it seems unfair to divide individuals into those who can access specific content and those who cannot because of their geographical location or undue interference of local authorities. However, with the help of VPN, users around the world can easily override such unfair content restrictions. VPN is configured in such a way it can spoof your actual location and make it appear like you’re in the area of the city/country you selected in your VPN tool, thereby enabling you to have same access like people in such places. This can help to unblock Netflix, BBC iPlayer and other services providing shows, podcasts and other content that you want to stream. Learn more about ways to unblock websites and restricted content online. 3. It Ensures Data Protection From Internet Service Providers Granted that making use of a home Wi-Fi connection is relatively more secure when compared to a public connection, you will still be exposed to an extent. Are you aware that Internet Service Providers (in short, ISP) you pay to provide network connection can equally have a backlink access to your Internet data? In other words, the ISP Company can monitor what you browse, when you browse and your location in real-time. The implication of this is that details describing your browsing habits can be extracted and sold to third-party advertisers or even to authorities who may request them, regardless of using browser’s “private” browsing function or not. There is no doubt that such unauthorized release of information could put the user at risk. However, the good news is that such exposure can minimized with the use of a VPN. Moreover, if your ISP blocks access to specific domains, you can also bypass these restrictions by using a VPN. If you’re into torrenting and are worried about your privacy, VPN also protects your ISP from knowing that you’re using P2P networks. Instead of seeing your actual activities, the ISP now communicates with the VPN server, however, the data you send and receive will be encrypted and unreadable for it. In other words, the Internet Service Provider will no longer see what data you’re sending or receiving via the Internet. Although Internet Service Providers often make claims they do not sell or otherwise handle your data to government, there were many cases to prove this isn’t true in real world. 4. It Can Help To Prevent Government From Obtaining Your Private Data The most obvious example is Snowden’s leaks back in 2013, which revealed that NSA was collecting telephone records of American citizens after a secret court order directing Verizon to handle all of its user’s telephone data daily. On top of that, a tool known as PRISM was used to collect private electronic data belonging to users of Gmail, Facebook, Outlook and many other online services. Moreover, in some countries such as Brazil, local laws oblige ISPs to store user records for a specific period of time, for instance, one year or longer. This isn’t good when it comes to user privacy, as such records are subject to data leaks or simply can be requested by government itself, with or without a warrant. That being said, there are many cases where ISPs do handle user’s data to government, especially in cases when government orders ISPs to provide user’s web browsing history and related data in case of ongoing investigation. That being said, using a VPN can protect your data from being associated with you, but you have to choose the service provider wisely. Look for one that doesn’t keep usage logs and is 100% transparent when it comes to your privacy. A good example is Private Internet Access VPN, who has no-logs policy. It has a history of proving that it doesn’t store any of user data in courts – for instance, in 2016, FBI attempted to retrieve information about a VPN user in a court case, but it failed to retrieve any useful information. Moreover, in 2016, Russian government seized PIA’s servers in a failed attempt to gain information about VPN users, but didn’t succeed to extract any data. PROTECT YOUR PRIVACY WITH A VPN With over 10 years of expertise in VPN industry, Private Internet Access VPN is one of the leading service providers that is also known for its 100% no-logs policy. The VPN is packed with features: it covers 10 connections, offers unlimited bandwidth, successfully unblocks various streaming services, supports torrenting on all servers, has a Kill Switch and more. It is extremely affordable and easy to use. 5. It Protects You From Apps That Track Your Information It is not only ISPs that may want to track you without your knowledge, apps and websites are known to do so, too. Some popular social media platforms including Facebook, Instagram and others have been accused of engaging in such practices. Fortunately, a good VPN will be able to prevent these apps and websites from identifying your real IP address and assigning your online activities to it – including details such as your browsing history, location, operating system used, cookies, screen resolution, installed browser extensions and more. 6. VPN Offers Protection When Working Remotely The ability of VPN software tools to encrypt data i.e. to code it in an unreadable format so that no one can read them is what enables it to protect the user’s data from being obtained by unauthorized parties. Due to the increased activity of remote work during the pandemic, company or business owners can even invest in VPN to enable their workers to connect to the office network safely from home or even public place providing Wi-Fi. In such a situation, VPN becomes a utility tool that can help business owners to maintain productivity without the risk of losing sensitive materials to online predators that may want to gain access or steal from them. 7. VPN Can Help You In Cutting Cost Aside from protecting you and helping you to gain access to online platforms you ordinarily could not due to restrictions placed on your country/region, VPN can also help you to save money. By leveraging its ability to spoof your locations, you can choose any other city/country where subscriptions and payments for services such as air flights and hotel bookings are offered at a cheaper rate instead of using your actual location where such fees could be higher, by so doing; you end up making significant savings. Moreover, speculations that airlines increase prices due to repeated user’s searches for flights (browser cookies to blame) have raised concerns over the last decade. With VPN, this should no longer be an issue as you can bypass tracking. 8. VPN is Easy & Convenient To Use The need for individuals and corporate organizations to protect their online activities from cybercriminals and other predators that may want to extort or sabotage them makes it necessary to certain security measures. Unfortunately, some of these security devices can be cumbersome in nature. Unlike those ones, VPN is quite easy and convenient to use. Some VPNs, particularly the more recent ones are user-friendly with intuitive interfaces that are easily navigated and configured by anyone. 9. VPN Can Be Adapted Diverse Smart Devices Although VPN features and protection plans may vary slightly depending on the priority of the producer and their target audience, most of them are easily adaptable and can be used to protect other devices such as smartphones and tablets aside from their conventional use in laptops and stationary computers. Therefore, users should not forget that their privacy matters not only when using laptops or PCs, but mobile phones or tablets as well. 10. It Secures Your Online Transactions As more transactions are now done online, the risks associated with it also increases. Whether you’re doing online banking or shopping, cybercriminals could target you and your sensitive data. However, with the use of VPN, it will encrypt your sensitive details with robust protocols so that no nosy criminals could access them. Shortcomings about Making Use of VPN Like most other things that are imperfect, VPN equally has its own shortcomings. Even though it can spoof your actual location and make it anonymous yet some apps are smart enough to detect that something isn’t right with your online activity. For example, apps you’re logged in might still be capable to tailor in-app advertisements for you as a user, despite the IP you’re connected from. In addition to that, when you enable cookies as requested in some sites, the companies or owners of such platforms can still track you and will be able to gain access to your behavior while you’re on the site and after. However, to guard against such tracking activities, it is recommended for you to make use of an open-source tool such as Tor alongside a VPN for enhanced protection. In addition, do not be too fascinated about free VPN services. In fact, we recommend staying away from them. Just like with any freeware, it might hide unwanted additions, such as spyware (adware or browser hijackers) or even more severe threats. Moreover, over the years, several free VPNs were detected to contain malvertising, and services like Hola were spotted exhibiting malware-like behavior. That being said, when it comes to your privacy and security, we definitely do not recommend using free services. Other Geopolitical Factors Affecting Use of VPN There are other political issues surrounding the use of VPN in some places across the globe. For instance, in countries like China and Russia, there are laws in place that make the free use of VPN illegal or strictly monitored. Therefore, it is very important to consider local laws pertaining use of VPNs when traveling abroad. Moreover, when looking for a VPN, you should first find out whether the service provider has servers in countries you will be trying to unblock. It is also important to find out whether the servers are physical or virtual. Sometimes, physical servers in specific countries with local laws that are not in favor to user’s privacy can mean danger to your private information as they can be seized or inspected with or without a warrant. For this reason, we recommend that you choose your privacy protector cautiously and inspect its logging policy and server locations under a magnifying glass. Norbert Webb is the head of Geek’s Advice team. He is the chief editor of the website who controls the quality of content published. The man also loves reading cybersecurity news, testing new software and sharing his insights on them. Norbert says that following his passion for information technology was one of the best decisions he has ever made. “I don’t feel like working while I’m doing something I love.” However, the geek has other interests, such as snowboarding and traveling. Gnaneshwar Gaddam says
<urn:uuid:d0eb1c56-3077-4a14-a1a7-e48ab8f255f8>
CC-MAIN-2023-23
https://geeksadvice.com/why-you-need-a-vpn/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656737.96/warc/CC-MAIN-20230609132648-20230609162648-00006.warc.gz
en
0.943091
3,001
2.578125
3
Florida becomes intellectuals’ burial ground Written by Nina Lincoff on August 20, 2014 Florida is known as a resting place for those in their twilight years. Now a study of cultural migration over two millennia illustrates the point. Researchers from Texas and Miami have created an analytic map of cultural history as it flows across the globe, newly published in the journal “Science”. Using databases like Google-owned Freebase, researchers pinpointed birth and death sites of 150,000 notable thinkers over the past 2,000 years, sorting data into categories like governance, academics, business, and art and architecture. By visualizing the human flow from birthplace to death, researchers highlighted trends in cultural migration. The project itself is an example of migration. Maximilian Schich, Ph.D., now at the University of Texas at Dallas, met Chaoming Song, Ph.D., now at the University of Miami, when both were at Northeastern University in Boston. “I’m physics, Max is in humanities. We come from different disciplines, but we came up with a more or less complementary theory,” Dr. Song said. In the project’s timeframe Florida is a new cultural hub, so it’s highly unbalanced in births vs. deaths. “We will see if, as Florida grows up, there is a tendency towards balance,” Dr. Song said. Where notable figures are born versus where they die is effective in charting the migration of culture and ideas across the globe and time. In the Americas, Mexico City and the Eastern Seaboard were some of the first hubs to grow as European thinkers left their birthplace to live and die out west. As data progresses into the 20th century, the West Coast becomes a hub for the transfer of thought and culture, drawing many of those born on the Eastern Seaboard. In the early 20th century, the advent of affordable cars can be seen in the increase of people moving west. Florida doesn’t begin to flourish until about the 1960s, and by 2011, it can be seen as a haven for notable thinkers to finish out their days. “Florida attracts the famous in their later life,” Dr. Song said. Universities like UM and Florida State exemplify how Florida is a resting place. British physicist Paul Dirac, a 1933 Nobel Prize co-winner, spent his last years at UM and FSU. In one data set, 15 were born in Florida vs. the 236 that died here, Dr. Song said. While cultural hubs like Rome and London balance in births and deaths over the years, cities like Hollywood, CA, remain significant outliers, with 10 times as many deaths as births. The unbalance in cities might be partly due to their discovery dates. This is the first analysis of cultural migration on so large a scale. “Before, projects have looked at one particular person or one particular city, or maybe Europe in a very general sense. What we have here is a very detailed computational data set,” Dr. Song said. Where he and his team teased out migration trends and hubs in their data, historians filled in the events anchored to the data. “With computational analysis without any historical knowledge, we can say something happened, and the historians can say what happened,” Dr. Song said – interdisciplinary study at work.
<urn:uuid:e32a8984-b20b-442f-a1cf-91917b68c7cd>
CC-MAIN-2017-39
http://www.miamitodaynews.com/2014/08/20/florida-becomes-intellectuals-burial-ground/
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689874.50/warc/CC-MAIN-20170924044206-20170924064206-00034.warc.gz
en
0.962806
704
2.59375
3
Alphonse Chapanis (1917-2002) combined his interests in basic psychological research in vision and perception with applications to engineering design to become a distinguished leader of human factors engineering (referred to as ergonomics in many industrial engineering departments and in other countries around the world). While still in graduate school in 1942, Chapanis joined the Army Air Force Aero Medical Lab in Dayton, Ohio, as the first psychologist to work there. He completed his PhD the following year, which brought him an appointment as second lieutenant and advanced training as an aviation physiologist. At the lab, Chapanis worked on various vision-related projects including displays suitable for night flying, black-out under high g-forces, vision loss due to anoxia at high altitude, and general aircraft design. An early design issue involved an alarming incidence of B-17s crashing upon landing. Chapanis noticed that the landing flaps and landing gear had identical switches that were placed side by side. In high stress aviation situations, it was easy to confuse the two, which contributed to crashes while landing and taxiing the “Flying Fortresses.” Chapanis’ military work during World War II whet his appetite for the applications of psychology and the potential of human factors research. At the war’s conclusion, Chapanis joined a Navy-sponsored field laboratory undertaking systems research that was administered by The Johns Hopkins University. He began working with Clifford Morgan and Neal Bartlett. Soon, the work was transferred to the Hopkins campus in Baltimore, Maryland, and Wendell Garner became involved. Based on their military-related research and several opportunities to give lectures on “Men and Machines,” Chapanis, Garner, and Morgan published the first textbook on human factors, Applied Experimental Psychology: Human Factors in Engineering Design, in 1949. While Morgan and Garner went on to distinguished careers as experimental psychologists at Hopkins, Chapanis continued to run the Navy project until 1958 and then opened a communications research laboratory in the Psychology Department. There he did pioneering, widely-cited work on multimodal communication at a time when people were just starting to think about communicating with computers or via computers to other humans. He showed that, among all possible combinations of visual contact, speaking, writing, and typing, the best performance always included an interactive speech mode. He had a knack for designing technology-relevant experiments of lasting usefulness because they made no assumptions about the specific directions that the technology might evolve. They were focused on the human behavior. Although not always accepted by his psychology colleagues at Hopkins, Chapanis was an outstanding teacher, who conducted a multitude of human factors research projects, trained a cadre of distinguished graduate students, and grew his reputation as an authority and leader in the growing field of human factors engineering. He was also very involved in ergonomics around the world as a member of the Council of the International Ergonomics Association for six years between 1967 and 1973. Chapanis was most active internationally during the Cold War and spent a year traveling Europe and reporting on his observations of foreign research to the Office of Naval Research and the U.S. military more generally. For example at the 1967 International Symposium on Machine Design in Prague, he reported that communist ergonomics utilized physiological indices whereas American researchers utilized behavioral criteria. Communist ergonomists also had easier access to industry since both education and work were state controlled so that “company secrets” were rare. When not involved internationally, Chapanis consulted for private industry and continued his own research. During a year in private industry, Chapanis worked at Bell Labs, focusing on human preferences for telephone keypad numbers and displays. He noted that, on the key pads in use by telephone operators, having two horizontal rows of five numbers each, 13 percent of all manually keyed calls involved an error in the typed number. He tested six different keying arrangements and discovered that a three by three display with the “0” off to the side was a preferable design (Lutz & Chapanis, 1955). Later, when the rotary dial telephone was being abandoned his and subsequent research supported the arrangement that we find on the telephone key pads of today. He consulted with IBM from 1959 through the mid 1990s and was their primary external source of human factors education and consulting as they transitioned from predominately hardware manufacturer to a software and systems organization. Together with IBM experts he created a human factors training course that was given throughout the IBM international organization. His consulting ranged widely across the organization but in the later years focused mainly on the Federal Systems Division. He was particularly interested in safety issues. He conducted some of the earliest research (Safren & Chapanis, 1960) on hospital medication errors due to flaws in the labeling design of prescriptions and doctors’ illegible handwriting. In a famous paper entitled, “Words, Words, Words,” he railed against the amazing number of situations, from highways to elevators, in which confusing and even conflicting wording of signs contributed to errors, often having safety implications (Chapanis, 1965). His memoirs detail his recollection of one incident that highlighted the divide between ergonomic safety and marketing in the 1960s automobile industry. “I was looking at a sporty model that had a steering column with a sharply pointed tip extending an inch or two beyond the steering wheel. Townsend, the President of Chrysler Motors, asked me what I thought about it. My exact, or very nearly exact, words were: ‘Mr. Townsend, do you know what you’ve designed here? You’ve designed a spear aimed at the driver’s heart.’ I also remember distinctly his cynical reply, ‘Doc, it’ll sell’ (Chapanis, 1999, p. 139).’’ From a historical perspective, Chapanis was instrumental to the field of human factors engineering during its period of gestation and growth between World War II and the 1980s. He should be credited with being one of the major forces for education and advocacy of the importance of understanding human behavior in the context of technological innovation and systems design during this formative period. Chapanis, A. (1965). Words, words, words. Human Factors, 7, 1-17. Chapanis, A. (2002). The Chapanis chronicles: 50 years of human factors research, education and design. Santa Barbara, CA: Aegean. Lutz, M.C., & Chapanis, A. (1955). Expected locations of digits and letters on ten-button keysets. Journal of Applied Psychology, 39, 314-317. Safren, M.A., & Chapanis, A. (1960). A critical incident study of hospital medication errors. Hospitals, 34, 32-34, 57-66. Leave a comment below and continue the conversation.
<urn:uuid:87a257a5-af0f-4444-bce6-84293b99ff9a>
CC-MAIN-2014-15
http://www.psychologicalscience.org/index.php/publications/observer/2010/april-10/alphonse-chapanis-pioneer-in-the-application-of-psychology-to-engineering-design.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609539705.42/warc/CC-MAIN-20140416005219-00405-ip-10-147-4-33.ec2.internal.warc.gz
en
0.966989
1,426
2.921875
3
A Horsepower-hour (hph) is an outdated unit of energy, not used in the SI system of units. The unit represents an amount of work a horse is supposed capable of delivering during an hour (a horsepower integrated over a time interval of an hour). Based on differences in the definition of what constitutes the 'power of a horse', a horsepower-hour differs slightly from the German "Pferdestärkenstunde" (PSh): - 1.014 PSh = 1 hph = 1,980,000 lb·ft = 0.7457 kWh. - 1 PSh = 0.73549875 kWh = 2647.7955 kJ (exactly by definition) The horsepower-hour is still used in the railroad industry when sharing motive power (locomotives.) For example, if railroad A borrows a 2,500 horsepower locomotive from Railroad B and operates it for twelve hours, Railroad A owes a debt of (2,500 * 12) 30,000 horsepower-hours. Railroad A may repay the debt by loaning Railroad B a 3,000 horsepower locomotive for ten hours. |This standards- or measurement-related article is a stub. You can help Wikipedia by expanding it.|
<urn:uuid:23edb38c-9f3f-4d08-9cc2-ef967245f9c3>
CC-MAIN-2014-23
http://en.wikipedia.org/wiki/Horsepower-hour
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1404776440593.58/warc/CC-MAIN-20140707234040-00096-ip-10-180-212-248.ec2.internal.warc.gz
en
0.871765
260
3.4375
3
Born on April 6, 1928, in Chicago, Illinois, James D. Watson is credited with the discovery of the double-helix structure of DNA along with Francis Crick. Watson received a 1962 Nobel Prize and went on to do work in cancer research and mapping the human genome. He later came under fire for several controversial remarks on subjects ranging from obesity to race-based intelligence. James Dewey Watson was born in Chicago, Illinois, on April 6, 1928, and spent his childhood there, attending Horace Mann Grammar School and South Shore High School before earning a scholarship to the University of Chicago and enrolling at age 15. In 1947, he received a Bachelor of Science degree in zoology and then went on to attend Indiana University in Bloomington, where he received his Ph.D. in zoology in 1950. During his graduate studies, Watson was influenced by the work of geneticists H. J. Muller and T. M. Sonneborn and microbiologist S. E. Luria. His Ph.D. thesis was a study of the effect of hard X-rays on bacteriophage multiplication, and he became interested in the work of scientists working at the University of Cambridge with photographic patterns made by X-rays. In 1950, Watson began his postdoctoral studies in Copenhagen as a Merck Fellow of the National Research Council. During this time, he worked with biochemist Herman Kalckar, and later microbiologist Ole Maaløe, and studied bacterial viruses to investigate the structure of DNA. In the spring of 1951, he went with Kalckar to the Zoological Station at Naples, where he met Maurice Wilkins and saw for the first time crystalline DNA's X-ray diffraction pattern. That fall, Luria and English biochemist John Kendrew helped Watson move his research to the University of Cambridge's Cavendish Laboratory, where he continued his work with X-rays, learning diffraction techniques. He also met molecular biologist Francis Crick, who shared his interest in puzzling out the structure of DNA. The pair began their historic work soon after. Crick's and Watson's first serious effort toward learning the structure of DNA came up short, but their second attempt, concluded in the spring of 1953 and resulted in the pair putting forth the double-helical configuration, which resembles a twisting ladder. Their model also showed how the DNA molecule could duplicate itself, thus answering one of the constant fundamental questions in the field of genetics. Watson and Crick published their findings in "Molecular Structure of Nucleic Acids: A Structure for Deoxyribose Nucleic Acid” in the British journal Nature in April-May 1953 to great acclaim. Watson and Crick had used the work of English chemist Rosalind Franklin, a colleague of Maurice Wilkins's at King's College London, to arrive at their groundbreaking discovery, however, her contribution to their findings would go largely unrecognized until after her death. Franklin had compiled several unpublished working papers describing the structural qualities of DNA, and with her student Raymond Gosling had taken an X-ray diffraction image of DNA, known as Photo 51, which would become crucial evidence in identifying the structure of DNA. Without Franklin's knowledge or permission, Wilkins shared Photo 51 and her data with Watson. Although Watson and Crick included a footnote in their article acknowledging that they were "stimulated by a general knowledge" of Franklin's unpublished contributions, it was Watson, Crick and Wilkins who went on to receive a Nobel Prize for their work in 1962, four years after Franklin had died of ovarian cancer. Academia and Beyond In 1955, Watson moved on to Harvard University, where he taught biology for 15 years and conducted research. While there, he published Molecular Biology of the Gene, which would go on to become one of the most extensively used biology texts. In 1968, Watson took the reins of the Laboratory of Quantitative Biology in Cold Spring Harbor, Long Island, New York, transforming it into a global hub of molecular biology research over the following decades. That year, he also wrote his first memoir The Double Helix: A Personal Account of the Discovery of the Structure of DNA. Watson married Elizabeth Lewis in 1968, and they have two sons together — Rufus, who was born in 1970, and Duncan, who was born in 1972. His older son Rufus was diagnosed schizophrenia, which played a role in the direction of Watson's work. "Warm and perceptive, Rufus cannot lead an independent life because of schizophrenia, lacking the ability to engage in day-to-day activities," Watson was quoted in The Telegraph. "For all too long, my wife and I hoped that what Rufus needed was an appropriate challenge on which to focus. But as he passed into adolescence, I feared the origin of his diminished life lay in his genes. It was this realization that led me to help to bring the human genome project into existence." From 1988 to 1992, Watson helped to establish and direct the Human Genome Project at the National Institutes of Health, where he oversaw the mapping of the genes in human chromosomes. His own genome was sequenced in 2007, making him the second person to have this done. "I am putting my genome sequence on line to encourage the development of an era of personalized medicine, in which information contained in our genomes can be used to identify and prevent disease and to create individualized medical therapies," Watson wrote on the Cold Spring Harbor Laboratory website. In 2007, Watson also wrote the memoir Avoid Boring People: Lessons from a Life in Science. In October of that year, Watson was sharply criticized for controversial statements he made when he was quoted in The Times saying: ”[I am] inherently gloomy about the prospect of Africa [because] all our social policies are based on the fact that their intelligence is the same as ours—whereas all the testing says not really." His comments resulted in his resignation from Cold Spring Harbor Laboratory, and soon after, he formally announced his retirement. Watson apologized for his comments and in a statement released by the Associated Press he said: “I cannot understand how I could have said what I am quoted as having said. There is no scientific basis for such a belief.” These were not Watson's first statements that stirred controversy. At a lecture at the University of California at Berkeley in 2000, the Nobel laureate suggested a link between exposure to sunlight and sexual drive. "That's why you have Latin lovers," Watson said. "You've never heard of an English lover. Only an English patient." At the lecture, he also said: "Whenever you interview fat people, you feel bad, because you know you're not going to hire them." In another controversial move, Watson auctioned off his Nobel Prize at Christie's in December 2014, the first time a Nobel Prize was sold by a living Nobel laureate. It sold for $4.1 million, which Watson told the New York Times, would be used in part to raise funds "to support and empower scientific discovery," as well as be used to support himself and his family. Russian billionaire Alisher Usmanov, who was listed as Russia's richest man by Forbes magazine, purchased the Nobel Prize and returned it to Watson. “It was a huge honor for me to be able to show my respect for a scientist who has made an invaluable contribution to the development of modern science," Usmanov said in a statement. "These kinds of awards must remain with their original recipients.” Over the course of his long career, James D. Watson has been honored numerous times, taking home the John Collins Warren Prize of the Massachusetts General Hospital (1959, with Crick), the Lasker Award (1960, with Crick and Maurice Wilkins) and the Nobel Prize in Physiology or Medicine (1962, with Crick and Wilkins), among others. Additionally, he is a member of the American Academy of Arts and Sciences, the National Academy of Sciences and the Danish Academy of Arts and Sciences. We strive for accuracy and fairness. If you see something that doesn't look right, contact us!
<urn:uuid:008a01fe-0595-4bad-ac76-13e9cacb87d4>
CC-MAIN-2020-16
https://www.biography.com/scientist/james-d-watson
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370495413.19/warc/CC-MAIN-20200329171027-20200329201027-00049.warc.gz
en
0.977155
1,670
3.640625
4
The first railway on Indian sub-continent ran over a stretch of 21 miles from Bombay to Thane. The idea of a railway to connect Bombay with Thane, Kalyan and with the Thal and Bhore Ghats inclines first occurred to Mr. George Clark, the Chief Engineer of the Bombay Government, during a visit to Bhandup in 1843. The formal inauguration ceremony was performed on 16th April 1853, when 14 railway carriages carrying about 400 guests left Bori Bunder at 3.30 pm "amidst the loud applause of a vast multitude and to the salute of 21 guns." The first passenger train steamed out of Howrah station destined for Hooghly, a distance of 24 miles, on 15th August, 1854. Thus the first section of the East Indian Railway was opened to public traffic, inaugurating the beginning of railway transport on the Eastern side of the subcontinent. In south the first line was opened on Ist July, 1856 by the Madras Railway Company. It ran between Vyasarpadi Jeeva Nilayam (Veyasarpandy) and Walajah Road (Arcot), a distance of 63 miles. In the North a length of 119 miles of line was laid from Allahabad to Kanpur on 3rd March 1859. The first section from Hathras Road to Mathura Cantonment was opened to traffic on 19th October, 1875. These were the small’s beginnings which is due course developed into a network of railway lines all over the country. By 1880 the Indian Railway system had a route mileage of about 9000 miles. INDIAN RAILWAYS, the premier transport organization of the country is the largest rail network in Asia and the world’s second largest under one management. Indian Railways is a multi-gauge, multi-traction system covering the following: Narrow Gauge (762/610 mm) Other Interesting facts of Indian Railways Indian Railways runs aroun d 11,000 trains everyday, of which 7,000 are passenger trains 7566 - locomotives 37,840 - Coaching vehicles 222,147 - Freight wagons 6853 - Stations 300 - Yards 2300 - Good sheds 700 - Repair shops 1.54 million - Work force Territorial Readjustment of Zones and In-House Reforms In order to bring about greater efficiency in administration, speedy implementation of on-going projects, better customer care, reduction of workload on General Managers etc., Indian Railways have decided to create seven new zones by territorial re-adjustment of existing zones. The new zones, having limited financial burden on Railways, will have thin and lean, efficient and modern administrative set up. Two of the new zones have already started functioning. National Rail Vikas Yojana With a view to complete strategically important projects within a stipulated period of time, a non-budgetary investment initiative for the development of Railways has been launched.. Under the scheme all the capacity bottlenecks in the critical sections of the railway network will be removed at an investment of Rs.15,000 crore over the next five years. These projects would include: 1.Strengthening of the golden Quadrilateral to run more long-distance mail/express and freight trains at a higher speed of 100 kmph. 2.Strengthening of rail connectivity to ports and development of multi-modal corridors to hinterland. 3.Construction of four mega bridges - two over River Ganga, one over River Brahmaputra, and one over River Kosi. 4.Accelerated completion of those projects nearing completion and other important projects. New Steps towards Safety and Security : Safety of 13 million passengers that Indian Railways serve every day is of paramount importance to the system. Over the years, apart from the regular safety norms followed, the network has taken a number of steps through innovative use of technology and stepped up training to its manpower to enhance safety standards. Constitution of Rs.17,000 crore non-lapsable Special Railway Safety Fund (SRSF) to replace the arrears of aging assets of Railways over the next six years has been a historical move in this direction. A number of distressed bridges, old tracks, signalling system and other safety enhancement devices will be replaced during this period. As far as budget allocation for safety is concerned, Rs.1,400 crore was allocated in the revised estimate for the year 2001-02 and Rs.2,210 crore for the year 2002-2003. Extensive field trials of the Anti-Collision Device (ACD), indigenously developed by Konkan Railway, is going on and once deployed across the Zonal Railways, this innovative technology will help railways reduce accidents due to collision between trains. Security of railway passengers is at present a shared responsibility of the Railway Protection Force (RPF) and the Government Reserve Police (GRP). Efforts are on to amend the Railway Act to give more powers to the RPF in ensuring security of passengers on trains and within Railway premises. Deployment of women police Force has been made for security and assistance of women passengers. Improving Financial Health : The financial position of Indian Railways has been slowly but steadily improving. Some of the highlights of the financial performance during 2001-02 include: improved operating ratio from 98.8 per cent to 96.6 per cent, savings in ordinary working expenses of Rs.1,487 crore, Depreciation Reserve Fund (DRF) balance goes up from Rs. 78.04 crore during March last year to Rs.632.99 crore during same time this year. Railways have established a new milestone in incremental freight loading during July this year by carrying 5.70 million tonnes of goods. Freight loading for the last financial year crossed the target and attained 492.31 million tonnes. New Trends in Passenger Amenities : To take care of the unreserved segment of the passengers, a new pilot project on computer based unreserved ticketing has been launched this year. Of the 13 million passengers served by the network everyday, nearly 12 million are unreserved passengers. To cater to this huge segment, computer based ticketing systems has been launched for all stations in Delhi area and in due course throughout the country. With this, unreserved tickets can be issued even from locations other than the boarding station and will reduce crowds at booking offices and stations. Indian Railway Catering and Tourism Corporation with the assistance of Centre for Railway Information Systems has launched on-line ticketing facility which can be accessed through website irctc.co.in. Computerized reservation facilities were added at 245 new locations. At present these facilities are available at 758 locations in the country covering about 96 per cent of the total workload of passenger reservation. Computerized Reservation related enquiries about accommodation availability, passenger status, train schedule, train between pair of stations etc. have been made web enabled. A pilot project for issuing monthly and quarterly season tickets through Automated Teller Machines (ATMs) has been launched in Mumbai this year and has been found very successful. Another pilot project for purchasing tickets including monthly and quarterly season tickets through Smart Card has also been launched. "National Train Enquiry System" has been started in order to provide upgraded passenger information and enquiries. This system provides the train running position on a current basis through various output devices such as terminals in the station enquiries and Interactive Voice Response System (IVRS) at important railway stations. So far the project has been implemented at 98 stations. Freight Operations Information System (FOIS) Computerisation of freight operations by Railways has been achieved by implementing Rake Management System (RMS). Such FOIS terminals are available at 235 locations Railways have established their own intra-net ’Railnet’ It provides networking between Railway Board, Zonal Headquarters, Divisional headquarters, Production Units, Training Centers etc. Sterling Performance by PSUs The public sector undertakings of the Railways, especially IRCON and RITES, scored commendable achievements during the last three years. IRCON International has achieved a record turnover of Rs.900 crore during 2001-02 and the foreign exchange earnings of this prestigious organization has increased six fold over the years. At the international level, IRCON is at present executing different projects in Malaysia, Bangladesh and Indonesia. The PSU has registered a strong presence in the international scenario by its sterling track record. RITES, another prestigious PSU under the Ministry has scaled new heights in performance, profit and dividend to the shareholders during the last three years. Its turn over increased from Rs.172 crore in 1999 to Rs.283 crore in 2002. RITES for its sterling performance secured the prestigious ISO-9001 Certification this year. The company has also entered into export/leasing of locomotives in different countries in Asia and Africa. RITES is operating all over the world including Columbia, UK, Iran, Malayasia, Myanmar, Bangladesh, Sri Lanka, Tanzania, Uganda, Ethiopia, Turkmenistan and Uzbekistan. Indian Railways Finance Corporation Limited secured excellent rating for fourth year in succession by the Department of Public enterprises on the basis of the performance targets. Besides, Standards and Poor’s, the international credit rating agency, also reaffirmed the sovereign ratings to IRFC. The Corporation has been making profits and paying dividends. Indian Railway Catering & Tourism Corporation ( IRCTC ) Internet based ticket booking has been launched by IRCTC in Delhi, Chennai, Bangalore, Mumbai and Calcutta this year. Hygienic and air-conditioned food plazas having consumer-friendly ambience opened at Pune and Chennai and license for similar plazas awarded for 17 more locations. In all, 50 such plazas will be opened by the end of this financial year across the zonal Railways. Railneer - packaged drinking water is to be made available from December this year. More than half a lakh tourists have availed the value added tour package programme launched by the Corporation this year. Innovative Technologies by Konkan Railway : Konkan Railway Corporation (KRC), the technological marvel of Indian Railways, has invented quite a few new technologies. Anti Collision Device (ACD), state-of-art indigenous technology of KRC is currently under-going intensive field trials and is capable of avoiding collision between trains. Sky bus metro is another innovative, economic and eco-friendly mass rapid transportation solution devised by Konkan Railway. Self Stablising Track (SST) devised by KRC, which is undergoing trials at present, will help Railways run the fastest train in the near future and will make tracks much more safe and sustainable. Private Sector Participation : The participation of both private and public sectors in developing rail infrastructure has gone up. A joint venture company was formed with Pipava Port authorities to provide broad gauge connectivity to Pipava Port. MoUs have been signed between Ministry of Railways and the State governments of Andhra Pradesh, Karnataka, Maharashtra, West Bengal, Tamil Nadu and Jharkhand in developing rail infrastructure in these States. Telecommunication - New Trends : To give improved telecommunication systems on Railways, Optical Fibre based communication systems has been adopted and laying OFC has increased to 7,700 route kilometer this year. Rail Tel Corporation has been created to make a nationwide broadband multimedia network by laying optical fibre cable along the railway tracks. This system will provide better operational and passenger amenities and additional revenue to Railways. New Technologies : India became the first developing country and the 5th country in the world to roll out the first indigenously built "state-of-the-art" high horse power three phase electric locomotive when the first such loco was flagged off from Chittranjan Locomotive Works (CLW). CLW has been achieving progressive indigenisation and the cost of locomotives has come down to the level of Rs.13.65 crore. Diesel Locomotives Works, Varanasi has produced state-of-the-art 4000 HP AC/AC diesel locomotive in April this year. These locos are capable of hauling 4,800 tonne freight trains at a speed of 100 KMPH and can run continuously up to 90 days in one stretch without any major maintenance. Honours and Awards Indian Railways achieved a number of recognitions and awards in sports, tourism sector and for excellence in operational matters. In the Common Wealth Games in Manchester, the Indian teams record performance has been mainly due to Railway team’s excellence in sports. Except one member the entire women’s Hockey team which bagged the gold medal belonged to Railways. Mohd Ali Qamar of Indian Railways has bagged gold medal for boxing and other participants from Railways helped India win medals in many a team events. A number of sportspersons from Railways were conferred with the coveted Arjuna Awards and other major sports awards. Darjeeling Himalayan Railways attained the World Heritage Status from UNESCO. Fairy Queen, the oldest functioning steam engine in the world, which finds a place in the Guinness Book of World Records, got Heritage Award at the International Tourist Bureau, Berlin in March, 2000. on operational front, Delhi Main station entered the Guinness Book for having the world’s largest route relay interlocking system. Social obligations and care for weaker sections Senior citizens, students, disabled persons etc. enjoy concessional benefits from Railways. New initiatives in this area during the last three years include reduction of age limits for special concession to senior women citizen from 65 to 60 years, blind and mentally challenged persons can now travel in AC classes on confessional rates. Free second class Monthly Season Tickets (MSTs) for school going children upto tenth standard for travel between home and school was also introduced. Tie-Up with Foreign Railways Indian Railways is in constant touch with Railways across the world to bring in state-of-art facilities in its system. Towards this, a Memorandum of Understanding was singed during the Eighth Session of the Indo-Austria Joint Economic Commission held in Vienna. This seeks to promote and deepen long-term infrastructure-specific cooperation between Indian and Austrian Railways to their mutual benefit.A three-day International Conference of Union of Railways was organised by Indian Railways in New Delhi in which hundreds of delegates from various industries and Railways around the world participated. SOME USEFUL LINK FOR YOU. CONCERT - COUNTRY-WIDE NETWORK FOR COMPUTERIZED ENHANCED RESERVATION AND TICKETING - developed by CRIS, Chanakya Puri, New Delhi, is a total networking solution to Indian Railways Passenger Reservation System. Indian Railways computerized Passenger Reservation System (PRS) currently operates from five regional centers located at Delhi, Bombay, Calcutta, Madras and Secunderabad. CRIS was assigned the task of development and implementation of the new software incorporating networking for Indian Railways thereby interconnecting the five PRS centers. The new On-line Passenger Reservation System -CONCERT - developed using client-server model for distributed computing is a total solution to the networking of the PRSs. A dedicated team of software professionals contributed to the successful implementation of CONCERT. The software has been successfully implemented at all of the five PRS' site viz. Secunderabad in Sept. 1994, and New Delhi in Sept. 1996,Calcutta 14th June 1998 and recently at Mumbai on 11th Jan 1999, and at Chennai on 12th April 1999 thus the complete network become operational on 18th April 1999, and has been working satisfactorily since then. All of the five sites have been internet-worked over a 64 kbps line using routers, on leased communication line connections from Department of Telecom (DOT). Thus PRS network of the Indian Railways will enable reservations in any train, date, or class, between any pair of stations to the traveling public on about 2000 terminals across the country. Under the network environment it is proposed to provide; Universal Terminals. Universal Terminals are those from where any reservation activity on network can be done transparently. For any further information about CRIS, you may contact Web Master, CRIS firstname.lastname@example.org. 1. ARE YOU FORGET YOUR PAN NUMBER ? CLICK HERE AND PUT NAME AND DATE OF BIRTH CORRECTLY.
<urn:uuid:a60043d5-1c92-456e-80e2-a56a3dccf78e>
CC-MAIN-2017-34
http://er.indianrailways.gov.in/view_section.jsp?lang=0&id=0,6,444,1013
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886102993.24/warc/CC-MAIN-20170817073135-20170817093135-00682.warc.gz
en
0.947158
3,429
3.15625
3
Despite all advancements in antimicrobial treatments and surgical infection control, vascular graft infections remain a major cause of morbidity and mortality. Vascular infections can lead to enteric fistulas, pseudoaneurysm formation, ruptures, septic emboli and limb amputation, bacteremia and sepsis, and ultimately death. With the shift in vascular surgery practice from open to less invasive endovascular and percutaneous methods, more stents and stent grafts are being employed to treat vascular patients. In addition, with the advancement of prosthetic material technology, more prosthetic patches and grafts are being used by vascular surgeons in open surgery. This increased utilization of “foreign” material has increased the potential and amplified the complexity of vascular grafts infections. As such, the management of vascular infections usually requires complex strategies involving substantial human and equipment resources, multidisciplinary approaches, as well as prolonged and multiple interventions. In the chapter, we discuss the etiology, classification, presentation, and diagnostic modalities for the different types of vascular graft infections as well as the suggested treatment strategy for each. ETIOLOGY AND PATHOGENESIS Vascular graft infections arise from either a contamination at the time of graft insertion or from hematogenous spread or from direct extension of a nearby infection.1,2 Vascular infections due to contamination at the time of insertion present in the early postoperative period. They are thought to arise due to sterile field contamination in the operating room, from inadequate sterile techniques, contact with patient’s skin, iatrogenic bowel injury, or from the transection of lymphatic channels in the presence of remote infected organs.3,4 Vascular infections due to hematogenous spread usually present later in the postoperative course. Bacteremia from distant infections such as genitourinary, gastrointestinal (GI), foot infections, or periodontal infections can seed the vascular graft. The risk of seeding is highest during the first 2 months but extends for up to 1 year, or until the development of a pseudointimal lining and complete endothelization of the graft.5 Vascular infections due to extension of a nearby infection occur when a surgical site infection or other nearby infection progresses to the adjacent graft. Examples include a wound infection in the subcutaneous tissue of an infrainguinal bypass that progresses to the deeper planes into the adjacent graft, or a suboptimal coverage of an aortic graft that leads to erosion of the graft into a bowel loop that directly infects the aortic graft. Gram-positive cocci account for almost two-thirds of vascular graft infections.6 While historically Staphylococcus aureus was the most common isolated organism, recent reports found that coagulase negative staphylococcus have taken the lead.7 Staphylococcus organisms can establish infection through biofilm and slime production. These biofilms protect the bacteria from the innate immune system and limit the efficacy of antibiotics by preventing them from reaching the bacteria in the biofilm matrix.8 Other common isolated organisms include gram-negative bacilli such as Pseudomonas aeruginosa. These are usually associated with aortoenteric fistulas.9...
<urn:uuid:9952ab57-215b-4d2d-80dd-6c30aa5fad67>
CC-MAIN-2023-23
https://accesssurgery.mhmedical.com/content.aspx?bookid=3342&sectionid=278228686
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646181.29/warc/CC-MAIN-20230530230622-20230531020622-00774.warc.gz
en
0.914575
672
2.71875
3
If, , and can work better by being connected to the Internet, why not garden equipment? That's the premise behind Edyn, an Internet of Things startup launching a Kickstarter campaign this morning aiming to raise money for a smart soil analysis and watering system that could help gardeners grow better and more plentiful crops while saving significant amounts of water in the process. Founded by Princeton-educated soil scientist Jason Aramburu, Edyn is developing a two-component smart garden system with industrial design led by famed designer Yves Behar, who has helped create the look and feel of products from companies as diverse as Jawbone, Ouya, August, and even SodaStream. Edyn's concept is simple: Its solar-powered Garden Sensor analyzes soil and provides real-time information about moisture, sunlight, nutrient levels, and more, via Wi-Fi, to gardeners. Its solar-powered Water Valve is a flow device attached to a drip irrigation system allowing for the most efficient watering possible. The Berkeley, Calif.,-based startup is hoping to raise $100,000 in its Kickstarter campaign. It hopes its promise of smart gardening will be attractive to people for whom it has been difficult to understand the realities of their personal gardens. That kind of technology has been used for some time in industrial agriculture, but Edyn believes it has largely been unavailable to the home gardener. The company thinks its technology can be a game-changer given that, among other things, people rarely understand the vagaries of their own gardens, and how small changes in their local environment can impact their plants. At the same time, Edyn hopes to help people save water by irrigating precisely as local real-time conditions demand. According to the US Environmental Protection Agency, as much as half of the 7.8 billion of water used for landscape irrigation goes to waste. Edyn isn't the only company trying to apply smart technology to the garden. Another company, Rachio, unveiled a smart sprinkler system this week, aiming to help reduce wasted water. in the field include and . But Edyn's system addresses both soil analysis -- and how that can help gardeners make decisions about their plants, fruits, and vegetables -- as well as irrigation. Its mobile app, available initially for iOS devices, provides a dashboard allowing users to see real-time information about their garden's conditions and even to control the watering system.
<urn:uuid:597f5f34-87b6-4668-96d2-afbbe6f399a7>
CC-MAIN-2017-26
https://www.cnet.com/uk/news/the-internet-of-things-sprouts-in-the-garden/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319992.22/warc/CC-MAIN-20170623031127-20170623051127-00301.warc.gz
en
0.955728
493
2.625
3
These two statues, representing Castor and Pollux (5.5 m high), were found in the area of the Jewish Ghetto, atop the remains of the Circus Flaminius. These two colossal statues adorned the staircase up to the temple, whose image appears on a detailed fragment of the Forma Urbis of the Flavian age. This temple was also cited by Vitruvius (4.8.4). Excavations have confirmed the details on the marble map. Recent assessment of the statues has dated the statues to the 2C AD, although it has been suggested that the statues may have been made to represent Gaius and Lucius, Augustus’ grandsons and adopted heirs, who died in the early 1C AD. Cite This Page Cite this page as: Darius Arya, The American Institute for Roman Culture, “Ara Pacis Augustae” Ancient Rome Live. Last modified 10/24/2019. https://ancientromelive.org/ara-pacis-augustae/ Created by The American Institute of Roman Culture, published on 10/24/2019 under the following license: Creative Commons: Attribution-NonCommercial-ShareAlike. This license lets others remix, tweak, and build upon this content non-commercially, as long as they credit the author and license their new creations under the identical terms. Please note that content linked from this page may have different licensing terms.
<urn:uuid:2645a1f7-6460-4bab-a82f-b7dfb0f7973e>
CC-MAIN-2023-50
https://ancientromelive.org/capitoline-castors-statuary/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679102612.80/warc/CC-MAIN-20231210155147-20231210185147-00177.warc.gz
en
0.928292
300
3.484375
3
Electromagnetic waves that carry the radio signal move with the giant speed – the speed of light, which equals to 300 000 km/s. Here, on Earth we almost don’t feel the delay in the radio signals transfer. But while the reply from the Moon will come to us in half a second, the other one from the Mars takes about six minutes. Moreover, when the distance from the transmitter increases, the radio signal decays rapidly. So, what can we do with this? Fortunately, it is rather difficult but still solvable. We know that the data transfer becomes slower as the spacecraft moves away from the Earth. For example, the “New Horizons”, flying past the Jupiter, transfers the data at the rate of about 38 kbit/s, and when it approaches to the Pluto the data rate is decreasing to 1 kbit/s. The main parameter of any communication system is the data rate. The data rate is determined by the ratio of the amplitude of the signal to the noise. The noise arises in the equipment of receiver and transmitter due to the heat motion of the charge carriers. The noise can be filtered out statistically due to its random nature, which causes the equally probable flow of the current in the antenna in one direction and then in the other. Then, averaging of the current for a long time will give a zero noise contribution. But with decreasing of the signal to noise ratio it is necessary to increase the time of averaging, needed to filter out the noise. Today, we transmit the data in digital form (the sequence of 0 and 1 or bits). The worse signal/noise ratio means that more time is needed to transmit each bit of data. In other words, if we try to force the data transfer the messages from the spacecraft will be received with errors. Therefore, as the spacecraft moves away from us its signal becomes weaker and the data exchange rate declines. However, we can increase the data rate if we use an optical radiation instead of radiowaves. The wavelengths of the laser radiation are 10.000 times shorter than in the radio range, allowing data to be transmitted across narrower beams. Therefore, the divergence of the laser beam is significantly less. This reveals the possibility to increase the data rate at a lower power consumption. It will be clearer if we consider a simple example. Let’s suppose we have two transmitting sources: a 2 meters in diameter radio telescope, operating with radio band waves with length 3 cm, and another source, transmitting to space probe a LASER radiation with length 600 nm and initial beam diameter 5 mm. Then, using a Rayleigh criterion, we can roughly calculate the cross-area of a signal transmitted from the Earth to Jupiter (for instance). Here are the results: in radio band, we have a splash with radius equal to 1000 Earth diameter; using LASER radiation, the radius of splash will reduce to only 10 diameters of Earth. Which is a pretty good result! An example of a space laser communication is the Lunar Laser Communications Demonstration (LLCD). In autumn 2013, the data were transmitted at a rate of 20 Mbps by infrared laser from the ground terminal on the Lunar Lasercom Space Terminal that located at about 400.000 km in the orbit of the Moon. Then the data were transmitted from the Lunar Lasercom Space Terminal to the ground terminal at a rate of 622 Mbps. Even for the rate of 20 Mbps it is 4800 times faster for such distance than can provide the best radio frequency system. A ground terminal was located at New Mexico and as a signal source used four 15 cm transmitting telescopes, another four 40 cm telescopes were used to receive the reply. The total transmitter power for this system was 40 watts. The four telescopes are needed because the turbulence in atmosphere can bend the light and this increases the chance that at least one of the laser beams will interact with a receiver on the Lunar Lasercom Space Terminal. Further, the laser beam is collected by the slightly narrower telescope and then focused into an optical fiber. The signal in the fiber is amplified about 30.000 times. Then a photodetector converts the pulses of light into electrical pulses that are in turn converted into data bit patterns that carry the transmitted message. From the 40 watts signals sent by the transmitter, less than a billionth of a watt is received at the Lunar Lasercom Space Terminal, but this is enough to achieve error-free communication. We’re impressed by this technology, but this is only a first step. Let’s hope, in the nearest future, we will use such space laser communication technologies to maintain the communication between the Moon and Mars, or between the Earth and far distant mine colonies in the Kuiper Belt…
<urn:uuid:a672dd64-39e9-43bc-8245-9271b8b61467>
CC-MAIN-2020-16
https://www.assignmentexpert.com/blog/problems-of-space-radiocommunications/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371637684.76/warc/CC-MAIN-20200406133533-20200406164033-00298.warc.gz
en
0.930049
964
4.21875
4
FREEDOM MACHINES:Cast of Characters: LaToya Nesmith “I would like to do something with language, like translating songs into all different languages. I want to come up with a Polish opera. They have Italian opera, and French opera. I want to see if I could pull off a Dutch or Polish or something other than romance languages because the Slovak languages are nice too.” Latoya Nesmith, Student Seventeen-year-old Latoya Nesmith is determined to get the best possible mainstream education, but it hasn’t been easy. Her high school experience began in Albany, NY where she reports, “a lot of times technology would be an issue.” Latoya is striving to use the advanced computer applications she now needs in her new public school. She wants her education to support her aspirations. Latoya’s mother, Felicia Smalls, voices the frustrations of many parents who are often alone in trying to get the local school systems to provide necessary technology to their kids. “What happens is that every time it comes to ordering high tech equipment they ask for another evaluation…I called the board of education, the state board and they have to connect with the school and then we have to go to an appeal and go to a hearing but this has been going on for the last four years…doesn’t matter what district…” TEACHERS: check POV's Freedom Machines segment: For Educators. Find lesson plans, resources, related learning standards and more. RESOURCES FOR ASSISTIVE TECHNOLOGY Alliance for Technology Access (ATA) ATA is a network of community-based Resource Centers, Developers, Vendors and Associates dedicated to providing information and support services to children and adults with disabilities, and increasing their use of standard, assistive, and information technologies. ATA Members can be found all across the country. http://www.ataccess.org (1) find your local ATA:http://www.ataccess.org/community (2) Family Center on Technology and Disability The Family Center on Technology and Disability produces and distributes a range of informational resources on the subject of assistive technology. Its goal is to strengthen the ability of organizations throughout the country to provide current, accurate and useful materials to the families of children with disabilities. Parent Advocacy Coalition for Educational Rights (PACER Center) Pacer Center’s mission is to expand opportunities and enhance the quality of life of children and young adults with disabilities and their families, based on the concept of parents helping parents. There are 28 projects to accomplish this mission, including the Simon Technology Center. Individuals With Disabilities Education Act (IDEA) IDEA guarantees all children with disabilities access to a free and appropriate public education. more info:http://www.dssc.org/frc/idea.htm (5)
<urn:uuid:ca53da62-a4aa-4dde-b752-86a1472cafad>
CC-MAIN-2017-30
http://www.freedommachines.com/about-latoya.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549423769.10/warc/CC-MAIN-20170721102310-20170721122310-00047.warc.gz
en
0.942568
614
2.578125
3
Ulcerative colitis is a long-term condition, where the colonand rectum become inflamed . The colon is the large intestine (bowel), and the rectum is the end of the bowel wherestools arestored. Smallulcers can develop onthe colon's lining,and can bleed and produce pus. The main symptoms of ulcerative colitis are: You may also experience fatigue(extremetiredness), loss of appetite and weight loss. Theseverity of the symptoms varies, depending on how much of the rectum and colon is inflamed and how severe the inflammation is. For some people, the condition has a significant impact on their everyday lives. Some people may go for weeks or months with very mild symptoms, or none at all (known as remission), followed by periods where the symptoms are particularly troublesome (known as flare-ups or relapses). During a flare-up, some people with ulcerative colitis also experience symptoms elsewhere in their body. For example, some people develop: In severe cases, defined as having to empty your bowels six or more times a day, additional symptoms may include: In most people, no specific trigger for flare-upsis identified, althougha gut infection can occasionally be the cause. Stress is also thought to be a potential factor. They can arrange blood or stool sample tests to help determine what may be causing your symptoms. If necessary, they can refer you to hospital for further tests. You may need to be admitted to hospital. Ifyou can't contact your GP or care team, call NHS 111 or contact your local out-of-hours service . Ulcerative colitis is thought to be an autoimmune condition. This means the immune system the body's defence against infection goes wrong and attacks healthy tissue. The most popular theory is that the immune system mistakes harmless bacteria inside the colon for a threat and attacks the tissues of the colon, causing it to become inflamed. Exactly what causes the immune system to behave in this way is unclear. Most experts think it's a combination of genetic and environmental factors. It's more common in white people of European descent (especially those descended from Ashkenazi Jewish communities) and black people. The condition israrer in peoplefrom Asian backgrounds (although the reasons for this are unclear). Both men and women seem to be equally affected by ulcerative colitis. Treatment for ulcerative colitis aims to relieve symptoms during a flare-up and prevent symptoms from returning (known as maintaining remission). In most people, this is achieved by taking medication such as: Mild to moderate flare-ups can usually be treated at home. However, moresevere flare-upsneed to betreated in hospital to reduce the risk ofserious complications, such as the colon becoming stretched and enlarged or developing large ulcers. Both of these can increase the risk of developing a hole in the bowel. If medications aren't effective at controlling your symptoms, or your quality of life is significantly affected byyour condition, surgery to remove your colon may be an option. During surgery, your small intestine will either be diverted out of an opening in your abdomen (known as an ileostomy ), or used to create an internal pouch that's connected to your anus (known as an ileo-anal pouch). Find out about ulcerative colitis, a long-term (chronic) condition where the colon and rectum (large intestine or large bowel) become inflamed. The exact cause of ulcerative colitis is unknown, although it's thought to be the result of a problem with the immune system. Your GP will first ask you about your symptoms, your general health and your medical history. Treatment for ulcerative colitis depends on how severe the condition is and how often your symptoms flare up. If you have ulcerative colitis, there's a risk you could develop further problems. If you have ulcerative colitis, there are some things you can do yourself to help keep your symptoms under control and reduce your risk of complications.
<urn:uuid:da293896-1e64-456b-89c9-e1bd513e3e28>
CC-MAIN-2020-29
https://zana.com/c/ulcerative-colitis.1112
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657138752.92/warc/CC-MAIN-20200712144738-20200712174738-00101.warc.gz
en
0.948434
854
2.859375
3
Internal Rate of Return (IRR) Internal rate of return (IRR) is the discount rate at which the net present value of an investment becomes zero. In other words, IRR is the discount rate which equates the present value of the future cash flows of an investment with the initial investment. It is one of the several measures used for investment appraisal. A project should only be accepted if its IRR is NOT less than the target internal rate of return. When comparing two or more mutually exclusive projects, the project having highest value of IRR should be accepted. The calculation of IRR is a bit complex than other capital budgeting techniques. We know that at IRR, Net Present Value (NPV) is zero, thus: NPV = 0; or PV of future cash flows − Initial Investment = 0; or |CF1||+||CF2||+||CF3||+ ...||− Initial Investment = 0| |( 1 + r )1||( 1 + r )2||( 1 + r )3| r is the internal rate of return; CF1 is the period one net cash inflow; CF2 is the period two net cash inflow, CF3 is the period three net cash inflow, and so on ... But the problem is, we cannot isolate the variable r (=internal rate of return) on one side of the above equation. However, there are alternative procedures which can be followed to find IRR. The simplest of them is described below: - Guess the value of r and calculate the NPV of the project at that value. - If NPV is close to zero then IRR is equal to r. - If NPV is greater than 0 then increase r and jump to step 5. - If NPV is smaller than 0 then decrease r and jump to step 5. - Recalculate NPV using the new value of r and go back to step 2. Find the IRR of an investment having initial cash outflow of $213,000. The cash inflows during the first, second, third and fourth years are expected to be $65,200, $96,000, $73,100 and $55,400 respectively. Assume that r is 10%. NPV at 10% discount rate = $18,372 Since NPV is greater than zero we have to increase discount rate, thus NPV at 13% discount rate = $4,521 But it is still greater than zero we have to further increase the discount rate, thus NPV at 14% discount rate = $204 NPV at 15% discount rate = ($3,975) Since NPV is fairly close to zero at 14% value of r, therefore IRR ≈ 14% Written by Irfanullah Jan
<urn:uuid:ddba3113-8961-457d-9a2c-e977f875cf40>
CC-MAIN-2013-48
http://accountingexplained.com/managerial/capital-budgeting/irr
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163915534/warc/CC-MAIN-20131204133155-00082-ip-10-33-133-15.ec2.internal.warc.gz
en
0.915216
595
3.3125
3
An Rx for Exercise Mon, 01/23/2017 - 8:41am UNTHSC study looks at whether exercise can prevent or delay memory loss Alzheimer’s disease experts at UNT Health Science Center are part of a new study that could help determine whether physicians can one day write a prescription for exercise as a way to prevent or delay memory problems. The Health Science Center, in partnership with the YMCA of Metropolitan Fort Worth, is the only site in Texas and one of about a dozen nationally participating in the EXERT study. This national, 18-month-long clinical trial is testing whether exercise can slow the progression of early Alzheimer’s disease-related memory problems or mild cognitive impairment in adults 65 and older. “We’ve known for a long time that physical activity can affect brain performance,” said Sid O’Bryant, PhD, Professor, Center for Alzheimer’s and Neurodegenerative Disease Research at UNTHSC. “What we’re trying to nail down is whether there’s a magic dose of exercise that would be most effective.” More than 5 million Americans are living with Alzheimer’s, a figure that is expected to triple in the next 30 years, according to the U.S. Centers for Disease Control and Prevention. It’s the sixth-leading cause of death in the United States, and the only one among the top nine that can’t be cured, prevented or effectively slowed. The Food and Drug Administration has approved just four medications for Alzheimer’s disease since 2000. All four treat the symptoms of the disease but do not address its basic underlying biology. “Imagine if your doctor could write you a prescription for exercise that would help prevent memory problems,” Dr. O’Bryant said. “That’s what we’re aiming at.” Adults between the ages of 65 and 89 and with a diagnosis of mild cognitive impairment (MCI) are eligible for the study. They must otherwise be in good health, but not already be exercising regularly. Those who don’t have an MCI diagnosis but do have mild memory loss may be eligible for a different research project known as the Health and Aging Brain Study that examines biological and lifestyle factors that influence memory and thinking. EXERT study participants receive a free 18-month membership to the YMCA, along with a year of free personal training. Roughly half of the participants will start an aerobic exercise program, and the other half will undergo a regimen of balance and stretching exercises, all under the supervision of a YMCA personal trainer. “The YMCA has long promoted the value of exercise to the community,” said Lindsi Smith, Vice President, Community Wellness & Health Innovation at YMCA of Metropolitan Fort Worth. “We look forward to showing that the right amount of exercise can play a critical role in the prevention of chronic disease.”
<urn:uuid:4daf69ff-f73c-4f70-bd42-39ed2791d302>
CC-MAIN-2020-29
https://www.seniorific.com/health/rx-exercise
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657154789.95/warc/CC-MAIN-20200715003838-20200715033838-00450.warc.gz
en
0.917539
626
2.578125
3
In 1810 Dr. Samuel Hahnemann, a practicing German doctor, had discovered homeopathy. Homeopathy has been in practice in North America since the 19th Century. It is the second most popular system of medicine, according to the World Health Organization (WHO). In the United States of America during the nineteenth century, there were 100 hospitals and 22 medical colleges which used homeopathy exclusively , and during this time, many orthodox doctors practiced homeopathy . One of these hospitals was The Hahnemann University Hospital, established in 1885 in Philadelphia, PA which had treated thousands of patients with homeopathy alone. Today the Hahnemann University Hospital still serves patients as a hospital and medical university, where patients receive traditional medical care. Currently, homeopathy is practiced in U.S.A., Europe, India and Africa, as a system of medicine. In Europe and India, there are private hospitals which run modern diagnostics and use homeopathic medicines to treat various ailments. Recently in Canada, the province of Ontario has started to regulate the practice of homeopathy.
<urn:uuid:bd69ecfa-7ccd-4a69-927c-703382723d03>
CC-MAIN-2023-23
https://purereddeer.com/homeopathy-3/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649105.40/warc/CC-MAIN-20230603032950-20230603062950-00032.warc.gz
en
0.970048
224
2.9375
3
(Excerpt from article) “A KEY ROLE IN HISTORY While most visitors to the Phantom Canyon preserve come for the beauty of the landscape, few realize the historical significance around them: It was in this watershed where Western water law was born. In the 1870s a drought led to overdrawing of the water in the Cache la Poudre River. Irrigation canals dried up, causing a dispute between two of the water users – upstream farmers near Fort Collins and downstream farmers in the Union Colony commune founded by Horace Greeley, famous for having declared, “Go West, young man!” The issue was settled in court in favor of the first water users – the Union Colony commune – a decision that formed the bedrock principle of Western water law: “First in time, first in right.” In recognition of this, Congress declared the Cache la Poudre River a National Heritage Area*** in 1996.” ***The exact boundaries of the Cache la Poudre River National Heritage Area lie to the south and east of Phantom Canyon Preserve. The Heritage Area designation begins along the eastern edge of the Roosevelt National Forest near the mouth of the Poudre Canyon and extends through 45 miles of the river until its confluence with the South Platte River east of Greeley, Colorado. It was designated as National River Corridor in 1996, and then as an official National Heritage Area in 2009. For the full article, check out the Nature Conservancy’s website here.
<urn:uuid:07a4c1be-a3a3-4bf4-ad4f-906270db0b78>
CC-MAIN-2023-23
https://poudreheritage.org/nature-conservancy-phantom-canyon-highlights-poudre-rivers-heritage/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652149.61/warc/CC-MAIN-20230605153700-20230605183700-00766.warc.gz
en
0.937157
315
3.265625
3
The design limitations of air cleaners, some oil fill caps and crankcase ventilation systems allow a certain level of dust and dirt into the engine, while leaks in the intake system can permit unfiltered air to enter the engine. Proper maintenance of the engine and its accessories can minimize the amount of contaminants entering the lubrication system and extend engine life. Normal wear of engine parts produces very small metal particles that are picked up and circulated by the oil. Particles of road dust and dirt increase wear rates and generate larger, even more abrasive metal particles that are circulated through the engine by the oil. While oil filters help keep these particles at a minimum, they can’t remove them entirely. Combustion produces water vapor, or steam. When engine temperatures are high, most of the water remains in vapor form and exits through the exhaust. However, when engine temperatures are low, such as at start-up, warm-up and during short-trip operation in low ambient temperatures, the water vapor condenses (turns into a liquid) on cylinder walls and enters the crankcase oil, where it leads to sludge and corrosion. The combustion process produces acidic gases which, like water vapor, condense on cylinder walls at cold engine temperatures and find their way into the crankcase oil. The gases combine with water to cause corrosion. Incomplete combustion produces soot, carbon and other deposit-forming materials. An engine running too “rich,” or with too much fuel, increases contaminant levels. Light-load, low-speed gasoline engine operation and high-load, low-speed diesel engine operation increase levels of these combustion by-products. When an engine is started or running abnormally, some unburned fuel is deposited on cylinder walls, leaking past the rings and into the crankcase, where it reduces oil viscosity. Fuel dilution decreases oil film strength and increases oil consumption. Although this is only a minor problem when engine operation is at high-speed or high-temperatures, it can be a significant problem in vehicles consistently used for short-trips. Although all motor oils eventually succumb to contamination and must be changed, high-quality synthetic oils – like AMSOIL synthetic motor oils – deliver superior protection for longer, due to their higher-quality base stocks and additives.
<urn:uuid:c3399ddd-aa55-4e07-9602-7822b11c64ef>
CC-MAIN-2020-10
http://www.haldimandsyntheticoil.ca/amsoil-science/motor-oil-properties/motor-oil-contaminants/
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146066.89/warc/CC-MAIN-20200225110721-20200225140721-00071.warc.gz
en
0.929291
474
3.0625
3
Everyone knows about the dangers of using cell phones while driving. However, little is said about the risk of cell phone use on maritime vessels. The National Transportation Safety Board (NTSB) is urging the Coast Guard to tighten restrictions on cell phone use by Coast Guard officers. It is also requesting that the Coast Guard to issue a broad safety advisory to the entire maritime industry warning of the risks of cell phone use. The request from the NTSB comes after the announcement that crew members aboard two Coast Guard boats involved in separate collisions in California and South Carolina last year were using wireless devices for conversation or text messaging that was unrelated to vessel operations. The collision killed one person and injured 10 others. The first maritime accident occurred on December 5 at Charleston, South Carolina. Two Coast Guard boats, each with a crew of three, were returning to base after escorting a cargo ship. One boat collided with the Thriller 09, a small vessel that was carrying 22 passengers on a tour of Christmas light displays. Six civilian passengers were injured. In the second vessel collision, a Coast Guard boat with a crew of five collided with a 24-foot pleasure boat during San Diego Bay’s Parade of Lights on Dec. 20. There were 13 people aboard the civilian boat; an 8-year-old boy was killed and four others were seriously injured. No Coast Guard personnel were injured. The family of the boy sued the Coast Guard. Four petty officers are facing Coast Guard charges ranging from involuntary manslaughter to negligent homicide and dereliction of duty. They may face a court-martial. The accidents are still under investigation and probable cause has not yet been determined. The Coast Guard issued a policy on July 16 that prohibits the use of cell phones and texting devices by the boat operator — the person at the wheel and throttles — while a vessel is in motion. The same policy prohibits other crew members from using cell phones unless expressly approved by the boat operator or coxswain. Coast Guard records show that there were 4,730 boating accidents in 2009. More than twenty percent of the accidents involved either “operator inattention” or “improper lookout”. This is the largest cause of boating accidents. Maritime work is dangerous. Distracted vessel operators can cause serious harm to others onboard. To learn more about your rights after a maritime accident, contact the Louisiana maritime attorneys at The Young Firm. When you call us at 866-715-3664, be sure to request your free copy of “Employee’s Guide to Maritime Injury Law.”
<urn:uuid:340f05d0-8e58-4f61-a1d6-2af87848742a>
CC-MAIN-2020-05
https://www.jonesactlaw.com/library/nstb-warns-cell-phone-use-may-cause-serious-maritime-accidents/
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251802249.87/warc/CC-MAIN-20200129194333-20200129223333-00421.warc.gz
en
0.963549
532
2.5625
3
Find the volume of a sphere by solving for the equation V=4/3*pi*r^3, where V is volume, r stands for radius and pi is 3.1459. Cube the radius, and multiply that number by pi and 4/3 for the volume. Pi delineates the relationship between a circle's diameter and circumference.Continue Reading Make the equation simpler by inserting 3.1459 for pi and multiplying that figure by 4/3. This creates a value of approximately 4.19453. Now, your equation is V=4.19453*r^3, or the radius cubed times 4.19453. Replace the variables of the equation with the numbers related to the sphere. For instance, a sphere with a radius of 5 inches means the volume is 4.19453 times 5^3. Five cubed is five times five times five, or 125. Multiply 125 by 4.19453 to get 524.3167 cubic inches of volume in a sphere with a radius of five inches. You can convert cubic inches to cubic feet by multiplying the volume by 0.000579 to get 0.30358 cubic foot. Increase or decrease the diameter of a sphere to change the volume. When a sphere changes its diameter by just one inch, the volume changes by 142 cubic inches. If the diameter of this sphere shrinks from 10 inches to 9 inches, the volume is 382.2 cubic inches.
<urn:uuid:80fbe6c9-af46-4736-9b99-1eb129012c14>
CC-MAIN-2017-43
https://www.reference.com/math/volume-sphere-f40d402b877b785c
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187828356.82/warc/CC-MAIN-20171024090757-20171024110757-00555.warc.gz
en
0.867287
301
3.953125
4
How to Manage Pests Pests in Gardens and Landscapes Ground squirrels are troublesome pests for homeowners and gardeners. The California ground squirrel, Spermophilus beecheyi, is the most common species in gardens. This squirrel's habitat includes nearly all regions of California except for Owens Valley, located in the southeastern part of the state, southward into the desert regions. It is easy to identify ground squirrels, since they forage aboveground near their burrows. Their body measures 9 to 11 inches, while their semibushy tail adds another 5 to 9 inches in length. Their fur is brownish gray and speckled with off white along the back; the sides of the head and shoulders are light gray to whitish. One subspecies that inhabits most of Northern California has a dark, triangular-shaped patch on its back between the shoulders; this patch is missing from other species. Although ground squirrels look similar to tree squirrels and can climb trees, when frightened they always will retreat to a burrow, whereas tree squirrels will climb a tree or tall structure and never use a burrow. BIOLOGY AND BEHAVIOR Ground squirrels live in a wide variety of natural habitats but usually avoid thick chaparral, dense woods, and wet areas. Populations can be particularly high in grazed rangelands and in areas disturbed by humans such as road or ditch banks, fencerows, around buildings, and in or bordering many crops. Ground squirrels live in a burrow system where they sleep, rest, rear young, store food, and avoid danger. The burrow openings are about 4 inches in diameter but can vary considerably. The burrows can be 5 to 30 feet or more in length and can extend 2 to 4 feet below the soil surface. Often there is more than one opening in a burrow system. Ground squirrels live in colonies that can include several dozen animals in a complex of burrows. More than one squirrel can live in a burrow. Ground squirrels are active during the day, mainly from midmorning through late afternoon, especially on warm, sunny days. Ground squirrels have two periods of dormancy during the year. During winter months most ground squirrels hibernate, but some young can be active at this time, particularly in areas where winters aren't severe. During the hottest times of the year most adults go into a period of inactivity, called estivation, that can last a few days to a week or more. During these periods, the burrow appears open at the entrance, but the squirrel plugs it with soil near the nest. Ground squirrels breed once a year, averaging 7 to 8 per litter. Timing of breeding varies with location. In Southern California breeding begins in December, in the Central Valley the timeframe is February through April, and in the mountain ranges breeding begins somewhat later. Aboveground activity by adults is at a maximum at the height of the breeding season. The young are born in the burrow and grow rapidly. When they are about 6 weeks old, they usually emerge from the burrow. At 6 months they resemble adults. Ground squirrels are primarily herbivorous, and their diet changes with the season. After emerging from hibernation, they feed almost exclusively on green grasses and herbaceous plants. When annual plants begin to dry and produce seed, squirrels switch to seeds, grains, and nuts and begin to store food. Ground squirrels usually forage close to their burrows. Their home range typically is within a 75-yard radius of their burrow. Ground squirrels damage many food-bearing and ornamental plants. Particularly vulnerable are grains as well as nut and fruit trees such as almond, apple, apricot, orange, peach, pistachio, prune, and walnut. Ground squirrels will enter gardens and devour vegetables in the seedling stage. They can damage young shrubs, vines, and trees by gnawing bark, girdling trunks (the process of completely removing a strip of bark from a tree's outer circumference), eating twigs and leaves, and burrowing around roots. Ground squirrels will gnaw on plastic sprinkler heads and irrigation lines. They also eat the eggs of ground-nesting birds and can limit attempts to attract quail to the yard. Burrowing can be quite destructive. Burrows and mounds make it difficult to mow, and they present hazards to machinery, pedestrians, and livestock. Burrows around trees and shrubs can damage and desiccate, or dry out, roots; it sometimes can topple trees. Burrowing beneath buildings and other structures sometimes produces damage that necessitates costly repair. Ground squirrels can harbor diseases harmful to humans, particularly when squirrel populations are numerous. A major concern is bubonic plague transmitted to humans by fleas that the squirrels carry. Ground squirrels are susceptible to plague, which has wiped out entire colonies. If you find unusual numbers of squirrels or other rodents dead for no apparent reason, notify public health officials. Do not handle dead squirrels under these circumstances. LEGAL STATUS AND LEGAL CONSIDERATIONS The California Fish and Game Code classifies ground squirrels as nongame mammals. An owner or tenant can control, in any legal manner, nongame mammals that are injuring growing crops or other property; tree squirrels, on the other hand, are classified as game animals and have a hunting season. No license is required if it is the owner or tenant who is taking ground squirrels that are causing damage. A trapping license from the California Department of Fish and Game is required for those who are trapping squirrels for hire or profit. The U. S. Fish and Wildlife Service classifies the Mohave ground squirrel, S. mohavensis, and the San Joaquin antelope squirrel, Ammospermophilus nelsoni, as threatened species; therefore both are protected animals. Although you are unlikely to misidentify either of these relatively small squirrels as the much larger California ground squirrel, their ranges could overlap in some areas. The endangered San Joaquin kit fox (Vulpes macrotis mutica), several endangered species of kangaroo rats, the riparian brush rabbit (Sylvilagus bachmani riparius), the riparian wood rat (Neotoma fuscipes riparia), and some endangered amphibians and reptiles also are within the California ground squirrels' range, so some squirrel control techniques could impact them as well. Before using pesticides for ground squirrel control, read the product label to determine if any restrictions exist on rodent control within the ranges of these and other endangered and protected animals. Also, if the kit fox is found in your county, contact your county agricultural commissioner for additional information; for a range map, see the California Department of Pesticide Regulation's Web site listed in References. The control procedure you select depends heavily upon the unique life cycle and behavior of the ground squirrel. For example, baiting with treated grain is effective in summer and fall, because squirrels primarily feed on seeds during this period. Fumigation is most effective in spring when moist soil helps seal gasses in the burrow system. Fumigating at this time also is more effective, because squirrels die before they can reproduce. Table 1 shows the yearly activities of the California ground squirrel and times when baiting, trapping, and fumigation are most effective. Traps are practical for control when squirrel numbers are low to moderate. Live-catch traps aren't recommended, because they present the problem of how to dispose of the animals. Because ground squirrels carry diseases and are agricultural pests, the California Fish and Game Code specifies it is illegal to release them elsewhere without a written permit. There are several types of traps that kill ground squirrels, including box traps, tunnel traps, and Conibear traps. For box and tunnel traps, place them on the ground near squirrel burrows or runways, and bait them with walnuts, almonds, oats, barley, or melon rinds. Place the bait well behind the trigger or tied to it. After you bait the traps, don't set them for several days, so the squirrels become accustomed to them. After the squirrels are used to taking the bait, rebait and set the traps. To reduce hazards to children, pets, poultry, and nontarget wildlife, place box-type traps in a covered box with a 3-inch diameter entrance. Put the box near active burrows with signs of recent diggings. Inactive burrows will be filled with leaves or old straw or have cobwebs across the entrance. The Conibear trap No. 110, with a 4 1/2- by 4 1/2-inch jaw spread, also is an effective kill trap. You can bait the wire trigger, but usually you'll want to leave it unbaited. Place the trap directly in the burrow opening, so the squirrel must pass through it, tripping the trigger. It might be necessary to use soil to partially fill in the burrow entrance around the outer edges of the trap to prevent the squirrel from slipping around the outside of the trap. Closing all other burrows with soil might hasten success by directing the squirrel to the remaining open burrow, which contains the trap. Attach the Conibear trap to a stake to prevent a scavenger from carrying off both it and the squirrel. With this type of trap, leaving the trap baited but unset has little effect on trapping success. Inspect traps at least once a day, and remove dead squirrels. Don't handle the carcasses without protective gear; you can use a plastic bag slipped over each hand and arm as a glove. Once you have removed the squirrel from the trap, hold the animal with one hand and turn the bag inside out while slipping it off your arm and hand. If possible, keep small children and pets out of the area while traps are in use. In kit fox areas, spring all Conibear traps before nightfall and reset them the following morning. Fumigation is a relatively safe method of control. As with any pesticide, read and follow label instructions with particular regard for nontarget species and safety factors. Some fumigants can produce flames, creating a fire danger. Don't use these types fumigants where a significant fire hazard exists, such as near buildings, dry grass, or other flammable materials. To prevent fumes from accumulating in enclosed areas, never fumigate beneath buildings or in burrows that might open beneath occupied buildings. Be aware of the signs of nontarget species inhabiting inactive ground squirrel burrows. Kit foxes will use an old burrow, enlarging the opening, and often creating a keyhole-shaped entrance. Active pupping dens might contain prey remains, droppings, and matted vegetation and show signs of fresh paw prints. The burrowing owl (Athene cunicularia) is another potential occupant of abandoned ground squirrel burrows. Don't treat a burrow if you suspect a nontarget animal is present. Fumigate only active ground squirrel burrows; county agricultural commissioners can provide additional information on how to recognize these. Many county agricultural commissioners' offices sell United States Department of Agriculture gas cartridges, which are designed for fumigating burrowing rodents. Other types of fumigation cartridges also are available at retail outlets. Fumigation is most effective in spring or other times when soil moisture is high, which helps contain the gas within the burrow system. Don't fumigate in summer or when the soil is dry, because the gas more readily diffuses into small cracks present in dry soil, making it less effective. Don't fumigate during hibernation, because the squirrel plugs its burrow with soil, preventing fumes from reaching the nest chamber; you can't see this plug by examining the burrow entrance. Treat all active burrow systems when fumigating. When using a USDA gas cartridge, puncture the end with a nail or screwdriver at the points marked, and rotate the nail to loosen the material inside. Insert the fuse into the center hole. Place the cartridge in the burrow as far as possible, and light the fuse. With a shovel handle or stick, push the lighted cartridge down the burrow, and quickly seal the opening with soil, tamping it down. Fill in connected burrows if you see smoke escaping. Larger burrow systems usually require 2 or more cartridges placed in the same or connecting burrow openings. After 24 hours, check for reopened burrows, and re-treat as needed. Anticoagulant baits, available at county agricultural commissioners' offices and some retail outlets, can control ground squirrels. The squirrel must eat the anticoagulant in several feedings during a period of 5 or more days in order for it to be effective. Because of this feature and because an antidote, vitamin K1, exists, this bait is relatively safe for use around humans and pets. However, keep pets out of treated areas, check the areas daily, and remove and dispose of any carcasses. Dogs are more likely to eat the palletized, cereal-based baits than the loose grain baits, plus pelletized baits are prohibited in kit fox areas. You can use anticoagulant baits in bait boxes or use repeated spot baiting or spot broadcasting, a method that involves spreading the poison near active ground squirrel burrows without leaving it in a pile. Bait boxes are small structures that the squirrel must enter in order to eat the bait. Boxes contain sufficient bait for repeated feedings. They are the preferred baiting method around homes and other areas where children, pets, and poultry are present. Follow all product label requirements for applying baits in bait boxes or by spot broadcast. Unless a bait label specifies otherwise, you can construct bait boxes from any durable material and in a variety of designs. If you design a bait box, make the entrance hole(s) about 3 inches across to allow access to squirrels but not to larger animals. Construct a lip to prevent bait from spilling out of the box when squirrels exit. These boxes must be tamper-resistant, meaning small children must not be able to access the contents. You can do so by putting a lock on the box or devising some other method that will make it difficult for children to open. Secure the bait box, so it can't be turned over or easily removed. A self-feeding arrangement ensures the pest gets a continuous supply of bait. Never fill a bait box with more than 5 pounds of bait. Place bait boxes near runways or burrows. If squirrels are present over a large area, space the boxes at 100- to 200-foot intervals. Initially, inspect bait stations daily, adding bait as needed. Increase the amount of bait if squirrels have eaten it all by the end of the day. Fresh bait is important, so replace moldy or old bait. It can take several days before squirrels become accustomed to the bait box and enter it. Anticoagulant baits generally require 2 to 4 weeks or more to be effective. Continue baiting until all feeding ceases, and you no longer see any squirrels. Although few ground squirrels will die aboveground, you should pick up and dispose of those that do as described above in the Trapping section and in accordance with label directions. Also be sure to pick up and dispose of unused bait, according to label instructions, upon completion of the control program. You'll generally find ground squirrels in open areas, although they sometimes use available cover. Remove brush piles and debris to make an area less desirable. This also aids in detecting squirrels and their burrows and improves access during control operations. Ground squirrels can reinvade a site by moving into vacant burrows. Destroy old burrows by deep ripping them to a depth of at least 20 inches, using a tractor and ripping bar(s). Simply filling in the burrows with soil does not prevent reinvasion, as ground squirrels easily find and reopen old burrows. Other Control Techniques Shooting squirrels with a.22 rifle can provide some control, but it is very time consuming. Shooting is recommended only when you can do it safely and you are in a rural location where squirrel numbers are very low. There are no effective “frightening” devices or repellents that will cause ground squirrels to leave their burrows or avoid an area or crop. When using firearms to manage squirrels, don't use lead ammunition in areas within the historical California condor range. Check with your local game warden for more information regarding these areas, and always check local ordinances before using firearms. Many predators, including hawks, eagles, rattlesnakes, and coyotes, eat ground squirrels. In most cases, predators aren't able to keep ground squirrel populations below the level at which they become pests for the home gardener. Dogs might prevent squirrels from entering small areas, but they can't control established squirrel populations. For those who live next to wildlands or other areas where squirrels are common, an ongoing control program will be necessary, since squirrels will reinvade over time. Once you have controlled ground squirrels, periodically monitor the area for reinfestation. Check for new burrows, and start control actions as soon as you notice new arrivals. It is easier and less expensive to control a small population. More information is available at the UC Ground Squirrel Best Management Practices Web site, and at the UC Vertebrate Pest Control Education Web site. California Department of Pesticide Regulation. 1995. Protecting Endangered Species: Interim Measures for San Joaquin Kit Fox. Sacramento: Pestic. Regis. Branch, Pestic. and Toxic Substances H-7506. 13 pp. (Kit Fox Range and Kit Fox Den Characteristics). Accessed Feb. 10, 2010. Clark, J. P. 1994. Vertebrate Pest Control Handbook. 4th ed. Sacramento: Div. Plant Industry, Calif. Dept. Food and Agric. 350 pp. Marsh, R. E. 1994. Belding's, California, and Rock Ground Squirrels. In S. E. Hygnstrom, R. M. Timm, and G. E. Larson, eds. Prevention and Control of Wildlife Damage. Vol. 1. Lincoln: Univ. Neb. Coop. Ext. pp. B.151–158. Salmon, T. P., D. A. Whisson, and R. E. Marsh. 2006. Wildlife Pest Control around Gardens and Homes. 2nd ed.Oakland: Univ. Calif. Agric. Nat. Res. Publ. 21385. 122 pp. Tomich, P. Q. 1982. Ground squirrels. In J. A. Chapman and G. A. Feldhamer, eds. Wild Mammals of North America: Biology, Management, and Economics. Baltimore: Johns Hopkins Univ. Press. pp. 192–208. Pest Notes: Ground Squirrel (formerly titled California Ground Squirrel) Authors: T. P. Salmon, UC Cooperative Extension, San Diego Co.; and W. P. Gorenzel, UC Cooperative Extension, San Diego Co. Produced by UC Statewide IPM Program, University of California, Davis, CA 95616 Technical Editor: M. L. Flint Produced by University of California Statewide IPM Program PDF: To display a PDF document, you may need to use a PDF reader.
<urn:uuid:59e66e5f-5f6e-4362-8824-b3b512866a20>
CC-MAIN-2014-23
http://www.ipm.ucdavis.edu/PMG/PESTNOTES/pn7438.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510272940.33/warc/CC-MAIN-20140728011752-00112-ip-10-146-231-18.ec2.internal.warc.gz
en
0.932226
4,069
3.703125
4
We have begun migration of most wikis to our new host, Amazon Web Services. All but the top 100 wikis are in read-only mode until the migration is complete. Estimated completion: End of Week. |Habitat(s)||Skyview Temple | Lanayru Mining Facility Flooded Faron Woods |Effective Weapon(s)||Gust Bellow| Froaks are enemies in Skyward Sword. Characteristics and Weaknesses Froaks are large pufferfish-like enemies. They are cowardly creatures, preferring to defend themselves solely by puffing up their bodies, exposing bristling quills around them. They otherwise float about aimlessly, are are generally only a threat in close contact. Despite their otherwise nonviolent demeanor, Froaks are prone to exploding upon any contact. Froaks will usually explode upon contact with Link, other enemies, barriers, and attacks from projectiles. These explosive properties can be used to blow up rock walls and damage other enemies. Froaks can be found in the Lanayru Desert, Lake Floria, Ancient Cistern, and on Link's second visit to the Skyview Temple. They can be easily dispatched by blowing them into a wall with the Gust Bellows, striking them away with the Sword, using an underwater spin maneuver, or hitting their unprotected bodies with any sort of projectile. |Names in Other Regions| |FrenchEU||Gufu||Reversal of 河豚 (fugu), the Japanese word for pufferfish|
<urn:uuid:6bc13595-da7d-4ad6-8b0e-3ad95e3a6238>
CC-MAIN-2017-43
https://zelda.gamepedia.com/Froak
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187822480.15/warc/CC-MAIN-20171017181947-20171017201947-00710.warc.gz
en
0.837728
321
2.53125
3
Background of the study Peptic ulcer disease (PUD) is caused by an imbalance between acid secretion and acid-resistant mucosal defenses. Furthermore, investigations have shown a substantial link between H. pylori stomach antral infection and peptic ulcer disease. H. pylori infects more than 90% of patients with peptic ulcer disease, and eradicating the infection not only cures most uncomplicated ulcers but also dramatically reduces the risk of recurrent ulceration [Leontiadis,2007]. H. pylori infection affects about half of the world’s population, with rates as high as 80 percent to 90 percent in underdeveloped countries and 35 percent to 40 percent in the United States [Rosenstock, 2003]. H. pylori is thought to infect half of the world’s population, making it one of the most frequent bacterial infections in humans [Lee, 2017]. Approximately 20% of people infected with H. pylori develop gastroduodenal diseases during the course of their lives. Several studies in Iraq have been undertaken to determine the prevalence of H. pylori infection in peptic ulcer disease, with estimates ranging from 60% to 70% [Bhatia,2005]. The frequency of H. pylori infection among children in Egypt was 10% [Brzozowski,2008]. Between 1991 and 2000, there were 9323 deaths in Sweden owing to stomach cancer [Snowden, 2008]. In impoverished nations, the yearly incidence of H. pylori infection is roughly 4% to 15%, compared to around 0.5 percent in industrialized countries [GBD, 2013]. Low socioeconomic position, overcrowding, and inadequate sanitation or hygiene were all documented risk factors, which are often linked with underdeveloped countries. The infection was substantially related with socioeconomic situations in infancy, ethnicity, and the existence of dyspeptic disease. In basic studies, rising age, non–white skin tone, large family size, poor socioeconomic circumstances in childhood, larger number of siblings, kid visiting day-care facilities, and presence of dyspeptic symptoms are all linked to public perception of peptic ulcer disease risk factors. In Malaysia, the frequency of H. pylori infection among peptic ulcer disease patients was low, although ethnicity and smoking were important risk factors for infection. Lower socioeconomic groups with poor living standards, congested living situations, low levels of education, and poor hygiene are more likely to get the virus [Campbell,2015]. Statement of the problem The mechanism by which H. pylori causes distinct kinds of lesions in the gastroduodenal mucosa is not completely understood. The kind of peptic ulcer is determined by whether H. pylori infection causes hypochlorhydria or hyperchlorhydria. H. pylori infection is mostly mediated by cytokines that limit parietal cell secretion, but it may also directly alter the H+/K+ ATPase-subunit, activate calcitonin gene-related peptide (CGRP) sensory neurons connected to somatostatin, and reduce gastrin formation [Malfertheiner,2005]. Despite the fact that hyposecretion is linked to the development of gastric ulcers, 10–15 percent of individuals with H. pylori infection had enhanced gastric secretion due to hypergastrinemia and lower antral somatostatin levels [Bakka,2002]. Despite the use of H. pylori eradication treatment, proton-pump inhibitors (PPIs), and enhanced endoscopic therapeutic options available in recent decades, the death rate linked with PUD has not reduced in lockstep with the incidence rate. As a result, we want to enforce PUD prevention by identifying risk factors. The public view of the risk factors linked with peptic ulcer disease among women in Rivers State is investigated in this research. Objective of the study The primary objective of the study is as follows 1. To investigate public perception on the causes of peptic ulcer disease. 2. To examine public perception on the effect of peptic ulcer disease among women in Rivers state. 3. To find out public perception on the challenges peptic ulcer disease patient go through in finding solution to the disease. 4. To find out public perception on the probable solution to peptic ulcer disease among Rivers women. The following questions have been prepared for this study 1) What is the public perception on the causes of peptic ulcer disease? 2) What is the public perception on the effect of peptic ulcer disease among women in Rivers state? 3) What is the public perception on the challenges peptic ulcer disease patient go through in finding solution to the disease? 4) What is the public perception on the probable solution to peptic ulcer disease among Rivers women? Significance of the study This study examines public perception on the risk factors associated with peptic ulcer disease, hence it will be of benefit to health workers as it will help them know the right approach to go about treating peptic ulcer patient. The study will be of benefit to the academic community as it will contribute to the existing literature. Scope of the study This study will investigate public perception on the causes of peptic ulcer disease. The study will also, examine public perception on the effect of peptic ulcer disease among women in Rivers state. More so the study will find out public perception on the challenges peptic ulcer disease patient go through in finding solution to the disease. Lastly, the study will find out public perception on the probable solution to peptic ulcer disease among Rivers women. Hence this study will be delimited to Rivers state. Limitation of the study This study was constrained by a number of factors which are as follows: just like any other research, ranging from unavailability of needed accurate materials on the topic under study, inability to get data Financial constraint , was faced by the researcher ,in getting relevant materials and in printing and collation of questionnaires Time factor: time factor pose another constraint since having to shuttle between writing of the research and also engaging in other academic work making it uneasy for the researcher Definition of terms Peptic ulcer disease: a sore on the lining of your stomach, small intestine or esophagus
<urn:uuid:5b5ece34-68b0-4656-86dd-ae0607eb8d0e>
CC-MAIN-2023-40
https://www.projectpapers.net/assessment-of-public-perception-on-the-risk-factors-associated-with-peptic-ulcer-disease-among-women-in-rivers-state/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510326.82/warc/CC-MAIN-20230927203115-20230927233115-00756.warc.gz
en
0.92896
1,321
3.375
3
Although refined sugars and empty calories are primary culprits in our ill-health epidemic, another aspect is that we eat too much meat. Meat gets a bad rap by all kinds of people. Meat takes more resources to produce, the meat industry uses insane amounts of antibiotics in really unsafe ways, etc. Also, eating more red meat (and cured meats) is related to increases in cancer and heart disease. Here are some fun facts about meat: Meat is devoid of the protective effects of fiber, antioxidants, phytochemicals, and other helpful nutrients, and it contains high concentrations of saturated fat and potentially carcinogenic compounds, which may increase one’s risk of developing many different kinds of cancer. http://www.cancerproject.org/survival/cancer_facts/meat.php Eating one serving a day of processed meat -- or the equivalent of a single hot dog or two slices of salami -- was associated with a 42% increased risk for heart disease and a 19% increased risk for diabetes in the study, conducted by researchers from the Harvard School of Public Health. http://www.medicinenet.com/script/main/art.asp?articlekey=116365 High red meat intake was also associated with increased risk of esophageal and liver and a borderline increased risk for laryngeal cancer. And high processed meat consumption also was associated with borderline increased risk for bladder cancer and myeloma, a kind of bone cancer...In addition, both red meat and processed meat consumption were associated with increased pancreatic cancer risk in men, but not women.Take this chart for example: Now, I'm not advocating not eating meat. Anyone who knows me knows that I like a good barbecue as much as the next guy. But what I am trying to get to is the idea of a balanced meal. I had developed this theory that the subsidy system and food industry was producing more of the foods that are bad for us, driving price down on those items, and making us sicker at the same time all in the name of profits. It sounds crazy, but I had some time to kill so I thought I'd look into it. What is a Balanced Meal? First, let's understand what a balanced meal is. In 2011 the government got rid of the pyramid and now have a much better way of showing you what you should be eating. This is an outstanding info graphic. If you go to the website, this graphic is interactive. Clicking on the different sections will take you to drill-down information on vegetables, fruits, grains, etc. I was surprised at how much protein they recommend eating. By protein they mostly mean meats, but also include fish, nuts, and beans. This is the original food pyramid which was designed in 1992. It replaced a much simpler graphic that showed all food types as equal--four squares. Interestingly, it was very controversial when it first came out because the food industry did not want the government telling people they should eat less meat than vegetables. Nutritionists also had a problem with it because of the emphasis on grains (huh?). Just for giggles, I also included the revamped federal food pyramid for reference. Released in 2005, this is an information visualization disaster. Oldways is my personal favorite. Old Ways is an organization that promotes traditional diets from cultures historically known to be more healthy than everyone else. They are doing some really interesting work in the areas of diet research and promotion. "This pyramid continues to be a well-known guide to what is now universally recognized as the “gold standard” eating pattern that promotes lifelong good health. It has been widely used for years by consumers, educators, and health professionals alike to implement healthier eating habits...Comparing them, the Oldways pyramid is much more clear about getting more of your protein from fish, dairy, and vegetable sources. Red meats are the most limited kind of protein. The USDA plate, although the easiest of all to use, is much more ambivalent about where your proteins come from. This would allow a diet high in red and processed meats to fit the model, even though these are some of the most likely suspects for various kinds of cancers. The pyramid was created using the most current nutrition research to represent a healthy, traditional Mediterranean diet. It was based on the dietary traditions of Crete, Greece and southern Italy circa 1960 at a time when the rates of chronic disease among populations there were among the lowest in the world, and adult life expectancy was among the highest even though medical services were limited." Also, the Oldways pyramid includes a glass of red wine with dinner. Allllriiiighhhttt! Comparing Prices--Are there different ideas at work? The costs of buying local food has also been on my mind. Is local food really more expensive? So many people are in favor of higher prices for local food because they claim it is more accurate price of what the food actually costs, plus it keeps more dollars in the local economy. I think these are great points, but if local food is ever going to be anything more than a dinner party braggable for the bourgeois, then the pricing really needs to be able to compete with mainstream foods. Josh from Stone-Buhr understands this. Few others do. My conspiracy theory goes along these lines: Americans eat more meat because meat is cheap and this is bad for us. Why would this be? I don't know. I've read that, sociologically, meat played a symbolic role in American culture, especially after WW2. It represented success. It also represented affluence and something to aspire to after the hard times of global warfare. The decadent, juicy steak at a swanky restaurant. The good times of hamburgers on the grill with friends in the summer time. The elegance of marinated, thinly sliced flank steak layered over a bed of baby greens with blue cheese crumbles. Etc. In order to make the most money, the meat industry played these ideas up while also bringing prices down. Everyone could partake of the good life. The combined effect of this bought a flood of money to the meat industry. The birth of the fast food industry in the mid 20th century exacerbated this trend. Maybe the health implications were unknown at the time, but the profit motive certain was not. I went to two grocery stores and the farmer's market to see how things priced out. I was looking to see how meat prices compared to other products. My thinking was that pricing structures that support a healthy diet would make meat more expensive than vegetables, grains, etc. My suspicion was that the pricing structures did not support a healthy diet by making meats artificially cheaper than they should be thereby encouraging people to skew the balance of their diet toward meat. My unscientific methodology was pretty simple. If you bought 10 items and spent $10 on each, how much could you get? - I went to New Seasons (premium grocery store), Fred Meyer (normal grocery store), and the St. Johns Farmers Market. - I compared items as close as I could but admittedly did not get apples to apples (the farmer's market had a different selection than the grocery stores, especially in fruit). - No sale prices - No premium products - No preference for organic or local foods - Just looking for low, everyday prices on standard items. My own notion was that corporate pricing in the grocery stores would lend itself to a less healthy diet, and the farmer's market pricing would be more true to a healthy diet. As it turns out, I was totally wrong. You could get more vegetables, less meat, and a middle portion of eggs and beans from all of the vendors. The pricing scheme at each place was roughly in line with the food pyramids above. Despite New Season's healthy image, their price structure was almost exactly the same as Fred Meyer, just a little bit more expensive overall. And the farmer's market was not much better, just a lot more expensive overall. |Relative volumes of food purchased with $10 each based on averaged pricing.| The only thing that can be said, is you'd probably be less likely to over-eat if you shop at the farmer's market because you simply get less for your money (perhaps helping with overnourishment and it's associated health problems). Compared to the Old Ways pyramid, all of these vendors fall short in that: - Fish is too expensive. Old Ways encourages more fish eating than red meat, but at these prices beef is the more affordable option. - Beef should be much more expensive to discourage purchasing. Beef was most expensive at the Farmer's Market (but so was everything else). - Fruit is over priced. This changes with the season and is an average, but it should probably be closer to the price of vegetables (apples actually were, but anti-oxidant rich berries were super expensive). - Eggs could be a little more expensive, just to get them more in the proper place. Because my initial price gathering was pretty limited, I will probably continue to test pricing. In the process of collecting this information I realized just how much variability there could be and how much more research would be needed to give a truly accurate picture. But it's interesting anyway. What it did do is get me thinking in other directions. Chef de Cuisine (a.k.a. The Protein Dealer) If the problem isn't the pricing structures themselves, then maybe it is something else. Maybe is it just the way we choose to spend money. If our purchasing habits reflect the way we think about food, then the problem may be just the way we think. Imagine you are going to cook dinner. If you are like me, you think of the main item first, then build out the things that go around it. For instance, for dinner tonight, I could cook pork chops, then put a simple garlic pan sauce over it. Some boiled baby potatoes would go nice with that. For greens, I can use either the asparagus I bought at the market or go trim some lettuce from the garden for a salad. This is how I think through cooking dinner for the family. What is wrong with that way of thinking? Most of the food groups are represented. It's home cooked with local, (mostly) organic ingredients. It's not overloaded with fats, processed oils, or sugars. It leads to the whole family sitting down together and eating together. Everything that a meal is supposed to be is here. But what it also is is centered on a single chunk of meat that becomes garnished with all the things that are good for you. Potatoes are chosen because they match the flavor of the pork chop. The greens are chosen because they don't conflict with the flavor of the pork chop. Had I started with a salad as the first thought, then I probably would not have ended up adding a pork chop. At most, some slices of very lean pork tenderloin might have shown up. It's this way of imagining what we eat that drives us to have unhealthy diets. To avoid the pitfalls of excessive meat consumption, create balanced meals that are more in line with the recommendations, and truly treat food as a primary means to good health, we need to upend the way we envision the plates of food we prepare and how we see ourselves eating them. I was hoping to see a more informed perspective from the professionals in this world. If anyone should understand the nature of meal and menu preparation, I thought it would be them. But unfortunately, this is not what I found. At least not in the way they talk about their food and describe it on the menus. Here are some examples: As an example of affordable, mass-market dining, Denny's really focuses on the meat in the meal. Their descriptions and pictures are all very clear about what the priority is. If red meats and proteins were supposed to be 90% of the meal, Dennys would be right on. |Denny's Steak and Shrimp dinner. The name says it all. This is almost the exact opposite of what the food guides recommend.| |The LePigeon dinner menu for June 20th. | Meat, meat, meat, meat, mushrooms, meat. LePigeon is an upscale french restaurant here in Portland. I was hoping that price would influence perspective but that didn't happen. Again, the meats are the focus at dinner time. Granted, LePigeon is devoted to excellent food. My understanding is that they source as much of their ingredients as locally as possible. They make no mention of this on their website, however, because their focus is quality and deliciousness. To people not familiar with preparations inspired by rustic french cooking, some of the dishes may seem "out there". But they are delicious. Unfortunately, they are also totally unbalanced. The menu continues to use language that favors proteins over everything else. Paley's Place is one of my favorite restaurants in Portland. Vitaly Paley is regularly recognized as one of the top chefs in Portland and his restaurant gets all kinds of awards. The Paley's Place cook book is also very good. Paley also has a focus on local, organic, sustainable ingredients, which I really appreciate. But when we look at how the dishes are characterized, it is the same problems. I would like to point out an interesting disconnect. Take for instance this beautiful image of what looks like seer'd tuna and a spring salad that I stole from the Paley website. Not doubt this dish was described as a tuna entree that also happened to come with some greens. But if you look at the actual portions, the tuna is not so dominant as the name implies. The photographer, like the menu writer, is focusing on the tuna, but the chef that composed the meal actually gave a lot of balance to the accompanying vegetables. In fact, the greens provide a physical foundation for the main attraction--the tuna. I have to say, that through the course of my investigations, I really didn't find anything that provided a nice contrast to the repetitions I was finding. This was a bummer because I was hoping to have an example to contrast with. But, whether cheap eats or fine dining, the language of food is very similar everywhere. If language is thought, then there is a lot of similarity in the way corporate menu planners and executive chefs think about food. Most of that thinking gets focused on the "main" item of a dish which is normally the big protein. This way of thinking about food is in sharp contrast to the way we are supposed to be actually eating based on the food pyramids. How did we start thinking this way? I don't believe the meat industry created this phenomena. They just capitalized on it. The Modern Meal is a Super-Condenser Here is my theory on how this came to be: In the past the wealthy and the common folk ate differently. The common folk could not afford as much meat and ate only one course meals mainly. The wealthy could get whatever they wanted to eat (mostly) and took more time at home to have leisurely multi-course meals with all their smelly friends. What else would you do without movies and internet and cars and video games? |Circle of Frans Francken the Younger, (1581-1642) Belshazzar's Feast.| "A dinner that begins with a soup and runs through a fish course, an entree, a sherbet, a roast, a salad, cheese and desert, and may be accompanied by from three to six wines...the movement through the various courses should be an ascending one from light, delicate and more complex flavors through progressively richer, more full-bodied and simpler flavors." (p 22)If you were a peasant, your meals were much simpler. Depending on the era and the location, peasants had access to better or worse foods, but in general: Medievalists agree on certain characteristics of medieval diet such as the overwhelming importance ascribed to cereals generally and bread in particular, or the great disparity in protein consumption between an upper class that enjoyed vast quantities of meat and fish and a lower class more dependent on grain, dairy products and vegetables. http://www.uv.es/consum/freedman.pdf If you were an English peasant: German peasants seem to have had it better than most: But the German peasants, workers, and the many poor made do with their homemade beer and filled their stomachs with kraut and bacon, lentils and peas, firm satisfying breads and light dumplings. By the 1800s more than four-fifths of the German population were peasants, and their own pigs were the mainstay of their diet. Thanks to Frederick the Great, it could be said that by the end of the 1800s, "potatoes were such a regular item that smoke coming from a cottage chimney at night was almost a certain sign that inside, potatoes, bacon and onions were frying." The poor ate closer to the food pyramid (less meat and more vegetables and grains) in one course. The wealthy at closer to the food pyramid but spread it out across many courses. Our current diet has roots in classical, aristocratic dining. The hotels adopted it, Escoffier codified it, and we live it. And, thanks to government and industry, it is made up of foods that only the wealthy could afford in years past. But, in our modern, democratic disdain for the hoity-toity aristocracy of the past, we eat like peasants--usually only eat a single entree plus maybe a desert or appetizer. Because of that, we are jumping straight to the main course (the big protein), bypassing the other courses that provide for an overall balanced meal. The occasional exception is that even though the language may not be that much different, sometimes in fine dining the actual meal may not be as unbalanced as in lower cost establishments. Compare the Paley's tuna meal to the Denny's Steak and Shrimp. Denny's is clearly the meal with a higher percentage of red meat and heavy fats. And it is cheaper. And obesity is linked to social class. No kidding. How do we fix this? I think a good place to start is quiche. Quiche Will Save Your Life What is in quiche? Almost anything you want. Is quiche a meat or a vegetable? Probably both. Does it give primacy to a big protein? Well, besides the fact that it's mostly eggs, no. We've often had frittata at home filled with only vegetables. And they were wonderful. Gratins would fit the bill also. So would salads. So would soup. So would stir-fry. So would gumbo. So would a calzone. There are a lot of meals we could make that are not formed around language the reinforces an unbalanced view of what a meal should be. When eating a simple dinner after work, maybe it's best to conceive of meals that are "one pot" style meals. Soup with crusty bread could be perfectly balanced, and it gets us out of mentality that you build a dinner by starting with a slab of meat then adding some veggies. A summer salad of fresh greens, baby sweet onions, lentils, cucumber, goat cheese crumbles, a few flank steak slices, and a light vinaigrette would perfectly balanced. A calzone filled with spinach, garlic, some bacon crumbles and gruyere with a side of pear slices would be delicious. Quiche could be a perfect surprise. Lots of veggies. A little chicken. Some cheese sprinkled on top. You just ate the food pyramid properly and your chance of getting cancer is theoretically lower. When several courses are involved, it makes more sense to have a big steak and shrimp plate in there somewhere. But the rest of the food pyramid shows up also. It's just exploded out across several plates. By changing the way we talk about food, and consequently the way we conceive of our meals, maybe we can start having intrinsically better meals for the health of us all. Hello Pot, My New Friend In the interest of practicing these ideas, I've been trying to bend my thinking to this new model. It is hard. Like the example I gave before, my normal way of imagining meals is to start with a main ingredient and build out. In this new model, it is easier to start with the pot you cook with and add in. |Pretty similar to my fish stew. http://bit.ly/qto26n| - 16 oz can of tomatoes, drained - Two cups clam broth + one cup water - 6-8 shrimp - some clams - 1 cod filet By volume, the dominant ingredient is tomatoes and clam broth. However, I call it seafood stew. Why don't I call it tomato and clam broth stew? I don't know, but proteins are powerful things and it's going to take some practice to break out of their hold.
<urn:uuid:c16375d8-8b74-4dc6-be71-9d2f90284332>
CC-MAIN-2020-24
http://www.farmingportland.com/2011/07/
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590348513230.90/warc/CC-MAIN-20200606093706-20200606123706-00571.warc.gz
en
0.973867
4,359
2.671875
3
Angkor Wat wonder of the World Angkor Wat (Khmer: អង្គរវត្ត or “Capital Temple”) is a temple complex in Cambodia and the largest religious monument on earth, utilizing the website calculating 162.6 hectares (1, 626, 000 m2; 402 miles). It absolutely was initially built as a Hindu temple of god Vishnu for Khmer Empire, slowly transforming into a Buddhist temple toward the end of the twelfth century. It had been built because of the Khmer King Suryavarman II during the early 12th century in Yaśodharapura (Khmer: យសោធរបុរៈ, present-day Angkor), the main city of this Khmer Empire, as their condition temple and eventual mausoleum. Breaking from Shaiva tradition of previous kings, Angkor Wat had been rather aimed at Vishnu. Due to the fact best-preserved temple at the site, it will be the just one to have remained an important religious center since its foundation. The temple are at the top the large classical style of Khmer structure. It has become emblematic of Cambodia, appearing on its national flag, and it is the united states’s prime attraction for visitors. Angkor Wat integrates two basic programs of Khmer temple architecture: the temple-mountain plus the later galleried temple. Its built to express Mount Meru, residence of the devas in Hindu mythology: within a moat and an outer wall 3.6 kilometres (2.2 mi) very long are three rectangular galleries, each raised over the after that. Within center regarding the temple stands a quincunx of towers. Unlike many Angkorian temples, Angkor Wat is focused toward west; scholars are divided regarding need for this. The temple is admired for the brilliance and balance of the structure, its considerable bas-reliefs, and also for the many devatas adorning its wall space. The modern title, Angkor Wat, indicates “Temple City” or “City of Temples” in Khmer; Angkor, indicating “city” or “capital city”, is a vernacular as a type of the term nokor (នគរ), which comes from the Sanskrit word nagara (Devanāgarī: नगर). Wat is the Khmer term for “temple grounds”, additionally produced by Sanskrit vāṭa (Devanāgarī: वाट), meaning “enclosure”.
<urn:uuid:d2840598-2de7-4c5a-89a0-ce88d413850b>
CC-MAIN-2020-34
http://charmspandorau.com/WondersOfTheWorld/angkor-wat-wonder-of-the-world
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439735939.26/warc/CC-MAIN-20200805094821-20200805124821-00254.warc.gz
en
0.92992
595
3.109375
3
Watch Part I and Part II of the Universal Trail Assessment Training by Carole Fraser, in partnership with Saratoga PLAN. As former Universal Access Coordinator for the NYS Department of Environmental Conservation, Carole Fraser’s work as an advocate, educator and mentor helped to make the natural environment accessible throughout the state of New York. What is the Universal Trail Assessment Process? The Universal Trail Assessment Process provides trail users with detailed information on the specific, actual conditions and usability of an environment. Trail assessments collect data related to the slope and cross slope of trails, point out distances between bench locations, list surface composition and much more. This information is them compiled and can be used by trail visitors to determine whether a PLAN nature preserve meets their needs. Who assesses the trails? Phase I of the project involves training interested volunteers in how to conduct a proper assessment, use tools for accurate measurements and record and disseminate the data collected. Phase II will include field work, recording, and disseminating data. Presentation begins around the 6:00 mark. Presentation begins around the 4:00 mark. Questions about the presentations? Want more information possible UTAP volunteer opportunities? Contact Carole Fraser at email@example.com.
<urn:uuid:9f78226b-ace9-4a39-b92e-16ff455675a1>
CC-MAIN-2023-14
https://saratogaplan.org/trail-assessment-training/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943589.10/warc/CC-MAIN-20230321002050-20230321032050-00479.warc.gz
en
0.903222
268
2.765625
3
Humanities fascination for bees is nothing new. Bees’ efficiency in using space, their peaceableness compared with other stinging insect, their sensitiveness even for the smallest environmental changes, their ability to produce a variety of valuable products, and not at least the complexity of the bee colonies’ organisation, reminding of the organisation of human society, has invited repetitively to thinking about, reflecting upon and research related with bees, until today. This is one of the reasons why the “OpenBeeResearch” project allows providing a frame in which a variety of different disciplines and actors can meet and engage in a satisfactory synergetic work to better know how a bee colony behaves. “OpenBeeResearch” aims at uniting scientific experts, artists, and different actors from civil society (e.g. beekeepers, environmentalist, urban gardeners, bee keepers, architects) in collective works, creative activities and in a variety of different research activities with and along bees and the beehive. The bee is at the centre of collaborative work. The bee allows individuals and actors from different social spheres and disciplines connecting with each other, working on shared projects, and engaging in a productive information and knowledge exchange that can serve all kinds of different practical and theoretical purposes and interests. OUR PROJECTS WITH URBAN BEEKEEPING HOW TO START WITH BEES People are becoming increasingly interested in taking up beekeeping for several reasons. First and foremost is the satisfaction of harvesting your own delicious, home-grown honey. However, by caring for your own colony, you will also be benefiting the ecology of our planet. Today, as a result of intensive farming methods, extreme weather conditions, and a rise in bee disease, the bee population is declining rapidly across the world. As a result, our plants, including many of our food crops, are threatened– because, of course, as well as bees depending on plants, many plants depend on bees pollinating them in order to reproduce. Another reason to take up beekeeping is the sheer pleasure of relaxing in the garden in the sunshine and hearing the steady humming of bees at work among your flowers– one of the sound most evocative of long and drowsy summer days. We encourage you to take the first step to keeping bees. If you want to know more, enroll in a beginner’s course that will show you all you need to know about this fascinating pastime. A variety of courses be found through your local beekeeping association, or many are now listed on the Internet, which may suit your purpose. Good luck with your new hobby. You will need also beekeeping equipment. You can find several online stores, but we recommend La tienda del apicultor , one of the most popular beekeeping supplies provider in Europe. A suit, smoker, beehive and hive tool is enough to start. Good luck with your new hobby.
<urn:uuid:9141baf3-fd81-4efa-bf35-655f377b0abc>
CC-MAIN-2020-34
https://www.openbeeresearch.org/
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439737172.50/warc/CC-MAIN-20200807083754-20200807113754-00429.warc.gz
en
0.94352
599
2.828125
3
What is a graphic card? A graphics card, also known as a video card or GPU (Graphics Processing Unit), is a hardware component that is responsible for rendering images and videos on a computer or other devices. It is an expansion card that is connected to a motherboard and contains a dedicated graphics processing unit, video memory, and other components that work together to produce a high-quality visual output. The graphics card is essential for tasks that require high-performance graphics processing, such as gaming, video editing, and rendering. It offloads the processing of graphical data from the CPU, freeing it up to perform other tasks. A graphics card can have varying levels of performance and features, depending on its model and manufacturer. Some popular graphics card manufacturers include Nvidia and AMD. The Importance of Graphics Cards Graphics cards are important components in a computer system for several reasons: Rendering graphics and videos: The most significant function of a graphics card is rendering images, videos, and animations. It is responsible for rendering the pixels of images and videos, ensuring that they are displayed correctly on a screen. A high-quality graphics card is essential for tasks such as gaming, video editing, and rendering, which require high-performance graphical processing. Offloading processing from the CPU: Graphics cards have dedicated graphics processing units (GPUs) that are designed specifically for processing graphical data. By offloading this processing from the CPU, the graphics card allows the CPU to focus on other tasks. This results in better overall performance and faster processing times. Modern graphics cards are designed to handle multiple tasks simultaneously. This allows users to run multiple applications at once, such as playing a game while streaming video content or editing a video while running other programs in the background. Virtual and augmented reality: Graphics cards are essential for virtual and augmented reality applications. These applications require high-quality visuals and low latency to create an immersive experience for users. Without a high-quality graphics card, virtual and augmented reality applications would not be possible. Features Graphics Cards Graphics cards can have a range of features, depending on their model and manufacturer. Some common features of graphics cards include: Graphics Processing Unit (GPU): The GPU is the primary component of a graphics card responsible for rendering images and videos. Modern GPUs are highly specialized and can perform complex calculations at lightning-fast speeds. Graphics cards have their own memory, known as video memory or VRAM, which is used to store and process graphical data. The amount of VRAM can vary depending on the graphics card model and affects the card’s overall performance. The clock speed of a graphics card refers to the rate at which the GPU operates. A higher clock speed means that the GPU can process data faster, resulting in better performance. Graphics cards generate a lot of heat, so most modern graphics cards come with their own cooling systems. This can include heatsinks, fans, and liquid cooling systems. Graphics cards typically have several works, such as HDMI, DisplayPort, and DVI, which allow them to connect to different types of displays. Crossfire and SLI are technologies that allow multiple graphics cards to work together to provide better performance. Graphics cards can have Crossfire or SLI support, allowing users to add multiple cards to their system for better performance. Ray tracing is a technology that allows for more realistic lighting and shadows in video games and other graphical applications. Some modern graphics cards include dedicated hardware for ray tracing. In conclusion, graphics cards are essential components in a computer system, particularly for those who require high-quality visuals or perform graphics-intensive tasks. They have a range of features that affect their performance and functionality, including the graphics processing unit (GPU), video memory, clock speed, cooling systems, outputs, Crossfire/SLI support, ray tracing, and overclocking. A high-quality graphics card can significantly improve the performance of a computer and provide a better user experience, whether you are a gamer, a video editor, or a professional working with graphics-intensive applications. It’s important to choose a graphics card that has the features you need for your specific use case and budget.
<urn:uuid:47ce4b09-f364-4db3-b72e-3abc469ec059>
CC-MAIN-2023-50
https://todaybusinessposts.com/the-importance-of-graphics-card-features-and-functions/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100448.65/warc/CC-MAIN-20231202172159-20231202202159-00264.warc.gz
en
0.932456
846
3.890625
4