text
stringlengths 263
344k
| id
stringlengths 47
47
| dump
stringclasses 23
values | url
stringlengths 16
862
| file_path
stringlengths 125
155
| language
stringclasses 1
value | language_score
float64 0.65
1
| token_count
int64 57
81.9k
| score
float64 2.52
4.78
| int_score
int64 3
5
|
---|---|---|---|---|---|---|---|---|---|
How Can I Be a Good Parent to All My Kids When One Has ADD?
The short answer to your question is that there is no scientific evidence to suggest that your children who do not have ADD or ADHD will experience negative consequences because you are required to spend more time parenting your child with ADHD. I usually begin by helping parents find ways to meet each child's needs and to help all children in the family feel they are receiving parental attention.
Depending on the age of your two children who do not have ADHD, a discussion about the child with ADHD, his or her struggles, and ways that everyone in the family can be of help should increase family cohesiveness and connections. In our research on resilience, we have found that when children help others, it helps them feel better about themselves, and more connected to those they are helping. The very tone of your question suggests that you are making an effort to attend to the needs of your children. One concrete suggestion for you to consider is to create a special time for each child once every few weeks in which you or your spouse take the child on a special outing, such as to dinner or a movie.
Learn more in the Everyday Health ADD/ADHD Center.
Last Updated: 04/21/2009
Dr. Sam Goldstein
is a psychologist in Salt Lake City, a faculty member at the University of Utah School of Medicine, and the author of books and articles on ADHD.
|
<urn:uuid:2e9d5074-7a58-444d-91ac-a3d217cedbc7>
|
CC-MAIN-2013-48
|
http://www.everydayhealth.com/adhd-specialist/adhd-parenting-balance.aspx
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164456039/warc/CC-MAIN-20131204134056-00088-ip-10-33-133-15.ec2.internal.warc.gz
|
en
| 0.972885 | 291 | 2.515625 | 3 |
Blenda : Sweden's Greatest Heroine
The Blink Of An Eye
It takes many years for eight generations of humans to live out their lives, but to the Gods and Norns it all happened in the blink of an eye. Perception is truly in the eyes of the beholder, and when you count time in millennium instead of weeks, months, and years, it flows swiftly like water over a falls in a fluid never ending stream.
With the passing of each season the landscape of Midgard was changed and shaped to the needs of each individual community. Trees were cut down for farmland, and villages sprang up near natural springs, and where rich soil was laid down by the retreating glaciers. Over time some of the villages, especially those located in advantageous positions for either commerce or defense, grew into fortified towns to protect their lands from those who wished to take away what they had worked so hard to build.
Kings came and went. Territories were won and lost. With some lands being combined peacefully through treaty or marriage alliances, while others were wrested away from their rightful owners by those with stronger armies. Southern Sweden was not immune to this ebb and flow of tide. To the west Vastergotland grew to be a great power. To the east Ostergotland became a regional cornerstone, while Smaland, " the small lands ", sat precariously close to the region known as Skane , which was ruled by the Kingdom of the Danes, who were not always friendly towards the Swedes.
This Swedish region was also known generally as the Kingdom of the Geats. And one king, a strong warrior named Alle, ruled over this region at the turn of the millennium, though each independent land had their own rulers who called themselves by various titles which included jarl or prince. Each Hundred, or Harad, fell under the territorial rule of this prince, but each village also had a chieftain, who exercised control over the affairs of the local folk.
King Alle had several sons, but the one who was most important to him was his oldest named Adolphus. For he was next in line to succeed him as King of the Geats. When King Alle had decided to lead his Geats against the Pagans of Livonia, it was a very young Adolphus who rode proudly by his side as they forcibly converted the Livonians to the White Christ. As the cross fell across these Baltic lands the earth ran red with Heathen blood. And when the Geatish king lead his warriors back home they were heralded as heroes by maidens who waved white handkerchiefs from the docks.
Then for two decades the clanging of swords was not heard throughout these southern Swedish lands. The Norse to their west, and the Danes to their south, were quiet as well. The king became fat and complacent. He had grown too fond of the easy life, and forgotten what it was to be a warrior. The king saw that his army had disintegrated into complacent Christian farmers, while his ships lay rotting on the docks of the fjord.
Even more disturbing to the king was that this age of peace, drinking and feasting, had softened his son and heir Adolphus to the point where he seldom wore his sword about his waist. And although the king was firmly established as a Christian, he wondered what the old Gods must think of them now . King Alle was sure that it had been many years since the Einherjar had received a new member from the Land of the Geats.
Then one day, Hrolf, the Jarl of the Harad Konga, came to visit the king with his eldest daughter, a beautiful strong looking woman named Blenda. The king took to admiring the young maiden almost immediately, and invited Blenda and her father to the Harvest Feast that was to be held in his great hall on the night of the Harvest Moon.
The king, with his eldest son Adolphus sitting by his side, was intrigued by the feisty maiden who had the looks and shape of a young lady, but who spoke of battle like a shield maiden of old. She recanted the old tales from the Viking age as easily from memory as the best of his skalds recanted them from the vellum they were written on in the new church language known as Latin.
During the telling of the tale of Beowulf Blenda pulled out a dagger from her belt and slashed at the air with it to show how Beowulf had cut off the hand of Grendel as it made it's escape from Heorot . King Alle was instantly intrigued by the bejeweled knife which seemed ancient in design, and asked if he could see it more closely. As the king was examining the old dagger he noticed some odd writing on the handle. It appeared to be written in runic letters, many of which had been worn off, but they seemed to be of a much older form of runes. Possibly even from a time before the Vikings ruled the northern lands.
" What does the inscription mean ? " the king asked.
Blenda giggled as the king handed the knife back to her.
" You would think it foolish if I told you ! " she replied.
It was then that Adolphus, who had been gazing deeply into Blenda's beautiful blue eyes, and not at the knife at all, joined in the conversation.
" Please tell us ! " the prince insisted.
Hrolf smiled at his daughter, and then nodded to her that she should tell the king and his son the tale.
Blenda held up the dagger and ran her finger below the inscription as she spoke :
" With this dagger a woman shall save Sweden, .... is all that remains to decipher . " she explained to the Geatish royalty.
King Alle's face hardened as he pounded his fist on the table.
" It is as though our ancient ancestors are mocking us ! " he shouted.
The king then added as he pounded the table again :
" And they are right ! We have become like women ! Soft and unable to stand and fight as we did in the past ! This ancient relic has made me see the error of our ways ! We must re - arm ! We must polish the rust off of our weapons, sharpen the blades to a fine edge, and once again prove that we are warriors worthy of calling ourselves Geats ! " he shouted.
Hrolf was terrified by the king's outburst !
" My Lord ! My daughter meant no harm ! The knife, the ' Dagger of Destiny ', is only a ceremonial gift that is to be handed down from mother to daughter. When my wife died it was my duty to continue the tradition and present it to my daughter. I am sorry if it has upset you, but I assure you that it is only a harmless tradition in our family and has no deeper meaning. " he told the king and his son.
King Alle quickly realized that he had projected his anger at his own people's laziness toward the young maiden who had merely been trying to entertain them.
" If I startled you maiden Blenda, I am truly sorry. But you are wrong Hrolf . This knife does represent something very important indeed . It reflects forward from the past a time when warriors, both men and women, did not have to worry if a Christian priest would condemn their heroic actions, or worry that the White Christ would not accept them into heaven if they went plundering across the countryside of their enemies . " he explained in a much calmer voice.
Suddenly, KIng Alle rose up and addressed the entire hall.
" It is not too late my fellow Geats ! We can rebuild our ships, and sail to the ends of the known world ! And there, ...., there we can reclaim our pride,.... and our glory,.... and most important of all we can regain our honor ! " he shouted to his startled guests.
- End Chapter 3
- Next : Chapter 4 : Love and War
- Glenn Bergen, ( Ravensheart ), © Copyright, 2016.
|
<urn:uuid:bdf6babe-0329-49e9-b436-88c729a7d646>
|
CC-MAIN-2017-39
|
http://www.anindependentasatru.com/-blog/-blenda-swedens-greatest-heroine-chapter-3-the-blink-of-an-eye
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689806.55/warc/CC-MAIN-20170923231842-20170924011842-00362.warc.gz
|
en
| 0.98955 | 1,675 | 2.890625 | 3 |
Are Bats Dangerous to Humans?
Many people are squeamish about bats. They come out at night, which is enough to give them all sorts of associations with the forces of darkness. They look like flying mice and screech when theyâre caught. They have sharp teeth, beady eyes and often grotesque little faces. Most bats are harmless to people, and even beneficial, but some can spread disease. Diseases that are spread from animals to humans are called zoonoses. Here are a few of the zoonoses that can be spread from bats to human.
Australian bat lyssavirus (ABL) is contracted by humans who try to handle a bat and the bat scratches or bites. The disease is exceedingly rare, but when itâs caught itâs almost always fatal. Basically, itâs a form of rabies.
Humans can contract leptospirosis, a bacterial infection, when they come in contact with bat urine, though the main carriers of leptospirosis are cattle and rodents. Leptospirosis begins with symptoms like the flu, which can progress to liver or kidney damage. Still, it’s rarely fatal. The disease is also called Rat Catcherâs Yellows, among other colorful names.
Salmonella can be picked up by humans coming into contact with bat droppings. The bat, in this case the large bat known as the flying fox, isnât the only animal that can infect a human with salmonella, but it appears to be a vector.
Histoplasmosis is a lung disease. Itâs rare because itâs mostly contracted by people who visit caves where bats live. The bats’ feces drop into the cave dust. The dust may be kicked up, then breathed in.
Hendra virus is caught indirectly from the flying fox. People get this virus from the body fluids of horses. A flying fox who carries the virus may eliminate on something the horse eats, like a bucket of oats. When the horse ingests the oats it becomes infected, and infects a human in turn. This infection can cause bleeding and swelling in the lungs, or meningitis. Hendra virus infection, fortunately, is also rare among humans in Australia.
Similar stories: http://www.si.edu/Encyclopedia_SI/nmnh/batfacts.htm
|
<urn:uuid:49ec068a-1e10-4562-90a0-424ff7a0eed7>
|
CC-MAIN-2013-48
|
http://ncgnc.org/are-bats-dangerous-to-humans/
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163053003/warc/CC-MAIN-20131204131733-00009-ip-10-33-133-15.ec2.internal.warc.gz
|
en
| 0.941544 | 489 | 3.578125 | 4 |
Involving everyone in constitution-writing seems to be quite in vogue. Just yesterday I blogged about a new effort in Egypt to write a populist constitution. From this article, it appears that Iceland, pictured above, is also writing its constitution en-masse using Facebook.
The question then arises - what aspects of a constitution are most conducive to mass-creation, and what should practically be reserved for constitutional lawyers and historical experts?
Here history is not the best guide, as new technology tools are, well, new. But there were phases in the drafting of the U.S. Constitution which might provide at least some helpful insights.
Once the delegates arrived at the federal convention of 1787, there were three main phases of constitution-drafting. In the initial phase, which I will call the political stage, three (really four if you count Alexander Hamilton's outrageous monarchical plan) plans were proposed, and two discussed--the Virginia Plan and the New Hampshire Plan, or Patterson Plan (although the Pinckney Plan was proposed and tabled without discussion the same day the Virginia Plan was proposed on May 29, it was used by the Committee of Detail in drafting the Constitution). Between May 29 and late July 1787, the broad outline of government, or the political structure, was agreed upon. This was essentially an amended version of the Virginia Plan which, depending on how you count, contained 23, 24, or 26 resolutions.
On July 26, the Convention broke for a five-member Committee of Detail to draft a Constitution, the second phase of the Convention. This they did in a short 10 days. Although John Rutledge of South Carolina seems to have been the committee chair, the committee was dominated by James Wilson, in whose hand eight of nine committee documents appear, including, again depending on how you count them, two or three drafts.
The final, legal stage began on August 6 when the Committee of Detail reported their draft. This was refined over another five weeks, including the few days in September wherein Gouveneur Morris on the Committee of Style retooled the Constitution's phrases with great alacrity.
Once the Constitution was signed on September 17, it was submitted to public discussion for a period of two years as each state considered ratification. Here, clearly, is an example of mass participation in the creation of a constitution. These debates did not change the text of the original articles, but they did produce draft bills of rights, from which the ultimate first ten amendments were formed.
Yet what about mass participation in the initial political stages of debate? Certainly, as can be seen from newspaper articles, blogs, tweets, and street protests, the public is involved in calling for a new constitution. Can this call evolve successfully into preparing political blue prints for a legal document?
I believe that they can, especially through technology. Yet I suggest that the various publics involve consider carefully whether tight, simple legal prose can be crafted entirely by a crowd.
|
<urn:uuid:6379e538-3632-4a63-8b91-7bb745a85eaa>
|
CC-MAIN-2017-43
|
http://constitutionathomeandabroad.blogspot.com/2011/06/facebook-writes-iceland-constitution.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823260.52/warc/CC-MAIN-20171019084246-20171019104246-00041.warc.gz
|
en
| 0.97161 | 604 | 2.96875 | 3 |
From MASANOBU FUKUOKA
[Available at Mulligan Books -DS]
The following commentary is adapted from the posthumously published Sowing Seeds in the Desert by Masanobu Fukuoka (Chelsea Green, 2012). Fukuoka was the author of the international bestseller One-Straw Revolution. He died in 2008. Given the recent news about the extended drought facing much of the United States, we thought our readers might want to read Mr. Fukuoka’s deep insight into how Western agricultural practices have helped to create vast deserts across the planet, while on the surface appearing very “green.” In fact, Mr. Fukuoka notes, below the grassy surface, soils are being depleted and drained — becoming deserts under our feet. As you read this, keep in mind that Sowing Seeds in the Desert first appeared in print – in Japanese – in the mid-1990s.
Although the surface of the ground in Europe and the United States appears to be covered with a lovely green, it is only the imitation green of a managed landscape. Beneath the surface, the soil is becoming depleted due to the mistaken agricultural practices of the last two thousand years.
Much of Africa is devoid of vegetation today, while just a few hundred years ago it was covered by deep forests. According to the Statistical Research Bureau in India, the vegetation there has also disappeared rapidly over the past forty-five or fifty years and now covers less than 10 percent of the land’s surface. When I went to Nepal, officials lamented the fact that in the last twenty years the Himalayas have become bald, treeless mountains.
In the Philippines, on the islands of Cebu and Mindanao, there are banana plantations but no forests, and there is concern that in a few years even drinking water may be in short supply. In Thailand, Malaysia, and Indonesia, as farming methods that protected nature have been swallowed up by the wave of modern civilization, the condition of the land has also deteriorated. If the deforestation of the tropical rain forests in Asia and Brazil continues at the present rate, oxygen will become scarce on earth and the joy of springtime on the planet will be replaced by the barrenness of winter.
The immediate cause of the rapid loss of vegetation has been the indiscriminate deforestation and large-scale agriculture carried out in order to support the materialistic cultures of the developed countries, but the remote cause stretches back thousands of years.
The natural world did not become a desert on its own. Both in the past and at present, human beings, with their “superior” knowledge, have been the ringleader in turning the earth and the human heart into wastelands. If we eliminate the fundamental cause of this destruction—people’s knowledge and actions—nature will surely come to life again. I am not proposing to do away with human beings, but rather to change the politics and practice of our authority.
My measures for countering desertification are exactly the same as the basic natural farming method. One could refer to it as a natural farming revolution whose goal is to return the earth to the paradise it once was.
Lessons from the Landscapes of Europe and the United States
I first saw the desert and began to have an interest in it the summer I flew to the United States for the first time, in 1979. I was expecting the American continent to be a vast, fertile green plain with lush forests, but to my amazement, it was a brown, desolate semi-desert.
I gave a talk in Sacramento, California, for the state’s Department of Conservation hosted by Ms. Priscilla Grew, who was head of the department at the time. I said that the environment in California had serious problems as a result of poor agricultural practices, poor water management, overlogging, and overgrazing. These things, I told the group, are conspiring to create the “Great California Desert.” After the talk, I was invited for a private conversation with Ms. Grew, a geologist, in her office on the thirteenth floor of the Resources Building.
We discussed how Japan and California were roughly the same latitude, that both the vegetation and the parent rocks in the two places were similar, and that long ago the Asian and American continents were one. The fossil record shows, for example, that vast forests of Metasequoia1 existed in both places. The mosses and lichens I saw growing in the undisturbed forests of the Sierra Nevada and the Coast Range were also the same as I observed in the virgin forests of Japan.
It was my conjecture that the desertification and climate change in California has been accelerated by mistaken agricultural methods. I suggested that deforestation and the change from the perennial bunchgrasses that once covered the plains to annuals such as foxtail and wild oats contributed to the decrease in rainfall.2 “Rain doesn’t only fall from the sky,” I suggested. “It also falls up from below.” The vegetation, especially trees, actually causes the rain to fall.
After we left her office, someone suggested that I come along and visit an interesting place nearby. That “interesting place nearby” turned out to be a hot, dry plateau in the Coast Range about one hundred miles away.
About twenty young people from several countries were somehow managing to live in this remote area on national forest land. They asked me to teach them how to use natural farming to help them make their livelihood. They did not even have proper sickles or hoes. The entire area was covered with dry grass, with not a spot of green in sight. There were only a few oak trees here and there.
In the midst of such hopeless circumstances, I was unable to sleep. Early the next morning, as I was washing my face at a small spring, I noticed that water soaking a mouse’s nest had caused some weed seeds to sprout and grow a few inches tall.
I had always thought that the grass in California died because the summers are hot and dry, but I realized it was only the introduced annual grasses that gave that impression. They come up in the fall with the first rain, set seeds, and then die by early summer. These annuals had chased out the native grasses, which remain green all summer. Grazing probably had a lot to do with it, but there were no grazing animals in the area anymore. Thinking that the green perennial plants ought to come back if we got rid of the weedy annuals, I set about doing an experiment.
After broadcasting the seeds of various Japanese vegetables amid the dried grasses and mowing them down with an improvised sickle, I brought water from the spring near the top of the hill by plastic pipe and sprinkled it fairly deeply over the area. I thought the few days until the water evaporated would tell the tale. Eventually, green began to grow among the brown grass. Of course, it was the green of the weedy foxtails. As I expected, when the water had disappeared by the end of a week’s time, the grass that had sprouted up began to wither in the heat, but in its midst Japanese pumpkin, cucumbers, tomatoes, okra, daikon, and corn began to flourish. The center of the field turned into a vegetable garden. The stubborn foxtails sprouted, then withered and became mulch, and in their place, vegetables had grown up.3
We should revegetate California. We should wake up the seeds of weeds that are lying dormant during summer by giving them water, and then let them die before they can make more seeds. At the same time, it would be good if the state government would broadcast seeds of perennial grasses from the air in clay pellets. After this experiment, however, I had to press on with my travels, so I left the mountain and entrusted these hardy souls with my dream.
Later that year, I was shown around Europe by a Greek gentleman and a young Italian woman who had stayed in one of my hillside huts. The European countries are, for the most part, very careful about protecting the natural environment and maintaining the lovely vegetation. At first glance the entire area looks like a natural park, but it is only the beauty of a picture postcard. If you look closely, you will find that there are very few varieties of trees. The soil is thin, hard, and unfertile. It appeared to me that the earth in Europe had been damaged by an agriculture made up of mismanaged pastures used to produce meat for royalty, and vineyards to produce wine for church use.
Generally speaking, the farther south you go from the Netherlands, up the Rhine, and toward Italy, the more the number of trees decreases and the green color fades. In addition, much of the Alps are composed of limestone and have few large trees. The farther south you go, the higher the soil temperature, and the drier the climate. The soil becomes thinner and increasingly less fertile. My impression was that in Europe, the soil was dry and depleted just below the surface.
When people started plowing, that marked the beginning of modern European civilization. Culture, in its original sense means “to till the soil with a plow.” When tractors were introduced, production increased, but the earth lost its vitality even more quickly. Throughout human history civilizations have been founded in areas with rich soil and other resources. After the soil was depleted as a result of cutting too many trees, overgrazing, harmful irrigation practices and plowed-field agriculture, that civilization, which had been wearing the mask of prosperity, declined and often disappeared altogether. This has happened over and over again.
From my observations in Europe and the United States, I could see how the errors of modern agriculture were damaging the earth. That strengthened my conviction that natural farming methods are the only ones capable of reversing this degradation.
This excerpt is reprinted with permission of the publisher, Chelsea Green Publishing. For more information about this book, and Mr. Fukuoka, visit: http://www.chelseagreen.com/bookstore/item/sowing_seeds_in_the_desert:hardcover or www.chelseagreen.com
1• This is one of three types of redwood trees, the others being the coast redwood and the giant sequoia. The Metasequoia, or dawn redwood, was thought to be extinct until a few groves were discovered in southern China in 1944. It is now a popular landscape tree widely available in plant nurseries.
2• The grasslands of California originally consisted of perennial grasses. These plants have deep and extensive root systems and stay green all summer. When the Spanish introduced grazing sheep and cattle in the late 1700s, they also brought the seeds of annual grasses such as rye and oats. The grazing animals selectively ate the more nutritious native perennials, giving the annuals a big reproductive advantage. The native grasses were supplanted by the annuals in just a few generations, leaving the soil depleted and much drier.
3• This technique of watering annual weeds to get them to sprout and then wither before they can set new seeds—known as premature germination—has been used by organic farmers for many years to control weeds. When the weeds grow up, they shade and cool the ground long enough for the vegetables to get off to a good start, then they act as mulch for the vegetable garden, cooling the ground and conserving moisture. When the autumn rains arrive, fewer weeds come up since they were “tricked” into germinating too soon. Mr. Fukuoka is suggesting that this technique could also be useful in broad-scale rehabilitation for establishing trees, shrubs, and perennial grasses.
Masanobu Fukuoka (1913–2008) was a farmer and philosopher who was born and raised on the Japanese island of Shikoku. He studied plant pathology and spent several years working as a customs inspector in Yokohama. While working there, at the age of twenty-five, he had an inspiration that changed his life. He decided to quit his job, return to his home village, and put his ideas into practice by applying them to agriculture.
In 1975 he wrote The One-Straw Revolution, a best-selling book that described his life’s journey, his philosophy, and farming techniques. This book has been translated into more than twenty-five languages and has helped make Mr. Fukuoka a leader in the worldwide sustainable-agriculture movement. He continued farming until shortly before his death in 2008, at the age of ninety-five.
|
<urn:uuid:23a2d985-374b-4e3a-9b8d-65bedcdcec57>
|
CC-MAIN-2017-43
|
https://ukiahcommunityblog.wordpress.com/2012/07/20/the-green-deserts-of-western-civilization/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824537.24/warc/CC-MAIN-20171021005202-20171021025202-00327.warc.gz
|
en
| 0.977263 | 2,639 | 3 | 3 |
Immigration Watch Canada provides our latest bulletin: general background material on the 1882 U.S. Chinese Exclusion Act. Note that the American law, like the Canadian law which followed in 1923, was directed against Chinese labourers, not all Chinese. The purpose of both the American and Canadian laws was to end the arrival of new waves of Chinese labourers and to slowly terminate through attrition the unfair advantages these labourers had in the work place.
The background should provide more perspective on the Canadian Chinese Head Tax and Chinese Exclusion Laws.
Chinese Exclusion Act (United States)
From Wikipedia, the free encyclopedia
Jump to: navigation, search
The Chinese Exclusion Act was a United States federal law passed on May 6, 1882, following 1880 revisions to the Burlingame Treaty of 1868. Those revisions allowed the U.S. to suspend immigration, and Congress subsequently acted quickly to implement the suspension of Chinese immigration.
The act excluded all Chinese laborers from immigrating to the United States for 10 years. Amendments made in 1884 tightened the provisions that allowed previous immigrants to leave and return, and clarified that the law applied to ethnic Chinese regardless of their country of origin. The act was renewed in 1892 by the Geary Act for another 10 years, and in 1902 with no terminal date. It was repealed by the 1943 Magnuson Act, allowing a national quota of 105 Chinese immigrants per year, although large scale Chinese immigration did not occur until the passage of the Immigration Act of 1965.
The act was passed in response to the large number of Chinese who had immigrated to the Western United States as a result of unsettled conditions in China and the availability of jobs working on railroads. Most came on five year labor contracts. It was the first immigration law passed in the United States targeted at a specific ethnic group.
Although the law has long been repealed, it was around long enough to be made part of the United States Code. Even today, although all its constituent sections have long been repealed, Chapter 7 of Title 8 of the U.S.C. is headed, “Exclusion of Chinese.” It is the only chapter of the 15 chapters in Title 8 (Aliens and Nationality) that is completely focused on a specific nationality or ethnic group.
The United States was not the only country to have racially restrictive immigration policies. Australia, Canada, and New Zealand also had similar policies. See the Chinese Immigration Act, 1923, the White Australia policy, and the New Zealand head tax.
Chinese came to America in large numbers as individual miners during the 1849 California Gold Rush with 41,400 being recorded as arriving from 1851-1860. Again in the 1860s when the Central Pacific Railroad recruited large labor gangs, many on five year contracts, to build its portion of the Transcontinental Railroad. The Chinese laborers worked out well and thousands more were recruited until the railroad's completion in 1869. Chinese labor provided the massive labor needed to build the majority of the Central Pacific's difficult railroad tracks through the Sierra Nevada mountains and across Nevada. In the decade 1861-70 64,301 are recorded as arriving, followed by 123,201 in 1871-80 and 61,711 in 1881-1890. Most came from Southern China looking for a better life; escaping a high rate of poverty left after the Taiping Rebellion. This immigration may have been as high as 90% male as most immigrated with the thought of returning home to start a new life. How many of them returned on the expiration of their labor contracts is unknown. The biggest problem the highly male dominated communities that stayed in America faced was the lack of suitable Chinese brides which were not allowed to emigrate in significant numbers after 1872 and the mostly bachelor communities slowly aged in place with very low Chinese birth rates.
At first, when surface gold was plentiful, the Chinese were well tolerated and well-received. As the easy gold dwindled and competition for it intensified, animosity to the Chinese and other foreigners increased. Organized labor groups demanded that California's gold was only for Americans, and began to physically threaten foreigners' mines or gold diggings. Most, after being forcibly driven from the mines, settled in Chinese enclaves in cities, mainly San Francisco, and took up low end wage labor such as restaurant work and laundry. A few settled in towns throughout the west. With the post Civil War economy in decline by the 1870s, anti-Chinese animosity became politicized by labor leader Dennis Kearney and his Workingman's Party as well as by Governor John Bigler, both of whom blamed Chinese “coolies” for depressed wage levels.
Despite the Chinese Exclusion Act of 1882 there continued to be some Chinese immigration before its repeal in 1943. From 1910 to 1940, the Angel Island Immigration Station on what is now Angel Island State Park in San Francisco Bay served as the processing center for most of the 56,113 Chinese immigrants who are recorded as immigrating or returning from China; upwards of 30% more who showed up were returned to China.
|
<urn:uuid:e6abff3e-d8c2-48ae-bf6a-e3be6cd404dd>
|
CC-MAIN-2020-29
|
https://immigrationwatchcanada.org/2006/08/31/background-of-the-u-s-chinese-exclusion-act/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657140746.69/warc/CC-MAIN-20200713002400-20200713032400-00336.warc.gz
|
en
| 0.977717 | 1,033 | 3.359375 | 3 |
If Chinese superstitions have any credence, some of us may not be long for this world. Chinese superstitions posit that long noodles symbolize a long life. Ostensibly, if you cut your noodles, you’re cutting your life short. Instead of cutting your noodles, the Chinese advocate slurping up long noodles without breaking them. When it comes to noodles, the Chinese should know. After all, they’ve been preparing noodles longer than any culture in the world. In 2005, archaeologists uncovered a 4,000-year-old bowl of noodles in Northeast China, the earliest empirical evidence of noodles ever found. Buried under ten feet of sediment, an overturned sealed bowl contained beautifully preserved, long, thin yellow noodles made from two kinds of millet. Archaeochemist Patrick McGovern indicated that “even today, deft skills are required to make long, thin noodles like those found” at the Chinese site, adding that “this shows a fairly high level of food processing and culinary sophistication.”
If you’ve never seen the art-and-science process of hand-making noodles, it should be on your bucket list–and because the process is quickly becoming a lost art, you should place it near the top of that list. Fortunately you don’t have to go far to witness veritable feats of noodular prestidigitation. The art of hand-pulled noodles is on daily display at Beijing Noodle No. 9 within Caesar’s Palace in Las Vegas where the open kitchen doubles as an exhibition hall for chefs who’ve been intensely trained on how to hand stretch noodles. Through a process of stretching and twisting flour, noodle-masters can hand pull hundreds of beautiful long thin noodles for a variety of dishes. It’s a beautiful thing to watch, but even more spectacular is sampling the results.
When we heard a new Duke City restaurant named Nanami Noodle House would be launching in January, 2017, we dared hope hand-pulled noodles would be featured fare. Alas, such was not meant to be. Nanami showcases noodles made elsewhere and flown in for use on a variety of broth-based, vegetarian and non-broth noodle dishes (if it’s any consolation, very few cities across the fruited plain can boast of restaurants in which noodles are made in the traditional hand-pulled manner). Captivating aromas emanating from the kitchen gave us very little opportunity to bemoan our ill-fortune. The source of those fragrant bouquets were in dire need of exploration as was a menu as diverse and delightful as we’ve seen in quite some time.
Befitting the restaurant’s name, which translates to “seven seas,” that menu includes dishes originating in Vietnam, Japan, China, Thailand, Taiwan and Korea with a nod to New Mexico here and there. The Land of Enchantment meets Asia in the very first appetizer listed on the menu. That would be the green chile Rangoon. It’s one of nine appetizers, most of which are pretty standard fare. You can eschew appetizers altogether and enjoy one of the four available salads. Some diners will gravitate immediately to the noodle soups section of the menu, a listing of fifteen slurp-worthy soups. If you prefer noodles sans broth, the menu lists four inviting options including grilled vermicelli. Vegetarian options are also available.
Lest I forget, the menu lists a nice array of hot and cold beverages including sixteen-ounce shakes, some in flavors you might not expect (green tea, Vietnamese coffee and Thai tea, for example). Caffeine fiends should try the Vietnamese Coffee Frappe, an eye-opening meld of strong coffee and sweetened condensed milk. Hot tea by the pot flavors include oolong, jasmine, green tea and a decaffeinated green tea. Ice tea flavors include unsweetened green tea, mango, lychee and peach. Coke products are also available, but other options just seem so much more appropriate. Oh, and you’ll definitely want to peruse the dessert menu, too.
Nanami Noodle House is located at the former site of Cafe Jean-Pierre off the Pan American Highway. It faces and is within easy walking distance of the Century 24 theater. Nanami is the brainchild of first-time restaurant owners Brian and Nga Trieu, both of whom have extensive restaurant experience. Brian cut his teeth working in restaurants owned and operated by his siblings in Roswell, Rio Rancho and Albuquerque. Among family owned restaurants with which you might be familiar are Banana Leaf (which a sibling sold years ago) and the Plum Cafe next door. There are some similarities between the three.
Sure to become the restaurant’s signature appetizer is the Green Chile Rangoon (crispy Rangoon filled with green chile, jalapeño, onion, cream cheese and Cheddar). If you’ve ever lamented the cloying flavor of most Crab Rangoon, you’ll appreciate that this six-piece starter bites back–not too much, but enough to be discernible. The Green chile Rangoon is served with a plum sauce, a term which usually engenders yawning and ennui. This plum sauce actually has personality courtesy of a nice infusion of ginger and chili. It only looks sweet and innocuous.
Nanami pays attention to the sauces which accompany its appetizers. That’s a difference-maker discerning diners will notice. The chicken dumplings (crispy pot stickers filled with chicken, Napa cabbage, shallot and green onion), for example, are accompanied by a chili oil sweet soy sauce that emphasizes both its piquant and sweet elements. The chicken dumplings are flash-fried to a golden hue and are generously filled. It’s telling that the dumplings are delicious with or without sauce though the sauce does bring out more flavors.
Whether you noodle over the choices carefully or you espy a noodle dish that quickly wins you over, you’re in for a real treat. My Kim beat me to the spicy beef noodle soup (rice noodle, medium flank steak, beef broth, tomato, cucumber and bean sprouts in a sate pork-shrimp broth topped with crushed peanuts, green onions, fried shallots and basil), my ad-libitum choice when trying a new Vietnamese restaurant. While the flavor profile of most spicy beef noodle soups in the Duke City gravitates toward anise-kissed pho made piquant with the addition of chili, this one is wholly different. It derives its heat from sate, a piquant Vietnamese sauce typically made with garlic, lemongrass, chili, fish sauce and other ingredients. You may have noticed from the ingredients listed above that the broth is a sate pork-shrimp broth, not a beef broth. There are many surprises in this soup, the least of which is the addition of fresh tomatoes and cucumber slices. This deeply satisfying, rich elixir may have you rethink what you believe spicy beef noodle soup should be.
If you can’t get enough ramen in your life, you’ll appreciate Nanami offering one ramen option heretofore unavailable in the Duke City. That would be the Kim Chi Ramen (wheat noodle, chasu, tofu, soft-boiled egg, mushrooms, bean sprouts and kimchi in a pork dashi broth topped with sesame seed, green onion and nori). This is a ramen dish rich in umami, one of the five basic tastes (along with salt, sweet, sour and bitter) with a profile described as “meaty” and “brothy.” The rich stock (dashi), soy sauce, earthy mushrooms and even the fermented kimchi are especially imbued with umami. There is a lot going on in this dish, a melding of ingredients which go very well together, but if the term “kimchi” inspires visions of fiery, fermented cabbage, you might be disappointed. The focus of this ramen is in developing a multitude of flavors, not one overwhelming flavor. This is a memorable dish!
The Nanami Noodle House may not hand-pull its noodles, but the chef certainly knows how to use noodles to craft deeply satisfying, soulful and delicious dishes you’ll want to enjoy again and again.
Nanami Noodle House
4959 Pan American, N.E.
Albuquerque, New Mexico
LATEST VISIT: 11 February 2017
# OF VISITS: 1
BEST BET: Green Chile Rangoon, Chicken Pot Stickers, Kim Chi Ramen, Spicy Beef Noodle Soup
|
<urn:uuid:46c62f7f-2497-46ec-96cf-5c223d36520d>
|
CC-MAIN-2020-16
|
https://www.nmgastronome.com/?p=42370
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370518622.65/warc/CC-MAIN-20200403190006-20200403220006-00279.warc.gz
|
en
| 0.930102 | 1,839 | 2.765625 | 3 |
Talking Pens and Flip-Cameras Transform Learning in Preschool
Recorded: Tuesday, April 16th, 2013 @ 7:00 am - 7:40 am HST
Duration: 40 minutes
The availability of multiple forms of technology is changing the way in which young children learn and discover their world. Rather than focusing on how technology fits into existing curricula, this interactive presentation will focus on the new ways technology allows children to create meaning and make sense of their world that extends beyond traditional reading and writing activities using slides and videos. This presentation is based on a qualitative case study I conducted in a Montessori preschool to explore the ways children preferred to use technology for learning when multiple technology tools were made readily available to them. Attendees will learn how the addition of Smartpens, Flip-Video Cameras, and Digital Cameras to the environment provided children with daily opportunities for using technology to express learning in multiple forms. Findings from my case study will describe the ways preschool children preferred to use technology to express ideas, to write stories, and to visually document and share learning experiences with others. Attendees will hear and “experience” how children from my study grew more confident as writers using the “talking pen” and were more motivated to learn through the lens of a camera. This presentation will offer practical tips on how to design and manage learning environments with accessible technology tools that will transform learning in preschool.
|
<urn:uuid:3a4336df-5623-48cd-b015-c4f43ba8494b>
|
CC-MAIN-2017-43
|
http://tcc.badgestack.net/sessions/13065/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187825227.80/warc/CC-MAIN-20171022113105-20171022133105-00896.warc.gz
|
en
| 0.938023 | 290 | 2.765625 | 3 |
Mediaeval Yorkshirefolk mutilated, burned t'dead to prevent reanimation
Likely not cannibalism issue, as knifemarks not near the meat. Er, OK
Archaeologists investigating human bones excavated from the deserted mediaeval village of Wharram Percy in North Yorkshire have suggested that the villagers burned and mutilated corpses to prevent the dead from rising from their graves to terrorise the living.
Although starvation cannibalism often accounts for the mutilation of corpses during the Middle Ages, when famines were common, researchers from Historic England and the University of Southampton have found that the ways in which the Wharram Perry remains had been dismembered suggested actions more significant of folk beliefs about preventing the dead from going walkabout.
Their paper, titled A multidisciplinary study of a burnt and mutilated assemblage of human remains from a deserted mediaeval village in England, is published today in the Journal of Archaeological Science.
Located in the Yorkshire Wolds, Wharram Percy was continuously occupied for about 600 years, and was probably founded in the 9th or 10th century, but had become deserted by the early 16th century as a result of gradual abandonment and forced evictions. The ruined church is the last-standing mediaeval building, beside it remaining the grassed-over foundations of two manors and about 40 peasant houses and their outbuildings.
Since 1948 the settlement has been the focus of intensive research, which has made it Europe's best-known deserted mediaeval village, and in what may be the first good archaeological find regarding the practice, human remains from the site suggest the predominance of folk beliefs regarding revenants in 11th-13th century England.
Restless corpses were usually thought to be caused by a lingering malevolent life force in individuals who had committed evil deeds or created animosity when living, according to the researchers, and a number of mediaeval writers describe various ways to deal with revenants, one of which was to dig up the offending corpse, decapitate and dismember it, and burn the pieces in a fire.
According to the researchers, in cannibalism the knife marks on bones tend to be clustered around major muscle attachments or large joints, but at Wharram Percy the knife marks were mainly in the head and neck areas.
There was also the possibility that the corpses were treated differently because they were outsiders. However, analysis of strontium isotopes in the teeth showed this was not the reason here.
Alistair Pike, Professor of Archaeological Sciences at the University of Southampton, explained: "Strontium isotopes in teeth reflect the geology on which an individual was living as their teeth formed in childhood. A match between the isotopes in the teeth and the geology around Wharram Percy suggests they grew up in an area close to where they were buried, possibly in the village. This was surprising to us as we first wondered if the unusual treatment of the bodies might relate to their being from further afield rather than local."
First author Simon Mays said: "The idea that the Wharram Percy bones are the remains of corpses burnt and dismembered to stop them walking from their graves seems to fit the evidence best. If we are right, then this is the first good archaeological evidence we have for this practice. It shows us a dark side of Mediaeval beliefs and provides a graphic reminder of how different the Mediaeval view of the world was from our own." ®
|
<urn:uuid:2f514aef-0cd3-4f3a-9677-746ac7cf7b90>
|
CC-MAIN-2017-43
|
https://m.theregister.co.uk/2017/04/03/mediaeval_yorkshirefolk_mutilated_burned_tdead_to_prevent_reanimation/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187826283.88/warc/CC-MAIN-20171023183146-20171023203146-00539.warc.gz
|
en
| 0.974724 | 709 | 3.203125 | 3 |
Coins Help Date Jerusalem Temple|
January 17, 2012
This article was originally printed in World Coin News.
>> Subscribe today!
A coin discovery is assisting archaeologists in their understanding of when the construction of the Second Jewish Temple in Jerusalem was completed.
A contemporaneous account by retired general and historian Josephus Flavius cites that the temple built by King Herod I was not completed within Herod’s lifetime. However, many people today think that Herod did indeed complete it prior to his death in 4 A.D.
Josephus described the construction as “the largest project the world has ever heard of,” and that once the project was completed about 18,000 workmen were consequently unemployed. Some historians have suggested this unemployment could have led to the First Revolt in 68 to 70 A.D., involving Judaea against Rome.
The coin find suggests the Western Wall that was destroyed by the Romans in 70 A.D. was completed by Herod’s great grandson, King Agrippa II.
The find was accompanied by contemporary oil lamps, pots and a sword scholars have suggested were likely left by Jewish rebels as they fled the Romans.
Israel Antiquities Authority archaeologist Eli Shakoun along with Haifa University professor Ronny Reich led the excavations that unearthed the coins.
Shakoun commented, “Until today, accepted wisdom said that all the walls were built by Herod. When we found these coins, which were dated about 20 years after Herod’s death, we understood that it couldn’t have been him who built this part of the wall. Herod started building in the 18th year of his reign, which was around 22 B.C., and here we have coins [underneath the wall] which date back to at least 15 A.D., which show it was at least 40 years.”
An official Israel Antiquities Authority statement reads, “This bit of archaeological information illustrates the fact that the construction of the Temple Mount walls and [the adjacent] Robinson’s Arch was an enormous project that lasted decades and was not completed during Herod’s lifetime.”
These conclusions are based on the discovery of four bronze prutah or “widow’s mite” coins of Roman Procurator Valerius Gratus who governed from 15 to 26 A.D. during the reign of Tiberius. They were found at a mikveh or ritual bath that dating from before the time of the temple. The mikveh had been filled in to make way for the protective outer wall around the temple. The coins were found in the half of the mikveh that was not covered by the foundation stones.
Collectors would not consider these coins to be expensive. Their true value is their aid to researchers due to the evidence and documentation they provided.
More Coin Collecting Resources:
• The Coins of Israel 1901-2000
• Subscribe to our Coin Price Guide, buy Coin Books & Coin Folders and join the NumisMaster VIP Program
• Strike It Rich with Pocket Change, 2nd Edition
Add to: del.icio.us digg
With this article: Email to friend Print
Something to add? Notice an error? Comment on this article.
|
<urn:uuid:9743ac97-94e1-4e33-8194-a6eceb662512>
|
CC-MAIN-2017-34
|
http://www.numismaster.com/ta/numis/Article.jsp?ad=article&ArticleId=24641
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886105927.27/warc/CC-MAIN-20170819220657-20170820000657-00026.warc.gz
|
en
| 0.979495 | 670 | 3.1875 | 3 |
A lot of the phishing emails and calls people receive are made with the sole purpose of obtaining information from you in order to steal your identity.
What's the difference between identity theft, and identity fraud?
Identity theft is the process of your details and personal information being stolen. This could include your name, date of birth or current and previous addresses. You may not even know that identity theft has taken place, as this information can be obtained through malicious software on your computer, a convincing looking form/link or even your Facebook page.
Your information can then be sold or used to commit identity fraud, where an individual uses this information to assume your identity. This can be through taking out loans in your name, opening bank accounts or even stealing your photos to create fake social media or dating profiles.
But they aren't really me, so what's the problem?
The problem is that the banks, loan companies and potential online dates don't know that this individual has stolen your identity. This means that for all intents and purposes this person is you - because anything that they do will be attributed to you.
Therefore you could suffer anything from a crippling loss of reputation to being the subject of a criminal investigation. It's also very difficult and time consuming to prove your innocence, meaning your credit score could be affected and you could get bills and letters from debt collectors.
How can I protect myself?
Make sure that you know exactly how much of your information (and your family's information) is available online. Check your social media privacy settings and regularly view how your profile appears to a stranger and a friend. If you wouldn't tell a stranger over the phone, it shouldn't be public.
Also ensure that you destroy any paper copies of bank statements or utility bills properly. This is important because one of the main pieces of documentation you need to open a bank account or take out a loan is proof of your address.
Be wary of any emails or phone calls requesting bank information or personal information, even if they look or sound like they are from a service you subscribe to. Check out our guide for spotting phishing emails here.
For more on hacking and phishing, read our post on a targeted hacking attack by professional hackers here.
|
<urn:uuid:2540eb3c-7fc9-4c4c-bb17-13b6cedf819a>
|
CC-MAIN-2017-34
|
https://www.transcendit.co.uk/blog/posts/what-do-you-really-know-about-identity-theft
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886105970.61/warc/CC-MAIN-20170820034343-20170820054343-00255.warc.gz
|
en
| 0.951059 | 457 | 2.796875 | 3 |
Nutrient lockout is when the soil medium being used is oversaturated with nutrients. It is one of the most common problems growers face, especially when chemical fertilizers with high salt contents are used in the soil medium. Flushing is the most common way to treat nutrient lockout, and feeding is paused to prevent overloading the soil medium with excessive nutrients. Maintaining a proper pH level is key to avoiding nutrient lockout, as nutrient lockout increases if the pH value fluctuates outside the optimal range.
One of the most common problems growers face is nutrient lockout (or nutrient lockup). When growing plants inside, whether it be an indoor garden like a greenhouse, grow room, or grow tent, there are certain factors to consider, including the risk of nutrient lockout, the signs/symptoms, and if nutrient lockout can have long-term effects on your plants.
Nutrient lockout is a challenging issue, and quite frankly, it is irritating. The good news is, nutrient lockout issues do not have to be the end for your grow room.
By identifying nutrient lockout early by knowing the signs, knowing how to fix it, and how to prevent it, you can save your plants.
What Is Nutrient Lockout?
A nutrient lockout can be very frustrating when growing plants, especially if you are a newbie grower and have no idea what’s causing your plants to have stunted growth and yellow, limp leaves.
When a plant experiences nutrient lockout, the plant no longer can absorb nutrients from the growing medium, and therefore, the nutrients are locked out from entering your plant’s vascular system.
Nutrients are needed for your plant to remain healthy, so if you experience a nutrient lockout, your plant is essentially being starved. Consequently, nutrient lockout leads to nutrient deficiency or in severe cases, plant death.
Cannabis Nutrient Lockout
Nutrient lockout and nutrient mobility are key concepts related to successful growth, and growing healthy cannabis plants. Nutrients must be available for the cannabis plant to uptake from the soil.
When growing cannabis, nutrients are absorbed into the root via osmosis. If the soil medium or water has a high concentration of salts around the root zone, the plant can leach nutrients from the roots back into the soil medium. This is all due to nutrient lockout, which if not addressed quickly and monitored using a pH and electrical conductivity (EC) meter, nutrient deficiencies will rapidly follow the lockout.
Knowing the symptoms and causes is the first step to treating the problem and reversing it.
What Causes Nutrient Lockout?
The two main causes of nutrient lockout are issues with your medium’s pH level and nutrient imbalance.
The importance of proper pH when growing plants is critical, as the risk of nutrient lockout increases if the pH value fluctuates outside the optimal range. While nutrient lockout has many causes, which we will go into later on in this article, one of the most common culprits is incorrect pH levels.
The optimal range for plants is commonly called its “sweet spot”. It is the pH value for growing high-quality plants where nutrients can be sufficiently absorbed, and nutrient deficiencies are not a problem.
The optimal pH range for most indoor plants is 5.5 to 6.3. Therefore, pH levels below pH 5.5 or higher than 6.3 can lead to many nutritional issues, including nutrient lockout.
If the pH of the soil or grow medium strays too far from the optimal pH range, certain nutrients are absorbed over others.
Let’s put this into perspective…
If the pH value is 5.0, iron and manganese are readily absorbed, while essential nutrients like calcium and magnesium are not, and therefore, the plant will typically suffer from calcium and magnesium deficiencies.
pH Lockout Chart
As pH and nutrient availability play a critical role in preventing nutrient lockout, you should follow the pH lockout chart. The chart includes 17 nutrients that are essential for the overall health of your plants/crops.
As plants grow, they must absorb nutrients from the soil, water, and surrounding environment. Over time, the growing medium can accumulate excess nutrient salts, which cause a nutrient lockout.
If the salts react with your plant and nutrient solutions (chemical fertilizer) that you supply, excess nutrients (typically with a high salt content) can bond together making them unavailable for your plant, essentially locking them out for your plant to utilize.
So, too many nutrients cause the pH to change and therefore, nutrient lockout to occur.
Can Overwatering Cause Nutrient Lockout?
As overwatering plants increase the number of salts in the soil medium, overwatering can contribute to nutrient lockout.
Can The Use Of Hard Water Cause Nutrient Lockout?
Water sources that contain high levels of water harness will lock out key nutrients required for plants to grow. Water that has high hardness, such as tap water, is also linked to scaling on equipment. This is because calcium and magnesium levels are greater in tap water compared to reverse osmosis (RO) water.
Nutrient Lockout Symptoms
You should know the signs and symptoms of nutrient lockout to act quickly before it drastically affects your plant’s health. If your plants are suffering from nutrient lockout they may show one or more of the following signs:
Limp and lifeless plants
Sometimes leaf burn
The trouble with identifying what is wrong with your plants is that the signs of nutrient lockout are very similar to general nutrient deficiencies. For example, you could be overwatering or underwatering your plants, and they may show the same symptoms of nutrient lockout.
To be sure it is a nutrient lockout, check the pH level of the soil medium, the water supply, and the nutrient solution you use.
If after testing, the pH level is above 6.3 or below 5.5, the pH level is the issue. But if the pH seems fine, yet your plants are experiencing the above symptoms, you may be overloading your plant with nutrients, and therefore experiencing nutrient lockout.
To accurately measure the pH in soil mediums, we recommend preparing the following:
Nutrient lockout is an annoyance, but it can be fixed. So, identify that nutrient lockout is the problem for your plants, and follow the steps outlined below to fix the issue.
The first step to fixing nutrient lockout is to stop feeding your plants. As mentioned, overloading your soil medium and plant only pumps them with more nutrients, which worsens nutrient lockout.
Next would be to flush your plants with pH-balanced water. The best way to fix nutrient lockout is to flush the plant to clear the soil/growing medium from excessive salts. Flushing is the most common way to treat nutrient lockout, by flooding your plants with water in the hope to wash out and dilute the minerals and rebalance the pH level by breaking up salts. If you are growing in a hydroponic system, you should use a fresh solution.
After flushing the soil, allow it to dry out completely before you water your plants again to prevent root rot from overwatering. After the flushing process, you should no longer have issues with nutrient lockout, so, you can refill your reservoir with the nutrients and supplements your plant needs.
NOTE: Flushing should not be used if your plants are already suffering from nutrient deficiency. Flushing them during this time will reduce their growth and resin percentages.
How To Prevent Nutrient Lockout?
A nutrient lockout can be fixed, but as always, prevention is always much better than a cure. To prevent a nutrient lockout, your focus should be on keeping nutrients balanced and the ideal pH ranges stable. Here’s how to prevent a nutrient lockout.
Regularly Check & Maintain pH Levels
Imbalances in the plant medium’s pH level are one of the leading causes of nutrient lockout. The pH levels should be tested weekly, if not bi-weekly, to make sure your plant is growing in the healthiest environment possible.
A pH meter is an inexpensive and highly-accurate tool to keep an eye on your pH levels. This means any issues with the medium’s pH can be adjusted before a nutrient lockout occurs.
If you have a hydroponic system, we also recommend investing in a pH controller to monitor the pH levels more closely and add acid or alkaline solutions as needed.
Use Organic Fertilizers
Organic fertilizers usually have lower mineral and nutrient levels than chemical fertilizers. This means organic fertilizers are less likely to cause nutrient lockout and they also benefit your plant’s overall health.
If you would prefer to use synthetic fertilizers, ensure they contain good quality nutrients, and keep a close eye on the pH level and the number of nutrients that are supplied in every watering.
Regularly Flush Your Plants & Flush With Reverse Osmosis Water
In addition to a nutrient lockout fix, regularly flushing your hydroponic system and growing medium is a great way to prevent the problem.
Flushing is recommended at the end of each growing season to check your plant is absorbing the nutrients they need to grow and thrive. This is particularly important if you have potting soil. Potting soil is usually stripped of nutrients at the end of the growing season, so flushing will re-feed your plant’s soil before the next harvest. Some growers choose to compost the potting soil and start with freshly-bought soil to prevent a nutrient lockout.
When flushing your medium, use pure water such as pH-balanced water or RO water to guarantee purity. The use of RO water makes it easier to maintain and adjust the pH level of the growing medium, because you have more control over the water chemistry.
If you wish to adjust any nutrient levels, you may also want to flush the plants as the pre-flowering stage is a great time to flush the plant’s medium. This means the soil will have a neutral pH level, and therefore, the chances of nutrient lockout are reduced.
If you are unable to flush your soil’s medium, a filtration system using RO water can be used.
Summing Up, Nutrient Lockout
Nutrient lockout is a nuisance, but it doesn’t mean the end for your plants. If you haven’t managed to prevent it, there are ways to fix nutrient lockout if you catch the signs and symptoms early.
The bottom line comes down to how well you maintain and manage the pH level and avoid nutrient imbalances. This includes supplementing the right nutrients and keeping the pH level within your plants’ “sweet spot”.
If you have any questions regarding nutrient lockout or are unsure which testing tools you need, do not hesitate to contact the world-class team at Atlas Scientific.
A water quality monitoring buoy is an essential tool for monitoring water quality in various applications and ensuring the health of aquatic ecosystems. They provide real-time data on water quality and allow researchers to make necessary adjustments to improve water quality. Anti-fouling probe screens, including copper mesh, titanium mesh, and ceramic screens, are essential components
Microfluidics is a rapidly growing field of research that focuses on the behavior of fluids at the microscale level. It involves the study of how fluids flow through microchannels, microreactors, and microsystems. The microfluidic devices used in this field are designed to manipulate small volumes of fluids, typically in the range of microliters or nanoliters.
|
<urn:uuid:4906619a-28a8-405a-bf68-d64402b848f1>
|
CC-MAIN-2023-14
|
https://atlas-scientific.com/blog/nutrient-lockout/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945368.6/warc/CC-MAIN-20230325161021-20230325191021-00294.warc.gz
|
en
| 0.915481 | 2,390 | 2.9375 | 3 |
Bigger, more, better, faster – we seem to be programmed to push for growth in every way. It’s the same in politics and economics: almost every economy in the world is built on a growth model, and capitalism is coupled with growth. But our planet is straining under the pressure: growth means a bigger demand for resources and increasing greenhouse gas emissions – which means we are already pushing past planetary boundaries.
Each month, the Elsevier Atlas Award recognizes research that could significantly impact people's lives around the world. October’s award goes to Prof. Milena Büchs and Prof. Max Koch for their article in the journal Futures:
- Challenges for the degrowth transition: The debate about wellbeing, Futures (Jan 2019)
If we want a future in which our wellbeing is protected, some researchers say we need to stop and rewind; instead of growth, we need degrowth. That doesn’t mean going back to a prehistoric way of life, but it does mean reducing our consumption until whatever materials and resources we use, and the greenhouse gas emissions we generate, stay within sustainable planetary boundaries.
Regardless of how vital degrowth is to our future, it might not be easily accepted in today’s society. Degrowth would change our lives dramatically and have a big impact on our wellbeing; we need to understand that impact and overcome the social and cultural barriers to degrowth if it’s to be a feasible solution.
Dr. Milena Büchs, Associate Professor in Sustainability, Economics and Low Carbon Transitions at the University of Leeds Sustainability Research Institute in the UK, and Prof. Max Koch of the Lund University School of Social Work in Sweden, have been exploring this phenomenon; their recent in Elsevier’s Futures journal has won the Atlas Award for October.
“Loads of institutions have evolved around our economic growth model – the legal system, the political system, our cultural system – and growth has played a massive role in stabilizing rich societies,” said Prof. Büchs. “People have been used to incomes increasing over time, so they have that expectation. I think it's very easy to see the potential for social conflict in such a scenario. If we don't understand the potential implications of degrowth on people’s wellbeing, it will never become a reality.”
In their paper, which follows a book they have written on degrowth, Profs. Büchs and Koch explore the concerns people have about the impact degrowth would have on their wellbeing in the short to medium term. For current generations in rich countries, moving from the familiar growth model to an unfamiliar degrowth model would involve a significant decrease in consumption, which itself could have all sorts of implications for wellbeing.
“People’s consumption often corresponds to their identities and their aspirations and expectations for how life should be lived,” explained Dr. Büchs:
People aspire to buy a house, have a car and fly on ‘nice’ holidays; these are the expectations that we grew up with. I think this will be the change that is required – to not see consumption of material goods and services as something that can fulfill our need to have an identity and some kind of status in society. The question is how that can be addressed in zero carbon ways.
The broader links degrowth has to our culture and society also have implications for wellbeing that might hinder its adoption – many of society’s welfare-related institutions are coupled to the growth model: the welfare state and the labor market, for example. Changing all this would be an unprecedented undertaking, as Prof. Koch said:
“We can argue that the growth model has resulted in a multiple crisis now. We know we need to make some major changes in the next 10 years, basically of everything at the same time and roughly at the same speed. We have been discussing this and actually could not come up with any example where change of that caliber has been carried out under democratic circumstances. However, to succeed in the long term, this transition will need to be democratic and participatory, and this will be one of the major challenges we need to work on.”
Understanding the impacts degrowth might have on wellbeing will highlight the objections different groups might have to it. This understanding is vital in order to come up with ways to overcome barriers to degrowth. Dr. Büchs and Prof. Koch believe degrowth is critically needed to tackle climate change, otherwise our livability on the planet will be under threat.
“If we don't do anything, if we just carry on as usual, very soon our survival will be under threat,” said Prof. Koch. “One of the counter-arguments to degrowth is that degrowthers want to make people poorer and that this would have negative wellbeing implications ; I think what one would need to make clear is that everybody’s wellbeing will be undermined by climate change if we do not act now.”
More research is needed, and both Dr. Büchs and Prof. Koch have a lot of work in the pipeline; Prof. Koch is currently planning a project that will involve holding citizen forums where people reflect on the more or less sustainable ways in which they satisfy their basic needs.
A conversation with Profs. Milena Büchs and Max Koch
Degrowth could be key to our future survival, so we need to start looking at its implications for wellbeing and how we can overcome the barriers to degrowth in today’s society. I talked with the authors of the Atlas Award-winning about their paper about their research what needs to be done to protect our future.
We invite you to listen to the podcast or read the transcription here:
What is degrowth and how does it relate to climate change?
Büchs : The idea is that if we want to stay within planetary boundaries, very likely we have to actually shrink our economies or the physical throughput to the economy. Degrowth refers to that phase of shrinking to a steady state – one in which biophysical throughput would remain at a sustainable level so that resources can be renewed and waste products effectively absorbed. This includes greenhouse gas emissions, which are already transgressing planetary boundaries.
Can you tell us about your paper?
Büchs: The paper follows on from a book that Max and I have authored: Postgrowth and Wellbeing. The paper shares main messages and looks at how we can take degrowth forward (and) what are the very first steps to addressing some of the barriers and difficulties that we've identified in the book in moving to a degrowth economy or society.
Why has there been a lack of support for degrowth?
Koch: To produce growth, to work hard, seems to be a natural way of being and the only way to care for yourself and the family. We can argue that this model has resulted in a multiple crisis now. We know we need to make some major changes in the next 10 years, basically of everything at the same time and roughly at the same speed. We consider what it would actually take to make a degrowth transition; all these institutions in the welfare state – the education system, the labor market, the legal system – all of it is entangled in many ways with the growth model.
Büchs: The barrier that we see is that degrowth is very different in the culture that we have at the moment. The difficulty is that it’s the current generations and near future generations which have to make these changes and will have to cut back material consumption to facilitate wellbeing for future generations. Growth has played a massive role in stabilizing rich societies, and people have been used to incomes increasing over time, so they have that expectation. I think it's very easy to see the potential for social conflict in such a scenario. If we don't understand the potential implications of degrowth on people’s wellbeing, it will never become a reality.
How might degrowth affect wellbeing?
Büchs: There’s this assumption that people's happiness doesn't seem to improve over time even though their income is increasing, which often leads to the conclusion that happiness is not related to income. But there's evidence that actually people respond differently to increases in income compared to decreases in income; that's sometimes called loss aversion. That might be a problem in a deep crisis scenario, and people might protest against income losses related to reductions of consumption.
What are your suggestions for making degrowth a feasible strategy?
Büchs: We need the public’s support for this, which requires a lot of discussion and cultural change. We need to identify minimum and maximum thresholds within which we could move; the minimum would be to satisfy our basic needs and the maximum would be defined by what is physically possible within the limitations of climate change and the emissions that we can still release into the atmosphere. We would also have to redistribute resources much more evenly and in a fair way in order to limit the potential for conflicts around resources, and that has all sorts of implications for how we organize the welfare state. The problem isn't that there aren't enough ideas; the problem is that we don’t know how to implement them.
Koch: We have to develop concrete eco-social policies – policies that at the same time address social inequality and climate change. And we haven't come far enough there, especially not with degrowth. It is very important to not lose the people on the way, which is why we think that citizen forums might be a good way to develop policy reform suggestions that have a much stronger social base than what we currently have.
What do you think the future will look like if we achieve degrowth — and if we don’t?
Koch: If we don't do anything, if we just carry on as usual with a bit of green growth and a bit of carbon markets, very soon our survival will be under threat. One of the counter-arguments to degrowth is that degrowthers want to make people poorer and that this would have negative wellbeing implications. I think what one would need to make clear is that everybody’s wellbeing will be undermined by climate change if we do not act now.
A Sustainability Debate: challenges for the #degrowth transition; the debate about wellbeing
As part of the current debate on sustainability, degrowth scholars have convincingly argued that degrowth in developed nations will need to be part of a global effort to tackle climate change, and to preserve the conditions for future generations’ basic needs satisfaction. In collaboration with the Pufendorf IAS, Elsevier hosted a debate on the topic on October 30, 2019. After introduction of the topic by Prof. Max Koch followed by a debate with several panelists.
- Anna Meeuwisse - Professor of Social Work, School of Social Work, LU
- Inger Kristensson Hallström - Professor, Child and Family Health, BioCare, LU
- Lewis Akenji – Atlas Advisory Board member – Executive Director SEED: Promoting entrepreneurship for sustainable development
- Herve Corvellec - Professor of Business Administration, Department of Service Management and Service Studies, LU
- Pernille Gooch - Associate Professor, Human Ecology Division, LU
Panelists at “A Sustainability Debate: challenges for the degrowth transition; the debate about wellbeing” at Lund University on October 30, 2019. (Photo by Ruona)
Elsevier’s Futures journal looks at the medium and long-term futures of cultures and societies, science and technology, economics and politics, environment and the planet, individuals and humanity. Covering methods and practices of futures studies, the journal publishes new contributions to knowledge which examine possible and alternative futures of all human endeavors, as well as humankind's multiple anticipatory relationships with its futures.
Get involved in degrowth
Degrowth is a feature of many initiatives. Here are some activities you can do on your own: Were these recommended by the Atlas winners or the author of this story?
- Slow food – take an interest in eating local food.
- Flexitarianism – move towards a plant-based diet.
- Staycation – ditch the long-haul flights.
- The flight-free initiative – stay grounded.
- Fridays for Future – a weekly strike for climate action
Learn more about degrowth
- Book by Dr. Büchs and Prof. Koch: Postgrowth and Wellbeing Challenges to Sustainable Welfare
- Talk by Prof. Max Koch: Welfare without Growth
- Paper in Ecological Economics: Degrowth through income and wealth caps?
- Blog post by Prof. Max Koch: Maximum limits on income and wealth? A degrowth perspective
- Degrowth website – with information, media and resources
- Paper in Energy Policy: Promoting low carbon behaviours through personalised information? Long-term evaluation of a carbon calculator interview
- Paper in Journal of Sustainable Tourism: The role of values for voluntary reductions of holiday air travel
|
<urn:uuid:efba6bbb-61fb-4c09-9c75-eb3579cba8aa>
|
CC-MAIN-2020-29
|
https://www.elsevier.com/connect/atlas/if-we-want-to-survive-on-earth-its-time-to-degrow
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655924908.55/warc/CC-MAIN-20200711064158-20200711094158-00256.warc.gz
|
en
| 0.958283 | 2,706 | 2.671875 | 3 |
School days, school days, good old golden rule days. Education quotes remind us the importance of getting a good education, whether its at the hand of a talented teacher or at the hand of Alice and Wonderlands Mock Turtle, who only taught, Reeling and Writhing and then the different branches of Arithmetic - Ambition, Distraction, Uglification and Derision. With education quotes we are inspired to learn more, to encourage our children to get a good education, to respect the tough and often thankless job teachers have, and to realize that our education doesnt stop with graduation, but is just the beginning.
Reference.com Definition of Education
Education on Wikipedia.org
[ Page 1 of 48 ]
- "There are people working on legislation, there are people working on public education, there are people holding protest signs, but those things alone will not achieve the end result of animal liberation. So people who are willing to break the law to stop animals being exploited are just one part of a liberation movement."
You'll also like:American Politician Education
American Author Education
Greek Philosopher Education
American Writer Education
American Poet Education
|
<urn:uuid:e2e62499-1bcf-4663-97fd-84b5b5f8e4f9>
|
CC-MAIN-2013-20
|
http://www.great-quotes.com/quotes/category/Education?full_site=0
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704818711/warc/CC-MAIN-20130516114658-00085-ip-10-60-113-184.ec2.internal.warc.gz
|
en
| 0.944993 | 235 | 2.65625 | 3 |
International Financial Institutions
are financial institutions that have been established by more than one
country, and hence are subjects of international laws.
Their owners or shareholders are generally national governments, although
other international institutions and other organizations occasionally figure
The most prominent IFIs are creations of multiple nations, although some
bilateral financial institutions exist and are technically IFIs.
Many of these are multilateral development banks (MDB).
Objectives of International
to reduce global poverty and improve people's
living conditions and standards;
to support sustainable economic, social and
institutional development; and
to promote regional cooperation and
International Financial Institutions (IFI’S)
World Bank Group (WBG)
International Bank for Reconstruction and Development (IBRD)
International Development Association (IDA)
International Finance Corporation (IFC)
Multilateral Investment Guarantee Agency (MIGA)
International Centre for Settlement of Investment Disputes
The World Bank?
What is World Bank?
An international organization dedicated to providing financing, advice
and research to developing nations to aid their economic advancement.
The world bank is one of the two Bretton Woods Institutions which
were created in 1944 to rebuild a war torn Europe after World War II.
Later, largely due to the contributions of the Marshall Plan, the World
Bank was forced to find a new area in which to focus its efforts.
The World Bank?
Why it came into existence?
The World Bank was created at the end of World War II as a result of many
European and Asian countries needing financing to fund reconstruction efforts.
The Bank is successful in providing financing for these devastated (destroyed)
The International Bank for Reconstruction and Development was the first
“Multilateral Development Bank.” Before World War II had ended.
Harry Dexter White and John Maynard Keynes conceptualised an international
institution to stabilize exchange rates and provide a source of financing for
reconstruction and development among countries ravaged by the war.
To provide long-term capital to member countries for economic reconstruction and development.
To induce long-term capital investment for assuring Balance of Payments (BoP) equilibrium and balanced
development of international trade.
To provide guarantee for loans granted to small and large units and other projects of member countries.
To ensure the implementation of development projects so as to bring about a smooth transference from a war-
time to peace economy.
To promote capital investment in member countries by the following ways;
To provide guarantee on private loans or capital investment.
If private capital is not available even after providing guarantee, then IBRD provides loans for productive
activities on considerate conditions.
Assist development and reconstruction
To promote long term balanced international trade
To lend for project development
To conduct its operations with due regard to business
Promote private investment
Granting reconstruction loans to war devastated countries.
Granting developmental loans to underdeveloped countries.
Providing loans to governments for agriculture, irrigation, power, transport, water supply,
educations, health, etc
Providing loans to private concerns for specified projects.
Promoting foreign investment by guaranteeing loans provided by other organisations.
Providing technical, economic and monetary advice to member countries for specific project.
Encouraging industrial development of underdeveloped countries by promoting economic reforms
Areas of Operation
Agriculture and Rural Development
Health, nutrition and population industry
Information, computing and
Law and justice
Water supply and sanitation
5 Priority Areas for the World Bank
World bank provides the largest external funds for
It is a big support in reducing poverty.
It provides fund for biodiversity projects.
it helps to bring clean water, electricity, and transport to
It helps in controlling emerging conflicts.
How much loan is given by the World Bank?
The lending terms are determined with reference to recipient countries. World
Bank decides the loan to a country on the basis of 3 criterion;
1. Risk of debt distress (A recipient with a high risk of debt distress
receives 100% of their financial assistance in the form of grants and
those with a medium risk of debt distress receive 50% in the form of
2. The level of GNI Per Capita
3. Creditworthiness for the International Bank for Reconstruction and
Development (IBRD) borrowing.
World Bank's Top contributor's
The new bank received most of its funds from the New York investment
The bank made its first, general reconstruction loans to France ($250 million –
largest ever) , the Netherlands, Denmark, and Luxembourg in 1947.
The bank’s first bond offering abroad, worth £5 million, came in London in 1951
China used IDA loans for agriculture and education projects while oil wells were
financed with IBRD loans.
It helped resolve the Indus water dispute between India and Pakistan.
What are the eligibility criteria for IDA loan?
Eligibility for IDA loan depends first and foremost
on a country’s relative poverty, defined as GNI per
capita below an established threshold and updated
annually ($1,165 in fiscal year 2018).
As of now 75 countries are currently eligible to receive IDA
The International Monetary Fund (IMF) is an organization
of 190 member countries, working to foster global
monetary cooperation, secure financial stability, facilitate
international trade, promote high employment and
sustainable economic growth, and reduce poverty around
The IMF works to foster global growth and economic
It provides policy advice and financing to members in
economic difficulties and also works with developing
nations to help them achieve macroeconomic stability and
With its global membership of 190 countries, the IMF is uniquely placed to
help member governments take advantage of the opportunities—and manage
the challenges—posed by globalization
The IMF tracks global economic trends and performance, alerts its member
countries when it sees problems on the horizon, provides a forum for policy
dialogue, and passes on know-how to governments on how to tackle economic
The IMF provides policy advice and financing to members in economic
difficulties and also works with developing nations to help them achieve
macroeconomic stability and reduce poverty
The IMF currently has a near-global membership of 190 countries. To
become a member, a country must apply and then be accepted by a
majority of the existing members.
Upon joining, each member of the IMF is assigned a quota, based broadly
Objectives of IMF
To promote international monetary cooperation
To facilitate the expansion and balanced growth
of International Trade
To promote exchange rate stability
To make its resources available to its members
who are experiencing BOP problems
To establish a multilateral system of payments
The IMF's main goal is to ensure the stability of the international monetary
and financial system. It helps resolve crises, and works with its member
countries to promote growth and alleviate poverty.
Economic and Financial Surveillance: The IMF promotes economic
stability and global growth by encouraging countries to adopt sound
economic and financial policies. To do this, it regularly monitors global,
regional, and national economic developments.
Technical Assistance and Training: IMF offers technical assistance
and training to help member countries strengthen their capacity to
design and implement effective policies. Technical assistance is offered in
several areas, including fiscal policy, monetary and exchange rate
policies, banking and financial system supervision and regulation, and
IMF Lending: In the event that member countries experience difficulties
financing their balance of payments, the IMF is also a fund that can be
tapped to facilitate recovery.
Special Drawing Rights (SDR)
The Special Drawing Right (SDR) is an interest-bearing international
reserve asset created by the IMF in 1969 to supplement other reserve
assets of member countries.
The SDR is based on a basket of international currencies comprising the
U.S. dollar, Japanese yen, euro, pound sterling and Chinese Renminbi.
Supplements members’ existing reserve assets – gold,
Weights assigned show relative importance.
US – 0.557; EURO-0.426; YEN – 21.0; POUND- 0.0984
The IMF's resources come mainly from the money that countries pay as their capital
subscription when they become members. Quotas broadly reflect the size of each
member's economy: the larger a country's economy in terms of output and the larger and
more variable its trade, the larger its quota tends to be. They also help determine how
much countries can borrow from the IMF and their share in allocations of special
drawing rights or SDRs (the reserve currency created by the IMF in 1969).
The IMF holds a relatively large amount of gold among its assets, for reasons of
financial soundness, also to meet unforeseen contingencies.
The IMF holds 103.4 million ounces (3,217 metric tons) of gold, worth about $83 billion
as of end-August 2009, making it the third-largest official holder of gold in the world.
A member's quota subscription determines the maximum amount of
financial resources the member is obliged to provide to the IMF.
A member must pay its subscription in full upon joining the IMF: up to 25
percent must be paid in the IMF's own currency, called Special Drawing
Rights (SDRs) or widely accepted currencies (such as the dollar, the euro,
the yen, or pound sterling), while the rest is paid in the member's own
Voting power. The quota largely determines a member's voting power in
IMF decisions. Each IMF member has 250 basic votes plus one additional
vote for each SDR 100,000 of quota.
Access to financing. The amount of financing a member can obtain from
the IMF (its access limit) is based on its quota. Under Stand-By and Extended
Arrangements, which are types of loans, a member can borrow up to 200
percent of its quota annually and 600 percent cumulatively.
IMF lends to its member countries,
ensuring that, members are pursuing
policies that will improve external
Commitment to implement
To repay in a timely manner.
|
<urn:uuid:b49db238-e170-4020-a1b2-0004bf1726c1>
|
CC-MAIN-2023-23
|
https://fr.slideshare.net/GeorgeKabongah2/class-presentation-on-managing-the-global-economy-since-world-war-iipptx
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653631.71/warc/CC-MAIN-20230607074914-20230607104914-00408.warc.gz
|
en
| 0.919135 | 2,295 | 3.21875 | 3 |
Painting is defined as the process of using paint. Painting is a way of expressing the emotions and ideas of the artist with the creation of aesthetic qualities in a two-dimensional virtual language.
Color, tones, shapes, and texture are the elements of this language, and they are used in various ways to produce sensational space volume, movement, and light on a surface. Therefore, these elements represent supernatural or real phenomena and create a wholly abstract visual relationship.
When painting, the artist is the one who chooses the medium and the form to use.
How to Paint Clouds in Oil: 15 Steps to Follow
Do you have your tools with you? Then let’s get to work!
1. Immerse the Whole Paper
Have you ever done a painting before and noticed that the paper started bending, making your clean work messy? This step’s purpose is to prevent this. A bigger brush is preferred as it evenly distributes water all over the paper.
On top of that, soaking the paper prevents warping while making the paint wet and activated for longer, which is more workable.
2. Setting Up the Sky Gradient
Make this layer thick enough to produce a high-quality image or portrait. Different people have different preferences on their best color choice. The idea you have in mind is what will determine these colors.
A thick layer of the sky gradient also interacts well with the clouds’ color.
3. Gradient Painting
The trick of painting lies in direction. You can start painting from the top to the bottom as you move horizontally. Use a shade of blue on top of the layer with a base sky color. These two mixtures will give you the gradient.
It is important to note that when you start painting, you are required to avoid reloading your brush.
4. Forming of the Clouds
After forming the gradient, you can now start painting the clouds. Apply a white paint layer over the blue painted sky to form the clouds, which requires large amounts of paint and oil.
This process enables the paint to mix naturally to create smooth edges of the clouds. Cloud formation should be done while the paint of the gradient is still wet to produce quality images of the clouds.
5. Painting of the Shadows
Shadows are often created when the clouds are blocking the sunlight. When forming shadows of the clouds, you must create a darker mixture to produce the shadows.
When creating the shadows, one has to consider the bounce light that may appear. Whatever direction it comes from makes the clouds feel fluffy and lighter.
6. Painting Small Shapes Inside the Clouds
When you reach this step, you can include small shapes inside the clouds. Ensure you use paint that will produce quality edges. The paint should not be hard or soft as the layout before because, at this time, some of the paint had already evaporated.
7. Softening the Edges
There are different types of clouds, and their shapes vary. You will have achieved the correct shapes of the clouds you intended to include in your painting at the end of this stage. Always use a soft but dry brush to soften the edges.
Why the edges? They create the difference in the clouds. Drag the brush over the edges to give them a smooth finish. This technique is mainly useful as it makes all the form shadows and lost edges look distinct.
8. Give the Composition a Context
This painting will not be complete with only the clouds in the picture. As of now, you probably feel like something is missing in the painting. The surroundings of the clouds greatly influence the clouds.
Your clouds need to interact with all the things surrounding them. When painting, artists often forget to deal with isolated objects. You should provide your clouds with an interactive environment and context during this step.
For example, when a cloud casts its shadow on a mountain, it gives a precise location in the universe. When clouds are reflected on the sea, we get the water body picture.
9. Painting Mountain View Shadows
Here you are required to form a gradient of the mountain. The quality of the gradient explains where the cloud casting the shadow is. The quality I am referring to here is soft.
Using soft quality enables viewers to vividly see the distance of the shadow from the object as the shadow is soft-edged. Painting the shadows requires using a dry, soft brush that will help extend the gradient’s length.
10. Detailing the Mountain
You have achieved the second goal of giving the context of the cloud. Detail the mountains, and drag the mountain’s shadow towards the light. Wet paint enables a moderately soft result.
11. Lake Painting
At this point, you are required to form a water body – a lake, to be precise. Highlight the idea of water movement by painting a lighter gradient close to the mountain and making it darker as it moves towards the end of the page.
12. Detail the Art
You do not want your piece to appear basic and predictable. Add relevant painting to make your art more creative and interesting to look at.
13. Wet the Paint Again
By this time, your painting is probably getting dry. Wet your painting again for the effectiveness of the coming step, which is more like revision. It is a delicate step since you do not want to destroy your painting.
You do not need to worry because I have something to help you. Pick your brush, let it have very little water, and quickly sweep it through the art. Make sure you do it lightly.
14. Making Final Touches to the Artwork
Here is a technique that you probably did not know about. At this stage, you can add more water. As risky as this sounds, it is the best decision you will make as a painter as your painting will not be left dry.
15. Framing Your Artwork
When the art is finally completely done, you can choose to frame your art behind a glass frame to avoid accidental moisturizing. Besides framing in glass, wax sealant can keep it safe and clean.
Painting can be categorized as a hobby. Your self-esteem incredibly grows as you see the beautiful fruits of your hobby. Paintings also increase cultural appreciation and help learn history. Have fun!
|
<urn:uuid:8be18e33-0fe8-464c-ba7c-73c46d1961ce>
|
CC-MAIN-2023-40
|
https://mybrushlife.com/how-to-paint-clouds-in-oil/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510214.81/warc/CC-MAIN-20230926143354-20230926173354-00524.warc.gz
|
en
| 0.931036 | 1,289 | 3.109375 | 3 |
Dementia in American Indian and Alaska Native Communities
$5.00 | CE Hours:1.00 | Intermediate
CE Course Description
American Indian and Alaska Native (AI/AN) health leaders and tribal leaders are concerned about the growing problem of dementia, a health condition that has a heavy impact on families and communities. This CE course offers eight public health strategies that are designed to be adapted to a wide array of local priorities for AI/AN leaders to consider as part of a broad response to dementia. Examples of Native leaders and community partners leveraging local strengths and resources within their tribal communities to address dementia in Indian Country are also highlighted.
Author: Alzheimer’s Association and Centers for Disease Control and Prevention. Healthy Brain Initiative, Road Map for Indian Country. (2019, May). Chicago, IL: Alzheimer’s Association.
References / Contributions by:
Alzheimer’s Association and Centers for Disease Control and Prevention. (2018). Healthy Brain Initiative, State and Local Public Health Partnerships to Address Dementia: The 2018-2023 Road Map. Chicago, IL: Alzheimer’s Association.
Matthews K, Xu W, Gaglioti A, Holt J, Croft J, Mack D, McGuire L. (2019). Racial and ethnic estimates of Alzheimer’s disease and related dementias in the United States (2015-2060) in adults aged ≥65 years. Alzheimer’s Dement. 15(1),17-24.
Jernigan M, Buchwald D, Loop K, Boyd A, Domoto-Reilly K. (2018, Nov). Indigenous Aging: Advancing a community-based model to address dementia in tribal clinics. Presentation 4006.0 at APHA’s 2018 Annual Meeting and Expo, San Diego, CA.
Retrieved from: https://www.cdc.gov/aging/healthybrain/roadmap.htm
CE Course Objectives
1. Describe what the success of education, health services, and other community interventions relies on.
2. Determine the most common cause of dementia.
3. List four protective factors that may reduce the risk of cognitive decline.
4. Recognize one of the earliest signs of Alzheimer’s or another dementia.
CE Outline with Main Points
1. Introduction to Alzheimer’s and Other Dementias
2. The Challenge of Dementia in Indian Country
3. Opportunities for Public Health Strategies to Prepare Communities
4. Themes Shaping the Road Map
5. Opportunities for Community Action
6. Communities in Action
Social Work Approval
Social Work CE Credit for this course is offered with the following approvals. Many state boards of social work will accept the approvals listed. Provider Approvals by state and license type can be found here.
- Quantum Units Education is approved by the California Association of Marriage and Family Therapists, CAMFT Provider #89970, to sponsor continuing education for LMFTs, LCSWs, LPCCs, and/or LEP. Quantum Units Education maintains responsibility for this program/course and its content.
- Florida board for Social Workers CE Provider #50-8650 (Quantum 'immediately' reports CE Credits to Florida licensees)
- Illinois Department of Professional Regulation, License No. 159.001261 approved CE Sponsor
- Ohio CSWMFTB #RCST091701 approved CE Provider
- Texas Board of SWE #5070 approved CE Provider
- ACE credit is offered for this course for social workers (followed by ACE approval statement that is currently on every ACE course page) Quantum Units Education, #1289, is approved to offer social work continuing education by the Association of Social Work Boards (ASWB) Approved Continuing Education (ACE) program. Organizations, not individual courses, are approved as ACE providers. State and provincial regulatory boards have the final authority to determine whether an individual course may be accepted for continuing education credit. Quantum Units Education maintains responsibility for this course. ACE provider approval period: 01/03/2020 – 01/03/2023.
To see other approvals in your state, see our state by state provider approval listings here.
Course Development: Each course is identified and reviewed by the appropriate Quantum Units Education consultant with professional and licensed expertise in the various disciplines we serve. Our professional consultants oversee course development to satisfy the needs of various professionals based on their board requirements, rate course degrees of difficulty and ensure the course content and exam questions are appropriate, relevant and comprehensive. See our professional staff and their bios here.
Added On: 2019-11-18
|
<urn:uuid:74688943-c3ea-4b17-a5c8-04b9921be59a>
|
CC-MAIN-2020-16
|
https://www.quantumunitsed.com/online-ceus/mental-health-ces/dementia-ai-an-ceu.php
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371821680.80/warc/CC-MAIN-20200408170717-20200408201217-00126.warc.gz
|
en
| 0.882729 | 954 | 3.140625 | 3 |
Der Zeichenlehrer: oder Das Männchen aus dem Wald (German Edition)
It must be clearly distinguished from the more guttural ach-Laut. The two ch sounds can alternate within variations of the same word when it is inflected, e. Compare sechs 6 with sechzehn 16 and sechzig 60 where ch is pronunced as in Blech above. The diminutive ending -chen is also pronounced with this soft variant of ch. At the end of a word as in Glied, Gold and Hand a d is always devoiced, i. At the end of a word as in Tag, Teig and Zug a g is always devoiced, i.
However, the ending -ig is pronounced like German ich, e. After a vowel it is not pronounced but simply serves to show that the vowel is long, e. Floh, Sometimes this h is superfluous to pronunciation but spelling requires it, e. Jahr, jeder, Joch. Katze, Klasse, kommen. Penner, Lippe, kaputt. At the beginning of a word, where it is rare, it is lightly aspirated, as in English. Pfeffer, Tropfen, Kopf see pf under 1. Photograph, Philosophie. Either way r must be trilled, which usually means most English speakers have trouble with this sound, e.
After a vowel an r is vocalized, i. Schuster shoos-tuh. Schule, fischen, Tisch. Gast, gestern, bist. Tag, rot, bitte. At the beginning of a word it is aspirated, as in English. Nation, national. Deutsch, It only occurs at the beginning in foreign words, e. Vater, von, Volk. At the beginning of loanwords v is pronounced as in English, e.
Vase, Veteran, Video, Violine. Wasser, wir, Wurm. Glotze, Platz, Spritze. Bezug, empfehlen, entkommen, erreichen, gestehen, Verkauf, zerbrechen.
- Tickets for trade visitors;
- The Modern Moves West: California Artists and Democratic Culture in the Twentieth Century (The Arts and Intellectual Life in Modern America).
Some additional verbal prefixes are not stressed, e. Many foreign loanwords, usually of French origin, stress the final syllable as in the source language, e.
Loanwords ending in e stress the second last syllable, e. Forelle, Garage, Kassette, Kusine.
Hall plan & fair grounds
Verbs ending in -ieren, mostly derived from French, are also stressed on the second last syllable, e. Stress Some of these variations are considered standard, not dialect; only these variants are dealt with here. In the north of Germany many long vowels in closed syllables i. Glas, Tag, Zug. In the north of Germany final g is pronounced like German ch both ich- and ach-Laut, depending on the preceding sound , e.
Tag, Teig, Weg, zog, Zug. Zeitung, Rechnung. Pfeffer, Pfund. If you are having trouble pronouncing pf in such words, simply say Feffer and Fund and no one will even notice you are not saying pf. In the south of Germany and in Austria k, p and t are commonly pronounced in a way that makes them barely distinguishable from g, b and d respectively, e.
There are very few exceptions to this, and they are dealt with here. In a minority of words a, e and o are doubled to show they are long, e. Saal, Beet, Boot. Otherwise a single consonant following a, e and o usually indicates that those vowels are long, e. Tag, Gen, Kot, Vater, beten, boten. Conversely, a short vowel is usually followed by two or more consonants, which may be the same or different, e. It appears in printed matter as two dots over the vowel, but in handwriting is best written as two short strokes, not dots. Umlauts are only possible on the vowels a, o, u and the diphthong au, which are all vowel sounds pronounced in the back of the Chapter 2 Spelling This is best illustrated by comparing the singular with the plural of certain nouns, e.
In the examples given, the change in vowel also causes a change in pronunciation of the ch from the hard to the soft variant. Bruder, Mutter, Sofa. Adjectives of nationality are not capitalized, but nouns are, e. There is no limit to how long such compounds can be in German, e.
- Application, Exhibitors Services, and Facts on the Sports Trade Fair – Everything You Need to Know!
- Fendt News App;
- OutDoor by ISPO: Hall plan & fair grounds - jiwopumo.tk.
- Accreditation, press releases and other services.
Gerichtsberichterstatter legal correspondent, lit. When a hyphen is used, as in an Sonn- und Feiertagen on Sundays and holidays and auf- und zumachen to open and shut , it is understood that The reform, called die Rechtschreibreform, has aroused a great deal of controversy. Although all government agencies, schools and publishers adhere to the new recommendations, many individuals refuse to do so, and of course anything published prior to is in the old spelling.
The differences are, however, minimal. The only other important spelling change relates to the use of capital letters where a certain inconsistency had evolved. It was decided that any word that can possibly be perceived as a noun should be capitalized, something which had previously been somewhat inconsistent, e.
The other changes are so trivial as not to warrant mention here, but if at times you see inconsistencies in spelling e. Just take note whether your dictionary, any other textbook you are consulting or book you are reading was printed pre or post This book does of course observe the new spelling. The new spelling This is more usual than kah, ah-Umlaut, em, peh, ef, teh, which is however also possible.
Letters of the alphabet are neuter, e. It is only the comma which is used somewhat differently but a couple of other punctuation marks can differ slightly from English usage too. Only those punctuation conventions that differ from English are described here. In German you must always insert a comma between an independent and a dependent clause, however short they are, e.
Er wusste, dass ich es war. He knew that it was me. When joining two independent main clauses by means of a coordinating conjunction, a comma must be inserted between the two if the second clause has its own subject, e. Chapter 3 Punctuation The post spelling rules have introduced two small changes here. Just with the coordinating conjunctions oder or and und and a comma has been made optional even if the subject is mentioned see Meine Festplatte funktioniert nicht mehr richtig , und ich muss sie reparieren lassen.
My hard disk is no longer working properly and I have to get it repaired. The other small change since is that a comma is now also optional before an infinitive clause see Er hat probiert , ihr zu helfen. He tried to help her. No comma was ever required when the infinitive clause was not expanded beyond zu plus an infinitive, e. Er hat probiert zu helfen. He tried to help. When a subordinate clause precedes a main clause in a complex sentence, the comma is an indispensable reading tool to indicate which verb belongs to which clause, e. If he had helped me back then, I would have helped him with moving house yesterday.
But even when the order of the clauses is reversed, a comma must of course be used, e. I would have helped him with moving house yesterday, if he had helped me back then. This is definitely not the case in German. Der Kuli, mit dem ich den Scheck unterschreiben wollte, war leer. Um Gottes Willen! It is also used after imperatives in German, although you may find some inconsistency in use here, e. Setz dich! Sit down. Come over to us after dinner if you feel like it. Traditionally an exclamation mark was used at the beginning of a letter after the name of the addressee, and the first word in the next line was capitalized, as were all familiar pronominal forms i.
Du, Dich, Dir, Dein , e. Lieber Franz!
Μουδιασμα δεξιου χεριου ποδιου
Ich habe Deinen Brief vom Dear Franz, Thank you very much for your letter of the 11th of March. These days a comma has replaced the exclamation mark but the first word of the next line is not capitalized as in English, because the first word in the letter is regarded as the beginning of the sentence, and all forms related to du are written with small letters when not at the beginning of a sentence, e.
Lieber Franz, ich habe deinen Brief vom Inflections are grammatical endings. The plural endings of nouns books, children, oxen and the endings of the various persons of the verb I go, he goes are examples of inflectional endings that both English and German share. Case is another form of inflection.
At its simplest level case is the distinction between the subject the nominative case , the direct object the accusative case and the indirect object the dative case, i. Der Vater hat seiner Tochter eine Email geschickt. The father nom.
This sentence shows case being applied to nouns, der, seiner and eine being the indicators not only of the gender of their respective nouns, but also of their case, something which English can only indicate with word order. But look at this variant: Seiner Tochter hat der Vater eine Email geschickt.
This sentence means the same as the former although the connotation is different, i. The forms seiner and der clearly indicate who is doing the sending the subject or nominative and who the email is being sent to the indirect object or dative. One advantage of case, as this simple example illustrates, is that it can give the speaker a greater choice of word order. English has only preserved separate case forms in its pronouns, i. Chapter 4 Case I visited him acc. Who lives here? Wer wohnt hier?
- La voz pública de las mujeres: Contra la (Spanish Edition);
- Measurement With Persons: Theory, Methods, and Implementation Areas (Scientific Psychology Series).
- Sing Like a Pro: Proven Ways and Techniques of Vastly Improving Your Singing Skills.
- Dinosaurs of the Jurassic Period (Photo & Fact Picture Book for Children 1).
- TWO LAIRDS ONE LADY.
Who m did you visit in Berlin? Wen hast du in Berlin besucht? Who did you give the cheque to? Wem hast du den Scheck gegeben? But the point is that these distinctions are still very much alive and kicking in German and contribute to what English speakers find difficult about learning German. But once you have got your mind around the concept of case, it is extremely logical and getting it right is one of the great satisfactions of learning German. Adjectives take case endings, and verbs and prepositions can require that the pronouns and nouns that follow them take either the accusative, dative or genitive case, e.
Unser alter nom. Nachbar hat einen sehr netten acc. Our elderly neighbour has a very nice son. Er hat mir geholfen. The verb helfen takes a dative object. He helped me. These few cases need to be noted. Ein toller Film, nicht? If an isolated noun is in fact the object of an otherwise unuttered sentence, as in abbreviated answers to questions, the accusative or dative may be required, e. A:Was liest du? B: Einen Roman. A:What are you reading. B:A novel. A:Wem hast du das Geld gegeben? B: Dem Sohn. A:Who did you give the money to?
B:The son. Different industries meet, discuss and learn from each other. The trade fair visitors will have a unique experience. Just a stones throw away you will not only find the camping area, but also the new and modern north conference center as well as plenty of parking places. To relax in between trade fair events, you will find a green atrium in the center of the exhibition hall.
Just a walk away you will find Riemer Park which boasts hectares of space and a lake. About Us. About ISPO. More About Us. Partners Contact. Exhibitor Directory. Event program. Directions, Accomodation, Visas. The Concept. For trade visitors. Tickets Opening hours Plans of grounds and halls Download whitepaper App. For Retailer. Advantages for retailer. For exhibitors. All pages at a glance. For Journalists. OutDays for consumers. This is, why the ISPO Digitize Summit makes no distinction between representatives of traditional media and verified professional bloggers.
In concrete terms: bloggers can be accredited as reporters at the ISPO Digitize Summit if the blog is not older than six months. We are also pleased to accredit, after thorough review, influencers who may not have a blog, but manage a social-media-channel Youtube, Facebook, Instagram. The channel must prove a current sports focus or must be related to digital sports topics. Furthermore, it has to have an appropriate social media coverage. Online Accreditation. You have the possibility to accredit yourself in advance to the summit.
Please have a proof of your work as a journalist as pdf- or jpg-file max. Please remember to submit valid credentials verifying your status as a journalist. If you have any questions or if you need any information, please feel free to contact us! About Us. About ISPO. More About Us.
Partners Contact. Exhibitor Directory. Event program. Directions, Accomodation, Visas. The Concept. For trade visitors. Tickets Opening hours Plans of grounds and halls Download whitepaper App. For Retailer. Advantages for retailer. For exhibitors. All pages at a glance.
|
<urn:uuid:b23b9b5f-bc43-4e27-8d3e-3f67bacb1acc>
|
CC-MAIN-2020-16
|
http://jiwopumo.tk/personal/der-zeichenlehrer-oder-das-maennchen-aus-dem-wald-german-edition.php
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370506477.26/warc/CC-MAIN-20200401223807-20200402013807-00208.warc.gz
|
en
| 0.901396 | 3,142 | 2.8125 | 3 |
The object of the Monitor is to injure no man, but to bless all mankind.
—Mary Baker Eddy, The First Church of Christ, Scientist, and Miscellany, p. 353
The Christian Science Monitor
THIS WEEK marks the first 100 years The Christian Science Monitor has been fulfilling its mission "to spread undivided the Science that operates unspent" (The First Church of Christ, Scientist, and Miscellany, p. 353). But did the Monitor really begin with its first issue on November 25, 1908? No. It was a concept—an idea—that Mary Baker Eddy, the newspaper's founder, had nurtured in her heart for at least 30 years! And the Monitor is an idea that continues to live in the hearts of its readers, editors, and publishers today.
The first time this idea of a newspaper published by Christian Scientists bubbled up publicly was probably in the 1878 edition of Science and Health with Key to the Scriptures, Mrs. Eddy's revolutionary book on Christian Science healing and theology. "We have not a newspaper at our command through which to right the wrongs and answer the untruths, we have not a pulpit from which to explain how Christianity heals the sick," she wrote, "but if we had either of these, the slanderer and the physician would have less to do, and we should have more" (p. 166). The following year, Mrs. Eddy addressed the need for a "pulpit"—she founded the Church of Christ, Scientist. But the newspaper had to wait.
When Mrs. Eddy launched the Church's first magazine in 1883, the monthly Christian Science Journal, she again cited the need for a newspaper that didn't frighten its readers with descriptions of disease. "An organ from the Christian Scientists has become a necessity," she asserted. "After looking over the newspapers of the day, very naturally comes the reflection that it is dangerous to live, so loaded seems the very air with disease. These descriptions carry fears to many minds, to be depicted in some future time upon the body." The Journal's purpose was to "counteract" this imposition on public thought. But it did this as a metaphysical magazine, not a traditional newspaper. It was packed with articles and healing accounts that "put on record the divine Science of Truth" (The First Church of Christ, Scientist, and Miscellany, p. 353).
Still, the idea of a newspaper persisted with Mary Baker Eddy. On August 20, 1898, she wrote to William McKenzie, Chairman of The Christian Science Publishing Society's Board of Trustees: "The dignity of our cause and the good of the students demand of us to publish a weekly newspaper" (L04871B, August 20, 1898, The Mary Baker Eddy Collection, The Mary Baker Eddy Library). And the Trustees responded with the first issue of The Christian Science Weekly (later named the Christian Science Sentinel) in less than two weeks!
The new weekly was, again, a metaphysical magazine, "intended to hold guard over Truth, Life, and Love" (The First Church of Christ, Scientist, and Miscellany, p. 353). But there was something different. Each issue led with a "Current Events" column, featuring snippets on everything from the return of troops from the Spanish-American War to new trolley lines in rural America. Why secular news? So Christian Scientists could be "fairly well informed as to the more important facts of general interest," the "Salutatory" explained (The Christian Science Weekly, September 1, 1898).
It was another decade before the newspaper Mrs. Eddy envisioned became a reality. For her, it was a decade of cross-bearing—with a lawsuit by a former student, a public attack by Mark Twain, the "Next Friends" competency suit, and unrelenting persecution from The New York World and other media known for attack-dog journalism.
But there were also triumphs. Mrs. Eddy founded the German Der Herold der Christian Science in 1903, "to proclaim the universal activity and availability of Truth" (The First Church of Christ, Scientist, and Miscellany, p. 353). And she won the court cases.
Finally, in 1908, the newspaper concept she'd treasured so long took shape. The Christian Science Monitor was, in McKenzie's words, "our Leader's gentle reply to persecution" from the press (McKenzie to Christian Science Board of Directors, January 25, 1932, The Mary Baker Eddy Collection).
Her request to the Christian Science Board of Directors on July 28 "to start a daily newspaper called Christian Science Monitor" came like a lightning bolt (L00596, The Mary Baker Eddy Collection). "Let there be no delay," she instructed the Trustees along the same lines. "The Cause demands that it be issued now" (L07268, August 8, 1908, The Mary Baker Eddy Collection).
For Mrs. Eddy, the Monitor shone as a spiritual idea. John Flinn, the first editorial writer, wrote, "... The Christian Science Monitor ... was purely a spiritual concept of Mary Baker Eddy" (December 21, 1926, The Mary Baker Eddy Collection). Delegating to others the business plans, formats, and staffing for the new daily, she focused on laying the spiritual foundation for the first Monitor, which was assembled in a whirlwind four months. This foundation included the key elements that still underpin The Christian Science Monitor—and impel forward the idea it represents—in the 21st century.
A CHRISTIAN SCIENCE PERSPECTIVE
In 1908, Mary Baker Eddy was as emphatic as she had been a quarter-century earlier that her newspaper should be "edited and published by the Christian Scientists." Those chiefly responsible for setting the paper's vision, and implementing it, should represent the Christian Science point of view. They should see the Monitor as part of the unified Church publication system Mrs. Eddy had founded for the salvation of humanity—including the Journal, the Sentinel, the Quarterly Bible Lessons, the Herold. And they should share the fundamental conviction that God's law of good must ultimately triumph over evil, disease, disaster, materiality.
Does this mean Monitor writers preach and moralize about the news—or infuse their reporting with Christian Science metaphysics? No. It simply means that they report the real news of the day—however sobering—with hope, clarity, idealism, even-handedness, spiritual insight, and compassion. And they seek solutions. Only one daily article offers an overtly "Christian Science" inspirational message—and is clearly identified as such.
But Mrs. Eddy was adamant about the name for the paper: The Christian Science Monitor. Some Church officials, including Editor in Chief Archibald McLellan, argued with her right up to the day before publication that the words Christian Science should be dropped. Eventually he conceded: "It is no use. The name will have to be The Christian Science Monitor and none else" (Irving Tomlinson Reminiscence, The Mary Baker Eddy Collection).
And Mrs. Eddy expected faithful Christian Scientists to support the Monitor. "My desire is that every Christian Scientist, and as many others as possible, subscribe for and read our daily newspaper" (Christian Science Sentinel, November 21, 1908). For her, there was a natural synergy between studying Christian Science and applying its theology to world events. After all, it's the Science, along with the demonstration of the Science, that promotes spiritual growth—and healing solutions in individual lives as well as in the world. She wrote an avid Monitor reader: "Stick to your text, and you will stick to your newspaper, and text and paper will carry you onward and upward" (Christian Science Sentinel, December 11, 1909).
Current Managing Publisher Jonathan Wells agrees. "An ongoing, daily relationship with the Monitor is a real opportunity," he says. "It not only provides focus for our prayers, making us better healers, but it also illumines progress and achievement in the world, giving us a reason for hope, and evidence that our prayers have impact."
'TO SPREAD UNDIVIDED THE SCIENCE THAT OPERATES UNSPENT'
These words by Mrs. Eddy in the Monitor's first editorial, suggest the universality of its mission. For one thing, she expected the Christianly Scientific standpoint of the paper to be a leavening influence in the world of journalism. McLellan pointed out, however, that this "reform in journalism" depended not just on the Monitor, but on the Christian Scientists reading it. Only if they supported the paper—with prayer and subscriptions—would its "success" as the "ideal newspaper" be assured (Christian Science Sentinel, October 17, 1908).
There was a larger sense, too, in which the Monitor was to "spread undivided the Science." Both its subject matter and its audience were to be global, not just Boston- or US-based. McLellan's staff was global, and the Monitor today continues to maintain bureaus around the world. Also, from early on, subscribers have naturally included an international audience, and people from all age groups. Above all, Mrs. Eddy wanted the Monitor to "reach the homes of the people," including children.
Christian Science Publishing Society Trustee Chair Judy Wolff says this about the current Monitor reach: "This amazing mission is deeply appreciated and sorely needed today. It cuts across religious, cultural, and national conditions, touching the hearts and minds of many thoughtful readers." In fact, for the year ending August 2008, the Internet audience on csmonitor.com alone has averaged 1.8 million unique visitors per month (as measured by Omniture HBX)—the largest audience in the history of the publication.
'TO INJURE NO MAN, BUT TO BLESS ALL MANKIND'
These words, which Mrs. Eddy used to describe the "object" of the Monitor, spell "healing"—the simple Christian act of blessing humanity, including one's enemies, with pure love (The Christian Science Monitor, November 25, 1908). They highlight the Monitor's purpose to alleviate sin, sickness, and even death by confronting them with the God-derived qualities of mercy, truth-telling, invincible hope, fearless solution-finding. These are qualities that the Monitor nurtures in its readers, too—qualities that bring comfort, reconciliation, and healing. Qualities that propel humanity forward.
The Monitor also blesses humankind by celebrating its triumphs—its successes in everything from peace-negotiating to weed-pulling, from the sublime to serendipity (check out the Monitor's "Backstory"!). And from each disaster-recovery or environment-restoration or character-turnaround feature, you and I learn to appreciate more the advance of human progress. To expect good things to happen.
It's not surprising that the Monitor quickly became a favorite with prison officials wanting to give their inmates hope, according to McLellan. In fact, Mrs. Eddy herself donated a Monitor subscription to an inmate (see L13610, January 20, 1910, The Mary Baker Eddy Collection). And she loved the story of a man healed of consumption after learning about Christian Science through buying a Monitor at a Boston train station (William Rathvon, February 9, 1910, The Mary Baker Eddy Collection).
In 1990, after being released from prison in South Africa, Nelson Mandela, on a visit to Boston, went to see the Church that published The Christian Science Monitor, which he had read during years of imprisonment. He met one of the Readers of the Church and the Editor at that time, Richard Cattani.
Current Editor John Yemma says this about the Monitor's past century of reporting: "I sometimes think of the Monitor as Truth's outpost in the world. From its reporters and editors comes news of challenges that need the Christ thought—and evidence of the progressive uplifting of humanity. One hundred years of Monitor pages tell the story of mankind's struggles and triumphs, of freedom's march and the unfolding of scientific achievement, of the flowering of the arts and the power of the individual."
Perhaps this is what The Christian Science Monitor is demanding of all Christian Scientists at this time—that we advance enough spiritually to bear witness to the full and flexible unfoldment of the Monitor's mission.
'FIRST THE BLADE, THEN THE EAR, THEN THE FULL GRAIN IN THE EAR'
Early on, Mary Baker Eddy proposed this American Standard Bible quote from Mark 4:28 as the Monitor's motto. To her, this parable of Jesus was "prophetic" of the ultimate "prosperity" and productivity she expected the newspaper to enjoy, despite all the predictions to the contrary when she first announced she was founding a daily named The Christian Science Monitor (see L08470, March 5, 1910, The Mary Baker Eddy Collection). The Monitor, she knew, was destined to come to full fruition as naturally as seeds sprout—and eventually yield a crop of grain.
The magnitude of the start-up expenses for the Monitor did come as a "surprise" to Mrs. Eddy, and so she directed the Trustees to proceed modestly with the new Monitor project, requiring that they first pay off the debt on the newly built Publishing Society. But she was confident that the Monitor could and would, like seed, "begin in a comparatively small way and grow into bigger things with the progress of time" (L07269, August 14, 1908, The Mary Baker Eddy Collection).
Editor McLellan explained the motto this way: "It expresses the high ideal set before the staff of the Monitor by its Founder,—a lofty purpose, for whose accomplishment they are to strive; patiently and persistently tilling the soil of human thought day by day, until by and by the field shall be crowned with ripened grain, and they shall hear the 'Well done, good and faithful servant'" (McLellan, October 1910, The Mary Baker Eddy Collection).
Today, this motto promises continually unfolding progress for the Monitor as an idea in Mind. "Spiritual ideas unfold as we advance," Mrs. Eddy wrote in Science and Health (p. 361). As you and I advance in our practice of Christian Science, therefore, the idea of the Monitor will develop in our experience as surely as it did in Mary Baker Eddy's experience. Perhaps this is what The Christian Science Monitor is demanding of all Christian Scientists at this time—that we advance enough spiritually to bear witness to the full and flexible unfoldment of the Monitor's mission. This spiritual advancement on our part may actually be the best way to keep the Monitor "abreast of the times," as Mary Baker Eddy required of all the periodicals she founded (Church Manual, Art. VIII, Sect. 14). And our collective spiritual progress, in turn, will do so much to advance humanity—to truly "spread undivided the Science which operates unspent."
FOR MORE ON THIS TOPIC
To hear Mary Trammell and John Yemma speak on this topic, tune in to Sentinel Radio during the week of November 22–28, 2008.
For a listing of broadcast locations and times, go to www.sentinelradio.com. To purchase a download of this radio program, #847, go to www.sentinelradio.com and click on Audio Download Store.
Access more great content like this
Welcome to JSH-Online, the home of the digital editions of The Christian Science Journal, Sentinel, and Herald. We hope you enjoy the content that has been shared with you. To learn more about JSH-Online visit our Learn More page or Subscribe to receive full access to the entire archive of these periodicals, and to new text and audio content added daily.
|
<urn:uuid:5390ce03-5ea3-4ac5-9eb0-630e8ccd2913>
|
CC-MAIN-2020-34
|
https://sentinel.christianscience.com/shared/view/280s8e5hzqm?s=e
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738723.55/warc/CC-MAIN-20200810235513-20200811025513-00298.warc.gz
|
en
| 0.955404 | 3,279 | 2.84375 | 3 |
As energy efficiency has become an increasing concern among builders and homeowners, the attributes and performance of building materials and components are being scrutinized more closely. In order to maximize levels of efficiency by examining the details of how each individual component of a house performs on its own and as part of a dynamic system, very specific properties are measured and taken into account. This can be especially helpful when trying to select the best building materials for a given application. R-value is the measurement used when quantifying a specific material’s level of thermal resistance, which is the inverse of U-value, which measures thermal conductance. R-value is often the standard consideration when discussing the effectiveness of insulation. Inspectors may want to be familiar with the specifics of R-value ratings, especially when inspecting insulation and if they also perform energy audits.
How Does R-Value Relate to Insulation?
Heating and cooling costs account for 50% to 70% of energy used in an average U.S. home. Inadequate insulation can account for a lot of wasted energy, so it is important to be sure that insulation installed is doing its job properly. The function of insulation is to provide resistance to the flow of heat, and R-value is the measure of exactly this attribute for a given material. A higher R-value equates to higher resistance to heat flow and greater effectiveness in insulating. An insulation material’s R-value, in conjunction with how and where it is installed, will determine its overall thermal resistance and effectiveness. Adding the R-values of each layer of material contained in one building component, such as a wall or ceiling with multiple layers of insulation, will help determine the thermal resistance of the whole component. The way the insulation is installed, as well as other factors, will also affect its thermal resistance.
Important Factors to Consider When Measuring Thermal Resistance
When considering R-value as a means to determine the thermal resistance of a building component, there are other factors that must also be taken into account. While R-values are an excellent guide for comparing the attributes of different insulation products, they apply only when the insulation is properly installed. For example, if two layers of insulation are smashed into the thickness intended for one layer, the R-value does not double. Likewise, if a single layer of insulation is compressed during installation, it will not be as effective. Stuffing batt insulation sized for 5 inches into a 4-inch wall cavity will actually lower its R-value. Ensuring that insulation is correctly installed will help allow the product’s full benefits to be realized.
Also important to consider is the fact that even when installed correctly, insulation affects heat transfer through the insulation itself but not through other materials, such as glass windows and studs. If there are structural gaps in any building penetrations, even insulation with a high R-value that's installed properly cannot mitigate heat loss from air leaks. Studs and windows provide a parallel heat conduction path, and insulation between studs in a wall does not restrict heat flow through the studs. This heat flow is called thermal bridging, and the overall R-value of the wall will be different from the R-value of the insulation itself.
Calculating and Converting R-Value
The equation used to calculate R-value may be of interest to some inspectors because if the R-value is known, the equation can also be used to help calculate heat loss. The equation for determining R-value is as follows:
R-value = temperature difference x area x time ÷ heat loss
The temperature difference is expressed in degrees Fahrenheit, the area in square feet, the time in hours, and heat loss in BTUs. Since European R-value uses different units of measure (Celsius, Kelvin, meters, etc.), it may be helpful to know how to convert a European R-value into a U.S. R-value. This is done by multiplying the European value by 0.176 and dividing 1 by the result.
The FTC and DOE on R-Value
In the 1970s, the Federal Trade Commission (FTC) created a rule requiring insulation manufacturers to disclose R-values at the point of sale and in some ads. This is intended to protect purchasers from false claims made by manufacturers and to create a standard of comparison for products.
The U.S. Department of Energy (DOE) has issued recommendations for insulation R-values in new and existing homes. The recommendations are based on a comparison of the cost for installing insulation versus potential future energy savings. Their recommendations for attics, cathedral ceilings, walls and floors are generally greater than what is actually required by most current building codes.
|
<urn:uuid:9411bb6a-44a8-49d1-84d2-6e573d8211db>
|
CC-MAIN-2020-05
|
https://www.nachi.org/insulation-r-value.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250608295.52/warc/CC-MAIN-20200123041345-20200123070345-00139.warc.gz
|
en
| 0.939447 | 960 | 3.5 | 4 |
Focuses on reading, discussion, and written analysis of novels in order to develop 1) skill in literary analysis and interpretation and 2) familiarity with the conventions of the novel. Students will read major novelists primarily from the nineteenth, twentieth, and twenty-first centuries. The titles chosen exemplify important developments and themes in prose fiction, each discussed as a statement of a particular author, a reflection of the times in which the work was written, and an enduring expression of human experience.
- Category 5: Humanities and Fine Arts
- Humanities and Fine Arts
|
<urn:uuid:0ea75b88-817c-4d2d-8579-4191d3a501ed>
|
CC-MAIN-2023-40
|
https://catalog.hfcc.edu/courses/eng-233
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510671.0/warc/CC-MAIN-20230930082033-20230930112033-00616.warc.gz
|
en
| 0.932041 | 118 | 2.546875 | 3 |
I was studying the decomposition of price effect into substitution and income effects. I am finding it a bit complicated.
This is what I have understood:
(0) Let us assume that there are two commodities. We have a budget line and an indifference map. The budget line is tangent to one of the indifference curves. This point of tangency is the initial equilibrium point.
(1) Due to the change in price of a commodity, the budget line rotates to a new position and we obtain a new equilibrium point. This change in position of the equilibrium point is known as the price effect.
(2) Due to price change, the relative price of the commodity as well as the real income of the consumer changes. Due to change in relative price of the commodity, the consumer will substitute the relatively less expensive commodity for the relatively more expensive commodity and we get a new equilibrium point. This change in equilibrium point is the substitution effect. Due to change in real income, the consumer will change his consumption of the two commodities depending on whether they are normal or inferior commodities and we get a new equilibrium point. This change in equilibrium point is the income effect. Hence we can say that the price effect is the resultant of the substitution effect and the income effect.
(3) To segregate the two effects we draw a hypothetical budget line by shifting the rotated budget line to compensate for the change in real income and the magnitude of the shift varies according to the approach of compensation followed (Hick's approach or Slutsky's approach).
(4) The budget line thus obtained as a result of rotation and shift starting from the original budget line shows the substitution effect.
(5) The remaining part shows the income effect.
(6) Thus we get the substitution effect by rotating and shifting the budget line and then the price effect can be viewed as the combination of substitution and income effects.
Have it grasped it correctly? I am finding all this a little twisted and kind of a reversed logic. First we rotate the budget line to get the price effect and then shift the budget line to obtain the substitution effect or segregate the substitution and income effects. Finally to get to the price effect, we first get to the substitution effect and then the income effect.
I do not understand the rationale behind the decomposition of price effect. Why are we decomposing the effect of a change in price of one commodity into all these effects which are (as I have understood), all hypothetical. Is there any particular advantage of this decomposition? Also I don't exactly understand the meaning of real income. Does it mean the quantity that we can buy given the income and price? If someone could explain it with an example I would be very grateful. Also in substitution effect, why do we substitute the relatively less expensive commodity for the relatively more expensive commodity? Why not the reverse? Also what is the significance of the compensated demand curve? Why do we need two demand curves.
|
<urn:uuid:f17ce10f-78c9-440a-b887-045642676db3>
|
CC-MAIN-2020-16
|
https://economics.stackexchange.com/questions/33494/reason-behind-the-decomposition-of-price-effect-into-substitution-and-income-eff
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371805747.72/warc/CC-MAIN-20200407183818-20200407214318-00361.warc.gz
|
en
| 0.928481 | 601 | 2.703125 | 3 |
E-mail is a Great Tool, but It Shouldn't be the Only Tool for Sharing Information
E-mail is a great tool but it shouldn't be the only tool to share information, especially confidential information shared beyond the corporate firewall.
16 June 2016
E-mail remains the leading information sharing application on the planet and has often been called "the killer app," defined as an application considered so necessary that it actually drives people to buy a computer or other access device. E-mail is still so essential in the business world that new hires typically have an account provisioned for them by their first day of work. E-mail is often the most frequently used application in the corporate world on mobile devices.
Even in consideration of the enormous popularity of social media today, e-mail still has more users worldwide and will continue to have more users for years to come. Data from The Radicatti Group’s Email Statistics Report, 2014 – 2018 makes this point:
|Worldwide E-mail Users (Millions)||2,504||2,586||2,672||2,760||2,849|
|Worldwide Social Networking Users (Millions)||1,202||1,319||1,443||1,573||1,709|
Email Statistics Report, 2014 – 2018, The Radicatti Group
Radicatti estimated in 2015 that somewhere around 205 billion e-mail messages are sent every day. That's 74 trillion messages a year. Of course, about 90% of those messages are thought to be viruses and spam; nevertheless, 7.4 trillion legitimate messages a year is still a huge number.
People use e-mail to share information through the messages themselves, as well as through attached files. And, people use e-mail to send every imaginable type of information, ranging from the mundane to the highly personal or highly sensitive, despite the inherent insecurity of e-mail platforms.
E-mail messages can make their way completely around the world in mere minutes, hitting numerous servers and relay stations along the way that forward the messages without delay. Senders and recipients can be on different e-mail platforms and completely different devices and messages still get through essentially in real time. That's actually quite impressive. However, as an application, e-mail is designed to deliver messages from one person to another — without regard for the security of the content.
Em-ail is convenient, easy to use and nearly ubiquitous, but is it secure?
If there's a weakness in the distributed design of e-mail applications, it's that messages can't be retracted once they are sent. Once a message arrives at a recipient's in-box, it can't be taken back. Sure, Outlook has a "recall" option but it rarely works the way you'd want it to if you really need to retract an errant message. It basically puts a notation on the message in the recipient's in-box that says you want to recall the message … but that only makes it all the more tempting for the recipient to want to see.
E-mail simply is not a secure data sharing platform — and it never was intended to be. It's possible to apply some security techniques, such as encryption of attachments, but that gets complicated and often requires add-on tools. E-mail can easily be compromised on the sender's device, on the network, on the e-mail server and on the recipient's device. One of the most common things that malware does once it gets on a network is go through e-mail systems to look for sensitive information.
E-mail messages can't be controlled once they leave the sender's account. They can be forwarded. They can be printed. They can be addressed to the wrong person or people. They will be replicated at every hop of the Internet to get from here to there, and they will get stored and backed up and replicated again for long-term storage as some companies choose to or are required to archive their e-mails for years.
Before You E-mail a Sensitive Business File, Ask Yourself These Questions
Clearly, e-mail is convenient, but it isn't always the most appropriate tool for sharing information. The lack of controls, the number of exposure points and the range of malware discussed above can lead to data breaches. Thus, anyone who is about to hit send on a message should stop and ask themselves:
- Is the information I am about to send regulated? Does it contain any personally identifiable information (PII), private health information, cardholder data information or any other sensitive information?
- Is the information I am about to send confidential to my organization? Would it cause a problem if this information were to go beyond my intended recipient?
- Is this information so sensitive that it should not be distributed in plain text? Does it need a control such as encryption to protect the information?
- Do the people listed as recipients of this message really need to have this information? Are the right recipients — and only the right recipients — showing up in the "To" or “CC” fields?
- Should I be using a more secure way to send this information that gives me more long-term control over it?
E-mail is a great tool but it shouldn't be the only tool you use to share information. All organizations have sensitive or confidential information that internal people need to share among themselves or with people outside the organization. E-mail is never the appropriate means for sharing this kind of sensitive or confidential information beyond the corporate firewall.
It's incumbent on organizations to provide both the means to securely and efficiently share information and the personnel training to ensure that their staff picks the right tool for the job. Interested in learning more? Visit our technology solutions.
Daren Glenister is the Field CTO for Intralinks. In his role, he acts as a customer advocate, working with enterprise organizations to evangelize data collaboration solutions and translate customer business challenges into product requirements, helping to steer Intralinks’ product road map and the evolving secure collaboration market. Daren brings over 20 years of industry experience and leadership in security, compliance, secure collaboration and enterprise software having worked with many of the Fortune 1000 companies helping to turn business challenges into real world solutions.
|
<urn:uuid:3b4b1acd-9adc-4aaf-8aa6-6cd4debbd096>
|
CC-MAIN-2020-05
|
https://www.intralinks.com/blog/2016/06/e-mail-great-tool-it-shouldnt-be-only-tool-sharing-information
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251689924.62/warc/CC-MAIN-20200126135207-20200126165207-00134.warc.gz
|
en
| 0.941031 | 1,287 | 2.625 | 3 |
What kind of uncertainties and problems does the digital world bring with it, where the boundaries of cyberspace and physical world are crossed and who are the actors of this virtual space? The digital world built on zeros and ones and made of the result of human imagination, doesn’t have any boundaries as the real world does. In the modern world increasing importance of the cyberspace, which is due to its penetration into more and more human vital activity areas, makes it a subject of discussions and controversies. At the same time, the characteristics of cyberspace such as its asymmetric nature, difficulties connected with the attribution, the accessibility, legal uncertainties and its role as an effective atmosphere of complaints, cybercrimes, spying and other cyber operations, makes it an attractive space for both states and nongovernmental actors.
Actors of Cyberspace
Cyberspace refers to the virtual world of computers. It’s an electronic environment which is used for forming the global network of computers to facilitate online communication. According to many IT specialists, including Redal Farmer and Chip Morningstar, people perceive the cyberspace more as an environment of social interaction rather than just a domain providing technical performance. The main feature of cyberspace is the interactive and virtual environment for a wide range of participants. It’s accessible almost to everyone who has internet access with a computer, smartphone or any other type of multimedia device that has a network connection.
In this domain many parallel-existing actors vary with their needs, aims and intentions. States, organizations and citizens are viewed as traditional actors of cyberspace. J. Sigholm distinguishes cyber-conflicts-involved 15 main non-governmental actors that differ with their motives, targets and methods of actions. These roles, however, don’t have any clear boundaries and can get changed and coincide depending on the situation. Some of them are shown below.
|Hacktivists||Political or social
|Decision makers or innocent victims||Protests through
defacements or DDoS
|Black-hat hackers||Ego, personal hostility, economical interest||Any||Malware, viruses, vulnerability exploits|
|White-hat hackers||Idealism, creativity,
|Any||Penetration testing, restoration|
|Patriot hackers||Patriotism||Enemies of their own state||DDoS attacks|
|Cyber terrorists||Political or social
|Innocent victims||Computer-based violence or destruction|
|Usage of malicious programs in fraudulent purposes, DDoS for blackmail|
|Cyber spies||Financial and
|Frame of technique
These actors often act not by their own undertakings, but by a third-side request whether it’s a state or an organization.
Virtual Domain as an Environment of Warfares
In the late 1990s, when the accessibility and usage of the Internet became a commonplace, warfares in the physical world have led to a corresponding response in cyberspace in form of cyber attacks against the state, which, first of all, were actualized by non-state actors. Hackers with nationalistic tendencies directed their cyber attacks against foreign states as a support to their governments, which was shown during the Kosovo conflict several times. For instance, a nationalist hacker group called the “Black Hand” discarded the Kosovo-Albanian website and attacked NATO, USA, UK computers. Similar hacker groups had attacked US websites from China when the Embassy of China in Belgrade had been accidentally damaged during airstrikes in May 1999.
Cyber operations and attacks, harmonious with twenty-first-century technological developments, got more improved, and started targeting governments and organizations as well as individuals. As an example the cyber attack on Estonia carried out by pro-Russian “hacktivists” in 2007 may be given, which resulted in temporary degradation or loss of service on many commercial and government servers. Russia, however, not only didn’t admit responsibility, but also didn’t respond to the Estonian-side claims for investigating and extraditing the possible offenders. In 2009, it became clear that a cyber spying operation named “GhostNet” had access to the confidential information of state and private organizations in about 130 countries. It was supposed that the software that was carried out by the servers located in island Hainan, China, has been a tool for the government of China. But as China officially denied concern with the “GhostNet” and there was no convincing proof of the Chinese government being involved in its actions, states escaped direct accusations. Another example is the Stuxnet computer worm that was uncovered in 2010. It caused about a thousand nuclear-centrifuges damage to Iran’s nuclear program, and the USA and Israel were imputed by some cyber experts. Despite many accusations directed to the involvement of the USA and Israel, neither country has openly admitted responsibility concerning the incident. In 2012 a virus called “Shamoon” damaged some 30.000 computers in Saudi Aramco and was announced as “Cutting Sword of Justice”. In 2013 a cyber attack of “Syrian Electronic Army” (SEA) resulted in shutdown of the New York Times.
Each of these cyber incidents and diversity of the other ones that have taken place and continue to happen, generate important problems concerning the role and responsibility of the state in the cyber incidents. Do states perform sovereign control towards the physical infrastructures (physically located servers and cables in states’ territories) located in their area, and if so, then do the states carry the responsibility for the cyber operations done through them?
Sovereignty of a State in the Cyberspace: Cyber Sovereignty
The role of state sovereignty is widely discussed in the frames of scientific literature, so it led to the spread of the term “cyber sovereignty”, which, however, has not been consistently defined so far. If cyber sovereignty is an incomprehensible notion in general, which is often used in the cyberspace connected with the role and independence of the state, so the sovereignty itself is a clearly defined notion in the International law. It originates from the treaty of Westphalia, in 1648, by which the state is regarded as an institution with sovereignty over its territories and internal affairs, in which other states cannot interfere. Nonetheless, the transboundary nature of the cyberspace harbors doubts about the sovereignty of the state and, so a question arises: is it allowed and can this principle of International law be used in the cyberspace?
In 2013, the United Nations Group of Governmental Experts (UN GGE) came to a conclusion that International law, including state sovereignty, is applicable in the cyberspace. It supposes that the law about armed warfare is applicable in the cyberspace, and all rights and obligations under the principle of sovereignty as well. The argument of UN GGE is based on the fact that cyberspace does not exist without physical infrastructures and that these infrastructures are subjected to the national jurisdictions of the states. However, this decision does not eliminate the problem of legal regulation of cyberspace. On one hand, cyberspace depends on physical infrastructures under territorial principles, on the other hand, cyber activity cannot be restricted within the country or connected to the territory because of the interdependence of cyberspace.
The interest in cyber sovereignty and academic debates has grown especially after the discoveries made by Snowden. Nevertheless, as of 2007, studies of national strategies for cyber security and cyber defense available in English in 69 countries showed that only 15 of the documents contained the term “sovereignty”, and only Canada uses the term “cyber sovereignty”.
Controversies over Cyber Sovereignty
Even though the UN GGE of Information Security has reached a certain level of compromises, the deep contradictions and disagreements continue to divide the international community mainly on three issues. The first is the contradictions between cyber sovereignty and the “spirit of the Internet”. The exclusivity of classical state sovereignty runs counter to the spirit of the Internet, which is based on the concept of unlimited mutuality. If it’s the cyber sovereignty that is highlighted, it can lead to each country to create its own cyberspace, which, in its turn, will lead to the fragmentation of the Internet. The second one is the contradiction between the cyber sovereignty and human rights, which can be shown with restrictions of freedom of speech on the Internet and free flow of information as well. And, finally, the third contradiction is between cyber sovereignty and the engagement of many stakeholders into the Internet governance. There’s a view that the cyber sovereignty will lead to controversies over the Internet governance model, i.e., sovereign state governance will challenge the existing universal governance model. These contradictions were also manifested in December 2012, within the framework of the World Summit of the Information Society, dedicated to international telecommunication. On one hand, the US and the business sector argued in favor of a non-state Internet governance model with strong involvement of the business sector, and on the other hand, the Russian Federation, China, Brazil, India and a number of developing countries insisted that the Internet should be managed internationally by an intergovernmental organization such as the International Telecommunication Union (ITU).
Problems of Cyberspace, Use of Force, Attribution, Cyber War
Another aspect of the International law that has been the subject of widespread debates, refers to the use of force in cyberspace and its possible consequences. It’s a concrete problem about how cyber attack can be qualified as use of force and, accordingly, whether it is considered as a violation of the sovereignty of another state. Qualifying of cyber attack as a use of force or an aggression can lead to the victim’s right to self-defense, which is considered a legitimate reason for war. It was supposed that the states could practically consider cyber attacks as acts of war, and it seems to be an agreement that a cyber attack targeting critical infrastructures of the country, may cause harms and can be imputed to the state organizations, which foresees a violation of the law on armed conflict. Although there has not been such cases to date, that cyber operations or cyber attacks led to physical injuries or long-term destruction of property, the cyber addiction of the modern world, however, makes the destructive nature of cyber attacks more probable in future scenarios.
Apart from the uncertainties surrounding the definition of cyber attack as a use of force, the issue of attribution cyber operations is one of the most important issues in the cyberspace. Attribution can be both a technical action based on technical and indirect proofs, and a political action when the state officials formally and publicly attribute the attack. Cyber attacks cannot be attributed to an obvious criminal with 100% confidence. Thus, there’s always a possibility that the accused side may not, in fact, be the real attacker. As we saw in the examples above, the uncertainties and difficulties of the attribution lead to the states not to admit responsibility for cyber operations originating from their territory, and the responsibility is a necessary precondition for the state to be able to refer to the right to self-defense.
This issue gets more complicated by the cyber operations of non-state actors. These actors bring bigger uncertainties about the attribution as the states can hire, sponsor or instruct such actors to launch a cyber attack on the other state from the territory of another state. Another issue in cyberspace is how theimpaired countries can respond to non-state actors located in another state. This issue is related to the issue of state responsibility and state control over non-state actors in cyberspace. The corresponding response often comes from non-state actors inside the attack-subjected state.
The next issue concerns the definition of cyber wars. The disagreements on cyber wars in the literature refer to the question: do cyber attacks fit the classic war concept that Clausewitz stated or not? It includes the main components of the war, i.e., violence, instrumental character, which includes the means (physical violence or threat of force) and the purpose (destruction of the enemy, coercion the winner’s will), political nature of the war. In literature, however, cyber attacks are often viewed as political crimes (sabotage, spying, destructive acts) rather than wars. At the same time, they can be used both in the ordinary war as an auxiliary part of the war and individually, so the question emerges: are cyber attacks considered to be cyber wars in a separate usage or not? Currently there’s no legal definition or of cyber war or an agreement about what is a war or act of the war in the cyberspace, and these uncertainties in the International law open a new window for the cyberspace actors.
Nonetheless, the idea of the cyber war is gradually becoming more up-to-date, and many states have their national strategies in cyber security, the ones who make up cyber war scenarios and consider the rapid development of military acts in cyberspace as one of the main priorities of the Armed Forces and scouting services. This tendency has led to cyberspace to be considered as the domain of war in the Armed Forces, beside the land, water and air. In early 2013, the US approved the plan of a long-scale expansion of its Cyber Command bringing it up to 5.000. Tendencies of such kind of cyber mobility can be seen in many countries. If developed countries may need potential protection while protecting vulnerable digital resources such as management and control systems, for developing countries cyber operations can be viewed as an attractive alternative to “wage” war against a relatively inexpensive and politically not-so-risky enemy, which has kinetic superiority on the battlefield.
Armenia, being a part of the cyber domain, doesn’t remain freehanded from the cyberspace processes, hence the challenges. Among the major cyber threats both the international cyber threats (for example, attacks by groups belonging to the Anonymous community) and the cyber attack threats from the state formations, especially from Azerbaijan (partly Turkey), and the possible attacks from non-state actors, as well, can be highlighted. In terms of vulnerability, especially the network connecting points of the non-state part differ. Taking into account the rapid growth of the cyberspace, the development of cyber defense potential, as well as the ability to respond to cyber attacks equivalently, is becoming a matter of vital importance for Armenia. This problem requires the state to update its cyber security concept regularly, continuously develop technical satiety and professional skills of the corresponding subdivisions, provide public awareness of cyber security threats, invest in area-regarding educational programs, as well as explore and localize international leading experience in the cyber security.
The term “cyberspace” is credited to William Gibson, who used it in his book, “Neuromancer”, written in 1984. A Serbian military union, established in 1901. Its activity is connected with the start of World War The term “sovereignty” is seen in the cyber security strategies of Canada, Finland, France, Hungary, Portugal, Australia, UK, Saudi Arabia, Russia, Chile, Columbia, Ghana, Japan, Nigeria.
The term “cyberspace” is credited to William Gibson, who used it in his book, “Neuromancer”, written in 1984.
A Serbian military union, established in 1901. Its activity is connected with the start of World War
The term “sovereignty” is seen in the cyber security strategies of Canada, Finland, France, Hungary, Portugal, Australia, UK, Saudi Arabia, Russia, Chile, Columbia, Ghana, Japan, Nigeria.
Author: Tatev Ghazaryan© All rights are reserved.
Translator: Christine Bdoyan
|
<urn:uuid:403267d2-ef3e-4bdc-aaf5-78d57fec750b>
|
CC-MAIN-2023-23
|
https://enlightngo.org/language/en/post/12407
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648695.4/warc/CC-MAIN-20230602140602-20230602170602-00346.warc.gz
|
en
| 0.942818 | 3,388 | 3.203125 | 3 |
Welfare reform, with the shift from AFDC to TANF, marked many changes in government assistance available for poor families. Describe the main differences between AFDC, the "old" welfare program, and TANF, the "new" welfare program. Then, use examples from American Dream to discuss whether you think welfare reform provided the resources women like Angie, Jewell and Opal need to move their families out of poverty. What were some of the barriers to mobility and/or work the women experienced? Did TANF provide resources to overcome them? Be sure to give examples and explain why.
It is very ironic that despite being the richest country in the world, the United States is still home to millions of people wallowing in abject poverty. The poverty experience however varies in many ways including family type as well as age. Families headed by females without husbands are known to present the highest rate of poverty. Additionally, among the racial and ethnic groups, Hispanics and blacks suffer particularly high rates of poverty, compared to non-Hispanic whites.
As a result of the size, cost, as well as the consequences of poverty in the society, the government and the public have significant roles in preventing the escalation of the already dire situation, in order to help out more people to become self-reliant. In this regard, the government has always come up with welfare programs like the Aid to Dependent Children (ADC) program which was later named Aid to Families with Dependent Children (AFDC) in 1950.
In the book American Dream, DeParle Jason is of the view that the AFDC was basically designed to provide cash assistance to single parents with children, more so, the sole parents with children. A poor family was mainly eligible for AFDC as a result of the absence of a father. Over the years, the out-of-wedlock births became the primary reason for single motherhood. With time, the huge increase in the number of unwed mothers as well as their children became a very significant and unexpected change among the recipients of AFDC.
In August 1996, President Bill Clinton signed the Personal Responsibility and Work Opportunity Reconciliation Act (PRWORA), which was instrumental in altering the welfare policy as well as the structure of income support for poor families in the US. Unlike AFDC, TANF imposes stringent work requirements as well as time limits for one to receive cash assistance.
While AFDC was an entitlement program that guaranteed benefits to all recipients whose income as well as resources fell below state-determined eligibility levels, DeParle asserts that TANF however requires states to determine eligibility requirements as well as benefit levels. Additionally, DeParle asserts that while AFDC was an entitlement program, TANF is not. This is due to the fact that there is categorically no requirement that states aid, or apply homogeneous rules to all families to determine those who are financially needy.
The Benefits of Welfare Reform
Many families suffering under the yoke of poverty can access a number of resources offered by TANF. In this regard, women like Angie, Jewell and Opal need to move their families out of poverty, with the help of resources from TANF. Being low income families, these women can use these resources to overcome barriers to work, ensure adequate housing, access education and training, and meet expenses like the back-to-school costs. They can also repair or even buy cars that can get them to work.
For instance, they can use the rewards as well as bonuses from TANF once they get jobs, or maintain employment. Additionally, should they enroll for training and get credentialing benchmarks, they will be in a position of accessing these bonuses, thus lift themselves out of poverty. Again, through TANF, these women can get payments to avoid utility shut-offs as well as evictions for rent arrearages.
Angie, Jewell and Opal can also receive payments or services for families who are at risk of losing their young ones as a result of neglect or abuse. This is inclusive of in-home support that is provided for families as well as out-of-home support like temporary housing, as well as other expenses. With these benefits, the three women can work their way out of the quagmire.
2) Explain how California's "three strikes" law, which requires a mandatory sentence of 25 years to life in prison if a person is found guilty of a third felony offense, fits into Western's account for why incarceration rates have increased so much since the 1970s. What are the other factors involved? Discuss three social consequences of "mass incarceration", in California, and/or in the nation at large.
The "three strikes laws" were thought to be effective in curbing recidivism, or bringing the so called "career criminals" to a stop. According to this law, whenever offenders were convicted for the third time, they would be sentenced for 25 years to life. This was irrespective of whether the third offence was just a simple one like a nonviolent crime involving shoplifting.
In his book Punishment and Inequality in America, Bruce Western asserts that the law was basically crafted in order to curb the rising rate of crime by ensuring that serious offenders were sentenced to longer periods of time. The statutes however severely limited the degree of latitude with which judges were permitted to exercise while issuing sentences.
As a matter of fact, the most contentious of this policy was adopted by the state of California in 1994. According to the state, proposition 184 was introduced, which came to be known as the "three strikes" rule. It was introduced with the intention of targeting habitual offenders. It was indicated that nearly half of the states as well as the Federal government enacted their own versions of the statute. However, Western believes that the legitimacy of the three-strike laws has over the years remained an open question.
This is due to the fact that though rate of crime decreased considerably in California, there has been a disagreement over the degree to which the three strikes laws are responsible for the decline in the rate of serious crime. Furthermore, the constitutionalities of the "three-strikes" laws were challenged in the Supreme Court in 2003. As a matter of principle as well as of practicality, the statutes have remained to be an imperative concern, especially due to the rise in incarceration rates with the tightening of state budgets each year.
Other Factors that Have Led to the Increase of Incarceration Rates in the US
According to Western, the rate of crime in any nation is mostly related to the number of incarcerations. Generally, this increase is mainly due to the high rate of crime in the United States. Another reason arises from the fact that the United States engages in very little spending on social welfare programs. In other countries like Germany and Finland where the governments spend generously on social welfare programs, they end up having low incarceration rates.
Another factor that could be leading to the rise in incarceration rate is the issue of race. In most cases, African Americans are more likely to be imprisoned in comparison to other ethnic groups. It also goes without doubt that the increase in crime is also attributed to increase in unemployment. Over the years, there has been a rise in the rate of unemployment. Additionally, the use of illegal drugs has led to the increase in the rate of incarceration.
The Social Consequences of "Mass Incarceration"
In many ways, mass incarceration has become an engine of racial inequality. As a result, it has led to some sort of disquiet among the African-American community since research indicates that mass incarceration promotes pervasive cynicism about an unfair execution of the law. This is because research indicates that 60% of black males who do not complete high school go to prison in their lifetime.
Additionally, it is believed that mass incarceration is actually a core dynamic that protracts socio-economic inequality between whites and blacks in the United States. This is mainly because it reduces the prospects of marriage of marginally-educated African-American men, while at the same time reducing their employability.
Western is also of the view that that mass incarceration is one of the many dynamics that alienates many African-American males from their neighborhoods. This leads to a big percentage of female-headed, single-parent families. In this regard, women connected to men who are imprisoned depend on friends as well as family to fill the hole left by the incarcerated husband, these lead to a straining of family ties.
|
<urn:uuid:6dff4739-7c3b-422a-82f8-ce9b19f78c9a>
|
CC-MAIN-2020-05
|
https://cheap-papers.com/essays/sociology/social-inequality.php
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250601615.66/warc/CC-MAIN-20200121044233-20200121073233-00522.warc.gz
|
en
| 0.978055 | 1,736 | 3.140625 | 3 |
Often we hear from the news or read from newspapers that registered nurses (RN) or professional registered nurses are in demand these days. When people hear about registered nurses, the first thing that comes into our minds are those nurses who records your symptoms at the hospital, or someone who gives you shots in the doctors office, but they are also adept on other things.
Becoming a supervisor is common for many registered nurses during their career. Though becoming a supervisor is not for everyone as most of these RNs
Many people think that most nurses work at the emergency room or the maternity ward, but a significant number of registered nurses work on specialized departments such as pediatrics. Some nurses work at a doctor's office or medical center and assist the doctor, but other may only work in a laboratory.
People who just got out of the hospital or just had surgery need more personal care at home so health nurses go to their homes to provide care. Personal nurses may also need to attend to patients with cancer or terminal illnesses. Through this, much attention to the patient is given and faster recovery may then be observed.
We can also find registered nurses working on a government and private organizations and institutions. They give medical assistance to the employees of the organization. Other nurses also work for companies in industries at the place of employment to give medical exams to employees.
A nurse supervisor's duty is to train new nurse professionals and
The development in technology, advancement in drug and treatments, changes in healthcare policies, insurance policies and coverage will definitely reinvent the healthcare profession including nursing in the next few years. As an example, as technology continues to advance, many healthcare functions can become automated.
These includes patients medical
Also, tasks such as serving meals or attending to patients can be taken over by trained medical aids in order to free up nurses, and they will be able to provide
These days, hospitals and healthcare institutions have to use their staff more often due to nursing shortages. Registered Nurses will be
The advancement in technology will also likely attract more males and minorities into the nursing profession. Because of this, the government would have to put an emphasis in supporting teaching careers and recruiting instructors with different cultural and educational backgrounds to give support to
As healthcare trends stand today, if the
Medical personnel who work in gerontology and geriatrics have bright futures in terms of their careers. Medical practitioners in the baby boom generation reaching retirement, new medical professionals will be required to focus more on patients in this generation group. Medical nurses who are also baby boomers might not be ready to retire may find themselves being a consultant. They would serve as healthcare consultants that understand the needs of their patients better.
With the advancing medical technology today, nurses will be required to focus more on preventing diseases and illnesses rather than finding a cure for them. Medical treatment that targets a disease before they even occur will definitely enhance preventative healthcare. People will also need to learn more about preventing illnesses and diseases. Developing methods to prevent illnesses is surely better than finding better options to cure illnesses.
All of us need to prepare regardless of what the future of healthcare holds, nurses and medical professionals will need to be prepared for the expanding and changing roles in the medical practice. They will need to learn
For More Info see: How to start a nursing agency [http://www.nursingbusinessguide.com]
Dolson McArt - Author
Contributing to EzineArticles.com since March 2007.
Article Source: http://EzineArticles.com/expert/Dolson_McArt/80765
Article Source: http://EzineArticles.com/7153949
|
<urn:uuid:5444410f-4569-445f-b962-884dfcbe1340>
|
CC-MAIN-2017-34
|
http://www.onlyanurse.com/nursingtopics/2015/12/9/nursing-degrees-and-the-future-of-healthcare
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886102757.45/warc/CC-MAIN-20170816231829-20170817011829-00536.warc.gz
|
en
| 0.966508 | 743 | 2.65625 | 3 |
Day 365. Deliberate practice, which is the reason that we seek individual coaching, should focus on a specific goal, and once that goal is accomplished, the trainer and players need to define a new goal or potentially move on.
Day 364. Development takes time, and each player’s development takes a different amount of time..
Day 363. Deliberate practice does not mean individual practice; to get the most out of deliberate practice, we need the context of the game
Day 362. If players today do not understand the difference between criticism and instruction, as suggested by a popular Twitter account, that is more a reflection on coaches, than on the players. Coaches (and parents) need to do a better job with instruction.
Day 361. It is convenient to generalize between predictable environments such as a chess board and unpredictable environments, such as a basketball game, because it is hard to study unpredictable environments. There are too many variables to control for a proper study. However, despite its convenience, the conclusions in one environment do to necessarily generalize or transfer to a different context.
Day 360. The repetitive hop for distance is my favorite exercise for evaluating players and producing performance. If I was reduced to one exercise, this might be that one exercise for me. Based on questions after this video: Day 350 Predictive ability of the repeat hop for distance
Day 359. The context between 5v0 and 5v5 practice changes, and this change creates different mental representations in a player’s long-term memory. To remember a play, players need to practice 5v5, not 5v0.
Day 358. The problem is not that children have never been yelled at; the problem is that we feel that we need to yell at children in order to coach. Is there not a better way to communicate?
Day 357. Coaching beginners is difficult because the tendency is to want to correct everything and give instruction because, as beginners, players don’t really know anything. However, children need time to learn through trial and error.
Day 356. Play is vitally important to the development of young children.
Day 355. College coaches continue to embarrass themselves with their comments about today’s generation. There may be some fragility with teenagers moving to adulthood, but it has nothing to do with participation trophies, and children today certainly are yelled at by coaches and parents. In fact, that’s the most consistent thing about youth sports today: The yelling and screaming and other negative behaviors.
Day 354. When I read the tweets of coaches, I often wonder why they coach. So many coaches seem to have such a low opinion of this generation. Coaches appear to be adversaries with their own teams, rather than a team working toward a singular goal.
Day 353. Track & Field athletes have few full repetitions of their event in a practice, despite some events being very technical. In basketball, repetitions are king. Is there something to the practice of specific drills to improve technique as opposed to going through more and more repetitions of the same thing?
Day 352. In my experience, not enough speed work is done with basketball players, and the physiological adaptations of speed work will benefit basketball players despite the lack of true max velocity sprinting in basketball games.
|
<urn:uuid:8966caff-22f4-4ec7-8b28-121a02e0a24f>
|
CC-MAIN-2017-26
|
http://www.trainforhoops.com/brian-videos/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321309.25/warc/CC-MAIN-20170627101436-20170627121436-00470.warc.gz
|
en
| 0.969983 | 676 | 2.75 | 3 |
Since the Industrial Revolution, levels of carbon dioxide---a major contributor to the greenhouse effect---have been on the rise, prompting scientists to search for ways of counteracting the trend. One of the main strategies is removing carbon dioxide (CO2) from the flue exhaust of power plants, using porous materials that take up the gas as it travels up the flue.
A new class of materials invented and developed by Omar Yaghi at the University of Michigan can store vast amounts of carbon dioxide. And one member of the class has the highest carbon dioxide capacity of any porous material, Yaghi and co-worker Andrew Millward report in a paper published online Dec. 1 in the Journal of the American Chemical Society.
The materials, called metal-organic frameworks (MOFs) and sometimes referred to as crystal sponges, previously have been shown to have great potential for storing hydrogen and methane. On the molecular level, MOFs are scaffolds made up of metal hubs linked together with struts of organic compounds, a structure designed to maximize surface area.
Just one gram of a MOF, in fact, has the surface area of a football field. By modifying the rods in various ways, Yaghi and his team have been able to increase the material's storage capacity, making it possible to stuff more gas molecules into a small area without resorting to high pressure or low temperature.
Yaghi compares the principle by which MOFs store CO2 to placing a honeycomb in a room full of bees. "All the bees will come to the honeycomb, so you're able to contain a large number of bees in a small volume. What we've created is a material that acts like a honeycomb for adsorbing carbon dioxide."
The star performer in Yaghi's cast of MOFs is one dubbed MOF-177, which sops up 140 percent of its weight in CO2 at room temperature and reasonable pressure (32 bar).
Put another way, "if you have a tank filled with MOFs, you can store in that tank as much carbon dioxide as would be stored in nine tanks that do not contain MOFs," Yaghi said. By comparison, a tank filled with porous carbon---one of the current state-of-the-art materials for capturing CO2 in power plant flues---would hold only four tanks worth of CO2.
MOFs can be made in large quantities from low-cost ingredients, such as zinc oxide---a common component of sunblock---and terephthalate, which is used in plastic soda bottles. And finding effective, low-cost ways of reducing CO2 emissions is crucial, said Yaghi, who is the Robert W. Parry Collegiate Professor of Chemistry.
"Almost every region of the world is using more energy than ever before, and the prediction is that this will continue to increase, not just for petroleum, but also for coal and natural gas. Whenever you're burning fossil fuels, you're releasing CO2 into the atmosphere, with devastating environmental effects that include melting the polar ice caps and changing the ocean's acidity. In the United States alone, each person is responsible for generating more than 15 tons of carbon dioxide a year, largely from automobile and power plant emissions," Yaghi said.
"I'm not exaggerating when I say that we are digging a big, black hole for ourselves by not addressing the problem of carbon dioxide emissions."
Source: University of Michigan
Explore further: Detecting neutrinos, physicists look into the heart of the Sun
|
<urn:uuid:fccc9e9e-8375-4123-924c-8b54a7c18296>
|
CC-MAIN-2014-35
|
http://phys.org/news8664.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500830746.39/warc/CC-MAIN-20140820021350-00222-ip-10-180-136-8.ec2.internal.warc.gz
|
en
| 0.947174 | 727 | 3.671875 | 4 |
The latest news about biotechnologies, biomechanics
synthetic biology, genomics, biomedical engineering...
Posted: Feb 10, 2017
One step closer to personalized antibiotic treatment
(Nanowerk News) Taking antibiotics to fight an infection won't necessarily solve your problems. Often, natural occurring bacteria in the gut harbor several resistance genes. This means that the gut bacteria may exchange genes with the infectious bacteria, resulting in antibiotic resistance. Therefore, knowing the resistome -- i.e. the pool of resistance genes present in the gut microbiota -- can improve treatment immensely.
Now researchers from The Novo Nordisk Foundation Center for Biosustainability -- DTU Biosustain -- at Technical University of Denmark have developed a super-fast cheap method called poreFUME that can shed light on the pool of resistance genes in the gut.
"With this method, you will get an overview of the resistome in 1-2 days, and, hence, be able to start the treatment of the infection sooner and with better results than before," says Eric van der Helm, Postdoc at The Novo Nordisk Foundation Center for Biosustainability -- DTU Biosustain -- at Technical University of Denmark.
Antibiotics resistance is causing 700,000 annual deaths
The poreFUME method using nanopore sequencing is very rapid compared to current methods, because it doesn't require growth of the faecal bacteria, which takes time and can be difficult. Also, the data from the device is streamed in real time, so the user doesn't need to wait until the end of a 'run' to access information about the experiment.
Today, getting resistome-data from a patient takes weeks. In the meantime, the resistome profile might change dramatically, and the patient will suffer from failing health.
Every year 700,000 people die of resistant infections, in particular hospitalized patients; and the problem seems to be growing. For many patients, a quick assessment of their personal pool of resistance genes in their feces can be lifesaving.
"Our research shows, that this method provides a promising alternative to other sequencing methods and that it can be used to rapidly profile the resistome of microbial communities in for instance the gut. We are quite convinced, that rapid resistome profiling could lead to personalized antibiotic treatment in high risk patients," says Professor and co-author Morten Sommer from DTU Biosustain.
Cheap runs make the difference
The study was carried out as a collaboration between DTU and co-author Dr. Willem van Schaik from the University Medical Center Utrecht, who provided access to an intensive care unit patient (ICU).
In this study, five feces samples from the ICU patient were assessed. After lung transplantation surgery, due to Chronic obstructive pulmonary disease (COPD), the patient was treated with four different kinds of antibiotics to prevent and fight infections. Samples were collected both upon admission to intensive care unit, during stay and several months after hospitalisation.
The results showed that the poreFUME method was 97% accurate, when compared to standardized resistome profiling methods. This percentage is sufficient when measuring the resistome.
Furthermore, the poreFUME method is much cheaper than current methods, primarily due to the low cost of the so-called MinION; a small handheld DNA-sequencing device, which scientists can start to use for 1,000 Dollars. In comparison, conventional so-called next generation sequencing devices are priced at between 50,000 Dollars and 10 million Dollars.
"If hospitals can purchase equipment for resistome profiling cheaper than today, it opens up for better profiling of more patients and hopefully fewer cases of bacterial resistance," says co-author and Researcher Lejla Imamovic from DTU Biosustain.
|
<urn:uuid:7b3e394f-d985-4ba5-b3a8-cdee26f2ab00>
|
CC-MAIN-2017-26
|
http://www.nanowerk.com/news2/biotech/newsid=45813.php
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321426.45/warc/CC-MAIN-20170627134151-20170627154151-00638.warc.gz
|
en
| 0.934749 | 780 | 3.109375 | 3 |
To build competitive spirit while simultaneously learning about the group you're working with.
Suggest at least 6 people.
Paper, pens & your imagination!
Split into groups of two - each group should have a few pieces of paper and pens - and use a large area. Keep distance between groups.
1. Break off into groups of two, with as many groups as you want. 2. Each group must try to build an aerodynamic paper airplane from the paper provided that will be able to fly the farthest in a paper airplane contest. 3. After constructing the airplane, each group member must write characteristics they think are important about themselves on each side of the plane, or on the inside. 4. Conduct a flying contest to see which plane can go the farthest. 5. The plane that went the longest distance will be the first one for the rest of the team to try and guess - the object is to guess which plane belongs to which group based on the characteristics written on the sides of the plane. 6. After everyone guesses which airplane is which, the correct answers are revealed. 7. Repeat with all planes according to distance, with the closest plane guessed last. 8. Everyone wins!
You learn about your group member one-on-one as you build the paper plane with them. Afterwards, you learn about the rest of your group when you do the personality-matching activity. You build up your relational and task communication skills.
If there aren't enough group members, you could try to make the planes individually and still have the whole group guess at the individual's characteristics.
|
<urn:uuid:b8f477ba-2c85-4c91-833a-408672d24324>
|
CC-MAIN-2017-39
|
http://www.teampedia.net/wiki/index.php?title=Friendly_Flyers
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818686043.16/warc/CC-MAIN-20170919221032-20170920001032-00046.warc.gz
|
en
| 0.963345 | 324 | 3.125 | 3 |
21 Nov Drought Forces Lowest Australian Grain Harvest in More than Ten Years
Severe and ongoing drought conditions will likely lead to the lowest Australian grain harvest in more than ten years, according to a report released last month by agricultural financier Rabobank.
The bank has predicted a national winter crop of just 27.7 million tonnes, the smallest since 2007/08 – a 9% decline on last year’s drought-affected crop and 31% below the five-year average.
While Western Australia played a significant role in boosting the national figures in the 2018/19 harvest, the grains industry will have no such saviour this season. WA’s total yield is forecast to be just 11.9 million tonnes, 33% down on the previous year.
“Conditions this season have proved testing even for Australia’s ‘most valuable player of the year’ last season, WA. After starting the season on limited soil moisture, the Western Australian crop got a good but late start and then kept up with just-in-time rainfall, only to be pulled back by a widespread and severe frost in early September, in between unseasonable high temperatures and low rainfall,” said Cheryl Kalisch Gordon, Senior Grains Analyst at Rabobank.
As the most drought-affected state in Australia, Queensland is set to yield just 0.5 million tonnes, down more than 30% on the previous season and a massive 72% short of the five-year average.
Rabobank is predicting an 8% drop in wheat production compared with the 2018/19 season with a total of 15.84 million tonnes or 32% below the five-year average.
The total barley yield is expected to fall 7% on the previous season to 7.71 million tonnes (21% below the five-year-average) and a reduction in canola by 16.1% to 1.83 million tonnes (45% below the five-year average).
The impact upon trade is expected to be another year of limited exports, the third in a row of below-average export volumes.
“Exports are likely to be in the order of 8 million tonnes of wheat, 3.9 million tonnes of barley and less than 1 million tonnes of canola,” said Dr Kalisch Gordon.
“Collectively, this would be 15% below last year’s export program.”
Despite stifled production, imported wheat is likely to suppress any positive price activity. Rabobank’s report predicts that global wheat prices to remain around the 500 UC cents per bushel in the next year, with limited, short term price increases in line with short term wheat shortages.
“A continuation of difficult seasonal conditions and still very high feed-grain demand on the east coast is expected to maintain an elevated price floor for wheat and barley, while further international imports of wheat from Canada are expected to put a price ceiling on upside movement in the new season.”
In addition to a dull forecast on pricing, Kalisch Gordon warns that an inability to fulfil export demands could hamper trade relationships in the medium term. Wheat from the Black Sea region and Argentina is already being sourced to fill the gap left by declining Australian stocks.
“Regaining market positioning will be increasingly difficult with every year that Australia does not have a buoyant export surplus,” she said.
|
<urn:uuid:11910fd7-d842-47f8-a336-4d310b15ff99>
|
CC-MAIN-2020-05
|
https://lucasgroup.com.au/drought-forces-lowest-australian-grain-harvest-in-more-than-ten-years/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250626449.79/warc/CC-MAIN-20200124221147-20200125010147-00215.warc.gz
|
en
| 0.933446 | 701 | 2.734375 | 3 |
Skip Maine state header navigation
Detailed Description of Maine's Apportionment Process
Maine State Senate and House of Representatives District Apportionment
The Maine Constitution, in Article IV, Part First and Part Second, provides for the reapportionment of State Representative and State Senate Districts, respectively, beginning in 1983 and every 10th year thereafter. The size of the districts is determined by dividing the number of Senators and Representatives into the number of inhabitants of the State, exclusive of foreigners not naturalized, according to the latest Federal Decennial Census, to determine a mean population figure for each Senate and Representative District.
Article IV, Part Third, section 1-A of the Constitution provides that the Legislature shall establish an Apportionment Commission within the first 3 calendar days after the convening of the Legislature in which apportionment is required. This Commission must develop, in accordance with the requirements of the Constitution, a plan for apportioning the House of Representatives, the Senate, or both. The apportionment plan of the Commission established under this section must be submitted to the Secretary of the Maine Senate (for the Senate apportionment) or the Clerk of the Maine House of Representatives (for the House apportionment) within 120 calendar days after the convening of the Legislature. The Legislature shall enact the submitted plan of the commission or a plan of its own by a vote of 2/3 of the Members of each House, within 30 calendar days after the plan of the Commission is submitted.
In the event that the Legislature fails to make an apportionment within 130 days after convening, the Supreme Judicial Court shall make the apportionment within 60 days following the period in which the Legislature is required to act but fails to do so.
U.S. Congressional District Apportionment
Title 21-A M.R.S.A., Maine Law on Elections, section 1206, provides for the apportionment of U.S. Congressional Districts. In 1993, and every 10 years thereafter, when the Secretary of State has received notification of the number of congressional seats to which the State is entitled and the Federal Decennial Census population count is final, the Legislative Apportionment Commission, as provided in Article IV, Part Third, section 1-A, shall review the existing congressional districts. If the districts do not conform to Supreme Judicial Court guidelines, the Commission shall reapportion the State into Congressional Districts.
The Commission shall submit its plan to the Clerk of the Maine House of Representatives no later than 120 calendar days after the convening of the Legislature in which apportionment is required. The Legislature shall enact the submitted plan of the Commission or a plan of its own in regular or special session by a vote of 2/3 of the members of each house within 30 calendar days after the plan is submitted to the Clerk of the House.
If the Legislature fails to make an apportionment within 120 calendar days of the convening of the session in which apportionment is required, the Supreme Judicial Court shall make the apportionment within 60 days following the period in which the Legislature is required to act but fails to do so.
Implementation of the New Districts
21-A, section 1207, requires the Secretary of State to implement
the election districts established by the Maine Supreme Judicial Court
or the Maine Legislature. The Secretary of State must inform the municipal
clerks of the voting district or districts in which each municipality
lies and provide district maps and narrative geographic descriptions
of relevant election districts to those officials. The Secretary of
State may resolve ambiguities concerning the location of election district
lines consistent with requirements of Chapter
15 of Title 21-A.
|
<urn:uuid:761802b5-f8b6-4dd4-8f92-647c92df2e3f>
|
CC-MAIN-2013-48
|
http://maine.gov/sos/cec/elec/apport/detailed.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164836485/warc/CC-MAIN-20131204134716-00010-ip-10-33-133-15.ec2.internal.warc.gz
|
en
| 0.927286 | 751 | 2.640625 | 3 |
New York, Sep 18 (IANS) If you want to avoid Alzheimer’s, avoid stress. A new research reveals that a stress-coping hormone released by the brain has side effects which may lead to Alzheimer’s disease.
The stress coping hormone, called CRF, boosts the production of protein fragments known as amyloid beta, which clump together and trigger the brain degeneration that leads to Alzheimer’s disease, the research revealed.
The University of Florida Health researchers conducted the study on a mouse model and in human cells.
Alzheimer’s is believed to stem from a mix of genetic, lifestyle and environmental factors.
“Our study adds detailed insight into the stress mechanisms that might promote at least one of the Alzheimer’s pathologies,” study co-author professor Todd Golde said.
The study found that stress causes the release of a hormone called corticotrophin releasing factor, or CRF, in the brain.
That, in turn, increases production of amyloid beta. As amyloid beta collects in the brain, it initiates a complex degenerative cascade that leads to Alzheimer’s disease.
During laboratory testing, mouse models that were exposed to acute stress had more of the Alzheimer’s-related protein in their brains than those in a control group, researchers found.
The stressed mice also had more of a specific form of amyloid beta, one that has a particularly pernicious role in the development of Alzheimer’s disease.
The researchers then treated human neurons with CRF. That caused a significant increase in the amyloid proteins involved in Alzheimer’s disease.
Those and other complex experiments reveal more about the mechanics of a likely relationship between stress and Alzheimer’s disease.
The findings were published in The EMBO Journal.
|
<urn:uuid:bc692cfb-6a93-421f-8cd5-6c153ecd8755>
|
CC-MAIN-2017-30
|
http://www.mangalorean.com/new-evidence-links-stress-with-alzheimers-disease/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549425737.60/warc/CC-MAIN-20170726002333-20170726022333-00236.warc.gz
|
en
| 0.945336 | 384 | 3.296875 | 3 |
Complete the design by creating a circular patter of the solid and cut spirals and the the associated fillets. This model uses 16 total tube features...
This project give instructions for creating a 3D model of an artistic plant pot. Exact dimensions might be found in some of the pictures, but plan to experiment to get the look you like best. This design has tubes extending from the inside rim of the pot to the bottom to give a water/air path to help keep the roots of the plant moist but not drowned.
Using 3d CAD software, create a sketch for one half of the basic cross-sectional shape for the pot. My sketch is for a pot to be printed on a 3D printer that has build volume of 8" x 8" x 8". The wall thickness is 2 mm. Scaling down to 75% will allow this model to be printed on a Makerbot Replicator 2 3D printer.
Step 2: Create a revolve
I next revolved the area in the sketch about the Z axis to create the basic shape of the pot.
Step 3: Create rounded rim edge
I then added fillets to the inside and outside edges of the rim. The radius of each fillet is 1/2 of the wall thickness, giving a round edge to the rim.
Step 4: Create a second sketch
Next, create a second sketch, which will be used to generate the next feature. The sketch also contains the axis of rotation for the spiral. Note: Since the next feature is a rather steep spiral, the ellipse shape was used to give a better shape for the spiral feature.
Step 5: Create the solid spiral feature
Next, create the solid spiral feature by extending a spiral from the sketch. If the spiral does not extend fully into the inside volume of the pot, extend a second spiral inward to clear the inside pot wall. Note: A wire frame view is included to show both ends of the spiral feature.
Step 6: Make the spiral feature hollow
Make the spiral feature hollow. This can be done by extending a cut spiral from the second sketch (share the sketch), or create a new sketch on the end of the solid spiral. Again, a wire frame view has been included to show the inside wall of this "tube" feature.
|
<urn:uuid:3bf8f56d-abdc-4e87-affd-9663dc4ed715>
|
CC-MAIN-2014-15
|
http://www.instructables.com/id/Artist-Plant-Pot/
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609537308.32/warc/CC-MAIN-20140416005217-00443-ip-10-147-4-33.ec2.internal.warc.gz
|
en
| 0.89819 | 471 | 3.296875 | 3 |
The best of EcoWatch, right in your inbox. Sign up for our email newsletter!
Will Congress End the Era of Unlimited, Untested Chemicals and Reform TSCA?
Like all Americans of my generation, I came of age in a sea of industrial chemicals. From the stain-resistant carpeting under my feet and the plastics of the computer I'm typing on, to the clothes I'm wearing, industrial chemicals are used in most every consumer product you can think of. While we all appreciate and rely on many of these products, they've introduced hundreds of toxic chemicals into our homes, workplaces, schools and our bodies.
Consider that 10 trillion of pounds of chemicals are produced annually in America—including billions of pounds of certain toxic chemicals like formaldehyde, benzene and bisphenol-A (better known as BPA). Most Americans assume that the government requires that chemicals be shown safe before coming onto the market and into our homes, but that couldn't be further from the truth.
But the era of unlimited, untested chemicals may be about to come to end.
Congress is about to vote on a major reform of America's main chemical safety law, the Toxic Substances Control Act (TSCA). Passed nearly 40 years ago, TSCA was weak to begin with and is now badly broken. It allowed the 62,000 chemicals in use at the time to remain on the market, simply assumed to be safe. The law set the bar for regulating a chemical so high that the U.S. Environmental Protection Agency (EPA) can't restrict even well-established hazards like asbestos—which remains legal in America—or ensure the safety of hundreds of new chemicals coming onto the market each year. The result is that in nearly 40 years, the EPA has required testing on fewer than 300 chemicals and regulated only five chemicals under TSCA.
As we learned more about the health risks posed by certain chemicals—including cancer, reproductive problems and developmental issues—people around the country started to demand action on harmful chemicals. And in recent years, state legislatures and major companies have responded by banning a number of high profile chemicals in some products.
The result was not only stepped-up attention on toxic chemicals, but also a kick in the pants for an industry that had previously relished the lack of federal regulation. Thanks to activist pressure, companies found themselves at risk of losing hundreds of millions of dollars if a chemical in one of their products were targeted by a state or retailer. Many companies decided they could accept more federal regulation if it resulted in a predictable system that restores consumer confidence in the safety of their products.
That presented a political opportunity for savvy legislators: a rare, but powerful alignment of interests that could benefit both bottom lines and public health. Progressive champion Sen. Tom Udall found an opportunity to work with staunch conservative Sen. David Vitter. The powerful environmental advocate Sen. Sheldon Whitehouse found himself aligned with climate skeptic Sen. Jim Inhofe.
The result is a strong bipartisan compromise now before Congress, the Lautenberg Act. The bill would require review of chemicals in use today and improve scrutiny before new ones are allowed on the market. It requires protection for vulnerable populations like children, pregnant women, workers and those living in highly polluted communities. It would provide the EPA with greater ability to require testing of chemicals and to restrict known dangers like asbestos.
Progress required legislators to harken back to an earlier era, to take some political risk and work to find agreement with Members with opposing views.
The bill certainly remains a compromise and the new law won't fix the problem of toxic chemicals overnight. We've dug ourselves a deep hole and there are thousands of chemicals that need review. But we have to start and the first step is passing this important reform.
YOU MIGHT ALSO LIKE
EcoWatch Daily Newsletter
The Environmental Protection Agency (EPA) issued a policy memo yesterday that is an expansive relaxation of legally mandated regulations on polluting industries, saying that industries may have trouble adhering to the regulations while they are short-staffed during the coronavirus global pandemic, according to the AP.
2019 marked the fourth year in a row that the Atlantic hurricane season saw above-average activity, and it doesn't look like 2020 will provide any relief.
The deep, open ocean may seem like an inhospitable environment, but many species like human-sized Humboldt squids are well-adapted to the harsh conditions. 1,500 feet below the ocean's surface, these voracious predators could be having complex conversations by glowing and changing patterns on their skin that researchers are just beginning to decipher.
Not many restaurants will be able to survive coronavirus, and this is a personal, social and national tragedy.
I'm worried about farmers markets too.
|
<urn:uuid:de65276d-3d7e-4cc1-8e5b-5114bc9153bd>
|
CC-MAIN-2020-16
|
https://www.ecowatch.com/will-congress-end-the-era-of-unlimited-untested-chemicals-and-reform-t-1891141628.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370490497.6/warc/CC-MAIN-20200328074047-20200328104047-00536.warc.gz
|
en
| 0.956063 | 980 | 2.65625 | 3 |
By Gloria Dauphin, Louisiana SPCA
Elizabeth, a reader Uptown, brought up a concern people have when walking their dogs on a leash and are approached by a dog who is off leash but the owner yells, "He's friendly!"
"My dog is NOT friendly with other dogs and it is frustrating when other dog owners think it's ok for their dog to approach," Elizabeth said. "My yellow Lab will not put up with strange dogs sniffing her and will attack the other dog if possible, much to the chagrin of the owner."
People need to remember that although dogs share common traits, the way they interact with other dogs depends upon many factors, including how well socialized they are with other dogs, people and new circumstances.
The reaction Elizabeth is describing from her dog is a form of aggression that can be based on fear, dominance or territory. We need to control our dog's reaction and help him or her remain focused when distracted.
The first step is to reduce the dog's anxiety by reducing our anxiety. Our dogs are amazingly perceptive to body language, which is one of the most effective ways they communicate with humans and other dogs. When we are nervous or anxious about something, they immediately sense our hesitation and respond accordingly.
Dog trainers, who often have to train human handlers as well as their dogs, often advise pet owners to exhibit confidence when dealing with their dog. It communicates to them that you are in control and they will more readily turn their focus on you rather than external distractions.
It's important to make it immediately clear to another dog owner that your dog is NOT friendly if this is the case. It doesn't mean your dog is not a good dog, it means he or she is uncomfortable with the unknown and will likely react negatively.
During daily walks with your dog, you've probably been approached by a dog on the loose and not unaccompanied by a human. Use methods to keep your dog focused by talking to him or her in a steady calm voice. Word association commands such as "look" are good, and use a treat to reward your dog when he or she listens to you. Dogs love working for their human companions, even in the most routine circumstances.
Some obedience instructors recommend having your dog carry a toy they enjoy while walking to help keep them occupied. But this is not recommended if you plan on socializing your dog at a dog park, for example, because it will create territorial issues.
I've often seen dog owners yell at their dogs during a tense moment. But
using an aggressive tone will only exacerbate the situation. The key is to
remain relaxed, calm and in control. Before you know it, your dog will assume
the same posture.
|
<urn:uuid:51164180-6340-4884-ba5a-d60b0c3b8d9b>
|
CC-MAIN-2014-10
|
http://www.nola.com/pets/index.ssf/2009/09/tail_talk_train_your_dog_to_fo.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999642517/warc/CC-MAIN-20140305060722-00008-ip-10-183-142-35.ec2.internal.warc.gz
|
en
| 0.978503 | 559 | 2.78125 | 3 |
This week, we celebrated Earth Day! Accordingly, we discussed ways we can take care of the earth, or 'environment' and why it is important to do so. We did so through reading "Every Day is Earth Day" on Starfall, watching Brain POP Jr.'s "Reduce, Reuse, Recycle", and participating in many related activities.
We practiced cutting and strengthened fine motor skills by making "Recycled Collages" with recyclables contributed by families and friends!
We realize that we need to help keep our earth and environment clean; therefore, at our sensory bin, we sifted through the sand, and worked to make it clean as we picked up 'trash'.
We matched uppercase and lowercase-lettered earths.
We pretended to work at the "Recycling Center" as we sorted various objects for disposal between paper and plastic items.
Last, but certainly not least, we also learned that we can help our earth and environment, by planting trees and/or flowers; therefore, we planted sunflower seeds!
|
<urn:uuid:ed2d340c-410d-4523-8435-fa8f160c2be5>
|
CC-MAIN-2017-26
|
http://missgraysgroup.weebly.com/hoot-about-it-teachers-blog/reduce-reuse-recycle1
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323721.80/warc/CC-MAIN-20170628171342-20170628191342-00122.warc.gz
|
en
| 0.958423 | 221 | 3.1875 | 3 |
We know absolutely and clearly what is not happening at the border and the words we must not use to describe it.
Three people have died in Immigration and Customs Enforcement custody since April. The children who have been separated from their parents are still reeling from the consequences. But it is nothing, if you see what we are saying, like the worst thing that could possibly have happened, and those who suggest this are wrong. It is horrible, but it is not an Unthinkable Horror. It is — thinkable, I think. It must be thinkable.
What should make us most upset, right now, is those disrespectful enough to suggest that what is happening is in any way similar to the tragedies of the past. This is not to be compared to concentration camps or the atrocities of the Holocaust, except to say that this is not anything like that. If we were to compare the two, we might discover similarities.
It is important to be precise with the language used to describe such places and such things.
For example, the things the children were kept in were Not Cages. The administration was very strong on that point. Whatever the thing was that the children separated from their parents were kept in, it was not a cage, so we can sleep at night, and our consciences are clear. It was not so bad. Keep to the words!
The words will help you see when you are going really wrong. A man is not providing water and succor for people walking thirstily through the desert; he is doing a crime, human smuggling. It is good that we have these words to make it clear that providing shelter and comfort to people in need is a crime, whereas letting them perish is — well, is not unthinkable. It is nothing like the never-to-be-repeated past. It is merely something that is occurring in the present, when we are busy.
The problem is the people who are using the wrong words to describe what this is. It is very important to use the right words. People must not use hyperbole, or the notion will get out that people could come Here, the United States, and die alone and frightened. You see, this is Here, where such things cannot happen.
And the words from the past are too enormous. To use these words in the present is to imply that we would not know, instantly, if something historically awful were taking place right now. If something truly monstrous were happening, it would be unmissable. It would not be the sort of thing we could possibly choose not to think about. People would not be marrying and giving in marriage and going about their lives in the ordinary way.
No, unique historical monstrosities come clearly labeled. When things happen that ought never to happen, the kind of thing you ought to stop, an alert comes to your phone, and your other plans are canceled. You are asked to be courageous — but not to be inconvenienced! And no one yells at you except the obviously misguided. It is quite something.
People are always saying vaguely risible things, shouting that this is the thing, the thing that we feared would happen — but they are always saying that about something. Everything cannot be the Great Emergency. In the course of a day you must walk past many small emergencies, but you console yourself with the knowledge that if the big one ever came, you would know.
We would know if this were the time to do something. We would know because if someone were to compare it to the Holocaust, everyone would agree, at once, that this was correct. We would rise, as one, to stop it. That is why language matters so much. That is why we must be so clear about what is not happening at the border. What is not happening is anything unthinkable or unrepeatable. We must be very careful with the words!
If we do not use the right words for this, we might think that something terrible was happening.
Alexandra Petri is a Washington Post columnist offering a lighter take on the news and opinions of the day. She is the author of “A Field Guide to Awkward Silences.”
|
<urn:uuid:6306354d-dd9e-4f6a-87ff-a709c9202077>
|
CC-MAIN-2023-40
|
https://www.sltrib.com/opinion/commentary/2019/06/19/alexandra-petri/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511055.59/warc/CC-MAIN-20231003060619-20231003090619-00161.warc.gz
|
en
| 0.985391 | 850 | 2.609375 | 3 |
|Tamils as non Dravidians Part II
by Nalin de Silva
Mr. Naganathans claim that the Tamils in Sri Lanka are the descendants of those Yakshas, Nagas and other tribes in the northern and eastern parts of the country who interbred with the Tamils from Southern Bharat raises a number of questions. He states that the indigenous tribes in Sri Lanka spoke Elu and the hence the name of the country, Eelam in Tamil. However he fails to mention whether Eelam is derived from Elu. He merely says hence Eelam the name of the country. How was the country known in Elu? Is Eelam a Tamil corruption of the original word for the country in Elu. Mr. Naganathan should have referred to the works of scholars rather than speculating on these matters. The dictionary published by the University of Madras gives the etymology of the word Eelam, where it is stated that Eelam is derived from Sihala.
I agree with Mr. Naganathan that the indigenous tribes in the country spoke Elu. Ven. Baddegama Vimalawansa thero has stated that the language spoken by the Yakshas, Nagas and the others was known as Hela. Elu is another word for Hela in Hela (or Elu) and there are references to both Hela and Elu in the Sinhala literature, denoting the Sinhala language. Elu, Hela, Sihala and Sinhala mean the same language that has gone through various stages of evolution as shown by numerous evidence from inscriptions and early Sinhala works. Most probably Elu, Helu, Hela, Sihela, Sihala and Sinhala denote terms used in Hela Basa to identify the language as it evolved through thousands of years. Not only the language but the word used to identify the language has evolved over the years. Nobody would call the language used in the Sinhala newspapers Elu or Hela today, though it has clearly evolved from the language used in the Vessagiri inscription. Today we use the words "pemini", and "nopemini" instead of "agatha" and "anagatha" found in early inscriptions. However even the present day Sinhalas, use the word "nonagatha" to describe the period of transition of the sun from Pisces to Aries, on the Sinhala new year day to indicate that the sun has neither arrived or not arrived fully in the constellation of Aries during that period.
The evolution from Elu to Sinhala should have been the subject of a number of studies by scholars but unfortunately only the Hela Havula, founded by the great grammarian Mr. Munidasa Cumaratunga is still interested in this work. How Elu or Hela absorbed words from the Prakrit languages of the Vedic civilisation, especially Magadhi (Pali ?) to become Sihela and then Sihala (Sihala could probably be either a corrupted version of Sihela, as it is easier to pronounce it than the latter or re-derived from Seehala the Magadhised version of Sihela) which after being exposed to Sanskrit later on, could have become the present Sinhala. Parallely the Sihela nation was formed during the time of King Pandukhabhaya by absorbing the "Aryans", meaning those who brought the Vedic civilisation to the country around 9th century BC, into the Hela tribes. Dr. Gunadasa Amarasekera in his "Sinhala Kavya Sampradaya" reminds us that the language of Sinhala poetry is still Sihala in the sense that the Sinhala poets in general use a language that does not have many Sanskrit words. Dr. Punchi Bandara Sannasgala in the "Sinhala Sahithya Vanshaya" - History of Sinhalese Literature, mentions the Sinhala books, "Helatuwa", "Heladiv Abidana Vatha", "Heladiv Rajaniya", "Helu Kankhavitharaniya", "Helu Getapadaya", "Helu Dalada Vansa Kavya", "Helu Da Ruvanakara", "Helu Mahabodhi Vansaya", "Helusuthra", "Eluakaradiya", "Elu Aththanagalu Vansaya", "Elu Umanda", "Elu Daladavansa Kavya", "Elusandasa", "Elu Sandas Lakuna", "Elu Sandas Lakuna Sannaya", "Elu Silowa", "Elu Silo Sathakaya", "Eluhathvanagaluvanshaya", works starting with Hela, Helu or Elu. Some of the works mentioned are now known only by name. However some later authors have referred to these works and have quoted from them thus enabling scholars to study the language they had used. Dr. Sannasgala and many others have observed that the language in all these works clearly show how the Elu or Hela or Sihala or Sinhala has evolved over the years. A parallel evolution is observed in the Sinhala alphabet and the script from the ancient inscriptions to the present day alphabet and the script in the printed books. Incidentally, according to Dr. Sannasgala, Eluakaradiya is a Sinhala dictionary that had been used by Rev. Benjamin Clough in compiling a Sinhala - English dictionary in 1821. Neither Rev. Clough nor anybody else has used an Eluakaradiya to prepare a Tamil - English or even a Tamil - Sinhala dictionary. It has to be emphasised that even the Deepavansaya and the Mahavansaya written originally in Pali are based on Helatuwa. In any event it is clear that the indigenous Yakshas, Nagas and other tribes having interbred with the people who brought the Vedic civilisation to the country around the 9th century BC, had created a nation by about the 4th century BC, together with a culture and a language, that was not found in Bharat. The Hela or Sihala language and the culture may have many similarities with the languages and cultures of the Vedic civilisation but there are important differences as well. The Sinhalas are very open minded and through out history have not been reluctant to assimilate various features from other cultures and languages, including Tamil, in to their own culture and language, without losing their identity. Even Ashokan Buddhism was assimilated into the Sinhala culture resulting in a unique Sinhala Buddhist culture with not only gods and "bodhi poojas" but also "neketh" , "gammadu", "devolmadu", "bali", "thovil", "daha ata sanni" and what not, that may appear to be un-Buddhistic or irrational to those "scientific" and rationalist Buddhists. Sinhala Buddhism is neither Ashokan Buddhism nor any other Buddhism, just as much Anglicanism is not the same as Roman Catholicism. In all these cases we refer to cultures under the guise of religions. No religion exists purely as a religion in a vacuum but only in connection with a culture. If we refer to the Dhamma or the doctrine by the term religion, then the religions exist only in the libraries throughout the world. Even Dhamma is preached or discovered or whatever only in a cultural milieu. In the Buddhist literature it is said that the Bodhisathva went through the "pas maha belum" or looked for five requirements before he departed the "Thavthisa" to be conceived as the son of Maha Maya Devi. If the Bodhisathva was born into a European culture nearly 2600 years ago he would not have attained Buddhahood. Can anyone imagine an "Eskimo" Buddha? "Religions" could give rise to cultures and cultures in turn could give birth to and absorb "religions". (This is not a so-called dialectical relationship. Anybody with average intelligence can understand it without resorting to "dialectics" of either the idealistic or materialistic variety. There is nothing that can be understood with so-called dialectics that cannot be explained using formal logic. For a detailed analysis please refer to "Apohakaye Rupikaya" or Formalism of Dialectics.)
Though the Sinhalas in general had absorbed and assimilated from other cultures into their culture, there had been periods of blind imitation. But fortunately the periods of imitation had been short in a history of more than 2500 years. At present we are going through such a period, under the hegemony of western cultural imperialism and the sooner we get back to absorption and assimilation from blind imitation it would be for the benefit of the Sinhalas as well as the others living in this country.
Mr. Naganathan knows that unlike in the case of Elu and Sinhala there is no relationship between Elu and Tamil. While Elu has evolved in Sri Lanka to become Sinhala, Tamil is a language that has been created in Southern parts of India. All that Mr. Naganathan can claim is that those descendants of Yakshas, Nagas and other tribes who interbred with the Tamils from Southern parts of India became Tamils and Saivaites. As was mentioned last week Palk straits, though may be only 22 miles wide, separates Jaffna from the Indian mainland. If the Tamils came to Sri Lanka as settlers long time ago they would have interbred with the locals and as in the case of "Aryans" a separate language and a culture would have resulted. But the Tamils came as invaders and after ruling Anuradhapura or Polonnaruwa as the case may be, for some time they were ousted by the Sinhala kings. The total period of these intermittent occupations does not exceed 168 years from the time of Sena Guttika to Magha and that explains why there was no new culture or language as a result of interbreeding that Mr. Naganathan has assumed to have taken place from a very early period in the history of the country. Prof. Indrapalans research corroborates these findings. There were no permanent Tamil settlements in this country before the 10th century BC according to Prof. Indrapalan and obviously there would not have been any interbreeding with the Tamils before that time.
Most of the Tamil population in the Jaffna peninsula are descendants of those who were brought from South India for tobacco cultivation by the Dutch. These immigrants were brought in large numbers by the Dutch and they outnumbered the locals in no time. By that time the locals would have been mainly Sinhalas and those who would have come with Magha, Chandrabhanu and the Arya Chakravarthins. They would have been a mixed stock speaking mainly Sinhala, with others speaking Malayalam (it is said that Magha came with an army of Kerala soldiers), Tamil and the language of the Kalingas. However as the Tamils outnumbered the others during and after the Dutch period the latter also would have been Tamilised together with the place names. The Tamils with Sinhala names in the present northern province are none other than those Sinhalas who would have been Tamilised later. Similarly people who migrated to the western parts of the country from southern parts of India, especially from Kerala, after the thirteenth century were Sinhalised and were absorbed into the Sinhala Buddhist culture.
Mr. Naganathan very often writes against what he calls "majoriatarinism". He propagates the view that the "majoriatarinism" has been masqueraded as democracy, however without formulating an alternate scheme. He is of the view that the Sinhaas are attempting to dominate the Tamils because the former are in the majority. It is not a case of domination but the Sinhalas asking Tamils and the other the ethnic communities to recognise the significance of the Sinhala culture, language and history in this country. However it is more than clear that the Tamils are not prepared to recognise the significance of the Sinhalthva in Sri Lanka and in order to deny the rightful place to the Sinhala people, their language, their culture and their history, in the country the Tamils have come up with so-called theories on the "origin" of the Tamils in the country. However Mr. Naganathan who accuses Sinhalas of majoriatarinism is guilty of the same offence. He not only does not offer an alternative to "majoriatarinism", but makes use of the very same concept with respect to the combined northern and the eastern provinces. He says: "We are the majority in our heartland in the North and East where Gautama the Buddha visited us and we are the natives of the country". Though he uses the words north and east he does not define them properly. If we assume the so-called heartland to be the present northern and the eastern provinces that were demarcated with the other seven provinces only as late as 1889, then Mr. Naganathans claim on behalf of the Tamils to those two provinces is based on two criteria. (i) The Tamils form the majority in the combined provinces. (ii) The Tamils are natives of the country being the descendents of those Yakshas and Nagas who interbred with the Tamils for thousands of years according to Mr. Naganathan. Now the criterion (ii) has no merit whatsoever and has to be discarded. What about criterion (i) ? How could Mr. Naganathan who vehemently opposes the so-called majoriatarinism of the Sinhalas resort to the majoriatarinism of the Tamils? It appears that Mr. Naganathan is opposed only to the majoriatarinism of the Sinhalas but not to that of the Tamils.
In any event the Tamils do not form a majority in the present eastern province. Even as late as 1921 the Tamils were confined to certain regions in a narrow strip along the eastern coast, as shown by Prof. G. H. Pieris. A recent book " Digamandulu Danavva" by Mr. Piyasena Kahandagamage gives more details of the demographic patterns in the districts of Ampara and Batticaloa. The Tamils came in large numbers to the present eastern province only during the colonial period. It was Tamil colonisation under western colonialism. The Sinhalas would have formed the majority even in the present eastern province until they were massacred by the British after the 1817-18 uprising. Mr. Naganathan who opposes majoriatarinism is not prepared to leave out the eastern province despite the fact that the Tamils are not in a majority in that province. Instead he and the others of his ilk look for the largest combined area in which the Tamils form a majority, while preaching against the so-called majoriatarinism of the Sinhalas.
People like Mr. Naganathan cannot wash their hands off from the murderous activities of the LTTE. The LTTE, when they bombed the Dalada Maligawa, showed the world that they are worse than the Talebans who smash Buddha statues in Afghanistan. The LTTE was fed on the theories of bogus history that were formulated by people like Mr. Naganathan. It is the Ilankai Thamil Arasu Kadchi (ITAK) or the Lanka Tamil State Party, the so-called Federal Party and the TULF that incited the generation of Prabhakaran against the Sinhalas with these bogus theories. It is unfortunate that after all these bloodshed Mr. Naganathan, pretending to be preaching against violence on one hand is adding fuel to the hatred of the LTTE against the Sinhalas, with his phoney theories on the other, in the traditions of the ITAK and the TULF.
|
<urn:uuid:395f2f9b-f61e-47bb-934c-34e1a6ef60f0>
|
CC-MAIN-2023-40
|
https://infolanka.com/org/srilanka/cult/25.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510730.6/warc/CC-MAIN-20230930213821-20231001003821-00083.warc.gz
|
en
| 0.967519 | 3,383 | 2.78125 | 3 |
Published byRebecca Buckland Modified over 8 years ago
¡HOLA! WALT: meet and greet people in Spanish WILF:
To be able to write & understand greetings – level 1 To be able to meet and greet people , saying your name using short sentences- level 2
Write these levels on the Front of your book
Level 1 – words Level 2 – Sentences Level 3 – Level 2 + plus opinions Level 4 – Level 3 + justifications Level 5 – Level 4 + future tense
!Hola! !Adios! Hello! Goodbye!
Buenos días Buenas tardes Buenas noches Hasta luego = see you soon
Good morning Buenas tardes Good afternoon Buenas noches TO COPY IN YOUR BOOK! Good night More! Hasta luego = see you soon Hasta la vista = see you soon Hasta mañana = see you tomorrow
What greeting would you use in the following situations?
10am A B C 6pm 8am D E 2pm 2pm G Lesson 1 F H tomorrow I soon
+ - ¿Qué tal? How are you? ASKING SOMEONE HOW THEY ARE ¡Estupendo!
GREAT! How are you? ¡Muy bien! VERY WELL! ¡bien! WELL! TO COPY IN YOUR BOOK! Mal NOT WELL! - ¡Fatal! AWFUL!
Don’t forget to say… Thank you!
Gracias! TOP TIP! IF YOU WANT TO SAY : “AND YOU?” USE “ ¿Y TU? “ BUT BE CAREFUL! “ Y” IS PRONOUNCED LIKE “EE”
What are they saying to each other in this conversation?
Challenge 1! Go around the classroom and ask at least 3 different people how they are. Level 1 – use of words Level 2 – use short sentences
Challenge 2! In your book write a conversation, or create a mini-cartoon as seen previously Level 1 – use of words with correct spelling Level 2 – use short sentences
Asking for someone’s name & saying your name
EXTENSION! Asking for someone’s name & saying your name ¿Como te llamas? What’s your name? Me llamo Bob I am called Bob
Challenge Plus! Go around the classroom and ask at least 3 different people you don’t know their name and how they are. Level 1 – use of words Level 2 – use short sentences
Listening extension – Listos 1
© 2023 SlidePlayer.com Inc.
All rights reserved.
|
<urn:uuid:0acf0ae6-0dc3-49e2-b1f7-2a1fba90e103>
|
CC-MAIN-2023-14
|
https://slideplayer.com/slide/2549310/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296946535.82/warc/CC-MAIN-20230326204136-20230326234136-00669.warc.gz
|
en
| 0.726051 | 608 | 3.640625 | 4 |
By the time they get to Kiran Modi, all these children have often suffered ruthless forms of physical and sexual abuse, whether on the streets or at the hands of their own families.
Modi, who runs an organization to help them, says education might have been one way to prevent such abuse.
“What we all need to do is talk to our children in a frank manner so they know the difference between a gentle, appropriate touch and a rude touch that crosses a boundary,” says Modi, managing trustee of Udayan Care, which runs outreach programmes and shelters for children in Delhi and its suburbs. “The child doesn’t always understand it on their own.”
A recent report by the ministry of women and child development found that half the children surveyed were victims of some form of sexual abuse.(See graphics) According to another study, India has the highest number of people living with HIV—five million—than any other country in the world.
Yet overpopulated India remains largely reluctant to talk about sex at least in schools. Now, several non-governmental organizations (NGO) welcome recent government overtures as recognition that educating Indian children about the way their bodies work is vital to the country’s future.
Generally, these groups, and their funds and backers, have largely targeted sex education for adults, be it distributing condoms or street plays about HIV/AIDS prevention. The Gates Foundation, for instance, has pledged more than $250 million (Rs1,050 crore) over five years for HIV prevention in India, sponsoring diverse programmes for sex workers, clients of sex workers, homosexuals and drug users.
A half-dozen NGOs interviewed by Mint said they welcome the government’s movement towards a more formalized system of sex education—although they said it’s long overdue.
“If it’s there at all it’s aimed at a very small portion of children,” Shireen Vakil Miller, head of policy for Save the Children in India, says of formal sex education programmes. “Some private schools and certain districts in certain states might be more proactive than others, but across the board, not really.”
However, Miller added that even a more formal and consistent sex education policy in schools would fail to reach many of the nation’s poorest children who don’t attend classes.
Save the Children, an international children’s advocacy organization, funds $8 million in programmes across 10 states and tries to incorporate some basic sex education in its outreach work. “The schools are often resistant to it so we’ll address it through other children’s groups and youth clubs,” she said.
Outside the classroom, of course, sex has been making a flurry of headlines. The recent spate began with the alleged gruesome sexual assaults and murders of 20 women and children in the Nithari section of Noida, just outside the Capital. Then came the series of states pre-emptively banning sex education in their schools: Gujarat, Madhya Pradesh, Karnataka, Maharastra.
Officials mostly objected to pictures and descriptions in the material as too graphic; in Madhya Pradesh, some schools said yoga would be more culturally appropriate. Last week brought the news of the child abuse study, along with a summit of state education ministers discussing the issue.
Meanwhile, a lack of uniformity in curricula has produced a generation of young adults with sometimes questionable knowledge—even as rates of premarital sex are on the rise, say some activists. Avishkar, a counselling clinic in Mumbai, claims that based on its interactions, about two-thirds of young men and women, between the ages of 18 and 20, in metropolitan areas have engaged in premarital sex.
“Whatever they have got in school is just bits and pieces,” if young people have gotten any form of sex education at all, says Urvashi Gandhi, a programme coordinator at Breakthrough, which runs a Delhi-based programme to train university students to act as peer educators about sexual health.
Though the students she works with hail from various parts of the country and represent a “good mix” of economic, social and religious backgrounds, they have one thing in common: Almost none of them have had any formal sex education.
Despite the controversy and bans by some states, Ashok Ganguly, the chairman of the Central Board of Secondary Education (CBSE), said at the state education ministers conference last week that the board plans to go ahead with adolescent-awareness programmes in its schools for the next academic session.
“Honestly, the time to start doing it is now,” said joint secretary for Child Welfare Loveleen Kacker, in reference to stepping up abuse prevention efforts and sex education. “There has been a kind of conspiracy of silence about the whole issue for too long.”
At the Ramjas School, a co-educational government school in Delhi’s R.K. Puram, sex education has not been taught as a separate module, rather integrated into other courses, particularly biology and science classes. But principal Meera Balachandran says that is “just not enough.” When the school reopens in July after the holidays, it will implement the new CBSE curriculum, which will include “behavioural as well as biological elements.”
“The first thing we need to do is get them to understand themselves so that they know what is going on with their own bodies,” she said, noting that for younger children, she often lectures during school assemblies about the difference between a “good touch and a bad touch.”
On Monday, the Students Islamic Organization (SIO) of India condemned the CBSE sex education programmes and vowed to launch a nationwide protest.
Advocacy of safe sex can have “an adverse impact” on individuals and society and syllabi are devised with western norms in mind, irrelevant to Indian society, M. Saleem, the SIO’s zonal secretary for Tamil Nadu told reporters in Coimbatore.
Such attitudes make some NGOs fearful of even introducing the issue, including a backlash from donors.
“It’s necessary” but too controversial to have formal sex education classes, said the manager of one outreach centre that has worked with more than 2,000 underprivileged children and young adults in greater Delhi.
She requested anonymity because she didn’t want to upset donors. “They also need to learn maths and computers so they can lift themselves up in life.”
While there is a need for more effective ways to teach children about sex, the problem, say outreach workers and educators who favour sex education, can also be that teachers are uncomfortable teaching these subjects to students and require training to do this effectively.
In addition to pushing for mandatory sex education in schools, the ministry is in the process of implementing a far-reaching Integrated Child Protection Scheme, which includes initiatives on child trafficking and labour to strengthening the ability of the police to respond to crimes against children.
But, say some child advocacy workers, tools that could deliver the message effectively, such as television and other forms of entertainment, are not being used very effectively. For instance, they point to HIVS/AIDS prevention campaigns, such as one distributed last week to 100 state NGOs across India with special computer games, cartoons, puppet shows and animation films. The NGO Plan India designed the child-friendly HIV/AIDS packages, with funding from the department for international development. Lessons that teach children how to differentiate between a “good touch” and a “bad touch” could also be incorporated into such media, advocates say.
Aparna Kalra and PTI also contributed to this story.
|
<urn:uuid:819b99b5-c258-4178-8402-fe83b8e2bf5f>
|
CC-MAIN-2017-39
|
http://www.livemint.com/Politics/UrAx67KZwauh2HjVmQuNYM/Make-sex-education-mandatory-in-schools.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818687255.13/warc/CC-MAIN-20170920104615-20170920124615-00486.warc.gz
|
en
| 0.965949 | 1,607 | 2.640625 | 3 |
One of the most serious problems facing America today, says Harvard Kennedy School Professor Robert Putnam, is the opportunity gap. The space between the incomes of the rich and the poor is growing, and because of that gap, children are being left behind. It has nothing to do with interest levels or intelligence — and it has little to do with schools, but that doesn't mean schools can't help.
"Schools did not cause the problem, but schools can be part of the solution to the problem," says Putnam, author of the new book Our Kids: The American Dream in Crisis. "Indeed, schools always, in America, have meant to be one of the major tools we have for leveling the playing field for making sure everyone gets a fair and equal start."
So, how can we help to ensure that fair start for all American children, and improve their access to resources and supports necessary for success?
In this edition of the Harvard EdCast, Putnam ponders that question and reflects on what educators can do to help restore some measure of social mobility in our society.
The Harvard EdCast is a weekly series of podcasts, available on the Harvard University iTunes U page, that features a 15-20 minute conversation with thought leaders in the field of education from across the country and around the world. Hosted by Matt Weber, the Harvard EdCast is a space for educational discourse and openness, focusing on the myriad issues and current events related to the field.
|
<urn:uuid:7df312e5-1e01-4ca2-a074-a16e72f3ba39>
|
CC-MAIN-2017-30
|
http://www.gse.harvard.edu/news/16/02/harvard-edcast-cynics-good-reason
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549436316.91/warc/CC-MAIN-20170728002503-20170728022503-00287.warc.gz
|
en
| 0.961428 | 298 | 2.515625 | 3 |
In 1953, only two years after the Abbey of the Genesee was established in Piffard, NY, the monks opened a bakery. Today, the monks see their bread as a form of connection with others, a way of bridging the gap between their intentional community and the local and even national communities. Although this is the only Monks’ Bread bakery, you can find the loaves being sold at several Wegman’s grocery store chains and local shops. The Monks’ Bread site even has options to ship the bread directly to its customers, across the United States.
In order to take advantage of the capitalist market that surrounds the monastery, the monks needed to make changes to the way the product was distributed. Whereas the monks drove to stores and delivered the product directly, the abbey has found it more efficient to use distributing companies in order to allow the business to expand and maintain the crucial sense of peace and quiet associated with the contemplative monastic lifestyle.
The monks found a way to engage with the wider environment through Monks’ Bread, engaging both in the capitalist economy which sustains the brand as well as using the business to employ local community members.
The Bread Making Process
Watch the videos below consecutively to observe the process of bread making in the Monks’ Bread industrial bakery.
|
<urn:uuid:f1e0ad9b-4aea-4d01-ad6a-dfbc7c13efad>
|
CC-MAIN-2020-16
|
http://woods.coplacdigital.org/geneseo/the-highly-mechanized-bakery-process/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370492125.18/warc/CC-MAIN-20200328164156-20200328194156-00529.warc.gz
|
en
| 0.959386 | 272 | 2.625 | 3 |
Working With Environmental Issues
- Africa, Togo
- Grades 3-5, Grades 6-8
- Environment, Health, Science
Students will learn to appreciate the importance of clean water for the maintenance of good health, and how the lack of clean water leads to the spread of disease and parasites in West Africa.
- Students will gain a deeper appreciation for the clean water and sanitation standards common in America.
- Students will realize that there is no easy answer to complex problems of disease and parasites in West Africa.
- Students will use their problem-solving skills to address a real-world problem.
- Students will learn that Peace Corps Volunteers must be creative and resourceful, taking into account the cultural perspectives of their local community.
- Bring in a few store-bought bottles of water and some paper cups. Distribute a small drink of water to each student. Ask why many Americans pay for bottled water rather than drink tap water. Ask for a show of hands: How many students drink only bottled water? How many drink tap water that has been put through a filter? How many drink plain tap water? How many would drink rainwater? Water from a nearby stream or river? Ocean water? Why or why not? Help students note that we have many options when it comes to drinking water?or not drinking particular samples.
- What else do we use tap water for? List as many things as possible. [Examples: laundry, washing hands, watering lawns, washing cars, mixing in paints, scrubbing the floor.]
Distribute the World Water Use Fact Sheet (find link above). How much water does the average American use per person per day? [176 gallons] Have students calculate how much water their family would use in a week at this rate; how much in a year. You might give them the figures from the City of Manhattan Beach, Department of Public Works:
- For a 10-minute shower: 40 gallons
- For a load of wash in a washing machine: 45 gallons
- Brushing your teeth: 3 gallons per day per person
- Flushing the toilet: 28 gallons per day per person
- Ask students: What choices would you make if you were limited to 10 gallons per day? How would you allocate your water use? How would your life be different? What if you were limited to the amount of water that you could carry for a mile? Now have them look at the water-use chart and identify countries where water usage is less than 10 gallons a day per person. Remind students that the water may not be clean. Help students understand that Americans view certain uses of water as necessary that would be extreme luxuries in other parts of the world. Ask students to try to identify such usages. [Examples: washing cars, extended showers, watering a lawn, decorative fountains.]
- Give students a copy of Fred Koehler's third letter. If you haven't used previous CyberVolunteer letters from Koehler, introduce him by explaining who he is and what he is doing in Togo. Explain where Togo is. Ask students to read the story to see what impact the shortage of clean drinking water has on the people of his village, Blitta-Gare.
- Ask students to define the word "endemic." [Common in a particular place or among a particular group of people.] What are the reasons Koehler gives for endemic illnesses like cholera in Togo?
- Homework: Assign students to groups and ask each to use the internet research one of the endemic diseases in sub-Saharan Africa.
- Ask students if any of them thought about the previous activity after going home. Did they alter their behavior in terms of using water? Did any discuss with their families what they had learned?
- Ask for reports on the diseases of Africa. Which diseases could be prevented by better hygiene and sanitation?
- What suggestion does Koehler have for improving conditions in his village? [Aid organizations to improve the quality of water and education to persuade villagers to practice sanitary behavior.] Will these suggestions solve the problem? What else could be done?
- Ask students to summarize what they have learned from discussing Koehler's letter. Ask them what kinds of careers would help in solving the world's water crisis.
Frameworks & Standards
- In West Africa, hygiene is an important factor in combating the spread of disease and parasites; most endemic diarrheal disease, for example, is transmitted from person to person on hands and food because of poor hygiene practices.
- In America, most people have access to clean, safe drinking water—and they take it for granted. In many countries of the world, however, water drunk by people carries germs and parasites that cause a variety of diseases.
- Do all cultures look at resources in the same way? If not, why not?
- How can natural resources affect health and living standards?
National Science Education Standards
Content Standard F: Science in Personal and Social Perspectives
Content Standard C: Life Science
- Collaborate with a math or technology teacher on an interdisciplinary project to reinforce student learning. Direct students to acquire research data on some of the statistics of water and sanitation. Have student groups prepare posters illustrating water-use issues with graphics such as bar charts and line graphs.
- Check out some statistics and tables on water and sanitation. Visit the World Health Organization's research projects on water and sanitation.
|
<urn:uuid:bb2e6236-797c-4bfa-9d7a-adeca6147fe0>
|
CC-MAIN-2014-23
|
http://www.peacecorps.gov/wws/lesson-plans/working-environmental-issues/
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510261771.50/warc/CC-MAIN-20140728011741-00438-ip-10-146-231-18.ec2.internal.warc.gz
|
en
| 0.949508 | 1,120 | 3.578125 | 4 |
Namibia's President Hage Geingob has said he would accelerate pace of land reform in the country by expropriating land, while giving white owners "fair compensation", as the country celebrated Independence Day.
The 21 March commemorates the day the country separated from South Africa in 1990.
The former German colony was governed by South Africa's white-led government from 1920s until the Namibian War broke out, and the country gained independence.
In a speech to mark the day's festivities, Geingob said his government would accelerate the pace of Namibia's land redistribution programme by expropriating white-owned land and commercial farms.
Land reform, an "emotive" political and economic topic in Namibia, is mainly designed to buy off 43% of its white-owned land and redistribute its to disadvantaged black Namibians by 2020, in accordance to the nation's constitution and in exchange for "compensation".
However, so far just under 30% has be transferred.
In his speech, Geingob said that despite the authorities' efforts to transfer ownership to black people through the "willing buyer, willing seller" concept, it would now have to "refer back to our constitution which allows for the expropriation of land with fair compensation and also look at foreign ownership of land, especially absentee land owners".
He added: "If we are committed to achieving further economic growth and maintaining peace, then everyone should be open to new approaches." The speech was tweeted on the Namibian Presidency account and on the Presidency's Facebook page.
Land reform is a contentious issue across Southern Africa. In Zimbabwe, President Robert Mugabe also launched the country's so-called "fast-track programme". From 2000 and over a 15-year period, the government forcibly evicted some 4,800 white farmers and many black commercial farmers from their land. An estimated 7 million hectares were seized.
Western donors – exasperated by the widespread redistribution programme, and a plethora of allegations of rights abuses – imposed sanctions in 2002. Zimbabwe then conducted further land grabs, under terms of a land-acquisition law passed the same year.
In South Africa, meanwhile, President Jacob Zuma earlier this month proposed a radical land reform plan – but the ruling ANC party said it does not call for the expropriation of land without compensation. Instead, the ANC proposed "just and equitable" compensation.
|
<urn:uuid:14e83fa4-402f-4b6e-94d3-716588b55a68>
|
CC-MAIN-2017-39
|
http://www.ibtimes.co.uk/namibia-president-accelerate-pace-land-reform-by-expropriating-white-owned-land-1612906
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818687255.13/warc/CC-MAIN-20170920104615-20170920124615-00231.warc.gz
|
en
| 0.961818 | 492 | 2.765625 | 3 |
To turn or not to turn?
It is not necessary to turn the contents of your compost bin
in order to make good compost - though it may take a little longer
to completely rot down if you never turn it.
However, recent research as promoted by the
Royal College of Physicians, shows that turning compost for 30
minutes burns 250 - 300 calories, the equivalent to working out on a
treadmill. And shovelling up compost when you empty your bin burns
243-363 calories. Presumably depending on how heavy and soggy the
So - forget the gym and turn your compost!
Traditional bins like New Zealand
boxes need some turning.
bins work on a 2 year cycle with one bay for each yearís rubbish.
Kitchen and garden waste is added to one of the bays throughout the
year and this material can be turned as often as you can face doing
it. A fresh supply of air is injected at every turning, and this
leads to a higher temperature and better compost more quickly.
Remember air is needed throughout the heap, not at the outside, so a
slatted bin or one with Ďair ventsí on the side merely makes the
material at the edges dry out and encourages weeds to grow. Boxes
with solid sides keep
moisture in and prevent any essential
warmth from escaping.
At the end of the year, the full bay can be covered over with old
carpet or bubble film or lots of cardboard, and ideally topped with
a solid lid to keep snow out and warmth and moisture in. After another
year, while you are using the second bay for fresh material, youíll
have perfect, crumbly compost in the first bay. When you have used
this in the garden and have an empty bay, you can turn the contents
of its neighbour in to it. If this is all the turning you do you
will still make good compost.
Donít turn materials in a plastic bin.
Plastic bins supplied by your Council should be used all the time,
so keep adding material every time you garden or peel your tatties.
When you lift your bin off the compost heap, youíll find recently
added material at the top, well rotted at the bottom and everything
at different stages in between. By turning this kind of heap, youíll
jumble everything up so you will never get at the perfectly rotted
compost as it will be mixed through the unrotted stuff. [This mix up
will also happen if you use a hatch at the bottom of a plastic bin.]
Once or twice a year, when you want to use your compost, lift the
bin off the heap, fork the material thatís not ready back into the
bin and shovel up the good compost at the bottom. When you fork the
material over like this, youíre turning it, by the way, and that is
when you mix in the fresh air.
So you always turn your compost Ė but
at different times and in different ways, depending on the type of
bin you use.
|
<urn:uuid:8ee83caa-5833-4465-b3c1-6e5fc10d6fef>
|
CC-MAIN-2017-26
|
http://askorganic.co.uk/composting/To%20turn%20or%20not.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320736.82/warc/CC-MAIN-20170626115614-20170626135614-00496.warc.gz
|
en
| 0.921414 | 654 | 2.578125 | 3 |
Dominion Trust Building
Early skyscraper. Vancouver’s first skyscraper, at 13 storeys, was the Dominion Trust Building. When it opened in 1910, it was the tallest building in the British Empire and a symbol of the city’s pre-war energy and prosperity. It was owned by the Dominion Trust Co., a major player in the booming real estate market. By the time this photograph was taken, however, in 1915, the economy had taken a nosedive, taking with it the Dominion Trust, whose general manager had taken his own life shortly before the company went bankrupt. The building survived, and still dominates the corner of Hastings and Cambie with its striking mansard roof and colourful terracotta exterior.
View the entire Metro Vancouver History 365 Series HERE.
|
<urn:uuid:25de3286-38ac-45d1-9ea2-0b6646fc9690>
|
CC-MAIN-2017-34
|
http://vancouverisawesome.com/2017/06/06/dominion-trust-building-1910/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886105326.6/warc/CC-MAIN-20170819070335-20170819090335-00452.warc.gz
|
en
| 0.976122 | 160 | 2.65625 | 3 |
Caracas, June 8, 2015 (venezuelanalysis.com) - Venezuela was recognized today by the United Nations Food and Agriculture Organization (FAO) for meeting the UN millennium goal of halving malnutrition.
The recognition was awarded during the 39th FAO conference in Rome which will last until June 13. It counts among its attendees representatives of 190 countries, including 130 ministers and 12 heads of state.
Attending on behalf of Venezuela, Bolivarian Vice-President Jorge Arreaza highlighted his nation's achievements in eradicating hunger under the socialist governments of Hugo Chavez and Nicolas Maduro.
"Under the Revolution, children are now served breakfast, lunch, and snacks in schools [...] We've seen a miracle in school nutrition, whereas in the past [children were served] only one glass of milk a day," stated the socialist vice-president in reference his country's School Food Program.
According to Arreaza, Venezuela has over the last decade invested $142 billion in food programs that have distributed over 25 million tons of food items to 65% of the population. Today, 95.4% of Venezuelans eat three meals a day.
Venezuela was also recognized for its role in providing technical assistance to other nations striving to similarly meet millennium targets for eradicating hunger.
"Venezuela can be considered one of the countries, like Brazil and China, that has contributed to South-South cooperation in the world," noted Laurent Thomas, FAO Director for Technical Cooperation.
The South American nation was recognized by the FAO first in 2012 for slashing extreme hunger and poverty by 50% and subsequently in 2013 for reducing hunger from almost 14% in 1992 to 5% in 2012.
Arreaza accepted the UN body's recognition on behalf of Venezuelan President Nicolas Maduro, who was compelled to cancel both his appearance at the conference as well as his much-anticipated meeting with the Pope for health reasons.
|
<urn:uuid:5f2aba8b-4490-40dc-8bf6-c6e5e78a3fd9>
|
CC-MAIN-2020-16
|
https://venezuelanalysis.com/news/11410
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370506673.7/warc/CC-MAIN-20200402045741-20200402075741-00095.warc.gz
|
en
| 0.970086 | 388 | 2.515625 | 3 |
Umbria is one of the smallest of the twenty regions of Italy and the only one not to have a coastline. It lies almost exactly at the centre of the peninsula, bordered by Tuscany, Lazio and Le Marche. The Apennines, spine of Italy, cross its Eastern side and the Tiber valley its western side. Such is the range in altitude and hence in weather and temperature that the region's wildlife is surprisingly varied. Umbria is described in tourist brochures as the Green Heart of Italy, an apt description of its wooded hills and well-watered plains.
There are a number of notable towns in Umbria. Not the largest but probably the most famous is Assisi, birthplace of St Francis and a religious centre where monks and nuns, resident or visiting, at times seem to outnumber the secular passersby. The largest town is Perugia, home to a University and a famous chocolate festival, which has given its name to the largest of the two provinces within Umbria. The other province is called Terni, after the second largest town which faces the broad plain of the Nera river. The third largest town is Foligno, on the River Topino and within the province of Perugia. It is the location of our rented office and our day-to-day stamping-ground.
Umbria is particularly well known for its medieval hill-top towns which lie like stranded ships along the crest of a hill, dominating the surrounding countryside. Montefalco is one of the most famous of these, although its fame is due largely to the fact that it is the centre of the area which produces Sagrantino wine. Gualdo Cattaneo, our first home, is another example. Spello and Trevi are two medieval towns where the clean stone buildings rise one above the other on a steep slope to form a display visible from a great distance. Valtopina, our second home, is more modern in its architecture but hosts a nationally renowned annual truffle festival.
Lago Trasimeno, the region's most notable geographical feature, is the largest lake on the Italian peninsula. Shallow and full of fish, it has three islands, two of them inhabited. It is the site where Hannibal engineered a decisive victory against the Romans.
Umbria can be reached by flights to Rome, Florence or Ancona or to Perugia itself. Foligno and Perugia connect via Florence to the main north-south railway line between Milan and Rome. Foligno is also the terminus to a branch line from Ancona. By car, the simplest route is to take the A1 Autostrada from Milan south towards Rome, turning off just south of Florence onto the eastbound Superstrada to Perugia at Lago Trasimeno.
Umbria is usually coupled as a region with its neighbour Tuscany although it is more mountainous, more austere in its landscape and more sparsely inhabited. It is famous for the olive groves covering the hillsides and the production of olive oil, for its woods of oak and sweet chestnut, and for its vineyards.
It is also rich in natural parks which protect the wildlife including wild boar and wolves. It would seem significant that St Francis, patron saint of animals and the environment, should be the best known child of Umbria.
Living in Italy
|
<urn:uuid:4ee29278-7940-4b96-a655-6e7bb8a5ffb4>
|
CC-MAIN-2017-47
|
http://italyhouse.co.uk/index.asp
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934805008.39/warc/CC-MAIN-20171118171235-20171118191235-00651.warc.gz
|
en
| 0.961368 | 702 | 2.515625 | 3 |
Ah, the ancient art of rhetoric. There’s no escaping it. Variously defined as “the art of argumentation and discourse” or, by Aristotle in his fragmented treatise, as “the means of persuasion [that] could be found in the matter itself; and then stylistic arrangement,” rhetoric is complicated. Aristotle’s definition further breaks down into three distinct types, and he illustrates each with literary examples. And if you’ve ever picked up a rhetorical guide—ancient, medieval, or modern—you’ll be familiar with the lists of hundreds of unpronounceable Greek or Latin terms, each one corresponding to some quirky figure of speech.
Well, as usual, the internet provides us with an easier way in the form of the video above of 10 figures of speech “as illustrated by Monty Python’s Flying Circus,” one of the most literate of popular artifacts to ever appear on television. There’s “paradiastole,” the fancy term for euphemism, demonstrated by John Cleese’s overly decorous newscaster. There’s “epanorthosis,” or “immediate and emphatic self-correction, often following a slip of the tongue,” which Eric Idle overdoes in splendid fashion. Every possible poetic figure or grammatical tic seems to have been named and catalogued by those philosophically resourceful Greeks and Romans. And it’s likely that the Pythons have utilized them all. I await a follow-up video in lieu of reading any more rhetorical textbooks.
|
<urn:uuid:a6d0441e-caf8-400c-9ab6-f33cfda43078>
|
CC-MAIN-2014-10
|
http://www.openculture.com/2013/10/10-figures-of-speech-illustrated-by-monty-python-paradiastole-epanorthosis-syncatabasis-more.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999675037/warc/CC-MAIN-20140305060755-00077-ip-10-183-142-35.ec2.internal.warc.gz
|
en
| 0.925196 | 339 | 3 | 3 |
World leaders, great thinkers, activists of every possible political stripe and a large number of media and law enforcement personnel poured into Toronto at the end of June. Though most of them were there for the G-20 summit, about 300 had arrived to attend the 14th annual meeting of the Association for the Scientific Study of Consciousness (ASSC), held at the same time.
The discussions at the ASSC conference will not have the immediate impact on world affairs that those of the G-20 did, but for those who attended it, the central topic was as important as any global issue: The nature of consciousness, perhaps the most fundamental aspect of our existence – and how best to investigate and think about it.
Why are we conscious? What functions does consciousness serve, and how can we tell whether other creatures are conscious? How does consciousness arise from brain activity? What tasks can the brain perform without conscious awareness, and what distinguishes conscious and unconscious mental processes? Though philosophers have grappled with such questions for thousands of years, rigorous scientific research of these issues is a surprisingly recent development.
A difficult pursuit
To do science, you must be able to objectively observe and measure the phenomenon you are interested in; anyone else should be able, in principle, to make the same observations. But how can you measure someone else’s subjective experience? No one has direct access to anyone’s consciousness but his or her own. On top of this, there is no single, widely accepted definition of consciousness.
These two problems are the main reasons that the scientific community had traditionally resisted the idea of devoting time and effort to investigating consciousness. In the last two decades, however, the realization that you cannot ignore such a basic natural phenomenon just because it presents methodological difficulties has gained legitimacy. Consciousness research is now a thriving field, bringing together scientists with backgrounds in psychology, neuroscience, cognitive science and many related fields, as well as philosophers. Ingenious ways to overcome the difficulties inherent to the topic are constantly being thought up, and though this young field still faces formidable challenges, the atmosphere at the ASSC conference reflected a prevalent attitude of optimism and excitement.
The Conference’s participants arrived from over 25 different countries, and, as has become a tradition at the ASSC, comprised about two-thirds scientists and one third philosophers. To many of the attendees, who are used to the narrow specialization of most academic conferences, this mix of backgrounds is one of the ASSC’s greatest attractions: “It is great to have an opportunity to argue with the scientists doing work on the cutting edge of consciousness research,” says Ned Block, a professor at New York University and one of the world’s leading philosophers of mind.
A lot of arguing could indeed be heard over the four days of the conference, but it was nearly all good-natured; my own impression was that although the ASSC attendees were not devoid of the fierce competitiveness that characterizes researchers in so many fields, there was very little of the animosity that such competition often arouses. Perhaps this is a feature of a field where so many of the most basic questions have yet to be resolved.
The heated discussions that followed many of the presentations continued into the social events that took place each evening. “The ASSC was my first international conference, and I could not anticipate that it would be so much fun,” Says Ido Amihai, a graduate student from the Hebrew University in Jerusalem, Israel. Amihai gave a talk on his thesis research, which is based on previous findings that the human brain can process certain visual stimuli, such as faces, without awareness. In his research, Amihai demonstrated that certain aspects of faces – he investigated gender and race – require awareness to affect behavior.
Trends and prizes
Many of those presenting new work at the conference were graduate students and postdocs, in line with the ASSC’s policy of encouraging young researchers. In a special mentoring event on the second day, students were paired with experienced researchers for lunch and a discussion of research and career development.
The William James Prize, awarded annually at the conference for an outstanding published contribution to the empirical or philosophical study of consciousness by a graduate student or postdoctoral scholar, was awarded to Yann Cojan from the University of Geneva in Switzerland during the opening ceremony. Cojan headed a team whose paper, published in the journal Neuron in June 2009, investigated brain activity under hypnosis. In his acceptance lecture, Cojan described the history of hypnosis and its relation to the study of consciousness, before going on to describe his own findings: While undergoing functional MRI, participants were instructed to prepare to move their hand. After a few seconds they were told whether or not to actually perform the movement. Some of the time, they were hypnotized and believed that their hand was paralyzed. Interestingly, when the volunteers were under hypnosis, the preparatory activity in motor cortex was normal; but there was increased activity in other regions related to attention, mental imagery and self-awareness. Moreover, the connectivity between these regions and motor cortex was enhanced, indicating that hypnosis doesn’t work by directly controlling motor activity, but rather through the effects of internal representations and self-monitoring processes on such activity.
Prizes were also given to new research presented at the conference itself by students: a multi-disciplinary panel of judges selected two empirical and two philosophical studies to receive the prestigious awards. Hakwan Lau, an assistant professor at Columbia University in New York and past recipient of the William James prize, points out that the winning studies reflect an interesting trend evident in this year’s conference – an emphasis on metacognition (knowing what you know) and higher-order theories of consciousness.
A great deal of past research on consciousness has in fact been focused on perceptual performance: being able to complete a task has been equated with awareness of the relevant stimuli. However, as a lot of the work presented this year shows, there is a clear distinction between what the brain can achieve, and the neural activity related to awareness of what our brains are doing.
Being conscious of what you know
Lucie Charles, a doctoral candidate from the INSERM-CEA Cognitive Neuroimaging Unit in Paris, France, was one of the student winners. Her research used measures of the brain’s electrical activity to investigate processes related to making mistakes, and how error-related brain activity is modulated by awareness. She asked participants to perform a visual task, and also to evaluate their own performance – whether they thought they had gotten it right or not. By manipulating the time elapsing between the visual stimuli and a meaningless “mask” that followed them, Charles could render the stimuli either clearly visible or very difficult to see. She found that a specific neural signature, believed to indicate the activity of cognitive control mechanisms, was evident when volunteers were aware that they had made an error but absent when they could not consciously report the stimuli. Previous research has shown that the kind of subliminal stimuli used by Charles can be processed by the brain’s visual centers. These new results, however, indicate that subliminal visual stimuli fail to reach higher-order cognitive control stages of processing.
Another winner of the student prize, Stephen Fleming from University College London in the UK, investigated the relationship between metacognition and brain structure. Like Charles, Fleming also had his volunteers perform a visual task. By adjusting the difficulty of the task online, he was able to keep all his volunteers’ performance at equal levels. When he asked them how sure they were of how well they were doing, however, there was a wide variety of confidence levels. Fleming measured his participants’ metacognitive sensitivity – how appropriate one’s confidence is (comparing rates of high confidence after correct and incorrect responses). Fascinatingly, he found a correlation between metacognitive sensitivity and the size of brain structures in the frontal and cingulate cortices, as well as the level of connectivity between frontal regions in the brain’s two hemispheres. Knowing what you know, therefore, may depend on the brain’s structure and not just its activity.
Another interesting study, presented by Helene Gauchou, a postdoctoral researcher at the University of British Columbia in Vancouver, Canada, examined whether people know more than they are aware of. Gauchou used an unconventional method: The Ouija board, commonly used in séances where people place their hands on an overturned cup and move it around a board of letters, spelling out words without conscious intention. In séances, the responses are often surprisingly sensible – prompting believers to attribute them to spiritual influences. It is now well established, however, that what is really at work here is something called the ideomotor effect: Participants move the cup themselves, but having other people also touch the cup enables them to lose a sense of responsibility (or “agency”) for the movement. Gauchou asked volunteers to use a Ouija board to answer general knowledge yes/no questions. Another person initially touched the cup, so the volunteers could believe it wasn’t them causing the movement. Then Gauchou blindfolded them, and the other person (actually an experimenter) removed his hands. Astonishingly, volunteers’ performance on questions they claimed they didn’t know the answers to was significantly better than chance. This did not happen when they simply answered such questions verbally. A lot of our memory, says Gauchou, is implicit: We know stuff we have forgotten that we know, but these results show that we can still access such knowledge.
A multitude of perspectives
The abundance of new research at the conference left no choice but to have presentations in parallel sessions, meaning that three different talks went on at the same time. The organizers did an admirable job of trying to make these sessions focus on different topics, so everyone could attend the ones they were interested in – but for many of the attendees, part of the fun came from being exposed to research outside their own day-to-day topics of investigation. (I gave a talk myself, and must admit I was quite disappointed when I realized I really wanted to see both of the other talks that took place at the same time as mine)!
Some cutting-edge issues, however, were discussed in symposia attended by everyone. Among these was a discussion chaired by Antoine Lutz from the University of Wisconsin, Madison, on the potential of research on meditation to contribute to understanding consciousness. In a different symposium, on physiological approaches to consciousness research, Alex Maier from the National Institute of Health in Bethesda, Maryland, presented new work in which he used both intracranial electrodes and fMRI to measure activity in monkey brains, resolving some previously-reported discrepancies between these two methods. Naotsugu Tsuchiya from the California Institute of Technology presented new research that used electrode arrays implanted in humans (a common procedure before some kinds of brain surgery). This kind of research was also described by Robert Knight from the University of California, Berkeley, who was one of the conference’s keynote speakers. Keynote speakers are usually invited because they work in a somewhat different field, but can give an illuminating, outsider’s point of view. Other keynote speakers included Nicola Clayton from the University of Cambridge, UK, who talked about the remarkable cognitive abilities of birds (specifically, crows); and Morris Moscovitch from the University of Toronto, who discussed the relationship between memory and consciousness, drew from fascinating findings on memory in brain-damaged patients.
The conference ended with an after-party at a local bar, many excited farewells and promises to keep in touch and meet again at next year’s ASSC conference, which will be held in Kyoto, Japan.
|
<urn:uuid:690465ee-8e82-476a-b4d5-8d2b56cf2f77>
|
CC-MAIN-2014-15
|
http://thebeautifulbrain.com/2010/07/summit-of-consciousness/
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223206770.7/warc/CC-MAIN-20140423032006-00317-ip-10-147-4-33.ec2.internal.warc.gz
|
en
| 0.971307 | 2,426 | 2.609375 | 3 |
HIST:314 African-American History.
Surveys the experience of African-Americans from the origins of slavery to the debate over affirmative action. Considers slavery, black abolition, blacks during the Civil War and their transition to freedom. Also covers life under institutional restrictions such as segregation and disenfranchisement, the Civil Rights and Black Power movements, and the changing cultural expressions of African-Americans. Prerequisite: 100-level history course or instructor’s permission. 4 SH.
|
<urn:uuid:7d77e3f4-0b84-4ade-be56-3b5f91e5cc62>
|
CC-MAIN-2014-23
|
http://www.susqu.edu/catalog/hist314-african-american-history.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510276353.59/warc/CC-MAIN-20140728011756-00408-ip-10-146-231-18.ec2.internal.warc.gz
|
en
| 0.880453 | 99 | 3 | 3 |
Cooperation in security and defence between Finland, Sweden and the USA – both bi- and trilaterally – has significantly increased in recent years. Cooperation has deepened on all levels from strategic dialogue to operative exercises and tactical training.
Formalizing trilateral cooperation produces administrative, practical and military advantages, but it also carries political significance.
The trilateral cooperation can advance in leaps and bounds over the coming years, as long as it increases all three countries’ security and advances their regional interests.
Thus far, domestic politics in Finland, Sweden and the United States have had little impact on the cooperation, other than by supporting it. Due to reasons pertaining to their domestic politics, however, the countries communicate the significance of the cooperation in different ways.
|
<urn:uuid:f5082f2f-cb6b-4a26-bb0a-d9efb1585b7a>
|
CC-MAIN-2023-40
|
https://www.fiia.fi/sv/publikation/suomen-ruotsin-ja-usan-turvallisuuspoliittinen-yhteistyo
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511361.38/warc/CC-MAIN-20231004052258-20231004082258-00319.warc.gz
|
en
| 0.966549 | 151 | 2.640625 | 3 |
Enduring Drought in the South
The southern United States is experiencing some very dry times. Record high temperatures and below average rain fall have set off timber fires in Georgia, scorched crops in New Mexico and crippled wildlife populations and over-burdened electricity grids in Texas. And experts say this extreme weather could be here for a while.
A map that monitors drought, stains the state of Texas deep red. Nearly 250,000 square miles are listed at the highest intensity of drought- D4: Exceptional. This is the worst drought-year on record; July was the hottest month and 2010-2011 was the driest year since Texas started keeping records in 1895. The strain of cooling homes and offices has sent the state’s electricity meters surging past levels not expected till 2014, just avoiding the need to call for rolling blackouts. Farmers of wheat, cotton and peanuts are all expecting thin harvests. Ranchers have moved cattle across state lines, to Kansas, for water.
Though 2011 has been extreme, Texas has endured similar droughts for much longer. Many long time Texans remember the decade-long drought of the late 1940’s and 50’s, known as the Drought of Record. But before the Drought of Record, before any drought records, and before the Lone Star was a gleam in America’s eye, actually- even before there was America; Texas trees logged the dryness.
The science of tree rings: dendrochronology, tells us that there have been several decade-long droughts in Texas history; the worst being 1716-1725; the worst 20 year drought happened between 1697-1716. And just a few years before Columbus’ first voyage, the Texas-Mexico region was just emerging from a half-century long drought. Doian Burnette, an instructor of Geo Sciences at the University of Arkansas describes the life of these trees as "longevity under adversity." Which could be the forecast for all life here. Climatologists attribute the current drought to the La Nina weather pattern. Experts say there's a 50 percent chance the same system will continue into the fall.
Living on Earth wants to hear from you!
Living on Earth
62 Calef Highway, Suite 212
Lee, NH 03861
Newsletter [Click here]
Donate to Living on Earth!
Living on Earth is an independent media program and relies entirely on contributions from listeners and institutions supporting public service. Please donate now to preserve an independent environmental voice.
NewsletterLiving on Earth offers a weekly delivery of the show's rundown to your mailbox. Sign up for our newsletter today!
Sailors For The Sea: Be the change you want to sea.
Creating positive outcomes for future generations.
Innovating to make the world a better, more sustainable place to live. Listen to the race to 9 billion
The Grantham Foundation for the Protection of the Environment: Committed to protecting and improving the health of the global environment.
Energy Foundation: Serving the public interest by helping to build a strong, clean energy economy.
Contribute to Living on Earth and receive, as our gift to you, an archival print of one of Mark Seth Lender's extraordinary wildlife photographs. Follow the link to see Mark's current collection of photographs.
Buy a signed copy of Mark Seth Lender's book Smeagull the Seagull & support Living on Earth
|
<urn:uuid:906560d0-f3d3-4f19-bf5f-74dab031a302>
|
CC-MAIN-2023-23
|
https://www.loe.org/blog/blogseries.html?seriesID=52
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648000.54/warc/CC-MAIN-20230601175345-20230601205345-00570.warc.gz
|
en
| 0.918746 | 728 | 3.46875 | 3 |
Pronunciation: (sub-mûrjd'), [key]
1. under the surface of water or any other enveloping medium; inundated.
2. hidden, covered, or unknown: There are many submerged facts which could have a bearing on the case.
3. poverty-stricken; destitute; impoverished: a program to aid the submerged socioeconomic groups.
Random House Unabridged Dictionary, Copyright © 1997, by Random House, Inc., on Infoplease.
|
<urn:uuid:3b789c50-6ef9-4a42-a2b8-4e81b0ee02c2>
|
CC-MAIN-2014-41
|
http://dictionary.infoplease.com/submerged
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657110730.89/warc/CC-MAIN-20140914011150-00087-ip-10-196-40-205.us-west-1.compute.internal.warc.gz
|
en
| 0.868152 | 104 | 2.890625 | 3 |
Chemical Weapons Convention: Achievements and Future Challenges
The Chemical Weapons Convention which marked its tenth anniversary on April 29 bans the development, production, acquisition and use of chemical agents (e.g. Vesicants and nerve agents) and requires the destruction of existing stockpiles.
Chemical weapons, like the other weapons of mass destruction have all the inhumane features which represent a serious danger to mankind. Chemical warfare agents have been defined in a report authorized by the United Nations General Assembly as “chemical substances, whether gaseous, liquid, or solid, which might be employed because of their direct toxic effects on human, animals and plants.” These toxic chemical agents, which are extremely versatile, may be used to accomplish a wide variety of military missions and can be used by terrorists to perpetrate death and fear. Characterized as ‘search weapons’, they are able to penetrate shelters, buildings, trenches, bunkers and other types of fortifications; they are also capable of inflicting casualties over large areas. Chemical weapon agents are largely invisible and indiscriminate in their effects, and tend to undermine the body from within.
CWs offer a prospect of killing or incapacitating enemies and civilians without damaging vital economic and military structures. Above all, chemical weapons inspire more fear than conventional munitions; they could terrorize civilian populations and demoralize ill-trained or poorly protected combat units.
On the occasion of CWC’s tenth anniversary, the United Nations Secretary General Ban Ki-Moon urged countries including 182 State parties which possess the CWs to destroy them while observing that little more than 25 percent of declared chemical weapons stockpiles have been destroyed so far. He further stated that CWC has made important gains in eliminating an entire category of weapons of mass destruction (WMD), praising the OPCW (Organization for the Prohibition of Chemical Weapons) under which treaty carrying out the ban and destruction.
The OPCW, based in The Hague, have reportedly completed over 2,800 inspections at more than 1,050 facilities (200 CW related and 850 industrial sites) on the territory of 77 States Parties since April 1997. The goal for the complete chemical disarmament has been set and expected to be achieved by April 2012, in the next five years.
Since its entry into force in 1997, the CWC has involved 182 Member States in its fold. At least six countries have confirmed the availability of chemical weapons that make the total 70,000 tonnes in the world with Russia topping the list with 40,000 tonnes and the United States with 27,000 tonnes of chemical weapons.
India, as it is well known now, has an advanced commercial chemical industry. Although India denied possession of CW for many years, in 1997, India declared possession of a CW stockpile and production facilities. These weapons and facilities were put under strict international supervision by the OPCW and presently in the process of being destroyed. One report suggests that India has declared around 1,044 metric tons of CW and till mid last year India managed to destroy at least 550 metric tons of CW, which is well above the fifty percent of stockpiles. Latest information indicated that one hundred percent of declared chemical weaponry facilities have been decommissioned and over 90% of them have been eliminated. The OPCW has controlled the disposal of nearly one-fourth of the world declared chemical weapons, which amount to approximately 71,000 metric tonnes of war agents.
The Second Review Conference of CWC scheduled to take place in The Hague from 7-18 April 2008. However, CWC’s noteworthy achievements aside, experts believe that there are more challenges in store for it in the coming years ahead. Some even pointed out that the problem areas are the lack of universal adherence, slower destruction CW stockpiles, emergence of novel chemical agents and last but not the least, ultimate threat posed by Non State actors( e.g. terrorists, criminal syndicates). The Sarin gas attacks by Aum Shinrikyo cult on the Tokyo Subway in March 1995 is still vivid in the memory of millions and has certainly raised public awareness of the threat posed by CWs. Nevertheless, it would be imperative for the State parties to see how OPCW’s significance (or for that matter CWC’s relevance) will increase in the face of these debilitating challenges in future.
|
<urn:uuid:20a73b82-1384-44b8-8536-049cd28c096d>
|
CC-MAIN-2023-50
|
http://www.sspconline.org/opinion/ChemicalWeaponsConvention_SSPC_030507
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100489.16/warc/CC-MAIN-20231203062445-20231203092445-00662.warc.gz
|
en
| 0.952874 | 879 | 3.203125 | 3 |
Many fish cannot be harvested with present-day gear because the species are
scattered over wide areas. Experiments with pelagic fish show that it may be
possible to attract large numbers of fish at night to a series of buoys or rafts
with pulsating lights. Then the pulsations would move the fish to a suction
hose attached to a factory processing vessel.
|
<urn:uuid:b001663f-4d17-4303-bf51-f4e85783db71>
|
CC-MAIN-2014-35
|
http://www.photolib.noaa.gov/htmls/fish7959.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500826322.0/warc/CC-MAIN-20140820021346-00161-ip-10-180-136-8.ec2.internal.warc.gz
|
en
| 0.936486 | 80 | 2.609375 | 3 |
A municipality in Colombia was long-known for citizens who displayed what was thought to be “foolish behavior.” Until doctors discovered they were carriers of a gene mutation called Fragile X.
For decades the rural town called Ricaurte had developed a reputation for having ‘offbeat’ citizens who exhibited strange conduct. Then they became the central focus of a scientific study that revealed they were victims of a gene mutation.
It’s called Fragile X Syndrome. And it’s a leading cause of physical, social and intellectual abnormalities.
Correspondent Michelle Begue traveled to the town of Ricaurte to bring us this report.
|
<urn:uuid:5cc096e3-394b-4353-be27-694c09283a91>
|
CC-MAIN-2020-34
|
https://america.cgtn.com/2019/01/20/colombian-town-has-high-number-of-residents-with-fragile-x-syndrome
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439740838.3/warc/CC-MAIN-20200815094903-20200815124903-00024.warc.gz
|
en
| 0.97349 | 137 | 2.6875 | 3 |
Facilities for Farmers in Garhwal Bhabhar
Characteristics of Kham Settlement in Garhwal Bhabhar -4
itish Administration in Garhwal -80
History of British Rule/Administration over Kumaun and Garhwal (1815-1947) -98
History of Uttarakhand (Garhwal, Kumaon and Haridwar) -935
With the increase in numbers of canals, the farming community started settling in Bhabhar Garhwal. British offered same facilities to famers in Garhwal Bhabhar as in Kumaun Bhabhar. After receiving the request letter from interested farmer, the officers used to demark the land. Then the famers were free for cutting trees and shrubs. Farmers used make land for farming and government did not take rent for initial two crops. Officials used to fix rent after three crops.
Slowly, there was sizable increase in adventurous farmers. Those farmers were mostly Garhwali or Kumaunis. The applicant after getting permission used to call his relative for farming. The permitted farmer used to keep some portion of land for him and used to divide balance land among his relatives came for farming. Kumauni farmers used to return back to their hill villages in summer till rainy season ended but mostly, Garhwali famers used to stay in Bhabhar for whole year. A few Garhwali farmers used to send back their family members to hill villages after harvesting Ravi crop.
Asamis or farmers used to provide plough, bulls, seeds etc to Sajha man and used to offer one fourth crop to Sajha man. Sajha used to pay rent of the land. Usually Sajha were from Harijan (scheduled caste) communities of Garhwal or cobblers from Bijnor region (Joshi).
Applicant Farmers were from upper caste only.
Grig wrote that Garhwali Sirgiroh were better than Kumauni Sirgiroh.
Copyright@ Bhishma Kukreti Mumbai, India, email@example.com 9/
History of Garhwal – Kumaon-Haridwar (Uttarakhand, India) to be continued… Part -936
*** History of British Rule/Administration over British Garhwal (Pauri, Rudraprayag, and Chamoli1815-1947) to be continued in next chapter
(The History of Garhwal, Kumaon, Haridwar write up is aimed for general readers)
1-Shiv Prasad Dabral ‘Charan’, Uttarakhand ka Itihas, Part -7 Garhwal par British -Shasan, part -1, page- 249-278
2-Trail, Sketch of Kumaon, Asiatic Researches Vol.16 page 207
3- Walton, Garhwal Gazetteer page 150, 151
4- Bhawani Datt Joshi, Report on the Revision of Rent in Garhwal-Bhabhar page -13
History of British Rule, Administration , Policies, Revenue system, over Garhwal, Kumaon, Uttarakhand ; History of British Rule , Administration , Policies Revenue system over Pauri Garhwal, Udham Singh Nagar Kumaon, Uttarakhand; History of British Rule, Administration, Policies ,Revenue system over Chamoli Garhwal, Nainital Kumaon, Uttarakhand; History of British Rule, Administration, Policies ,Revenue system over Rudraprayag Garhwal, Almora Kumaon, Uttarakhand; History of British Rule, Administration, Policies ,Revenue system over Dehradun , Champawat Kumaon, Uttarakhand ; History of British Rule, Administration, Policies, ,Revenue system over Bageshwar Kumaon, Uttarakhand ;
History of British Rule, Administration, Policies, Revenue system over Haridwar, Pithoragarh Kumaon, Uttarakhand;
|
<urn:uuid:dd95c2b0-c41f-415c-83a0-19b109947973>
|
CC-MAIN-2017-43
|
http://e-magazineofuttarakhand.blogspot.com/2016/12/facilities-for-farmers-in-garhwal.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824819.92/warc/CC-MAIN-20171021133807-20171021153807-00697.warc.gz
|
en
| 0.882632 | 850 | 2.984375 | 3 |
something From United Kingdom, joined May 2011, 1633 posts, RR: 20 Posted (7 months 4 weeks 16 hours ago) and read 2485 times:
The many threads about aircraft hitting each other or clipping their wings as of recent got me thinking: Why don't manufacturers simply install little sensors on aircraft (nose, tail, wings) that would, similar to the park distance control in cars, auto-brake the aircraft or at least give an audible warning before an impending impact?
I understand that great new ground control technologies are currently being developed and installed on many airports but as this technology will never be available on all airports, wouldn't it make sense to install something as simple, cheap and light as ''radar distance control''?
(Dubai has a ground radar that would make a taxiway blink red on the screen if an aircraft too large for it enters it, or if there is conflicting traffic.)
oly720man From United Kingdom, joined May 2004, 6517 posts, RR: 11 Reply 1, posted (7 months 4 weeks 15 hours ago) and read 2377 times:
Interesting idea, but.....
it would probably be hampered by the effective range that it would operate over - the ones in cars start working at a couple of metres, if that. Given the speed an aircraft may be taxiing at and the size of a target (wing tip or tailplane) it would probably struggle to "see" anything in time to be effective (assuming it would use ultrasound like the car ones. Ultrasonic sensors can work to about 15 metres in a fairly narrow cone, but the repetition rate goes down with increasing distance because of the speed of sound). Beyond that you're using lasers/light and optical detectors and they have their own issues - you need to spread the beam enough in order to cover a wide enough area to get a reflection, and the more you spread a laser beam, the less strength there is in the return signal. You may, possibly, use the wing tip lights, but again, any reflected light will be negligible given the size of what may be hit (wing tip/tailplane) and the system may be confused by the light signal from other aircraft which also have wing tip lights.
There's no guarantee that it would work every time and it's something else to go wrong. And after you add up all the potential problems (including the design of something that may spend its life at temperatures ranging from -60C to +45C and withstanding everything else that an aircraft goes through) it won't end up being cheap.
aklrno From United States of America, joined Dec 2010, 820 posts, RR: 0 Reply 2, posted (7 months 3 weeks 6 days 5 hours ago) and read 1965 times:
I'll bet people will be laughing about how primitive our airport ground control is today in about 10 years. There are lots of ways to do this, but of course everything on airplanes is expensive and must be tested to exacting standards (certain batteries excepted.)
In addition to sonar and radar, I think about what a lot of computing power can do for you. For example, imagine if every transponder equipped aircraft could also broadcast it's type, latitude, longitude, and the direction it is facing every few seconds. Using ethernet-like technologies you could work out a system to prevent one signal from obscuring others.
Fixed objects (light towers, buildings, etc.) could be loaded into a database for every airport.
Simple software could then give pilots and ATC an accurate map of where everything is, and for things that are moving, an appropriate warning of what action to take (like TCAS).
The ground database is difficult to build, but not out of the price range for an airport. Most of the data to be broadcast is available on board the aircraft in its GPS. Differential GPS can get the accuracy down to a centimeter or so. Figuring out how to do the nearly continuous transmissions is a bit of a project, but doable. The receiver and computer to work out the warnings is certainly doable and not too expensive. The display can go on one of the existing cockpit displays.
I am generous and will not patent this, my gift to the world (just joking). In any case, I predict this or something like it within 10 years.
|
<urn:uuid:084b358f-e2af-4142-aec0-f7d82ba70aa9>
|
CC-MAIN-2013-48
|
http://www.airliners.net/aviation-forums/tech_ops/read.main/332680/1/
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164004837/warc/CC-MAIN-20131204133324-00075-ip-10-33-133-15.ec2.internal.warc.gz
|
en
| 0.955831 | 891 | 2.828125 | 3 |
Talking to Children about Death
What Can My Child Understand? continued...
3- to 5-year-olds have response that are shaped by the way they see the world:
- They are magical thinkers and don't understand the difference between fantasy and reality. They may believe death is temporary or reversible.
- They are ego-centric and may believe the death of a sibling is punishment for something they did.
Tips for helping 3- to 5-year-old siblings cope with their feelings about a sick or dying child:
- Use concrete language, such as "die," not euphemisms such as "sleep."
- At this age a child can understand "Your brother's body stopped working"; "Your sister stopped breathing."
- Make it clear to siblings that the death is not a consequence of something they did.
6- to 9-year-olds have a more evolved sense of dying:
- They ssociate death with old age. They may not understand that they or a sibling could die.
- They know more about how the body works, so they may have specific questions about how someone dies. A sibling may think that a bruise on his own body indicates the same illness a brother or sister had.
- They may associate death with frightening images from cartoons, such as ghosts and spirits.
Tips for helping 6- to 9-year-old siblings understand their feelings about a sick or dying child:
- Use visual aids they can understand. Child life specialists have used marshmallows to explain tumor growth or described leukemia as a thickening of the blood.
- Make specific references to organs like heart and lungs.
- Make clear that death is not like the images in cartoons.
- Make clear to siblings that what happened to a brother or sister doesn't happen to everyone.
10- to 12-year-olds understand the permanence of death:
- They know that death is final and will happen to everyone including themselves.
- They understand that their own death or the death of a sibling will cause sadness in others. A sick child at this age may say he has to hold on for his parents' sake.
- They will respond more like adults with anger, sadness, and fear.
- They will have increasingly more specific questions about the illness and about death.
- They can find information on their own.
Tips for helping 10- to 12-year-old siblings of a sick or dying child:
- Find opportunities for constructive venting of feelings, such as sibling groups at hospitals and art or play therapies.
- Provide as much specific, factual information as possible.
- Keep siblings in regular routines as much as possible. It may not seem like long, but professionals advise that children under 12 not miss more than a week of school after a sibling has died. But they acknowledge that each child has unique needs.
- After a death, make sure siblings still have a clear role in the family, but don't let them take on a parent's role.
|
<urn:uuid:b0075e2b-82c4-4fcf-89c3-db16332b53a4>
|
CC-MAIN-2014-10
|
http://www.webmd.com/palliative-care/talking_to_children_about_death?page=3
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394678686979/warc/CC-MAIN-20140313024446-00046-ip-10-183-142-35.ec2.internal.warc.gz
|
en
| 0.97091 | 619 | 3.359375 | 3 |
Nano Hummingbird UAV Takes Flight
An unmanned aerial vehicle that mimics a hummingbird in size, appearance and propulsion has finally been unveiled.
AeroVironment Inc, a US company that specialises in unmanned air systems, developed the NAV prototype after being awarded a Phase II contract by DARPA in 2008.
At a cost of $4 million, the remote vehicle – appropriately named ‘Hummingbird’ after its biological forebear – beats its wings to remain airborne, can manoeuvre in all directions, and is...
To continue reading this story get free access
|
<urn:uuid:23151e89-e28b-4c71-8b55-757c8f0db961>
|
CC-MAIN-2020-24
|
https://www.defenceiq.com/air-forces-military-aircraft/articles/nano-hummingbird-uav-takes-flight
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347419593.76/warc/CC-MAIN-20200601180335-20200601210335-00362.warc.gz
|
en
| 0.941331 | 121 | 2.5625 | 3 |
Nowadays there are hundreds of different brands of sunscreens available for use. These products usually contain one or more active chemicals that absorb or block harmful UV rays, fragrances, preservatives and a base such as lanolin (wool alcohols). With their increasing use over the last few decades it is not surprising to see contact allergic dermatitis due to these products.
What causes sunscreen allergy?
Contact allergic dermatitis to sunscreens can occur as a result of an allergy to any one of the many ingredients found in these products. Some of the chemical absorbers used in topical sunscreens may be more sensitizing to some individual than others. In addition, individuals may also have a sensitivity to the fragrances and preservatives found in sunscreens.
What are the reactions to sunscreen allergy?
Typical allergic contact dermatitis may occur in individuals allergic to any of the ingredients that are found in sunscreen products or cosmetic preparations that have a sunscreen component. The rash can occur anywhere on the body where the substance has been applied and sometimes may spread to unexpected sites.
In some cases, sunscreen allergy may cause a photocontact dermatitis in which the areas affected usually occur in a sun-exposed pattern on the body and where sunscreen has been applied. These areas often include the face, arms, backs of the hands, “V” shaped area of the upper chest and lower neck. Usually the upper eyelids, area under the chin and behind the ears are not affected.
Am I allergic to sunscreens?
Due to sunscreen products containing multiple active ingredients it is often difficult to determine the cause of dermatitis. Patch testing for the individual component is the only exact method for determining which of the chemicals the allergen is.
Patch testing and photopatch testing of topical sunscreen preparations may be performed if the active sunscreen ingredient is the suspected allergen. The prevalence of allergy to chemical absorbers in sunscreens is not known for the general population, however, in patch test clinics the prevalence of allergy to the active sunscreen component appears to be quite low. On the other hand, photopatch testing shows sunscreen chemical absorbers to be a common cause of photoallergic contact dermatitis. Hence it is important to carry out photopatch testing in addition to patch testing.
Many allergies to sunscreen products are caused by the inactive components such as the fragrances or preservatives that are used. Patch testing using fragrance mix and Balsam of Peru detects approximately 75% of fragrance allergy cases. A positive patch to fragrance mix indicates that you are allergic to one or more fragrance chemicals. An estimated 1-2% of the general population is allergic to fragrance.
Self-testing a product for sunscreen allergy is possible but should be done only after first talking with your doctor. Apply a small amount (50 cent sized area) of the product to a small tender area of skin such as the bend of your arm or neck for several days in a row. Examine the area each day and if no reaction occurs, it is unlikely you are allergic to it. However, it may still not be suitable for you as it can still cause irritant contact dermatitis.
Treatment of dermatitis caused by sunscreen allergy
Once the dermatitis appears on the skin, treatment is as for any acute dermatitis/eczema, i.e. topical corticosteroids, emollients, treatment of any secondary bacterial infection (Staphylococcus aureus), etc.
What should I do to avoid sunscreen allergy?
If you have a sunscreen allergy the best way to avoid any problems is by avoiding all products that contain any of the substances that you have a sensitivity to.
If you have a sunscreen allergy, physical blocking agents such as titanium dioxide and zinc oxide may be suitable. These have not been reported to cause allergic contact dermatitis. Although cosmetically less pleasing, they have been proven to be safe and effective sunscreen agents.
Your dermatologist may have further specific advice, particularly if you are highly sensitive to sunscreen products.
Draft 24 July 2012
- Book: Fisher's Contact Dermatitis. Ed Rietschel RL, Fowler JF. Lippincott Williams & Wilkins 2001
On DermNet NZ:
Specific sunscreen chemicals:
- Benzophenone allergy
- Cinnamate allergy
- Salicylate allergy
- Avobenzone allergy
- Bemotrizinol allergy
- Bisoctrizole allergy
- Ecamsule allergy
- Ensulizole allergy
Other relevant pages:
- T.R.U.E. tests
- Allergy New Zealand
- Occupational Dermatology Research and Education Centre, Australia
- Allergic contact dermatitis – Medscape Reference
Books about skin diseases:
See the DermNet NZ bookstore
|
<urn:uuid:9298328f-4f08-41b1-904e-3442229826e0>
|
CC-MAIN-2014-10
|
http://www.dermnetnz.org/dermatitis/sunscreen-allergy.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394011239452/warc/CC-MAIN-20140305092039-00057-ip-10-183-142-35.ec2.internal.warc.gz
|
en
| 0.917166 | 994 | 3.015625 | 3 |
- Nicotine and Weight Loss
- The Science Behind Nicotine and Weight Loss
- The Risks of Using Nicotine for Weight Loss
- Nicotine and Appetite
- Nicotine Suppresses Appetite
- Nicotine Withdrawal and Increased Appetite
- Weight Gain and Smoking Cessation
- Brain Connection
- The Role of the Brain in Quitting Smoking and Weight Gain
- Strategies for Managing Brain Connection
- Dopamine and Reward
- Reward System
- Anxiety and Stress
- Links to Weight Gain
- Strategies to Manage Stress
- Cravings and Withdrawal
- The Science behind Cravings
- The Role of Withdrawal in Weight Gain
- Changing Brain Circuitry
- Neuroplasticity: The Brain’s Ability to Adapt
- Cognitive Behavioral Therapy
- Exercise and Nutrition
- Eating to Overcompensate
- Why do ex-smokers gain weight?
- The science behind overcompensation
- Metabolism and Energy
- What is metabolism?
- How does metabolism affect weight gain?
- The link between quitting smoking and metabolism
- Hormones and Hunger
- Psychological Factors
- Stress and Anxiety
- Behavioral Patterns
- Self-Image and Fear of Success
- The Role of Genetics
- Individual Differences in Weight Gain
- Genetic Predisposition to Weight Gain
- The Impact of Gene-Environment Interactions
- Implications for Smoking Cessation Programs
- Strategies to Prevent Weight Gain
- 1. Exercise Regularly
- 2. Monitor Caloric Intake
- 3. Limit Alcohol Consumption
- 4. Practice Mindful Eating
- 5. Seek Support and Accountability
- Health Risks of Excess Weight
- Heart Disease and Stroke
- Type 2 Diabetes
- Joint Problems
- Sleep Apnea
- Reducing Health Risks
- Questions and Answers:
Blame the Brain: Why Many People Who Try to Quit Smoking Gain Weight
Smoking cigarettes is one of the most harmful habits one can engage in. It’s no secret that smoking causes cancer, heart disease, and a range of other health problems. Therefore, quitting smoking should be viewed as a positive step towards better health. However, many people who quit smoking find that they gain weight—and it’s not just a few pounds.
In fact, studies show that the average person who quits smoking gains about 10 pounds within six months and may continue to gain weight for up to a year after quitting. This can be incredibly discouraging for those who have just quit smoking and are trying to maintain a healthy lifestyle.
So why does this happen? Many people assume that it’s because quitting smoking leads to a decrease in metabolism. While that can be part of the issue, research suggests that something much more complicated is at play—our brains.
The brain is responsible for regulating our appetite and metabolism, and it’s also affected by the chemicals found in cigarettes. When we quit smoking, the brain goes through a transition period, and it can take several months for it to adjust to the new normal. During this time, the brain becomes more likely to send hunger signals, leading to overeating and, ultimately, weight gain.
Understanding how the brain affects our appetite and metabolism can be key to overcoming the weight gain that often comes with quitting smoking. By being aware of these effects, we can make healthier food choices, exercise regularly, and develop a plan for maintaining our weight.
Nicotine and Weight Loss
The Science Behind Nicotine and Weight Loss
Nicotine has been known to suppress appetite and increase metabolism, making it easier for smokers to maintain their weight or even lose weight.
When nicotine is inhaled, it activates the sympathetic nervous system, which stimulates the release of adrenaline and other hormones that increase metabolic rate and suppress appetite.
Nicotine also affects the reward pathways in our brain, increasing the pleasure we get from food and reducing cravings for sweet and salty foods.
The Risks of Using Nicotine for Weight Loss
While nicotine may help with weight loss, it is important to note that smoking and using nicotine products are harmful to our health in many other ways.
Smoking is a leading cause of cancer, respiratory diseases, and heart disease. In addition, nicotine is highly addictive and can lead to dependence and withdrawal symptoms when trying to quit.
Using nicotine products for weight loss is not a safe or recommended option, and individuals should instead focus on healthy eating and regular exercise to achieve and maintain a healthy weight.
Nicotine and Appetite
Nicotine Suppresses Appetite
Nicotine is a natural stimulant that is found in tobacco leaves. It is known to suppress appetite and increase metabolism, which are some of the reasons why people smoke in the first place. Nicotine affects the body’s levels of neurotransmitters, such as dopamine and acetylcholine, which are associated with hunger and reward.
Nicotine Withdrawal and Increased Appetite
When someone quits smoking, they go through nicotine withdrawal, which can cause intense cravings and increased appetite. This is because the body is used to nicotine suppressing hunger signals, and without it, the signals can become overwhelming. People who quit smoking may also experience changes in taste perception, making food more appealing and potentially leading to overeating.
- Nicotine withdrawal generally lasts 1-3 weeks
- It is important to have healthy snacks on hand to avoid overeating
- Drinking water and staying active can also help reduce cravings
Weight Gain and Smoking Cessation
Studies have shown that people who quit smoking may gain an average of 5-10 pounds in the first few months. However, the health benefits of quitting smoking far outweigh any temporary weight gain. It is important to maintain a healthy diet and exercise routine to minimize weight gain and ensure overall health and wellbeing.
|Factors that contribute to weight gain after quitting smoking:|
|Increased appetite: as previously mentioned, nicotine withdrawal can cause increased appetite which can lead to overeating|
|Slower metabolism: the body’s metabolism may slow down after quitting smoking which can lead to weight gain|
|Lack of physical activity: smoking cessation can cause fatigue and lack of energy which can lead to a reduction in physical activity levels|
The Role of the Brain in Quitting Smoking and Weight Gain
Research has shown that the brain plays a significant role in both quitting smoking and weight gain. This is because the brain’s reward system is closely connected to behavior, including addiction and eating habits.
How it works: When someone quits smoking, the brain experiences a disruption in the release of dopamine, a chemical responsible for pleasure and reward. This can lead to a decrease in motivation and an increase in cravings, which can ultimately result in weight gain.
Strategies for Managing Brain Connection
To successfully manage the connection between the brain, quitting smoking, and weight gain, it’s important to focus on strategies that can help regulate dopamine levels and support healthy habits.
- Exercise: Physical activity has been shown to regulate dopamine levels in the brain, which can help reduce cravings and promote weight management.
- Healthy Eating: Eating a well-balanced diet can also help support healthy dopamine levels and reduce the likelihood of weight gain.
- Behavioral Therapy: Counseling or therapy can help individuals develop coping strategies for managing cravings and addressing underlying issues that may be contributing to the addiction or weight gain.
Implementing these strategies can help break the cycle of addiction and weight gain by supporting healthy brain chemistry and promoting lifestyle changes that support overall health and wellness.
Dopamine and Reward
Dopamine is a neurotransmitter that plays a key role in how we perceive pleasure and reward. It is released in response to various stimuli, such as food, sex, and drugs, and gives us a feeling of pleasure and satisfaction.
The reward system in our brain is tied closely to dopamine. When we experience something rewarding, such as eating a tasty meal or receiving a compliment, our brain releases dopamine in the anticipation and experience of the reward.
The reward system is critical for survival. It motivates us to seek out things that are necessary for our survival, such as food, water, and social interaction. It also reinforces behavior that leads to a positive outcome, such as studying hard for a test or exercising regularly.
However, this same reward system can be hijacked by addictive substances, such as nicotine. Nicotine causes a surge of dopamine in the brain, which creates intense feelings of pleasure and reinforces the behavior of smoking. Over time, the brain becomes dependent on nicotine to release dopamine, leading to addiction.
Overall, our brain’s reward system and dopamine play a crucial role in our behavior and motivation. However, addiction can hijack this system, leading to harmful consequences.
Anxiety and Stress
Links to Weight Gain
Anxiety and stress are two factors that can contribute to weight gain when attempting to quit smoking. When people feel anxious or stressed, they may crave high-calorie foods and substances. This may lead to overeating and weight gain.
Stress also affects the body’s metabolism, causing it to slow down. This means that fewer calories are burned, making it easier to gain weight.
Strategies to Manage Stress
Managing stress is an important part of successfully quitting smoking without gaining weight. One strategy is to engage in physical activity such as yoga or taking a walk in the park. Exercise produces endorphins, which can help reduce stress levels.
Another strategy is to practice relaxation techniques such as deep breathing or meditation. This can help reduce anxiety and stress levels.
A healthy diet is also important. Eating a balanced diet that includes plenty of vegetables, fruit, and whole grains can help manage stress levels and prevent overeating.
- Some other tips to manage stress include:
- 1. Setting realistic goals and priorities
- 2. Getting enough sleep
- 3. Limiting caffeine and alcohol intake
- 4. Taking breaks during the day to rest and recharge
By managing stress, individuals can increase their chances of successfully quitting smoking without gaining weight.
Cravings and Withdrawal
The Science behind Cravings
Cravings occur when the brain’s reward system is activated by smoking. The nicotine in tobacco products stimulates the release of dopamine, a neurotransmitter associated with pleasure and reward. This creates a rush of positive feelings that can lead to addiction.
When a person quits smoking, their brain no longer receives the constant dopamine release. This can result in a sense of withdrawal and an increased desire for food, as the brain begins to associate eating with pleasure instead.
The Role of Withdrawal in Weight Gain
The cravings and increased appetite experienced during withdrawal can lead to overeating and weight gain for many people. Additionally, some studies suggest that the stress associated with quitting smoking can also contribute to weight gain, as the hormone cortisol can stimulate the storage of fat.
It is important for individuals who are trying to quit smoking to anticipate and manage their cravings and withdrawal symptoms. This may involve developing a plan for healthy eating and exercise, as well as seeking support from friends, family, or a healthcare professional.
- To manage cravings:
- Chew gum or suck on hard candy to keep your mouth busy
- Use relaxation techniques like deep breathing or meditation
- Find an activity that distracts you, like reading or taking a walk
- To manage weight gain:
- Eat small, frequent meals throughout the day to keep your metabolism active
- Choose healthy snacks like fruits, vegetables, or low-fat dairy
- Incorporate exercise into your routine to burn calories and reduce stress
|Cravings: occur in the brain’s reward system when smoking and lead to addiction|
|Withdrawal: can cause increased appetite and stress, leading to weight gain|
|Management: plan healthy eating and exercise, seek support, and use distraction techniques|
Changing Brain Circuitry
Neuroplasticity: The Brain’s Ability to Adapt
The brain has an amazing ability to adapt and change, known as neuroplasticity. This means that the brain can reorganize neural pathways and create new connections based on experiences and behaviors.
When it comes to quitting smoking, this means that the brain can create new habits and neural pathways that support a healthier lifestyle. However, it can also make it difficult to break the habit of eating in response to cravings.
Cognitive Behavioral Therapy
One way to change the brain’s circuitry when it comes to smoking and weight gain is through cognitive behavioral therapy (CBT). This type of therapy focuses on changing thought patterns and behaviors that lead to smoking and overeating.
CBT can help individuals identify triggers for smoking and overeating, and develop new coping strategies. By changing the brain’s response to these triggers, individuals can create new habits that support a healthy lifestyle and prevent weight gain.
Exercise and Nutrition
Another way to change the brain’s circuitry is through exercise and nutrition. Exercise has been shown to increase the production of neurotrophic factors, which help to promote the growth and survival of neurons in the brain. This can lead to increased neural plasticity and the formation of new neural pathways related to exercise and healthy habits.
Nutrition also plays a role in neuroplasticity, with certain foods providing the nutrients necessary for the growth and function of brain cells. By incorporating healthy foods into the diet, individuals can support the brain’s ability to adapt and change.
Eating to Overcompensate
Why do ex-smokers gain weight?
One reason ex-smokers gain weight is that they eat to overcompensate for the absence of cigarettes. Smoking can suppress appetite and increase metabolism, so when someone quits smoking, they may feel hungrier and their metabolism may slow down. This can lead to overeating and ultimately weight gain.
The science behind overcompensation
Research shows that the brain plays a key role in overcompensating for the absence of cigarettes. When a smoker quits, the brain’s reward pathways, which are responsible for feelings of pleasure and satisfaction, may become less active. This can lead to cravings for food as a way to fill the void left by cigarettes. Additionally, nicotine can affect the brain’s regulation of appetite and fat tissue, which can also contribute to weight gain after quitting smoking.
- One study found that ex-smokers had a 23% increase in calories consumed after quitting smoking compared to when they were smokers.
- Another study found that ex-smokers had a slower metabolism and burned fewer calories at rest than when they were smokers.
These factors combined can make it challenging for ex-smokers to maintain their weight after quitting smoking. However, it’s important to remember that the health benefits of quitting smoking far outweigh the risks of gaining a few pounds.
Metabolism and Energy
What is metabolism?
Metabolism is the process by which your body converts food into energy. Your body uses this energy for various activities such as digestion, movement, and even breathing.
Metabolism is a complex process that involves various chemical reactions and hormones. The rate at which your body burns calories is known as your metabolic rate.
How does metabolism affect weight gain?
Metabolism plays a crucial role in weight management. If your body burns calories at a slower rate, you are more likely to gain weight. This is because your body stores the excess energy as fat.
Factors that can affect your metabolic rate include age, gender, genetics, and muscle mass. Physical activity and diet can also play a significant role in boosting your metabolic rate.
Quick tip: Eating a diet high in protein can help increase your metabolic rate because it requires more energy to digest protein than other macronutrients like carbohydrates and fats.
According to research, quitting smoking can cause a decrease in your metabolic rate, which can lead to weight gain. Nicotine has been shown to increase metabolic rate, so when you stop smoking, your body may burn fewer calories.
A study conducted by the University of Michigan found that people who quit smoking and gained weight had a slower metabolic rate compared to those who quit smoking and did not gain weight.
Quick tip: Engaging in regular physical activity can help offset the decrease in metabolic rate that may occur after quitting smoking.
Hormones and Hunger
Ghrelin is a hormone produced in the stomach that is known to stimulate appetite. When ghrelin levels are high, our bodies receive signals to eat more food. This hormone is also linked to the pleasure centers of the brain, making us crave high-calorie foods when levels are elevated.
Leptin is a hormone produced in fat cells that regulates energy balance in the body. It decreases appetite and signals the brain to stop eating when we’re full. However, when we lose weight, our leptin levels decline, causing us to feel hungry and eat more. This can also slow down our metabolism, making it more difficult to maintain weight loss.
Insulin is a hormone produced in the pancreas that helps regulate blood sugar levels. When we eat high-carbohydrate foods, our blood sugar levels rise, triggering a release of insulin. Insulin signals our cells to absorb glucose from the blood and use it for energy or store it as fat. However, constantly elevated insulin levels can lead to insulin resistance and weight gain.
- To manage hormones and hunger during smoking cessation, it’s important to eat a balanced diet and exercise regularly.
- High-protein foods can help boost feelings of fullness and lower ghrelin levels.
- Fiber-rich foods can slow down the release of sugar into the bloodstream and help regulate insulin levels.
- Incorporating healthy fats into your diet can also help regulate hormones and keep you feeling full for longer.
Overall, understanding the role of hormones in hunger can help us make informed choices about the foods we eat and how we manage our weight when quitting smoking.
Stress and Anxiety
Quitting smoking can be a stressful and anxiety-provoking experience. Nicotine is a stimulant that has a calming effect on the brain, so when someone quits smoking, their brain chemistry is disrupted. This can lead to increased stress and anxiety, which can in turn trigger emotional eating and weight gain.
Individuals who experience high levels of stress and anxiety may find it especially challenging to quit smoking without gaining weight. To combat this, it may be helpful to develop healthy coping mechanisms for managing stress, such as exercise, relaxation techniques, or therapy.
Smoking is often associated with certain behaviors and activities, such as taking breaks at work or socializing with friends who smoke. When someone tries to quit smoking, it can be difficult to break these ingrained patterns and find new activities to replace them.
Oftentimes, people will turn to food as a replacement for smoking during these activities, leading to weight gain. To mitigate this, it’s important to find new activities that can replace smoking in these contexts. For example, taking a walk during a break at work or trying a new hobby with friends instead of smoking.
Self-Image and Fear of Success
Some individuals may be hesitant to quit smoking because they fear gaining weight and damaging their self-image. This fear of success can lead to self-sabotage and a reluctance to fully commit to the quitting process.
To overcome this, it may be helpful to cultivate a positive self-image and focus on the long-term health benefits of quitting smoking, rather than the potential short-term weight gain. Working with a therapist or support group can also be beneficial in addressing these fears and developing a plan for success.
The Role of Genetics
Individual Differences in Weight Gain
It is well-known that people who quit smoking often gain weight. However, the amount of weight gain can vary significantly from person to person. Genetics plays a crucial role in this individual variability.
Genetic Predisposition to Weight Gain
Research has found that some people are genetically predisposed to gaining weight when they quit smoking. These individuals have genetic variants that make them more likely to accumulate fat and store it in certain areas of the body.
The Impact of Gene-Environment Interactions
While genetics may predispose someone to weight gain after quitting smoking, environmental factors can also play a significant role. For example, someone living in an obesogenic environment with ready access to high-calorie foods may be more likely to gain weight after quitting smoking, regardless of their genetic makeup.
Implications for Smoking Cessation Programs
Understanding the role of genetics in weight gain after quitting smoking has important implications for the development of smoking cessation programs. For individuals who are genetically predisposed to weight gain, targeted interventions such as dietary counseling or exercise programs may be necessary to mitigate weight gain and prevent relapse.
Strategies to Prevent Weight Gain
1. Exercise Regularly
Regular physical activity is crucial for maintaining a healthy weight. According to the American Heart Association, adults should aim for at least 150 minutes of moderate exercise or 75 minutes of vigorous exercise per week. Incorporating strength training exercises and increasing daily physical activity, such as taking the stairs instead of the elevator, can also help prevent weight gain.
2. Monitor Caloric Intake
Tracking daily food intake can help individuals become more aware of their caloric intake and make healthier food choices. Online calorie counters and food tracking apps are easily accessible and can be helpful tools in weight management. Eating a balanced diet composed of lean proteins, whole grains, fruits, and vegetables can also aid in weight maintenance.
3. Limit Alcohol Consumption
Alcohol is a high-calorie beverage that can contribute to weight gain. Limiting alcohol intake or choosing low-calorie options, such as light beers or wines, can help prevent excess calorie consumption.
4. Practice Mindful Eating
Eating mindfully involves paying attention to hunger and fullness cues, as well as savoring the flavor and texture of food. This can prevent overeating and promote healthier food choices. Other mindful eating practices, such as eating slowly and avoiding distractions while eating, can also aid in weight management.
5. Seek Support and Accountability
Having support from friends or family members, joining a weight loss or exercise group, or working with a registered dietitian or health coach can provide accountability and motivation in weight management. Additionally, these resources can provide education and guidance on developing healthy lifestyle habits.
Health Risks of Excess Weight
Heart Disease and Stroke
Carrying extra weight puts a strain on the heart, increasing the risk of heart disease and stroke. A buildup of plaque in the arteries can lead to blockages, causing heart attacks and strokes.
Type 2 Diabetes
Excess weight is the leading risk factor for developing type 2 diabetes. The body becomes resistant to insulin, leading to high blood sugar levels and a range of associated health problems.
Being overweight or obese is also a risk factor for several types of cancer, including breast, colon, and prostate cancer. The reasons for this link are complex but may be related to inflammation in the body.
The excess weight puts pressure on the joints, leading to pain and stiffness and an increased risk of arthritis. Losing weight can help to reduce the strain on the joints and improve mobility.
Weight gain can lead to the development of sleep apnea, a condition in which breathing stops and starts during sleep. This can result in poor sleep quality and daytime fatigue.
Reducing Health Risks
Losing even a small amount of weight can have significant health benefits. Eating a healthy diet and increasing physical activity are effective ways to reduce the risk of weight-related health problems.
- Eat a balanced diet rich in fruits, vegetables, whole grains, and lean proteins.
- Avoid processed foods, sugary drinks, and high-fat foods.
- Aim for at least 150 minutes of moderate-intensity exercise per week.
- Adopt healthy habits such as getting enough sleep and managing stress.
Questions and Answers:
Why do many people gain weight when they quit smoking?
According to research, several factors contribute to weight gain after quitting smoking, including changes in metabolism, increased appetite, and decreased physical activity. Additionally, nicotine is thought to suppress appetite and increase metabolism, so when people stop smoking, they may experience an increase in hunger and a decrease in metabolism.
Can exercise help prevent weight gain after quitting smoking?
Yes, regular exercise can help prevent weight gain after quitting smoking. Exercise can increase metabolism, burn calories, and reduce cravings for food. Additionally, exercise can improve mood, reduce stress, and promote overall health and well-being.
How can people reduce their risk of weight gain when they quit smoking?
There are several things people can do to reduce their risk of weight gain when they quit smoking. These include staying active, eating a healthy diet, drinking plenty of water, limiting alcohol and caffeine consumption, and seeking support from family, friends, or a support group. It may also be helpful to talk to a healthcare provider about strategies for managing weight and quitting smoking.
As someone who has tried to quit smoking multiple times, I can definitely relate to the struggle of gaining weight in the process. Learning about the scientific explanation behind this phenomenon in “Blame the Brain” was eye-opening. It’s fascinating to see how our brain chemistry is so intricately connected to our habits and behaviors. While gaining weight during a quit attempt can be frustrating, it’s important to remember that prioritizing our health is worth it in the long run. It’s encouraging to know that there are strategies we can use to minimize weight gain and stay on track with our goals. Overall, this article offers helpful insights and practical advice for anyone embarking on a quit attempt.
As someone who has struggled with quitting smoking, this article really resonates with me. It’s frustrating that even when we make a positive change by quitting smoking, our bodies still seem to work against us. However, learning about the scientific reasons behind weight gain during smoking cessation helps me to feel less discouraged and more empowered to take control of my health. It’s fascinating to think about how the brain plays such a central role in regulating our body weight and metabolism, and it’s helpful to know that there are things we can do to support our brains and bodies during this transition. Overall, this article offers valuable insights and motivation for those of us who are striving to quit smoking without packing on the pounds.
As someone who has tried to quit smoking multiple times, this article hits close to home. It’s frustrating to feel like quitting one bad habit only leads to another. However, understanding that the brain may be to blame for the weight gain makes me feel a little better. It’s not just a lack of willpower or self-control. It’s interesting to learn that nicotine suppresses hunger and decreases metabolism, which explains why many people gain weight after quitting. It’s important to remember that quitting smoking is still incredibly beneficial for overall health. And while weight gain may happen, there are ways to combat it such as exercise and healthy eating habits. This article provides valuable insight into the science behind smoking cessation and weight gain, and will hopefully encourage more compassion and understanding for those struggling to quit smoking.
|
<urn:uuid:436eae17-8359-43e1-81c9-4aea748abdea>
|
CC-MAIN-2023-50
|
https://www.cbdwellnesscentre.com.au/blame-the-brain-why-many-people-who-try-to-quit-smoking-gain-weight.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100739.50/warc/CC-MAIN-20231208081124-20231208111124-00381.warc.gz
|
en
| 0.948052 | 5,620 | 3.0625 | 3 |
Mechanisms of hemispherically symmetric climate variabilityRichard Seager
Lamont-Doherty Earth Observatory
Inspired by paleoclimate evidence that much past climate change has been symmetric about the Equator, the causes of hemispherically symmetric variability in the recent observational record are examined using the National Centers for Environmental Prediction-National Center for Atmospheric Research Reanalysis data set and numerical models. It was found that the dominant cause of hemispherically symmetric variability is the El Ni\~no-Southern Oscillation. During an El Ni\~no event the tropics warm at all longitudes and the subtropical jets in both hemispheres strengthen on their equatorward flanks. Poleward of the tropical warming there are latitude belts of marked cooling, extending from the surface to the tropopause in both hemispheres, at all longitudes and in all seasons. The cause of the mid-latitude cooling is a reduction in the strength of the eddy-driven mean meridional circulation. Changes in the transient eddy momentum fluxes during an El Ni\~no event force upper tropospheric ascent in mid-latitudes through a balance between the eddy fluxes and the Coriolis torque. The eddy-driven ascent causes anomalous adiabatic cooling which is primarily balanced by anomalous diabatic heating.
Using a quasi-geostrophic spherical model, forced by an imposed surface eddy disturbance of chosen wavenumber and frequency, it is shown that the anomalous eddy momentum fluxes are caused by the impact that the changes in the tropically forced subtropical jets have on the propagation in the latitude-height plane of transient eddies. Changes in zonal winds, and associated changes in the meridional gradient of potential vorticity, create an anomalous region of low meridional wavenumber in the mid-latitudes which refracts waves away both poleward and equatorward.
Tropical forcing of variability in the eddy-driven mean meridional circulation is another way, in addition to Rossby wave teleconnections, whereby the tropics can influence extratropical climate. Unlike teleconnections this mechanism causes climate variability that has strong zonally and hemispherically symmetric components and operates throughout the seasonal cycle.
2 Oct, 2002
2 PM/1D 403
(Coffee at 1:50 PM)
|
<urn:uuid:e90e57ce-2f3d-4a6d-9310-5ba7e9521011>
|
CC-MAIN-2014-35
|
http://www.esrl.noaa.gov/psd/seminars/Abstracts/seager10022002.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500826259.53/warc/CC-MAIN-20140820021346-00354-ip-10-180-136-8.ec2.internal.warc.gz
|
en
| 0.876665 | 505 | 3.234375 | 3 |
Geofabric data now more accessible
Geofabric stream network and catchment boundaries
The Australian Hydrological Geospatial Fabric, or Geofabric, is now available in a transfer format known as an ESRI Shapefile. This format caters for users who do not have access to ESRI ArcGIS software.
The Geofabric was publicly released in October 2010. It is a specialised Geographic Information System (GIS) that shows spatial relationships and connections between hydrological features such as rivers, dams, reservoirs and catchments.
Users can request access to the ESRI Shapefile by going to the Geofabric downloads page. Documentation to assist users with the Shapefile format is distributed with the data.
The Geofabric team is developing a range of web services that will allow users to view aspects of the Geofabric products from a web browser. Stay tuned for further updates in enGauge.
|
<urn:uuid:949353ea-63a7-4113-a2a7-0f0bed91ada7>
|
CC-MAIN-2014-35
|
http://www.bom.gov.au/water/news/article.php?id=19
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500830746.39/warc/CC-MAIN-20140820021350-00272-ip-10-180-136-8.ec2.internal.warc.gz
|
en
| 0.919144 | 198 | 2.5625 | 3 |
This Literature quiz is called 'Silas Marner - Setting' and it has been written by teachers to help you if you are studying the subject at senior high school. Playing educational quizzes is one of the most efficienct ways to learn if you are in the 11th or 12th grade - aged 16 to 18.
It costs only $12.50 per month to play this quiz and over 3,500 others that help you with your school work. You can subscribe on the page at Join Us
This senior high school English Literature quiz takes a look at setting in Silas Marner by George Eliot. At its most basic level, the setting of a text means the location and the time in which the events take place.
In addition to the events with which a text is primarily concerned, there will be events occurring in the background to which characters might allude. This wider fictional world is known as context and is also a key component of its setting (fictional context should not, of course, be confused with the author’s real-life context). Atmosphere is another important element of setting, and can change multiple times in a text, just as a text most probably moves between several different settings.
It is important to consider carefully the setting of any text you study. Characters are affected by the world in which they live, fictional though it is.
For example, authors show the effect of political or social events on characters through their reported thoughts, behavior and dialog.
At one level, Silas Marner is not rooted in a very specific time and place. Its fairy-tale elements create an impression of time being transcended. Nevertheless, Eliot also vividly presents a rural village on the verge of the Industrial Revolution, with the many changes that will bring. Why might Eliot have wished to present this moral tale as transcending time while being placed at a point in history where the life it relates is in danger of being forever destroyed? It is interesting to note that “ravel”, the root of the name Raveloe, means both “to tangle” or “to unpick/to unravel”. Does this bear upon the meaning of the text, in your view?
Geographical setting includes country or region, environment, the buildings or landscapes where events occur, and even the weather. Do events occur in a variety of places, or all in the same place? Do any characters travel, or arrive from elsewhere? How does the interaction of characters with their environment create meaning in the text?
One useful task is to compare the time a text is set with when it was written. Do these times differ? Think about the reasons why an author might choose to set a text in the past, present or future. Do such differences change our understanding of the story?
Answer the questions below on setting in George Eliot's Silas Marner.
|
<urn:uuid:4d0f386a-a4c0-4f0d-b922-bef25019f244>
|
CC-MAIN-2020-34
|
https://www.educationquizzes.com/us/senior-high-school-11th-and-12th-grade/literature/silas-marner-setting/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439735867.93/warc/CC-MAIN-20200804102630-20200804132630-00033.warc.gz
|
en
| 0.963215 | 589 | 3.8125 | 4 |
[= Dorcadion jacobsoni Jakovlev, 1899]
[= Dorcadion apicipenne Jakovlev, 1899]
[= Dorcadion dsungaricum Pic, 1906]
Subfamilia: LAMIINAE / Tribus: DORCADIINI
Dorcadion sokolovi ♂ [Photo © P.Jelínek]
Typical habitats of Dorcadion (Cribridorcadion) sokolovi are stony foothills with low-herb grassy vegetation. Larvae feed on roots of various grass species (Poaceae), including fescue (Festuca spp.). Adults feed on above-ground parts of the same plant species. In warm sunny weather, males are actively moving in search of virgin females. Females are less active and usually staying under plants. [❖]
Body length: 10 - 15 mm Life cycle: 1 year Adults in: last decade of April - second half of May. Host plant: larvae feed on roots of various grass species (Poaceae) Distribution: South-Eastern Kazakhstan, Kirghizia
The depicted beetles were collected and photographed in environs of Sarymbel (Сарымбель) village (1 800 m, Dzhungar Alatau south slopes, Kazakhstan) on May 2015.
Collected by P.Jelínek
Toropov S.A., Milko D.A.:
Longhorns of the tribe Dorcadionini (Coleoptera, Cerambycidae) of Kazakhstan and Middle Asia.
SatEnto, Bishkek, 2013, pp. 103.
Dorcadion sokolovi, 1× androchromic and 2× autochromic ♀ [Photo © P.Jelínek]
Dorcadion sokolovi, ♂♀ [Photo © E.Rutjan]
Subfamilia: Lamiinae Latreille, 1825
Tribus: Dorcadiini Thomson, 1860
Genus: Dorcadion Dalman, 1817
Subgenus: Cribridorcadion Pic, 1901
Species: Dorcadion (Cribridorcadion) sokolovi Jakovlev, 1899
|
<urn:uuid:fef46c8d-4699-48cc-b0d5-9442dad2c7d0>
|
CC-MAIN-2017-30
|
http://cerambyx.uochb.cz/dorcadion_sokolovi.php
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424247.30/warc/CC-MAIN-20170723042657-20170723062657-00075.warc.gz
|
en
| 0.711846 | 502 | 2.8125 | 3 |
Most readers will remember the appalling destruction and loss of life resulting from the Indian Ocean tsunami in December, 2004. That tsunami was caused by a magnitude 9.2 earthquake in a subduction zone near Sumatra, which produced waves up to 30 meters high, and affected coastal areas thousands of miles from the earthquake’s epicenter.
The disaster pointed up two problems in defending coastal areas against tsunamis:
- Detection There are existing networks of pressure sensors on the ocean floor, which can detect tsunamis by the change in weight of the water column above the sensor. However, sensor networks are expensive to install, and only five countries have them (Australia, Chile, Indonesia, Thailand, and the US); their coverage is far from complete.
- Warning Even when a suspected tsunami is detected, existing mechanisms for disseminating warnings may not be up to completing the job in a timely enough way.
According to an article in New Scientist, a group of researchers at the US National Oceanographic and Atmospheric Administration [NOAA] has come up with a new approach to the first problem, detection. They believe that existing undersea communications cables could be used to detect the passage of tsunamis, by using sensors to measure the change in electric field caused by the passage of an unusually large quantity of salt water (which of course contains many electrically-charged ions). Their simulations indicate that the induced voltage might be on the order of 0.5 volt, which ought to be detectable after correcting for background noise.. This information would not provide any directional indication, but might be quite useful when integrated with data from other sources.
This is quite a clever idea, and might be a valuable way to augment the information gathered by the existing sensor networks without great incremental expense. However, the second part of the problem, getting the warning information distributed in time, is still a tough nut, especially in those poor countries that have especially vulnerable coastlines.
|
<urn:uuid:4bcd7bdc-fb08-40ae-8bcd-9b5e5ddd962b>
|
CC-MAIN-2020-24
|
https://richg74.wordpress.com/2010/01/26/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347413551.52/warc/CC-MAIN-20200531151414-20200531181414-00022.warc.gz
|
en
| 0.938279 | 392 | 3.96875 | 4 |
Llanzlan Klazmon wrote:
clusardi2k@xxxxxxx wrote in news:1144244869.312028.216920
What is it?
I'm not sure that Bill's explanation is quite right. Historically, a
Keplerian trajectory would be a segment of a Keplerian orbit as described
by Keplers first law. This means a segment of an ellipse (or circle as a
circle is just an ellipse with zero eccentricity). The other conic sections
mentioned, a parabola or hyperbolia, which are also solutions to Newton's
laws for a two body problem involving gravity would not qualify, as Kepler
himself did not know of such orbits.
A bit of a nit, you'll admit, but I'm hit.
I accept your correction; thanks.
|
<urn:uuid:05c1564c-1ce6-4e03-becd-a513e4ba975a>
|
CC-MAIN-2013-20
|
http://www.archivum.info/sci.astro/2006-04/00067/Re-Keplerian-Trajectory.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382503/warc/CC-MAIN-20130516092622-00077-ip-10-60-113-184.ec2.internal.warc.gz
|
en
| 0.936669 | 178 | 2.734375 | 3 |
In theory electronic books, or e-books, are only data files containing textual information. The distinction between digital texts and e-books is essentially arbitrary. Technically, the concept of an e-book is as old as the concept of digital text. Utopian ideas of unrestricted and lightning-fast dissemination of information can, and have been, associated with e-books just as they have been with other forms of digital knowledge. These ideals have been actualized in the Open Access (OA) movement, but are yet to materialize in overarching policy decisions.
The use of e-books is growing rapidly, but many difficulties lie between their current use and their inherent potential. Librarians are at the forefront of this struggle, and they have extensively mapped current issues plaguing this fledgling medium. What follows is a two-part introduction to some of the most debated points.
Copyright means no right to copy
The most obvious issues related to digital content are ones related to copyright. As with movies, games, music and software, book publishers, too, expect to be able to make a profit from their products. Taking copies of printed volumes has been common since affordable copiers found their way into practically every office anywhere. Still, copying a book page-by-page is a lot of work, and can only be done with access to a physical copy – either legal or not. Copying digital materials, however, is effortless and inexpensive by default.
Initially, publishers shunned digital publishing in fear of having the fox stealing their gold-egg laying geese.. Eventually they understood the benefits of the platform: zero printing and delivery costs enabled publishers of e-books to explore previously untapped market niches. To prevent illegal copying and other misuse, digital rights management (DRM) software were developed and applied.
A tangled web of code
The introduction of DRM is the reason e-books exist as a separate category from regular text files. Absolutely distinct from ordinary digital text files, e-books have become entire systems of indexing, monitoring, permission control and automatic data deletion.
This extra burden of code has resulted in two sets of issues. Firstly, an e-book demands more from those devices used to host and manage the e-book than the content warrants. This issue is relevant to both the servers of the host (the publisher, the retailer, the library) and the device of the end user (reader, researcher). Secondly, without a commonly adopted format, the integration of a variety of publisher DRM systems into a single system (for example, in a library) is a daunting task.
To make things simpler, and also to earn revenue, commercial e-book management systems have emerged. By integrating the output of several publishers to a single end-user interface, these systems have the potential to save librarians a great deal of valuable time and effort. Unfortunately, no single system provider has contracts with all the publishers of e-books a library wants. In practice, libraries have to deal with a number of interlocking, sometimes overlapping systems.
Ville Manninen is a doctoral student at the University of Jyväskylä.
Correction: The text was updated to a newer version on 7th April 2015 GMT 0.46.
Do you have something to say about journalism research? Want to write for us? We are always looking for new trend articles from all over Europe. Contact us at admin(a)journalismresearchnews.org
|
<urn:uuid:7f1a73c1-bf5b-4c54-a6cd-e5b707dfc7e0>
|
CC-MAIN-2020-16
|
http://journalismresearchnews.org/e-book-issues-an-overview-of-hurdles-and-possibilities/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371700247.99/warc/CC-MAIN-20200407085717-20200407120217-00499.warc.gz
|
en
| 0.951895 | 707 | 2.96875 | 3 |
Scientists are still finding novel ways to manipulate plasma. For example, Jamey Jacob, an aerospace engineer from Oklahoma State University, has replaced mechanical parts on the wings of aircraft with arrays of tiny actuators. The actuators form jets of plasma that can speed up airflow across the surface to increase lift or, if the plumes are pointed into the airflow, increase drag. Jacob is testing the system on small unmanned aerial vehicles.
3 Research Projects that Aim to Control Plasma
· WHAT: Heat Shield
· WHO: EADS Astrium
· HOW IT WORKS: A magnetic field can influence the hot, ionized gas that envelops a spacecraft during atmospheric re-entry. Superconducting coils generate a field that forces hot plasma away from the aeroshell.
· NEXT STEP: Engineers are designing a system for a Russian Volna rocket that could fly within three years.
· WHAT: Communications Antenna
· WHO: Haleakala Research & Development
· HOW IT WORKS: A high-bandwidth plasma antenna, resembling a cluster of neon tubes, is smaller and more sensitive than metal antennas and can be instantly reconfigured by altering an electric field or voltage.
· NEXT STEP: Smart digital TV antennas for rural areas may be the company's first product, with plasma WiMax antennas providing wide-area Internet coverage soon after.
· WHAT: Emergency Fire Extinguisher
· WHO: DARPA
· HOW IT WORKS: Flames are a form of partially ionized plasma and can be manipulated with electric fields. Devices based on this principle may be able to bend flames to create escape corridors; researchers have already shown that electric fields can put out methane fires.
· NEXT STEP: DARPA hopes to build a prototype electric fire-suppression system for the compartment of a Humvee-size vehicle.
|
<urn:uuid:bfced1df-7919-46a0-be0d-4044ab1072ac>
|
CC-MAIN-2020-16
|
https://www.popularmechanics.com/science/a5820/scientists-control-plasma-for-practical-applications/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370518767.60/warc/CC-MAIN-20200403220847-20200404010847-00240.warc.gz
|
en
| 0.886836 | 371 | 3.78125 | 4 |
- 20 wood blocks of different shapes and sizes
- starter block.
Object of the Game
Try to build a stack of balanced blocks without causing it to tumble!
Spread out the 20 wood blocks and place the starter block labeled "BLOCKHEAD!" on a flat surface. This is the base.
The youngest player starts by choosing a block and placing it anywhere on the base. This is the only block that is allowed to touch the base during the game.
The player to the left now selects a block and places it on top of the first block.
The next player adds a block to the first or second block. There is no penalty if the stack tumbles during the first three turns.
Play continues and each player adds a block to the stack. The block may be placed in any position on any block.
Players may use only one hand to place a block on the stack and may not touch any block except the one in their hand.
If only the block being placed falls from the stack, the player may try again with the same block or a different block.
Each player is allowed to cause the stack to tumble two times. If you make it fall a third time, you're a BLOCKHEAD! and out of the game.
Play continues until all but one player is out of the game.
End of the Game
The last player left in the game is the winner!
Try to stack all the blocks without causing them to tumble!
|
<urn:uuid:bd7b167c-5ffd-4163-98c3-64c7ba7261a9>
|
CC-MAIN-2023-23
|
https://www.ultraboardgames.com/blockhead/game-rules.php
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644817.32/warc/CC-MAIN-20230529074001-20230529104001-00036.warc.gz
|
en
| 0.930193 | 334 | 3.078125 | 3 |
During summer, the time of the fire element, there are 4 meridians that are active inside our bodies instead of two. We’ve already spoken of Heart Meridian, there is also Small Intestine Meridian, Pericardium Meridian, and Triple Warmer Meridian.
Today I want to discuss the partner of heart, Small Intestine Meridian. The small intestine is most active between 1pm and 3pm. Its role in digestion is to separate the pure from the impure, absorbing minerals and nutrients from ingested food.
The Small Intestine Meridian controls the reception, transformation, and separation of solids and fluids and it is very sensitive to cold. If we consume lots of cold, raw foods, we can create problems in Small Intestine. These problems or imbalances can manifest as abdominal pain, digestive problems and appetite problems (i.e. overeating or poor appetite).
The energy of Small Intestine plays both a physical role in digestion and a mental role. The mental role is to discriminate between clear thoughts and chaotic ones. Small Intestine Meridian along with the Heart Meridian helps us with discernment and clarity of judgment.
Some foods which support the Fire Element are:
- Asparagus, celery, lettuce
- Chocolate, coffee, wine
- Pumpkin, ginseng, sunflower seeds, vinegar
|
<urn:uuid:b2b3336b-8c8e-447c-9fc7-b009af670a26>
|
CC-MAIN-2020-24
|
http://optimumenergyandwellness.com/the-energies-of-summer-small-intestine/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347419056.73/warc/CC-MAIN-20200601145025-20200601175025-00265.warc.gz
|
en
| 0.905782 | 272 | 2.5625 | 3 |
For most of the twentieth century, the idea of the West figured prominently in America’s understanding of its role in the world.1 During the two world wars and much of the Cold War, the United States saw itself as the defender of Western civilization. At the beginning of the twenty-first century, however, the idea of the West is largely absent from American discourse about world affairs. There is much talk of globalization today, but little of Westernization. Is this because globalization is really just a more acceptable name for Westernization? Or is it because the American elite have now abandoned Western civilization for the sake of some post-Western project, be it the global economy or something else? What is the meaning of the West in the age of globalization, and what is to be its fate?
|
<urn:uuid:d8394b94-e286-4a83-ae29-6e92813677ea>
|
CC-MAIN-2023-50
|
https://www.fpri.org/article/2001/07/global-triumph-western-twilight/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100540.62/warc/CC-MAIN-20231205010358-20231205040358-00042.warc.gz
|
en
| 0.962415 | 160 | 2.5625 | 3 |
Two Most Important, Essential Rituals in Hindu Weddings By Raj Shah
In earlier wedding special issues of Desh-Videsh, I have discussed the importance of wedding rituals in Hindu weddings. A wedding for a Hindu family is not just a party and celebration, but it also fulfills one of the nine sanskars of life. In other words, Marriage, for every Hindu, is not merely pleasure, or romantic love, but an act of duty, a matter of moral and religious obligation, incumbent on everyone in all normal circumstances. Vedic rites or rituals for the performance of a wedding ceremony are many, and may take anywhere between one hour to four hours. According to the Hindu Marriage Act, the two most important rituals in Hindu weddings are the Mangal Pheras and Saptapadi. These rituals are essential for the marriage to be deemed complete.
Each Hindu wedding ritual has religious, spiritual, and most importantly, practical message or meaning. When a Hindu Pandit recites the Vedic Mantra during wedding rituals, many of us do not understand the actual meaning or significance. When you break down the meaning or significance of each ritual, one finds they are words to live by in your married life. The first essential ritual in Hindu weddings is the Mangal Pheras (Agni-pari?ayana) or the walk around the sacred agni God or fire. Some people call this ritual Sapta phera (Seven rounds), but there is no mention in the Hindu Scriptures of the seven rounds (sapta phera). It has become popular in North Indian marriages due to the influence of Bollywood! There seems to have been some confusion between the seven steps and seven rounds. Some people believe Mangal Pheras and Saptapadi to be the same but they are not. Mangal Pheras involve taking four rounds around fire. Each Phera represents one of four promises. The first one represents Dharma, to pursue life’s religious and moral duty, the second represents Artha, to pursue prosperity, the third represents Kama, to pursue earthly pleasures, and the fourth represents Moksha, to pursue spiritual salvation. The groom leads the first three Pheras around the fire, and the bride leads the groom the final round to show her devotion and love towards her husband. The second most important ritual in Hindu weddings is the saptapadi. These are the seven steps taken together by the bride and groom to signify their togetherness for each step in their journey of life.
The original text of the saptapadi was written in our Hindu scripture. For many of us, it can be too complicated to understand practical meaning. One Hindu Scripture and English Scholar (whose name is unknown) put these slokas of saptapadi in a romantic way as follows:
Walk with me four steps and three, I seek thy hand;
What a beautiful message! Addressing the bride as ‘Mate,’ the man describes the nature of the bond that shall grow between him and her and that the journey is exciting. These mantras reveal how the relationship between man and woman should materialize, like heaven and earth, music and hymn, mind and word.
In the next Wedding Resources issue, I will talk about the next two important rituals in the Hindu Weddings.
About Raj Shah
A software engineer by profession, Indian culture enthusiast, ardent promoter of Hinduism, and a cancer survivor, Raj Shah is a managing editor of Desh-Videsh Magazine and co-founder of Desh Videsh Media Group. Promoting the rich culture and heritage of India and Hinduism has been his motto ever since he arrived in the US. He has been instrumental in starting and promoting several community organizations such as the Indian Religious and Cultural Center and Hindu University of America South Florida Chapter. He serves as a chairman of Board of International Hindu University. Raj has written two books titled Chronology of Hinduism and Understanding Hinduism. He has also written six children books, We love Diwali, Holi Hai, The Complete Ramayan in 100 Tweets, The Mahabharat in 100 Tweets, Coloring and Understanding Hindu Symbols and Welcome to my beautiful Mandir.
|
<urn:uuid:95743b0d-e6cf-42ad-a8be-e46c2dbe3774>
|
CC-MAIN-2023-40
|
https://www.myshadi.com/wedding-blog/wedding-rituals/two-most-important-essential-rituals-in-hindu-weddings-by-raj-shah/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510941.58/warc/CC-MAIN-20231001205332-20231001235332-00808.warc.gz
|
en
| 0.951541 | 882 | 2.65625 | 3 |
Paraphrased in Homeric Hexameters.
Up, in his might, he arose—Achilles, the favoured of heaven;
Pallas herself, having slung the broad shield of Jove o’er his shoulders,
Put them about his bold head a golden mist light ning with splendour
As doth a cloudlet inflamed with all the fierce glory of sunrise.
And as when smoke goeth up from a town in some outlying island
Whose foes, from their own stronger hold, forth ever pouring, besiege it,
Soon as the set sun hath drawn down with him the grey strip of twilight,
How the red tongues of the fires are seen to rush up in the darkness,
Making a glow in the sky, and pathing with light the dim waters,
Where cometh haply some helper, ploughing the deep with his galleys:
So from the head of Achilles went up aloft an effulgence.
Past the camp wall went he forth, and there by the trench (though still keeping
Back from the host of the Greeks, being held by the hest of his mother),
Standing straight up like a tower a terrible menace he shouted!
Which, as it rang in its wrath along the gored fronts of the battle,
Pallas enforced by a cry, that fell as if shrieked out of heaven!
And as that clear-ringing voice tore out like the blare of a trumpet,
Threatening the gates of a town which implacable foremen beleaguer,
Loud in the host of the Trojans rose a wild thunder-like tumult!
And when, too, her cry in their midst fell shrieking, fell with it confusion,
Fell with it fear, and horror that suddenly shuddered within them,
Rending their legions as clouds are torn by the winds of a tempest!
For even the proud-maned steeds swerved, huddled, and backed on their haunches,
Full well forseeing, it seemed, calamity clothed in the omen;
Also the charioteers were smitten with panic, beholding
Fire on that terrible head—the head of the godlike Achilles—
Burning and raging aloft, an active and ominous glory!
Thrice o’er the trench did he shout, and as oft with their helps were the Trojans
Whirl’d into dust-clouded heaps, and rolled back in utter disorder;
While of their valiantest captains twelve in the huddlement perished,
Crushed by the jambing of wheels and under the wrecks of their chariots.
|
<urn:uuid:784d7d7d-2487-4161-a6af-f1e0848b3f75>
|
CC-MAIN-2023-23
|
http://telelib.com/authors/H/HarpurCharles/verse/poems/eighteenthbookiliad.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224654031.92/warc/CC-MAIN-20230608003500-20230608033500-00296.warc.gz
|
en
| 0.955774 | 576 | 2.640625 | 3 |
Ask a question about 'Gryllus'
Start a new discussion about 'Gryllus'
Answer questions from other users
is a genus
In biology, a genus is a low-level taxonomic rank used in the biological classification of living and fossil organisms, which is an example of definition by genus and differentia...
Crickets, family Gryllidae , are insects somewhat related to grasshoppers, and more closely related to katydids or bush crickets . They have somewhat flattened bodies and long antennae. There are about 900 species of crickets...
s. Members of the genus are typically 15–31 mm long and darkly coloured . Species are usually recognised by their life histories
A life cycle is a period involving all different generations of a species succeeding each other through means of reproduction, whether through asexual reproduction or sexual reproduction...
and by their song
An animal song is a repetitive vocal utterance of animals such as birds and whales. The term is not clearly defined in the scientific literature, though most investigators agree that an animal song must have syllabic diversity and temporal regularity akin to the repetitive and transformative...
The genus contains the following species :
- Gryllus abditus Otte & Peck, 1997
- Gryllus abingdoni Otte & Peck, 1997
- Gryllus abnormis Chopard, 1970
- Gryllus alogus Rehn, 1902
- Gryllus amarensis (Chopard, 1921)
- Gryllus ambulator Saussure, 1877
- Gryllus argenteus (Chopard, 1954)
- Gryllus argentinus Saussure, 1874
- Gryllus armatus Scudder, 1902
- Gryllus assimilis (Fabricius, 1775)
- Gryllus ater Walker, 1869
- Gryllus barretti Rehn, 1901
- Gryllus bellicosus Otte & Cade 1984
- Gryllus bicolor Saussure, 1874
- Gryllus bimaculatus
Gryllus bimaculatus is one of many cricket species known as the Field cricket. Also known as the African or Mediterranean field cricket or as the two-spotted cricket, it can be discriminated from other Gryllus species by the two dot-like marks on the base of its wings.This species of cricket is...
De Geer, 1773
- Gryllus braueri (Karny, 1910)
- Gryllus brevecaudatus (Chopard, 1961)
- Gryllus brevicaudus Weissman, Rentz, Alexander & Loher 198
- Gryllus bryanti Morse, 1905
- Gryllus campestris
Gryllus campestris is one of many crickets known as the Field cricket. These insects are dark colored and slightly less than one inch in length. The males range from 19 to 23 mm and the females from 17 to 22 mm....
- Gryllus capitatus Saussure, 1874
- Gryllus carvalhoi (Chopard, 1961)
- Gryllus cayensis Walker, 2001
- Gryllus chaldeus (Uvarov 1922)
- Gryllus chappuisi (Chopard, 1938)
- Gryllus chichimecus Saussure, 1897
- Gryllus cohni Weissman, Rentz, Alexander & Loher 198
- Gryllus comptus Walker, 1869
- Gryllus conradti (Bolivar, 1910)
- Gryllus darwini Otte & Peck 1997
- Gryllus debilis Walker, 1871
- Gryllus firmus Scudder, 1902
- Gryllus fultoni (Alexander, 1957)
- Gryllus fulvipennis Blanchard, 1854
- Gryllus galapageius Scudder, 1893
- Gryllus genovesa Otte & Peck 1997
- Gryllus insularis Scudder, 1876
- Gryllus integer Scudder, 1901
- Gryllus isabella Otte & Peck 1997
- Gryllus jallae Giglio-Tos, 1907
- Gryllus kapushi Otte, 1987
- Gryllus krugeri Otte, Toms & Cade 1988
- Gryllus lineaticeps Stål, 1861
- Gryllus luctuosus (Bolivar, 1910)
- Gryllus madagascarensis Walker, 1869
- Gryllus marchena Otte & Peck 1997
- Gryllus maunus Otte, Toms & Cade 1988
- Gryllus maximus (Uvarov 1952)
- Gryllus meruensis Sjöstedt, 1909
- Gryllus miopteryx Saussure, 1877
- Gryllus mzimba Otte, 1987
- Gryllus namibius Otte & Cade 1984
- Gryllus nigrohirsutus Alexander, 1991
- Gryllus nyasa Otte & Cade 1984
- Gryllus opacus Chopard, 1927
- Gryllus ovisopis Walker, 1974
- Gryllus parilis Walker, 1869
- Gryllus pennsylvanicus
Gryllus pennsylvanicus is one of many cricket species known as the field cricket. It occurs throughout eastern North America, including southern Canada.-Identification:...
- Gryllus personatus Uhler, 1864
- Gryllus peruviensis Saussure, 1874
- Gryllus pinta Otte & Peck 1997
- Gryllus quadrimaculatus Saussure, 1877
- Gryllus rhinoceros Gorochov, 2001
- Gryllus rixator Otte & Cade 1984
- Gryllus rubens
Gryllus rubens, commonly known as the Southeastern Field Cricket, is one of many cricket species known as a field cricket. It occurs throughout most of the Southeastern United States...
- Gryllus scudderianus Saussure, 1874
- Gryllus signatus Walker, 1869
- Gryllus spinulosus Johannson, 1763
- Gryllus subpubescens (Chopard, 1934)
- Gryllus texensis
Gryllus texensis is a species of field cricket identified by William H. Cade and Otte in . Cade and Otte clarify that field crickets collected in the Southeastern United States from Florida to Texas identified as Gryllus integer, were in fact misidentified, and should have been classified as G....
Cade & Otte 2000
- Gryllus urfaensis Gumussuyu, 1978
- Gryllus veletis
Gryllus veletis, commonly known as the spring field cricket, is abundant throughout eastern North America. G. veletis is a solitary, aggressive, omnivorous, burrow-inhabiting species of field cricket. This species is commonly confused with Gryllus pennsylvanicus , as they inhabit the same...
(Alexander & Bigelow 1960)
- Gryllus vernalis Blatchley, 1920
- Gryllus vicarius Walker, 1869
- Gryllus vocalis Scudder, 1901
- Gryllus zaisi Otte, Toms & Cade 1988
- Gryllus zambezi (Saussure, 1877)
|
<urn:uuid:9066f9b5-c3cc-436a-b409-fe62b7fa491d>
|
CC-MAIN-2014-10
|
http://www.absoluteastronomy.com/topics/Gryllus
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394011167968/warc/CC-MAIN-20140305091927-00088-ip-10-183-142-35.ec2.internal.warc.gz
|
en
| 0.738004 | 1,627 | 3.453125 | 3 |
Corn borer feeding weakens plants and slows their growth. Severely damaged plants often snap off and fall over. When peppers or mature corn ears are damaged, they are prone to rot.
Corn borers have numerous natural enemies, including wasps, lady beetles, lacewings and other common beneficial insects, so growing flowers that attract borer predators is quite effective with this pest. In a large planting of sweet corn, intercropping with buckwheat, dill and coriander can prevent corn borer problems. Pupae overwinter in corn stalks, so add them to a compost pile and make sure they're actively composting by late spring.
Spray plants with a Bt or spinosad-based insecticide near where you see damage, and be sure to cover the leaf undersides while avoiding spraying the tassels. Many beneficial insects gather corn pollen from corn tassels.
|
<urn:uuid:408e2b75-0126-4e11-a4e3-b9c73470a118>
|
CC-MAIN-2023-50
|
https://gardenplanner.agriscaping.com/pests/us-and-canada/corn-borer/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100599.20/warc/CC-MAIN-20231206130723-20231206160723-00049.warc.gz
|
en
| 0.940814 | 188 | 3.25 | 3 |
Being an oldest temple of Kullu Valley, Raghunath Temple was constructed by King Jagat Singh in 17th century. As per Hindu Mythology and Indian History, Raja Jagat Singh tortured a Brahmin to abduct the pearls from him. Unbearable the torture, Brahmin committed suicide setting himself and his family on fire. Feeling guilty over this incident, Rajah Jagat Singh built a temple for lord Rama taking the advice of Sri Kishan Dass Ji Paihari. Also he dedicated his entire kingdom for Lord Rama. The idol of Rama installed in this temple is brought from Ayodha. Kullu Dussera is celebrated in a great fashion in this temple. The idol of Lord Rama is placed on a Chariot.
THINGS TO KNOW
Pahari (Local Dialect), Hindi, Punjabi & English
|
<urn:uuid:aba8e085-3b9c-4ca6-8223-3dad2fe02446>
|
CC-MAIN-2017-43
|
http://www.trodly.com/india/destination-1751/raghunath-temple
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824068.35/warc/CC-MAIN-20171020101632-20171020121632-00176.warc.gz
|
en
| 0.943871 | 181 | 2.828125 | 3 |
At Fossil Ridge High School, we encourage students to get involved in one or more of the many opportunities we have in Student Activities: sports, clubs, music, the arts, service organizations, etc. Student activities develop core social and emotional skills and are a great way to connect students to our school. Participating in student activities reduces dropout rates, increases standardized test scores, boosts GPA, promotes college and career success, develops social and emotional skills, and ultimately leads students to make better choices (Journal of Educational Research, Schreiber and Chambers, 2002).
- Simply participating in any club or activity increases a student’s chances of college enrollment. But the odds of enrollment double if a student joins a group with an average GPA that’s one point higher than his or hers. (Gibbs, Erickson, Dufur, and Miles, 2014)
- A study found that participation in after-school activities in 8th grade boosted standardized reading scores by 2% and math scores by 2.9%. In 10th grade, reading scores went up by 4% and math scores went up by 5.7%. (Schreiber and Chambers, 2002)
- Students who participate in at least one activity in each year of high school are 70% more likely to attend college, 60% more likely to vote, and 80% more likely to volunteer than those who only participate in some years. (Zaff et al, 2003)
- Students who participate in just one or two extracurricular activities are 2X less likely to smoke tobacco, 2.5X less likely to smoke marijuana, and 50% less likely to drink alcohol. (Elder, Lever-Dunn, Wang, Nagy, and Green, 2000)
The bottom line: when a student participates, they are virtually guaranteed to earn better grades, go to college, and make better life decisions! So what are YOU waiting for? Pick out a club, or two, or three and GET INVOLVED TODAY!
|
<urn:uuid:d235b32c-e530-4863-8591-4cfe7f522148>
|
CC-MAIN-2023-14
|
https://frh.psdschools.org/student-life
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949387.98/warc/CC-MAIN-20230330194843-20230330224843-00359.warc.gz
|
en
| 0.95628 | 412 | 2.84375 | 3 |
Thursday, October 6, 2011
In an Earthquake, the Ground Opens up and Swallows People: True or False? What everyone "knows" about earthquakes
In an earthquake, the ground opens up and swallows people: true or false?
I'm actually not sure how the crowd responded to this one at my lecture the other night, but they quickly appreciated my answer to the question:
True, but only in Hollywood....
does mention one instance where someone was killed in a fissure that opened up in a 1948 quake in Japan, but that hardly represents a pattern.
One other effect of large earthquakes is the production of slope failures and landslides, during which large fissures might open up. The Turnagain Heights liquefaction event during the Alaska earthquake of 1964 is a stunning example. Weak saturated sediments underneath the housing project were severely shaken, causing the whole landscape to break up and flow towards the adjacent bay, destroying the dwellings at the surface (I've included two pictures derived from my old slide collection, but I'm afraid I don't know who to attribute them to; I will add credit if someone can clue me in. They may be from a USGS collection).
famous tail/tale of Shafter's cow, which was swallowed up by the San Andreas fault. In the aftermath, only the poor bovine's tail could be seen at the surface. The story apparently became widespread, but in a letter from 1966, some locals recalled that the poor cow had actually died the night before. The earthquake produced a convenient fissure, the farmer tossed in the carcass, and when reporters showed up asking questions about the poor animal, farmer Shafter decided not to kill a "good story".
|
<urn:uuid:e5aa8b2e-e4ac-406a-b9d3-4a7471ee78f5>
|
CC-MAIN-2014-23
|
http://geotripper.blogspot.com/2011/10/in-earthquake-ground-opens-up-and.html?showComment=1317895781826
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997889622.85/warc/CC-MAIN-20140722025809-00129-ip-10-33-131-23.ec2.internal.warc.gz
|
en
| 0.968472 | 353 | 2.734375 | 3 |
Every person has either heard of nosebleed or has suffered from it at least once in his or her life. For some people this problem can be frightening and for some it is quite dramatic. However, most people do not think that it is a big problem. The main reason why that is so is because most cases of nose bleed are not serious and a person can treat the problem at home, using some simple remedies. However, in some cases there is need for medical assistance. People should also know that nosebleeds can be either anterior or posterior.
Out of all nosebleed cases, 90% of them are anterior. This means that the bleeding originates from the front of the nose and in most cases from the blood vessels on the nasal septum. A person who experiences anterior nosebleed need not worry too much since these nosebleeds are easily treatable. On the other hand, posterior nosebleeds are not that common and it is mainly the elderly people who suffer from this type of nosebleed. In most cases of posterior nosebleed it is from the artery at the back of the nose that the bleeding originates from. In case of a posterior nosebleed people need to know that they are much more complicated to treat and they require medical help.
According to the data, every seventh person develops a nosebleed at least once in his or her life. These health problems are much more common during the cold months.
In most cases it is not easy to identify the cause of nosebleed. Out of all the causes, trauma to the nose is the most common one. Picking the nose is also known to cause the bleeding. Apart from these two, some of the other causes are exposure to warm or dry air for a long time, nasal or sinus infections, allergic rhinitis, nasal foreign body, vigorous nose blowing and nasal surgery.
Since most nosebleeds happen during the cold winter months, a person should probably use a humidifier at home. In order to prevent the nasal passage from becoming dry, people should use antibiotic ointment or a saline nasal spray. A good way to prevent nosebleeds is to avoid picking the nose or blowing it too hard. It is not that common but nosebleed can be associated to an underlying medical condition and in that case a person will need to treat the underlying cause in order to stop the bleeding.
|
<urn:uuid:c0c32b85-f62b-407a-93bb-19b747204ba3>
|
CC-MAIN-2020-16
|
https://ic.steadyhealth.com/prevention-of-nosebleeds
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370505730.14/warc/CC-MAIN-20200401100029-20200401130029-00463.warc.gz
|
en
| 0.954075 | 490 | 3.140625 | 3 |
Safecast. This project was initially set up to monitor and map radiation from the Fukushima meltdown in Japan. This is done using hardware, designed and built by the Safecast team and our manufacturing partner Medcom, which records the level of radioactivity at a gps location and logs it to an on-board flash memory card for later analysis and mapping on a publicly accessible database. The radiation monitors are portable, and as such we have no recorded over 12 million data points across the planet.
This project has now begun branching out into air quality monitoring, with a focus on common atmospheric pollutants and particulate matter. Our current focus is to get a network of air quality monitoring devices relaying geotagged air quality metrics to a publicly accessible database for use in the public as well as for academic researchers.
Global Sensor Web. The Global Sensor Web is an online service and application which allows for the public to use a network of devices, such as mobile phones, to monitor their environment. The information gathered from these devices and their on-board sensors, such as magnetic field strength from a phone’s compass, will then be logged in an open online server in an easy to query database for both members of academia and the general public. These data sets can also be concatenated with other public geotagged data sets, such as climatic data from NOAA or seismology data from the USGS, to provide for a richer data set to look for potential patterns in nature over large geospatial scales. We are also developing an online data aggregation and analysis platform for hosting a variety of citizen science projects so anyone with a mobile device will be able to collect scientific data, and anyone with an internet connection will be able to analyze scientific data.
Reefquest. Reefquest is a project to monitor the health of reef sites, and to provide the tools for citizen scientists to help with the monitoring efforts remotely. In Reefquest our dive team has captured a large number of high resolution images of target reef sites in order to measure the health of the sites from color data. This data is also being merged with remotely logged temperature data, which can be used to infer local current velocities, allowing for potential tracking of the point source pollution and elevated heat levels which are damaging to the reef ecosystem.
BioSCAN. This first-of-its-kind scientific investigation will discover and explore biodiversity in and around one of the world’s largest cities: Los Angeles. In three years of sampling from the urban core right out through less-urban surrounding areas, we will focus on the insects, the most diverse group of animals on our planet.
We will discover and document the diversity of insect species living with us in Los Angeles as well as test intriguing hypotheses about how natural areas around the city affect its biodiversity, and specifically, how light in the urban environment is affecting its inhabitants.
Find out more at: http://scienceland.wikispaces.com
Contact Levi at: firstname.lastname@example.org
|
<urn:uuid:e261035a-0e3b-44c6-8deb-cde8b9d0adee>
|
CC-MAIN-2017-47
|
http://ronininstitute.org/research-scholars/levi-simons/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806317.75/warc/CC-MAIN-20171121055145-20171121075145-00426.warc.gz
|
en
| 0.927854 | 611 | 2.75 | 3 |
Irrigation for plant growing in arid and semi-arid regions places an extreme burden on water resources and requires the development of sustainable irrigation methods. One of the tools to save irrigation water could be Cocoon, a Land Life Company biodegradable product designed to serve as an incubator for arid tree planting. Land Life Company claims that Cocoon protects and nurtures the plant from seedling to growth with an extreme reduced amount of water – only 23 to 40 liters per tree one-off. In this project we are testing three plant species (Ziziphus spina christi; Prosopis cineraria; Azadirachta indica). It ensures that no weeds can grow in the vicinity of the seedling, taking away competition for water and light and giving the indigenous pioneers a strong start. Furthermore, some natural fungi to support the proliferation of the plant roots are added, which in turn improve drought resilience and nutrient uptake. All these combined factors are considered to increase radically the survival rates, growth rates and vigor of trees planted in marginal lands without the need for irrigation.
|
<urn:uuid:a7add701-9990-4fa3-b73a-3dd7ef036b26>
|
CC-MAIN-2017-30
|
http://biosaline.org/content/water-saving-roadside-plantation-using-cocoon-technology
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549426693.21/warc/CC-MAIN-20170727002123-20170727022123-00501.warc.gz
|
en
| 0.912603 | 225 | 3.3125 | 3 |
Weight management is always one topic that competitive endurance athletes love to discuss. The main issue is: how do you reduce your intake enough to lose weight, but ensure you have enough energy for training?
In endurance sport, carrying extra weight slows you down. On the bike, when climbing on a 6% climb, 1kg is equivalent to having to produce about an extra 6 watts. On the flat, this is reduced.
To understand this we need to examine and challenge some basic principles of nutrition. In very simple terms, the body stores all extra energy in the form of adipose (fat). We store a small amount of energy in carbohydrate; this would be in the region of 60g in the liver and a few hundred grams in lean tissue.
Even in a lean person, the body likes to store about 10kg of fat, and the reason we store all this excess energy as fat is because, weight for weight, fat yields the most energy. 1g of carbohydrate provides 3.75kcal, and 1g of fat provides approximately 9kcal. Body fat (adipose) is not pure fat, so 1g of adipose is approximately 7kcal.
That means 1kg of adipose is worth about 7,000 kcal. Therefore, to lose 1kg of body fat, you need to be in an energy deficit of 7,000 kcal. In exercise terms that is equivalent to someone running about 70 miles, or in food terms this is equivalent to about 28 Big Macs or about 6.5kg of cooked quinoa.
When we train, especially hard training, we use more carbohydrates, and if we do not have the necessary carbs, it will affect the quality of training. We have all under-fuelled and felt the results of 'bonking'.
Lose fat, not muscle
One other point we must consider is that when we are losing weight, we want to lose fat and not muscle. However, all too often when we reduce energy intake, we lose both fat and muscle. A major reason for this is that when we reduce energy, especially from carbohydrate, the body will use more protein. There are both dietary and exercise strategies that can reduce and prevent the muscle loss.
Before starting a weight-loss plan, people should consider whether it is worth the additional work and stress. Also, how much weight have you got to lose? Today there are many body composition monitoring devices, such as scales that use bio-impedance to gauge body composition. The precision of these can be variable, but they can provide a guide for weight loss and the monitoring of that weight loss.
Some weight training will help reduce muscle loss while trying to lose weight.
The key points to consider for effective weight management:
- How much is the desired weight loss?
- Following a weight-reducing diet can add additional stress to the body. Only start this if you are in good health.
- It's a good idea to have iron stores checked, and if low, consider an iron supplement.
- Plan gradual weight loss. This will compromise training and recovery less than rapid weight loss. 500g-1kg a week is about the maximum you should aim for; this is a deficit of 500-1,000 kcal per day.
- Try to plan the weight loss at times when you do not have intense training.
- Ensure that you ingest about 1.5g-2g of protein per kg of body weight a day, split between your meals. For example, a 70kg triathlete would require about 100g-140g of protein a day. Dairy protein is particularly good, but it's not really a problem for vegetarians or vegans: you just have to plan the vegetable protein carefully. Foods such as quinoa, soya, pulses and nuts are particularly good vegetarian proteins.
- Periodise your carbohydrate intake. If you are doing light or low-intensity training, reduce the carbohydrate around the training session. If the following day you have a hard session, then carbohydrate should be increased after training.
- Quick and slow carbohydrates. Base your carbohydrates mainly on low glycaemic index (GI) foods such as porridge, sweet potatoes, and quinoa. These carbohydrates are more slowly absorbed.
- Snacking. Include a mid-morning and mid-afternoon snack. I find something like a banana or about 40g of pistachio nuts works well.
- Healthy fats. A common mistake is for people to cut fat back too far. Like proteins, we have essential fats as well. I always recommend that when people are on a weight-loss plan that they include fats such as oily fish, eggs, avocado, milled seeds (see seed and berry mix recipe), pistachio nuts and olive oil. I would normally recommend an omega-3 supplement high in Eicosapentaenoic acid (EPA), aiming for 1-2g a day. For elite athletes, I may also include a CLA supplement.
- Monitor your weight. Try to get weighed on the same scales at the same time each week, and keep a record of this.
- Resistance work and some strength work will help to reduce muscle loss.
- For most triathletes, weight management should not be a big issue, and for anyone who is really unsure, they would benefit from some professional dietary input.
|
<urn:uuid:6f58a845-bd95-4d3a-a3c2-e413048b46ef>
|
CC-MAIN-2023-50
|
https://www.healthspanelite.nz/expert-insight/how-do-i-lose-weight-but-not-compromise-training/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100135.11/warc/CC-MAIN-20231129173017-20231129203017-00151.warc.gz
|
en
| 0.947237 | 1,101 | 3.078125 | 3 |
Corrosion des alliages (2016)7:19
Corrosion: Conversion of a material by a chemical reaction with an oxidant that causes a degradation of its properties. Corrosion is nothing more than the process by which metal forged by humans returns to its natural state. ALLOY: Combination of a metallic element with one or more other chemical elements. In Corrosion des alliages [Corrosion of Alloys], a collection of all sorts of metallic sounds held together with (chemical) processing elements creates new alloys. After they have been assembled, an oxidizing agent corrodes the structure, causing it to return to its original form.
- Year of composition:
- Duration of the submitted work:
Ariaratnam, Aska, Béland, Carlone, Fillion, Frank, Fresnais, Gorman, Gouze, Jasmin…31 tracks
Béland, Ricard, Sorce-Lévesque, Tremblay4 tracks
|
<urn:uuid:43fd5b99-d672-467b-be4a-5aef91ba0e1f>
|
CC-MAIN-2020-29
|
https://sonus.ca/oeuvre/46519/Corrosion_des_alliages_J%C3%A9r%C3%A9mie_Ricard
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655897707.23/warc/CC-MAIN-20200708211828-20200709001828-00550.warc.gz
|
en
| 0.84629 | 206 | 2.78125 | 3 |
What does sorted mean?
Definitions for sorted
This dictionary definitions page includes all the possible meanings, example usage and translations of the word sorted.
arranged according to size
arranged into groups
Put into some order by sorting.
a sorted list of numbers
In good order, under control.
I have to get my life sorted.
In possession of a sufficient supply, especially of narcotics.
Sorted for E's & Wizz (song and album by UK band Pulp)
A general expression of approval.
Verb form of the word sort.
The delivery is sorted daily when it arrives at the post office.
Submitted by MaryC on June 29, 2020
British National Corpus
Written Corpus Frequency
Rank popularity for the word 'sorted' in Written Corpus Frequency: #1563
Anagrams for sorted »
The numerical value of sorted in Chaldean Numerology is: 7
The numerical value of sorted in Pythagorean Numerology is: 9
Examples of sorted in a Sentence
Someone is going to get $10,000 off him. If that’s the law, I may as well get the money. If it’s not the law, let’s go to court and get it sorted out.
He (Sirisena) stressed that what happened around the port city in Colombo is rather temporary, and he said the problem does not lie with the Chinese side and hopes to continue with the project after things are sorted out.
As far as Europe is concerned, and its common ground, theres been no criticism or complaints that this vessel is carrying oil from Iran, the only problem from the European point of view was the destination of the vessel and that has been sorted.
Russian President Vladimir Putin:
You've still not sorted this out and don't believe you need to defend the interests of the company, do you understand what you're saying?
A lot of people surrender to prison, and because they don't have the money sorted out, they're not going to shop in the commissary for a week, someone comes up and says' Hi, nice to meet you. Oh, you need some granola. Here's some coffee.'.
Popularity rank by frequency of use
Find a translation for the sorted definition in other languages:
Select another language:
- - Select -
- 简体中文 (Chinese - Simplified)
- 繁體中文 (Chinese - Traditional)
- Español (Spanish)
- Esperanto (Esperanto)
- 日本語 (Japanese)
- Português (Portuguese)
- Deutsch (German)
- العربية (Arabic)
- Français (French)
- Русский (Russian)
- ಕನ್ನಡ (Kannada)
- 한국어 (Korean)
- עברית (Hebrew)
- Gaeilge (Irish)
- Українська (Ukrainian)
- اردو (Urdu)
- Magyar (Hungarian)
- मानक हिन्दी (Hindi)
- Indonesia (Indonesian)
- Italiano (Italian)
- தமிழ் (Tamil)
- Türkçe (Turkish)
- తెలుగు (Telugu)
- ภาษาไทย (Thai)
- Tiếng Việt (Vietnamese)
- Čeština (Czech)
- Polski (Polish)
- Bahasa Indonesia (Indonesian)
- Românește (Romanian)
- Nederlands (Dutch)
- Ελληνικά (Greek)
- Latinum (Latin)
- Svenska (Swedish)
- Dansk (Danish)
- Suomi (Finnish)
- فارسی (Persian)
- ייִדיש (Yiddish)
- հայերեն (Armenian)
- Norsk (Norwegian)
- English (English)
Word of the Day
Would you like us to send you a FREE new word definition delivered to your inbox daily?
Use the citation below to add this definition to your bibliography:
"sorted." Definitions.net. STANDS4 LLC, 2023. Web. 10 Jun 2023. <https://www.definitions.net/definition/sorted>.
Discuss these sorted definitions with the community:
We're doing our best to make sure our content is useful, accurate and safe.
If by any chance you spot an inappropriate comment while navigating through our website please use this form to let us know, and we'll take care of it shortly.
You need to be logged in to favorite.
|
<urn:uuid:4d1a0509-f02a-4737-b604-9119117ff4a3>
|
CC-MAIN-2023-23
|
https://www.definitions.net/definition/sorted
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224657720.82/warc/CC-MAIN-20230610131939-20230610161939-00530.warc.gz
|
en
| 0.86371 | 1,277 | 2.75 | 3 |
NIST Special Publication 800-171 Guide: A Thorough Handbook for Compliance Preparation
Ensuring the security of sensitive data has turned into a vital concern for organizations in various industries. To lessen the risks associated with unauthorized access, data breaches, and online threats, many enterprises are relying to standard practices and models to create resilient security measures. An example of such standard is the National Institute of Standards and Technology (NIST) Special Publication 800-171.
In this article, we will delve into the NIST SP 800-171 guide and explore its significance in preparing for compliance. We will discuss the main areas covered by the checklist and provide insights into how organizations can effectively implement the essential controls to achieve conformity.
Understanding NIST 800-171
NIST SP 800-171, titled “Safeguarding Controlled Unclassified Information in Nonfederal Systems and Organizations,” defines a array of security standards created to safeguard controlled unclassified information (CUI) within non-governmental systems. CUI denotes restricted data that needs safeguarding but does not fit into the category of classified data.
The objective of NIST 800-171 is to offer a structure that private organizations can use to implement efficient safeguards to protect CUI. Compliance with this framework is required for entities that handle CUI on behalf of the federal government or as a result of a contract or agreement with a federal agency.
The NIST 800-171 Compliance Checklist
1. Access Control: Admittance regulation measures are essential to halt unauthorized users from entering sensitive data. The checklist includes requirements such as user identification and authentication, entrance regulation policies, and multiple-factor verification. Businesses should set up robust entry controls to ensure only authorized users can gain access to CUI.
2. Awareness and Training: The human aspect is often the weakest link in an company’s security stance. NIST 800-171 emphasizes the significance of instruction employees to identify and respond to threats to security suitably. Frequent security alertness initiatives, training sessions, and policies on incident notification should be implemented to cultivate a culture of security within the enterprise.
3. Configuration Management: Appropriate configuration management assists secure that infrastructures and devices are firmly configured to reduce vulnerabilities. The checklist demands businesses to establish configuration baselines, manage changes to configurations, and carry out routine vulnerability assessments. Following these criteria helps stop unauthorized modifications and decreases the risk of exploitation.
4. Incident Response: In the event of a incident or compromise, having an efficient incident response plan is essential for mitigating the impact and regaining normalcy rapidly. The checklist details criteria for incident response preparation, assessment, and communication. Companies must create processes to identify, assess, and respond to security incidents quickly, thereby guaranteeing the continuity of operations and securing classified information.
The NIST 800-171 checklist presents organizations with a comprehensive structure for safeguarding controlled unclassified information. By complying with the guide and executing the necessary controls, organizations can improve their security posture and accomplish compliance with federal requirements.
It is important to note that compliance is an continuous course of action, and companies must repeatedly assess and update their security measures to tackle emerging risks. By staying up-to-date with the latest revisions of the NIST framework and utilizing extra security measures, businesses can create a strong framework for securing classified information and mitigating the dangers associated with cyber threats.
Adhering to the NIST 800-171 guide not only helps organizations meet compliance requirements but also demonstrates a commitment to safeguarding sensitive information. By prioritizing security and executing resilient controls, businesses can foster trust in their clients and stakeholders while reducing the probability of data breaches and potential reputational damage.
Remember, attaining compliance is a collective effort involving workers, technology, and organizational processes. By working together and allocating the needed resources, businesses can assure the privacy, integrity, and availability of controlled unclassified information.
For more information on NIST 800-171 and comprehensive axkstv guidance on compliance preparation, look to the official NIST publications and seek advice from security professionals seasoned in implementing these controls.
|
<urn:uuid:126339ef-3892-4340-8edc-a5f0eb8c0e26>
|
CC-MAIN-2023-50
|
http://freebooki.net/82/exploring-the-nist-800-171-assessment-tool-evaluating-your-organizations-compliance/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100164.15/warc/CC-MAIN-20231130000127-20231130030127-00431.warc.gz
|
en
| 0.899151 | 831 | 2.515625 | 3 |
A Look at Welfare Reform
"Remember the Children: Mothers Balance Work and Child Care Under Welfare Reform," a report from researchers at the University of California, Berkeley, and Yale University, offers the following preliminary findings about how families affected by welfare-to-work programs are faring:
- Young children are moving into low-quality child-care settings as their mothers move from welfare to work.
- A sizable share of women are moving into jobs.
- Wages are low, and households remain impoverished.
- Levels of economic and social support gained by the women are uneven.
- Young children's early learning and development are limited by
uneven parenting practices and high rates of maternal depression.
- Child-care subsidies are not being used by many of the women who are eligible for them. In Connecticut, for example, only 13 percent of the eligible mothers were found to be using the federally funded subsidies.
"Remember the Children" is available for $25 from the Graduate School of Education-PACE, University of California, Berkeley, CA 94720; (510) 642-7223.
Vol. 19, Issue 22, Page 15
|
<urn:uuid:97e332a8-c106-4666-98d3-d425f0753b54>
|
CC-MAIN-2017-30
|
http://www.edweek.org/ew/articles/2000/02/09/22carebox2.h19.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549423183.57/warc/CC-MAIN-20170720121902-20170720141902-00648.warc.gz
|
en
| 0.950866 | 238 | 2.8125 | 3 |
1. The problem statement, all variables and given/known data 1.a) Taking the Schrodinger second order differential equation given, split it into two first order differential equations for numerical solving. We're given the relevant constants in a table, such as [tex]\hbar[/tex], [tex]\alpha[/tex], etc. 'z' is taken to be an indepedent variable which we incorporate into our initial conditions (which we must state). 3. The attempt at a solution Have i done this right? Is it right to say that [tex]\Psi(z)[/tex]=vz ? Since the [tex]\Psi(z)[/tex] that is in the equation, the one multiplied by ..+[U(z)-En][tex]\Psi(z)[/tex] has to be set to something too (?).
|
<urn:uuid:0bd25c11-246c-479d-867f-4a74de0ace04>
|
CC-MAIN-2017-34
|
https://www.physicsforums.com/threads/splitting-2nd-order-de-into-two-1st-order-des.398212/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886104681.22/warc/CC-MAIN-20170818140908-20170818160908-00109.warc.gz
|
en
| 0.881226 | 184 | 2.53125 | 3 |
Chemicals in house dust can promote obesity (adiposity). That’s the result of a study undertaken by American researchers. The chemicals prefer to dock with a receptor that influences fat metabolism. Particularly active are the by-products of diethylhexyl phthalate (DEHP), which is used as a softener for PVC and elastomers, and Tributyltin, which has been prohibited as a biocide, but which is still present in the environment.
Chemicals bond to house dust with particular ease. That’s why inhaling house dust is an important pathway for the ingestion of chemicals in the body, particularly for small children. According to researchers, small children inhale up to 50 mg of dust every day.
The structure of the molecules is a decisive criterion for a tight bond to the receptor. In their upcoming studies, the scientists want to determine which structures most strongly activate the receptors and if mixtures of chemicals strengthen their effects.
|
<urn:uuid:5030796d-cbba-4f9d-81f9-c183848e46c1>
|
CC-MAIN-2017-39
|
https://kft-blog.com/2015/08/13/chemicals-can-foster-obesity/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818686705.10/warc/CC-MAIN-20170920071017-20170920091017-00434.warc.gz
|
en
| 0.958517 | 199 | 3.46875 | 3 |
A rock opera is a collection of rock music songs with lyrics that relate to a common story. Rock operas typically are released as concept albums and are not scripted for acting, which distinguishes them from operas, although several have been adapted as rock musicals. The use of various character roles within the song lyrics is a common storytelling device. The success of the rock opera genre has inspired similar works in other musical styles, such as rap opera.
In an early use of the term, the July 4, 1966, edition of RPM Magazine (published in Toronto) reported that "Bruce Cockburn and Mr [William] Hawkins are working on a Rock Opera, operating on the premise that to write you need only 'something to say'."
Colin Fleming of The Atlantic has identified The Story of Simon Simopath (1967) by British psychedelic band Nirvana as the first recorded rock opera. Later in 1967, Montreal's Influence recorded a long suite titled "Mad Birds of Prey (A Mini-Opera)", which closed out their sole album, which was released in January 1968. Nevertheless, Neil Strauss of The New York Times wrote that S.F. Sorrow (1968) by The Pretty Things is "generally acknowledged as the first rock opera." Although Pete Townshend denied taking any influence from S.F. Sorrow, critics have compared The Who's Tommy to it. Scott Mervis of the Pittsburgh Post-Gazette wrote that, although Tommy was not the first rock opera, it was the first album to be billed as such. Tommy would go on to influence On and On, a rap opera by The Fat Boys and American Idiot, a punk rock opera by Green Day. In an effort to appeal to more modern audiences, opera companies have welcomed more pop and rock influences. The resulting rock operas have met varying degrees of success as the worlds of high art and low art mix. Other notable rock operas include The Who's Quadrophenia in 1973 and Pink Floyd's The Wall in 1979.
In Russian music, the term zong-opera (Зонг-опера) is sometimes used, since the first Soviet-Russian rock-opera Orpheus and Eurydice was described with this term for political reasons. While the term "rock-opera" was already known in the Soviet rock music circles, the term "rock" was blacklisted by the Soviet Ministry of Culture. Therefore, the term "zong" was used, a Russian-language rendering of the German word "Song", borrowed from German for philosophical Songs embedded in the dramaturgy of Bertold Brecht, officially popularized in the Soviet Union.
According to Fleming, rock operas are more akin to a cantata or suite, as they are not usually acted out. Similarly, Andrew Clements of The Guardian called Tommy a subversively-labeled musical. Clements states that lyrics drive rock operas, which makes them not a true form of opera. Responding to accusations that rock operas are pretentious and overblown, Pete Townshend wrote that pop music by its very nature deflates such attitudes and is simplistic. Townshend said that the only goal of pop music is to reach audiences, and rock operas are merely one more way to do so. Peter Kiesewalter, on the other hand, said that rock music and opera are "both overblown, massive spectacles" that cover the same themes. Kiesewalter, who was originally not a fan of opera, did not think the two styles would mix well together, but his modernized operas with rock music surprised him with their popularity at the East Village Opera Company.
Rock operas are usually recorded and performed on albums by the artists themselves, but they can also be performed on the stage, such as Rent, which played on Broadway. This usage has also courted controversy; Anne Midgette of The New York Times called them musicals with "no more than the addition of a keyboard and a drum set."
|
<urn:uuid:a9acf78f-0153-4dec-a047-94576df0ffc9>
|
CC-MAIN-2023-40
|
https://alchetron.com/Rock-opera
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510528.86/warc/CC-MAIN-20230929190403-20230929220403-00081.warc.gz
|
en
| 0.975086 | 834 | 2.765625 | 3 |
Until about 500 years ago, the rising oceans of the last ice age kept the world divided into four different zones. In each, people developed very different ways of living. The modern age was born when these zones reconnected.
Read the full article below. Visit the Big History Project website to register for a free teacher account and access hundreds of leveled articles, activities, videos, lessons, and more!
|
<urn:uuid:a44835da-9b3e-4e4c-8765-76685010f462>
|
CC-MAIN-2020-24
|
https://blog.bighistoryproject.com/2015/04/10/the-four-world-zones/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347426801.75/warc/CC-MAIN-20200602193431-20200602223431-00263.warc.gz
|
en
| 0.919809 | 81 | 3.140625 | 3 |
Part One: Journey through the California Desert
By Krista Schlyer
The following is the first in a series of four blogs from Defenders’ California Desert Recorder, Krista Schlyer. Stay tuned for updates as she continues her #DefendOurDesert tour, and follow along via social media.
In the foothills of the Coso Mountains, I stand with Hector Villalobos gazing down onto the beautiful Rose Valley in the California Desert. The vista spreads west to the eastern slope of the towering Sierra Nevada, and aside from Highway 395 and a barely visible utility corridor, it is quiet, wild, and breathtaking. But it’s what you don’t see here that has drawn me, at the start of a two-week photo tour for Defenders of Wildlife.
Beneath the pale green, obsidian speckled ground lies a labyrinthine matrix of tunnels, the unseen but essential underground home of the imperiled Mohave ground squirrel. Also unseen are the complex geological underpinnings of this valley, a dynamic mixture of water, heat and fissures, that in some places presses water toward the surface as springs and small lakes–which are essential to birds traveling the flyway through this arid valley.
“This is a very special place,” Villalobos muses quietly. He would know— he used to manage it. Villalobos recently retired his post with the Bureau of Land Management for this piece of the California Desert Conservation Area. He knows the deep values of this place, and the pressures that are bearing down on it— and there is worry in his voice.
This is why I’m here—development pressures bearing down on the Mohave ground squirrel and fatigued bird-travelers, as well as other wild creatures and special places in the California, Mojave and Sonoran deserts. I’m meandering a vast California desert complex, from Death Valley to the Salton Sea and the Mexican border, to document some of the wild places and critical wildlife habitat, and to help convey the importance of making smart choices about energy development–specifically renewables like solar, wind and geothermal.
Defenders has been working as a voice for wildlife in a process that will help guide the future of renewable energy development in the region. This planning process, called the Desert Renewable Energy Conservation Plan (DRECP), takes some much-needed steps toward guiding development on already degraded lands, but it falls far short in some places, and one of those places is the Rose Valley.
Pressure is mounting for development of geothermal, solar and possibly wind generation here, despite the Valley’s importance to wildlife, and despite the incredible loss it would be as a scenic valley on the doorstep of one of America’s largest and most beautiful national park—Death Valley.
Late in the day I sit on a high rocky ledge overlooking Little Lake, watching thousands of migrating waterfowl, including northern shovelers, grebes and coots. As I listen to the birds’ boisterous chattering and watch them dive and dabble, I recall the devastation a century ago when Los Angeles’ thirst for water drained the nearby Owens Lake, sending reverberations throughout this valley, for birds, people and the economy. Owens Valley will never be the same, but we can still make the right choices for Little Lake, Rose Valley, and what remains of the beautiful Owens Valley, in the gentle shadow of the Sierra Nevada.
Krista Schlyer is a photographer and writer and longtime collaborator of Defenders of Wildlife. She is the author of Continental Divide: Wildlife, People and the Border Wall, and winner of the 2014 Ansel Adams Award for Conservation Photography from the Sierra Club. Stay tuned for more from Krista’s California Desert tour. Find her on Twitter at kristaschlyer and on Instagram at krista_schlyer.
|
<urn:uuid:f0ef6414-99d5-4594-948d-6606948183f0>
|
CC-MAIN-2017-47
|
http://www.defendersblog.org/2014/10/remember-owens-valley/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934804724.3/warc/CC-MAIN-20171118094746-20171118114746-00054.warc.gz
|
en
| 0.92213 | 806 | 2.5625 | 3 |
Introduction to Theatre Online Course
Last Update: November 16, 2007
Resource: Wilson/Goldfarb, Chapter 13
Objectives for this lesson:
Students will examine:
Before 1642 – the royalty supported the theatre.
In 1642, a civil war – the Puritan Revolution. Charles I was beheaded and the country’s leadership taken over by Oliver Cromwell (the Lord Protectorate – the only time in British history that England was not run by a monarch ??).
From 1642 - 1660, called "the interregnum." Theatre was outlawed; it was connected with the monarchy and with "immoral," non-Puritan values.
Music, however, was allowed, and William Davanant (a writer of masques) produced some operas with Italianate stagings (with perhaps some illegal performances).
The monarchy was restored in 1660. Charles I’s son, Charles II, restored to the throne. He had been in France during the Interregnum, in the court of Louis XIV, who loved theatre. Charles II helped bring Italianate and French styles and staging to England.
The Drury Lane and Covent Gardens became the first theatres officially licensed during this period.
The type of theatre brought back resulted in a sort of protest against the Puritan ideal, and was designed primarily for the aristocracy. And then this form of theatre was in turn rebelled against.
Use of "transparency" names: "Sparkish, Fidget,
Mrs. Malaprop ("mal= French for "ill" -- therefore, "ill-appropriate")
William Congreve (1670-1729) – The Way of the World (1700)
William Wycherly (1640-1715) – The Country Wife (1675)
George Etheridge (c. 1637-1691) – She Would If She Could (1668)
The rise of Puritanism after the Puritan Revolution.
By the early 18th century (1700’s), these aristocratic and amoral plays became unpopular and the Neoclassical precept of teaching morals returned.
You can take short study quizzes based on textbook materials by going to the Student Online Learning Center page for our textbook...
This page and all linked pages in this directory are copyrighted © Eric W. Trumbull, 1998-2007.
Page last updated : November 16, 2007
|
<urn:uuid:df6db5aa-f650-4e65-b2e0-5c976c158091>
|
CC-MAIN-2013-48
|
http://novaonline.nvcc.edu/eli/spd130et/restor.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163798888/warc/CC-MAIN-20131204132958-00033-ip-10-33-133-15.ec2.internal.warc.gz
|
en
| 0.942187 | 503 | 3.8125 | 4 |
Dr. Stephen Baron
Degree Award Date
Population Threshold, Quorum Sensing, Chromobacterium violaceum
Bacteriology | Biology | Laboratory and Basic Science Research | Microbiology
Many gram-negative bacteria use N-acyl homoserine lactones for extracellular signaling. These diffusible signaling molecules bind with proteins from the LuxR family, which are transcriptional regulators. Gene expression is therefore dependent on cellular density. This process is called quorum sensing. In Cltromobacterium violaceum a purple pigment known as violacein is produced in response to this process. In this experiment pigment expression was shown not to be based on nutrient concentrations, but rather on population density. The extracellular signals, called autoinducers, were extracted from a high population culture and used to induce pigment production in a low density, non-pigmented culture.
Regi, Sarah, "Determining the Population Threshold for Quorum Sensing in Chromobacterium violaceum" (2002). Honors Projects. 409.
|
<urn:uuid:fe63fb1c-26f9-4faf-b542-c3b1ddcfcbc3>
|
CC-MAIN-2023-40
|
https://digitalcommons.bridgewater.edu/honors_projects/409/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506669.96/warc/CC-MAIN-20230924223409-20230925013409-00076.warc.gz
|
en
| 0.878017 | 266 | 2.859375 | 3 |
Frederick Russell Burnham (1861-1947) was an American scout and adventurer who served a major inspiration for the founding of the international Scouting Movement. Burnham was born on a Lakota Sioux Indian Reservation in Minnesota and learned to scout and remain self-sufficient in his early teens. He traveled the world as a Chief of Scouts, fought in several African military campaigns under the British flag, and befriended Robert Baden-Powell (father of the Boy Scouts) in Rhodesia. Burnham died of heart failure at the age of 86. A mountain in California now bears his name.
"I am more afraid of an army of a hundred sheep led by a lion than an army of a hundred lions led by a sheep."
Source: Taking Chances by Burnham (1944) (via WikiQuote)
|
<urn:uuid:b587ab69-d193-44f9-b331-b44682a7e725>
|
CC-MAIN-2017-43
|
http://bigthink.com/words-of-wisdom/frederick-russell-burnham-the-power-and-appeal-of-fierce-leadership
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823153.58/warc/CC-MAIN-20171018214541-20171018234541-00754.warc.gz
|
en
| 0.970238 | 169 | 2.9375 | 3 |
One has to be encouraged by the fact that at least the U.S. Treasury appears to have learned something from Greece's economic crisis. Rather than pretending that Puerto Rico is solvent, the Treasury now recognizes that an early and orderly debt restructuring would be in the long-term interest of both the island and the collective of Puerto Rico's creditors.
Similarly, rather than leaving the island to its own devices, the Treasury is proposing that, in exchange for bankruptcy protection, Puerto Rico agrees to an oversight board that would assure the full implementation of its fiscal commitments. If adopted soon by Congress, these proposed policies could spare Puerto Rico from Greece's tragic economic fate and enable creditors to get repaid a higher proportion of their loans than would otherwise be the case.
While there are certainly many differences between Puerto Rico and Greece, there are a number of striking similarities. Those similarities suggest that Congress would do well to look at Greece's experience when framing a policy response to the island's deep economic troubles, which are now reflected in a 45 percent domestic poverty rate and in an ever-increasing number of Puerto Ricans leaving the island for the mainland.
Over the past decade, like Greece before it, Puerto Rico took advantage of favorable financial market conditions (in Puerto Rico's case, created by ample Federal Reserve liquidity and by highly generous tax exemptions on interest on its bonds) to borrow very heavily in the capital market. Like Greece too, Puerto Rico made poor use of that borrowing. It did so by allowing major public finance imbalances to build up and by delaying real structural economic reforms that might have galvanized its ailing economy.
Like Greece, Puerto Rico's economy has been in a prolonged slump (owing to mismanagement and Congress withdrawing generous manufacturing tax preferences). Perhaps most important of all, though, similar to Greece, Puerto Rico does not have a currency of its own. As a result, like Greece, Puerto Rico too cannot use interest rate or exchange rate policy as an offset to the contractionary effects of budget tightening on aggregate demand.
In a rare moment of candor, the International Monetary Fund (IMF) recently owned up to two very costly mistakes that it had made in the handling of the Greek economic crisis which contributed importantly to Greece now experiencing an economic depression on the scale of that experienced by the United States in the 1930s. The first mistake was not to recognize in 2010 that Greece was suffering from a solvency, rather than a liquidity, crisis. This led the IMF down the path of demanding from Greece an excessive amount of budget austerity within a euro straitjacket that precluded currency devaluation. The second mistake was that it grossly underestimated the size of Greece's fiscal multipliers or the degree to which budget tightening could have a deleterious impact on the Greek economy. This mistake caused the IMF to be consistently too optimistic in its Greek economic growth forecasts.
The collapse of the Greek economy has had devastating social consequences for the Greek population. It also has hardly been good for Greece's bondholders. In the end, as Greece's capacity to pay was highly diminished by its shrinking economy, Greece's bondholders were forced in 2012 to accept a 75 percent write-down in the present value of their loans in what was the largest sovereign debt default on record.
It is against this background that one has to applaud the U.S. Treasury for seeking an early and orderly restructuring of Puerto Rico's debt, which has now reached over 100 percent of the island's gross national product. To that end, the Treasury is proposing that Congress extend to U.S. territories, like Puerto Rico, Chapter 9 bankruptcy procedures that would allow the island to restructure its 18 different bond issues in an orderly way. The overriding objective of Treasury's proposal is to provide a legal framework for this to be done in an equitable and orderly manner and to avoid the legal free-for-all that would otherwise result and which, if Greece's experience offers any precedent, would be to the detriment of both the island and the creditors as a group.
One also has to applaud the Treasury for linking proposed bankruptcy protection for the island to serious fiscal reform and stronger fiscal governance. To that end, the Treasury is proposing an oversight board that would force Puerto Rico to implement those fiscal reforms necessary to put the island on a better growth path that would be in the interest of both the island and its creditors.
Judging by Greece's catastrophic experience over the last few years, Congress would seem to have a clear choice in its dealings with Puerto Rico. It could continue to sit on its hand and watch the island's economic slump deepen and its population increasingly migrate to the mainland. Alternatively, it could embrace the Treasury's bankruptcy-cum-oversight board proposal that would give the island a fighting chance to turn around its economy. One has to hope that Congress makes the right choice.
* Lachman is a resident fellow at the American Enterprise Institute. He was formerly a deputy director in the International Monetary Fund's Policy Development and Review Department and the chief emerging market economic strategist at Salomon Smith Barney.
source: "The Hill"
|
<urn:uuid:603ca209-2abd-4bd1-8902-92ffd2b512d8>
|
CC-MAIN-2020-24
|
https://deka-org.gr/index.php/arthra/11-articles/politiki/81-greek-lessons-for-puerto-rico
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347392141.7/warc/CC-MAIN-20200527044512-20200527074512-00179.warc.gz
|
en
| 0.970068 | 1,031 | 2.65625 | 3 |
FITs and Solar PV technology
Solar panels seem to be popping up everywhere at the moment. This is due to the governments FIT, (Feed in Tariff) scheme which pays people for producing the electricity on their roof. PV, (Photo-Voltaic), solar panels work by converting light into electricity, so are not dependent on warmth as they work very well on cold days, but they perform best when the sky is bright, and should ideally be fitted south facing so they can catch as much direct sun light as possible. Of course, they don’t produce anything at all when it is dark
The way the FIT scheme works means that there are 3 separate financial returns from solar panels. The generation tariff is the payment made for ALL the electricity produced by the panels, irrespective of what happens to the electricity. Though this payment comes from the utility companies, it is guaranteed by the Government and rises with inflation every year. The Export tariff is paid for the electricity that is not used in the home, which then gets sent back into the grid for redistribution. It varies massively, depending on the size of system installed, but it is typical that 50% of what is produced will be exported. The third element of return comes in the form of the free electricity that will be coming from the panels, meaning that the homeowner doesn’t have to buy as much electricity from their energy supplier. There are a lot of different factors that govern how much a system will produce, and the financial returns. There has been evidence of some companies making very wild claims, so by contacting Nationwide Energy Surveys, we can help you through all the different options, and give you impartial advice. It is clear though, that the FIT scheme can be financially rewarding with a payback period of about 9 years on average, meaning the remainder of the 25 year period is nearly all profit.
An option other than buying is to rent your roof to a supplier. The advantage of this is that there are no upfront costs, in fact with the right company, there shouldn't be ANY costs, but of course, you don’t receive the tariff payments, instead they would go to the supplier. You would however, get the free electricity. Again, there is a myriad of companies offering this service so it is important that you shop around, check all the paperwork, and ideally base your decision on word of mouth.
One company offering this service is A Shade Greener, and we are proud to say that we work alongside them on some projects. They have a very good reputation, and are one of the country's leading suppliers of FREE solar panels. If you would like to know more about them, visit their website here.
|
<urn:uuid:7fbbba3d-88ed-4a54-900f-1f700f74f88c>
|
CC-MAIN-2020-10
|
https://www.nationwideenergysurveys.com/fits
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145713.39/warc/CC-MAIN-20200222180557-20200222210557-00366.warc.gz
|
en
| 0.973283 | 551 | 2.875 | 3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.