text
stringlengths 263
344k
| id
stringlengths 47
47
| dump
stringclasses 23
values | url
stringlengths 16
862
| file_path
stringlengths 125
155
| language
stringclasses 1
value | language_score
float64 0.65
1
| token_count
int64 57
81.9k
| score
float64 2.52
4.78
| int_score
int64 3
5
|
---|---|---|---|---|---|---|---|---|---|
Annuals, biennials, or short-lived perennials, ( subshrubs in var. ziegleri). Stems, branches, and peduncles glabrous, puberulent, or canescent, sometimes also stipitate-glandular or gland-dotted. Leaf blades linear-lanceolate to linear or linear-oblanceolate (ovate to obovate in var. leucanthemifolia), mid 10-60 × 1.5-6(-8) mm, margins entire to irregularly dentate or serrate, faces glabrous, puberulent, or canescent, sometimes sparsely stipitate-glandular; distal bases not clasping or slightly clasping (clasping in var. leucanthemifolia). Involucres campanulate or turbinate. Phyllaries in 3-10 series, appressed, spreading, or reflexed, indurate bases usually glabrous, apices acute to acuminate, 1-3 mm, herbaceous, faces glabrous (indurate bases, sometimes foliaceous parts) or hairy (only foliaceous parts), sometimes stipitate-glandular. Receptacles 2.5-5 mm diam. Ray florets pistillate and fertile, or sterile or 0 (in var. shastensis); laminae white, blue, or purple, 6-12 × 1-3 mm. Disc florets: corollas 4-6(-7) mm. Cypselae glabrous or moderately appressed-hairy.
Martin and Hutchins 1980, FNA 2006, Allred and Ivey 2012, MacDougall 1973
Duration: Biennial Nativity: Native Lifeform: Forb/Herb General: Annual, biennial, or short-lived perennial herbs, to 70 cm tall; stems branched; herbage glabrous, puberulent, or canescent, sometimes also stipitate-glandular or gland-dotted. Leaves: Alternate and usually sessile along the stems, leaf bases on some individuals tapering into petioles; blades linear-lanceolate, linear, or linear-oblanceolate, the mid-stem leaves 1-6 cm long and 1.5–6 mm wide; margins entire to irregularly dentate or serrate; faces glabrous, puberulent, or canescent, sometimes sparsely stipitate-glandular; bases of upper leaves sometimes clasping the stem. Flowers: Flower heads showy, radiate, purple with yellow centers, arranged in terminal panicles; involucres campanulate or turbinate, 6-10 mm high, the bracts (phyllaries) in 3-10 well-graduated series, the outer phyllaries much shorter than the inner; phyllary bases straw colored and firm (indurate) and phyllary tips green, herbaceous, usually appressed; phyllary faces glabrous or hairy on the green tip only, sometimes also stipitate-glandular; ray florets 10-25 per flower head, the laminae (ray petals) 6-12 mm long, white, blue, or purple; disc florets yellow. Fruits: Achenes appressed-pubescent or glabrous; topped with a pappus of bristles. Ecology: Found in open, often sandy sites, on flats and slopes, from 3,000-9,500 ft (914-2896 m); flowers July-October. Distribution: Western N. Amer. from British Columbia to Saskatchewan, south through WA, ID, MT and ND to CA, AZ, NM and TX; south to nw MEX. Notes: Look for this incredibly variable species under Aster canescens in older texts. There are many other synonyms as well, most notably Machaeranthera canescens. There have been a number of recent changes in what used to be the Aster genus, and species descriptions from different sources, even recent sources, are in conflict. This species description is roughly in line with the one in Flora of North America (2006), with edits based on which traits were actually visible and reliable on herbarium specimens at Northern Arizona University. There are 3 species in what is currently being called Dieteria: D. asteroides, D. canescens, and D. bigelovii. They are morphologically variable, challenging to distinguish from each other, and often intergrade so that differences described in the keys are not always helpful. D. asterides and D. canescens are the most similar; distinguish between them by looking at the phyllaries with your hand lens. The phyllaries on D. asteroides are hairy all over, on both the straw-colored bottom portion and the darker green tip, are more likely to have glandular hairs, and always have longer green tips, which are about as long as the light-colored portion and spreading so that they point outward or downward. D. canescens has less hairy phyllaries, which are often hairy on the green tip but usually not on the straw-colored base. The phyllaries on D. canescens are straw-colored for the lower two-thirds or more, with short green tips that do not spread away from the flower head or only spread a little. The third species, D. bigelovii, is easier to tell apart from the other two Dieteria spp. It has long narrow linear leaves with few, if any, shallow teeth or lobes, and larger flower heads, the largest flower heads on most plants having involucres about 2 cm or a little more in diameter (usually 1.5 cm or smaller involucres on D. asteroides and D. canescens.) D. bigelovii also has long-acuminate, reflexed (curved downward) phyllary tips, which are often tinged red or purple. Ethnobotany: Used medicinally to treat throat and nose troubles and headaches; also used as an emetic, an eyewash, a blood tonic, and a strong stimulant. Etymology: Dieteria comes from the Greek di, two, and etos, year, alluding to the biennial duration; canescens means covered in short, gray hairs. Synonyms: Machaeranthera canescens, Aster canescens, and many others Editor: SBuckley 2010, AHazelton 2017
Plant: Annual to perennial herb < 12 dm, generally canescent-puberulent and often glandular; stems 1-several from base, generally branched above and ± bushy Leaves: simple, alternate, generally 3-10 cm, generally 2-6 mm wide, linear to obovate, subentire to dentate or minutely serrate; lower tapered; upper sometimes clasping INFLORESCENCE: primary inflorescence a head, each resembling a flower; heads radiate; phyllaries generally in 3-10 series, tips short-triangular to elongate, acuminate, spreading to bent backward, generally ± glandular or glabrous Flowers: Ray flowers many (0 in var. shastensis ); corollas blue-purple; ligules 1-2 cm; Disk flowers many; corollas 5.5-8 mm, yellow; style tips triangular to linear, acute Fruit: achenes, 2.5-3.5 mm, narrowly obovate, weakly curved and ± flattened with 5-7 ribs on each face, glabrous or ± silky; pappus 6-8 mm Misc: 300-3400 m.
|
<urn:uuid:735ab0ec-7c89-40e2-baad-5509a1991245>
|
CC-MAIN-2020-05
|
http://intermountainbiota.org/portal/taxa/index.php?taxauthid=1&taxon=3916&clid=3103
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250626449.79/warc/CC-MAIN-20200124221147-20200125010147-00507.warc.gz
|
en
| 0.879746 | 1,613 | 2.8125 | 3 |
Photinia includes several dozen species of evergreen shrub commonly used as a hedge. These shrubs are extremely tolerant of a wide range of soil conditions, which is why they are such popular landscape plants. Photinia can grow up to 12 inches per year to a height of 12 to 15 feet. Several varieties of photinia are suitable for the home garden, but one of the most impressive is 'Red Robin' or red tip photinia. It produces bright-red new growth in the spring and responds well to shearing several times a year to spur colourful new growth. Photinia may be trimmed year-round, but pruning is best done from late February through March.
Prepare your pruning tools by sharpening them. Hold the blade portion of the implement at a 45-degree angle and drag it lightly over the sharpening stone. Repeat this motion three or four time but no more. Any more times and you are sharpening the blade and then making it dull again. If the blade won't sharpen, it is time to replace it.
Remove any dead or broken wood from the photinia. Cut dead wood back to a live branch. Make cuts at a 45-degree angle and cut 1/4 inch above the next piece of wood. When removing a large branch, cut back to the main wood or trunk but not into the branch collar. The branch collar is the swelling in the wood out of which the branch grew. Cutting into this can damage the shrub and invite disease.
Prune photinia once annually so that you do not have to do as much shaping. Photinia doesn't need much pruning except for cosmetic purposes. Never remove more than one-third of the wood at one time. Cut back to growing points. These can be recognised by following the terminal growth back to where the stem branches out. Cut on the outside edge of the growing point at an angle 1/4 inch away from where it branches out.
Shear or trim as needed to keep the photinia hedge looking its best. Hand shearing is best, if more time consuming, because you won't be left with ragged, chopped leaves. A gas or electric trimmer makes short work of trimming the hedge. Go straight across the top and the exposed sides for a boxy look or start at the bottom and stroke up and over for a more natural, rounded look. Keep the bottom of the hedge just slightly wider than the top for strength and so that sunlight can penetrate all the way down.
Start training photinia during its first year of growth. Dock the top to promote bushing and trim small amounts over the first couple of years to keep the growth habit down. Rake up debris and loose leaves every time you cut the shrub to minimise hiding places for pests and prevent disease spread.
Consistent trimming of red tip photinia throughout the year will keep it producing attractive foliage but may expose the shrub to fungal disease in humid or wet temperate regions like the Pacific Northwest. The more hygenic method is to trim in late winter when the plant is dormant. Photinia is subject to numerous fungal diseases.
Tips and warnings
- Consistent trimming of red tip photinia throughout the year will keep it producing attractive foliage but may expose the shrub to fungal disease in humid or wet temperate regions like the Pacific Northwest. The more hygenic method is to trim in late winter when the plant is dormant. Photinia is subject to numerous fungal diseases.
Things you need
- Sharpening stone
- Hedge trimmers
|
<urn:uuid:f2140950-92f0-4283-8367-bcf301f53710>
|
CC-MAIN-2017-34
|
http://www.ehow.co.uk/how_8132275_trim-photinia.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886105297.38/warc/CC-MAIN-20170819031734-20170819051734-00060.warc.gz
|
en
| 0.936403 | 727 | 2.75 | 3 |
The C# do-while loop is a variant of the while loop except for one main difference: it will always execute the loop body at least once in the beginning irrespective of the condition being true or false. The condition is evaluated at the end of the first execution of the block when the while statement is encountered.
Bear in mind that somewhere in the loop, the expression should be changed to false to avoid an infinite or endless loop.
C# do while loop syntax is as follows:
|do-while loop execution order||do-while loop flowchart|
The do-while loop starts with the do keyword and the loop body. At the bottom of the block is while keyword followed by single expression within parentheses ().
- This type of loop is also called a post-test loop.
- Always executes the loop body at least once, even if the condition fails the first time.
- The condition (Boolean expression) is evaluated after each new iteration of the loop. This must be true in order for the next iteration to be performed. The iterations end when the condition is false.
- If the loop’s condition is constantly true, then the loop never ends.
- Loop ends with a semicolon “;”.
- Statements are the block of code that you want to execute multiple times in a loop.
C# do-while Loop Example
The code below shows an example of how a do-while loop works. It writes out all the integers from 1 to 4. If you have more than one statement within the loop, you must enclose the statements in curly brackets.
The above code consists of:
- Declared and initialized a Counter variable with the int type and assigned an initial value of 0 to it,
- First time in the beginning, the loop body executes at least once irrespective of the condition being true or false.
- The Boolean expression is evaluated at the bottom of the code block when encountered.
- The Boolean condition
(counter < 4)will repeatedly execute until the counter is less than 4.
- An expression for updating the counter (
counter++is a syntactically-shorter version of counter=counter+1) adds 1 at the end of each repetition, thus increasing the counter variable by 1.
C# do-while With a Single Statement
Curly brackets for the loop are optional if there is only one statement in the code block.
int counter = 0; do counter++; while (counter < 4);
Loop Control Statements
You may need to use jump statements to control the order in which the statements are executed. Read more on …
|
<urn:uuid:5850a325-460a-41db-bd53-5ba7450a187c>
|
CC-MAIN-2020-34
|
https://www.codebuns.com/csharp-basics/c-do-while-loop/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439741154.98/warc/CC-MAIN-20200815184756-20200815214756-00067.warc.gz
|
en
| 0.867134 | 552 | 3.609375 | 4 |
EarthCam, the leader in live camera technology, content and services, today at Autodesk University introduced its Live Weather service, which uses an onsite, wireless, solar-powered sensor array to detect and calculate 16 points of weather and environmental data. This data is combined with NOAA observed conditions and radar maps to create precise, localized microclimate information – far more accurate than regional forecasts alone can provide.
Live jobsite camera imagery is overlaid with accurate, straightforward weather data to create a complete environmental record for the lifetime of each project. Project managers now have a searchable archive of activity at each location, with the added context of easy-to-read graphical weather visuals.
“It’s always nice that on your dashboard, you have the weather interface and the wind speed,” said Paul Smedburg, Project Executive at C.D. Smith Construction. “For a general contractor that could end up in a dispute on a force majeure claim on weather events - it’s very common in the industry to have some initial blowback - ‘well it really didn’t snow that much!’ EarthCam has been a godsend for me.” High resolution time-stamped imagery with detailed weather data creates an indisputable permanent record of conditions, and all data is automatically uploaded to project management software, such as Autodesk Build or Procore daily logs.
The construction industry increasingly experiences weather events that lead to delays or disputes, and needs to be proactive when potentially unsafe conditions require work cessation or emergency response. Relying entirely on local regional forecasting is risky for projects that are in remote locations, as the closest forecast data relates to a location that is many miles away from the jobsite. Fully-wireless and solar-powered, EarthCam’s new system provides local monitoring and analysis in seconds instead of hours, to both predict and document weather events more accurately for project managers and site safety personnel.
According to OSHA, cloud-to-ground lightning occurs 20 to 25 million times in the U.S. every year. The moment to safely take cover from lightning strikes is hard to gauge by relying on NOAA weather reports alone, which can’t estimate the distance or frequency of lightning. EarthCam’s Live Weather System automatically alerts teams to the approximate distance of lightning as far as 25 miles from the jobsite – more than twice the distance that thunder can be heard. These alerts are a key part of worker safety, giving crews more time to prepare for an oncoming storm and take necessary precautions.
EarthCam’s system calculates whether a storm is approaching or receding based on lightning strike distance data, and counts the number of strikes to help assess risks in detail.
Live Weather’s configurable alerts combine real-time jobsite microclimate data with detailed forecast information, including up to 128 different advisories, watches and warnings powered by NOAA.
EarthCam’s Control Center has long been the software of choice among industry leaders for smart project documentation, promotion, safety and security. EarthCam provides camera rentals, professional installation and reality capture services to make construction project management more efficient, empowered by visual data. EarthCam’s new live weather service – including the onsite sensor array – is available now at an MSRP of $1500. To learn more, visit earthcam.net/liveweather.
EarthCam® is the global leader in providing webcam content, technology and services. Founded in 1996, EarthCam provides live streaming video, time-lapse construction cameras and reality capture solutions for corporate and government clients. EarthCam leads the industry with the highest resolution imagery available, including the world’s first outdoor gigapixel panorama camera system. This patented technology delivers superior multi-billion pixel clarity for monitoring and archiving important projects and events. EarthCam has documented over a trillion dollars of construction projects around the world. The company is headquartered on a 10-acre campus in Northern New Jersey.
Projects documented by EarthCam include: One Vanderbilt Manhattan, St. Regis Chicago, Hudson Yards, UBS Arena, Los Angeles SoFi Stadium, Las Vegas Allegiant Stadium, Mercedes-Benz Stadium, LAX Airport, Moynihan Station, San Francisco Oakland Bay Bridge, Panama Canal Expansion, The Red Sea Project, The Jeddah Tower, Academy Museum of Motion Pictures, Whitney Museum of American Art, Louvre in Abu Dhabi, Smithsonian National Museum of African American History and Culture, One World Trade Center, Statue of Liberty Museum and the Smithsonian Air & Space Museum.
Learn more about EarthCam’s innovative solutions at earthcam.net
|
<urn:uuid:5ec7bff4-5b50-4c56-b544-7af77e8a448f>
|
CC-MAIN-2023-40
|
https://www.earthcam.net/about/press.php?action=view&prid=700
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506632.31/warc/CC-MAIN-20230924091344-20230924121344-00253.warc.gz
|
en
| 0.900583 | 957 | 2.625 | 3 |
Definitions for salmon river
This page provides all possible meanings and translations of the word salmon river
Salmon, Salmon River(noun)
a tributary of the Snake River in Idaho
The Salmon River is located in Idaho in the northwestern United States. The Salmon is also known as The River of No Return. It flows for 425 miles through central Idaho, draining 14,000 square miles and dropping more than 7,000 feet between its headwaters, near Galena Summit above the Sawtooth Valley in the Sawtooth National Recreation Area, and its confluence with the Snake River. Its discharge is 11,060 cubic feet per second. It is the largest tributary of the Snake River, ahead of the Clearwater River. Cities located along the Salmon River include Stanley, Clayton, Challis, Salmon, Riggins, and White Bird. Redfish Lake and Little Redfish Lake near Stanley flow into the river via Redfish Lake Creek.
Find a translation for the salmon river definition in other languages:
Select another language:
Discuss these salmon river definitions with the community:
Use the citation below to add this definition to your bibliography:
"salmon river." Definitions.net. STANDS4 LLC, 2014. Web. 2 Sep. 2014. <http://www.definitions.net/definition/salmon river>.
|
<urn:uuid:2feeb4ae-8d20-4324-8f1f-154b9115e48a>
|
CC-MAIN-2014-35
|
http://www.definitions.net/definition/salmon%20river
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535921872.11/warc/CC-MAIN-20140909042413-00491-ip-10-180-136-8.ec2.internal.warc.gz
|
en
| 0.882766 | 278 | 3 | 3 |
About this book
Aerial photography has revealed the striking, widespread phenomenon of repeating patterns of vegetation in more arid areas of the world. Two interdependent phases, bands of dense and sparse vegetation, alternate in the landscape. This volume synthesizes half a centurys accumulated knowledge of both theoretical and applied landscape functions from a variety of these regions. It covers structure, dynamics, and methods of study, as well as disturbances to these landscapes and relevant management issues. Chapters are included to discuss the role of modeling in answering questions about the origins and complex processes of banded landscapes. Studies of banded landscapes have yielded valuable lessons for understanding other semi-arid landscapes as well, leading to a knowledge base facilitating sustainable use and rehabilitation.
Vegetation development environment soil
|
<urn:uuid:4c74e65f-2f6e-43fe-bbd3-3fec09759cc6>
|
CC-MAIN-2020-24
|
https://link.springer.com/book/10.1007%2F978-1-4613-0207-0
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347390442.29/warc/CC-MAIN-20200526015239-20200526045239-00514.warc.gz
|
en
| 0.92975 | 154 | 3.09375 | 3 |
In the aftermath of the First World War, Woodrow Wilson tried to push a comprehensive and enlightened peace plan.
Credit: Image courtesy of American Memory at the Library of Congress.
In January 1918, less than one year after the United States entered World War I, President Woodrow Wilson announced his Fourteen Points to try to ensure permanent peace and to make the world safe for democracy. Wilson's aims included freedom of the seas, free trade, and, most important, an international organization dedicated to collective security and the spreading of democracy. The other Allied powers tacitly and cautiously accepted Wilson's plan as a template for a postwar treaty; however, numerous obstacles lay in the path of the Fourteen Points at the 1919 Paris Peace Conference. Wilson reluctantly made several concessions, yet he successfully protected the Fourteenth Point, the League of Nations, which was written into the Versailles Treaty. After enduring months of bruising, frustrating negotiations, Wilson finally returned to the United States. Despite obvious Senate reservations about the League of Nations, Wilson was certain the Versailles Treaty would be ratified. He was wrong.
Through the use of primary source documents and maps, this lesson will introduce students to Wilson's Fourteen Points, as well as his efforts to have them incorporated into the final peace treaties.
Did the Versailles Treaty represent the fulfillment of Wilson's Fourteen Points, or their betrayal?
In January 1918, Woodrow Wilson unveiled his Fourteen Points to the U.S. Congress. The speech was a natural extension of the proposals he had offered in his "Peace without Victory" address and his request for a declaration of war. Presuming an Allied victory, the President proposed freedom of the seas and of trade, arms reductions, and fair settlement of colonial claims and possessions. He insisted that "open covenants of peace, openly arrived at," must be the benchmark of postwar negotiations. He suggested that a repentant and reformed Germany would not be oppressed, but rather welcomed into the international community. That community, Wilson concluded, would be bound together in a league of nations devoted to collective security and spreading democracy.
Although the Allied powers cautiously agreed to use the Fourteen Points as a treaty template, the circumstances of the war and the specific postwar aims of numerous nations combined to make a formidable obstacle. In 1915, the secret London agreements had proposed ceding the German territory of the Saar (rich in coal) to France, and South Tyrol, controlled by Austria-Hungary, to Italy. Japan hoped to take German claims in the North Pacific and China, while Great Britain hoped to secure claims in Africa and south of the equator in the Pacific.
By the war's end, in November 1918, these tensions had mounted. France and Great Britain both wanted Germany to pay extensive war reparations. Great Britain, with an eye toward protecting its far-flung empire, also resisted freedom of the seas. Wilson hammered out a compromise. Together, the Allies would precisely define "freedom of the seas," and Germany would have to pay some reparations. Meanwhile domestic political tensions were rising. In the midterm elections, Republicans gained control of Congress. Nevertheless, Wilson opted only for token Republican representation on the U.S. delegation headed to Paris, the site of the postwar peace proceedings, which began in January 1919. This snub did not pass unnoticed by Senator Henry Cabot Lodge (R-Mass.), who now chaired the Senate Foreign Relations Committee.
The proceedings were raucous and confusing. Wilson, who had rejected advice that he might better fulfill his Fourteen Points by remaining in Washington, immersed himself in the day-to-day negotiations. His greatest challenge was the spirit of vengeance that animated the other Allied leaders. Not only did they want to punish Germany, they also wanted to use victory to obtain new territory in Europe and to divvy up Germany's colonial possessions. Wilson struggled to balance pragmatism and idealism. On the colonial question, he agreed to substitute the "mandate system" for full and fair self-determination. Under this system, the Allied powers assumed governing control over the colonies of Germany and areas such as Syria and Lebanon that had belonged to the Ottoman Empire. The expectation was that the Allied powers would eventually free their "mandates." He also accepted the transfer of some one million square miles of territory between nations; in return, the covenant of the League of Nations was embedded into the Versailles Treaty.
In June 1919, Germany's defiant representatives, who had been excluded from the proceedings, grudgingly signed the Versailles Treaty. Wilson's decision to now present the Versailles Treaty to the Senate as a fait accompli was quite risky. Republican doubts about the League had hardened; indeed, a group of Senators known as the "Irreconcilables," led by William Borah of Idaho, had proclaimed they would not support American membership in the League. Much opposition resulted from Article Ten of the League's covenant, which committed nations to the protection of the territorial integrity of all other members. This seemed to undermine Congressional authority to declare war, though the precise obligations of the United States were not clear. Lodge and the "Reservationists" were, at least initially, ready to act on the Versailles Treaty if Wilson separated the covenant. They also seemed willing to accept U.S. membership provided Congress kept the power to decide whether or not the United States would intervene militarily on behalf of the League. But Wilson refused to yield, as did Lodge and his allies. The debate over the League spilled over onto the 1920 presidential campaign, and while the election of Republican Warren G. Harding, who declared his opposition to the League, cannot be assessed only as a referendum on Wilsonian diplomacy, it was clear that the American public had grown weary of crusades, domestic and international. The United States never joined the League, finally ending the official state of war with Germany in the summer of 1921 through the Treaty of Berlin.
For an overview of the League of Nations and the Versailles Treaty, visit From Revolution to Reconstruction, accessible via the EDSITEment-reviewed Internet Public Library). For another EDSITEment lesson plan on this subject, see The Debate in the United States over the League of Nations: League of Nations Basics.
To provide your students with the skills needed to examine primary sources, you may find it helpful to visit the Learning Page from the Library of Congress. In particular, students may find the Mindwalk activity useful in preparing to work with primary sources. At the National Archives website, the Digital Classroom provides worksheets to practice analysis of various primary sources, including photographs.
Another exercise involving interpretation of historic photographs can be found at History Matters
In the first activity, the students will read Wilson's Fourteen Points and determine how the points reveal Wilson's foreign policy goals. Divide the class into groups of three or more, and then distribute copies of an abridged version of the Fourteen Points. This address is available in its complete form at the EDSITEment-reviewed site The Avalon Project, but excerpts may be found on pages 1-3 of the Text Document. In addition, give each group a copy of the worksheet on page 4 of the Text Document. This worksheet provides capsule summaries of four goals of Wilsonian foreign policy. In their groups, students will create a poster-size concept map that matches each of the Fourteen Points to one of the four goals. (See Text Document for more detailed instructions.)
To help students identify the locations mentioned in the document, they should be directed to the following map of Europe in 1914, accessible via the EDSITEment-reviewed site History Matters. Either photocopy and distribute the map to the students, or project an image onto a screen in the classroom.
In the second activity, students will divide into two teams, A and B. Each team will further divide into small groups (depending on class size). Team A groups will study documents 1-3; Team B groups will read documents 4-6. In presentations to the rest of the class, the groups for both teams will answer this question: how supportive of the Fourteen Points were the other Allied nations? All groups will be required to use historical evidence from their sources to support their answer.
Excerpts of the documents, and specific questions to be answered, may be found on pages 6-9 of the Text Document. Team A groups should receive pages 5-6, while Team B groups get pages 7-9.
The third and final activity is a card-based game in which students attempt to match up Wilson's Fourteen Points to specific terms of the Versailles Treaty. Complete rules of the game may be found on pages 10-11 of the Text Document—these should be handed out to students. In addition, students should have access to maps showing the boundaries of Europe both before and after World War I. Such maps may be found at the site of the United States Military Academy at West Point, accessible via History Matters. Copies of the map may be distributed to the students, or they may be projected onto a screen for the class to view.
Pages 12-20 of the Text Document contain a total of 26 cards—15 marked "Wilson's Fourteen Points," and 12 marked "Versailles Treaty." Divide the students into two teams; give each member of the first team a card from the "Wilson's Fourteen Points" deck, and give each member of the second a card from the "Versailles Treaty" deck.
Begin by asking a student holding the lowest-numbered "Versailles Treaty" card to stand and read his or her card aloud. At that point any member of the "Fourteen Points" team who believes that his or her card pertains to that particular clause of the Versailles Treaty should also stand and read the contents of his or her card, and explain why it fits. If more than one student from the "Fourteen Points" team responds, the teacher should lead a brief discussion (no more than five minutes) before asking the class to decide which of the cardholders has the closest connection to the Versailles peace term. If a geographic location is mentioned on any of the cards, ask the students to note that location on the map.
Each time that a member of the "Fourteen Points" team is matched up with a member of the "Versailles" team, that pair should write the contents of their cards on the board. The game continues until each member of the "Versailles" team has read his or her card, and has been matched with a member of the "Fourteen Points" team. At this point there should still be three members of the latter team who have not read aloud the contents of their cards. They should do so now.
To conclude the activity, teachers should lead students in a discussion touching on the following questions:
After completing this lesson, students should also be able to write brief (1-2 paragraph) essays answering the following questions:
Students should be able to identify and explain the significance of the following:
Finally, students should be able to locate the following on a blank map of Europe:
3-4 class periods
|
<urn:uuid:c87325f9-ea95-4462-a548-6cf414d0241b>
|
CC-MAIN-2014-23
|
http://edsitement.neh.gov/lesson-plan/fighting-peace-fate-wilsons-fourteen-points
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997860453.15/warc/CC-MAIN-20140722025740-00095-ip-10-33-131-23.ec2.internal.warc.gz
|
en
| 0.961044 | 2,290 | 4.6875 | 5 |
Depending on the season, seasonal tyres also offer other features. What exactly do they do? Where is the difference?
The secret is a combination of the tread and the material. Closer examination of the tyres reveals the following: The treads are formed differently. Winter tyres have a particularly deep tread thickness. The deep tread grooves can take hold of the snow and improve grip as a result. Numerous little cutouts – also known as lamellae – also help achieve this effect. Summer tyres do not require these. They have a lower tread height instead, meaning a larger surface area is in contact with the road. This improves driving comfort on dry roads, as well as braking.
Another special feature of seasonal tyres is the particular rubber compound. Winter tyres have a particularly high proportion of natural rubber. The tyre is softer and, as a result, offers stable traction. Summer tyres contain less natural rubber and are therefore not quite so soft. This means they provide better grip during milder temperatures. As the weather gets colder, summer tyres become more rigid and therefore unstable. When temperatures fall below seven degrees Celsius, it is better to use winter tyres.
|
<urn:uuid:15d344aa-3c39-4930-a3d7-507fd70afafa>
|
CC-MAIN-2023-40
|
https://www.barum-tyres.com/car/experts-advice/what-are-seasonal-tyres-for/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506528.19/warc/CC-MAIN-20230923162848-20230923192848-00639.warc.gz
|
en
| 0.950789 | 232 | 2.53125 | 3 |
New Approaches to Achieve Aichi Targets
First objectives were set 20 years ago in 1992 in Rio when the convention on biodiversity was adopted. The Global Environment Outlook-5 (GEO 5) established 90 key sustainability targets. According to Ms. Amina Mohamed, the Deputy Executive Director of UNEP, the world failed to reach the target of a significant reduction rate of biodiversity loss by 2010. In fact, only few key targets were achieved.
The solutions and outcomes of Rio+20 give us a renewed hope and opportunity to achieve the objectives of the convention on Biodiversity. Since then UNEP and the CBD Secretariat have identified areas for enhanced programmatic collaboration and cooperation in the context of the Strategic Plan for Biodiversity and the Aichi biodiversity targets. Initiatives such as the Economics of Ecosystems and Biodiversity and work on establishing an Intergovernmental Policy Platform on Biodiversity and Ecosystem Services can be named as successful tools towards sustainable world. Ms. Amina Mohamed stressed that costs of inaction are far higher and will increase. The world suffers everyday losses, especially the poor. They are the first to suffer as a result of unsustainable management of natural resources management.
Also the role of the private sector as well as its responsibility to enhance equity for all sectors of the society within the rules and regulations put in place by governments is critical and must be emphasized.
Braulio Ferreira de Souza Dias, the Executive Secretary to the Convention on Biological Diversity emphasized the necessity to mobilize the financial resources needed to enable developing countries to achieve the Aichi Targets at national level. In doing so, we will need to be creative and involve all possible partners. New approaches and mechanisms need to be adopted, emphasizing the leveraging of resources from existing sources through mainstreaming, incorporating sustainability criteria in government procurement, reviewing and adjusting of economic instruments, and further engaging the business sector.
|
<urn:uuid:cae478db-7eef-4660-b5a3-505ae131fe0d>
|
CC-MAIN-2020-10
|
http://oversy.org/en-US/Home/SingleNews_newsId=53.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145839.51/warc/CC-MAIN-20200223185153-20200223215153-00363.warc.gz
|
en
| 0.937234 | 383 | 2.890625 | 3 |
Last fall, the National Institute of Allergy and Infectious Diseases (NIAID), part of the National Institutes of Health, paused, delayed, and/or modified vaccinations in eleven of its preventive and therapeutic HIV/AIDS, malaria and Ebola virus vaccine clinical trials involving adenovirus-based vaccine vectors. Adenovirus is a common virus that normally causes upper respiratory infections such as the common cold. This action was taken based on preliminary findings from the STEP/HVTN 502 HIV vaccine clinical trial, which used the Merck-developed adenovirus type 5 (rAd5) as a carrier — or vector — for synthetic HIV genes in the investigational vaccine that was being tested.
Although the vaccine used in the STEP study did not cause HIV infection, researchers found a greater number of HIV infections among those participants who received the vaccine, particularly those participants who had higher pre-existing immunity to adenovirus serotype 5 (Ad5) from a prior natural infection. Researchers are uncertain whether or how the vaccine may have contributed to an increased risk of contracting HIV and are continuing to explore the data for answers.
In the interest of the safety of our clinical trials volunteers, NIAID voluntarily paused several of its vaccine studies that involved adenovirus-based vaccine vectors to allow time to assess the STEP study data. An update on each of the studies is described below:
In September 2007, NIAID, Merck & Co., and the NIAID-funded HIV Vaccine Trials Network (HVTN) permanently ended immunizations in the Phase II HIV vaccine trial known as the STEP or HVTN 502 study involving the Merck-developed rAd5 vaccine candidate based on findings that the vaccine neither prevented HIV infection nor had an effect on virus levels in those who became infected. Further, researchers found a higher number of HIV infections among those who received the vaccine in comparison to placebo, particularly among those volunteers who had pre-existing antibodies to Ad5. The study, which began in December 2004, enrolled 3,000 volunteers in Australia, Brazil, Canada, the Dominican Republic, Haiti, Jamaica, Peru, Puerto Rico, and the United States.
Current status: Study investigators began unblinding trial volunteers in mid-November 2007. Follow-up of study participants is continuing, and a new protocol is being developed to enable researchers to continue follow-up and counseling of study participants. The study’s data continue to be analyzed for clues as to why there were a greater number of infections among those who received the vaccine, but since the study was not designed to answer this question, the investigators believe it is possible that the data may never fully reveal the reason for the increased risk to vaccine recipients.
The Phambili/HVTN 503 study, which began in January 2007, involved the same Merck candidate vaccine but was being conducted in South Africa. Based on the STEP findings, immunizations were initially paused in the Phambili study in September 2007 and permanently halted immunizations in the Phambili trial in October 2007.
Current status: The unblinding process for study volunteers began in late October 2007. Study volunteers continue to be followed and monitored by study investigators.
This Phase 1b HIV vaccine clinical trial, which began in July 2007, involved the same Merck Adenovirus serotype 5 HIV-1 gag/pol/nef vaccine, given in a three-dose regimen. The trial provided additional information on the immune responses to the vaccine, as well as an evaluation of the safety and tolerability of the vaccine regimen. In order to look for relationships among the immune responses induced by the vaccine, all participants undergo leukapheresis, or large blood draw, after their last vaccination. Based on the STEP findings, immunizations were permanently halted in the HVTN 071 trial in September 2007. A total of 35 healthy, HIV-1–uninfected adults were enrolled at HVTN sites in the United States prior to halting enrollment and vaccination.
Current status: The study was open-label, and all study volunteers received vaccine. Vaccinations were stopped in September. Volunteers are continuing to be followed and monitored by study investigators, and study procedures are ongoing.
This Phase Ib HIV vaccine study, which began enrolling participants in November 2006, is testing a prime-boost strategy involving two types of experimental vaccines created by NIAID’s Vaccine Research Center (VRC): a DNA vaccine and a replication-defective adenovirus serotype 5 vector vaccine (rAd5). The study, which was being conducted in the United States and Peru by NIAID’s HIV Vaccine Trials Network (HVTN), was designed to determine if the two vaccines are well-tolerated and if the rAd5 vaccine is safe and immunogenic when given by different routes: intramuscularly (into the muscle), intradermally (between layers of skin), and subcutaneously (under the skin). The study had achieved its target enrollment of 90 volunteers when it was paused, but not all participants had received the rAd5 booster.
The study participants were divided into three groups and given three DNA injections: an intramuscular injection at the time of enrollment, a second intramuscular injection one month later, and a third intramuscular injection two months after the time of enrollment. Twenty participants in group 1 received the adenovirus “boost” vaccine via intramuscular injection; 21 participants in group 2 received the adenovirus vaccine intradermally; and 20 participants in group 3 received a subcutaneous injection of the rAd5 vaccine six months after the initial DNA injection.
Current status: Researchers are continuing to follow all of the HVTN 069 study participants and monitor their safety. Additionally, the rAd5 vaccines are no longer being administered even though the rAd5 vaccine used in this study is different from the Merck rAd5 vaccine used in the STEP and Phambili vaccine studies.
This Phase Ib HIV vaccine clinical trial, which had enrolled only 17 people since it began in August 2007, was designed to evaluate the safety and immunogenicity of both an adenovirus type 35 vaccine vector (rAd35) and an rAd5 vaccine vector when used either in a heterologous prime-boost combination with each other or used singularly as a booster in subjects primed with DNA vaccines. The study, which is being conducted in the United States through the HVTN, was designed to enroll healthy HIV-negative adults with high levels of pre-existing immunity from prior natural Ad5 infection.
Current status: Two HVTN 072 study volunteers received one dose of the rAd5 vaccine, and one study volunteer receive one vaccination dose of the rAd35 vaccine before the study was paused. Those volunteers will continue to be followed and monitored. No further vaccinations are to be administered in this study.
This Phase I HIV vaccine study, which is being conducted by the VRC on the NIH campus in Bethesda, Md., began in April 2006 and aimed to enroll 60 study volunteers. The study, which is testing a DNA-based vaccine and a rAd5 vector vaccine, involved screening participants for Ad5 antibodies. Half of the participants selected for the study had antibodies to Ad5, and the other half did not. The participants were randomly assigned to one of six possible vaccination schedules and differed by the type of vaccines given (DNA vaccine prime with rAd5 booster or rAd5 prime with rAd5 booster), how the priming vaccine was administered (intramuscularly, subcutaneously, or intradermally) and in the schedule of administration.
Current status: The protocol has been amended to restrict the use of the rAd5 vaccine to enrollees with no pre-existing immunity to Ad5 and at low risk of acquiring HIV. The protocol amendments were submitted to the Food and Drug Administration (FDA) and the study’s institutional review board before restarting the study, and all clinical trial participants underwent an additional informed consent process to continue participating in the study.
This Phase I HIV vaccine study, which began in May 2007, is being conducted by the VRC on the NIH campus in Bethesda, Md. The trial was designed to test the safety, immune response and side effects of two experimental HIV vaccines using rAd35 and rAd5. The study, which aimed to enroll 35 HIV-negative individuals, was being conducted in two phases. The first phase involved 15 participants who were to receive a one-time dose-escalation of the rAd35 vaccine. During the second phase of the study, 20 participants were to be randomly assigned to receive either the rAd35 or rAd5 vaccine as priming immunization and the other as a booster immunization
Current status: The study was revised to enroll only individuals at low risk of acquiring HIV and without prior immunity to Ad5 or Ad35. Enrollment and Ad35 vaccinations have been completed in the first phase of the study. Enrollment in the second phase of the study will commence only after review by the FDA.
This Phase I HIV vaccine study, which began in December 2005 on the NIH campus in Bethesda, Md., involves an investigational vaccine designed to treat HIV infection in individuals already infected with HIV. The study, which enrolled 17 adults, was testing the safety, tolerability, and immune response of a prime-boost vaccination regimen. The vaccination schedule consisted of three injections of a multiclade HIV plasmid DNA vaccine followed by one injection of a multiclade, recombinant adenoviral vector vaccine (rAd) developed by the VRC.
Current status: Only one clinical trial volunteer did not receive the final injection prior to the study’s pause. Adjustments to the study’s protocol are currently undergoing institutional review board examination, and the study is expected to be completed. All study volunteers will continue to be followed and monitored.
This Phase IIb HIV vaccine study was not launched as originally planned in late September 2007. The study was designed to test a vaccine featuring a mixture of six DNA plasmids representing multiple HIV genes from multiple subtypes used as a priming immunization and a mixture of four rAd5 vectors with matching inserts as a heterologous booster immunization. The VRC-developed vaccine was planned to be tested in 8,500 participants in East Africa, Southern Africa, and the Americas.
Current status: NIAID and its fellow members of the Partnership for AIDS Vaccine Evaluation (PAVE) are examining how best to redesign the study in light of the STEP findings and are conferring with scientific and community partners on how this regimen should be evaluated further.
This Phase I malaria vaccine study, which began in December 2006, is a randomized, controlled, dose-escalation trial designed to determine if an investigational malaria vaccine is safe, immunogenic and well-tolerated in healthy adults ages to 18 to 45. The trial, which is being conducted at two U.S. sites and expected to enroll 72 men and women, is testing a rAd35-based vaccine to combat falciparum malaria.
Current status: The study’s safety monitoring committee (SMC) recommended that the trial remain paused until each of the participants’ level of pre-immunization neutralizing antibody to Ad35 can be obtained; those volunteers with demonstrated pre-existing neutralizing antibody levels to Ad35 will be excluded from continued participation in the study. Additionally, the SMC recommended to revise the study’s informed consent and to reconsent the participating study volunteers. Further, the protocol will be revised to require pre-screening for Ad35 antibodies and to exclude those individuals with the antibodies. The SMC also proposed that the protocol require HIV status checks of study participants at the end of one year. These revisions will be put forth for regulatory review.
This Phase I vaccine study, which began in September 2006, is designed to test a VRC-developed investigational preventive Ebola virus vaccine using a recombinant Ebola adenovirus type 5 vector vaccine in healthy adults. The secondary objectives of the study are to evaluate immune responses and Ad5 antibodies up to 48 weeks after vaccination.
Current status: The study was not paused but is undergoing a scheduled review by the Data and Safety Monitoring Board and the FDA prior to starting the next dose level. VRC researchers plan to only enroll volunteers at low risk of HIV infection.
back to top
Last Updated June 22, 2008
|
<urn:uuid:bf2147f6-8d64-4f5f-82db-d9811b1756a7>
|
CC-MAIN-2013-20
|
http://www.niaid.nih.gov/topics/HIVAIDS/Research/vaccines/advisory/avrs/Pages/avrs.aspx
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709805610/warc/CC-MAIN-20130516131005-00008-ip-10-60-113-184.ec2.internal.warc.gz
|
en
| 0.95621 | 2,574 | 2.640625 | 3 |
Volume 17, Number 6—June 2011
Wild Birds and Increased Transmission of Highly Pathogenic Avian Influenza (H5N1) among Poultry, Thailand
Since the outbreaks of highly pathogenic avian influenza (HPAI) subtype H5N1 virus, wild birds have been suspected of transmitting this virus to poultry. On January 23, 2004, the Ministry of Public Health in Thailand informed the World Health Organization of an avian influenza A (H5N1) outbreak. To determine the epidemiology of this viral infection and its relation to poultry outbreaks in Thailand from 2004 through 2007, we investigated how wild birds play a role in transmission. A total of 24,712 serum samples were collected from migratory and resident wild birds. Reverse transcription PCR showed a 0.7% HPAI (H5N1) prevalence. The highest prevalence was observed during January–February 2004 and March–June 2004, predominantly in central Thailand, which harbors most of the country’s poultry flocks. Analysis of the relationship between poultry and wild bird outbreaks was done by using a nonhomogeneous birth and death statistical model. Transmission efficiency among poultry flocks was 1.7× higher in regions with infected wild birds in the given or preceding month. The joint presence of wild birds and poultry is associated with increased spread among poultry flocks.
Avian influenza is a viral disease of poultry and is distributed worldwide. The virus is classified based on 2 surface proteins, the hemagglutinin (HA) protein (H1–H16) and the neuraminidase (NA) protein (N1–N9), which can be found in numerous combinations (1). All H and N subtypes can be found as low pathogenic avian influenza virus strains in aquatic wild birds, which are assumed to be the main reservoirs outside poultry (2,3). Occasionally, low pathogenic avian influenza virus strains are introduced into domestic poultry flocks with no clinical signs or only mild clinical consequences, but strains carrying the H5 or H7 gene can mutate into highly pathogenic avian influenza (HPAI) strains that cause high death rates in domestic poultry (4) and, occasionally, in migratory birds (5,6). Because of the devastating effect of HPAI outbreaks in commercial poultry, all outbreaks caused by H5 and H7 subtypes are notifiable (7).
Currently, a HPAI virus strain of subtype H5N1 is circulating in many countries in Eurasia and Africa, causing high death rates in poultry, substantial economic losses, and human deaths. The strain was first identified in Southeast Asia in 1996 and has since spread to 63 countries in Asia, Europe, Africa, and the Middle East (7). Millions of domestic poultry died from the effects of the disease or from culling efforts to control the spread of the virus (1,2,8,9). The spread of the HPAI (H5N1) virus from Southeast Asia to Russia, Europe, and Africa was assumed to originate from a virus source at Qinghai Lake, People’s Republic of China (6,10). Therefore, migratory birds were considered to be responsible for long distance dispersal of the virus (11–13).
In Thailand, 7 waves of HPAI (H5N1) virus outbreaks have occurred since January 2004. Poultry and wild bird populations in 1,417 villages in 60 of the 76 provinces were affected, and >62 million birds died or were culled to prevent further transmission (14–16). Introduction of the virus into poultry flocks is considered to be possible through infected wild birds. Additional insight on the basis of quantitative data into the role of wild birds would be necessary to further develop control measures and surveillance programs.
Relatively little effort has been made to quantify the association between infection in wild birds and outbreaks in poultry flocks, most likely because of the lack of data on infection in wild birds. Recently, a preliminary study was carried out that analyzed the prevalence of HPAI (H5N1) infection in wild birds in Thailand (14). In that study, 6,263 pooled surveillance samples from wild birds in Thailand, collected from January 2004 through December 2007, were tested for evidence of infection. Testing indicated that prevalence patterns in wild birds mirrored outbreaks among poultry; however, the association was not proven or quantified. We studied extensive data on 24,712 wild birds, sampled and analyzed from 2004 through 2007 in Thailand, to quantify the possible effect of infection in wild birds on the spread of the infection among poultry flocks.
Materials and Methods
Data about subtype H5N1 infections in wild bird populations were provided by the National Institute of Animal Health of Thailand, Regional Veterinary Research and Development Centers, the Veterinary Science faculty of Mahidol University, and the Department of Livestock Development, Thailand. A total of 24,712 wild bird samples were collected from January 2004 through December 2007. During 2004–2006, sampling was part of a general countrywide surveillance program; in 2007, sampling was targeted specifically at areas where outbreaks in poultry had occurred.
Sampling methods have been described previously (14,16,17). Wild birds were either trapped by using baited traps, hand nets, or mist nets, or shot. Tracheal/oropharyngeal swabs and cloacal swabs of live birds and bird carcasses were collected from active surveillance (sampling of healthy wild birds) and passive surveillance (sampling of sick or dead birds). Swab samples were collected in viral transport media, stored at 4oC, and shipped to the laboratory, where they were stored at −80oC until further analysis could be done.
Methods used for antigen detection have been described by Tiensin et al. (16) and Siengsanan et al. (14). Supernatants from homogenized tissue and swab samples were filtrated and inoculated in 11-day-old embryonated chicken eggs or MDCK cell cultures. After incubation at 37oC for 3 days, allantoic fluid was harvested. The inoculated MDCK cell culture was observed daily for cytopathic effect, and supernatant fluid was harvested by day 4, even if no cytopathic effect was observed. Viruses were initially identified in allantoic fluids or culture supernatants by the HA assay according to World Health Organization recommendations (14). Negative samples were inoculated 2 additional times in embryonated chicken eggs before specimens were confirmed as negative.
RNA from positive samples acquired from virus culture was extracted by using a viral RNA extraction kit (QIAGEN, Valencia, California, USA), according to the manufacturer’s instructions. Reverse transcription PCR (RT-PCR) was performed by using a 1-step RT-PCR kit (QIAGEN) to identify the subtype, according to the manufacturer’s instructions. Primers for RT of viral genome and all HA, NA, and matrix (M) genes for virus subtype and influenza A virus identification have been published elsewhere (14,17–19). PCR products were processed with 1% agarose gel electrophoresis and were purified by QIAquick PCR purification kit (OIAGEN). Sequencing was performed by using the H5 and N1 specific primers, and sequence data were edited following methods previously described (14,17,18).
For each identified bird species, geographic location and season were recorded. Bird species were divided into 3 groups: 1) resident birds (nonmigratory populations), present year-round in Thailand; 2) migratory (visitor) birds, bird populations moving between Russia or China to Thailand during September/October and March/April; and 3) breeding visitor birds, which migrate to Thailand for breeding in different periods of the year.
To study the relevance between the regions and subtype H5N1 outbreaks in wild birds, we divided Thailand into 4 major geographic regions (northern, northeastern, central, and southern) on the basis of the former administrative region grouping system used by the Ministry of Interior, Thailand. Because of the high number of outbreaks in the Central region (14,17,20), it was further divided into 6 parts: central–northwest, central–north, central–central, central–east, central–southeast, and central–southwest. On the basis of procedures established by the Thai Meteorological Department, the seasons were divided into 3 periods: summer (March–June), the rainy season (July–October), and winter (November–February).
Prevalence of HPAI (H5N1) infection and 95% confidence intervals (CIs) were calculated for each group of bird species, sampling region, and season. Three variables associated with HPAI (H5N1) prevalence were analyzed by binary logistic regression. Overall significance of the model was assessed by the likelihood ratio χ2 test. The goodness-of-fit was calculated by using the Hosmer-Lemeshow goodness-of-fit test. Statistical significance of the regression coefficients was tested by using the Wald likelihood ratio test. Odds ratios (OR) and respective 95% CI were calculated. For multiple comparisons, the Bonferroni multiple comparison correction was applied to demonstrate statistical significance (p<0.001). Statistical analysis was performed by using statistical software SPSS version 17 (SPSS Inc., Chicago, IL, USA).
Data on outbreaks among poultry were taken from Tiensin et al. (16). We used their definition of poultry, which encompasses all farmed avian species in Thailand, including backyard chickens and ducks. Different species or types of production systems were not differentiated in the data. Using a nonhomogeneous birth model (21), we investigated the association between subtype H5N1 presence in infected poultry flocks and wild birds. Prevalence data from the 9 different regions were modeled independently and conditioned on the number of infected birds during the first month of detected infection for each region. Time lapse was measured in months from the first month infection was detected. To analyze the association between presence of subtype H5N1 in wild birds and outbreaks in poultry, we pooled data for the 3 wild bird groups (resident birds, migratory visitor birds, and breeding visitor birds) to increase power.
In most regions, sampling among wild birds was only done systematically after a poultry outbreak in that region, except in the central–northwest, central–north, and central–central regions. We could therefore only use the latter 3 regions to investigate whether the presence of infected wild birds was related to the poultry outbreak.
The nonhomogeneous birth model depends on the so-called reproductive power, which statistically quantified (in our setting) the ability of infected poultry flocks to spread infection to susceptible poultry flocks. For the statistical model, we used probability distributions from the Burr family. Distribution functions Burr XII and Burr III were fitted by using a conditional fitting procedure (21). For every region, we determined whether infected wild birds were detected during a particular month. A wild-bird infected month was defined as a month in which there was detection of infected wild birds or which showed wild-bird infection in the preceding month. We investigated whether wild-bird infection affected the reproductive power for the poultry outbreak in the same region. Reproductive power for wild-bird infected months was compared with that in non–wild-bird infected months for the central–northwest, central–north, and central–central regions. For comparison, we also calculated the reproductive power for poultry outbreaks for the 6 other regions of Thailand by using previously described methods (22). Model selection was done by using Akaike’s Information Criterion (AIC) (www.modelselection.org/aic).
Infected poultry flocks and wild birds were found in all 9 regions during the study period. In Figure A1, we present the numbers of wild birds sampled per month for each of the 9 regions and outbreak data of subtype H5N1 in poultry flocks. A total of 24,712 wild birds were sampled, consisting of 303 species, 64 families, and 20 orders (Table A1). Of these, 192 samples were positive for subtype H5N1, resulting in an overall prevalence of 0.78% (95% CI 0.67%–0.89%) (Table A1). Positive samples were found in 35 species of 12 orders (Table A2). Prevalence differed significantly among the group of wild bird species (p<0.001), with a prevalence of 0.187% (95% CI 0.01%–0.21%) in migratory birds (n = 2,142), 0.829% (95% CI 0.66%–0.94%) in resident birds (n = 16,633), and 0.814% (95% CI 0.61%–0.99%) in breeding visitor birds (n = 6,143). The highest prevalence of virus-positive birds was found in resident and breeding visitor birds (p<0.001) (Table A3).
The aggregated data from Figure A1, presented for Thailand as a whole in Figure 1, show a marked increase in the number of infected poultry flocks detected from September through December 2004. A relatively high number of wild birds positive for subtype H5N1 were detected from January 2004 through May 2004, before the poultry outbreaks in June 2004. Infections in wild birds were consistently detected after the poultry outbreaks had ended, except during April and May in 2005, 2006, and 2007.
The spatial distribution and size classes of infected poultry flocks, as well as numbers of infected wild birds detected, are shown in Figure 2. In 2004 and 2005, infected wild birds were reported in the same locations where infected poultry flocks were found, especially in the central region. No infected poultry flocks were found in 2006 and 2007 in these areas. Subtype H5N1 prevalence in wild birds differed by sampling location. Central Thailand had the highest overall prevalence of 0.9% (95% CI 0.77%–1.03%), compared with other regions (p<0.001); the Northwest-Central region in central Thailand had a significantly higher prevalence (p<0.001) (Table A3).
The percentages of wild birds positive for subtype H5N1 in each season are also shown in Table A3. Prevalence differed significantly during January and February 2004 (7.92%; 95% CI 5.8–10.4; p<0.001) and in the summer of 2004 (11.79%; 95% CI 8.7%–15.8%; p<0.001), compared with the other seasons.
Association between Outbreaks in Poultry and Infection in Wild Birds
The Burr XII and Burr III distributions each have 5 parameters. These distributions were used to model the observed poultry outbreak data for each of the 9 regions, taking into account wild-bird infection. The AIC, when we used the Burr XII model to fit the observed data, was 5,628.6, substantially lower than that for the Burr III distribution, which gave an AIC of 5,829.8. We therefore chose the Burr XII distribution to model the data (Figure A2 gives the fit to the data for all 9 regions). The model fits the data rather well.
We also fitted the Burr XII distribution to model the observed poultry outbreak data in non–wild-bird infected months, leading to an AIC of 5,677.7. Because the model with wild-bird infection has a lower AIC, data clearly show that the reproductive power of poultry flocks in wild-bird infected months was higher than in non–wild-bird infected months. Parameter estimates for the model are shown in the Table. The log of the proportionality (ln[c3]) is 0.523, corresponding to a proportionality factor of ≈1.67, indicating that the reproductive power in wild-bird infected months is ≈1.7× higher than that in non–wild-bird infected months (Figure 3, where we give the reproductive power for the associated period). In Figure 3, we have also plotted the reproductive power for the 6 regions for which we could not do the wild-bird related comparison (regions 1 and 5–9). The reproductive power as a function of time was almost indistinguishable from the curve for the non–wild-bird infected months in regions 2, 3, and 4.
We analyzed one of the largest datasets available of wild birds sampled for HPAI (H5N1) infection in Thailand, a country where several outbreaks of the disease have occurred in poultry flocks. Our aim was to determine the prevalence and distribution of HPAI (H5N1) in wild birds and to determine whether an association exists between outbreaks in poultry flocks and in wild birds within different regions in Thailand. We calculated the reproductive power in poultry flocks, a measure for the ability of a poultry flock to infect other susceptible poultry flocks. Notably, reproductive power was 1.7× higher in so-called wild-bird infected months, compared with poultry outbreaks in non–wild-bird infected months, suggesting a strong association of spread among poultry flocks and the presence of the infection in wild birds.
Poultry flocks in this study represent several avian species, which were considered as a single group with equal infectiousness, susceptibility, and other characteristics, in the absence of more precise information. Domestic ducks, which normally manifest a subtype H5N1 infection subclinically, were included in the poultry group. Ducks were not sampled according to criteria related to clinical signs. Available data do not allow a more differentiated analysis.
To quantify the association with outbreaks in poultry, we regarded wild birds as 1 group. We can therefore not differentiate the quantification of interaction to the level of specific wild-bird groups. In our additional analyses, however, most cases of HPAI (H5N1) infection in wild birds were found in resident birds, as compared with migratory and breeding visitor birds. Therefore, resident wild birds may be responsible for the association that we quantified. Our results can possibly be explained by the difference in exposure time of the wild birds. We partially confirmed, but more importantly expanded and added detail to, the conclusions reached by Siengsanan et al. (14), on the basis of pooled samples for a smaller part of the database. Bird species seemed to differ in susceptibility for infection. In our study, H5N1 virus infection was detected in many resident bird species, but we did not have a sufficient number of birds to differentiate in the quantitative analysis between different species. Species do differ, however, in terms of potential contact to poultry, especially birds considered to be peridomestic species of the Columbiformes, Cuculiformes, and Passeriformes orders, which are commonly associated with poultry environments. Transmission of subtype H5N1 to poultry populations by this group of resident bird species is more likely than transmission by other resident birds, including those belonging to the Galliformes, Gruiformes, Piciformes, Psittaciformes, and Struthioniformes orders. The habitats of these birds are not located near poultry areas. Previous experimental studies have shown that infected individuals of peridomestic species such as sparrow and starling can shed subtype H5N1 after infection, but they die quickly (23,24). Therefore, these birds are unlikely to be long-term reservoirs, but may be a higher risk to poultry than other resident bird species. Pigeons were found to be less susceptible to severe neurologic signs and death from HPAI (H5N1) infection (24). Infected pigeons appeared to shed low amounts of virus, thereby limiting virus transmission to sentinel birds (23–29). Our data showed a relatively high prevalence of HPAI (H5N1) in herons and storks (commonly known as scavengers and hunters of juvenile aquatic birds), which suggests that these birds are predominantly infected by contact with infected poultry flocks.
The prevalence of HPAI (H5N1) infections in resident birds was higher in areas with poultry flocks. We could not determine whether wild birds became infected because of spillover from poultry flocks or whether wild birds were the origin of outbreaks in poultry flocks. The association we found is not necessarily one of cause and effect. The 2 populations may have been affected by the same factors that increase transmission between flocks, e.g., contaminated water, movement between poultry flocks, or even increased transmission through fomites.
Even though data results are from the largest sampling effort available, the lack of a clear sampling strategy in the collection of wild-bird data precludes a definite answer to whether poultry flocks were infected with HPAI (H5N1) from infected wild birds or vice versa. Siengsanan et al. (14) suggested that poultry outbreaks precede detection of the infection in wild birds, but we have found no evidence either for or against that claim, again because of the sampling strategy used. One could argue the fact that infected poultry flocks produce massive amounts of virus, which supports the view that infection in wild birds is mostly seeded from poultry. A study carried out by Bavinck et al. (29) suggested that small backyard flocks did not contribute to the spread of subtype H7N7 infection in the Netherlands during 2003.
Seasonal bird migration, as well as enhanced movement and trade of poultry in the winter period caused by major social events occurring at the end of the year, may play a role in virus spread (30). Our data show increased prevalence among wild birds in all winter periods, with the exception of 2007 in which neither poultry farm outbreaks nor wild bird infections were detected. The actual sources of new introductions of HPAI (H5N1) into the commercial poultry flocks in Thailand could not be elucidated by our analysis.
From January through October 2004, a relatively small number of wild-bird samples was collected, compared with the number of samples collected from November 2004 to December 2007. Selection bias may have occurred during this period. Despite a bias in sampling numbers, HPAI (H5N1)–infected wild birds were detected during April–May 2004 just before the onset of the 2004 outbreak, but were not observed in that same period during 2005–2007 despite larger sampling numbers.
Variation in geographic distribution of HPAI (H5N1) infections in wild birds was observed over different areas. The central region of Thailand with dense poultry populations and large populations of birds living in the surrounding wetlands can be considered a hotspot for HPAI (H5N1) outbreaks. Our dataset shows high prevalence rates of the virus in the central region, corresponding with previous studies of HPAI (H5N1) surveillance in wild birds (14), in poultry flocks during 2004–2005 (16,17), and in cases of HPAI (H5N1) infection among humans during 2004 (31).
Associating these observations to our statistical model is interesting, because the reproductive power of poultry flocks in regions 1, 5, 6, 7, 8, and 9 was almost identical to that in regions 2, 3, and 4 during non–wild-bird infected months (Figure 3); regions 1, 5, 6, 7, 8, and 9 experienced no outbreaks in wild birds. It is however impossible to conclude from the current data that absolutely no wild birds were infected because, in these regions, relatively few samples were collected during the appropriate periods (Figure A1).
By determining the reproductive power in poultry, which is the ability of infected poultry flocks to spread infection to susceptible poultry flocks, we quantified the association between wild bird infection and outbreaks in poultry. We also attempted to take the reproductive power in wild birds, during poultry-infected months, as our starting point. However, too few infected wild birds were available for a reliable analysis.
We thank the following members of Wild Bird Study Group, Thailand who contributed data to our study: Thaweesak Songserm, Kridsada Chaichoun, Parntep Rattanakorn, Surapong Wongkasemjit, and Tuangthong Patchimasiri.
- Alexander DJ. An overview of the epidemiology of avian influenza. Vaccine. 2007;25:5637–44.
- Fouchier RAM, Munster V, Wallensten A, Bestebroer TM, Herfst S, Smith D, Characterization of a novel influenza A virus hemagglutinin subtype (H16) obtained from black-headed gulls. J Virol. 2005;79:2814–22.
- Webster RG, Bean WJ, Gorman OT, Chambers TM, Kawaoka Y. Evolution and ecology of influenza A viruses. Microbiol Rev. 1992;56:152–79.
- Alexander DJ. A review of avian influenza in different bird species. Vet Microbiol. 2000;74:3–13.
- Gauthier-Clerc M, Lebarbenchon C, Thomas F. Recent expansion of highly pathogenic avian influenza H5N1: a critical review. Ibis. 2007;149:202–14.
- Olsen B, Munster V, Wallensten A, Waldenstrom J, Osterhaus A, Fouchier R. Global patterns of influenza A virus in wild birds. Science. 2006;312:384–8.
- World Organisation for Animal Health. 63 countries report H5N1 avian influenza in domestic poultry/wildlife 2003–2010. 2010 (2010 Mar 11). http://www.oie.int/eng/info_ev/en_AI_factoids_2.htm
- Claas EC, Osterhaus AD, van Beek R, De Jong JC, Rimmelzwaan GF, Senne DA, Human influenza A H5N1 virus related to a highly pathogenic avian influenza virus. Lancet. 1998;351:472–7.
- Peiris JSM, de Jong MD, Guan Y. Avian influenza virus (H5N1): a threat to human health. Clin Microbiol Rev. 2007;20:243–67.
- Spackman E. A brief introduction to the avian influenza virus. Methods Mol Biol. 2008;436:1–6.
- Boyce WM, Sandrock C, Kreuder-Johnson C, Kelly T, Cardona C. Avian influenza viruses in wild birds: a moving target. Comp Immunol Microbiol Infect Dis. 2009;32:275–86.
- Kilpatrick AM, Chmura AA, Gibbons DW, Fleischer RC, Marra PP, Daszak P. Predicting the global spread of H5N1 avian influenza. Proc Natl Acad Sci U S A. 2006;103:19368–73.
- Liu J, Xiao H, Lei F, Zhu Q, Qin K, Zhang XW, Highly pathogenic H5N1 influenza virus infection in migratory birds. Science. 2005;309:1206.
- Siengsanan J, Chaichoune K, Phonaknguen R, Sariya L, Prompiram P, Kocharin W, Comparison of outbreaks of H5N1 highly pathogenic avian influenza in wild birds and poultry in Thailand. J Wildl Dis. 2009;45:740–7.
- Songserm T, Jam-on R, Sae-Heng N, Meemak N, Hulse-Post DJ, Sturm-Ramirez KM, Domestic ducks and H5N1 influenza epidemic, Thailand. Emerg Infect Dis. 2006;12:575–81.
- Tiensin T, Ahmed Syed SU, Rojanasthien S, Songserm T, Ratanakorn P, Chaichoun K, Ecologic risk factor investigation of clusters of avian influenza A (H5N1) virus infection in Thailand. J Infect Dis. 2009;199:1735–43.
- Tiensin T, Chaitaweesub P, Songserm T, Chaisingh A, Hoonsuwan W, Buranathai C, Highly pathogenic avian influenza H5N1, Thailand, 2004. Emerg Infect Dis. 2005;11:1664–72.
- Uchida Y, Chaichoune K, Wiriyarat W, Watanabe C, Hayashi T, Patchimasiri T, Molecular epidemiological analysis of highly pathogenic avian influenza H5N1 subtype isolated from poultry and wild bird in Thailand. Virus Res. 2008;138:70–80.
- Lee MS, Chang PC, Shien JH, Cheng MC, Shieh HK. Identification and subtyping of avian influenza viruses by reverse transcription-PCR. J Virol Methods. 2001;97:13–22.
- Gilbert M, Chaitaweesub P, Parakamawongsa T, Premashthira S, Tiensin T, Kalpravidh W, Free-grazing ducks and highly pathogenic avian influenza, Thailand. Emerg Infect Dis. 2006;12:227–34.
- van den Broek J, Heesterbeek H. Nonhomogeneous birth and death models for epidemic outbreak data. Biostatistics. 2006;8:453–67.
- van den Broek J, Nishiura H. Using epidemic prevalence data to jointly estimate reproduction and removal. Ann Appl Stat. 2009;3:1505–20.
- Boon AC, Sandbulte MR, Seiler P, Webby RJ, Songserm T, Guan Y, Role of terrestrial wild birds in ecology of influenza A virus (H5N1). Emerg Infect Dis. 2007;13:1720–4.
- Brown JD, Stallknecht DE, Berghaus RD, Swayne DE. Infectious and lethal doses of H5N1 highly pathogenic avian influenza virus for house sparrows (Passer domesticus) and rock pigeons (Columbia livia). J Vet Diagn Invest. 2009;21:437–45.
- Jia B, Shi J, Li Y, Shinya K, Muramoto Y, Zeng X, Pathogenicity of Chinese H5N1 highly pathogenic avian influenza viruses in pigeons. Arch Virol. 2008;153:1821–6. 26. Klopfleisch R, Werner O, Mundt E, Harder T, Teifke JP. Neurotropism of highly pathogenic avian influenza virus A/chicken/Indonesia/2003 (H5N1) in experimentally infected pigeons (Columbia livia f. domestica). Vet Pathol. 2006;43:463–70.
- Liu Y, Zhou J, Yang H, Yao W, Bu W, Yang B, Susceptibility and transmissibility of pigeons to Asian lineage highly pathogenic avian influenza virus subtype H5N1. Avian Pathol. 2007;36:461–5.
- Werner O, Starick E, Teifke J, Klopfleisch R, Prajitno TY, Beer M, Minute excretion of highly pathogenic avian influenza virus A/chicken/Indonesia/2003 (H5N1) from experimentally infected domestic pigeons (Columbia livia) and lack of transmission to sentinel chickens. J Gen Virol. 2007;88:3089–93.
- Bavinck V, Bouma A, van Boven M, Bos ME, Stassen E, Stegeman JA. The role of backyard poultry flocks in the epidemic of highly pathogenic avian influenza virus (H7N7) in the Netherlands in 2003. Prev Vet Med. 2009;88:247–54.
- Leslie DS, Ian HB. Multicontinental epidemic of H5N1 HPAI virus (1996–2007). In: Swayne DE, editor. Avian influenza. Ames (IA): Blackwell Publishing; 2008. p. 269.
- Centers for Disease Control and Prevention. Areechokchai D, Jiraphongsa C, Laosiritaworn Y, Hanshaoworakul W, O’Reilly M. Investigation of avian influenza (H5N1) outbreak in humans—Thailand, 2004. MMWR. 2006;55(SUP01): 3–6.
Suggested citation for this article: Keawcharoen J, van den Broek J, Bouma A, Tiensin T, Osterhaus ADME, Heesterbeek H, et al. Wild birds and increased transmission of highly pathogenic avian influenza (H5N1) among poultry, Thailand. Emerg Infect Dis [serial on the Internet]. 2011 Jun [date cited]. http://dx.doi.org/10.3201/eid1705.100880
|
<urn:uuid:3b2db820-e2d1-493a-882e-49ff226ee505>
|
CC-MAIN-2014-15
|
http://wwwnc.cdc.gov/eid/article/17/6/10-0880_article.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223202457.0/warc/CC-MAIN-20140423032002-00150-ip-10-147-4-33.ec2.internal.warc.gz
|
en
| 0.918792 | 6,922 | 3.015625 | 3 |
On 26 April, a disastrous nuclear power plant accident at the Chernobyl site
in the USSR destroys
unit-4 of the reactor, causes deaths and injuries, and
releases radiation across national boundaries;
it is first internationally
detected and reported by experts in Sweden and Finland.
- In August, the IAEA
becomes the site for post-accident review conference, which provides
first authoritative account of the accident. The IAEA's Laboratories are mobilized
to analyze and assess Chernobyl's radiological impact.
- In September, following
work of preparatory groups of experts, IAEA Member States adopt two international
safety conventions on early notification of a nuclear accident and emergency
assistance and response, and endorse an expanded nuclear safety programme.
Response System is set up in support of the conventions.
December, the Rarotonga
Treaty enters into force, for establishing a nuclear-weapon-free zone
in the South Pacific and requiring IAEA safeguards.
|
<urn:uuid:12e6a986-c626-4927-9d24-579c75405ebe>
|
CC-MAIN-2014-23
|
http://iaea.org/About/Timeline/1986.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510274866.27/warc/CC-MAIN-20140728011754-00308-ip-10-146-231-18.ec2.internal.warc.gz
|
en
| 0.860546 | 209 | 3.46875 | 3 |
Bug parents have it easy. Instead of suffering the starving cries of their babies like bird and mammal mommies do, new research indicates that insects merely need a whiff of their kids to gauge what little ones need. The new findings reveal a novel way for offspring to communicate hunger.
Most larvae aren't blessed with a strong set of noisemakers. So it's a safe bet that they must get their parents' attention in some other way. Recognizing that bugs tend to use chemical signals to communicate with each other, evolutionary biologist Edmund Brodie III of Indiana University, Bloomington, wondered if baby insects speak by stinking.
To find out, Brodie and colleagues looked at parental feeding behavior in burrower bugs (Sehirus cinctus). Adults are about the size of a pencil eraser, and the youngest babes--there can be up to 100 per brood--look like bright red pinheads. The researchers separated the babies into two groups: One got plenty to eat, while the other was underfed. They then collected the volatile chemicals wafting from each clutch. Finally, using a "smell-o-tron," the researchers blew these odors toward mother bugs.
Moms receiving odors from ill-fed babies immediately set to finding more food. Mothers gassed with sated-baby odors, on the other hand, slowed their food search. When the team analyzed the chemical make-up of the odors, they found 8 distinct compounds: One was more prevalent in gas from starving babies; another was more prevalent in well fed ones. The mothers didn't respond to these individual compounds alone, however, suggesting a complex interplay between the odors is required. Figuring out exactly which combination of odors is needed to elicit a maternal response will take a lot of trial and error, says Brodie, whose team reports its findings online this week in the Proceedings of the Royal Society B: Biological Sciences.
"This may be the first example of animals communicating hunger by chemicals," says evolutionary biologist Allen Moore of the University of Exeter, Cornwall, U.K. Behavioral ecologist Marty Leonard of Dalhousie University, in Halifax, Canada, says the work is exciting because "it takes us off in another route we haven't traveled."
|
<urn:uuid:d2f1f115-b7f1-40b7-b21a-69a36e7ae6d9>
|
CC-MAIN-2014-23
|
http://news.sciencemag.org/2006/03/i-smell-hungry
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997862553.92/warc/CC-MAIN-20140722025742-00028-ip-10-33-131-23.ec2.internal.warc.gz
|
en
| 0.94815 | 466 | 3.375 | 3 |
The instructor and student may experience success, failure, adventure, risk taking and uncertainty, because the outcomes of the experience cannot totally be predicted. Experiential learning occurs when carefully chosen experiences are supported by reflection, critical analysis and synthesis.
Experiences are structured to require the student to take initiative, make decisions and be accountable for results. Throughout the experiential learning process, the student is actively engaged in posing questions, investigating, experimenting, being curious, and solving problems, assuming responsibility, being creative and constructing meaning.
Students are engaged intellectually, emotionally, socially, soulfully and/or physically. This involvement produces a perception that the learning task is authentic. The results of the learning are personal and form the basis for future experience and learning.
Relationships are developed and nurtured: student to self, student to others and student to the world at large. Opportunities are nurtured for students and instructors to explore and examine their own values.
The instructor’s primary roles include setting suitable experiences, posing problems, setting boundaries, supporting students, insuring physical and emotional safety, and facilitating the learning process.
Faculty at LEAD is rare specimens. They achieve three part mission of research, teaching and service. They spell out specific learning objectives, explain why they matter, and provide advice on how to achieve them. Stated in the language of instructional design, Lead faculty will be able to: communicate effectively; craft constructive reviews and effective response memos; put philosophical insights to practical use; motivate students; share in the governance of your institution; and blend work and life so that each enriches the other.
Lead faculties are accountable, adaptable, caring, compassionate, co-operative and creative. Lead faculties are engaging – The ability to grab the attention of a classroom full of students and to maintain their attention throughout the entirety of class.
Lead teachers create lessons that are fun, fresh, and energetic. You want your student to walk out of your class each day looking forward to the next. Lead teachers provide handholding and a continuous process of year over year improvement and growth.
Finally, LEAD teachers are forgiving in nature – Quickly putting incidents with student, parents, or other teachers behind them you so that it does not impact teaching. She is generous- by volunteering for extra assignments and/or giving money out of your own pocket for classroom needs or individual student needs.
Of course they keep watch on University Examinations too!
We at LEAD believe that Students working in small groups tend to learn more of what is taught and retain it longer than when the same content is presented in other instructional formats.
And we know from experience that when students feel connected, engaged, and included, they feel more satisfied with their courses. In addition, group work provides students with more "real world" experience, because most of them will indeed be spending much of their working lives developing projects in groups.
Groups @ LEAD also often provide more of a sense of "shared purpose" in a class, which means that students feel a greater sense of dedication to the material. Finally, groups in which students meet with students they might not regularly associate with can provide students with new insights and ways of thinking.
These groups are clustered in a different way like
Learners of all ages and experience levels are hungry for variety, and seeing a new face in front of the room can liven up the class; but there are also deeper pedagogical reasons for using guest lecturers @ LEAD.
None of us is an expert on everything, so bringing in speakers with proven expertise in a topic provides added credibility to our content. These experts can be faculty from your neighbor institution or experts from the community. We find that in a course with profound practical applications, such as Business Analytics, supply chain management, voices from the field seemed to carry as much or more credibility than those from the academic side.
Having a guest lecturer also opens your lesson design to new options. For example, the student and guest can work together to field questions or even debate issues. Let students apply their critical thinking to compare points of view. Management education today embraces the ideas of interdisciplinary thinking and performance, and what better way to model this than to have guests from other disciplines teaching content from their perspective.
”To dare is to lose one’s footing momentarily. To not dare is to lose oneself.”
By doing presentations, students learn how to speak in front a group, a broadly applicable professional skill. They learn how to prepare material for public presentation, and practice (especially with feedback) improves their speaking skills.
Presentation occupies a large chunk of academic activity at LEAD.
At the end of the semester every student acknowledges that ‘Teaching self to dare to speak is about practice, relaxation, setting reasonable demands and understanding’. Most of them become real time MASTERS indeed!
We at LEAD believe the case method is the best way to prepare students for the challenges of leadership.
As you watch a case study unfold in class, you'll see students doing 85 percent of the talking, as the professor steers the conversation by making occasional observations and asking questions. This classroom interaction is enriched by ninety classmates from diverse industries, functions, countries, and experiences. At the end of the class, you'll be amazed at what you learn from exchanging ideas with your classmates.
There are no simple solutions; yet through the dynamic process of exchanging perspectives, countering and defending points, and building on each other's ideas, students become adept at analyzing issues, exercising judgment, and making difficult decisions—the hallmarks of skillful leadership.
LEAD uses HBS case studies largely.
Student project are Student projects are a key connection between the School and the world of practice. For our client partners, it is an opportunity to benefit from the insight and energy of one or more of our high-calibre students, and to commission a piece of specialist research or consultancy. For our students, it is an important opportunity to apply their knowledge and skill in a real and practical setting.
AT LEAD such endeavors leads to
Internship @ LEAD aims at widening the student's perspective by providing an exposure to real life organizational and environmental situations. This will enable the students to explore an industry/organization, build a relationship with a prospective employer, or simply hone their skills in a familiar field. This also provides invaluable knowledge and networking experience to the students.
During the internship, the student has the chance to put whatever he/she learned in the MBA into practice while working on a business plan or trying out a new industry, job function or organization.
The organization, in turn, benefits from the objective and unbiased perspective the student provides based on concepts and skills imbibed in the MBA institute. An additional benefit that organizations may derive is the unique opportunity to evaluate the student from a long-term perspective.
Internship through LEAD becomes more than many times a gateway for final placement of the student
There are abundant opportunities to participate in student government and clubs as well as activities that match your particular interests, whether you are looking for a diversion from academic life or to have a significant impact on the learning community.
With more than 12 clubs and over 15 leadership positions in the Student Association, there are many ways to refine your leadership and organizational management experience, explore interests, and make friendships that will last a lifetime.
Participation in workshops, conferences, professional groups is the hall mark of learning at LEAD.
Assignments are day to day affairs at LEAD. This helps the students to develop analytical, informational, argumentative, reflective, or expressive skills, or a combination of several skills?
Analytical: What is valued is the students' ability to examine closely the connection between the parts and the whole of a particular subject and their ability to investigate and articulate the way ideas connect to or contrast with one another.
Informational: What is valued is the students' ability to summarize and synthesize information about a particular subject.
Argumentative: What is valued is the students' ability to articulate a claim about a particular subject with appropriate evidence to support such a claim.
Reflective: What is valued is the students' ability to look at experiences retrospectively and articulate what has been learned from them.
Expressive: What is valued is the students' ability to consider the relevance of personal experience.
Analysis is the skill underpinning all others. To write well from an informational, argumentative, or expressive perspective, in other words, students need to use their analytical ability to focus their writing.
This forms a part of internal assessment too for earning the university credits
Examination orientation and Model Tests
|
<urn:uuid:77861795-dbb4-4568-8e1e-98967569118e>
|
CC-MAIN-2017-34
|
http://lead.ac.in/learning
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886102993.24/warc/CC-MAIN-20170817073135-20170817093135-00029.warc.gz
|
en
| 0.952105 | 1,781 | 2.671875 | 3 |
The project leader
Lyn Evans, project leader for the Large Hadron Collider at CERN, Geneva
Lyn Evans is building the biggest machine in the world. The Large Hadron Collider, a 27-kilometre-long chain of superconducting magnets at CERN in Geneva, Switzerland, will be the most powerful particle accelerator ever built. By smashing together particles and reading the debris, it should take physicists to a new level in our understanding of nature. Managing such a vast project is no simple task. "It's a huge mixture of physics, engineering, politics... and contract litigation," he says.
Evans has been building particle accelerators for more than 30 years. He arrived at CERN in 1969 on a three-month contract to work on a linear accelerator. Two years later, the Super Proton Synchrotron (SPS) was approved to compete with Fermilab's proton accelerator in the US. Its aim was to see what might exist at higher energies, and whether the complex set of heavy particles discovered in earlier accelerators had some underlying symmetry. It was Evans's job to design the hardware to keep the SPS's highly unstable beams of protons tightly focused as they were accelerated.
In the late 1970s, Evans turned down a job that many other scientists would have jumped at - working on the Joint European Torus, a prototype nuclear fusion reactor in Oxfordshire. "It was an exciting time at CERN," he explains. One thing he was working on was how to accelerate antiprotons to collide head-on with protons in the SPS, generating enough energy to create W and Z bosons. The work paid off, and in 1983 the discovery of these fundamental particles confirmed physicists' theories of how electromagnetism is linked to the weak nuclear force.
In 1990, Evans was appointed department head of the SPS, and eventually ran the Large Electron Positron Collider, which occupied the tunnel now taken up by the LHC. "It was difficult at the beginning, handling so many people - not an easy transition from being an innocent scientist with very little knowledge outside accelerator science. I don't know how you train for it. You just learn on the job and become streetwise," Evans recalls.
His appointment at the LHC in 1993 added a political dimension to Evans's career. "The early 1990s was a bumpy period." A lack of funding from CERN's member states meant that, as well as designing the machine, he had to go on the road along with CERN head Christopher Llewellyn Smith to persuade non-members to chip in - and the US, Japan, Russia, India and Canada did so.
The collider is now built, but a lot more work will be needed before it is up and running. Evans and his team are now cooling down the first eighth of the LHC. "That alone is 1.5 times bigger than anything that's been done before," says Evans. The accelerator's electromagnets have to be very cold to superconduct, at which point they are powerful enough to accelerate the beams to the necessary high energy. The final stage in the cooling process involves feeding in liquid helium at a temperature of 1.9 kelvin, which is so cold that the helium becomes superfluid. "It's a quantum liquid, with very unusual properties as an engineering material. It will flow through the tiniest crack, which makes life challenging for the welders," he says. "In the lab, we normally play with this stuff in gram quantities; here, we've got 100 tonnes."
By the end of this year, Evans hopes to finally get beams of protons circulating around the machine, then 2008 will be "the big year", taking the LHC up to full energy. At this point, his machine might begin to find evidence for heavy "superpartners" of ordinary matter, or extra dimensions of space, or just possibly start to manufacture microscopic black holes.
Peter Coles, professor of cosmology, University of Nottingham
"There's a curious thing going on in cosmology," says Peter Coles. "For the first time there is a standard model that fits the data, but it's weird: 70 per cent of the universe is dark energy and we have no idea what it is, and 25 per cent is dark matter and we don't know what that is. If somebody had asked me how to design a universe, frankly I wouldn't have come up with that. It seems quite unnatural from the physics point of view, which suggests to me that at some level it might be wrong."
That is an exciting prospect for Coles, the first professor of cosmology appointed at the University of Nottingham. The main aim of his research is to explain the pattern of matter in the universe, calculating how galaxies and clusters might have evolved.
Coles was not always interested in cosmology. His undergraduate degree in natural sciences at the University of Cambridge did include one cosmology course, but it was mostly about observations, and he had already decided to be a theorist. "It didn't set me aflame," he admits. When he was interviewed for a PhD place at the University of Sussex, his soon-to-be-supervisor John Barrow suggested a project working on the cosmic microwave background (CMB) - the radiation emitted by the universe when it was only 380,000 years old. Specifically, the aim was to investigate what it might look like. "What seemed interesting to me was not to do with cosmology, but the fact that it involved statistics and mathematical probabilities," says Coles. "That's when I started getting into cosmology. Until you start working in a field you don't realise what's involved."
Looking for a job in science or technology? Take a look at the latest opportunities on Newscientistjobs.com.
- New Scientist
- Not just a website!
- Subscribe to New Scientist and get:
- New Scientist magazine delivered every week
- Unlimited online access to articles from over 500 back issues
- Subscribe Now and Save
If you would like to reuse any content from New Scientist, either in print or online, please contact the syndication department first for permission. New Scientist does not own rights to photos, but there are a variety of licensing options available for use of articles and graphics we own the copyright to.
|
<urn:uuid:d9bcb449-6359-4181-9f65-f06a3d91133d>
|
CC-MAIN-2013-48
|
http://www.newscientist.com/article/mg19325942.400-three-diverse-career-paths-in-physics.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163049635/warc/CC-MAIN-20131204131729-00075-ip-10-33-133-15.ec2.internal.warc.gz
|
en
| 0.971314 | 1,306 | 2.859375 | 3 |
2012 Saskatoon, Saskatchewan, Canada
Alana Krug-McLeod from Aden Bowman Collegiate in Saskatoon, Saskatchewan, proposed the idea of developing an educational and entertaining program that will encourage individuals to understand and protect vital water sources – both locally and internationally. Project Penguin is set up to provide individuals new reasons to care about the environment and new ways to join others to make a difference. It is important to learn why everyone’s everyday actions matter and how to make changes that prevent harm and that will do good.
To undertake this informative program, Alana decided to set up a number of geo-caches. The materials contained within the geo-caches included sample cards and decorated “penguin” eggs. The cards and eggs were created with the assistance of the art club.
An educational DVD containing videos and information shorts was then created and distributed to schools.
|
<urn:uuid:9f78e613-4358-408d-9f2f-b5c635ccf480>
|
CC-MAIN-2023-23
|
https://caringforourwatersheds.com/project-penguin/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648322.84/warc/CC-MAIN-20230602040003-20230602070003-00458.warc.gz
|
en
| 0.951428 | 180 | 2.609375 | 3 |
Angina is chest pain you feel when your heart doesn’t get enough blood.Angina pectoris, or angina, is a type of chest pain or pressure that occurs when the heart does not receive enough oxygen-rich blood. The pain that characterizes angina isn’t a condition, but is a symptom or warning sign of heart disease.
Angina can be classified as either:
- Stable – Stable angina is present only after a specific and predictable trigger, such as stress or exercise. This condition is not life-threatening, although it does indicate the presence of serious issues that could lead to a heart attack or stroke if left untreated.
- Unstable – Unstable angina occurs randomly and without a specific cause. This condition is considered a medical emergency and requires immediate treatment.
Other types of angina include microvascular angina and variant (Prinzmetal) angina.
Causes of Angina
Angina is typically caused by an underlying heart condition or issue, such as:
- A blood clot in an artery
- Heart muscle spasms
People may be at a higher risk for angina if they have one or more of the following health conditions:
- Heart failure
- High cholesterol
- Blood pressure that is too high or too low
- Heart valve disease
- An enlarged heart
Symptoms of Angina
Angina typically feels like a tight, squeezing pressure in the chest, although it can also occur in the shoulders, arms, back, neck or jaw. In some cases, it can be difficult to determine where the pain is coming from, and some individuals have a hard time distinguishing it from indigestion.
Some people may also experience:
- Pain the abdomen
- Excessive sweating
- Shortness of breath
If you are experiencing sudden chest pain that was not caused by a known trigger, feels more severe than past stable angina episodes or you think you’re having a heart attack, call 911 immediately.
If you’re experiencing chest pain, your healthcare provider will perform a physical exam. Diagnosing angina may also include other tests, such as:
- Complete blood count
- X-rays of the chest
- Electrocardiogram (EKG)
- Cardiac stress test
- Coronary angiography and cardiac catheterization
- Coronary computed tomography angiogram (CTA)
Treating stable angina will likely include long-term management plans, including diagnostic services to pinpoint the underlying cause and any potential triggers as well as preventive surgery to help reduce the likelihood of future cardiac events.
Treatments for Angina
Treating angina often begins with methods that address the underlying heart conditions causing discomfort. At Tampa General Hospital, our heart and vascular specialists will work closely together to diagnose heart conditions and provide the treatments that suit each patient individually.
Some treatment options may include:
- Medications that reduce cholesterol, high blood pressure and blood clotting capabilities
- Surgery, such as angioplasty and stenting or coronary artery bypass grafting (CABG) surgery
|
<urn:uuid:12c40b5b-81a1-4af9-8b79-6b456713ce84>
|
CC-MAIN-2023-23
|
https://www.tgh.org/institutes-and-services/conditions/angina
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656788.77/warc/CC-MAIN-20230609164851-20230609194851-00354.warc.gz
|
en
| 0.91836 | 677 | 3.09375 | 3 |
Electrocardiograms and ECG variants
Physical examinations for FAA First Class medical certification require an electrocardiogram (a.k.a. ECG or EKG) on the first physical examination after age 35 and annually after age 40 – FAR Part 67.111 (b). Second and Third Class certification examinations do not require ECG’s. Occasionally, airmen receive a letter from the Aeromedical Certification Division of the FAA indicating “a slight variance has been found on your electrocardiogram of (date).” The FAA then requires a cardiovascular evaluation (CVE). Other tests may be requested depending on the nature of the “slight variance.”
Pilots often find these letters rather alarming. The concern may be generated because they fear their medical certificate is not valid or may soon be suspended. Concerns about the underlying health issues are also present. Frequently, the AME performing the ECG did not mention any “variance” raising questions about the AME’s thoroughness or the administrative process that may have led to a mix-up in ECGs, the “That can’t be my ECG!” denial. It is important to understand some basics about ECGs and how they are processed at the FAA. Often, the situation is resolved without any consequences.
What is an Electrocardiogram?
An ECG is a graphical representation of the heart’s rhythm and the sum of the electrical forces of the heart measured in 12 different directions. Other than the heart rate, an ECG is fairly stable in an individual if no physical changes in the heart have occurred. Though not as unique as fingerprints, ECGs tracings over time in a single individual should appear very similar. A single ECG is like a snapshot in time. It cannot predict what will happen, but does demonstrate what has happened to a limited extent. A more detailed explanation of abnormal heart rhythms is found in our article “Arrhythmias”.
Rate and Rhythm
The first of the two major areas noted in the ECG is the rhythm. A “normal sinus rhythm” requires a regular heart rate of between 60 and 100 beats per minute (bpm). It also requires that for every signal generated in the natural pacemaker of the heart (sinus node) located in the left upper chamber of the heart (atrium), a signal is conducted to the two lower chambers of the heart (ventricles). Faster rates are termed “tachycardia” while slower rates are termed “bradycardia”. There are both benign and significant causes for each of these conditions. If the heart rate is not regular or there is a prolonged delay in the conduction of the signals, terms such as fibrillation, flutter and heart block are used depending on the finding. Most are aeromedically significant and some are medically significant, particularly if they represent a change from a previous ECG.
ECG’s sent to the FAA with irregular heart rates will trigger a request for a CVE with a Holter monitor report. The Holter monitor is a 12-24 hour recording of the heart rate analyzed by a computer for abnormalities. Rather than the 6 second snapshot of a routine ECG, this is a feature length ECG movie. The Holter does not give specific information about coronary artery disease or heart structure. The Holter monitor involves several wire leads attached to the body and fed into a transistor radio sized device worn on the belt for the duration of the test. At the completion of the test, the device and leads are removed for analysis. Individuals are often requested to keep a diary of activity to accompany the Holter and push a button to make signal when they make a diary entry. This is a good idea to do, as it may explain some irregularities in the heart rhythm. A rate of 145 bpm is suspicious if unexplained, but a note that you were exercising during that time is reassuring. Likewise, a rate of 40 may be normal when sleeping. Abnormal arrhythmia’s discovered on ECGs will require full explanation. Significant arrhythmia’s may be associated with not only heart disease, but also with loss of consciousness. Non-cardiac causes of arrhythmia’s, such as caffeine, medication or an overactive thyroid, may easily be corrected.
The second broad area evaluated by an ECG is the total electrical forces of the heart in each of 12 directions. This may give general information about the function of the heart muscle and its electrical components, the thickness of the ventricles, the workload or areas of previous damage to the heart. Six of the twelve axes measure the electrical sum in the frontal plane, parallel to the shoulders. The electrical activity should move toward the lower left quadrant. Six leads measure electrical activity in the horizontal plane, parallel to the ground. The net electrical activity should be forward and to the left. Activity in a different direction may indicate damage to the heart, increased workload or problems with the heart valves. This information is non-specific, but may indicate the need for other more definitive testing.
The spikes and waves of an ECG should fall within standardized heights and duration. Again, deviations may indicate similar problems as above. The presence of extra waves or spikes may indicate previous heart damage or chemical abnormalities. Further tests are needed to confirm these suspicions.
Abnormalities in these areas may lead to requests for echocardiograms if structural abnormalities are suspected. the echocardiogram is an ultrasound and Doppler study of the heart structures and blood flow through the heart. If decreased blood flow from coronary artery disease or a previous heart attack is suspected, one of several types of treadmill exercise stress tests is requested. Certain delays in conduction of the electrical signals, particularly “bundle branch blocks” of new onset also trigger requirements for treadmills or stress tests.
FAA Letters for ‘a slight variance from normal’
Why does the FAA send out these letters? Obviously, if one of the above abnormalities is discovered, further evaluation is appropriate for aviation safety. However, there are several administrative reasons why a letter would be generated with a medical cause. The FAA maintains a library of all the ECGs done by pilots. Some ECGs are sent to the FAA in hardcopy while some are sent electronically. ECGs received are compared to previous ECGs on the same pilot. Changes from previous ECGs trigger this letter. Some changes may be significant, but others may arise from different causes. Examples include incorrect placement of ECG leads on the chest or limbs, electronic “noise” interfering with the transmission or failure to successfully transmit electronic or hardcopy ECGs. In the near future, all AMEs performing First Class exams must transmit ECGs digitally using specialized equipment. This will eliminate most transmission problems and inconsistencies between different types of ECG machines used.
Pilots – What To Do About the Letter
What should pilots do if they get a letter requesting a CVE from the FAA for “a slight variance in your ECG”?
First, don’t panic! Pilots can contact AMAS and we’ll explain how to go through the process. Most letters provide a 60 day deadline. Failure to report (or be in contact) within the 60 day suspense may result in an automatic denial. Don’t worry there is plenty of time to respond to the FAA. Unless otherwise indicated, your medical certificate is valid during this process.
Next, complete all aspects of the FAA CVE and any other FAA directed tests. These tests are not usually done by your AME. Rather they are done by your private physician or a consulting physician you may be referred to for testing. If your physician recommends additional tests BECAUSE THEY ARE MEDICALLY INDICATED, do the testing and protect your health. We strongly advised AGAINST doing testing that is not medically indicated “just because the FAA might want to see it.” If the FAA wanted it, they would ask for it. This can cause significant problems and expense. As long as you are still flying, don’t worry about second guessing the FAA.
Send the tests in to the address specified on your letter using the identification number listed on the top in a cover letter. Keep a copy of everything. The FAA will acknowledge your submission in 3-12 weeks. Three possible responses are seen. Your eligibility for an airman’s certificate will be confirmed, you will have further testing requirements specified, or rarely, your certificate will be denied. Keep a copy of the FAA response and have it available for your next physical exam.
The completed Cardiovascular Evaluations listed on FAA Form 8500-19 and other test results may be mailed to the FAA at :
Federal Aviation Administration
Aeromedical Certification Division
CAMI Bldg./ AAM-300
P.O. Box 26080
Oklahoma City, OK 78126-9922
Remember that all documents sent in to the FAA will be scrutinized. We often find that casual remarks in medical documentation, tend to lead to requests for additional information. This problem leading even to potential erroneous groundings can usually be avoided if the record is reviewed in advance and all questions answered before submittal. The physicians at AMAS routinely provide this service for our clients.
AMAS Aeromedical Assistance
For a more specific personal explanation to your questions or those concerning aeromedical certification, contact AMAS for a private consultation. For help in reporting treatment for and obtaining clearance from the FAA to fly with these conditions, refer to the AMAS Confidential Questionnaire. If you are an AMAS Corporate Member, these services are FREE to you.
|
<urn:uuid:5798be4a-fb9a-443a-b196-888ea9f857e8>
|
CC-MAIN-2023-23
|
https://www.aviationmedicine.com/article/electrocardiograms-and-ecg-variants/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644683.18/warc/CC-MAIN-20230529042138-20230529072138-00263.warc.gz
|
en
| 0.926456 | 2,019 | 2.625 | 3 |
His name means "the opener of the ways (roads)". This is thought to refer to the paths through the underworld, but may also refer to the choices or paths taken life as he also seems to have been linked to the power of the living pharaoh. In the "Book of the Dead" and the book of "That Which Is in the Underworld" (Amduat) he leads the deceased through the underworld and guards over them on their perilous journey, but he was also thought to act as a scout for the army, "opening a path" to allow them to proceed.
According to some traditions, it was Wepwawet and not Anubis or Ptah who devised the "opening of the mouth" ceremony which ensured that the person would have the enjoyment of all his faculties in the afterlife. However, he also accompanied the king when he was hunting and was given the epithet, "the one with the sharp arrow who is more powerful than the gods."
Wepwawet originally was seen as a wolf deity, thus the Greek name of Lycopolis, meaning city of wolves, and it is likely the case that Wepwawet was originally just a symbol of the pharaoh, seeking to associate with wolf-like attributes, that later became deified as a mascot to accompany the pharaoh. Likewise, Wepwawet was said to accompany the pharaoh on hunts, in which capacity he was titled (one with) sharp arrow more powerful than the gods.
Wepwawet may also have symbolized the unification of Upper and Lower Egypt. In royal processions his standard was paired with the Apis Bull (representing Lower Egypt). Yet in one inscription the location of his birth is claimed to be the temple of the goddess Wadjet in Buto (in the Delta). It seems that this was a political move as all other evidence suggests that he had Upper Egyptian origins. He was generally depicted as a canine or a man with the head of a canine. There is some debate as to whether he is in fact a wolf. Unlike Anubis, he is often depicted with a grey or white head, and the Greeks named Thirteenth nome of Upper Egypt Lycopolis (Wolf town) in his honour. Some scholars argue that he was a jackal and others that he was originally a wolf but was merged with Anubis, and so became seen as a jackal-headed god. He was often depicted alongside the uraeus (royal cobra) and a "shedshed" standard. A good example of this can be seen on the Pre-Dynastic Narmer macehead.
His relationships with the other gods were confused by the merging and shifting of roles throughout Egyptian history. He was closely associated with Anubis who was originally part of the Ogdoad of Hermopolis, and came to be seen as his son. However, he was also linked to the god Shu of the Ennead of Heliopolis by the epithet "he who has separated the sky from the earth". When the two theologies merged and Anubis made way for Osiris the idea developed that Osiris was the father of Anubis (although his mother was generally not described as Osiris´ wife Isis but rather her sister Nephythys). To complicate matters further, Wepwawet was sometimes called the "son of Isis" and identified as Horus (and therefore the pharaoh) although she was also seen as the grand-daughter of Shu and the step-mother of Anubis according to the Heliopolitan tradition.
|
<urn:uuid:53443c8a-2743-4fa1-93b3-2a2bbb0fa6e2>
|
CC-MAIN-2017-26
|
http://mytho.wikia.com/wiki/Wepwawet
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319636.73/warc/CC-MAIN-20170622161445-20170622181445-00590.warc.gz
|
en
| 0.992759 | 727 | 2.984375 | 3 |
Prepared from information supplied by Save the Brumbies
The brumby is an Australian icon and is recognised as a part of Australian folklore. The brumby has been romanticised in poetry, featured in Australian television shows, written about in novels and made an appearance at the opening ceremony of the Sydney 2000 Olympic Games.
The name 'brumby' is thought to have several different origins. These include the theory that it may have developed from 'baroomby' meaning 'wild horse' in the Pitjara Aboriginal language. Another suggests it may have come from James Brumby, an early settler, who let his horses roam free across vast tracts of unfenced land and breed unmonitored.
Brumbies can trace their genetic lineage to a number of different breeds including Thoroughbred, Arabian, Clydesdales and other draught horses. Brumbies are known to have sturdy hooves, well-developed senses and a high level of intelligence.
Brumbies are mostly wild horses that range freely in a number of areas, with the largest populations in the Northern Territory, Queensland and Western Australia, where there is more undeveloped land and fewer people.
Hardy and versatile horses with a good temperament, brumbies have been used for a number of different purposes. During the Boer War and the First and Second world wars, brumbies were sent overseas and used as cavalry mounts. They have also been used as police horses and stockhorses. Brumbies were also used to develop the Waler and Australian Stock Horse bloodlines. The number of brumbies under private ownership is steadily increasing.
There has recently been controversy surrounding the treatment and control of growing brumby populations in areas such as national parks. Many associations and horse sanctuaries have been established to care for brumby populations and the Australian Brumby Horse Register was started in 2004 to help preserve the heritage of the brumby in Australia.
|
<urn:uuid:c53f04b9-8c9f-4ed6-8ee8-8f6911441067>
|
CC-MAIN-2017-26
|
http://www.nma.gov.au/portable/australian-horses/home/brumby
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319943.55/warc/CC-MAIN-20170623012730-20170623032730-00504.warc.gz
|
en
| 0.971778 | 402 | 3.15625 | 3 |
Three main Old Testament (OT) passages in the Torah or Pentateuch address the topic of lending and interest:Exod. 22:25: “If you lend money to any of my people with you who is poor ... you shall not exact interest from him” (ESV). Lev. 25:35, 37: “If your brother becomes poor and cannot maintain himself with you, you shall support him ... You shall not lend him your money at interest, nor give him your food for profit,” and Deut. 23:19-20:“You shall not charge interest on loans to your brother ... You may charge a foreigner interest, but you may not charge your brother interest.” Although the first two passages clearly state the focus of the ban on interest only for loans to the poor, the third passage does not specifically mention the term, “poor.” This omission of a reference to the “poor” in Deut. 23-19-20 prompted the understanding that the OT teaches a complete ban on interest or usury for any loans among Israelites.Note that the term “usury” meant any interest for most of history, until about the 1800s, when “usury” started to indicate excessive interest, as it does today. From earliest times in church history to about the 1700s, pastors and theologians applied that teaching to all Christians, of a complete ban on usury--any interest--on loans, whether for the poor or for other purposes, including commercial loans.
After reviewing some background information in Part 1, Part 2 offered an orientation to the key factors regarding these three Torah passages and the four main interpretive issues regarding how the Deut. 23:19-20 “distinction” (between “brother” and “foreigner”) might be understood. As a result three possible interpretations of Deut. 23:19-20 were identified:
A. Ethnic status distinction implying a total usury ban,
B. Ethnic status distinction implying a two-tiered ethic, or
C. Economic status distinction implying a contrast between the poor and the merchant.
Part 3 reviewed the first two interpretive options and provided some reasons that argued against these as the best interpretation. In this fourth blog, I briefly state the evidence supporting the third Option C, that Deut. 23:19-20 makes most sense as teaching the same points as already taught in the other Torah passages.
The third “Economic Status” interpretation regards the intended contrast as between the unfortunate poor person (i.e., ban on interest-taking from the poor, v. 19) and the business merchant (i.e., permission of interest-taking for commercial purposes, v.20). Biddle summarizes this perspective, “In fact, since most traders in the ancient Near East did business internationally, the permission to charge interest of ‘foreigners’ may be understood less as a form of ethnocentricity and more as drawing a distinction between lending to the needy in one’s community and credit as a component of commercial transactions.” Four main points, considered cumulatively, help support this point.
1. The use of the OT term for “interest” (nešek; sounds like ne-shek) has a predominant contextual focus of protection for the poor. It occurs twelve times in the OT, appearing three times in Deuteronomy 23:19. Of the nine other uses outside of Deuteronomy 23:19, seven occurrences have a clear contextual focus on protecting the poor: Exodus 22:25; Leviticus 25:36, 37 (two times); Proverbs 28:8; and Ezekiel 18: 8, 13, 17. For example, OT scholar Bruce Waltke notes, “The parallel, ‘poor,’ in Prov. 28:8 and the context (see vv. 3, 6, 11) strongly favors restricting its meaning to charging interest from the needy.” Thus, by inference from these seven occurrences, this same protective emphasis on the poor applies in the three uses of nešek in Deuteronomy 23:19.
2. The term usually translated in the OT as “foreigner” (nokrî; sounds like nah-kree) conveys a distinctly economic association, designating a foreign merchant or trader in Deuteronomy 23:20, according to a scholarly consensus. For example, Jewish commentator Jeffrey Tigay explains, “The foreigner is normally a businessman visiting the country for purposes of trade, and he borrows in order to invest in merchandise and make a profit, not to survive poverty. There is no moral imperative to remit loans made for such purposes [Deut. 15:3] or forgo interest on them [Deut. 23:20].” This economic meaning (“merchant”) for a general term (“foreigner”) is not unique in the OT. A similar secondary association for “trader” exists for the general term “Canaanite”(kĕnaʿănî; sounds like kuh-naw-uh-nee), which is translated as “trader” in ten OT cases (Job 41:6; Prov. 31:24; Isa 23:8; Ezek. 16:29, 17:4, Hos. 12:7, Zeph. 1:11, and Zech. 11:7, 11, 14:21). Thus, nokrî is best rendered as “(foreign) merchant or trader” in Deuteronomy 23:20.
3. A conceptual “Explicit-Implicit Parallel“ regarding the restriction and the permission of interest-taking is evident in three OT Torah usury passages. OT scholar Walter Kaiser clarifies this explicit-implicit interpretive guideline for the OT law, “When an evil is forbidden in one of the commandments, its opposite good must be understood as being encouraged.” Both Exodus 22:25 and Leviticus 25:35-37 explicitly teach a ban against taking interest on loans with the poor. That also implies that when making loans for other purposes---not for subsistence loans to the poor--then it is morally legitimate to take interest. This second point is explicitly stated in Deuteronomy 23:20, Israelites may take interest from a nokrî, a foreign merchant or trader--was implicit in Exodus 22:25 and Leviticus 25:35-37. Additionally, Exodus 22:25 includes a similar sort of contrast, as translated in the NIV: “If you lend money to one of my people among you who is needy, do not treat it like a business deal; charge no interest.”
4. Finally, an earlier section in Deuteronomy treats the subject of lending in which there is an explicit reference of concern for the poor, in wording very similar to the usury passage in Leviticus 25:35: “If among you, one of your brothers should become poor, in any of your towns within your land that the LORD your God is giving you, you shall not harden your heart or shut your hand against your poor brother (Deut 15:7). It seems appropriate to regard Deuteronomy 23:19-20, then, as a follow up discussion to this earlier section (Deut 15:7-11), in which the focus was concern for the poor brother.
OT scholar Peter Craigie affirms an understanding that all three Torah usury passages convey the same ban on loans to the poor, “Loans were normally made in an attempt to alleviate poverty [Deut. 23:19], as is made clear by the parallel legislation to these verses [Exod. 22:25; Lev. 25:35--36].” Thus, Deuteronomy 23:19-20 could be paraphrased as: “Do not charge interest on basic subsistence loans to the poor and needy, but you may charge interest on loans for other purposes, including for commerce.”
In a final Part 5, I offer a few practical implications from this OT teaching.
1. Mark E. Biddle, Deuteronomy (Macon, GA: Smyth and Helwys, 2003), 252--53; also see Biddle, “The Biblical Prohibition Against Usury,” Interpretation 65 (2011): 117-21.
2. Bruce Waltke The Book of Proverbs: Chapters 15--31, New International Commentary on the Old Testament (Grand Rapids: Eerdmans, 2005), 413.
3. Jeffrey H. Tigay, Deuteronomy, The JPS Torah Commentary (Philadelphia: The Jewish Publication Society, 1996), 218. A similar economic sense can apply also to Deut. 14:21 and 15:3.
4. Walter Kaiser, “Exodus” in The Expositor’s Bible Commentary, Vol 2., ed. Frank E. Gaebelein (Grand Rapids, MI: Zondervan, 1990), 421.
5. Peter Craigie, The Book of Deuteronomy (Grand Rapids: Eerdmans, 1976), 302.
(For further details see my article, “Lending and Interest in the OT: Examining Three Interpretations to Explain the Deuteronomy 23:19-20 Distinction in Light of the Historical Usury Debate,” Journal of the Evangelical Theological Society, vol. 59, 2016, 761-89.)
|
<urn:uuid:1ccbf01e-d0fe-499d-b23c-81419c565fbb>
|
CC-MAIN-2020-34
|
https://www.biola.edu/blogs/good-book-blog/2018/what-does-the-old-testament-say-about-loans-and-interest-part-4
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439739073.12/warc/CC-MAIN-20200813191256-20200813221256-00494.warc.gz
|
en
| 0.917913 | 1,996 | 2.765625 | 3 |
Impedance is the opposition to current flow and is a two dimensional parameter consisting of resistance and reactance.
Resistance is the opposition to the flow of both direct and alternating current. Reactance is the opposition to flow of
alternating current only. Reactance can be either capacitive or inductive. Both resistance and reactance are measured
in ohms. Of primary interest in eddy current inspection are resistance and inductive reactance, the latter due to
inductance of a coil. Capacitive reactance becomes significant in only a few cases and will be discussed later. The
impedance of a test coil is related to the current flow in and voltage drop across the coil as follows:
Z = E / I
Impedance of coil (ohms)
Voltage drop across the coil (volts)
Current through coil (amperes)
When AC or DC flows through a purely resistive element (i.e., a straight section of wire or a carbon resistor) of an
electrical circuit, the impedance is resistance only and is expressed as:
R = E / I
Voltage drop across the resistor (volts)
Current flowing through circuit (amperes)
In an AC circuit containing resistance only, the voltage and the current are in phase. The term "in phase", when used
to describe the relationship between the voltage and current, indicates that changes in current occur at the same time
and in the same manner (direction) as changes in voltage. Figure 4-13 is an example of two quantities that are in phase.
Figure 4-13. Sinusoidal In-Phase Variation of Alternating Current and Induced Magnetic Field.
The inductance of an eddy current probe is the result of magnetic field effects of the alternating electric current in the
probe. Inductance is a measure of the capability of a circuit to induce current flow in another circuit. It is proportional
to the ratio of the magnetic flux (f) linking (encircling) a circuit to the current (I) that produced the flux. When the
flux from one inductor is linked to (passes through) another inductor, the inductance is called mutual inductance (M).
An electrical transformer is an example of a device where M is a significant parameter. For eddy current testing, we
|
<urn:uuid:26d9785a-007b-4b14-8dac-ac2a77d07257>
|
CC-MAIN-2017-34
|
http://chemical-biological.tpub.com/TM-1-1500-335-23/css/TM-1-1500-335-23_345.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886105712.28/warc/CC-MAIN-20170819182059-20170819202059-00099.warc.gz
|
en
| 0.89849 | 492 | 3.96875 | 4 |
A Panama plan entails using another country’s currency without forming a currency union with common fiscal aims.
Panama plan is a term coined by Alistair Darling, former UK chancellor and leader of the pro-union Better Together campaign, which was set up prior to the Scottish referendum on whether it should break away from the rest of the United Kingdom, to lobby against Scottish independence.
Mr Darling used the phrase “Panama plan” in February 2014 in response to the assertion by Alex Salmond, Scotland’s first minister that an independent Scotland could continue to use the pound even if Westminster refused to enter a currency union.
Mr Darling responded by saying that the proposal sounded like a “Panama Plan”, requiring Scotland to generate a permanent balance of payments surplus to ensure it had enough money to pay its way, with interest rates set by “a foreign country”.
A letter writer to the FT pointed out that the phrase “Panama plan” could have a double meaning. The failure of an attempt to build a Scottish colony, the Darien scheme, is often cited as a precipitating factor for the 1707 Act of Union which saw Scotland’s political union with England. The Darien scheme was located on the isthmus of Panama.
|
<urn:uuid:532d0c70-5f56-473b-8e73-77033808c564>
|
CC-MAIN-2020-29
|
https://globaladvisors.biz/2014/03/21/term-panama-plan/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655886516.43/warc/CC-MAIN-20200704170556-20200704200556-00244.warc.gz
|
en
| 0.964318 | 265 | 3.578125 | 4 |
Table of Contents
- Hooded Crow Physical Characteristics
- Hooded Crows are socially adaptable
- Hooded Crows are quite aggressive
- Hooded Crows have theft habits
- Hooded Crows as Pets
- Frequently Asked Questions
- What’s the difference between a crow and a hooded crow?
- Are hooded crows endangered?
- What does a hooded crow look like?
- Are hooded crows common?
- What does the hooded crow symbolize?
- What are some interesting facts about the hooded crow?
Hooded Crow Physical Characteristics
Hooded Crows are quite aggressive
Hooded Crows have theft habits
Hooded Crows as Pets
Frequently Asked Questions
What’s the difference between a crow and a hooded crow?
The hooded crow (Corvus cornix) and the carrion crow (Corvus corone) are two closely related bird species that are almost identical genetically. However, there are distinct physical and behavioral differences between them.
- Regarding physical characteristics, the hooded crow has an ashy grey body, belly, nape, and rump, contrasting with a black head, bib, wings, and tail. On the other hand, the carrion crow is solid black in color. Immature hooded crows have pinkish-red beaks, while immature carrion crows have grey beaks.
- Juvenile hooded crows have blue-grey eyes, while juvenile carrion crows have brown eyes. Female hooded crows can be visually distinguished from males by size and behavior. On the other hand, female carrion crows are slightly smaller than males and have a less bulky bill.
- Regarding behavior, hooded crows are more friendly and often live in pairs or small groups. They exhibit a preference for mates whose coloring matches theirs.
- Conversely, carrion crows are less sociable and exhibit dominant behaviors influenced by hormones. Like hooded crows, they also choose mates based on coloring similarity.
Overall, while the hooded crow and the carrion crow are closely related and share many similarities, the two species have noticeable physical and behavioral differences.
Are hooded crows endangered?
The hooded crow is not considered a species of concern, and no specific conservation actions are currently needed for its population.
In the United Kingdom, the hooded crow is protected under The Wildlife and Countryside Act 1981, reflecting its conservation status as “Green“, indicating no immediate threat to its survival.
In Europe, the hooded crow is considered a “Least Concern” regarding its conservation status. This designation suggests that the species is widespread and stable throughout its range and does not face significant threats to its population.
Overall, the hooded crow is not considered endangered, and its conservation status is generally stable. However, ongoing monitoring and conservation efforts are important to ensure the continued well-being of the species and its habitats.
What does a hooded crow look like?
The hooded crow is a distinctive bird with the following appearance:
- Size and Measurements: It measures around 46cm (18 inches) in length. It has a moderate size compared to other crow species.
- Plumage: The hooded crow has an ashy grey color on its back and lower body. Its head, throat, wings, and tail are black, creating a sharp contrast. The feathers on its thighs are also black.
- Facial Features: It has dark brown eyes and a thick, curved beak, characteristic of the crow species. The beak is black, like the rest of its face.
- Sexual Dimorphism: Male and female hooded crows have similar appearance. However, female hooded crows may be slightly smaller and behave differently than males.
- Juvenile Plumage: Juvenile hooded crows have duller grey feathers with a hint of brown compared to adults. Their beaks have a pinkish-red color on the inside. Their eyes are blue-grey.
- Contrast with Carrion Crow: The hooded crow can be distinguished from the carrion crow by its combination of ashy grey and black plumage. The carrion crow is entirely black.
The hooded crow stands out with its ashy grey body, black head, throat, wings, tail, thighs, black bill, eyes, and feet. These distinct features make it easily identifiable in the bird kingdom.
Are hooded crows common?
The hooded crow is a common bird species in many parts of Europe and the Middle East, and it benefits from the proximity of humans.
What does the hooded crow symbolize?
No clear symbolic meaning is associated with the hooded crow in popular culture or mythology. However, here are some details about the hooded crow:
- In Irish folklore, the bird appears on the shoulder of the dying Cú Chulainn and could also be a manifestation of the Morrígan, a goddess of war and fate.
Overall, while the hooded crow does not have a clear symbolic meaning, it is a widely distributed bird species that is adaptable and benefits from the proximity of humans.
What are some interesting facts about the hooded crow?
The hooded crow is a fascinating bird species with several interesting facts:
- Distribution: The hooded crow is widely distributed across Northern, Eastern, and Southeastern Europe, parts of the Middle East, and Northeast Africa.
- Appearance: This bird has ashy grey plumage, contrasting with black feathers on its head, throat, wings, tail, and thighs. Its bill, eyes, and feet are also black.
- Relationship with Carrion Crows: The hooded crow is so similar to the carrion crow in appearance and behavior that they were once considered geographical races of the same species. However, they were elevated to full species status in 2002.
- Behavior and Adaptability: Hooded crows are friendly birds that can be found living in pairs or small groups. They have a diverse diet, including dead animals, invertebrates, and grain, and they may even steal eggs from other birds’ nests. They have also become a common presence in inhabited areas, benefiting from the proximity of humans by feeding on waste and crop seeds.
- Conservation Status: The hooded crow is considered stable in Europe and has a conservation status of “Least Concern“. Its adaptable nature and ability to thrive in various environments contribute to its stable population.
- Migration and Sedentary Behavior: Northern European populations of hooded crows tend to migrate south during the winter. In contrast, southern populations remain mostly sedentary, remaining in their respective regions.
- Hybridization: Hybrids between hooded and carrion crows are fertile but may be less well-adapted compared to purebred birds.
- Observation: Hooded crows are particularly observable at sunset when they form large flocks during their travels.
The hooded crow’s wide distribution, adaptability, and ability to benefit from human presence make it an intriguing and successful bird species.
|
<urn:uuid:29bd45f6-f360-4fe8-9358-52dd1eecf161>
|
CC-MAIN-2023-40
|
https://www.bioexplorer.net/animals/birds/hooded-crow/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510238.65/warc/CC-MAIN-20230927003313-20230927033313-00147.warc.gz
|
en
| 0.946489 | 1,551 | 3.28125 | 3 |
Japanese quakes highlight danger of new catastrophe
26 November 2016
Two earthquakes off Japan’s northwest coast this week—Tuesday’s 7.4-magnitude shock and Thursday’s 6.1-magnitude tremor nearby—triggered tsunami fears and injured some 20 people. Fortunately, they were much less devastating than the massive magnitude-9 quake that caused nearly 20,000 deaths and a nuclear disaster on the same coastline in March 2011.
Nonetheless, they point to the lack of remedial, planning and precautionary measures taken by successive Japanese governments since the 2011 tsunami tragedy and Fukushima nuclear plant failure. They also raise further critical questions about the potential impact of another huge earthquake and the lack of official preparations for such a catastrophe.
The two quakes, and numerous subsequent tremors, came just seven months after two major earthquakes and hundreds of aftershocks killed 42 people, injured about 1,000 and left a trail of destruction through the southern island of Kyushu in April.
All these events highlight the prevalence of earthquakes in the highly-populated country, which sits at the convergence of four tectonic plates.
Tuesday’s powerful earthquake generated a tidal wave of up to 1.4 metres at Sendai, about 70 kilometres north of Fukushima, with smaller waves hitting ports elsewhere along the coast, public broadcaster NHK said. Luckily, the tsunami was not larger. Official tsunami warnings were issued but some came too late or failed to reach people.
The first tsunami wave reached the coast of Iwaki, Fukushima Prefecture, at 6:29 a.m., 30 minutes after the earthquake. The Japan Meteorological Agency issued a tsunami warning for Fukushima Prefecture at 6:02 a.m. but not for Miyagi Prefecture until 8:09 a.m.
Some panic and confusion was observed during the evacuations. In Iwaki, severe traffic congestion occurred on roads, including the Kashima Kaido prefectural highway that connects the coastal district of Onahama with inland areas.
Wednesday’s Yomiuri Shimbun editorial questioned whether the authorities had learned the lessons from the 2011 disaster. “[S]ome municipalities issued such notices only after the tsunami reached their areas,” it reported. According to the newspaper’s tally, evacuation directives, advisories and preparation notices were issued for a total of more than 550,000 people in Aomori, Iwate, Miyagi, Fukushima, Ibaraki and Chiba prefectures. However, only about 12,000 people, or 2.2 percent of the total, actually evacuated to shelters.
The quake also temporarily caused a cooling system in the Fukushima Daini nuclear power plant to stop, leaving more than 2,500 spent uranium fuel rods at risk of overheating. The Tokyo Electric Power Company (TEPCO), the utility that operates the Fukushima plants, reported that it restored the cooling pump in about an hour and a half.
Doubts remain, however, about the reliability of TEPCO’s claims, given its long record of cover-ups of nuclear incidents. Two days, later, on Thursday, the company admitted that workers found large puddles of water in reactor buildings at the plant immediately after the quake. TEPCO said the puddles may have formed from water that spilled out of spent-fuel pools during the quake.
All four reactors at the Daini plant have been offline since the 2011 disaster. While the complex was engulfed by tsunami waves in 2011, it escaped a breakdown, unlike its sister Fukushima Daiichi plant. Three out of six nuclear reactors at Daiichi went into meltdown. TEPCO only admitted in February this year that it had known that a meltdown had occurred but waited two months before making the information public.
Despite TEPCO’s record, the previous Democratic Party of Japan government of Naoto Kan left the company in charge of the emergency and remediation operation, a situation continued by Prime Minister Shinzo Abe’s current administration.
Following Tuesday’s quake, nuclear experts reiterated concerns about the safety of the clean-up program at the Daiichi plant. The melted cores of three reactors have yet to be removed because they are still too radioactive for workers to approach. Since 2011, groundwater has seeped into the reactors daily. The water, contaminated by the melted fuel rods, is being treated and stored on site. So far, TEPCO has built more than 880 tanks of about 1,000 tons each.
To try to halt the flow of groundwater into the damaged buildings, the company has built an underground wall of frozen dirt more than a kilometre in length encircling the reactors. The wall is not yet fully frozen, though, and groundwater continues to ooze into the reactors. Scientists have also expressed doubts that the storage tanks or the sea walls being built around the plants could withstand a more damaging earthquake or tsunami.
All but two of the country’s 54 plants have remained closed since 2011, but the Abe government is pushing for most plants to be reopened, defying widespread public opposition. Currently, the owners of 24 other reactors are seeking restart approvals.
In Fukushima, an estimated 174,000 residents are still displaced, many living in cramped prefabricated temporary housing. The Abe government is gradually declaring sections of the 20-kilometre nuclear exclusion zone safe and habitable. But many people have refused to return to Fukushima’s atomic “ghost towns.” For example, four months after Naraha Town was declared safe in September last year, only 6 percent of former inhabitants had moved back.
The latest quakes are another warning of a possible future calamity. In 2013, Abe’s government released a study showing that an earthquake of between 8 and 9 magnitude was highly likely to occur within the next 30 years in the tectonic plate boundary called the Nankai Trough, which runs just south of Tokyo, home to nearly 14 million people.
The report warned that such a quake and an accompanying 30-metre tsunami could kill 323,000 people, destroy over two million houses and cause economic losses amounting to double the annual national budget. Abe simply called on the Japanese people to be “calmly and appropriately afraid.”
As the World Socialist Web Site explained in “Nuclear power, private ownership and the profit system” published in March 2011, the construction of nuclear plants in one of the world’s most seismically active regions on the planet demonstrates two things. One is the subordination of the safety of humanity and health of the environment to the drive for profit and enrichment of executives and big shareholders.
The other is the destructive consequences of capitalism’s division of the world into rival nation-states. Since its defeat in World War II, the Japanese ruling class has suppressed basic considerations of public safety in order to develop “energy self-sufficiency” through nuclear power. This industry also provides the essential capacity to quickly develop nuclear weapons, a possibility openly canvassed by US president-elect Donald Trump during the presidential election campaign.
The author also recommends:
|
<urn:uuid:dc4fd5db-0b45-4ef8-8674-4f321f90912e>
|
CC-MAIN-2017-43
|
http://www.wsws.org/en/articles/2016/11/26/japa-n26.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187825308.77/warc/CC-MAIN-20171022150946-20171022170946-00537.warc.gz
|
en
| 0.962827 | 1,470 | 2.953125 | 3 |
Diamonds are found in kimberlite, a volcanic rock. Kimberlite is found in clusters of between three and 100 pipes. These pipes are generally carrot-shaped, with the bulk of the diamond-bearing ore near the surface. The closer the ore is to the surface, the easier the pipe is to mine, and the larger the diamonds tend to be. However, diamond rich kimberlite pipes are difficult to find. The majority don’t contain any diamonds at all. Of those that do, only a small percentage are of production quality.
Testing for Diamond Presence
Once kimberlite has been found, tests are undertaken to see if there is a diamond presence. These tests first involve using water pressure to force kimberlite samples through a series of screens to separate the grains of sand and gravel by size. The midsized samples, which are most likely to contain diamonds, are then placed on shaker tables that use water and vibration to separate them by weight or gravity. Next, the heavier samples are put through an electro-magnetic device. This device divides the samples with a high magnetic signature from the samples that are less magnetic. A second electro-magnetic device is used on the high magnetic samples to remove the ones with the very highest magnetic characteristics. The remaining samples then make two passes through a magstream device, after which only samples with very similar compositions remain. Technicians then examine the remaining samples under microscope for a diamond presence.
Once diamond elements are found, more terrain sampling is done in tighter patterns. Further samples are taken to define a mineral trail back to the original kimberlite pipe.
Once the pipe is located, two-inch core holes are drilled to depths of hundreds of metres in order to define the shape and overall size of the pipe. The solid core is recovered and processed to determine the number of carats of diamonds per tonne of kimberlite.
The kimberlite is first softly crushed to prevent damaging the diamonds. Then the material is inspected and subjected to caustic dissolution. Caustic dissolution employs a highly-concentrated salt solution and heat to separate the diamonds from the kimberlite. Everything other than diamonds and some indicator minerals simply melts away. The diamonds are then cut, polished and ready to sell.
|
<urn:uuid:7ad42cbd-fd73-4a68-8044-67fb739c5b56>
|
CC-MAIN-2017-43
|
http://www.mountainprovince.com/industry/how-diamonds-are-produced-used
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823462.26/warc/CC-MAIN-20171019194011-20171019214011-00522.warc.gz
|
en
| 0.934175 | 471 | 3.515625 | 4 |
1) THE GEMATRIYA OF "HA'SATAN" IS 364
QUESTION: The Gemara says that the Satan has power to accuse on 364 out of 365 days of the year. He has no power to accuse on Yom Kippur. An allusion to this is the Gematriya of the word, "ha'Satan," which equals 364.
The Jewish calendar, however, follows the lunar year, which is 354 days long. Of what significance, then, is the allusion from the Gematriya of "ha'Satan," which refers to the solar year (of 365 days)?
(a) The NETZIV (in MEROMEI SADEH) answers that the allusion is merely a "Remez b'Alma"; it is not intended to have any significant implication. The fact that the Gematriya of "ha'Satan" is one less than the number of days in the solar year is significant enough to allude to the fact that the Satan has no reign on one day out of the year.
Perhaps there is additional significance to the Gematriya of "ha'Satan." The solar calendar and lunar calendar are synchronized by the 19-year cycle which Rav Ada organized in the third century (see Insights to Eruvin 56:1
). The 19-year cycle causes the lunar year to average out to the length of the solar year due to the addition of an extra month in 7 out of 19 lunar years. Accordingly, the Satan's average
number of days of power (in every year of the 19-year cycle) is 364! In fact, ascribing the allusion of 364 days to the average number of days per year in the 19-year cycle has a clear advantage over ascribing it to a single lunar year: the lunar years vary in length (depending on whether they are Malei, Chaser, or k'Sidran, and whether they are leap years), and therefore it is preferable to mention the number of days during which the Satan has power in the unchanging solar year.
(c) Moreover, there is a link between the reign of the Satan and the solar year. The Midrash (Bereishis Rabah 6:3) says that Esav follows the solar year, while Yakov follows the lunar year.
Every nation has a spiritual counterpart, a Mal'ach that represents that nation in Shamayim. This Mal'ach signifies the essential character of the nation. The Mal'ach of Esav is "Sama'el" (Rashi, Sukah 29a and Sotah 10b, based on Midrash Tanchuma, Parshas Vayishlach 8). The Midrash (end of Devarim Rabah) describes "Sama'el" as the Satan. Esav, like "ha'Satan," represents the forces that pull a person away from spirituality.
Accordingly, it is especially appropriate that the year of the Satan is comprised of 365 days like the solar year, the year of Esav.
2) WHO PERFORMS THE "TERUMAS HA'DESHEN" ON YOM KIPPUR
OPINIONS: The Mishnah lists three different times at which the Terumas ha'Deshen is performed. The first is the time at which the Terumas ha'Deshen is performed on an ordinary day. It is performed either right before or right after the "Keri'as ha'Gever" (approximately the time of dawn, Amud ha'Shachar; see Yoma 20b, and RAMBAM, Hilchos Temidin u'Musafin 2:11). The second is the time at which the Terumas ha'Deshen is performed on Yom Kippur night, when it is performed as early as Chatzos (midnight). The third is the time at which the Terumas ha'Deshen is performed during the festivals, when it is performed from the time that one quarter of the night has passed.
The Gemara later (20b) explains the two changes from the regular schedule. The Terumas ha'Deshen is performed from Chatzos on Yom Kippur night "because of the weakness of the Kohen Gadol" who performs all of the Avodos on Yom Kippur. The Terumas ha'Deshen is performed after the first quarter of the night has passed during the festival "because of the large number of Jews and large number of Korbanos" offered during the festival, which increase the amount of work necessary to clear the top of the Mizbe'ach from all of the ashes. The Terumas ha'Deshen must begin much earlier in order to clear off the Mizbe'ach in time for the next day's Korbanos.
The Gemara says that the reason the Terumas ha'Deshen is performed earlier on Yom Kippur is to help the Kohen Gadol preserve his strength for the Avodos of the day. The Gemara clearly implies that it is the Kohen Gadol who performs the Terumas ha'Deshen, just as he performs all of the other Avodos of Yom Kippur. However, the Mishnah later (22a) discusses the Payis (drawing of lots) performed to choose a Kohen to perform the Terumas ha'Deshen. The Mishnah implies that the Terumas ha'Deshen may be performed by any Kohen and not only by the Kohen Gadol.
Who performs the Terumas ha'Deshen on Yom Kippur?
in Zevachim (86b, DH Mishum) explains that the Kohen Gadol must perform the Terumas ha'Deshen on Yom Kippur, as the Gemara here implies. Since the Kohen Gadol must perform all of the Avodos of Yom Kippur, he may perform the Terumas ha'Deshen earlier than usual so that he may rest after the Terumas ha'Deshen before he begins the Avodos of the day. (With regard to why the Mishnah discusses the Payis done for the Terumas ha'Deshen, see Insights to Yoma 22:1
This is also the understanding of the BA'AL HA'ME'OR.
(b) TOSFOS (20b, DH Mishum, in the name of the RIVA) and the RAMBAM (Hilchos Avodas Yom ha'Kipurim 4:1) understand that although all of the Avodos of the day must be performed only by the Kohen Gadol, Avodos of the night may be performed by any Kohen. Therefore, a Payis was necessary to choose a Kohen for the Terumas ha'Deshen, an Avodah performed before daybreak.
Why, then, does the Gemara explain that the Terumas ha'Deshen of Yom Kippur is performed early because of the weakness of the "Kohen Gadol"? The Riva asserts that the text of the Gemara is in error and should read, "because of the weakness of the Kohen," instead of, "because of the weakness of the Kohen Gadol." The Kohen should perform the Terumas ha'Deshen as early as possible because of the difficulty of the fast.
The Rishonim (TOSFOS RID to 29a and others) cite proof for this explanation from the Gemara later (29a) which states that "when the watchman announced the break of dawn, the Kohen Gadol would be taken to perform his Tevilah." This implies that before dawn of Yom Kippur the Kohen Gadol was not required to serve in the Beis ha'Mikdash.
The TOSFOS YESHANIM, who maintains that the Kohen Gadol must perform the Terumas ha'Deshen, refutes this proof. When the Mishnah (28a) and Gemara (29a) discuss the acts of Tevilah of the Kohen Gadol, they refer only to those which are done during the day, and not to those which are done at night. (See the RAMBAN (in Milchamos) who rejects this argument and upholds the proof from the Gemara later.)
(c) TOSFOS (beginning of 21a) says in the name of the RI that an ordinary Kohen may perform the Terumas ha'Deshen. When the Gemara here says that the Terumas ha'Deshen of Yom Kippur is performed earlier because of the weakness of the Kohen Gadol, it means that the ordinary Kohanim perform the work of the Terumas ha'Deshen earlier in order to ensure that the Kohen Gadol will be able to start his Avodah early in the morning, before he becomes weak.
This is also the opinion of the RAMBAN (in Milchamos), who also quotes this opinion in the name of the RAMBAM. (See also Insights to Zevachim 86:2.) (Y. MONTROSE, Y. SHAW)
3) AGADAH: SOLAR SAWDUST
QUESTION: Rebbi Levi asked why a person's voice is not heard during the day as well as it is heard during the night. He answered that it is "because of the sound produced by the sun's disc as it saws through the firmament as a sawyer cuts through cedars."
The Gemara continues and says that "the dust which can be discerned hanging in the air where the sun shines is the sawdust produced by the sun's progress. It is referred to in Hebrew as 'Lo' -- 'nothingness.' This is what Nevuchadnetzar referred to when he said, 'All of the inhabitants of the earth are as Lo [to Hash-m]'" (Daniel 4:32).
What is this "sun dust," and what is the meaning of the Gemara's statement that the sun "saws through the firmament"?
ANSWER: The Gemara in Sotah (10a) teaches that the Hebrew word for "sun," "Shemesh," is used as an appellation for Hash-m, as it says, "Hash-m is a Shemesh and a shield" (Tehilim 84:12). Why is the word for "sun" also used to denote its Creator?
David ha'Melech writes, "The heavens proclaim the glory of Hash-m.... The sun appears like a groom as he exits his bridal canopy; it rejoices like an athlete as he runs his course. It emerges from one edge of the sky and it goes around to the other; no one can escape its heat" (Tehilim 19:2-7).
In what way do "the heavens proclaim the glory of Hash-m"? Hash-m's power is demonstrated through the sun's great might. The sun's colossal nuclear furnace is the source of all life on earth. The sun, man's only directly observable star, is the greatest public demonstration of the awesome might and glory of Hash-m.
This may explain why the word "Shemesh," which is used to describe Hash-m, is used to refer to the sun, His great emissary in this world. An emissary is entitled to use the name of his dispatcher. The sun is the great witness to Hash-m's power in this world.
RABEINU BACHYE (introduction to Parshas Yisro; see also Kli Yakar to Bereishis 32:27) uses this idea to explain the Gemara in Bava Basra (16b). The Gemara there relates in the name of Rebbi Shimon ben Yochai that a precious stone hung from the neck of Avraham Avinu. Any sick person who came and gazed at the stone would be healed. When Avraham Avinu died, Hash-m hung the stone on the sphere of the sun.
Rabeinu Bachye notes that the Gemara compares Avraham's ability to "enlighten people's eyes" in a spiritual sense to a resplendent gemstone. The Gemara says that the gem hung from his neck, because speech emanates from one's throat which is in the neck, and it was through his words that Avraham enlightened the spiritually ill. When Avraham Avinu died, no one was left in the world who had the ability to demonstrate Hash-m's unity and greatness to others to the same degree that he was able to do. This ability now rested only with the sun, as the verse says, "The heavens proclaim the glory of Hash-m."
This is the deeper meaning of the Gemara here as well. The nighttime, when the sun's light is absent, represents the period during which Hash-m's hand cannot be clearly seen in the world. It is under the cover of night that a person is particularly susceptible to the persuasions of the forces of evil. The darkness of night allows a person to forget his Creator.
When Rebbi Levi asked why a person's voice is not heard during the day as well as it is heard during the night, he meant, "Why is a person dominated by his physical, worldly impulses at night more than by day?" He answered that by day, the sun is heard cutting through the heavens as a man saws through cedars. The daytime is dominated by the "voice" of the sun, the great harbinger of Hash-m's mighty presence. This "voice" bolsters a person's faith and makes him less susceptible to the persuasions of the Yetzer ha'Ra.
The manner in which the sun cuts through the firmament is compared to "a sawyer who cuts through cedars." The tall, erect cedar tree is used by the Torah as a symbol of haughtiness (Rashi, Vayikra 14:4). As the sun cuts its way through the heavens, Hash-m cuts down the haughty. The sun's message of the omnipotence of its Creator humbles the arrogant when it openly demonstrates Hash-m's power.
"The dust which can be discerned hanging in the air where the sun shines is the sawdust that is produced by the sun's progress." The dust that reflects the light of the sun's rays reminds man of the sun's lesson in humility. Wherever the sun shines, man is reminded that "you are dust, and to dust you will return" (Bereishis 3:19). The sun makes man aware of the overwhelming power of Hash-m compared to his own feebleness. This is precisely the context in which "Lo" is quoted in Daniel: "All of the inhabitants of the world are like nothingness [to Hash-m]."
This is the lesson of the sun's "sawing," of which man is reminded every time he sees a speck of dust suspended in a beam of sunlight. The Gemara's message here is far more than an adage in ancient astronomy. It is a profound philosophical lesson of faith in Hash-m. (M. KORNFELD. See BE'ER HA'GOLAH, ch. 6, for the Maharal's approach to this Agadah.)
|
<urn:uuid:d2e84ae2-36de-485e-aa64-2f91ce03f199>
|
CC-MAIN-2020-34
|
https://www.dafyomi.co.il/yoma/insites/yo-dt-020.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439735958.84/warc/CC-MAIN-20200805124104-20200805154104-00586.warc.gz
|
en
| 0.953807 | 3,244 | 2.796875 | 3 |
Fat Cats, Dogs Developing Diabetes, Report Finds
FRIDAY, May 13 -- Like all good pet owners, Christine Wong didn't hesitate to go to a veterinary clinic near her home in Austin, Texas, when her cat, Kiki, wasn't feeling well.
"She just wasn't acting like herself," recalled Wong.
After running a blood and urine test, the doctor discovered the Persian-mix feline has diabetes.
Diabetes is on the rise as America's cats and dogs grow fatter, according to a new report by Banfield Pet Hospital, a national chain of pet hospitals headquartered in Portland, Ore. Since 2006, diabetes jumped 32 percent in dogs and 16 percent in cats, says the report, which analyzed trends in common and preventable illnesses from the past five years.
Just as in people, diabetes is often linked to obesity and may require lifelong monitoring and treatment.
"The most important thing we can do for a cat with diabetes is getting it on a weight loss program," said Dr. Denise Elliott, a veterinarian with Banfield.
"We know that if we can get the weight off in conjunction with insulin injections, in many cases we can resolve the cat's diabetes," she added.
Fat cats are six times more likely to develop diabetes than their thinner feline cousins, Elliott said.
For the report, researchers crunched data from the records of 2.5 million dogs and cats cared for last year in its 770 hospitals nationwide.
Symptoms of diabetes in both dogs and cats may include excessive urination, increased thirst and weight loss, despite a hearty appetite. If not detected and treated early, dogs in advanced stages of the disease might develop cataracts and cats may experience hind-limb weakness, Elliott said.
There are two types of diabetes mellitus. Dogs often get type 1 (insulin-dependent), which is similar to the form seen in children, in which the pancreas produces little or no insulin, a hormone that helps cells turn sugar into energy. Breeds prone to the condition are bichon frise, cairn terrier, dachshund, keeshond, miniature poodle and puli.
Cats are commonly affected by type 2 diabetes, or non-insulin dependent, in which the pancreas produces insulin but the body does not respond normally to it. At-risk breeds include Maine coon, Russian blue and Siamese.
For dogs with diabetes, it's usually a lifelong battle. Along with a special diet, they typically need insulin injections twice a day, veterinarians say. Once clinical signs resolve, blood glucose concentrations are monitored every three to four months to determine if changes to the treatment plan are necessary.
But the outlook for dogs is good. "Typically dogs that are treated properly for diabetes go on to live a long, full life," said Dr. Charles Wiedmeyer, assistant professor of veterinary clinical pathology at the University of Missouri in Columbia.
Wiedmeyer and colleague Dr. Amy DeClue, assistant professor of veterinary internal medicine, recently adapted a device used to monitor glucose in humans to help dogs with diabetes that don't respond well to conventional treatment. Continuous glucose monitors (CGM) are flexible devices inserted an inch or so into the skin to provide detailed information on sugar levels.
Using a CGM, a dog's blood sugar levels can be monitored at home in everyday situations rather than in a cage at the animal hospital, they say. Normally, veterinarians create an insulin regimen by taking blood from the animal in the clinic every two hours over the course of a single day. But test results are often inaccurate, he said, because of stress felt by pets from being in an unfamiliar environment.
Adapting to the needs of a diabetic pet isn't easy. When Kiki, Wong's cat, was diagnosed three years ago with diabetes, the toughest part was getting used to giving the insulin shots, Wong said.
Now it's a breeze, she noted. Kiki receives insulin injections every 12 hours -- before Wong leaves for work and when she returns home -- plus occasional check-ups and a modified diet.
It costs Wong about $65 a month to manage her pet's disease. But she doesn't mind the added cost or extra time spent in caring for Kiki.
"In the end, she and I are definitely closer for all of it," said Wong. "She lives well and seems healthy and happy these days, far from the end. And this makes it all worth it."
You can find out more about managing diabetes in your pet at the Washington State University College of Veterinary Medicine.
Posted: May 2011
|
<urn:uuid:3c647d10-6552-44ed-8312-0493502045b6>
|
CC-MAIN-2017-26
|
https://www.drugs.com/news/fat-cats-dogs-developing-diabetes-report-finds-31368.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320003.94/warc/CC-MAIN-20170623045423-20170623065423-00486.warc.gz
|
en
| 0.949464 | 955 | 2.640625 | 3 |
Districts Place High Priority on 1-to-1 Computing
Putting a computing device in the hands of every student requires a willingness to take risks and an understanding of what has worked in the past
Peter Sanchioni likes to joke that he has five years to prove the 1-to-1 laptop program his district recently put in place is a resounding success. Either that, or he's out of a job.
Sanchioni is the superintendent of the Natick public school system, a solidly middle-class district of about 5,000 students in Massachusetts. He first started looking into 1-to-1 programs, in which each student is paired with a school-issued laptop or tablet computer, a few years back.
At the time, the district was home to an antiquated high school that was barely equipped to provide Internet access to its teachers, let alone to stream content simultaneously on thousands of devices. But when the construction of Natick's new high school came in significantly under budget, the school board voted to spend the extra money on 1,500 MacBook laptops—first for the 8th grade class, then for the entire high school during the program's second year of implementation, at a total...
This article is available to subscribers only.
To keep reading this article and more, subscribe now or start a 2-week FREE trial.
Access selected articles, e-newsletters and more!
- Roaring Fork School District, Carbondale, CO
- The Berkeley Institute, HAMILTON, Bermuda
- Charter School Director (Head of School)
- International Preparatory Academy, Detroit, MI
- Amargosa Valley Elementary School, Amargosa Valley, NV
- Chattahoochee Hills Charter School, Multiple Locations
|
<urn:uuid:0c77b845-b96a-443a-8166-6c78eae07ba4>
|
CC-MAIN-2013-20
|
http://www.edweek.org/ew/articles/2013/03/14/25one-to-one.h32.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368698222543/warc/CC-MAIN-20130516095702-00030-ip-10-60-113-184.ec2.internal.warc.gz
|
en
| 0.949436 | 360 | 2.640625 | 3 |
Since the opening of our Elaine Evans Archaeology Gallery last month, some people have queried why the facial reconstruction of ‘Whitehawk Woman’ has dark skin. Below is an explanation of some of the research and advice that supported the creation of this reconstruction.
Brighton’s ancestors are central to the interpretation of the Royal Pavilion & Museum’s new archaeology gallery which opened to the public on 26 January 2019. The remains of five individuals are displayed alongside facial reconstructions created by a forensic artist.
During the research phase in the run up to the opening of the gallery, the human remains were studied by a number of scientists across several scientific disciplines.
All of our individuals were included in a project based at the Natural History Museum in London, which aimed to establish and interpret information about our European ancestors from ancient DNA. The same team of scientists released results of research to the public in 2018 about ‘Cheddar Man’, a ten thousand year old modern human from the Mesolithic Period, whose ancient DNA demonstrated that he was dark skinned.
While DNA could not be retrieved from Whitehawk Woman, the ‘Cheddar Man’ team advised that she would probably have had dark skin of a southern Mediterranean/Near Eastern/North African colour, brown hair and brown eyes. This is based on the genetic analysis of ancient individuals dating to the Neolithic from around Europe as well as from Britain specifically. This information was passed on to our forensic artist who included it within the facial reconstruction on display in the new gallery.
The same analysis produced predictions of lighter skin for other individuals included in the gallery and these predictions were also included in their facial reconstructions.
In each instance where ancient DNA was not recoverable from our individuals, we followed the same scientific advice on likelihood of their physical characteristics.
|
<urn:uuid:d2bd0ab9-ba68-4768-ae78-71b1d8d204be>
|
CC-MAIN-2020-24
|
https://brightonmuseums.org.uk/discover/2019/02/25/why-does-whitehawk-woman-has-dark-skin/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347404857.23/warc/CC-MAIN-20200529121120-20200529151120-00500.warc.gz
|
en
| 0.967802 | 369 | 3.046875 | 3 |
Posted January 26, 2017 – AWE Learning Staff
Third grade is considered a critical turning point for early childhood learning. According to Susan Neuman, Professor in Educational Studies specializing in early literacy at the University of Michigan, “[Third grade] is the transition between learning to read and reading to learn. If these children don’t have the (reading) skills, they are really going to fall behind not only in reading but in all the other subject areas.” After young learners gain early literacy and language development skills, their learning ability increases for all STREAM subjects.
Research shows that children who read on grade level by the conclusion of third grade have a better chance to graduate from high school and to achieve success later in life. An Education Week article indicates that children who do not read proficiently by the end of third grade are four times more likely to leave school without a diploma. Additionally, young learners from low-income backgrounds who leave school early are 13 times less likely to graduate on time.
There are several factors that contribute to whether an early learner is able to read proficiently by the end of third grade, according to The Annie E. Casey Foundation:
- School readiness: health, language development, social-emotional skills and participation in high quality early learning programs
- Chronic absence from school
- Summer slide, or the tendency for students to lose some of the achievement gains made during the school year
- Family-related stresses (i.e. hunger, housing insecurity, etc.)
- Quality of teaching from home, school, and the community
The first eight years of an early learner’s experience (birth through third grade) lay the foundation of cognitive, social, and emotional skills on which the entirety of their future learning rests. In 2010, The Annie E. Casey Foundation helped launch The Campaign for Grade-Level Reading, a partnership between foundations, nonprofits, states, and communities to ensure that all students read on grade level by the conclusion of third grade. The program’s goal is for at least a dozen states to double the number of low-income early learners who read proficiently by the end of third grade by 2020.
Parents and guardians play a large role in setting their early learner up for success in school, leading them to advance academically and experience success in their career. Libraries are critical to this process as well, as an effective community learning hub. By offering a variety of technological resources, books, and programming, libraries can aid in school readiness and extend after-school learning. These resources will help early learners become proficient readers by the end of third grade and set them up for academic and future success.
|
<urn:uuid:7b547a9b-9b0d-46c2-b220-cfc03c7cce77>
|
CC-MAIN-2020-29
|
https://awelearning.com/blog/third-grade-reading/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655896169.35/warc/CC-MAIN-20200708000016-20200708030016-00357.warc.gz
|
en
| 0.966716 | 545 | 3.734375 | 4 |
September 10, 2000 Greenbelt, Maryland - The ozone hole over the Antarctic is the biggest it's ever been and it's only the beginning of September. Usually Antarctic ozone depletion starts in July during the South Pole's winter. That's when extremely cold air intensifies ozone destruction, reaching a peak by the end of September and into October. But this year, NASA's Goddard Space Flight Center in Greenbelt, Maryland reports that already the ozone hole is larger than all of the Antarctic and extends over the southern tip of South America. That's 11 million square miles and breaks all previous records. A spokesman at the United Nations World Meteorological Observation agency in Geneva, Switzerland told reporters: "It is remarkable to find these low values so early in September, perhaps one or two weeks earlier than in any previous year."
Click here to subscribe and get instant access to read this report.
Click here to check your existing subscription status.
Existing members, login below:
© 1998 - 2020 by Linda Moulton Howe.
All Rights Reserved.
|
<urn:uuid:a0aab3d4-2a0f-498e-920a-85e3b151b696>
|
CC-MAIN-2020-10
|
https://www.earthfiles.com/2000/09/10/largest-ever-antarctic-ozone-hole/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145443.63/warc/CC-MAIN-20200221045555-20200221075555-00152.warc.gz
|
en
| 0.934189 | 212 | 3.390625 | 3 |
- The ongoing U.S. opioid epidemic may have led to an increase in the number of strokes due to more bacterial infections of the heart, or infective endocarditis.
- Stroke occurred among 26% of patients with infective endocarditis from IV drug use, compared to 14% of patients with infective endocarditis from other causes.
Embargoed until 4 a.m. CT/5 a.m. ET Thursday, March 11, 2021
DALLAS, March 11, 2021 — The ongoing U.S. opioid epidemic may have led to an increase in the number of strokes due to more bacterial infections of the heart, or infective endocarditis, according to preliminary research to be presented at the American Stroke Association’s International Stroke Conference 2021. The virtual meeting is March 17-19, 2021 and is a world premier meeting for researchers and clinicians dedicated to the science of stroke and brain health.
According to the most recent comprehensive data (January 2020) from the Centers for Disease Control and Prevention (CDC), stroke is the fifth leading cause of death in the United States and a major contributor to long-term disability. Typically each year in the United States, up to 47,000 people are treated in the hospital for endocarditis, which increases stroke risk. This serious, sometimes deadly infection occurs when bacteria in the bloodstream reach the heart lining, valves or blood vessels. While endocarditis is uncommon, people with certain heart conditions are at greater risk.
Another risk factor for endocarditis is intravenous (IV) drug use. During IV drug use, bacteria from the injection needle enter the blood stream. In light of the ongoing, two decades-long national opioid epidemic, researchers wanted to understand the risk of stroke among patients with endocarditis from IV drug use compared to patients with endocarditis due to other causes. They also measured the frequency of endocarditis related to IV drug use.
This study included 351 patients treated for endocarditis at Ohio State University’s Wexner Medical Center between January 1, 2014 and July 1, 2018. Nearly half of the patients had a history of IV drug use.
The researchers found:
- Over the four-year study, the occurrence of endocarditis from IV drug use increased by 630%.
- Patients with endocarditis due to IV drug use were much more likely (26%) than those with endocarditis from other causes (14%) to have a stroke.
- Patients with endocarditis from IV drug use were more likely than other patients to be homeless, unemployed and uninsured.
“Patients who are known IV drug users who have endocarditis should be more carefully screened for symptoms of cardiovascular disease,” said the study’s corresponding author Shahid M. Nimjee, M.D., Ph.D., associate professor of neurosurgery and surgical director of the Comprehensive Stroke Center at Ohio State University Wexner Medical Center in Columbus, Ohio.
“The wider societal impact of the opioid epidemic is not well understood,” Nimjee said. “Our research suggests that the impact of the opioid epidemic is far-reaching and contributes to increased costs in the criminal justice, health care systems and the workplace. The increased costs can be particularly substantial for stroke care.”
Medical costs were more than two times higher among patients with endocarditis from IV drug use than among those with endocarditis from other causes. This translated into a difference of more than $100,000 in health care costs during admission per patient, Nimjee noted.
The study did not control for other factors that could have affected stroke risk, and it included patients from only one hospital, therefore, the findings may not apply to other groups of patients.
Co-authors are Nguyen Hoang, M.D.; Varun Shah, B.S.; Bipul Gnywali, B.S.; Jessica Granger, B.A.; Victoria Schuneman, M.D.; David Dornbos III, M.D.; H. Francis Farhadi, M.D., Ph.D.; Patrick P. Youssef, M.D.; and Ciaran J. Powers, M.D., Ph.D. The study authors report no funding or disclosures.
- Multimedia is available on the right column of release link https://newsroom.heart.org/news/more-heart-infections-and-strokes-in-the-u-s-linked-to-national-opioid-epidemic?preview=037cb78b2fe2ff2bdc9daf23f83a50b1
- AHA resources on infective endocarditis
- Alarming number of heart infections tied to opioid epidemic
- Opioid epidemic fueling a rise in infection-related stroke
- Opioid use may increase risk of dangerous heart rhythm disorder
- AHA Opioid Education for Healthcare Providers
- For more news at ASA International Stroke Conference 2021, follow us on Twitter @HeartNews #ISC21.
Statements and conclusions of studies that are presented at the American Heart Association’s scientific meetings are solely those of the study authors and do not necessarily reflect the Association’s policy or position. The Association makes no representation or guarantee as to their accuracy or reliability. The Association receives funding primarily from individuals; foundations and corporations (including pharmaceutical, device manufacturers and other companies) also make donations and fund specific Association programs and events. The Association has strict policies to prevent these relationships from influencing the science content. Revenues from pharmaceutical and biotech companies, device manufacturers and health insurance providers are available here, and the Association’s overall financial information is available here.
The American Stroke Association’s International Stroke Conference (ISC) is the world’s premier meeting dedicated to the science and treatment of cerebrovascular disease. ISC 2021 will be held virtually, March 17-19, 2021. This 3-day conference will feature more than 1,200 compelling presentations in 21 categories that emphasize basic, clinical and translational sciences as they evolve toward a better understanding of stroke pathophysiology with the goal of developing more effective therapies. Engage in the International Stroke Conference on social media via #ISC21.
About the American Stroke Association
The American Stroke Association is devoted to saving people from stroke — the No. 2 cause of death in the world and a leading cause of serious disability. We team with millions of volunteers to fund innovative research, fight for stronger public health policies and provide lifesaving tools and information to prevent and treat stroke. The Dallas-based association officially launched in 1998 as a division of the American Heart Association. To learn more or to get involved, call 1-888-4STROKE or visit stroke.org. Follow us on Facebook, Twitter.
For Media Inquiries and ASA Expert Perspective:
AHA Communications & Media Relations in Dallas: 214-706-1173; email@example.com
Karen Astle: 214-706-1392; firstname.lastname@example.org
For Public Inquiries: 1-800-AHA-USA1 (242-8721)
heart.org and stroke.org
|
<urn:uuid:17f2d2ec-3000-49d5-85ec-e68da44c78e1>
|
CC-MAIN-2023-14
|
https://newsroom.heart.org/news/more-heart-infections-and-strokes-in-the-u-s-linked-to-national-opioid-epidemic
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949694.55/warc/CC-MAIN-20230401001704-20230401031704-00509.warc.gz
|
en
| 0.914637 | 1,519 | 2.859375 | 3 |
ain Word Family
Looking for ain word family and rhyming word activities? Here are ain word family activities to support students' vocabulary and language acquisition. This group of ain word family and rhyming words puzzles contains 4 sets of word search puzzles for learners.
l. Word search puzzles using the standard 9x9 grid
2. Word search puzzles that have the words scrambled to add another dimension to the puzzle
3. Word search puzzles that are missing the ain words
4. Word search puzzle with clues, or hints. Students need to solve for the hints, and then find the words hidden in the grid.
Each group of word search activities uses the same list of ain words, except that the lists have been randomized to help consolidate learning.
Suitable for home schoolers, primary grades (1-2), and English language learners in the classroom. Differentiate for instruction depending upon needs of students. For example: K students might be able to complete some of the word searches while grade 3 students might need practice with deciphering puzzle clues.
|
<urn:uuid:956bfb08-2abf-4065-965f-e8a49e9ac46e>
|
CC-MAIN-2023-23
|
https://learnwithpuzzles.com/index.php?function=DisplayCategory&showCategory=Y&links=3&id=239&link1=102&link2=236&link3=239
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652116.60/warc/CC-MAIN-20230605121635-20230605151635-00532.warc.gz
|
en
| 0.90986 | 212 | 3.484375 | 3 |
Basset Hound - The Facts Every Owner of this Breed Should Know
The Basset Hound originated in sixth century France and is thought to be descended from the St. Hubert Hounds. The Basset Hound (bas means 'low-set' in French) proved useful to hunters, with its slow movement and long ears to stir up scent, they could drive prey out from dense covering and into open fields. The Basset Hound has stamina to keep up with hunters and to track and prey for long periods of time.
Basset Hounds are still used for hunting in some areas of the world. The Basset Hound is described as gentle, sociable and stubborn.
Basset Hounds are loyal to their families and good with children and other animals. They prefer to be lap dogs and do not make good guard dogs, as they will greet any stranger who approaches them as a friend. Basset Hounds tend to be strong-willed and independent, making them difficult to train, but with enough consistency this can be overcome. When out for a walk with a Basset Hound, always keep it on a leash as the hunting tendencies may override any and all training.
Though Basset Hounds have a short stature, standing 12 to 15 inches tall, they are not considered small dogs, and will on average weight 50 to 65 pounds when mature. They have short coats that are tri-colored (black, white and tan) or red and white, and require relatively little maintenance. Regular brushing will keep the coat free of dirt and reduce shedding. Baths are necessary only a few times a year, as their coats tend to repel water. A Basset Hound's ears need regular cleaning since their long, floppy ears do not allow air to circulate, increasing the risk of infection and they do tend to slobber more than other dogs.
Basset Hounds need to be exercised frequently and often times have to be encouraged to do so as they are prone to taking naps in the sun. The Basset Hound is prone to some genetic disorders. Von Willebrand's disease is a platelet disorder that results in mild to moderate bleeding and a longer than average bleeding time. Through breeding, the incident of this condition has been reduced in the breed.
Basset Hounds are also prone to glaucoma, gastric torsion and interdigital cysts. Some Basset Hounds are allergic to certain grasses. Without proper exercise, Basset Hounds are prone to obesity, which can cause arthritis, back pains and heart trouble.
There is a website that has great information on Basset Hounds and most other breeds of dogs. It has details that pertain to a dog breeds health, grooming, living conditions, best food choices and more, the website is called: Dog And Cat Facts, and can be found at this url: http://www.dogandcatfacts.com
|
<urn:uuid:83000f12-f0d4-4d75-85b4-0fa7460d09f9>
|
CC-MAIN-2023-14
|
https://www.barkleyandpaws.com/dogs/breeds/basset-hound-the-facts-every-owner-of-this-breed-should-know
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943637.3/warc/CC-MAIN-20230321064400-20230321094400-00654.warc.gz
|
en
| 0.956066 | 599 | 2.96875 | 3 |
The Siam - Burma Railway
The first picture shows the River Kwae Yai bridge shortly after the 1944 bombing which destroyed the 4th and 5th spans (counting from the east). The second picture shows the bridge in February 2003 along with one of the unexploded bombs. The replacement angular spans can be seen in the background. As is usual in Asia the railways are used as public footpaths between the trains and in this case a large number of tourists also walk across the bridge. We crossed in a train a few minutes after this picture was taken. The far bank to the left of the bomb was the site of the prison camp.
Below is a view of the area of the prison camp as seen from the train. Many of the items found in this area have been transferred to one of the nearby war museums.
Above left: One of the rocky outcrops which were cut through by hand to lay the railway. Above right: this appears to be a replica of one of the original watch towers. Below: another war museum on the site of an old prison camp near Thakilen.
Below: The remaining views show two of the wooden trestle bridges at Tham Krasae, much of which is still original although the concrete piers have been added and/or strengthened since the war. Trains still have to cross these bridges at walking pace.
The Bridge over the River Kwai
The following site includes pictures of two of the steam locomotives used in construction and operation of the Burma - Siam Railway and now preserved near the bridge.
Burma - Siam steam locomotives
Back to Steam 2003 index page.
This page has been visited times.
|
<urn:uuid:0cedf337-1b73-4c4b-addc-6dc80bdb7dd8>
|
CC-MAIN-2017-34
|
http://searail.malayanrailways.com/Thailand/Burma.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886116921.70/warc/CC-MAIN-20170823000718-20170823020718-00549.warc.gz
|
en
| 0.974581 | 349 | 2.796875 | 3 |
Headaches are a fact of life, but an unpleasant one. However, there are numerous tricks to getting rid of them you may not have thought of.
Most people take medicine with water, but don’t drink more than is needed. Headaches are often caused by dehydration, so drinking water at the first sign of a headache can help to stop it before it gets worse.
Caffeine is an addictive drug, although it’s essentially harmless. If you haven’t had anything caffeinated in a while, your body might be craving the drug. It also makes painkillers work more quickly and effectively. However, caffeine can also constrict blood vessels, which can cause a headache if you aren’t careful.
3 Use a cold compress
Get a cold towel and lay it over your forehead. This can cause your blood vessels to constrict, which can help to ease the pain, particularly if the headache is caused by sinus issues or pain in the temples. If you get headaches often, keep a cool towel in a bag in the freezer. Have it ready to place on your head when you feel a headache coming on.
4 Massage or Chropractor your head, neck, and ears
There are nerve endings all throughout your head, neck, and ears which can trigger endorphins that make your body relax. Also, if your spine is misaligned or injured, it can be causing headaches. “When the spinal cord, the vertabrae, or any of the thirty-one pairs of nerves attached to the spine are subjected to trauma and become misaligned, the consequences can be far-reaching,” explains specialists at the Advanced Integrative Health Center. The relaxation will distract you from the pain, as well as making the blood vessels loosen up. Just place your fingers on the side of your head and move them in slow circles. Continue this for several minutes, or use a tennis ball to make light circles at the base of your skull. Headaches are often caused by stress and tight muscles, so relaxing them will help.
5 Drink herbal tea
Herbal tea, particularly willow tea, has long been a remedy for headaches. Willow contains the chemical that aspirin is made from. The heat from herbal tea will help relax your stomach and stave off some of the nausea headaches can cause. Because the tea also contains caffeine, it can have the same benefit as a cup of coffee for headache treatment.
6 Take a shower
Much like a cool compress can help, a cool shower can help to reduce stress, relax your muscles, increase circulation, and several other benefits. On top of it all, a headache can get rid of headaches. The increased blood flow can ease the constriction of the blood vessels and reduce the pain they cause.
While you should take headache medicine as soon as you feel one coming, there are other methods you can also employ, particularly if those headaches are becoming migraines.
|
<urn:uuid:f41412fc-8440-413d-9049-45f0f7f5fe32>
|
CC-MAIN-2017-39
|
https://www.drclouthier.com/stress/six-tricks-getting-rid-headaches/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818686043.16/warc/CC-MAIN-20170919221032-20170920001032-00425.warc.gz
|
en
| 0.950657 | 605 | 2.578125 | 3 |
In order to respond to a virus, a cell first has to recognize that it’s there. There are a lot of ways the cell tries to do this – some receptors (like the TLRs I study) look for features that are unique to pathogens that are outside the cell. Others look for molecules (like DNA and RNA) that are shared between us and pathogens, but are in the wrong place (DNA outside the nucleus is a pretty sure sign of infection).
NOD-like receptors (that’s the “NLR” from the title) are a bit different – they seem to recognize signs of infection, rather than the infection itself. Viruses can be like a bull in a china shop; TLR’s see bulls, NLR’s see the smashed plates. When NLRs see the damage, they respond by forming the inflammasome (which I’ve reviewed before), and kicking off an immune response.
Inflammation is usually (though not always) bad for bugs, so many pathogens have evolved ways to escape detection. Often, this involves hiding to avoid detection (like ERV’s sombreros), but other times they make proteins that throw gum in the works – screwing up vital processes.
Gregory et. al. found an example of the latter – a protein called Orf63 made by Kaposi’s sarcoma-associated herpesvirus (KSHV), which looks like an NLR. The similarity is more than just coincidence. In order for NLRs to form the inflammasome, a lot of them have to come together and associate with a bunch of other proteins. Orf63 pretends to be an NLR, so it gets pulled into the complex, but it can’t associate with all of the accessories.
Once the virus infects a cell, it makes a bunch of Orf63. By the time the NLRs start seeing all the evidence of KSHV screwing with the cell, it’s too late; Orf63 effectively blocks all inflammasome activity in the cell.
Like I said – devious little bastards.
Gregory SM, Davis BK, West JA, Taxman DJ, Matsuzawa S, Reed JC, Ting JP, & Damania B (2011). Discovery of a Viral NLR Homolog that Inhibits the Inflammasome. Science (New York, N.Y.), 331 (6015), 330-4 PMID: 21252346
|
<urn:uuid:586cdcae-e52c-40d3-81de-55fae332f173>
|
CC-MAIN-2013-20
|
http://scienceblogs.com/webeasties/2011/01/25/viruses-throwing-wrenches-in-t/
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368698693943/warc/CC-MAIN-20130516100453-00036-ip-10-60-113-184.ec2.internal.warc.gz
|
en
| 0.932072 | 530 | 2.65625 | 3 |
Sea transports are a fundamental part of international trade. Around 80% of global trade volumes are currently transported by sea. These transports comprise more than 80,000 ships within the EU . The three largest commercial ports in the Union are Rotterdam, Antwerp and Hamburg.
Popular trade routes
The Baltic Sea region and its 100 million consumers are an integral part of the global sea transport system. The Baltic Sea has long been a strategic transport route for oil exports to countries in other parts of Europe and beyond. The Baltic is also one of the world's busiest seas, with 15% of global shipping transports. About 800 million tonnes of goods, including 10 million containers, are transported on this inland sea each year. The great majority of freight transported by sea is destined for ports outside the region.
Including Russia, the Baltic trade takes in nine countries, with shipping-related trade accounting for most of the export value. In terms of transports within the region, the largest segments are dry and liquid bulk, which account for over half of the total volume. The second largest segments are RoRo and container traffic.
Over the past ten years seaborne freight volumes in the region have increased by about 10%. The increase is partly due to the growth in oil exports from Russia, but the ever increasing trade among the countries around the Baltic is another driver. These volumes are expected to continue increasing in the long-term.
Forecasts from the EU suggest that goods traffic in Europe, which also includes land and air transports, is expected to increase by 40% by 2030 and by 80% by 2050. Regardless of the mode of transport, the EU puts a priority on efforts to improve the efficiency of transports with the aim of raising the competitiveness of European companies.
Consolidation, new actors
Port operators are becoming increasingly international and broadening the base of their operations. It is becoming more common for companies to operate both shipping lines and port businesses and it is the container lines in particular that are behind this development. A gradual consolidation is simultaneously underway with port operators expanding geographically through acquisitions of ports, some of which are a long way from their traditional domestic markets. This gives rise to global operators, which run ports in countries in different continents. The traditional ownership structures are tending to loosen up in Scandinavia too. Private companies have started to acquire port operators or have bought into these businesses, where public actors have traditionally been the predominant owners. Interest in owning port businesses is also increasing within private equity.
Increasing rail traffic
Another emerging trend is towards an increase in rail freight, which is also leading to an increase in combi-traffic. In CMP’s case, for example, combi-traffic has multiplied in recent years. Combi-traffic entails transporting and reloading goods by ship, lorry and connecting railways. These types of transports are prioritized within the EU, partly because they have less environmental impact and contribute to optimum use of different kinds of transport.
Stricter environmental regulations, new transport routes
Environmental issues are becoming increasing important, and the primary focus is on ship emissions, especially of sulphur and nitrogen. From the start of 2015, the sulphur content in fuel must be reduced by 90%. The new rules apply to shipping in the Baltic and the North Sea and are expected to affect both shipping lanes and flows of goods. Increased fuel costs might mean that logistics companies select new routes for their freight.
To reduce emissions, new types of fuel are being evaluated within shipping, for example, Liquid Natural Gas (LNG). Developing infrastructure for storage and distribution of LNG is a priority issue in the EU. Several port operators in the Baltic region – including CMP – are currently planning to develop such an infrastructure. The reason for this is that an investment in LNG can strengthen competitiveness, particularly for those ports that already occupy a strategic location in connection to the major transport flows.
Expansion in local sea traffic and regional cooperation
The mix between large and small vessels is expected to increase. Cruise liners and container ships in global traffic are tending to become ever larger. This is placing new requirements on the port operators – on quay capacity and larger terminal areas, for example – which primarily represents a challenge for smaller actors. In parallel with the increasing size of ships in global traffic, new opportunities are emerging for local sea traffic, where smaller ships transport goods between Danish and Swedish ports, for instance, or between ports in the Baltic Sea region.
The need for regional cooperation between different ports is also expected to increase in order to meet changes in the market. Cooperation enables the operators to more easily meet increasing capacity demands, make new investments, derive cost benefits and manage their overall use of resources more effectively.
|
<urn:uuid:9e5634c6-df29-418f-9781-a603c244b8f2>
|
CC-MAIN-2017-34
|
http://annualreport2012.cmport.com/cmp_operations_2012/market-overview.aspx
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886124662.41/warc/CC-MAIN-20170823225412-20170824005412-00506.warc.gz
|
en
| 0.955916 | 961 | 2.703125 | 3 |
urged to set up screening service for bowel cancer in drive to raise early
detection figuresTEXT: OH nurses are ideally placed to prevent deaths from
bowel cancer, the annual symposium of the Association of Occupational Health
cancer passes undetected because its early symptoms are similar to those of
haemorrhoids, Lynn Faulds Wood, former television presenter and head of the
Beating Bowel Cancer charity, told delegates.
She asked the
audience to set up a screening service for the condition and to distribute the
charity’s leaflets to employees.
needs to be much earlier referral to specialists, she argued. "I think
that nurses are going to be the key to influencing GPs. You have a most
fantastic opportunity to do something about bowel cancer and save lives."
famous example was that of footballer Bobby Moore, whose condition went
undiagnosed for four years, when it was too late.
Wood has had cancer, but it was treated following a diagnosis one year after
symptoms had started.
In the UK
bowel cancer affects 32,000 people a year, with a survival rate of only 40 per
cent, compare with 60 per cent in the US.
charity advocates a "six week" approach. If early symptoms do not
respond to treatments for more minor causes within six weeks then there must be
referral to a specialist.
|
<urn:uuid:ff016a7a-5276-49f9-90ba-ea78ee42fa59>
|
CC-MAIN-2017-43
|
http://www.personneltoday.com/hr/call-for-cancer-screening/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824570.79/warc/CC-MAIN-20171021043111-20171021063111-00149.warc.gz
|
en
| 0.96329 | 295 | 2.609375 | 3 |
Layers of Learning Unit 3-17 is a complete unit study for history, geography, science, and the arts.
- History: Boston Tea Party
- Geography: Japan
- Science: More Reactions
- Arts: Folk Music
Layers of Learning Unit 3-17 starts with the French and Indian War, the taxation problem, the Boston Massacre, and the Boston Tea Party. Then learn about the country and culture of modern Japan. Next do more chemistry experiments that teach about reaction rates, reversible reactions, and catalysts. Finally learn about folk music, especially the folk music of the United States.
In each unit you’ll find a recommended library list, important background information about each topic, and lots of activities to choose from for kids of all ages. Sidebars include a bunch more ideas including Additional Layers, Fabulous Facts, On The Web, Writer’s Workshop, Famous Folks, and Teaching Tips. Printable maps and worksheets are included with each unit and may be printed as often as needed for your family or class.
Age Range: 6-18
Grade Level: 1-12
|
<urn:uuid:e9e3f59f-4bb3-4d9b-ba13-663882a65dac>
|
CC-MAIN-2020-16
|
https://layers-of-learning.com/shop/year-3/unit-3-17/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370507738.45/warc/CC-MAIN-20200402173940-20200402203940-00332.warc.gz
|
en
| 0.921445 | 233 | 3.703125 | 4 |
What is it about?
Life cycle assessment (LCA) consists of measuring the environmental impacts of a product's life cycle from raw material extraction to product disposal. In this work, we have analyzed how LCA has been applied in the chemical industry including which environmental impacts have been measured and which chemicals have been the focus of the majority of the studies.
Photo by Alex Kondratiev on Unsplash
Why is it important?
By analyzing how LCA has been applied in the chemical industry we have identified the most recent research on the subject. This can help researchers define their future research focus based on what already exists in the literature and practitioners who want to apply the LCA methodology and need to find similar work to support this application.
Read the Original
This page is a summary of: Life cycle assessment in chemical industry – a review, Current Opinion in Chemical Engineering, December 2019, Elsevier, DOI: 10.1016/j.coche.2019.09.009.
You can read the full text:
The following have contributed to this page
|
<urn:uuid:d047de9d-ba3a-42d7-aa55-8917de8e66f8>
|
CC-MAIN-2023-50
|
https://www.growkudos.com/publications/10.1016%252Fj.coche.2019.09.009/reader
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100229.44/warc/CC-MAIN-20231130161920-20231130191920-00789.warc.gz
|
en
| 0.951335 | 218 | 2.765625 | 3 |
Establish and maintain a cyber incident response team that can be deployed by the organization within [Assignment: organization-defined time period].
DiscussionA cyber incident response team (CIRT) is a team of experts that assesses, documents, and responds to cyber incidents so that organizational systems can recover quickly and implement the necessary controls to avoid future incidents. CIRT personnel include, for example, forensic analysts, malicious code analysts, systems security engineers, and real-time operations personnel. The incident handling capability includes performing rapid forensic preservation of evidence and analysis of and response to intrusions. The team members may or may not be full-time but need to be available to respond in the time period required. The size and specialties of the team are based on known and anticipated threats. The team is typically pre-equipped with the software and hardware (e.g., forensic tools) necessary for rapid identification, quarantine, mitigation, and recovery and is familiar with how to preserve evidence and maintain chain of custody for law enforcement or counterintelligence uses. For some organizations, the CIRT can be implemented as a cross-organizational entity or as part of the Security Operations Center (SOC). [SP 800-61] provides guidance on incident handling. [SP 800-86] and [SP 800-101] provide guidance on integrating forensic techniques into incident response. [SP 800-150] provides guidance on cyber threat information sharing. [SP 800-184] provides guidance on cybersecurity event recovery.
|
<urn:uuid:8d715359-cf87-41f0-909f-5648583ee636>
|
CC-MAIN-2023-40
|
https://grcacademy.io/nist-800-172/controls/3-6-2e/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506420.84/warc/CC-MAIN-20230922134342-20230922164342-00296.warc.gz
|
en
| 0.912206 | 307 | 2.984375 | 3 |
Materials can be divided into three categories when working with
electric conductivity. Conductors and insulators are the most common.
Conductors transfer electricity, while insulators do not. The third
class is known as semiconductors. Semiconductors conduct electricity
only in specific conditions. The PV cells in solar panels are then able
to convert the sun’s energy to usable Direct Current (DC) electricity
by utilizing the semi conduction properties of silicon.
PV cells are created by layering created types of silicon. The,
p-type layer is positively charged, while the n-type is negatively
charged. The n-type is layered overtop the p-type silicon. The two
layers form a barrier where they meet, making it difficult for electrons
to pass between layers. When light hits the two layers, the light
particles (known as photons) transfer energy to the silicon electrons,
eventually causing them to jump from the p-layer into the n-layer. They
then pass through an electric circuit on their way back to the
p-layer. This electric current is the useful form of energy all
electrical generators produce.
|
<urn:uuid:ca6b4d06-053e-44e9-9a09-bb2b7612b46a>
|
CC-MAIN-2013-48
|
http://www.estillenergy.com/about-solar/how-do-solar-panels-work
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164941522/warc/CC-MAIN-20131204134901-00013-ip-10-33-133-15.ec2.internal.warc.gz
|
en
| 0.919028 | 247 | 4.15625 | 4 |
On the evening of April 18, 1778, Paul Revere went up Main St, over the Cradock Bridge, and stopped at the house of Isaac Hall, captain of the Medford Minutemen Company. Captain Hall then sent messengers to Malden, and called on his Minutemen to help march to Lexington.
One of the three oldest brick houses in Medford, it is known to have been standing on this site in 1689, when Jonathan Wade, Jr., died. The house was given Georgian styling in the mid-18th century, and was owned for many years in the 19th century by Samuel Crocker Lawrence. It is privately owned today.
Medford Square was built up around the Mystic/Cradock bridge. Many early travelers passing through would need a place to stay the night, or a place to grab a meal, and so several taverns were built in the area.
The Royal Oak opened in 1720 at the corner of Main Street and Riverside Avenue. One rumor says that this tavern had a sign outside with a bullet hole through it that was shot by a member of the Minute Men as they returned to Medford from Lexington in April 1775.
The Mystic Bridge (later known as the Cradock Bridge) was originally a toll bridge built of wood in 1637. It was 154 feet and 5 inches long and 10 feet wide. Today, the bridge is less than half that length. Many early travelers going between Salem and Boston on foot come through Medford just to use the bridge because until 1787, there was no other way to cross the Mystic River except to ford it.
On April 18, 1775, Paul Revere used the Cradock Bridge during his famous ride to cross into Medford and warn Captain Isaac Hall of the British.
In 1857, the Mystic Bridge was renamed the Cradock Bridge, after Matthew Cradock, a London businessman and the first Governor of the Massachusetts Bay Company. Employees of Cradock settled in the Medford area, and he was given a sovereign grant of 200 acres for every fifty pounds he invested in the Massachusetts Bay Company, which totaled over 2000 acres. Although he never came to North America, most of present-day Medford was Cradock’s personal property.
Sarah Bradlee Fulton was also known as the “Mother of the Boston Tea Party” and “A Heroine of the Revolution.” She was instrumental in the resistance movement against the British during the American Revolution.
In December 1773, members of the Sons of Liberty, including Sarah’s husband and brother-in-law boarded ships in Boston Harbor and tossed 340 boxes of tea overboard. Sarah helped to paint the men’s faces to look like Mohawk Indians so they would not be recognized.
A year and a half later, during the Battle of Bunker Hill in June 1773, the injured were brought to Medford from Charlestown. Sarah Bradlee Fulton helped care for the wounded in a field hospital set up south of the Mystic River.. John Brooks had an important message for George Washington that Sarah Bradlee Fulton volunteered to deliver. She traveled to Boston, despite the dangers of battle, to do so.
She is buried in the Salem Street Burial Ground.
The Royall House was home to Isaac Royall, a merchant who gained his fortune from a distillery and sugar cane plantation on Antigua. The Royall family was the largest slaveholding family in Massachusetts, before slavery became outlawed for the state in 1787.
Isaac Royall Jr. later owned the house and estate. During the American Revolution, he sided with the Crown. He left his property a few days before the Battle of Lexington and Concord.
The house is a National Historic Landmark, and a cultural institution.
The brickmaking process would generally happen from early spring to early fall. In the fall, the pits were dug out, and the clay piled up for the winter. After winter months, the clay would once again be spread out. Workers, oxen, and horses would trod on the clay to make it more pliable and easy to use. Early bricks were baked under the sun, but then later they were baked for 12 days and nights in a kiln.
|
<urn:uuid:d2e57bab-df6b-424d-9e63-6efd80749487>
|
CC-MAIN-2020-10
|
http://www.medfordhistorical.org/mapping-medford/walking-tours/medford-early-history/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875147647.2/warc/CC-MAIN-20200228200903-20200228230903-00106.warc.gz
|
en
| 0.981782 | 879 | 3.046875 | 3 |
Data Management Tools
Better decision-making starts with better data. Data management tools help clean up "dirty data," organize information by providing format and structure and prepare databases for analyses.
Data quality management
- Helps organizations maintain clean, standardized and error-free data.
- Standardization is especially important for BI implementations that integrate data from diverse sources.
- Data quality management ensures that later analyses are correct and can lead to improvements within the business.
Extract, transform and load (ETL)
- Collects data from outside sources, transforms it and then loads it into the target system (a database or warehouse).
- Because primary data is often organized using different schemas or formats, analysts can use ETL tools to normalize it for useful analysis.
Data Discovery Applications
Data discovery applications help users make sense of their data, whether it be through quick, multivariate analysis during OLAP or via advanced algorithms and statistical computations during data mining.
- Sorts through large amounts of data to identify new or unknown patterns. It is often the first step that other processes rely on, such as predictive analytics.
- Databases are often too large or convoluted to find patterns with the naked eye or through simple queries.
- Data mining helps point users in the right direction for further analysis by providing an automated method of discovering previously neglected trends.
Online analytical processing (OLAP)
- Enables users to quickly analyze multidimensional data from different perspectives.
- It is typically made up of three analytical operations: data consolidation, data sorting and classification ("drill-down") and analysis of data from a particular perspective ("slice-and-dice").
- Analyzes current and historical data to make predictions about future risks and opportunities.
Semantic and text analytics
- Extracts and interprets large volumes of text to identify patterns, relationships and sentiment.
In the words of John W. Tuckey, “the greatest value of a picture is when it forces us to notice what we never expected to see.” Reporting applications are an important way to present data and easily convey the results of analysis.
- Helps users create advanced graphical representations of data via simple user interfaces.
- The ability to visualize information in a graphical format
- Dashboards typically highlight key performance indicators (KPIs), which help managers focus on the metrics that are most important to them.
- Dashboards are often browser-based, making them easily accessible by anyone with permissions.
- Scorecards attach a numerical weight to performance and map progress toward goals.
- Think of it as dashboards taken one step further (e.g., balanced scorecard, Six Sigma etc.)
|
<urn:uuid:a732f49d-aa04-42a1-aaf3-9a79f0a90810>
|
CC-MAIN-2020-10
|
http://getskillsblogs.com/ba/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145989.45/warc/CC-MAIN-20200224224431-20200225014431-00446.warc.gz
|
en
| 0.887485 | 551 | 2.984375 | 3 |
Swiss pop has been on a voyage of self-discovery ever since the Hula Hawaiians put out the country's first rock instrumental, "Chimpanzee Rock", in 1957. A museum exhibition tells the story.
The Bern Museum of Communication's "Oh Yeah!" exhibition traces the development of Swiss pop music over 60 years, from Hawaiian bands of the 1950s to the Beat generation, when every town had its own John Lennon or Keith Richards and the emergence of vibrant micro-scenes like punk, rock and metal.
Switzerland's first important underground group were Krokodil, who were recognised for their blend of prog rock blues. Meanwhile, the more mainstream prog rockers Krokus broke out of Switzerland, with the band filling stadiums while touring in the United States in the 1980s. To this day they are the most successful Swiss band on an international scene.
Others making waves abroad included post-industrial group The Young Gods and dance duo Yello, whose international hit song "Oh Yeah!" was featured in the film Ferris Bueller's Day Off.
English was the only pop heard on radio until Polo Hofer's band Rumpelstliz formed in the 1970s, paving the way for bands like Züri West and Patent Ochsner. Black Tiger was the first rap group finally sing in their own language in 1991.
Pop music passed through a milestone in 1983 when the government finally allowed commercial pop radio stations to air.
(Images: Bern Museum for Communication, text: Jessica Dacey)
|
<urn:uuid:dc8af667-eb88-48c2-b1a0-6bb937e3a3c5>
|
CC-MAIN-2017-43
|
http://www.swissinfo.ch/eng/oh-yeah--_milestones-in-swiss-pop/41151176
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187820487.5/warc/CC-MAIN-20171016233304-20171017013304-00036.warc.gz
|
en
| 0.947418 | 314 | 3.015625 | 3 |
Between the end of the 19th century and the beginning of the 20th century, millions of people -- in numbers which have not been seen since -- came to America in pursuit of a better, freer life. On the west coast, between 1910 and 1940, most were met by the wooden buildings of Angel Island. Around the middle of the 19th century, immigrants from Guangdong Province in southern China began arriving, fleeing from both natural and man-made disasters and a collapsing rural economy. Immigrants undertook a Pacific Ocean journey of three weeks, including stops in Honolulu, Manila, Yokohama, Shanghai and Hong Kong. Many passengers could barely afford steerage class travel, and bought their tickets only with the collective help of relatives and neighbors.
Asian immigration to the United States began with the Chinese. By the 1830s Chinese were selling goods in New York City and toiling in Hawaiian sugarcane fields. Gold was discovered in California in 1848, eventually attracting thousands of Chinese miners and contract laborers. In 1850, just over 1,000 Asian immigrants entered the U.S., but ten years later, the figure had jumped to nearly 37,000, mostly Chinese.
When it first began, Chinese immigration was welcomed, or at least tolerated. After the California gold rush brought thousands of Chinese immigrants to California, however, Asian immigrants faced restrictive laws and occasional violence.
Asian Immigration Expands
In general, Chinese immigration was welcomed. The Central Pacific Railroad recruited Chinese to work on the transcontinental railroad in 1865. Three years later the Chinese and the U.S. ratified the Burlingame Treaty which facilitated Chinese immigration. Meanwhile, increasing contact with Japan prompted Japanese to move to Hawaii and California to work in agriculture, and the pace of Asian immigration increased.
In 1899, following the Spanish-American War, the Philippines came under U.S. control, prompting increased Asian immigration from the Philippines.
In 1979 the United States and China resumed diplomatic relations, making Chinese immigration easier. In 1980 Asian immigration reached more than 2.5 million, up from under 500,000 in 1960.
H1B Visas for Special Occupations
The H1B visa is one of the more popular types of visa, especially for Asian immigration. H1B visas are the primary method for bringing professional workers, in what are called Specialty Occupations to live and work in the United States. The occupations which qualify for and H1B visa are IT/computer professionals, architects, engineers, healthcare workers, accountants, financial analysts, management consultants, lawyers, architects, nurses, physicians, surgeons, dentists, scientists, systems analysts, journalists and editors, foreign law advisors, psychologists, technical publications writers, market research analysts, university professors and teachers, and teachers in elementary or secondary schools.
In general, you can have an H1B visa for an initial period of up to three years, however your H1B visa can often be extended one time for up to a combined total of up to six years.
Other Visa Types
Please review the other visa types listed above. The law firm of Joseph A. Raia will be happy to help you with whatever type of visa you qualify for.
Korean immigration to the US
is one of the specialties of the Law Offices of Joseph A. Raia. Conveniently located in metropolitan New Jersey, they
are skilled in all Asian immigration issues and can
help obtain all kinds of visas, including H1B visas and F Visas.
For an index of topics covered here, please see oursite map.
The Law Offices of Joseph A. Raia, Esq., Englewood, New Jersey. All rights reserved.
The Law Offices of Joseph A. Raia, Esq. will not share, sell, or provide anyone with any information about you.
We believe in internet privacy and etiquette.
|
<urn:uuid:906478d7-8166-4bdd-acc0-1ce8ca1ee1ee>
|
CC-MAIN-2017-39
|
http://immigrate-law.com/visatype.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689975.36/warc/CC-MAIN-20170924100541-20170924120541-00173.warc.gz
|
en
| 0.952104 | 792 | 3.46875 | 3 |
The Persian Gulf War (August 2, 1990 – February 28, 1991) was waged against Iraq in response to Iraq’s invasion of Kuwait. Authorized by the United Nations, forces from thirty-four countries were led by the United States. The war is also known as the Gulf War, First Gulf War, Gulf War I, Kuwait War, First Iraq War, or Iraq War. Later the term “Iraq War” became identified with the 2003 Iraq War, or Operation Iraqi Freedom. The Persian Gulf War included Operation Desert Shield (August 2, 1990 – January 17, 1991 for the buildup of troops and defense of Saudi Arabia) and Operation Desert Storm (the combat phase from January 17, 1991 to February 28, 1991).
|
<urn:uuid:ae83ba89-b2ac-495b-8114-e618b6686d5e>
|
CC-MAIN-2017-39
|
https://www.surfnetkids.com/resources/persian-gulf-war/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818696677.93/warc/CC-MAIN-20170926175208-20170926195208-00646.warc.gz
|
en
| 0.981361 | 149 | 3.046875 | 3 |
People have observed lots of crab species with bubbles of foam around their mouths. Frothing at the mouth is often a dangerous sign in humans and other animals so extrapolating this to crabs Is reasonable. But human anatomy is very different from crustacean anatomy. Foaming in crabs isn’t always deadly though at times it is. It all depends on how long the crab has been out of the water.
Why do crabs foam?
Crabs produce bubbles primarily to keep their gills moist. Like other crustaceans and fish, crabs breathe through their gills. However, unlike most fish, crabs don’t immediately die once you take them out of the water. Foaming in crabs is frequently observed when they’re on dry land. Foaming is just an indication that the crab is breathing air instead of water.
How crabs breathe underwater
In the water, crabs draw in water through their abdomens. This water is then pumped over the crab’s gills near the mouth. Gills extract dissolved oxygen from the water via diffusion. The oxygen diffuses further into surrounding blood vessels which distribute it to the rest of the crab’s body.
Simultaneously, carbon dioxide is excreted by diffusing out of the surrounding blood vessels and into the water flowing out of the gills. Both gases dissolve in and out of the water along a concentration gradient (i.e. there is more carbon dioxide and less oxygen in the crab blood around the gills compared to the surrounding water, so each gas flows from where it’s most abundant to where it is least abundant.)
How crabs breathe on land
On land, crabs are forced to breathe air. This air still has to be pumped over the gills in order to be absorbed into the bloodstream. Only a handful of species of land crabs that actually have a dual circulation system that employs both lungs and gills are exempt from this. Nevertheless, most crab species only rely on gills for breathing. Oxygen is absorbed along the gill membranes while carbon dioxide is likewise expelled.
It is the pumping of air across the gills that causes foaming in crabs. As air flows over the moist gills, bubbles are formed, resulting in a foaming effect. The gills have to remain moist in order for crabs to breathe. If the gills dry out, the crab is unable to breathe and dies.
Mud crabs can survive out of the water as long as their gills remain moist though they don’t have to be completely submerged. Other crab species can survive out of water for any length of time, from a day or two to only a few hours. It all depends on the natural adaptations of the crab species in question.
What does it mean when a living crab produces bubbles?
A crab producing bubbles means it’s just breathing. The color of the bubbles is what really matters. Whitish, colorless, or near-colorless bubbles are ok signs. Brown bubbles, however, indicate a problem. A crab blowing brown bubbles is often a preamble to death.
How bad can foaming in crabs get?
An unhealthy bubble color is often an indication that a crab is injured or has an infection. By the time you see the brown bubbles, however, it’s too late. Most pet crab owners have reported their crabs dying soon after bubbling so always keep them near water.
What should you do when your crab is foaming?
You should get your crab near a water source as soon as you spot it foaming. Things can only get worse going forward. Aquatic species will need to be submerged. Don’t do the same for any no-aquatic species, however. Full immersion in water might just kill them.
The water you use is also important. Don’t use tap water. It is toxic to saltwater crabs. Add some table salt to it first.
You should also frequently change out the water in your tank. In the absence of a water circulation system, waste products like nitrates tend to accumulate in the water and turn it toxic. This can give your crabs an infection or force them to abandon the tank in search of a less polluted environment.
How to prevent foaming in crabs
- Keep your crabs near a saline water source, even the non-aquatic ones.
- Use saltwater, not freshwater.
- Manage crab numbers. When there are too many crabs in a tank, the weaker ones are forced out. Maintaining a sustainable population eliminates excessive competition.
- Frequently change out the water in your tank to prevent waste buildup and keep the environment your crabs live in relatively clean.
- Maintain optimum water temperature in your tank. Temperatures below 60º F (15º C) are too cold for comfort while temperatures above 90º F (32º C) are lethal. Staying away from either extreme is a good practice though you can go lower for cold water crabs.
|
<urn:uuid:3500a4d2-62ce-4667-ae08-416606aad850>
|
CC-MAIN-2023-40
|
https://goodcaringtips.com/foaming-in-crabs/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506479.32/warc/CC-MAIN-20230923030601-20230923060601-00775.warc.gz
|
en
| 0.940751 | 1,026 | 3.625 | 4 |
FOSS consist two terms Free and Open Source. But are these both terms different? An open source software is always free software. Isn’t it. This question always blow my mind, why we use both the terms if they mean same. So finally decided to search and get answer. Here putting that only.
Let us understand about each of the two terms individually.
Free Software does not mean the software is free in context of Money/Price. Here Free represents the freedom users have, the liberty users have to read, use, copy, modify and share the code and software(both changed and real one). So it is about rights, privileges and not cost. Users are free to control the program the way they want.
Four degrees of freedom that a free software provide can be read from The Free Software Definition.
The origin of this term is to avoid the confusion of the term free software but later on it become something with different perspective. Open Source software means the code of software is public and users are free to modify and enhance and distribute it.
But this is the same as Free Software. So what’s the difference? We are again at same place.
Though both the term refer to all most same thing but there is some small difference. Free Software are more powerful while Open Source license are a bit more supportive to commercial areas. Any program made using free software will also be always published under free software license, but this is not the case with open source software. Any open source software which is not free software if modified can be published without open source license. That is why most of the license that are Free Software are also OSI(Open Source Initiative) approved, that is they are also open source license.
We should not use both terms interchangeably, there are examples of licenses which are only any one type approved and not other. CECILL License v2 is FSF approved while not open source and NASA Open Source Agreement is open source while not Free.
But the real difference between both the term is still a mystery! I will add more stuff with proves if I will find.
|
<urn:uuid:bc137737-f54a-4a43-b5ab-365436734249>
|
CC-MAIN-2020-10
|
https://shaifaliagrawal.wordpress.com/2014/12/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145839.51/warc/CC-MAIN-20200223185153-20200223215153-00473.warc.gz
|
en
| 0.914458 | 432 | 2.734375 | 3 |
Schema.org has been developed by an open community process that is the vocabulary for structured data supported by all major search engines including Google, Yahoo, Microsoft and Yandex. The schema vocabulary is a standard of property and ‘type’ names that help machines understand the data structure. Data in the vocabulary can be embedded in HTML pages by using any of three alternative formats – microdata, RDFa, and JSON-LD. Learn more about structured data and schema by contacting Digital Clarity.
Structured data markup is process of annotating content so that search engine robots (or machines) can make sense of it. In short, using structured data markup can help create an enhanced listing on search engines making results richer and more prominent. In search engines like Google, structured data markup helps in 2 main ways –
• Enhanced Presentation in Search Results
– Rich snippets
– Site links
• Answers from the Knowledge Graph – authoritative data on
– Video plays etc.
Digital Clarity encompass structured data in its SEO planning.
|
<urn:uuid:084aef91-6c24-4d79-9065-d2325db70cc5>
|
CC-MAIN-2017-39
|
http://www.digital-clarity.com/expertise/search-engine-optimisation/structured-data/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818686465.34/warc/CC-MAIN-20170920052220-20170920072220-00507.warc.gz
|
en
| 0.875245 | 211 | 2.9375 | 3 |
A rare eclipse is under way in which the Moon will block out the Sun partially or totally, according to the location from which it is viewed.
The hybrid eclipse began over Florida at sunrise and will be visible from within a narrow corridor traversing the North Atlantic and equatorial Africa.
Today’s is an especially rare event as the central path of the eclipse begins annular (partial) and ends total.
The total eclipse will sweep east across Africa, taking in northern Kenya and Uganda and ending in Ethiopia and Somalia.
Those on the edge of the eclipse’s path, including North America, the north of South America, southern Europe and the Middle East, will catch only a partial view.
The Moon’s shadow first became visible for…
|
<urn:uuid:37b88035-bef2-4fe8-9240-d10f72241c7d>
|
CC-MAIN-2017-26
|
https://www.thetimes.co.uk/article/rare-eclipse-tracking-east-over-africa-gtmxfhc6bqz
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321309.25/warc/CC-MAIN-20170627101436-20170627121436-00587.warc.gz
|
en
| 0.93523 | 156 | 3 | 3 |
Do you feel like you have adequate knowledge about baseball as a sport? It’s an American favorite, and you have to realize that there is so much to know. Continue reading in order to find out some necessary fundamentals about the sport so that you can become the player you want to be.
There is a lot of sprinting in baseball. Whether you need to steal a base or run to home plate, sprinting is essential. To help increase the speed of your sprinting, run short drills. Time yourself running from home plate to first base. When you begin, power off to gain the maximum speed.
Put your weight onto your back foot to power up your batting. Therefore, if you are left-handed, you should shift your weight to your left foot. Extra power will then come from that back foot as you swing.
Remember that safety is important when you are playing any type of sport. This is especially true for baseball. Avoid injury, by always knowing where specifically the ball is. A surprise ball can cause some real damage to you if you’re not careful. Also, a player sliding into a base can injure your legs.
Make sure you use the proper grip when hitting a baseball. You should go with a “standard” grip. The middle knuckles of your hands should be on the bat. Make sure the bat is across the callus line of your fingers instead of the back of your palms. This grip betters quickness and bat speed.
Catcher’s equipment helps to keep the catcher safe. A catcher’s uniform will include shin guards, a hat with a facemask and a chest protector. In addition to these items, most catchers wear a cup to protect the groin. Finally, a catcher’s mitt is used to help stop the ball quickly.
Know where every other player is located on the field at all times during a baseball game. Having a good idea of the location of each player during the game is how you can avoid most collisions. Head injuries may happen when there is a collision. The best way to prevent such accidents is to alert others anytime you go for a ball.
You must pay attention to those base running coaches as you are rounding the bases. Base coaches see the whole field. When doing base running, concentrate on them instead of the ball. Allow them to be your eyes. If they tell you to stop, stop at the closest base. If they want you to keep running, don’t hesitate.
As a baseball coach, you will be expected to give an appropriate post-game talk. Whether your team wins or loses, you should have some memorable remarks prepared. Your talk should be positive, and you should congratulate your players on a game well played. Especially make note of examples of good sportsmanship. Don’t worry too much about the score. Keep it positive, end it with your team cheer and go your merry ways smiling.
If you are playing shortstop, you must learn how to stop ground balls. The technique that works for this type of ball is to place your baseball glove perpendicular to the ground. This allows you to scoop up the ball in one smooth action. Gently squeeze the glove as the ball hits your glove to catch it.
One of the least utilized hits in baseball is the bunt. To properly bunt the ball, you must point the baseball bat’s tip toward second base. As the ball approaches, slightly change the angle of your front foot so that it is facing first base. This will help you gain the maximum speed.
To prevent catcher’s interference, stay put until you have the ball in your mitt. If the runner tries to steal, begin rising when the pitch comes. Moving forward causing the batter to hit the glove will cause them to get to go to the first base.
If you’re a pitcher, get used to not being perfect. Perfection in baseball is such a rarity that it’s only happened a handful of times at the professional level over the course of a century. There’s a lot of imperfection in the sport. You’ll give up hits. You’ll give up home runs. It’s what you do afterwards, how you handle it, that really counts.
As a catcher, practice your throw to second base over and over. You’ve got the incredible hard job of stopping base stealers when you’re behind the plate. It’s one of the toughest things to do. It all begins with a quick release and an accurate throw. Practice both, and you’ll see that soon potential base stealers will respect that arm of yours and stay put.
To make your new baseball glove as soft as possible, put several applications of neat’s foot oil on it. After each application, wrap the glove around a baseball and secure it in place with magazines, surrounded with string. The softer your glove is, the easier it is to catch those screaming line drives.
Warming up is essential to playing a good game of baseball without sustaining an injury. Warm ups should include shoulder stretches, squats and light jogging. It is also important to stretch out your calves and muscles in your back and chest to protect from injury once the game has started.
You can use the information that has been discussed in order to better your game as a baseball player. So, aren’t you ready to play some ball? Take me out to the ballgame! In all seriousness, put those tips you have discovered into practice when you get out there and play again.
|
<urn:uuid:be83f511-2e4a-4714-8549-282af88d7e13>
|
CC-MAIN-2023-14
|
https://al-hawadeth.com/?p=141
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950247.65/warc/CC-MAIN-20230401191131-20230401221131-00180.warc.gz
|
en
| 0.954382 | 1,156 | 2.5625 | 3 |
Arie van’t Riet‘s beautiful x-ray photographs gracefully combine the outer visible surface and the inner invisible structure of the natural world in images that give new life to the definition of ‘radiant beauty’.
A medical physicist, Arie van’t Riet has turned into an artist almost by chance, when a friend asked him to take an x-ray picture of a painting. On that occasion he became interested in the creative possibilities that x-ray technology opened up by means of exploiting the different densities and degrees of light absorption of the materials it touches. Made of thin petals and leaves, a bouquet of flowers became Arie van’t Riet‘s first ‘artistic’ experiment. After taking the x-ray picture of a bunch of tulips, he digitalized the silver-bromate analog film, then inverted the gray scale and eventually selected some areas to be coloured. The resulting image perfectly restitutes the impalpable lightness but also the vivid strength that flowers have. With this new and exciting possibility to explore nature at hand, Arie van’t Riet started including insects and animals, elegantly composing flora and fauna while playing around with the different x-ray intensities required in order to capture thin and thick tissues in one image. The Dutch scientist/artist only uses dead animals (which he gathers when the sad event has already taken place) for his x-ray photographs, as he does not want to expose living creatures to the danger of x-ray exposure. Van’t Riet defines his pictures as bioramas where the natural elements variously assembled literally radiate the sheer splendor contained even in the tiniest natural element. The artistic path embraced by Arie van’t Riet bears witness of the fact that to be an artist is first and foremost a matter of creative disposition, enabling one to look at the world in an open, curious and actively responsive way, no matter what expressive tools are chosen. Playing around with the technology he better knew, Arie van’t Riet discovered that he could fix in a single image both the outer surface (that we see in colour when touched with visible light) and the inner structure (only showed in grey scale by invisible x-rays) of nature. Looking at Arie van’t Riet photographs is like ideally wearing a pair of x-ray glasses that make us participate to the wholesomeness of the natural world.
To explore more of Arie van’t Riet‘s bioramas, please visit his website here.
Images courtesy of Arie van’t Riet.
(via e MORFES)
|
<urn:uuid:87d87344-fb90-491b-bba6-3a75993d074a>
|
CC-MAIN-2017-26
|
https://observatorymansions.wordpress.com/tag/nature-photography/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320201.43/warc/CC-MAIN-20170623220935-20170624000935-00688.warc.gz
|
en
| 0.926193 | 563 | 2.59375 | 3 |
A group of Washington West educators completed a three day intensive training in the Project Lead the Way (PLTW) "Launch" program. Project Lead The Way provides a comprehensive approach to Science, Technology, Engineering and Mathematics (STEM) Education, through a problem-based, hands-on curriculum. The schools of WWSU will be implementing this new program in the Fall.
PLTW gives students in kindergarten through high school a chance to apply what they know, identify problems, find unique solutions, and lead their own learning. PLTW "Launch" is the program for kindergarten through fifth grade.Through this program, students become problem solvers using structured approaches, like the engineering design process, and employ critical thinking. Students apply STEM knowledge, skills, and habits of mind, learning that it is OK to take risks and make mistakes.
The fifteen teachers who participated in this training will work throughout the year to support their colleagues in implementing these new approaches through use of the resources offered by PLTW. They spent the week immersed in sampling the hands-on materials, and grappled with some of the same problems the students will explore once school begins in the fall. PLTW offers students opportunities to learn how to design and build models through construction materials and robotics equipment, and to learn new skills like coding to design games and solve other challenges. These students will be able to take advantage of an increased array of STEM offerings similar to these early learning experiences up through their Senior year of High School at Harwood Union High School.
|
<urn:uuid:f1dba9b2-e066-4c15-abe9-901178c5d9a2>
|
CC-MAIN-2017-30
|
http://smsoule.blogspot.com/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549425737.60/warc/CC-MAIN-20170726002333-20170726022333-00001.warc.gz
|
en
| 0.952936 | 304 | 2.90625 | 3 |
'Found' in the Bible
The gold of that land is pure; bdellium and onyx are also found there.
And Adam gave names to all cattle, and to the fowl of the air, and to every beast of the field; but for Adam there was not found an help meet for him.
Then the Lord replied to him, "In that case, whoever kills Cain will suffer vengeance seven times over." And He placed a mark on Cain so that whoever found him would not kill him.
But Noah found grace in the eyes of the LORD.
And of every living thing of all flesh [found on land], you shall bring two of every sort into the ark, to keep them alive with you; they shall be male and female.
But the dove found no rest for the sole of her foot, and she returned unto him into the ark, for the waters were on the face of the whole earth: then he put forth his hand, and took her, and pulled her in unto him into the ark.
And it came to pass, as they journeyed from the east, that they found a plain in the land of Shinar; and they dwelt there.
And the angel of the LORD found her by a fountain of water in the wilderness, by the fountain in the way to Shur.
And said, My Lord, if now I have found favour in thy sight, pass not away, I pray thee, from thy servant:
Next, Abraham ran to the herd, found a choice and tender calf, and gave it to the young men, who went off in a hurry to prepare it.
Perhaps there are 50 righteous ones within the city. Will you actually destroy it and not forgive the place for the sake of the 50 righteous that are found there?
And he spake unto him yet again, and said, Peradventure there shall be forty found there. And he said, I will not do it for forty's sake.
And he said unto him, Oh let not the Lord be angry, and I will speak: Peradventure there shall thirty be found there. And he said, I will not do it, if I find thirty there.
And he said, Behold now, I have taken upon me to speak unto the Lord: Peradventure there shall be twenty found there. And he said, I will not destroy it for twenty's sake.
And he said, Oh let not the Lord be angry, and I will speak yet but this once: Peradventure ten shall be found there. And he said, I will not destroy it for ten's sake.
And when the dawn hath ascended, then the messengers press upon Lot, saying, 'Rise, take thy wife, and thy two daughters who are found present, lest thou be consumed in the iniquity of the city.'
Behold now, thy servant hath found grace in thy sight, and thou hast magnified thy mercy, which thou hast shewed unto me in saving my life; and I cannot escape to the mountain, lest some evil take me, and I die:
He lived in the wilderness of Paran. His mother found a wife for him from the land of Egypt.
For when he saw the earring or nose ring, and the bracelets on his sister's arms, and when he heard Rebekah his sister saying, The man said this to me, he went to the man and found him standing by the camels at the well.
And Isaac sowed in that land, and found in the same year a hundredfold. And Jehovah blessed him.
And Isaac's servants digged in the valley, and found there a well of springing water.
And it came to pass the same day, that Isaac's servants came, and told him concerning the well which they had digged, and said unto him, We have found water.
And Isaac said unto his son, How is it that thou hast found it so quickly, my son? And he said, Because the LORD thy God brought it to me.
He reached a certain place and spent the night there, because the sun was setting. He found a stone there, used it for a pillow, and slept there for the night,
And Reuben went in the days of wheat harvest, and found mandrakes in the field, and brought them unto his mother Leah. Then Rachel said to Leah, Give me, I pray thee, of thy son's mandrakes.
And Laban said unto him, I pray thee, if I have found favour in thine eyes, tarry: for I have learned by experience that the LORD hath blessed me for thy sake.
"So my honesty will answer for me later, when you come concerning my wages. Every one that is not speckled and spotted among the goats and black among the lambs, if found with me, will be considered stolen."
And Laban went into Jacob's tent, and into Leah's tent, and into the two maidservants' tents; but he found them not. Then went he out of Leah's tent, and entered into Rachel's tent.
Now Rachel had taken the images, and put them in the camel's furniture, and sat upon them. And Laban searched all the tent, but found them not.
And she said to her father, Let it not displease my lord that I cannot rise up before thee; for the custom of women is upon me. And he searched, but found not the images.
Whereas thou hast searched all my stuff, what hast thou found of all thy household stuff? set it here before my brethren and thy brethren, that they may judge betwixt us both.
And Jacob said, Nay, I pray thee, if now I have found grace in thy sight, then receive my present at my hand: for therefore I have seen thy face, as though I had seen the face of God, and thou wast pleased with me.
"Why do that?" Jacob asked. "I've already found favor in your sight, sir." So Esau set out that very day back on his way to Seir,
All their wealth and all their little ones and their wives they took captive, making spoil even of all [they found] in the houses.
And these are the children of Zibeon; both Ajah, and Anah: this was that Anah that found the mules in the wilderness, as he fed the asses of Zibeon his father.
And a certain man found him, and, behold, he was wandering in the field: and the man asked him, saying, What seekest thou?
And the man said, They are departed hence; for I heard them say, Let us go to Dothan. And Joseph went after his brethren, and found them in Dothan.
And they sent the coat of many colours, and they brought it to their father; and said, This have we found: know now whether it be thy son's coat or no.
Judah found a wife for his oldest son Er. Her name was Tamar.
And Judah sent the kid by the hand of his friend the Adullamite, to receive his pledge from the woman's hand: but he found her not.
So he returned to Judah and said, "I haven't found her. Also, the men who are from there said, "There's been no prostitute here.'"
And Judah said, Let her take it to her, lest we be shamed: behold, I sent this kid, and thou hast not found her.
And Joseph found grace in his sight, and he served him: and he made him overseer over his house, and all that he had he put into his hand.
Later on, as they went about unloading their sacks, each man's bundle of money was found in each man's sack. When they and their father saw their bundles of money, they were greatly distressed.
But when we came to the place where we spent the night, we opened our sacks and each of us found his money -- the full amount -- in the mouth of his sack. So we have returned it.
Behold, the money, which we found in our sacks' mouths, we brought again unto thee out of the land of Canaan: how then should we steal out of thy lord's house silver or gold?
With whomsoever of thy servants it be found, both let him die, and we also will be my lord's bondmen.
And he said, Now also let it be according unto your words: he with whom it is found shall be my servant; and ye shall be blameless.
And he searched, and began at the eldest, and left at the youngest: and the cup was found in Benjamin's sack.
And Judah said, What shall we say unto my lord? what shall we speak? or how shall we clear ourselves? God hath found out the iniquity of thy servants: behold, we are my lord's servants, both we, and he also with whom the cup is found.
And he said, God forbid that I should do so: but the man in whose hand the cup is found, he shall be my servant; and as for you, get you up in peace unto your father.
And Joseph gathered up all the money that was found in the land of Egypt, and in the land of Canaan, for the corn which they bought: and Joseph brought the money into Pharaoh's house.
And they said, "You have saved our lives. We have found favor in our lord's eyes and will be Pharaoh's slaves."
And the time drew nigh that Israel must die: and he called his son Joseph, and said unto him, If now I have found grace in thy sight, put, I pray thee, thy hand under my thigh, and deal kindly and truly with me; bury me not, I pray thee, in Egypt:
And when the days of his mourning were past, Joseph spake unto the house of Pharaoh, saying, If now I have found grace in your eyes, speak, I pray you, in the ears of Pharaoh, saying,
And they shall hearken to thy voice, and thou shalt come, thou and the elders of Israel, unto the king of Egypt, and ye shall say unto him, The LORD God of the Hebrews has found us; therefore, we shall now go three days' journey into the wilderness that we may sacrifice to the LORD our God.
The LORD told Aaron, "Go meet Moses in the desert." So Aaron went, found him at the mountain of God, and embraced him.
And they said, The God of the Hebrews has found us; therefore we shall go three days' journey into the desert and sacrifice unto the LORD our God lest he encounter us with pestilence or with the sword.
Send therefore now, and gather thy cattle, and all that thou hast in the field; for upon every man and beast which shall be found in the field, and shall not be brought home, the hail shall come down upon them, and they shall die.
Seven days shall there be no leaven found in your houses: for whosoever eateth that which is leavened, even that soul shall be cut off from the congregation of Israel, whether he be a stranger, or born in the land.
Unleavened bread is to be eaten for those seven days. Nothing leavened may be found among you, and no yeast may be found among you in all your territory.
So Moses brought Israel from the Red sea, and they went out into the wilderness of Shur; and they went three days in the wilderness, and found no water.
And it came to pass, that there went out some of the people on the seventh day for to gather, and they found none.
and Moses recounteth to his father-in-law all that Jehovah hath done to Pharaoh, and to the Egyptians, on account of Israel, all the travail which hath found them in the way, and Jehovah doth deliver them.
And he that stealeth a man, and selleth him, or if he be found in his hand, he shall surely be put to death.
If a thief be found breaking up, and be smitten that he die, there shall no blood be shed for him.
If the theft be certainly found in his hand alive, whether it be ox, or ass, or sheep; he shall restore double.
'When fire goeth forth, and hath found thorns, and a stack, or the standing corn, or the field, hath been consumed, he who causeth the burning doth certainly repay.
If a man shall deliver unto his neighbour money or stuff to keep, and it be stolen out of the man's house; if the thief be found, let him pay double.
If the thief be not found, then the master of the house shall be brought unto the judges, to see whether he have put his hand unto his neighbour's goods.
"Be My holy people. You must not eat the meat of a mauled animal [found] in the field; throw it to the dogs.
And Moses said unto the LORD, See, thou sayest unto me, Bring up this people: and thou hast not let me know whom thou wilt send with me. Yet thou hast said, I know thee by name, and thou hast also found grace in my sight.
Now therefore, I pray thee, if I have found grace in thy sight, shew me now thy way, that I may know thee, that I may find grace in thy sight: and consider that this nation is thy people.
For wherein shall it be known here that I and thy people have found grace in thy sight? is it not in that thou goest with us? so shall we be separated, I and thy people, from all the people that are upon the face of the earth.
And the LORD said unto Moses, I will do this thing also that thou hast spoken: for thou hast found grace in my sight, and I know thee by name.
And he said, If now I have found grace in thy sight, O Lord, let my Lord, I pray thee, go among us; for it is a stiffnecked people; and pardon our iniquity and our sin, and take us for thine inheritance.
And every man, with whom was found blue, and purple, and scarlet, and fine linen, and goats' hair, and red skins of rams, and badgers' skins, brought them.
Every one that did offer an offering of silver and brass brought the LORD'S offering: and every man, with whom was found shittim wood for any work of the service, brought it.
Or have found that which was lost, and lieth concerning it, and sweareth falsely; in any of all these that a man doeth, sinning therein:
Then it shall be, because he hath sinned, and is guilty, that he shall restore that which he took violently away, or the thing which he hath deceitfully gotten, or that which was delivered him to keep, or the lost thing which he found,
or the thing about which he had given a false oath. He is to restore it in full, add a fifth to it, then give it to whom it belongs the very day he's found guilty.
"Incinerate the clothing, the woven material, the knitted material (whether wool or linen), or any of the leather articles on which the contagion is found, because it's a chronic fungal infection. It is to be incinerated.
But if it recurs on the clothing (whether woven or knitted material) or on any article made of leather, it's a breakout, so incinerate it with fire wherever the contagion is found.
Every garment (including leather) on which the semen is found is to be washed with water, and it will remain unclean until evening.
If a person doesn't have a kinsman redeemer, but has become rich and found sufficient means for his redemption,
'And if his hand hath not found sufficiency to give back to him, then hath his sold thing been in the hand of him who buyeth it till the year of jubilee; and it hath gone out in the jubilee, and he hath returned to his possession.
"Tell the Israelites, 'When a man or a woman commits any sin that people commit, thereby breaking faith with the Lord, and that person is found guilty,
And Moses said unto the LORD, Wherefore hast thou afflicted thy servant? and wherefore have I not found favour in thy sight, that thou layest the burden of all this people upon me?
And if thou deal thus with me, kill me, I pray thee, out of hand, if I have found favour in thy sight; and let me not see my wretchedness.
Is flock and herd slaughtered for them, that one hath found for them? -- are all the fishes of the sea gathered for them -- that one hath found for them?'
And while the children of Israel were in the wilderness, they found a man that gathered sticks upon the sabbath day.
And they that found him gathering sticks brought him unto Moses and Aaron, and unto all the congregation.
And Moses sendeth messengers from Kadesh unto the king of Edom, 'Thus said thy brother Israel, Thou -- thou hast known all the travail which hath found us;
So we have presented to the Lord an offering of the gold articles each man found-armlets, bracelets, rings, earrings, and necklaces-to make atonement for ourselves before the Lord."
Wherefore, said they, if we have found grace in thy sight, let this land be given unto thy servants for a possession, and bring us not over Jordan.
and the blood avenger finds him outside the town of refuge where he had fled and kills him, the blood avenger is not to be found guilty of murder.
And -- ye have sought from thence Jehovah thy God, and hast found, when thou seekest Him with all thy heart, and with all thy soul,
in distress being to thee, and all these things have found thee, in the latter end of the days, and thou hast turned back unto Jehovah thy God, and hast hearkened to His voice;
No yeast is to be found anywhere in your territory for seven days, and none of the meat you sacrifice in the evening of the first day is to remain until morning.
If there be found among you, within any of thy gates which the LORD thy God giveth thee, man or woman, that hath wrought wickedness in the sight of the LORD thy God, in transgressing his covenant,
Search Results by Versions
Search Results by Book
- Genesis (55)
- Exodus (23)
- Leviticus (8)
- Numbers (10)
- Deuteronomy (25)
- Joshua (5)
- Judges (16)
- Ruth (2)
- 1 Samuel (39)
- 2 Samuel (11)
- 1 Kings (21)
- 2 Kings (24)
- 1 Chronicles (13)
- 2 Chronicles (31)
- Ezra (6)
- Nehemiah (12)
- Esther (17)
- Job (22)
- Psalm (24)
- Proverbs (20)
- Ecclesiastes (8)
- Song of Songs (8)
- Isaiah (20)
- Jeremiah (31)
- Lamentations (5)
- Ezekiel (4)
- Daniel (19)
- Hosea (7)
- Amos (1)
- Jonah (1)
- Micah (2)
- Habakkuk (1)
- Zephaniah (1)
- Haggai (1)
- Zechariah (2)
- Malachi (1)
- Matthew (25)
- Mark (17)
- Luke (38)
- John (14)
- Acts (49)
- Romans (9)
- 1 Corinthians (8)
- 2 Corinthians (9)
- Galatians (1)
- Ephesians (1)
- Philippians (6)
- 1 Thessalonians (4)
- 2 Thessalonians (2)
- 1 Timothy (5)
- 2 Timothy (4)
- Titus (1)
- Philemon (1)
- Hebrews (12)
- 1 Peter (3)
- 2 Peter (4)
- 1 John (1)
- 2 John (1)
- Jude (1)
- Revelation (18)
- Confound (13 instances in 10 translations)
- Confounded (66 instances in 11 translations)
- Confounding (1 instance in 4 translations)
- Confounds (2 instances in 2 translations)
- Dumbfounded (6 instances in 2 translations)
- Foundation (108 instances in 13 translations)
- Foundation-stone (1 instance in 1 translation)
- Foundation-stones (1 instance in 1 translation)
- Foundations (60 instances in 13 translations)
- Founded (56 instances in 12 translations)
- Founder (7 instances in 6 translations)
- Founders (1 instance in 1 translation)
- Foundest (1 instance in 3 translations)
- Founding (6 instances in 4 translations)
- Foundries (2 instances in 1 translation)
- Founds (3 instances in 6 translations)
- Ill-founded (1 instance in 1 translation)
- Profound (15 instances in 9 translations)
- Profoundly (3 instances in 3 translations)
- Unfounded (1 instance in 1 translation)
- Well-founded (1 instance in 1 translation)
- Ascertain (6 instances)
- Base (133 instances)
- Chance (90 instances)
- Constitute (4 instances)
- Detect (3 instances)
- Determine (43 instances)
- Discover (50 instances)
- Encounter (27 instances)
- Establish (179 instances)
- Feel (111 instances)
- Find (590 instances)
- Found (730 instances)
- Ground (665 instances)
- Happen (378 instances)
- Incur (27 instances)
- Institute (1 instance)
- Launch (7 instances)
- Notice (125 instances)
- Found Guilty
- Foundations Of Nations
- Foundations Of Buildings
- God's Voice
- Gospel, Historical Foundation Of
- No One To Be Found
- Not Finding
- Nowhere To Be Found
- Protection, Not Found In
- Spiritual Foundations
- The Foundation Of The Church
|
<urn:uuid:510cd76d-6781-4cc5-878e-fec4dc37e4aa>
|
CC-MAIN-2017-47
|
https://bible.knowing-jesus.com/words/Found
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934805008.39/warc/CC-MAIN-20171118171235-20171118191235-00662.warc.gz
|
en
| 0.958517 | 4,784 | 2.546875 | 3 |
Partheniades (‘Gracious Princesse, Where princes are in place’)
A sequence of seventeen poems which were apparently written for intended presentation to Queen Elizabeth as a New Year's gift (c.1577-8). Extracts first published in The Arte of English Poesie (London, 1589). First published complete in Ancient Critical Essays upon English Poets and Poesy, ed. Joseph Haslewood, 2 vols (London, 1811-15), I, xviii-xxxviii.
This sequence would appear to correspond to ‘One oth[e]r lyttle booke of Certeyne meeters Wryten in hon[o]r of her ma[jes]t[i]e[s] name in p[ar]chem[en]t bound w[i]th greene leaves’ recorded in Katherine Paulet's 1578 inventory of Puttenham's goods seized by her husband John Paulet at Puttenham's lodgings in the Whitefriars [in February 1577/8].
Copy of the sequence of seventeen poems, in a predominantly italic hand, with eleven lines at the foot of f. 170r in two other hands, headed ‘The principall addresse in nature of a New yeares gifte, seeminge therebye the Author intended not to have his name knowne’, the word ‘Parthe:’ written in the margin against each poem, on nineteen quarto pages. Late 16th-early 17th century.
In: A quarto composite volume of heraldic and other historical papers, in various hands, 187 leaves, in 19th-century half-morocco.
Edited frpom this MS in Haslewood and also in W.R. Morfill, Ballads from MSS. (Ballad Society Publications, 1873), II, 72-91.
An Apology or True Defence of Her Majesty's Honourable and Good Renown
A treatise on the execution of Mary Queen of Scots, beginning ‘There hath not happened since the memorie of man…’. First published, as ‘A Justification of Queene Elizabeth in relation to the Affaire of Mary Queene of Scottes’, in Accounts and Papers relating to Mary Queen of Scots, ed. Allan J. Crosby and John Bruce, Camden Society, 93 (1867), pp. 67-134.
Copy, untitled, on seventeen folio leaves. Late 16th century.
This MS formerly Phillipps MS 22357.
Copy, in a secrretary hand, on 29 folio leaves, imperfect in the middle and at the end, with contemporary pagination 87-98, -148. Untitled, but docketed (amidst scribbling) ‘A Defence of the proceedings of Q. Eliz. agst ye Scottish Queen. Imperfect’, here beginning ‘There hathe not hapned sithence the memorie of man…’, in a professional hand, with alterations in two other hands on ff. 5v, 9r, 12v and 22v. Late 16th century.
Scribbling (by a juvenile hand) including the names of Thomas Phillip, John Curye, Richard Tempest, Tempest Rookes, Jonas Bookes, and also (f. 16r) ‘John fleetewood Recorder of london’.
This MS recorded in Willcock & Walker, pp. xxiii-xiv (where it is erroneously described as containing ‘corrections in Puttenham's own hand’). Extracts edited from this MS, with a facsimile of p. 96, in Breaking the Silence on the Succession: A Sourcebook of Manuscripts & Rare Elizabethan Texts (c.1587-1603), ed. Jean-Christophe Mayer (Montpellier, 2003), pp. 37-68.
Copy, headed ‘A Discourse playnelie, proueinge, that, aswell: the sentence, of Death, Latelie, giuen, agaunste, that, vnfortunate, Ladie, Marie, Late, Queene, of Scottes: as, also, the, Execution, of the same, Sentence, was, honnoble: iuste, necessarie, and, Lawfull: An°; 1587; 129 Eliz: J.1’.
In: A folio volume of two tracts (the second a Life of John Fisher), both in the hand of the ‘Feathery Scribe’, 181 leaves. c.1620s.
Once owned Sir Robert Oxenbridge, MP (1595-1638) of Hurstbourne Priors, Hampshire; later by William Sancroft (1617-93), Archbishop of Canterbury, manuscript collector; and by Thomas Tanner (1674-1735), Bishop of St Asaph, ecclesiastical historian, scholar and book collector. It was once bought from John Jackson of Tottenham High Cross.
Described in Peter Beal, In Praise of Scribes: Manuscripts and their Makers in Seventeenth-Century England (Oxford, 1998), p. 259 (No. 97), with facsimile examples on pp. 68 and 70.
This MS recorded in Willcock & Walker, p. xxiii (n). Beal, In Praise of Scribes, p. 259 (No. 97.1), with a facsimile of f. 1r on p. 68.
Copy, headed ‘A Discourse plainly proueing that it was lawfull for her Matie not only to deteyne the Scottish Queene prisoner But also to put her to death for her manifold offences Notwithstanding ye Allegacons and Reasons of her fauorites to the Contrary’, with numerous corrections, insertions and sidenotes (including words repeated in the margin to clarify certain textual readings) in one or more other hands, on 75 pages, folio, owned by the scrivener and public notary Humphrey Dyson (c.1569-1632/3) with his price for the tract ‘prec xs’ [10 shillings] inscribed (f. 136r) in the top border and with Dyson's signature (‘Hum: Dyson’).
In: A large folio composite volume of state tracts, in English and Latin, in various professional hands, i + 488 leaves, in modern calf.
Among the collections of Browne Willis (1682-1760), antiquary, of Whaddon Hall, near Winslow, Buckinghamshire.
This volume discussed, with a facsimile of f. 92r (Plate IV after p. 272) in H.R. Woudhuysen, Sir Philip Sidney and the Circulation of Manuscripts 1558-1640 (Oxford, 1996), pp. 176-8.
Woudhuysen tentatively suggests that Dyson's priced MSS were used as ‘master exemplars’ for subsequent copying to paying clients (but see alternative explanations by Alan Nelson (forthcoming)).
Copy, in a professional secretary hand, untitled, with Beale's supplied title ‘A discours concerning the Just Execution of ye Scotishe Queen’ and his note in the margin ‘It is thoght that this book was made by George Putteham’.
In: A folio composite volume of state tracts and papers, many relating to Mary Queen of Scots, some concerning the proposed Anjou marriage, in various hands and paper sizes, 711 leaves, in contemporary vellum, with ties. Collected and annotated by Robert Beale (1541-1601), Clerk of the Privy Council. Including (ff. 152r-95v) a printed exemplum of Stubbs's banned tract A Gaping Gulf (1579). c.1580s-90s.
Yelverton MS 31, among Beale's papers descending to Sir Henry Yelverton (1566-1629), Justice of the Common Pleas, and his family.
Recorded in HMC, 2nd Report (1871), Appendix, p. 41.
Recorded (as ‘the Calthorpe MS’) in Willcock & Walker, p. xxiii.
Copy, headed ‘[A di]scourse plainlie prooueinge that [a]swell the Sentence of death latelie given against the vnfortunate Ladie Marie late Queene of Scotts as also the execution of the same Sentence were hoble: iust necessarie and Lawfull’, here beginning ‘There hathe not happened since the memorie of man…’.
In: A folio composite volume of state papers and tracts, many relating to Mary Queen of Scots, in various hands, 439 leaves, imperfect (corners damaged by the fire of 1732). Early 17th century.
Edited from this MS in Calendar of the State Papers relating to Scotland and Mary Queen of Scots 1547-1603, ed. William K. Boyd, Vol. IX. 1586-1588 (1915), No. 330 (pp. 356-8). This MS selectively collated in Camden Society edition; recorded in Willcock & Walker, p. xxiii (n). An 18th-century transcript of this MS is in British Library, Harley MS 4647, ff. 143v-63v.
Copy, with a lengthy formal title-page (f. 1r)…… on 137 pages (69 leaves), folio; the verso of the title-page (f. 1v) containing notes by a 17th-century reader about the execution of Mary Queen of Scots. Copy, with lengthy formal title-page (f. 1r): ‘An apologie, or | true defence of her Mats : honor: | and good renowne against all such | as haue unduelie sought or | shall seek to blemish the fame, | with any injustice, crueltie, or | other unprincely behaviour in any parte of her Mats: | proceedings against the | late Scotish Queene, | Be it for her first | surprince, imprison: | ment, process, att: | aynder or death. | By very firme reasons, authorities, & | examples, proveing that her Matie: | hath done nothing in the said action a: | gainst the rules of honor: or armes | or otherwise, not warrantable | by the law of God & of | Man | Written by George Puttenham to the | service of her matie: & for large satis: | faction of all such psons both prince: | ly & private, who by ignorance ¦ of the case, or partiallitie of mind | shall happen to be irresolute | & not well satisfyed in the | said cause’; here beginning (f. 2r) ‘There hath not happened since the memory of man…’., on 137 pages (69 leaves), folio; the verso of the title-page (f. 1v) containing notes by a 17th-century reader about the execution of Mary Queen of Scots. Early 17th century.
This MS recorded in Willcock & Walker, p. xxiii (n).
Copy, headed ‘A Discourse plainly proveing that as well the Sentence of Death lately given agt. that vnfortunate Lady Marie late Q. of Scots as also the execution of the same sentence, were honble: just necessary & Lawfull. March 1587’, here beginning ‘There hath not happened since the memory of man…’, transcribed from PtG 3.5.
In: A folio composite volume of state papers and tracts, many relating to Mary Queen of Scots, in a single professional cursive mixed hand, 172 leaves (plus blanks), in modern half crushed morocco on marbled boards. A transcript of British Library, Cotton MS Caligula D. I before it was partly burnt in the 1732 fire. Mid-17th century.
Copy, in a professional secretary hand, untitled, on 12 folio leaves. Late 16th century.
Copy, on 22 folio leaves in a 38-leaf section (including SiP 199) in the same professional secretary hand, untitled. c.1587-1600s.
In: A folio composite volume of state letters and tracts, in various professional hands, 240 leaves (plus blanks), now in four volumes, in modern quarter-calf.
This MS recorded in Willcock & Walker, p. xxiii (n).
Copy, headed ‘A Discovrse plainelye proueinge that aswell the sentence of deathe latelye giuen againste that vnfortunat Ladye Marye Late Queene of Scotts. as alsoe the Execution of the same sentence, was Hoble: iuste necessarye & Lawefull, wch was performed. Anno. 29. Eliz: 1587.’
In: A folio volume of state tracts, in probably two professional secretary hands (A: ff. 1r-210v,; B: f. 211r onwards), with an index in an italic hand at the end, 370 leaves, in half-vellum marbled boards. c.1630s.
Copy, in a professional secretary hand, untitled and unascribed, i + seventeen folio leaves, in a paper wrapper, the front one inscribed ‘The case & proceedings against the Queen of Scotts / Phelips’. Late 16th century.
Among papers of the Mellish family, of Hodsock, Nottinghamshire.
Copy, in a secretary hand, 64 folio pages (plus blanks), in contemporary calf gilt (rebacked). Headed ‘A Justification of Queene Eliz: in relation to ye affaire of Mary Queene of Scottes’.
Owned and inscribed in 1867 by Sir Thomas Edward Winnington, Bt, MP (1811-72), of Stanford Court, Worcestershire.
Edited from this MS (described as ‘the original MS’, but also as a copy of ‘some other MS.’) in Camden Society edition. Recorded (as ‘Accounts relating to Mary Queen of Scots while prisoner in England’) in HMC, 1st Report (1870), Appendix, p. 53a, and in Willcock & Walker, p. xxiii (n).
Copy, headed ‘Queene Elizabeth's Apologie ffor hir Proceedinges against the Queene of Scottes, anno 1587’, with comments on the treatise at the end in a different hand (presumably a 17th-century reader who was a lawyer): ‘This apology in the reading answered not my expectation: it mainly insists on the lawfullnesse of detaining the Queene of Scots prisoner. But as for her crimes, it gives the world noe satisfaction on that point, and a maine one is that shee twice designed to bee married. The manner of her Triall is pitifully defended and some ignorance shewed of our proceedings at law in cases of Triall; and (which is worst of all) it uses the great massacre of the Protestants in ffrance as a medium to justify the execution of the Scottish Queene’, on 100 folio pag
In: A foio volume comprising two tracts, in a single professional hand, 60 leaves, in half-vellum. c.1600?.
Formerly Mostyn MS 261, from the library of Mostyn Hall, near Holywell, Flintshire, Wales, seat of Sir Thomas Mostyn, second Baronet (c.1651-1700?) and of Sir Roger Mostyn, third Baronet (1675-1739). Sotheby's, 13 July 1920, lot 35, to Maggs. Maggs's sale catalogues Nos 423 (1922), item 1127, and No. 550 (1931), item 987.
Recorded in HMC, 4th Report (1874), Appendix, p. 361.
This MS mentioned in Woudhuysen, pp. 151-2.
The Arte of English Poesie
First published, anonymously and dedicated to Lord Burghley, in London, 1589. Edited by Gladys Doidge Willcock and Alice Walker (Cambridge, 1936). Edited by Frank Whigham and Wayne A. Rebhorn (Ithaca & London, 2007).
In: A quarto verse miscellany, in an accomplished mixed hand throughout, with headings or incipts in engrossed lettering, 194 leaves, in 19th-century half-morocco. c.1596-1601.
This MS volume discussed in Katherine K. Gottschalk, ‘Discoveries concerning British Library MS Harley 6910’, MP, 77 (1979-80), 121-31.
A Justification of Queen Elizabeth in relation to the Affair of Mary Queen of Scots
See PtG 2-5.
Claude de Seyssel. La Grande Monarchie de France
A political monarchist discourse by Claude de Seyssel (d.1520), Bishop of Marseilles and Archbishop of Turin, written c.1515 and first published, as Le grant monarchie de France in Turin, 1518 (second edition Paris, 1541). No published English translation before c.1980 is known. The apparently unique translation in MS seems to have been made by Puttenham.
Autograph fragment by Puttenham, with revisions, beginning ‘entertayne the three estates in euery of ther liberties…’, followed by ‘Cap. xviij How the prince sought to entreat the stae of nobillitee in generall’; then ‘Cap xix° how the prince in allowinge the state of the nobilletee his premyn ences shoold haue regard that it become not ouer insolent’; and ‘Cap xx how respect shoold be had that the state of nobillitee shoold not be impovrished p thother estates’, ending ‘…since this only excesse is on of the suckers that of all other drawth most bludd owte of this misticall bodye.’, on ten folio pages, with stubs of excised leaves beforehand, in vellum. Seyssel's book is listed in two notebooks (PtG 8-9), once in a book inventory dated 10 November 1576, the other in a catalogue of the books ‘browght from mystres ffranklins howse’ (Willis, p. 394). Mid-late 17th century.
Among the papers of the Jervoise family, of Herriard.
Identified as a translation from Seyssel by Eric Lindquist.
Suetonius Tranquillus, Caius. Lives of the Caesars
Unpublished translation (possibly of extracts only) into English. Suetonius is the source of several references (to Tiberius and others) in The Arte of English Poesie, and Puttenham's printed copy of Suetonius is listed in his inventory of his books. The first published English translation of The Historie of twelve Caesars, Emperours of Rome, translated by Philemon Holland, appeared in 1606.
Autograph manuscript, in Puttenham's mixed italic and secretary scripts, of a translation by him of passages, concerning cruelty and tyranny, in Chapters 58 and 61 of the life of Tiberius, headed ‘Suetonij Tranquilli in vita Tiberij cap. 58’ and beginning ‘Abowt that verry tyme his lorde chief iustice came to hym to knowe his Matis plesure…’, on two pages of a pair of conjugate folio leaves, . Evidently relating to Puttenham's autograph notes sent to his brother-in-law Sir John Throckmorton concerning his defiance of the Privy Council (see PtG 000). 1578.
This MS recorded in Willcock & Walker, p. xxii.
An autograph folio account and memorandum book, neatly compiled by Puttenham, 27 leaves (including a few blanks), with three loosely inserted notes of different size, in contemporary vellum. Comprising: a list of debts, 12 October 1574, and money owed to him, to 14 January 1576 (f. 1v); lists of manors belonging to his wife (f. 2v) and sold by Lord Edward Windsor, ‘wer the Queen hath nothinge in them’ (f. 3r); accounts of annual household expenses, including wages of his men and women servants (f. 4r), of his rents, 25 March 1575 (f. 4v), money spent in behalf of Mr Woodes during ‘the tyme of his trowble’, 1 August 1575 (f. 5v), expenses ‘abowte the keapinge and cawses’ of his wife Lady Windsor in 1574-75 (f. 6r), and other miscellaneous expenses, June 1575 (f. 6v); notes about the current state of his lawsuits in various courts, with reference to ‘my bookes therof’, ‘the bookes that must be copied owt’, and related ‘writinges…in a box with Sr Jhon Throckmorton’, 1575 (ff. 8r-9v); ‘The inventary of all my bookes and library’, comprising some 84 items in Latin, Italian, French and English, 10 [or 18?] November 1576 (f. 16v); expenses paid to ‘my farmor Willm’ for making copies and legal work (ff. 18v-19v); a list of witnesses to the payment of money and acquitances of Sir Francis Fleming, including servants of George and Richard Puttenham (f. 22v); ‘Remembrances of deades and writinges concerninge herrierde title’ (ff. 23v-24r); a list of items, largely household stuff, given by Lady Windsor to Katherine Paulet and Mary Ayshe (ff. 24v-25r); ‘An inventory of my pewter at London 1576’ (f. 25v); and an inventory of clothing and jewellery, c. 1575; on 27 leaves (including a few blanks), folio, together with three loosely inserted notes of different size: namely: (1) an autograph receipt signed twice by George Puttenham for ‘bookes & writinges’ given to him by Richard Paulet, including ‘seurall pamphletes of paper bookes writen’ and legal documents, and also ‘one letter of Queen Maryes’, 26 August 1582; and (2 and 3) autograph lists of the contents of a chest, travelling expenses, ‘Thinges browght from Herrierd to Vpton the xijth of october 1575’, debts, 10 May 1576, and clothing. 1574-76.
Among the papers of the Jervoise family, of Herriard Park.
Facsimile pages in Willis, pp. 420-2.
An octavo notebook, in varying scripts, includes notes on expenses and accounts; Italian-English vocabularies; linguistic and legal notes in English, Latin and French; some notes written in joined bubbles, others in bracketed columns; and ‘A catalogue of the booke[s] yt I browght from mystres ffranklins howse’ (listing over 40 books in French, Latin, Italian and English, and ‘wryten booke[s] of myn owne dyvers’), 88 leaves, in a vellum wrapper taken from an older document in Hebrew. Not in Puttenham's hand, but possibly compiled by members of the Paulet family. Late 16th century.
This volume is discussed, as if by Puttenham, in Willis, pp. 387-96.
Letter signed by George Puttenham (‘George Putenhm’), the text in the secretary hand of a scribe, to Mr [Thomas] Browne and Mr [Wiliam] More (i.e. Sir William More (1520-1600), the Commissioners of the Musters in Surrey), requesting exemption from taxation for the county musters since he is not a resident of Surrey but only temporarily borrowed ‘an other mans howse’ in the shire to ‘serve her matie’, referring to ‘my lord Threasurers warrant’ and to his serving the Queen (‘wherein beside[s] myne ordynary charge I am by comaundment spec[ially] ymployed’), on one (now mutilated) folio page, with address panel on verso, from Putney, 20 December [1560s?]. 1560s?.
Among the Loseley Papers of the More family.
A letter, in a cursive secretary hand, signed by Puttenham (‘Geo. putenham’), to his wife Lady Windsor, concerning a debt of £200 and admonishing her not to make ‘frivolous demands’. c.1576-7?.
Quoted, with a facsimile, in Willis, pp. 426-8.
Autograph letter (unsigned), to the Privy Council, about the ‘owtrages comytted upon’ him by Lord Thomas Paulet and his family and ‘seruante[s]’, whose ‘mallice’ put him ‘in danger to be murdred’ and brought him ‘into this great obloquye and distresse that the worlde seeth’, so that Puttenham objects to hazarding his liberty by appearing before the Council ‘only to sarue myn enemyes turnes, and to be noted for a fable to all the courte seekinge to answere a cowple of shameles weemen who neuer knowe tyme to make an ende’, on twelve folio pages, endorsed ‘A long lre drawne to the ll. [Lords] of the Councel. from Mr Georg Puttenham’, [25 October] 1578. 1678.
Autograph letter (unsigned) by George Puttenham to Sir John Throckmorton, along similar lines, on four folio pages [25? October] 1578. 1578.
Autograph letter (unsigned) by George Puttenham to Sir John Throckmorton, about his legal case and willingness to suffer imprisonment if necessary (‘…there is never a man in englande hathe knowne me so tender ovr my carcase, as that I wold not willinglie expose it to all dangers for my frende[s] sake…’), including notes on the matter as an endorsement, on two folio pages, [? 17 December] 1578. 1578.
Autograph notes by George Puttenham presumably sent to Sir John Throckmorton, setting out the state of the case relating to Throckmorton and Puttenham, drawn up as notes within linked bubbles, on a bifolium and single folio leaf, endorsed ‘Mr George Puttenham. The maters concerninge Sr John Throgmarton & him self drawn owte in tables’, [? December 1578]. 1578.
Autograph letter (unsigned) by George Puttenham to Sir John Throckmorton, about his ill-treatment by the Paulet family and why he will not appear before the Privy Council or deliver himself into custody, on four folio pages [25? October] 1578. 1578.
Autograph note (unsigned) by George Puttenham to Sir John Throckmorton, about their mutual ‘trowbles’ and how Throckmorton should conduct himself on his appearance before the Council; on one folio page [c. December 1578]. 1578.
Autograph note (unsigned) by George Puttenham to Sir John Throckmorton, about his ‘determynation’ to pursue his case, his unwillingness for Throckmorton to go to prison for his sake but insistence that he should ‘gyve away nothinge’ without Puttenham's consent (‘…my ll. [Lords] nor any man lyving shall gyve away any off my goode[s] or lyv[ing]e[s] but by order off lawe…’); on one half-folio page, [c.December 1578]. 1578.
Autograph letter signed by George Puttenham (‘Geo. putenham’) to Sir Richard Paulet, requesting him to find for him in his ‘boxes of evydence’ that he had in the Whitefriars and ‘in the yron bounde cheste’ an indenture between Puttenham and Kellham Throckmorton relating to Herriard (‘for I must needs vse all the writinges which are contayned in a schedule inclosed’), on one folio page, 11 May 1586. 1586.
Autograph ‘Consideracions’ by George Puttenham ‘to be vsed by syr Jhon Throck[morton].’ before his appearance before the Council, with Throckmorton's autograph answers and comments written in the margin, on three folio pages, [? June] 1579. 1579.
Bill of complaint to Sir Nicholas Bacon by Thomas Brooke accusing Thomas Councell and George Puttenham of ‘corruptly and disceitfullye’ cheating him out of his legacy ‘betwen them…by indirecte, and sinister meanes’, whereby they also caused him to be confined for twelve months in prison where he lived in misery and ‘in greate daunger of ffamyne’, 28 April 1564; separate answers by Thomas Councell and George Puttenham, dismissing his allegations as ‘vntrue’; and the replication to both answers by Thomas Brooke, on four membranes of vellum, . 1564.
Assignment by Robert Wursham (or Wonersham) to William, Lord Windsor, of lands in Weston Corbet and elsewhere, on one membrane of vellum, 23 September 1555. 1555.
In: Fifteen items chiefly relating to the case of George Puttenham versus his estranged wife Lady Windsor.
Extract, in court hand, from a rent roll for Lord Windsor's property at Bentworth, on both sides of a broadsheet. 1557.
A bill of complaint to Sir Nicholas Bacon, Lord Keeper, by Richard Puttenham, against Sir William Warham, concerning a dispute over a bargain and sale; with Warham's answer [undated: probably early in the period 1558-79 when Bacon was Lord Keeper]. [1558-79].
A bond between Jane Kydwelly and Elizabeth Lady Windsor, on a long strip of vellum, 3 March 1559/60. 1560.
A bill of complaint to the Queen by George Puttenham about the outrages committed against him by Thomas Lord Paulet and his followers, ‘whereby he was put in greate feare and parell of his Lyfe’, including their stealing his goshawk on 7 October and ‘beyng Ryotously arayed wt Sworde Buckler and dagger’ on 22 and 23 October, Thomas Paulet's attacking Puttenham on horseback and inflicting ‘two great and Large woundes’ in his ‘hedde wt his daggar’; and Paulet's answer, detailing how he was moved to give Puttenham ‘one litle Stroke vpon the head’ and, when attacked, ‘one other litle Stroke’, on two membranes of vellum, [c.November 1560]. 1560.
Interrogatories on behalf of George Puttenham against Thomas Paulet concerning the stealing of a goshawk from Puttenham's manor at Sherfield in October 1560; and Thomas Paulet's answers, denying knowledge of who stole it, on one membrane of vellum and two folio pages, 21 November 1560. 1560.
Recorded in Eccles, pp. 108-9. Quoted in Willis (as ‘SC 5,P46/11’), pp. 385-6.
Bill of complaint to Sir Nicholas Bacon by Andrew Vavasor of the Middle Temple, steward of the lands and tenements of Philip, youngest son of the late William, Lord Windsor, against George Puttenham, concerning Philip Windsor's rights and money owing to him; with George Puttenham's answer, referring to Vavasor's duty to ‘safely prserve’ Philip's ‘escriptes writtinges and munymentes’, as well as his title, and costs on Philip's behalf borne both by Puttenham and Philip's sister Elizabeth, on two membranes of vellum. c.1560s.
Bill of complaint to Sir Nicholas Bacon by John Paulet, Mary Paulet, Philip Windsor and Elizabeth Windsor, children of Elizabeth, Lady Windsor, referring to Lady Windsor's inheritance from the late Lord Windsor of goods and chattels to the value of over £3,000, from which, on 9 September 1559, she made a deed of gift to her children, but which her new husband George Puttenham wanted ‘for his pryvate gayne’ resulting in their being ‘defrauded’ of their rights; the lengthy answer to this by George Puttenham and Lady Windsor, denying that any such deed of gift was made; a brief summary of this answer; and the replication to this answer by the four complainants, insisting that a ‘Suffycyent wrytynge’ was made by their mother ‘wth her whole minde and full consent’ and ‘Seyled wth her Seyle and by her lawfully as her deyd of Grant dylyuryd’, on four membranes of vellum, [undated. c.1560s?]. c.1560s.
Bill of complaint to Sir Nicholas Bacon by Giles Moore accusing George Puttenham of cheating him ‘with pollecye and subtill invention’, out of the benefice and parsonage of Shaldon, Hertfordshire, which he let Puttenham take possession of and subsequently grant to John Bardolphe under the promise that Puttenham would secure the necessary dispensation from the Bishop of Winchester, which he failed to do, ultimately resulting in Moore's arrest; with Puttenham's answer, dismissing the allegations as ‘vntrue and insufficient in the lawe’, on two large membranes of vellum, [undated, but before 1566]. c.1560s.
Bill of complaint to Sir Nicholas Bacon by Thomas Colbie and Edward Gilbard against Richard Puttenham, Thomas Harrison, John Warton and others, seeking redress concerning a lease of property at Sherfield in Hampshire, referring to the involvement in this lease of George Puttenham, as well as Thomas Wayland and his wife Mary, on a single membrane of vellum, [undated, but probably early 1560s]. c.1560s.
Directions by Queen Elizabeth concerning the case of Richard Puttenham, found guilty of rape, 25 April 1561. 1561.
A bill of complaint to Sir Nicholas Bacon by Thomas Wayland and his wife Mary, widow of Robert Downes, seeking repayment by Richard Puttenham of £160 lent him by Downes, 2 November 1561. 1561.
‘A note or Inventory taken of the principall wrytingte[s] and Evidence[s] that remayne in my hande[s] of George Puttenhms Esquire the xix daye of October in the xxijth yeare of the Raigne of or soveraigne Ladye Elizabeth &c. [i.e. 19 October 1580] all wch are conteyned in two great Boxes whereof one hathe in him xv. smale Boxes and the other but xiiij as folloueth…’, 8 folio leaves, [1561-November 1580]. A detailed and systematic listing [? by Paulet] of some 100 deeds, bills, leases, bonds, acquitances, agreements, releases, certificates, wills, statutes, rentals and other documents, alphabetically arranged in groups, on ff. [1r-5v]; followed (on ff. [6r-8r]) by ‘A note of suche wrytinge[s] and Evidence[s] as have been delivrede to Sr John Throckmorton mr Puttenhn and theire servante[s] since the takeinge of the white ffryards’. 1561-80.
Quoted in Willis, p. 457.
A court roll concerning George Puttenham and the manor of Sherfield, on a long strip of vellum, 7 March 1563/4. 1564.
A bill of complaint to the Queen by George Puttenham against John Ashe concerning money owned to him in accordance with a statute staple resulting from a bond for £400 made earlier to Ashe by Henry Pockham who had since been attainted and executed, 13 May 1564, together with the Answer of John Ashe, denying the debt, on two membranes of vellum, . 1564.
Receipt, in a clerk's hand and signed by George Puttenham, for an obligation in paper by Richard Paulet, 24 July 1564. 1564.
Quoted in Willis, p. 459.
Record of a case between George Puttenham and Robert Dowe, in a Chancery Close Roll on vellum, Westminster, 3 April 1566. 1566.
Record of a case between George Puttenham and Thomas White concerning Richard Springham, in a Chancery Close Roll on vellum, Westminster, 23 July 1566. 1566.
A bill of complaint to the Queen by John Bardolphe, parson of Shaldon, about repeated assaults upon him by Sir Richard Apryce, William Longe, James Kerbye, John Joyner and others, who, on 11 July 1566, ‘wyth force and Armes and in Ryotous forcible and vnlawfull manner…wyth Billes gleves Staves swordes and other weapons Invasyve and Defensyve…dyd beate and grevouslye hurte and eville intreate’ him, pulling away a great part of his beard, to the fear of his life, an assault repeated about 7 August 1566 by George Puttenham and ‘dyvers of his Srvauntes to the Number of viij or ix p[er]sons’, who did also violently ‘break and throwe downe the dores of the said p[ar]sonage howse’ and ‘Caste hymne vpoon the ground and trode vppon’ him ‘wyth their fete’; Sir Richard Apryce's answer to this complaint; and the answer of Alice Mylles to Bardolphe's bill of complaint, on three membranes of vellum, . 1566.
A bill of complaint to the Queen by John Ashe against George Puttenham for his detaining and refusing to surrender a Statute Staple, making reference to a deal struck with Puttenham in or after 1556 when the latter supposedly ‘had good frendes which weare in good favor and estimacion with the saide ladie Quene Marie’; the answers of Puttenham's refuting Ashe's ‘slanderous’ allegations; and Ashe's replication to these answers, on three membranes of vellum, 1566. 1566.
Recorded in Eccles, p. 108. Quoted in Willis, p. 385.
Bill of complaint to Sir Nicholas Bacon by Richard Hartilpoole of Clerkenwell, accusing George Puttenham of defaulting in the payment of various debts and financial promises incurred during the course of some years of service, including his attending Puttenham on a six-week trip to Flanders, and a transaction with one Endlowe of London, a merchant lying in prison, in which Hartilpoole was ‘ignorantly’ duped, Puttenham being described as ‘a man of suche lewde lascivious, and wicked disposit[i]on in his lyvinge (to shamefull and to abomynable herein to be resyted)’ which he maintained ‘wth cullorable and indirecte practises’ and whose ‘detestable lief’ and ‘oppressions of poorer men’, such men as Thomas Brooke, Thomas Moore, Thomas Lipscombe, Thomas Puller, Thomas Ordeney, Giles Moore, John Bardolph and others have ‘friendly and secretly’ tried to persuade him to forsake, 29 April 1567; with Puttenham's answer, dismissing these allegations as ‘most of them…ymagyned and subtilly devysed’ slanders, on two large membranes of vellum, . 1567.
A formal licence to pass beyond the seas granted to George Puttenham by Queen Elizabeth, in a professional secretary hand, signed at the top by the Queen and bearing her seal. 5 May 1567.
Quoted with a facsimile, in Willis, pp. 396-9.
Autograph letter signed by Robert Horne, Bishop of Winchester, to Sir William Cecil, strongly opposing the appointment as a Justice of the Peace of George Puttenham, who ‘is a notorious enemie to god's truthe’ and ‘Sure his evel Life, his troublesom behavour is not vnknowne’, 21 January 1568/9. 1569.
HMC, Salisbury MSS, Part I (1883), p. 392. Quoted in Willis, pp. 398-9.
Pleadings, in Latin, in the Court of Chancery, Westminster, in a case concerning George and Richard Puttenham and the manor of Sherfield, on one large membrane of vellum, [c.12 February 1568/9]. 1589.
A bill of complaint to the Queen by Richard Hartilpoole (‘a verye poor and Aged man’) about George Puttenham's unlawful removal of bedding from his house to Puttenham's dwelling house in Trinity Lane, London, about 1564-65 [September or October 1565], and his withholding for three years of a £5 annuity due to him according to his deed of 5 April 1565, ; the answers of George Puttenham to Hartilpoole's bill of complaint, 17 May 1569; the replication of Hartilpoole to Puttenham's answers, 19 May 1569; interrogatoreis to be administered on behalf of Richard Hartilpoole to George Puttenham; Depositions of Edmund Walwyne, Richard Price, Richard Dyckenson and John Francis Maganza in answer to interrogatories by Puttenham, 6 June 1569; and (at the top) a warrant by the Queen and Master of Requests for the arrest and imprisonment of George Puttenham because of his disobedience, ‘To the manyfeste contempte of vs and or said Counsaill’, of their decree and other letters of injunction relating to Hartilpoole's bill of complaint, on five membranes of vellum and five folio pages, 24 July 1569. 1569.
Interrogatories, answers and depositions relating to Puttenham's supposed connection with John Hodges and a plot against the life of Sir William Cecil, 19-20 February 1569/70. 1570.
Quoted in Willis, pp. 401-12.
Deposition of George Puttenham in answer to interrogatories administered to him relating to the conduct of John Hodges (including Hodges's alleged advice that Puttenham should have ‘sought’ his ‘byll’ not by ‘Mr Secretary’ [William Cecil] but by ‘my Lorde of Leycester’ who ‘ys the chyck that sytteth next the hennes yt ys he that shall mary the Quene when all his doon’) and denying that Puttenham ever accused Cecil of being ‘a corrupt man’ or of offering money to anyone to kill him or of saying anything against the honour of either Leicester or ‘his good and gracious Ladye’ the Queen; also referring to his letters attempting to ‘purchase her Mate[s] favor, wch by vntrewe reporte[s] p[er]haps of late hath been w[ith]drawen’; written in the secretary hand of a clerk and signed at the foot of each page by Puttenham himself (‘Ge. putenham’), on 7 folio pages, 20 February 1569/70. 1570.
Articles disproving a suit by Richard Puttenham relating to George Puttenham and Francis Morris [February?] 1569/70. 1570.
Petition to Queen Elizabeth. c.1560s-70s.
In: A folio guardbook of miscellaneous Elizabethan papers, stamped foliation 1-280.
Deposition of Julio Mantuano, in Italian, affirming that five months earlier his employer George Puttenham offered him 200 gold scudi and a gold chain to kill his enemy the Bishop of London and that many times he spoke wicked words against the Queen and about the way she allowed herself to be governed by four petty scoundrels (quattro forfanti minimi), principally the Earl of Leicester, the document endorsed by William Cecil, 1 April 1570. 1570.
Quoted, in English translation, in Willis, p. 412.
Copy of an order by the Council in the Privy Council Registers, agreeing, with sureties of £200, to allow Puttenham, currently prisoner in the Fleet, to appear at Winchester Assizes, 15 June 1570. 1570.
Dasent, VII, 364.
Pleadings, in Latin, in the Court of Chancery, Westminster, in a case brought 27 August 1570 by George Puttenham, Richard Puttenham and Richard Charnock (their brother-in-law) against one Ansley, on one large membrane of vellum, [October-November 1570]. 1570.
Bill of complaint to Sir Nicolas Bacon by George Puttenham, with answers to it by the defendants Allen Egloubie, John Deninge and Francis Morris, and Puttenham's replication to Morris's answer; Egloubie's testimony claiming that they had lawfully broken into certain of Puttenham's ‘coffers’ or ‘chestes’ where they had found ‘secretly hidden and laied vpp to no good purpos certen coapes Vestemente[s] masse booke[s] Stolles Supaltarries…and soche lyke trumperie fitt for the s[er]vice of the masse and other Papisticall Service nowe abolisshed’, on five membranes of vellum, November 1570. 1570.
A bill of complaint to Sir Nicholas Bacon by George Puttenham and Elizabeth, Lady Windsor, claiming redress from Edmund Windsor, brother of the late William, Lord Windsor, for revenues from lands in Sussex, Berkshire and Hampshire which properly descended from Sir Andrew, Lord Windsor, to her; Edmund Windsor's answer dismissing the claim; the replication to this by George Puttenham and Elizabeth, Lady Windsor, supporting their claim; and Edmund Windsor's rejoinder, on four generally large membranes of vellum. c.1570.
Quoted in Willis, pp. 399-400.
A bill of complaint to the Queen by Francis Morris, accusing George Puttenham of inciting Thomas Baker and ‘dyvers other Ryotouse and evyll disposed p[er]sonnes…in vearye Ryotouse forcible warlike Rebellious and vnlawfull mannr…wyth Swordes Bucklers longe piked Staves welshe hookes and other weapons’ to break into the water mill at Sherfield and ‘in most Cruell and vnlawfull manner assault beate and wounde’ him to the ‘greate p[er]ille and Daunger of his lyffe’ and alleging that this happened ‘oftentymes’ [May 1571]; the answer of Puttenham and Thomas Baker to this bill, alleging that Morris ‘did falcelye and most maliciously corupte abette and p[ro]cure c[er]ten lewde p[er]sons to accuse’ Puttenham ‘of sundry greate and daungerous matters to th intent to bringe him to vtter discredyte and confusyon’, that Morris and others broke into his mill and ‘brake vp all his cofers stonderds and cheste[s] locked and ransackt and ryfled his goods…lyinge secretle in wayte to assaulte beate hurte wounde or kill’ him; and the replication of Francis Morris to Puttenham's answer, defending himself against the accusations ‘most sclaunderously and falsely’ made by Puttenham, on three large membranes of vellum, . 1571.
Interrogatories to be administered to William Pooley, parson of Sumworthe, and John Godsen on behalf of George Puttenham in connection with his suit against Francis Morris, concerning William Cater, ‘the principall worker of George Puttenh[a]ms trobles’, and his slanderous ‘accusacions’ against him, including whether Cater had said that ‘all the Judges in England were corrupted by the said George Puttenh[a]m’ and whether he tried to ‘subborne p[er]swade or stirre’ Pooley or Godsen ‘to accuse impeche or sue testifie or disclose matter against hym concerninge any cryme or offence against the Quenes Ma[jes]tie or the estate of this Realme’; and the answers signed by Pooley and Godsen, generally disavowing knowledge of whether Cater was chiefly responsible for Puttenham's ‘trobles’, on one membrane of vellum and three folio pages, [1571-2]. 1571-2.
Interrogatories to be administered to William Cater on behalf of George Puttenham and Margaret Marryner, the 78 questions concerning the alleged destruciton of her house by Francis Morris and others and the opneing of Puttenham's coffer of writings, aksing whether Cater was ‘not ill content’ if Puttenham appeared before the Council ‘for that the Lordes of the counsell knewe you well enough, And that the said George Puttenh[a]ms credit was cracked’, and whether he wrote encouraging Puttenham ‘to seeke revenge vppon’ Francis Morris and wanted him to burn his letters ‘lest yor conferringe wth hym might be knowne’; and the answers to this signed by William Cater, on five long membranes of vellum and seven folio pages, 22 May 1572. 1572.
Interrogatories to be administered to George Puttenham on behalf of Francis Morris concerning the alleged violent break-in of the mill at Sherfield, on one membrane of vellum; together with Puttenham's deposition in answer to these interrogatories, defending his rights to the manor of Sherfield and his alleged forcible breaking into the mill there, in the cursive secretary hand of a clerk, on 4 folio leaves, signed by Puttenham (‘Geo. Putenam’) on three of them, 31 May 1572. 1572.
Replication of Margaret Marryner to the answer of Edmund Morris, Jerome Wakesfield, Alan Eglonbye, John Digweede, and Humphrey Wake, supporting her bill of complaint concerning the destruction of her house as tenant, confirming George Puttenham's possession of the manor of Sherfield as her ‘true Landlorde and lawfull mast[e]r’, alleging that Francis Morris was responsible for the breaking into his manor where they ‘brake open all his cases locked and ransacked all his moveables goods wrytinge[s] ch[arte]rs leases bookes of Accompte Inventoryes’, etc., as well as ‘many other the lyke outrage[s] Demolishinge of houses…and vnlawfull facte[s]’, on one membrane of vellum, [c.1572]. 1572.
Copy of a royal injunction on Puttenham for Paulet's debts, in Latin, on an oblong folio page, January 1572/3. 1573.
In: 18 items chiefly relating to the case of George Puttenham versus his estranged wife Elizabeth Lady Windsor.
A bill of complaint by George Puttenham and Margaret Marryner against Francis Morris, his brother Edmund Morris, Allayne Eglonbhy, John Digweede, Thomas Digweede, John Bailife, Jerome Wakefielde, John Ellizander and others about their forcible entry into the house at Sherfield of Puttenham's tenant Margaret Marryner on 23 April 1571 and, along with William Cater, brother-in-law of Francis Morris, their subsequent repeated destruction of the house even after being rebuilt, when ‘wth swoordes drawne’ they pulled her out ‘by the heare of her hed and thrust owt her servant and…a suckinge childe…in the Snowe, where they were like to have perished for colde’, and their entering the mill at Sherfield and wounding ‘wth a swoorde’ one of Puttenham's servants, 5 May 1573; the lengthy answers to this by William Cater and Richard Hedd, referring to Puttenham as ‘a man well knowen to the worlde to be vniu[er]sallie malicious, inventious vnquiette full of brables of subtyll practyses and slanderous devyses…overconnynge in defacinge of truthe by wordes & speache eloquente and in invenc[i]on of myscheiffe verie p[er]fytte’; and the answer of Alleyne Eglebye, dismissing Puttenham's complaint as ‘full of faults…vntrue reportes and malicious pre[cee]dinges’, on three membranes of vellum, . 1573.
Copy of a commission by the Queen, concerning the River Loddon between Basingstoke and Twyford, addressed to John, Marquess of Winchester, and numerous other Hampshire gentlemen, including George Puttenham. 1573-4.
A fine between Sir John Throckmorton and George Puttenham and his wife Lady Windsor of the manor of Herriard and various lands for £120, [June] 1574. 1574.
Copy of an order by the Council, in the Privy Council Register, commanding the Warden of the Fleet prison to pay Puttenham £20 due to him, 22 July 1574. 1574.
Dasent, VIII, 274.
Deposition of George Puttenham in answer to interrogatories by John Paulet, defending the lawfulness of his proceedings and confirming that he made a deed obligatory in the name of John Paulet for £4,000; written in the cursive secretary hand of a clerk, signed by Puttenham eight times (‘Geo. putenham’) against various answers on two pages, on 5 folio pages in all, 11 May 1575. 1575.
Interrogatories on behalf of John Paulet against William Woodes, Richard Scoopham, Edward Felder and William Spire; interrogatories by John Paulet against George Puttenham, comprising seventeen questions about the estate of Elizabeth Lady Windsor and what happened to it, including ‘Wheather dyd you of yopr owne accord make seale & deliu[e]r vnto the said La: in the name of the said John poulet ane writinge obligatorie of the some of fowre thousand pounde[s] sufficientlie to dischardge the said John poulet his heire[s] Assignes and eu[e]ry of them’; and answers to the interrogatories by Richard Scopham, Williams Woodes (signed), and Edward Fylder, on two membranes of vellum and eleven folio pages, 11 May 1575. 1575.
Interrogatories to be administered to [John] Paulet, his wife Katheryn, John Haryson and others on behalf of George Puttenham concerning what they knew of the ‘deade or deades of guyfte supposed to be made by the Lady Elizabeth windesore’ of money, plate, jewels or other goods ‘to any of her chyldren’, 27 June 1575; and the answers of Katherine Paulet, mentioning that ‘the saide dede’ was drawen up by Haryson, though she did not know ‘who in groste it’, and referring to another ‘being in paper’, on one membrane of vellum and three folio pages, 30 June 1575. 1575.
A formal assignment by George Puttenham and Sir John Throckmorton to Queen Elizabeth for the repayment of outstanding debts, 27 September 1575. 1575.
Quoted in Willis, pp. 413-14.
Copy of a letter by the Council, in the Privy Council Registers, informing the Dean of the Arches of Lady Windsor's suit with her husband George Puttenham and her state of destitution, 31 October 1575. 1575.
Dasent, IX, 39-40.
Copy of a letter by the Council, in the Privy Council Registers, ordering Puttenham to obey the Court of Arches decree to pay his wife Lady Windsor £3 a week from the end of May until 18 November or else to appear before the Council to answer cause to the contrary.12 March 1575/6. 1576.
Dasent, IX, 96.
A note in Latin on the Puttenham-Windsor case, on two folio pages, 14 March 1575/6. 1576.
Quoted (in English translation) in Willis, p. 413.
Copy of a letter by the Council, in the Privy Council Registers, requiring the Archbishop of Canterbury and Bishop of London to settle the dispute between Puttenham and his wife, ‘for that the Ladies case seemeth Lamentable and her husbandes dealinge[s] extreme considering he hath all his Livinge[s] by her’, 20 April 1576. 1576.
Dasent, IX, 107.
A certificate of John Kingsmill, in Latin, concerning an ecclesiastical grant of absolution made to Puttenham and others in connection with the incident when they fought in Herriard churchyard on 9 May 1576, on a small membrane of vellum.
Copy of a letter by the Council, in the Privy Council Registers, ordering Puttenham to pay his wife £112, ‘wh[i]ch he hath heretofore contemptuouslie refused to do’, or else appear before the Council, ‘and not to faile in any wise as he will aunswer to the contrarie at his p[er]ill’, 19 June 1576. 1576.
Dasent, IX, 144.
Copy of a Privy Council order concerning the Puttenham versus Lady Windsor dispute, on a folio page, June 1576. 1576.
In: 18 items relating to the case of John and Sir Richard Paulet and others versus George Puttenham concerning Lady Windsor's estates.
A bill of complaint to the Queen by John Paulet against George Puttenham, relating to Lady Windsor's suit for divorce from him because of Puttenham's ‘wicked and incontynent lyf’ and ‘evill demeanres towardes her’ and his subsequent failure to honour his ‘promyses of reformacon’ or financial obligations ‘being retorned to his former wicked Lief’ with consequent debts to her and Paulet, and alleging that a bill obligatory ‘supposed to be mad to the said George Puttenhm’ by Paulet was ‘false & forged & not the very deed of yor said Subiect…forged & made (as yor said Subiect thincketh) by the said George Puttenhm or some other persone’, ; and Puttenham's answer to this, accusing Paulet of being maliciously intent on ruining Puttenham's ‘good name and fame’ and of ‘beinge noted a man of hym selfe weake of iudgement…ruled by other mens Counsell’, and defending the genuineness of the disputed bill obligatory for 1,000 marks, on two large membranes of vellum, 11 July 1576. 1576.
Deposition of George Puttenham in brief answer to interrogatories of John Paulet, concerning a disputed bill obligatory, in the cursive secretary hand of a clerk and signed by Puttenham (‘Geo. putenham’), on one folio page, 15 July 1576. 1576.
Deposition of George Puttenham in detailed answer to interrogatories by John Paulet, concerning a disputed bill obligatory (details of which he claims not to remember, mentioning ‘he hath had as he thinketh many l[ett]res and other writinge[s] sent vnto him’ by Paulet); written in the cursive secretary hand of a clerk and signed by Puttenham (‘George putenham~’), on three pages of two folio leaves, 21 November 1576. 1576.
A note on a hearing in the Star Chamber, on one page with an endorsement, 16 November 1576. 1576.
Interrogatories by John Paulet against George Puttenham, concerning a disputed bill obligatory for 1,000 marks, including ‘What is the name & Surname of the wryter …and what are the seurall names & srnames of the wytnesses to the sealinge & deliuringe of the same Bill’ and ‘What Specialtyes or wrytinges haue you in yor custodye signed & sealed wth the complainante[s] owne hand &c And how manye & what are the Contente[s] therof’, on one membrane of vellum, . 1576.
Interrogatories to be administered by William Assunden on behalf of John Paulet against George Puttenham concerning the disputed ‘Bill obligatorie of a M[1,000] m[ar]cke[s] which puttenham hathe supposed and averred to be dwe debt to him’, whether Assunden had ‘skill or knowledge in the Law and the Lattyn tounge to make suche a deed’ by himself and whether Paulet did; and William Assunden's answers signed, denying his knowledge of Latin himself, on one membrane of vellum and two folio pages, 5 December 1576. 1576.
Interrogatories to be administered to William Assunden and others on behalf of George Puttenham with respect to a bill of complaint of John Paulet, as to whether Assunden had ever been ‘vsed any tyme to be putt in trust’ between the respective parties ‘to wryte & make leases indentures obligacions dedes or suche other wrytynges’ and whether the obligation for 1,000 marks made by Paulet to Puttenham was ‘all of yor owne writynge’; and William Assunden's answers signed by him, on one membrane of vellum and three folio pages, November [1576/7]. 1576.
An obligation between John Paulet and George Puttenham, signed by Paulet, on a membrane of vellum, 15 February 1576/7. 1577.
‘The Inventorye taken and had the xiijth daye of ffebruarye A° xx° Regine Elizabeth of sundrye evydence[s] goode[s], and implemte[s] of household and other thinge[s] in the tenement late in the occupac of George Puttenhm…the White ffryars neere ffleetstreet in London by katherin Poulett wiefe of John Poulett Esquire…’, on sixteen folio leaves, in a wrapper of a recycled vellum indenture, annotated and inscribed by William Waller to his brother John, 13 February 1577/8. A detailed list (on ff. [2v-12v]) of some 370 numbered documents or groups of documents, in addition to a quantity of unnumbered items (‘more in the same red cheste’, etc.), followed (on ff. [12v-14r]) by a list of 112 ‘Bookes’ (English, French, Latin and Italian), including items at the end such as ‘Two pap booke[s] in pchmt one wryten in Rym dyalog’, ‘one lytle book in velim Contayning a dialog wrytten in Romane hand’, ‘One othr lyttle booke of Certeyne meeters Wryten in honr of her mate[s] name in pchemt bound wth greene leaves’, ‘A pap booke bownde in pchmt entitled a book of Accompte[s] betwene me & my ffarmers of heryard at or lady daye 1574’, and ‘a nomber of papers some Rimes. Riddles and othr Ragged loose papers’. 1577/8.
A bill of complaint to the Queen by George Puttenham, about the breaking-into his house in Whitefriars and other related problems, on 27 broadsheets; together with a petition by John Paulet to ‘your lordship’ concerning the Lady Windsor versus Puttenham dispute, on eight broadsheets, 3 February 1577/8. 1578.
A scribbled note (? by John Paulet) about their losing [? Puttenham's] ‘Artycles’ because they ‘woer of so lytle purpose that we nevr tooke care to prserve them’, endorsed ‘Artycles of Message betwene Powlet & Puttenha[m] vpon the special labor of Putte[n]h[am] by mr Owen’, on two folio pages, Easter Term 1578. 1578.
A letter to Sir Nicholas Bacon by commissioners reporting on the supplication of Lady Windsor to Secretary Walsingham against George Puttenham who ‘laborethe to be discharged of his xcomunycation (for not payment of the sayd somme of xliiijli)’, on a pair of conjugate folio leaves, 30 April 1578. 1578.
Quoted in Willis, p. 453 (as ‘to Lord Bughley (?)’).
A note in Latin on lawsuits against George Puttenham by John, Katherine and Richard Paulet, Barnabus Arnewode, and the scriveners Hieronimus Studley, William Dodd and William Deringe, on a quarto page, 29 March to 12 May 1578. 1578.
Quitclaim to Mrs Paulet, written in the hand of a clerk and signed by George Puttenham and by Sir John Throckmorton, relating to ‘Goodes or wrytynges wthin the white ffryers’, on an oblong slip, 8 May 1578. 1578.
An inventory of George Puttenham's ‘goodes and howsehold stufe’ at his lodgings in the Whitefriars ‘nere flete strete in London to be delyured in extent to John Pawlet esquier and Thomas Ashe gentleman’, including carpets, hangings, plate, furniture, etc., among them ‘iij greate chestes’, ‘ij greate boxes of wood for writinges with little lockes on them’, and ‘viij quiers of paper’, on three folio pages, 16 May 1578. 1578.
A list of legal costs incurred in the case of George Puttenham versus Lady Windsor, on two folio pages, 30 May 1575 to 9 June 1578. 1575-8.
Order by the Council, in the Privy Council Registers, to seek advice of the Master of the Rolls with respect to Lady Windsor's petition, 15 June 1578. 1578.
Dasent, X, 255.
Order by the Council, in the Privy Council Registers, for apprehending Puttenham and his servant John Cressett, 23 June 1578. 1578.
Dasent, X, 260.
Articles to be administered to Henry Burr, deputy to the Under-Sheriff of Middlesex, on behalf of Lady Windsor, concerning George Puttenham's imprisonment, on two folio pages, 24 June 1578. 1578.
Quoted in Willis, pp. 451-2.
Report, in the Privy Ciuncil registers, concerning Puttenham's willingness to defend himself in Star Chamber against the accusation that he unlawfully conveyed lands from Lady Windsor and without recourse to the Queen's pardon, 24 June 1578. 1576.
Dasent, IX, 148.
A letter signed by Sir John Throckmorton, to Sir Henry Wallop, about the verdict at the Hampshire assizes against George Puttenham and Throckmorton's refusal to let Paulet enjoy any lands in Herriard until his title has been tested, on two folio pages and an address leaf, September 1578. 1578.
Quoted in Willis, pp. 453-4 (as ‘to Thomas Ashe (?)’).
Order, in the Privy Council Registers, notifying the Attorney General that they are ‘moved with compassion’ for Lady Windsor and granting Puttenham twenty days to retrieve £120 from Lord Windsor before he appears before the Council, 26 October 1578. 1578.
Dasent, X, 355-6. Quoted in Willis, p. 454.
A letter by Sir John Throckmorton, in the Privy Council Registers, about deferred payment of £220 to Puttenham. 21 October 1578. 1578.
Dasent, X, 363.
Copy of a letter by the Privy Council to Throckmorton, requiring him to appear before the Council to answer Lady Windsor's complaints about his brother-in-law George Puttenham, 6 November 1578. 1578.
A letter by the Council, to Sir John Throckmorton, summonsing him to appear before the Council in order to bring ‘some order’ into the Puttenham-Lady Windsor dispute, 6 November 1578. 1578.
Quoted in Willis, pp. 455.
A letter by the Council, in the Privy Council Registers, to Sir John Throckmorton, notifying him of their requiring him or Puttenham to appear before the Council in order to bring ‘some order’ into the Lady Windsor dispute, 6 November 1578. 1578.
Dasent, X, 375-6. Quoted in Willis, pp. 454-5.
Deposition by George Puttenham in the case of Sir Richard Reade versus Francis Morris, in answer to interrogatories [see below], concerning the dealings of his brother Richard with his servant, the Italian-born Francis Manzaga, including reference to Manzaga's having once forged a deed in Venice and to ‘an evill prank’ played by him when in Richard Puttenham's service; written in the hand of a clerk on two broadsheets (a third continuing with a deposition by Thomas Temple), each signed by Puttenham (‘Geo. putenham’), 28 November 1578. 1578.
Recorded in Eccles, p. 108.
Interrogatories to be administered to Francis Morris (husband of Richard Puttenham's daughter) on behalf of George Puttenham, about the circumstances of his forfeiture of £1,000 to the Queen by virtue of confiscation and Morris's stay of it and repayment of it into the Exchequer; with Francis Morris's answers signed, confirming that ‘the byll signed by her matie was staied and Revokd’ by his means, on a membrane of vellum and two broadsheets, 2 December 1578. 1578.
A letter by the Council, in the Privy Council Registers, requesting Dr Lewes and others to ascertain what is owed to Lady Windsor by Puttenham, 8 December 1578. 1578.
Dasent, X, 430.
Letter signed by Sir John Throckmorton to Sir Francis Walsingham about the arrest of George Puttenham, [20? December] 1578. 1578.
Articles of the Privy Council to be administered to Puttenham concerning his dealings with Sir John Throckmorton, [20? December] 1578. 1578.
A letter signed by Sir John Throckmorton, to Sir William Cecil, Lord Burghley, notifying him of the London sheriff's apprehension (‘wth some difficultie’) of his brother-in-law George Puttenham and requesting leave now to repair to his own house, 21 December 1578. 1578.
HMC, Salisbury MSS, Part 2 (1888), p. 226.
‘The answer of George Puttenham esquire, to the articles propoundedby the Lordes of the Councell’, concerning his dealings with Sir John Throckmorton, ‘this xij or xv yeares’, written in the secretary hand of a clerk and signed at the end by Puttenham (‘Geo. Putenham’), on four folio pages, 22 December 1578. 1578.
Warrant by the Council, in the Privy Council Registers, for the Keeper of the Gatehouse, Westminster, to receive Puttenham into custody, 23 December 1578. 1578.
Dasent, X, 435. Quoted in Willis, p. 455.
Throckmorton's answer to articles, in a professional hand, [22? December] 1578. 1578.
A letter signed by Throckmorton, to Sir Francis Walsingham, requesting the process in the Exchequer against him and Puttenham to be stayed, 23 December 1578. 1578.
Autograph letter unsigned, probably by Richard Puttenham to his brother George, complaining of his ‘Ingrate dealinge’ and the ‘so greate & continuall’ and apparently ‘endles’ trouble he causes his friends and relations, all of whom he has now alienated, [31 December] 1578. 1578.
Quoted in Willis, pp. 456-7.
A note about Puttenham's dealings with his brother [Richard] in Flanders in connection with the purchase of Sherfield and his making over the property to Throckmorton; together with an autograph note by Throckmorton [? December 1578]. 1578.
Quoted in Willis, pp. 396, 412 and 457.
Autograph draft notes (unsigned) by George Puttenham for Sir John Throckmorton, about his dispute with his wife and how Throckmorton should conduct himself before the Privy Council, with interspersed autograph comments by Throckmorton, on two folio pages [c.December 1578]. 1578.
Interrogatories to be administered against Francis Morris on behalf of Sir Richard Reade in the case of Reade versus Morris, concerning Richard Puttenham's residence at Sherfield and Francis Manzaga, including whether Morris knows ‘the hand in Wrytinge’ of Puttenham or whether he knows if Manzaga ‘was eur detectyd of eney foergerey or other fallshood’, on a long strip of paper, . 1578.
A draft letter by Lady Windsor, on the back of an unrelated letter, to Dr Lewis and the Commissioners of the Court of Delegates concerning her lawsuit, on four folio pages. c.1576-8.
A bill of complaint to the Queen by George Puttenham accusing John Paulet and his wife Katherine of ‘beinge malycyously bent and apt’ to do anything to hinder Puttenham's marriage with Paulet's mother Elizabeth, Lady Windsor, of persuading her ‘by fair words and slye practises’ before the marriage to sign a blank sheet of paper (‘the hand of the sayd Ladie Elizabeth so well knowen’) and then of forging a deed of gift to Paulet in 1571-74, with which they, John Harrison and others have tried to get hold of goods and chattels inherited by Lady Windsor from William, Lord Windsor; the separate answers to this by Cuthbert Bradford, 13 June 1575, Katherine Paulet, 25 June 1575, and John Paulet, 27 November 1575, dismissing the allegations and claiming that Puttenham ‘wastfully and as the common reporte is, very dishonestlye’ took advantage of ‘all the goodde[s] chattels and Juels of the Lorde Windsor and Richard Powlette w[i]thowt any p[er]formance’ of Lord Windsor's will; and the replication of George Puttenham to these answers, confirming his claims, on five membranes of vellum, [1575, but docketed Trinity 1578]. 1578?.
Puttenham's replication quoted in Willis, pp. 447-8.
Declarations of financial accounts and arrangements made between George Puttenham and Sir John Throckmorton in 1573-74, on three folio pages, endorsed ‘Before the lls [i.e. Lords]’, [1578?]. 1578.
Articles exhibited by George Puttenham to the Archbishop of Canterbury and ecclesiastical commissioners, concerning the ‘malice’ of Lady Windsor and her children, including allegations that she cohabited with her late husband's ‘most mortall enemies’ and sought to defraud him, on four pages of two pairs of conjugate folio leaves. c.1578.
Quoted in Willis, pp. 439-41
Details of Puttenham's revenues by Lady Windsor, on one broadsheet. c.1578.
Lady Windsor's allegations against George Puttenham exhibited before the ecclesiastical commissioners, to get a divorce, on two broadsheets. c.1578.
Notes on the manor of Herriard, its rates and land transactions relating to George Puttenham, including notes by Sir Richard Paulet (d.1614) outlining causes of the dispute between Puttenham and John Paulet, on four quarto pages, 1578. 1578.
A draft list of interrogatories, about whether an unnamed witness knows George Puttenham and can throw light on ‘wrytinge[s]’ concerning Herriard, on a small folio page. c.1578.
‘Notes touching fraudulent deedes of guifte’, on one quarto page; a two-column list of ‘obiections of Sr J. Throckmorton’ and ‘Answere of [John] Poulett’, endorsed, possibly by Puttenham, ‘Pawlete[s] demandes’, on two folio pages.
Quoted in Willis, pp. 428-9.
A bill of complaint of Lady Windsor against George Puttenham, enumerating her troubles with him for fifteen years (‘…not havinge the feare of god before his eyes [he] most wikydlie hather eur since lyved most incontene[n]t geving him self our to whoredome and other ungodly lief…not only wasted and consumed all [her] landee[s] and goode[s], But also in the same tyme moche [misabused?] her wth c[o]r[po]rell stripes beatinge[s] and other vnseamely acte[s] and demeanoures’ wasting her revenues ‘in the mainteynaunce of most vnhonest women and Nursinge of his Base borne children by him begotten of them’), on three broadsheets. c.1578.
Quoted in Willis, pp. 434-6.
A bill of complaint against George Puttenham addressed to Lord Burghley by Robert Hunt, John Wilwey, Marsell Whitley and John Talnall, farmers of various manors, relating to various of Lord and Lady Windsor's estates, alleging that c.1572/3 Puttenham took advantage of the absence of the Windsors' overseer to take unlawful possession of their premises, on twelve broadsheets, 1578. 1578.
A statement in Latin about the Puttenham-Windsor case, on two folio pages. c.1578.
A note in a secretary's hand, signed by George Puttenham (‘Geo. putenham’), presumably to the Paulet family, requesting them to ‘yelde me myne owne wth quyetnes’ and let the bearer Mr Owen have ‘the Inventory you haue take of my goode[s] or a copie therof’, on a small slip of paper. c.1578.
Lady Windsor's answers to George Puttenham's articles, passionately accusing him (‘so wicked a man voyd of all conscyence’ who ‘maried the Landes and the liuinge and not the woman’) of ‘vildlie’ treating her ‘more like a kytchin slaue then like a wyfe’ (‘Latelie ye haue most wickedlie attempted…to spoile me of my life wch beyng so I way ye ar no man for me to keepe any socyetie wth’), threatening to reveal such matters as his ‘sclawnderouse tounge hath Ranged’ as he will ‘spedelie Repent’, contemptuously dismissing his various allegations (‘you feare yor owne shadow’), swearing ‘you shall not still play the p[a]rte of Oliuer omrant as hetherto yor glorious hed p[er]swadeth you still that you daunce in a net so as no bodie may espye yor devises’, and declaring that he has ‘consumed and spoiled almost all’ and that what she herself has carried away ‘scarse amonteth to a payre of hose to my legge[s]’, on three folio pages. c.1578.
Quoted in Willis, pp. 438-9.
An autograph draft letter by Lady Windsor to ‘yor worshipps’ about Puttenham's ‘false sugestions’ (‘he hath such power to abuse you…he derideth you all, to yor owne faces’) and his cruelties to her (‘tendringe to the immynent danger of my life The manr whereof at large I am Ashamed for womanhed…to dilate vnto you’). Written on the back of an address leaf addressed by Katherine Paulet to her husband John Paulet, on a pair of conjugate folio leaves. c.1578.
Quoted in Willis, pp. 441-2.
Extract from a quitclaim, in court hand, by William, Elizabeth and John Paulet to Ralph and John Knight, on two broadsheet pages. c.1578.
‘A note of the first takinge of [Puttenham's] house in the Whitefriars’, a copy of various depositions in the case, on three folio pages, February 1578/9. 1579.
‘A declaracion of the true value of all soche Rente[s] Anuyties and Lande[s] as were graunted by George Puttenham Esquier vnto Sr John Throckmorton knight…xvij ffebruarie &c 1578’, on both sides of a broadsheet. 1578.
Copy of a letter by Sir John Throckmorton, concerning money received from farms and including news that the Sheriff has entered the manor of Herriard with ‘greate vyolens’, dispossessing tenants and delivering lands to Sir Richard Paulet, on four folio pages, 18 March 1578/9. 1579.
Autograph addition by George Puttenham of fourteen items to his schedule of the writings, evidences and muniments in his possession which were in his house in the Whitefriars on the day of the entry and ‘outrage’ committed upon him by Thomas Lord Paulet and others; the main text written in the hand of a clerk, on both sides of two membranes of vellum, [1578-79]. 1578-9.
Autograph addition by George Puttenham of five questions (Nos 34-38) to his interrogatories to be administered to John Paulet, Katherine Paulet, Richard Paulet, John Hall and others concerning Thomas Paulet's rifling of Puttenham's papers; the main text written in the hand of a clerk, on both sides of a membrane of vellum, [1578-79]. 1578-9.
Copy, in court hand, in Latin, of the final concord between Lady Windsor and Jane Kydwelly about land at Herriard and elsewhere, on two folio pages. c.1578-9?.
Draft of Lady Windsor's responses to George Puttenham's allegations, on four folio pages. c.1578-9.
‘Briefe: notes declaringe sundrye devises and p[er]swasions vsed by mr Puttenhm to the Ladye Windsor his wiefe; and others, as meanes to accomplyshe his foule and ravenous practyse of disseason in the Manor of heriard to the…spoile of John Poulett’, on a broadsheet. [c.1578-79].
‘The Lady windsors answere to the vntrue Allegacons of George Puttenhm to the Lo Archebysshopp of Cant and the Lorde of London’, including her claims about ‘in what meane estate she tooke him’ which should have ‘caused a man of honest and good disposyc[i]pon to haue had a great deale more care and regard for the maintenance of her happy dayes’, about ‘his cruell and vnmanly handlinge of her thourough Stripes. pynches. and suche lyke’, the ‘beastlyke demeanures’ of ‘so incestyous and vnsatyable a man wth diurse lewd women’, and other offences by him so that ‘She thinkethe also herselfe bound to abandone the company of so evill & vytious a p[er]son least she should be partaker of his iust punyshm[en]t for the same’, on six folio pages. c.1578-9.
Quoted in Willis, pp. 442-5.
Autograph addition by George Puttenham of three questions (Nos 29-32) to his interrogatories of Hieronimus Studley and William Dodd relating to his papers that were allegedly rifled by Thomas Paulet; the main text written in the professional hand of a clerk, on the recto of the second of two long membranes of vellum, [1578-79]. 1578-9.
Answers of Richard Paulet, Francis More and William Dodd to George Puttenham's bill of complaint about their breaking into his house in the Whitefriars, on eight broadsheets. c.1578-79.
Letter, or copy-letter, signed by Sir John Throckmorton, to Sir John Paulet, on three broadsheet pages, 28-31 March 1579. Concerning financial matters partly relating to George Puttenham and his wife and mentioning his own search of ‘a nomber of papers and bookes confusedly scattered in dyvers places’ concerning his debts, mentioning also in a postscript the violent and outrageous manner in which the Sheriff of Hampshire has entered the manor of Herriard and dispossessed all the tenants to deliver the estate to the Paulets; subscribed with a note signed by Paulet's wife Katherine. 1579.
Order by the Council, in the Privy Council Registers, to deliver the disputed lands of Puttenham to John Paulet, 1 March 1578/9. 1579.
Dasent, XI, 61.
Allegations exhibited 10 May 1577 and the response of Lady Windsor, on one folio page, Easter 1579. 1579.
George Puttenham's replication to ‘the severall Answeres’ of Lord Thomas Paulet, Katherine Paulet, Richard Paulet, Francis More, Thomas Welche, William Dodd, John Halle, Thomas Ayshe and John Wooldrige, on seven broadsheet pages, 17 May 1579. 1579.
Quoted in Willis, pp. 447-8.
Council proceedings, entered in Robert Beale's hand: in the Privy Council Registers, about investigating the dealings of Puttenham and Sir John Throckmorton, 17 May 1579. 1579.
Dasent, XI, 129-30.
A bundle of twelve vellum documents, heavily mutilated, relating to the Paulet family's alleged outrages against Puttenham. Including: Two bills of complaint to the Queen by Puttenham, one for 3 February 1577/8, referring to the Paulets' breaking ‘in most riotous & violent manner’ into his lodgings in Whitefriars and into ‘two cheste[s] & iii or iiij caskette[s] deskes & hampers that co[n]teyand nothinge but evidence[s] deeds & wrytinge[s]’ of his and others committed to his charge ‘concerninge lande[s] tenemente[s] goode[s] cattell debte[s] righte[s] and intereste[s] to a very greate valewe’ and forcibly abducting and imprisoning him in Middlesex; answers to his bill of complaint by Lord Thomas Paulet (31 January ‘1578’), Richard Paulet, Thomas Welche (referring to Puttenham's ‘troublous nature and Malicious mynd’, 23 January ‘1578’), John Wooldrige (3 February ‘1578’), John Hall (who executed the writ of excommunicatio capiendo on Puttenham), Richard Paulet (again), Francis More and William Dodd; Puttenham's interrogatories to be admininstered to John Hall (including whether he did ‘assaute the sayde Putenhm by the highway syde as he roode, and pursed & Chased hym a myle or twoo wth yor sworde drawen’, and Hall's answer); and ‘The replicacone of George Putenham’ to certain of the answers; a note in Latin on the examination; and a fragment dated 18 May 1579. 1578-9.
Quoted in Willis, pp. 448-40 (as ‘STAC 5/P33’).
Autograph ‘Petitions’ by George Puttenham ‘to be exhibited by yow whan ye haue tried all that can be doon of the former pointe[s]’, drafted for Throckmorton's use, with interspersed autograph comments by Throckmorton; on one folio page, [June?] 1579. 1579.
Autograph memorandum by George Puttenham ‘Concerninge the court. pointe[s] for Sir T[hrockmorton]. to consider of’ in order to ‘rydde owreselvs of this trowble at the court’ but stressing that his appearance before the Council would ‘vttrly destroy’ Puttenham; on three folio pages, [June?] 1579. 1579.
Lady Windsor's petition agianst George Puttenham and Sir John Throckmorton, concerning ‘the sinister dealinge[s] of them therin’ with respect to lands at Herriard, docketed with a note about the delivery from Sir Francis Walsingham of relevant documents concerning Herriard, on a broadsheet, 3 July 1579. 1579.
Autograph agreement signed by George Puttenham (‘Geo. putenham~’), countersigned by his former wife Elizabeth Lady Windsor (‘Elizabethe wenser’), for a settlement between them, specifying his allowances to her and overseeing by Sir John Trockmorton or someone else appointed by the Council, Puttenham's text considerably emended in the hand of Lord Burghley, who has also added the names of the Lords of the Council; on one folio page, tipped into Volume IV of the Privy Council Registers, Greenwich, 13 July 1579. 1579.
Dasent, XI, 188-9.
The Council's settlement of Lady Windsor's case against Puttenham, in the Privy Council Registers, 13 July 1579. 1579.
Dasent, XI, 168.
Articles of agreement between Lady Windsor, George Puttenham and Sir John Throckmorton, written and signed in her hand, on a folio page, c.July 1579. c.1579.
A note of arrears due to Lady Windsor from 30 May 1575 until her divorce from Puttenham on 9 June 1578, on one folio page, [November 1579]. 1579.
‘An Inventory of suche goode[s] and cattells of George Puttenham Esquyer as remayned att vpton and heryerd…praysed & vallewed’ by John Hyde and ten other valuers, on a folio vellum leaf, endorsed with notes about other legal documents. 1579.
A series of depositions, interrogatories and answers concenring Thomas Paulet's and others' alleged outrages against George Puttenham, including Puttenham's interrogatories for Thomas Ashe, son-in-law of Lady Windsor, with 26 questions, and the answers (chiefly signed) by Thomas Welche (26 January 1578/9), Thomas Ashe (24 May 1579), Katherine Paulet (27 May 1579), Thomas Lord Paulet (13 February 1578/9), Wiliam Dodd (28 November 1578), Francis More and Richard Paulet, on three membranes of vellum and 39 folio pages, . 1579.
Council proceedings, in the Privy Council Registers, wanting Throckmorton to find out why the agreed settlement by Puttenham was not performed, [c.1579-81]. c.1579-81.
Dasent, XI, 299.
Bill of complaint to Sir Thomas Bromley, Lord Chancellor, by William Bethell of Winchester, accusing George Puttenham, Robert/Thomas Hannington, and John Warne of conspiring to undermine Bethell's rights in a manor in 1561/2; with the answers of Puttenham, Hannington and Warne denying the charge, on two large membranes of vellum, [undated, but between 1579 and 1587]. c.1579-87.
‘The Coppye of the Inventory of the plate goode[s] and catalle[s] of the right honerable will[ia]m lorde wyndesor’, on a roll of 24 broadsheets.
A note of extracts from court rolls of the manor of Herriard when it was in the hands of Sir Richard Paulet and George Puttenham, on four folio pages, undated. c.1570s.
‘A declaraco[n] of the waste made in and vppo[n] the houses and growndes at heriarde by George Puttenhm Esquire’, on a broadsheet, undated.
Another note about George Puttenham's land-holdings in the manor of Herriard, on one folio page, undated.
‘A copy of mr putenam Apeale’, in Latin, on two folio pages.
Depositions by seventeen persons in answer to Lady Windsor's allegations about George Puttenham's adultery with various women, the children they bore him, and the physical violence he had inflicted upon herncluding various testimonies that Puttenham was reputed in the country to lead ‘a very evill and dissolute lyfe’, ‘a verye vngodlye life’, living ‘incontinently’, ‘wth dyvers women a longe tyme’, and to keep ‘a young woman secretly’, being ‘a hansome comelye younge woman’; that he kept at his own charge Elizabeth Johnson (who, by one account, named herselfe ‘Besse Malon’) at a house in Upton Grey and that he was seen to visit her ‘secretlye’ at various times for half an hour or more at a time in a chamber with the door kept shut; Elizabeth Johnson's own testimony confirming that, after having her brought to a house in Paddington, Puttenham ‘wth much adoe had his pleasure carnallye wth her’ and then kept her at his charge in various houses over a period until his wife Lady Windsor and others found her at Upton Grey and brought her to Herriard Manor; others, including widwives, reporting that ‘a wenche’ named Eleanor and Katherine Kirby both had children by Puttenham, who paid for their nursing, and that Eleanor was now Nicholas Newbold, the parson of Bradley's, wife; Thomazine Harte also testifying that Puttenham and his man James Kirby had made repeated attempts, with ‘greate offers of rewarde[s]’, to ‘allure her Daughter to consente…to satisfye his fylthye lustes of concupisence and fornicac[i]on’, offers which she ‘vtterlye abhorred’, which led to much ‘discorde and displeasure’; with further reports that Puttenham had ‘often tymes beaten and struken the saide Ladye Eliz his wiefe and behaued him selfe very Rigorrouslye by punchinge and throwinge her downe by violence’, on one occasion, ‘in his rage and furye’, throwing his wife ‘downe like to burste her backe & Rybbes’, in Latin and English, in a folio booklet of 22 pages. c.1570s.
Quoted in Willis, pp. 415-18.
‘The cause of complaynte Wronge[s] and Iniuries sustayned by the Lad Elizabeth Windesor By George Puttenham her husband by the space of these xv yeres last past’, about Puttenham's ‘lewd dealinge[s], accusing him of adultery with Izarde Cawley’, her servant and gentlewoman, whom he tried to marry off ‘the better to geave Colloure to his incontinente Dealinge[s] wth her’ the very thought of which ‘had almost coste the sayd La[dy] her lieffe’, his harrassment of another ‘waitinge gentlewoman…of tender yeres called Mary Champneys’, as well as one Jane Woodes (he ‘assaulted the said maiden in moste wicked maner and therewth also shewed her what thraldome and miserye she should sustayne and therefore the next way was to assente vnto him in his Carnall Desires…after that he brote her wth child and Carried her to Antwrappe in fflanders…where she was Deliured of child…and lefte her in there in grete misery’), his getting a house cook with child which he ‘fathered…vpon one of his Servinge men’, his getting ‘one Elenor chambre maide’ with child who was ‘then Conveid to one Nicholas Newbollte Clarke his howse’ where she was subsequently ‘kepte and deliured of Child’, and his taking ‘wth greate Violence one Elizabeth Johnsone and in Moste Detestable and brutiyshe maner’ using her for ‘three yeres last paste’, as well as having ‘most wickedlie assailled the wyfe’ of one of her neighbours, on one broadsheet, undated. c.1670s.
Quoted in Willis, pp. 414-15.
Two petitions by Puttenham to Queen Elizabeth and the Privy Council, in a minuscule calligraphic hand, one requesting the Queen to confirm the recommendation of the Council ‘for a booke to be made in that case requisite, and fitt to passe your Royal Signe: thereunto presented by Mr Secretary Walsingham’, on two oblong folio pages, endorsed ‘a petycon to the Queen Elizabeth from mr Puttenham a very odd one’, undated. c.1670s.
Notes on lands that George Puttenham had by Lady Windsor, on a broadsheet. c.1670s.
Quoted in Willis, pp. 452-3.
Answers of Lady Windsor to George Puttenham's ‘false Allegac[i]ons…laide against her to the Lorde[s] of the Counsell’, including her recollection of the earlier occasion when ‘wth a weapon called a bastynadoe’ he ‘beatte the said p[er]sons in very contemptuous maner and brake one of their heds very sore’ and other ‘outrage’ by him, her trusting that the Lords will not blame her for separating her self ‘from the company of soe evell a man, and better late then never, havinge so longe forborne to vtter the vnspeakeable myseryes’ she had ‘endured wth modestye’ which ‘womanhed did forbid’ her to disclose; appealing to the Lords ‘not over lightlie’ to give credit ‘to his gloryous and paynted speache whose custome is all supreme authorities and ordynarye & civill governement as a mockarye to vse’, who ‘in greate glorye and boaste of his owne witt and invenc[i]on’ defied the summons to appear before the Lords, and where she and her children ‘did thincke to haue Cloyed him wth the aucthoritie of the higher powers he was then sicke sicke sicke’, on three folio pages, undated.
Quoted in Willis, pp. 445-7.
The answer of M. Paulet to George Puttenham concerning the ‘Riott in the White friars’, on four broadsheet pages. c.1570s.
A brief note of costs for ‘places wasted & damage[s]’ and an account of the damages, on a slip of paper and one folio page. c.1570s.
A list of points relating to Throckmorton etc., endorsed ‘Brief of poulette[s] petycon to my lorde Threaseror’, on a quarto leaf. c.1570s.
‘A briefe of mr George Puttenhms practyses against Richard Poulet wherin he the said Richard requirethe redresse’, on a broadsheet page. c.1570s.
‘All the demaunde[s] that Mr Pauwlett can make (as I suppose)’ and [?Puttenham's] answer, in a cursive secretary hand, on three folio pages. c.1570s.
Quoted, with facsimiles, in Willis, pp. 423-6.
A bill of complaint to the Queen by Henry Thackham, who for two years had served George Puttenham ‘in thoffice of his clark and in other busynes and affaires’ at an annual salary of £10 but who had accrued in Puttenham's service expenses of £40 which Puttenham ‘wthout respect of any vpright dealing’ had refused to pay, having also ‘by his synister practises and subtill p[er]swasions and devyces procured and allured’ Thackham in Puttenham's affairs ‘to spende and consume…the some of C m[a]rke[s]’, on one membrane of vellum, [undated, c.1570s-80s]. c.1570s-80s.
Receipt, in the hand of a clerk signed by George Puttenham (‘Geo. Putenham’), for an indenture dated 20 December 1559 received from Richard Paulet and also referring to a release of 27 July 1565, on an oblong octavo page, 18 October 1580. 1580.
Quoted, with a facsimile, in Willis, p. 460.
An autograph note signed by John Cressett, recording receipt for his master George Puttenham from Sir Richard Paulet of ‘one paper note…touchinge certen wrytinge[s] that was to be delyurd vnto Willm Woode[s]’, on a small strip of paper, 22 October 1580. 1580.
A receipt, in the cursive secretary hand of a clerk, signed by Puttenham (‘Geo. putenham’), for the return by Richard Paulet of ten specified books of Puttenham, on a single page, 22 October 1580. 1580.
Quoted in Willis, with a facsimile, pp. 457-9.
‘A note of my lorde W[indso]rs & lord Tresorers lre to my La. Throckmrton’ concerning her late husband's lease with George Puttenham and title to Heriard, on two folio pages, after 22 May 1580. 1580.
An autograph receipt signed by George Puttenham (‘Geo. Putenham’), relating to a ‘wryting’ received from Sir Richard Paulet concerning an annuity of £240 granted to Puttenham by Paulet on behalf of Lady Windsor on 4 June 1565, the receipt witnessed by the scrivener John Browne before the notary John Hunte, on a single page, 4 November 1580. 1580.
A receipt signed by George Puttenham, for a deed of gift from Richard Paulet dated 10 December 1565(?) for goods and chattels that Puttenham is making over to Sir John Throckmorton, on one page, 2 May 1581. 1581.
Quoted in Willis, p. 459.
An autograph receipt signed by George Puttenham (‘Geo. putenham’), relating to an indenture of 30 November 1562 received from Sir Richard Paulet concerning legacies and obligations between Puttenham and Edward Lord Windsor, on one folio page, 5 June 1581. 1581.
A letter by the Council, in the Privy Council registers, requesting the Judges Delegate to help Lady Windsor to get the relief due to her, 19 June 1581. 1581.
Dasent, X, 93.
A letter by the Council, in the Privy Council Registers, ordering Puttenham to settle Lady Windsor's complaints or answer to the Council, 7 August 1581. 1581.
Dasent, XIII, 162.
An autograph letter signed by Sir Thomas Bromley, Lord Chancellor, to George Puttenham, urging a settlement of the controversy between him and Paulet, on a folio page, 16 August 1581. 1581.
Letter by the Council, in the Privy Council Registers, requesting commissioners to investigate or settle the Puttenham-Windsor dispute relating to the Herriard estate, 11 September 1581. 1581.
Dasent, XIII, 203-4.
Copy of George Puttenham's information against Thomas Ashe (husband of Mary Paulet), John Hanle, Richard Knight, John Wells and William Bethill, for alleged unlawful possession of a moiety of Weston Corbett manor, Upton Bernard in Upton Grey, and property in Worthy Mortimer and Hartley Wintney, on two broadsheets, November 1582. 1582.
‘A breyfe of the controversye betwene ffredericke L: Wyndesor, and George Puttenham Esquier’, with reference to the annuity granted to Elizabeth Lady Windsor and Puttenham's ‘lewde and covenous practyses’, [1582?]. 1582?.
A formal document by Puttenham surrendering to Queen Elizabeth all his lands in order to pay off debts, on six pages, 5 June-7 July 1583. 1583.
In Willis, pp. 459, 461.
Interrogatories to be administered on behalf of John Hall to Christopher Wilmot of Herriard, on two broadsheets, 22 October 1583. Concerning George Puttenham's alleged attempt to gain possession of land. 22 October 1583.
Petition by Sir Richard Paulet to the Privy Council for the reclaim of Herriard from George Puttenham and Sir John Throckmorton, 10 November 1583. 1583.
A petition to the Privy Council by Richard Paulet, for reassurances by George Puttenham and the late Sir John Throckmorton's son, Francis, concerning the manor of Herriard and a farm in Upton, which Puttenham had illegally surrendered to the Queen, [November 1583]. 1583.
Quoted in Willis, pp. 461-2.
Richard Puttenham versus Thomas Hargrave and Elizabeth his wife concerning the manor of Sherfield, 1583. 1583.
Letter by Geoffrey Le Brumen to Sir Francis Walsingham, in French, mentioning his visits to ‘mons[ieu]r puthnam’, who as usual excused not paying, telling him he had ‘vgne assigna[ti]on’ by the Queen signed by most of the Council but which Walsingham has delayed and remitted to the judgement of [Sir Philip] Sidney (‘…Il ne restoit que vous de laider & fauoriser & que sur ugne petite difficulte p[ar] opposition qui est extreme[?] vous aves retarde son affaire requettant son affaire a congnoistre p[ar] Monseigneur de sidnay’), about which Puttenham is joyful (‘Joyeux’), saying he would gladly pay £100 to Sidney or anyone else to get the matter settled, 29 May 1584. 1584.
Edmund Molinex versus Thomas Colbie and Richard Puttenham concerning the manor of Sherfield, 1584. 1584.
‘Copies of such writings and euidence as perteine to the sute of Mr George Puttneham’ for the Queen's return of a £1,000 forfeiture ‘which he might have saued’ if he had ‘shewed him self eyther an vnhonest or vnthankfull subiect’, the Council's agreeing that Francis Morris took unfair advantage of him and ordering that ‘Mr Secretarie’ should ‘moue’ the Queen in Puttenham's favour, 8 February 1584/5. 1585.
In: A folio guard-book of independent Elizabethan state papers, stamped foliaton 1-237.
Autograph list by Puttenham of ‘Writinge[s] to be deyuerd by Ric pawlet’, on a folio page, 11 May 1586. 1586.
Autograph letter signed by Sir Richard Paulet, [to George Puttenham], about finding the ‘writinge[s]’ left by Paulet's father which Puttenham requested and which he will send him via his ‘coosen waller’, on an oblong octavo page, 23 May 1586. 1586.
Autograph receipt signed by George Puttenham (‘Geo. putenham’), for various ‘parcells of writinges’ from Sir Richard Paulet via John Waller, on one folio page, 26 May 1586. 1586.
Petition by Richard Puttenham, after four years' imprisonment, relating to his estranged wife Mary, 3 May 1587. 1587.
Petition relating to Richard Puttenham and Katherine Jenninge, widow, 6 November 1587. 1587.
Petition to the Queen by George Puttenham about his alleged wrongful arrest and imprisonment because of a writ of excommunication against him of 3 November 1587 drawn up by William Kingsley, Clerk of the Court of Chancery, disputing its validity in view of the Queen's general ‘acte of free p[ar]don’ of 15 February 1586/7, as also the validity of the transcript made by Edward Orwell, registrar of the Archbishop of Canterbury's Court; and answers and counter-claims to this petition by William Kingsley, George Farmer, Edward Orwell and Paul Powle, on four membranes of vellum, [c.1587-8]. c.1587-8.
Record in Latin, in a Chancery Close Roll on vellum, of a grant to George Puttenham in consideration of his faithful and acceptable service (‘in consideratione boni veri & fidelis & acceptabilis servicii nobis’) of the reversion of the leases of the rectories of Marten, Wiltshire, and St Botolphs without Aldgate, London, at annual rents of £18 and £22 respectively, [May 1588]. 1588.
Record in a Signet Office register on vellum of ‘A lease in Revercon graunted vnto George Puttenham esqr of the p[ar]sonage of Marten in the County of Wilteshr & ye personage of Sr Botholphe wthout Aldgate London for the terme of xltie, yeare[s] Rent xlli, & noe fyne in consideracon of service Sub: by the L: T[reasu]rer, & Sr Walter Mildmay. Procured by Mr wyndebancke’, May 1588. 1588.
Interrogatories to be administered to George Puttenham on behalf of William Woodes against Humphrey Forster, concerning what Puttenham knew about Forster and his dealings; related interrogatories for Roger Hatton and Joane Jerom, and for Woodes's solicitor, John Cresset, the later dated 28 January 1588; together with answers signed by John Cresset (8 February 1588/9), and by Roger Hatton (21 February 1588/9), on five large membranes of vellum. 1589.
Interrogatories to be administered to George Puttenham on behalf of William Woodes against Humphrey Forster, concerning what Puttenham knew about Forster and his dealings; related interrogatories for Roger Hatton and Joane Jerom, and for Woodes's solicitor, John Cresset, the latter dated 28 January 1588; together with answers signed by John Cresset (8 February 1588/9), by Roger Hatton (21 February 1588/9), and by George Puttenham (5 March 1588/9). 1589.
Deposition by George Puttenham in the case of William Woodes versus Humphrey Forster (or Foster), in answer to interrogatories, concerning his dealings with Forster, accused of unlawfully trespassing and taking away a thousand sheep at Aldermanston, alleging that Puttenham threatened to bring to Star Chamber the foreman of a jury at the Guildhall for acquitting Forster contrary to the evidence, giving details of jurors at Forster's trial at Reading who came to Puttenham at his lodgings at the Bear and of the foreman of the jurors, Mr Chocke, at Forster's trial at Westminster, who came with Forster to Puttenham's lodgings in the Strand, where a deal was struck which Forster later renaged on, and of other subsequent meetings with jurors at Puttenham's lodgings in the Old Palace at Westminster; written in the hand of a clerk on four large membranes of vellum, each of them signed by Puttenham (‘Geo. putenham’), one signed twice, 5 March 1588/9. 1589.
Recorded in Eccles, p. 109.
‘Articles to be inquired of executed and p[er]formed for and on the behalf of her matie in the Counties of Staff warwick and Oxford’, inquiring about outstanding debts to the Queen of Sir John Throckmorton deceased and George Puttenham, in seventeen several bonds of £40, the document signed by Sir John Fortescue, Chancellor of the Exchequer, on one membrane of vellum, [undated, but between 1589 and 1603]. c.1589-1603.
John Caborne versus Richard Puttenham and John Morris relating to the manor of Sherfield, 1590. 1590.
A lawsuit involving Richard Puttenham's estranged wife Mary Puttenham, 1591. 1591.
Autograph draft letter signed by Richard Paulet, to Lord Burghley, about his ‘longe, and chargable Sutes in Lawe’ with George Puttenham to his own ‘great hinderance and almost vtter vndoinge’, mentioning Puttenham's suit to the Queen for the return of £1,000 paid by him into the Exchequer (‘And to that purpose had yor honors & others the lle[s] of the cownsells order for a booke to be drawne for yt & passte her hignes signet, yet he was crossed therin (I thinck thoroughe gode[s] p[ro]vydence for his lewdnes) by Mr Sackford, so as he receyved yt not’) and requesting this repayment be bestowed upon him instead, on a folio page, 3 December 1593. 1593.
A letter by Lord Burghley to Sir Richard Paulet, politely declining his request for repayments in connection with his long lawsuit with George Puttenham, 2 January 1593/4. 1594.
Tax assessments of George Puttenham in St Margaret's parish, Westminster, for £10 a year ‘in lande[s]’, in a register of the taxation of lands and fees in the county of Middlesex in 1581 and 1594. c.1581-94.
In: A folio composite volume of miscellaneous state papers, over 220 leaves.
Recorded in Eccles, p. 109.
Quitclaim between Richard Puttenham and William Eles concerning land in Agmondesham [Amersham], Buckinghamshire, 4 July 1595. 1595.
‘Certeyn sentences collected: concerninge maryadge’, endorsed (? by Sir Richard Paulet), with a memorandum about where he had laid his own books, including: ‘On the left hand of the chest beyinge opening I lawyd and Packt all the bookes I had of Mr Puttenham, wch reached halfe way the chest…next mr Puttenhams bookes aforesaid I layde all my Lattyne bookes, greeke…and suche like’, on two folio pages, 18 December 1596. 1596.
Mention of George Puttenham's having allowed Sir Richard Pexall to enclose part of Herriard Common, in one of fifteen items relating to a lawsuit between Richard Savage and Sir Richard Paulet, 1598-1605. c.1598-1605.
Documents relating to a lawsuit between George Puttenham's beneficiary and administratrix Mary Simmes, widow, and Sir Richard Paulet, concerning the administration of Puttenham's estate, including her charge that Paulet and twelve others had unlawfully and ‘in rioutous manner wth Iron Barrs’ entered Puttenham's house at Whitefriars, arrested him and removed certain goods, and Paulet's answer (of 18 November 1611) referring to George Puttenham as his grandmother's ‘most…lewde husband’, seven items, seven pages in all, folio and octavo. 1610-13.
A bill of complaint to King James I by ‘yr poore and distressed subiect’ Mary Simmes, widow, administratrix of George Puttenham's Will, against Sir Richard Paulet, demanding restitution for the chattels, books and ‘diuers Evidence[s], Indentures Leases, statuts, Obligac[i]ons, bonds, bills, defesants [defeasances], certificats, and other Writings’, all ‘of a very greate valewe’, which his parents John and Katherine Paulet had violently taken away from Puttenham's lodgings in Whitefriars [in 1578], referring to the inventory of ‘Nine Leaves’ they had delivered to Puttenham's servant John Cresset about November 1579 ‘as a trew coppy’, the goods kept by the Paulets being worth £1,000 or more, and explaining how she had looked after Puttenham in his sickness, spending ‘not only the little goods she had but also her time’ in his service, being now reduced to extreme poverty; Sir Richard Paulet's lengthy answer, defending the lawfulness of his family's proceedings (in which, however, he took no part, being then only a youth) and summarising related matters concerning title, valuation and subsequent legal and financial arrangements, mentioning a letter by ‘Humfrye Moseley secondarye of woodstreet’ about a jury's valuation of ‘so many of ye said Puttenhms goode[s]…at twentie three pounde[s] four shillinge[s] and two pence’, referring to Puttenham as ‘an ill disposed man, much bent to troubles’, who ‘as the world knoweth by keeping the plaint[iff] or other leawd women giving cause of divorce’ had ‘much abused’ Paulet's grandmother, Lady Windsor, 29 April (docketed 5 May) 1613; and Mary Simmes's replication to this answer, insisting that the goods the Paulets had originally taken were worth £5,000, referring to another inventory of certain of George Puttenham's goods left in Herriard House to the value of £2,000 or more which Richarde Paulet gave to John Cresset about November 1597, and demanding restoration or recompense, on three membranes of vellum, 4 July 1613. 1613.
Recorded in Eccles, p. 109 (as Req 2/414/196).
Answer by Sir Richard Paulet to a ‘slanderous’ bill of complaint against him by John Lee and others, on three folio pages, 28 March 1614. Mentioning the ‘great suite[s] in law’ he and his father had with George Puttenham who married Sir Richard's grandmother ‘and would have defeated him of his land, yf yt had not ben holpen in the highe court of Starchamber’, by which means he was ‘left muche indebted at his fathers deathe Chardged wth divers Legacies’, [c.March-April 1614]; one of eight items concerning complaints against Sir Richard's magistracy in 1606-14. 1614.
An autograph letter signed by Lucy Jervoise, to Mr Guidott, referring to Puttenham's having ‘intangled’ her grandfather ‘in bondes…in ye Lady Winsors time’. c.1630s.
A later inventory of Lord Windsor's goods, on two quarto pages. 19th century.
Puttenham's last will and testament, entirely in the hand of a scribe, bequeathing all his goods and chattels, including his bille[s] bonnde[s] ‘obligac[i]ions’, to ‘Marye Sym[m]es wydowe his servaunt…for the good service she did hym’, written in the presence of Sebastian Archebold scrivener, James Clerke, William Johnson ‘and dyvers others’, ‘aboute the fyrste day of September Anno d[omi]ni 1590’; proved according to a subsequent inscription in Latin, 14 October 1594. 1594.
A registered copy of Puttenham's last will and testament, which was written c.1 September 1590 and proved 10 October 1594. 1594.
Copy of George Puttenham's last will and testament, with an account in Latin of the probate and administration of it by William Woodfall, on a folding membrane of vellum, 14 October 1594. 1594.
Last will and testament of Richard Puttenham, entirely in the hand of a scribe, written as a ‘prisoner in her maties Bench’, bequeathing all his goods to ‘my verely, reported and reputed daughter Katherin Puttenham’ and appointing ‘my trustye frinds John Armatage and John Peter’ as his ‘overseers’, witnessed by William Blithe, John Calvert, Frances Syckes, Thomas Blithe and John Peter; made 22 April 1597, proved 2 May 1597. 1597.
A registered copy of the last will and testament of Richard Puttenham, made 22 April 1597, proved 2 May 1597. 1597.
|
<urn:uuid:1005b714-2f16-49e1-9288-365f05a0736d>
|
CC-MAIN-2020-16
|
https://celm-ms.org.uk/authors/puttenhamgeorge.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371803248.90/warc/CC-MAIN-20200407152449-20200407182949-00460.warc.gz
|
en
| 0.931324 | 27,853 | 2.71875 | 3 |
(Air Sickness; Car Sickness; Sea Sickness)
Motion sickness – Definition
Motion sickness is characterized by symptoms, like nausea and vomiting, that are caused by motion or from feeling motion, like from watching a movie.
Motion sickness – Causes
Balance and equilibrium are maintained by an interaction among the inner ears, the eyes, pressure receptors on the skin, and motion receptors in the muscles and joints.
Motion sickness results when conflicting messages regarding spatial orientation and motion of the body are sent to the central nervous system. For example, reading a book while riding in a car may cause your eyes to send different messages than your inner ears regarding motion.
Motion sickness – Risk Factors
Anyone can get motion sickness. People who may have a greater risk include:
- Being a child
- Being a woman
- Having family members who get motion sickness
- Being in a long or rough car, boat, plane, or train ride
- Going on amusement park rides
- Having migraine headaches
Motion sickness – Symptoms
The most common symptoms include:
- Upset stomach
- Nausea or vomiting
Other symptoms include:
- Tiredness or sleepiness
- Cold, clammy feeling
- Feeling faint
- Loss of color, especially in the face
Motion sickness – Diagnosis
Your doctor will ask about your symptoms and medical history. A physical exam may be done.
Motion sickness – Treatment
Symptoms of motion sickness usually go away soon after the motion stops. But, for some people, the symptoms can last a day or more. The main treatment for motion sickness is rest.
To help control vomiting, medicines may be given rectally or intravenously (through a vein in the arm). If motion sickness lasts a long time, fluids may be given in order to prevent dehydration.
Motion sickness – Prevention
Strategies to prevent motion sickness include:
Medicines that prevent motion sickness should be taken as directed before you begin a trip or ride. These medicines can cause side effects, such as drowsiness, lack of alertness, or trouble concentrating.
- Over-the-counter antihistamines (eg, diphenhydramine, dimenhydrinate)
- Prescription scopolamine (available in many forms, including patches or pills)
- Other medicines (eg, prochlorperazine, promethazine, chlorpromazine)
Repeated exposure to the motion that causes the sickness can decrease your symptoms. This treatment can take time, though, and be unpleasant.
Commonly used alternative remedies include:
- Pressure patch worn on the wrist to put pressure on the pulse points
Motion sickness – Prevention
There are steps that you can take to be more prepared when taking a ride:
- Avoid the following before a trip or ride:
- Heavy meals or spicy foods
- Excess alcohol
- Lack of sleep
- During a trip or ride, avoid:
- Looking at others who are experiencing motion sickness
- Talking about motion sickness
- Eating large or heavy meals
- During long trips, eat small, frequent meals or snacks consisting of easily digestible food or drink.
- During short trips, avoid eating or drinking.
- Drinking excess alcohol
- Looking at moving objects
- During a trip in a car:
- Sit in the front seat and look out the windshield.
- Drive if possible.
- Ask the driver to slow down or stop if you begin to feel sick.
- During a plane or train ride, look out a window.
- In a plane, sit over the wing for a less bumpy ride.
- During a boat ride:
- Sit towards the middle of the boat.
- Get plenty of fresh air.
- Do not stay below deck for long periods of time (especially on smaller boats).
- Avoid amusement park, virtual reality rides, and movies that may lead to motion sickness.
|
<urn:uuid:c8df0951-2544-42a4-97c4-9a9c2eb89588>
|
CC-MAIN-2020-29
|
https://mednhealth.com/motion-sickness.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655906934.51/warc/CC-MAIN-20200710082212-20200710112212-00299.warc.gz
|
en
| 0.880456 | 807 | 4.03125 | 4 |
Books by Brights
Religion, Language, Narrative and the Search for Meaning
This is a book about religion from a secular standpoint which nevertheless takes its subject seriously. Contrary to some secularists I don't think religion is likely to disappear any time soon, and here I look at some of the reasons why it is likely to stay.
The early chapters consider a number of explanations for religion that are current today; all provide elements of the answer though none is fully satisfactory as it stands. In the remainder of the book I try to develop a way of thinking about religion, using two main clues: language and narrative.
There are remarkable similarities in the ways in which we learn both language and religion. As for narrative, I think that religion is based more on telling stories than on assent to formal belief systems. Narrative is how most religious people encounter their religions. Humans are story-telling animals and for that reason alone it is likely that religion will continue to exist. Another reason is the capacity of the human mind to give rise to altered states of consciousness; unlike, some, I think that these are important in shaping our religious ideas.
Please see also Totality Beliefs and the Religious Imagination, also listed on this site..
About the Author
Anthony Campbell is a physician, now retired, who spent many years in the practice of complementary medicine before coming to the conclusion that this, like religion, is based on belief systems. He discusses this as well, with reference to the reality of illness and suffering that is recognized by Theravada Buddhism.
|
<urn:uuid:be4eacc1-2f66-44a3-892d-a57cbf6d4c9b>
|
CC-MAIN-2013-48
|
http://www.the-brights.net/people/books/book_details.html?book=rlnatsfm
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163037952/warc/CC-MAIN-20131204131717-00079-ip-10-33-133-15.ec2.internal.warc.gz
|
en
| 0.969623 | 317 | 2.609375 | 3 |
Despite promises of protective measures, Johns Hopkins’ demolition of a block of 100-year-old row houses on 29th Street damaged two magnolia trees on Friday, Fern Shen reports for the Baltimore Brew. The university’s director of media relations, Jill Rosen, acknowledged that “not all of the precautions were followed” to preserve the trees during the demolition.
What caused the magnolia tree injuries?
As crews tore down the buildings, falling debris crushed several branches of the Saucer Magnolia at the front corner of the block. Rubble gathered around the trunks, and the soil was compacted by heavy machinery, causing “irreversible” damage to both the Saucer and Southern Magnolia trees, according to Zoe Gensheimer, the chair of the Baltimore City Forestry Board. “They had a plan” to save the trees, Gensheimer said. “They just didn’t follow through.”
Reporters from the Baltimore Brew cited measures to mitigate destruction to the trees, including some “protective material” around the trunk of the magnolia trees and another tree on the lot. A chain-link fence labeled with a “Forest Protection Area” sign previously separated the buildings from the trees, but Gensheimer said it was flattened by debris.
Anything else I should know?
Rosen, the university spokesperson, said Johns Hopkins is addressing the issue with their contractor.
You can read more here.
|
<urn:uuid:6a2788dc-0c0c-4ee0-b296-708d64b176cc>
|
CC-MAIN-2023-40
|
https://blocbyblocknews.com/magnolia-trees-near-29th-street-row-houses-damaged-during-demolition/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511369.62/warc/CC-MAIN-20231004120203-20231004150203-00689.warc.gz
|
en
| 0.948028 | 312 | 2.734375 | 3 |
This week in history: March 7-13
7 March 2011
This Week in History provides brief synopses of important historical events whose anniversaries fall this week.
25 years ago: US announces bailout of savings and loan banks
On March 12, 1986, Ewin Gray, the chairman of the Home Loan Bank Board, outlined a plan to bail out the US savings and loan banking industry, which had seen hundreds of institutions become functionally insolvent over the previous three years as a result of financial speculation in the housing and money markets.
Gray, speaking before the House Banking Committee, said that $22.5 billion would be required to recapitalize the depleted Federal Savings and Loan Insurance Corporation, which guaranteed deposits in the so-called “thrift banks.” He rejected a Government Accounting Office estimate that 1,300 savings and loan banks with $433 billion in assets, 42 percent of the industry total, would face insolvency in the near future.
There were other indications that week that the so-called “Reagan recovery” was built on the rotten foundations of financial speculation. The New York Times reported that corporate raider Ivan Boesky was in the process of building a war chest of $1 billion to dismantle firms in the US and Europe; the Federal Reserve Board announced the relaxation of capitalization requirements for commercial banks; and one article in the Times described demands from the banking industry that adjustable rate mortgages be put in wider use, while another detailed the rapid proliferation of “innovative finance products” that made debt cheaper.
50 years: Kennedy administration plots Bay of Pigs invasion
On March 11, 1961, newly elected US President John F. Kennedy held secret talks with CIA Deputy Director Richard M. Bissell regarding plans to invade Cuba and topple the nationalist government of Fidel Castro.
The plot centered on the secret military equipping of counterrevolutionary Cuban émigrés in Florida. Present at the meeting, in addition to Kennedy and Bissell, were Secretary of State Dean Rusk, Defense Secretary Robert McNamara and CIA Director Allen Dulles. Kennedy rejected as too obvious Bissell’s first plan, which called for a frontal assault on Trinidad beach. Days later, Bissell came back with a proposal for an invasion at the Bay of Pigs. According to one historian, “The Kennedy team was impressed, when they should have been incredulous.”
The plan to topple the Cuban government and assassinate Fidel Castro had been ordered by President Eisenhower a year earlier and put under the control of a CIA group known as the 5412 committee, headed by Dulles. The same group had been instrumental in the bloody overthrow of the Guatemalan government in 1954.
As part of the plan, CIA agents such as David Atlee Phillips, Jacob Esterline, E. Howard Hunt and Ted Shackley were arming and training right-wing Cuban émigrés in Florida. With the active participation of Dulles, they were recruiting major Mafia figures enraged over the loss of their lucrative Havana crime hub due to the Cuban revolution. These included Meyer Lansky, Havana and Florida mobster Santo Trafficante, Sam Giancana and Johnny Roselli of the Chicago “outfit,” and Louisiana crime boss Carlos Marcello (who had donated $500,000, via Teamsters union head Jimmy Hoffa, to aid Richard Nixon in his campaign against Kennedy in 1960).
75 years ago: German army remilitarizes Rhineland, breaking Versailles Treaty
In brazen contravention of the Treaty of Versailles, German armed forces re-entered the Rhineland on the 7th of March, 1936. Drawn up in 1919 after the First World War, the treaty stated that Germany was “forbidden to maintain or construct any fortification either on the left bank or the right bank to the west of a line drawn fifty kilometres to the East of the Rhine.”
Infringements “in any manner whatsoever shall be regarded as committing a hostile act… and as calculated to disturb the peace of the world,” the treaty declared.
On that Saturday, as Hitler declared the news to a jubilant Reichstag, some 30,000 troops and police entered the city of Cologne, with 3,000 troops penetrating the zone along the Rhine. Bordering France, the Netherlands and Belgium, rich in coal deposits and highly industrialized, the region was central to the Nazi’s drive towards “total war.”
Codenamed “Winter Exercise,” the remilitarization of the Rhineland was initially planned for the following year, but Hitler’s hand was forced by the need for a propaganda coup amidst a severe economic crisis, with food shortages and high unemployment creating rising anger in the German working class. In light of the looming Franco-Soviet mutual assistance pact, Hitler dressed up the Rhineland escalation as a defensive move against military encirclement.
Hitler was emboldened by the diplomatic maneuvering of France and Britain, which, like Nazi Germany, were primarily concerned with the threat of social revolution, which they still associated with the Soviet Union. Hitler was confident he could use diplomacy to negotiate the re-entry of the Wehrmacht into the Rhineland. But egged on by the then-Ambassador to the UK Joachim von Ribbentrop, Hitler instead chose to call the bluff of Paris and London by unilaterally settling the issue. His recklessness paid off. Neither Britain nor France lifted a finger to enforce Versailles.
100 years ago: Rutherford describes structure of atom
On March 7, 1911, British physicist Ernest Rutherford presented a paper to the Manchester Literary and Philosophical Society that for the first time accurately predicted the existence of a nucleus at the center of an atom that was largely filled with empty space.
The paper, The Scattering of the Alpha and Beta Rays and the Structure of the Atom, showed that all but a tiny proportion of an atom’s mass lay within a dense center that comprised but one one-billionth of its volume, with lesser particles, electrons, orbiting it. Rutherford’s discovery came to be known as the “planetary model” because of the conceptual similarity between the atom and the solar system, in which the sun accounts for the great proportion of the mass with planets revolving around it.
The discovery came out of an experiment conducted in 1909 by Hans Geiger and Ernest Marsden in Manchester. Rutherford asked the researchers to study the deflection angles for alpha particles, derived from the radioactive decay of radium, as they passed through a microscopically thin sheet of gold surrounded by a circular sheet of zinc sulfide. To Rutherford’s astonishment, the extreme deflection angles of some of the radiation particles could not be explained by any existing theory of matter.
Rutherford described the moment of discovery in the following terms: “It was quite the most incredible event that has ever happened to me in my life. It was almost as incredible as if you fired a 15-inch shell at a piece of tissue paper and it came back and hit you. On consideration, I realized that this scattering backward must be the result of a single collision, and when I made calculations I saw that it was impossible to get anything of that order of magnitude unless you took a system in which the greater part of the mass of the atom was concentrated in a minute nucleus. It was then that I had the idea of an atom with a minute massive center, carrying a charge.”
|
<urn:uuid:9e7ab7a5-e11c-40ae-9a7f-e8995bea451a>
|
CC-MAIN-2013-20
|
http://wsws.org/en/articles/2011/03/twih-m07.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705939136/warc/CC-MAIN-20130516120539-00033-ip-10-60-113-184.ec2.internal.warc.gz
|
en
| 0.9555 | 1,548 | 2.75 | 3 |
Peter Norton's Introduction to Computers
"Peter Norton's Introduction to Computers 5th Edition" is a state-of-the-art text that provides comprehensive coverage of computer concepts. It is geared toward students learning about computer systems for the first time. Some of the topics covered are: an Overview of computers, input methods and output devices, processing data, storage devices, operating systems, software, networking, Internet resources, and graphics.
88 pages matching Figure in this book
Results 1-3 of 88
What people are saying - Write a review
We haven't found any reviews in the usual places.
applications audio browser button bytes cable called capabilities CD-ROM cell chip COLLABORATIVE LEARNING color communication connected create CRITICAL THINKING database desktop DISCUSSION TIPS disk drive diskette display document e-mail electronic enable example Figure format graphics groups hard disk hardware images ink jet input device Intel interactive interface Internet keyboard laser printers Macintosh magnetic memory menu Microsoft models modem monitor motherboard mouse multimedia NORTO Online Online For information operating system PC Cards Pentium personal computers pixels PowerPC printed processor programs puter scanner screen SCSI server sound speed spreadsheet standard storage devices tion trackball upgrade users visit this book's Visual Summary Windows 98 Windows NT word processing workstations World Wide World Wide Web www.glencoe.com/norton/online
|
<urn:uuid:28aab53f-3719-496c-9a08-ee80f782745d>
|
CC-MAIN-2014-35
|
http://books.google.com/books?id=b7Ge5qOrjIIC&q=Figure&dq=related:ISBN0028044126&source=gbs_word_cloud_r&cad=5
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500834663.62/warc/CC-MAIN-20140820021354-00216-ip-10-180-136-8.ec2.internal.warc.gz
|
en
| 0.766979 | 281 | 3.09375 | 3 |
A geodesic dome covers a geothermal wellhead at the Hellisheiði Power Station in Iceland. Photo by Umair Irfan
HENGILL, Iceland -- Billowing vapor clouds and the faint smell of boiled eggs lead visitors over a gravel road toward the Hellisheiði Power Station, 15 miles southeast of the Icelandic capital, Reykjavik...
Here, at Iceland's largest geothermal heat and power plant, perched on a rocky active volcanic ridge, researchers recently demonstrated that they could take carbon dioxide and turn it into rock 1,500 feet underground. That's a result that could shrink the carbon footprint of geothermal energy as well as create a new route for carbon capture and sequestration.
Geothermal energy is a promising method of producing heat and electricity, since it is renewable and can provide constant power. According to Iceland's National Energy Authority, 85 percent of the country's energy comes from renewable sources. Geothermal power provides 66 percent of Iceland's energy and a quarter of the country's electricity.
However, the technology has high upfront costs, finding adequate geothermal resources can be a risky investment, and some instances of geothermal power emit greenhouse gases. In parts of the world, geothermal energy can emit more carbon dioxide than coal (ClimateWire, July 22).
The CarbFix project at Hellisheiði tackles the emissions side of geothermal energy. The plant produces 303 megawatts of electricity and 133 MW of hot water, and in 2012, engineers began reinjecting carbon dioxide and hydrogen sulfide into geothermal wells at wellheads covered with geodesic domes instead of allowing these gases into the air.
The goal was to get basalt rocks rich in calcium and magnesium to react with the injected gases to form calcium carbonate limestone, permanently locking emissions away. In nature, this process can take thousands of years, but engineers set out to create conditions that would make it happen in five.
The results showed the mineralization was even faster.
"What I really like about the CarbFix solution is using the natural processes," said Edda Sif Pind Aradóttir, project manager for CarbFix at Reykjavik Energy. "After two years, it's just rock, and it stays that way."
DOE puts $11.5M into research
Aradóttir and her team published their findings last month in the journal Science (ClimateWire, June 10). The project started out injecting 250 tons of carbon dioxide in 2012 and ramped up to 5,000 tons in 2014.
"We were gradually gaining the knowledge that this would be the result we would see," she said. "I think it's time to break out the Champagne again."
The U.S. Department of Energy is working on ways to reduce some of the uncertainties that go into finding suitable areas for geothermal energy. In parts of the world that aren't as geologically blessed as Iceland, and without telltale geysers and wisps of steam at the surface, it can be a tremendous gamble to drill wells thousands of feet deep, not knowing if there is enough useful energy to defray the cost.
"You know where to put the solar panels, but with geothermal, it's hard to know where to drill," said Bud Johnston, laboratory program manager for geothermal technologies at the National Renewable Energy Laboratory.
The United States is actually the world leader in geothermal energy capacity, with 3.45 gigawatts in 2015, according to the World Geothermal Congress. But that only provides 0.4 percent of electricity production in the United States, and experts say the potential could be much greater.
Earlier this week, DOE announced $11.5 million in federal funds to drive eight research projects in geothermal prospecting and carbon storage, from more robust wellbores to new ways to monitor what's going on miles below the surface.
A better understanding of the ground below could unlock new ways to keep greenhouse gases from filling the skies above.
The agency is also now examining candidate sites for FORGE, the Frontier Observatory for Research in Geothermal Energy. The facility will serve as a test bed for various geothermal technologies, particularly enhanced geothermal systems, where a fluid is injected and heated over hot rocks underground, as opposed to conventional geothermal systems that are limited to sites where steam is naturally present.
Tim Reinhardt, program manager for systems analysis and low-temperature and co-produced resources programs in DOE's Geothermal Technologies Office, said the United States has the geothermal resources to deploy around up to 9 GW of known hydrothermal resources, an additional 30 GW of undiscovered hydrothermal power, between 7 and 10 GW of "near-field" enhanced geothermal energy, and over 100 GW of additional "greenfield" enhanced geothermal energy.
"The potential is immense," he said.
The challenge of cost
In the push for more energy with less greenhouse gas emissions, geothermal energy could be a vital complement to intermittent renewables, once costs come down.
"The upfront costs of geothermal are relatively high compared to other renewables," Reinhardt said. However, over the lifetime of the plant, around 30 years, the levelized costs of energy end up being comparable to other types of renewables, he added.
Enhanced geothermal systems can take some of the guesswork out of geothermal prospecting and may help drive costs down. "EGS in the long term is the solution to a lot of the upfront risk," Reinhardt said.
As for emissions, there are already geothermal power plants that operate with a closed loop so that any of the natural carbon dioxide underground down doesn't make it into the air. And for the plants that do vent to the atmosphere, injecting the carbon dioxide underground isn't necessarily the hard part; it's separating it from other gases.
"In order to get a nice demonstration project for [carbon] storage, the biggest cost is getting the CO2," said Howard Herzog, a senior research engineer for the Massachusetts Institute of Technology's Energy Initiative. "The real critical thing is to keep water out. If you have condensation, there will be some CO2 in the water."
That carbon dioxide can then react with water to form carbonic acid, a substance that can corrode materials used in geothermal power plants.
Despite the technical challenges, geothermal power coupled with carbon storage may be necessary to keep the world from warming beyond dangerous levels.
"It's impossible to limit the temperature rise to 2 degrees [Celsius] if we do not carry out carbon capture and storage -- at least, you know, until we have switched over to renewables completely," Aradóttir said.
Umair Irfan, E&E reporter
Climate Wire: Friday, July 29, 2016
original story HERE
Sign up for the Global Warming Blog for free by clicking here. In your email you will receive critical news, research and the warning signs for the next global warming disaster.
Click here to learn how global warming has become irreversible and what you can do to protect your family and assets.
To share this blog post: Go to the original shorter version of this post. Look to lower right for the large green Share button.
To view our current agreement or disagreement with this blog article, click here.
|
<urn:uuid:565e139f-ff42-4b47-a32e-29efac252104>
|
CC-MAIN-2020-24
|
https://www.joboneforhumanity.org/renewable_energy_engineers_work_to_cut_costs_and_emissions_in_geothermal_power
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347394756.31/warc/CC-MAIN-20200527141855-20200527171855-00284.warc.gz
|
en
| 0.944737 | 1,504 | 3.78125 | 4 |
In the world of artificial intelligence, one name stands out above the rest: Elon Musk. Known for his ambitious projects and innovative ideas, Musk has made a name for himself as a pioneer in the field of AI.
How is Elon Musk involved with AI? How is he linked to OpenAI and the new software ChatGPT? And how does it fit into his broader vision for the future? Let’s take a closer look.
First, a bit of background. Musk is the founder of OpenAI, a research institute dedicated to Background advancing the field of AI and ensuring its safe and beneficial development. Founded in 2015, OpenAI has quickly become a leader in the field of AI, conducting groundbreaking research and developing innovative technologies.
One of the critical areas of focus for OpenAI is the development of artificial general intelligence or AGI. Unlike narrow AI, which is designed to perform specific tasks, artificial general intelligence is a type of AI that has the ability to learn and adapt to a wide range of situations. This type of AI has the potential to revolutionize industries and change the way we live and work.
Elon Musk and OpenAI are not just focused on the development of AI, but they are also actively involved in the discussion around AI’s ethical and societal implications. Through their research and public discussions, Musk and OpenAI are working to ensure that AI is developed in a way that is safe and beneficial for humanity.
One of the critical ways that Musk and OpenAI are working to advance the field of AI is through partnerships and collaborations with other companies and organizations. For example, OpenAI has partnered with Microsoft to develop advanced AI technologies and with the U.S. government to research the potential applications of AI in national security.
These partnerships and collaborations are crucial for advancing the field of AI and bringing it closer to achieving its full potential. And with Musk’s leadership and vision, OpenAI is at the forefront of these efforts.
ChatGPT, which is a new program developed by What is ChatGPT OpenAI, is a state-of-the-art AI language model that allows users to have natural and engaging conversations with a virtual assistant. But what makes ChatGPT so unique? And how is it being used in the real world? Let’s take a closer look.
ChatGPT is a variant of OpenAI’s GPT-3 model, which is one of the most advanced AI language models in existence. Unlike other AI assistants, ChatGPT is able to generate responses in real-time, making for a more natural and conversational experience.
But what makes ChatGPT so powerful is its ability to understand and respond to a wide range of topics and contexts. Using a massive dataset and advanced machine learning algorithms, ChatGPT has been trained to understand and generate human-like responses to a wide variety of inputs. This ability has made ChatGPT a valuable tool for a number of different applications.
For example, ChatGPT is being used by customer service departments to provide quick and accurate responses to customer inquiries. It is also being used by researchers and educators to generate educational content and assist with research projects. But perhaps most exciting of all, ChatGPT is being used in the entertainment industry.
By using ChatGPT, content creators are able to generate engaging and unique dialogue for their characters, bringing them to life in a way that was previously impossible.
Overall, ChatGPT is a revolutionary technology changing how we interact with AI. With its ability to understand and respond to a wide range of inputs, ChatGPT has the potential to revolutionize industries and make AI more accessible and useful for everyday people. But the development and use of ChatGPT is not without its challenges and ethical considerations.
As with any AI technology, there are concerns about the potential for bias and discrimination in the algorithms and data used to train ChatGPT. There are also concerns about the potential for misuse of the technology, such as in the creation of deepfake videos. But despite these challenges, the potential benefits of ChatGPT are vast.
By making AI more accessible and useful for everyday people, ChatGPT has the potential to improve our lives and help us solve some of the most pressing challenges facing our society. So whether you’re a tech enthusiast or just curious about the latest developments in AI, keep an eye on ChatGPT. Who knows what it will be used for next?
Musk’s involvement with AI doesn’t stop at OpenAI. He is also the CEO of SpaceX, a company that is actively involved in the development of AI for space exploration. Through their work on advanced propulsion systems and autonomous spacecraft, SpaceX is using AI to push the boundaries of what is possible in space. All of this work is part of Musk’s broader vision for the future.
He sees AI as a crucial technology that will play a major role in the development of humanity and our exploration of the universe. And through his leadership and vision, Musk is helping to make that vision a reality. Musk’s work with AI is not without its challenges and setbacks.
The field of AI is complex and constantly evolving, and there are many ethical and societal questions that need to be answered. What do you think about OpenAI and ChatGPT? Do you think this will be revolutionary for the world as we know it? Leave your thoughts in the comment section below.
Thanks for reading till the end.
- How Will The Trip To Mars Be And When
- Emmanuel Macron and Elon Musk meet in Paris to discuss something important, Take a look
- Elon Musk angrily responds to someone ”Did your brain fall out of your head”
- ‘Meet Elona, new Twitter CEO’: Elon Musk’s big announcement unleashes meme fest
|
<urn:uuid:c0cc87bc-b3bf-4f39-8efd-a8adadc2107f>
|
CC-MAIN-2023-40
|
https://complexob7.com/how-elon-musk-and-chatgpt-will-change-the-world/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511053.67/warc/CC-MAIN-20231003024646-20231003054646-00802.warc.gz
|
en
| 0.955543 | 1,204 | 2.90625 | 3 |
What is Congregationalism? - The Tradition and History
The Chapel tradition began with men and women taking religion both seriously and with conviction.
The seriousness is seen by the actions of Francis Holcroft, Fellow of Clare college, who seeing that the preacher to Litlington was so often too drunk to take the services on Sunday morning, rode out himself from Cambridge to Litlington parish church. Later Holcroft became vicar of Bassingbourn, but in 1662 under the Act of Uniformity, he refused to be hold exclusively to the Book of Common Prayer and holding to his convictions was ejected from the living.
Ejected Clergy from some local Parish Churches between 1660-1662
Abington Pigotts Isaac King; Litlington Henry Townley; John Crow at b>Ashwell; Nat. Ball at Barley & Royston; Meldreth Joseph Oddy; Sutton Wm Hunt; Therfield Marmaduke Tenant; Bassingbourn Francis Holcroft;
Also, nearby: Tempsford Edward Holt; Woburn Wm Blagrave; Barrington Thos Prestner; Arlesey James Ashurst; Over Robt Wilson; Croydon Mr King; Fowlmere Hezekiah King; East Hatley Rich. Kennett; Hitchin Thos Kidner; and James Mabbington at Roxton Beds.
Francis Holcroft and Joseph Oddy
Francis Holcroft & Joseph Oddy formed Cambridge churches and were largely responsible for the chapel tradition in Cambridgeshire. It was said, after Holcroft’s death that there was scarcely a barn in the county where he had not preached. The other influence was of John Bunyan from Bedford who helped form and run the church at Gamlingay.
In Guilden Morden the first record of a dissenting meeting was in 1700 when Thos Meade applied to the Bishop's Court to register his house as a Meeting House for Presbyterians. John Curtis remarks hat the choice of denomination is strange as Presbyterianism had not been seen since 1660.
This man, Meade, was probably the same Thos Meade who was fined, with his wife, for keeping a child unbaptised in 1686. The 1674 Hearth Tax lists only a John Meade (with one hearth) in Guilden Morden, possibly the father.
The Episcopal Returns of 1669 in fact note no dissenters in Guilden Morden, indeed none in the Shingay Deanery - but how true this was is difficult to say. In Wendy the comment was “None -though some by affected to it - Yet Sr Thomes Wendy's care restraines yem”.
However in nearby Edworth of the 9 householders listed under the same Hearth Tax, 5 were dissenters making a total of 20 dissenters in Edworth - of the "meanest sort". They were Independents that is either Baptists or Congregationalists and obviously influenced by John Bunyan who used to stop by on his way to Gamlingay. They were described as Anabaptists at Edworth and one -Vaux was "a prisonr in Hertf. goale" for his pains.
The truth might lie in between. The nice people of Wendy might have had a sneaky conventicle or two while Sir Thos was out hunting and the poor people of Edworth might have just been ordinary village Anglicans merely wanting a livelier service.
The Compton Census of 1676 lists Guilden Morden with 5 dissenters which according to J Curtis was 2.3% of the village population. (Melbourn and Meldreth had 18% and Bassingbourn 6.5%.) So the dissenting tradition was not strong.
The present Chapel has a the date of 1870 in brick work, but this is merely the date of the frontage, The Chapel was built 1840 on land given by a Mr Leete, then living in the Avenells and called its first minister Joseph Stockbridge in 1840/1, from Homerton College. A Communion Table presented in 1900 by the Reavell family honours their parents who it was said formed the church from "a small band of Christians in about 1832".
During the 19th cent both church and chapel flourished. Both took an active interest in education for children and adults and both provided schools, the British and National schools respectively, until the 1870 Education Act laid the responsibility on the parish and county councils.
Joseph Stockbridge ministered all his life in Guilden Morden, dying in 1892. He is listed as a gentleman in the Kelly's directories and eventually supplied his own house (and possibly stipend). Later in life he was forced to sell his house to the chapel for £400. The house then became the manse until this to was sold by the Chapel in 1987. Since then a new manse has been built on the chapel site and the old schoolroom (built 1900) extensively renovated.
In 1972, the churches in the Congregational Union of England and Wales and the English Prebyterian Church were asked to form a new Church, the United Reformed Church. The main practical difference in this union being that the chapel and manse properties would no longer be legally held by the local congregation but by the URC who would also have authority to close and sell the church buildings as well as to appoint ministers. This led to Guilden Morden Congregational Church (and Litlington) declining to join and to remain unaffiliated. Both are now member churches of the Congregational Federation, (of continuing congregational churches).
The main Chapel was built in 1840/1. A teaching areas and vestry were soon added. The frontage of the Chapel was added in 1870 (and dated). The Hall (called The Schoolroom) was built in 1900. One of the foundation stones was laid by Principal Horobin of Homerton New College, now re-located in Cambridge.
The Manse was completed in 1989, after the Old Manse in the High St was sold.
|Rev Joseph Stockbridge||1840-1892||educated at Homerton College|
|Rev Wm de Bruen Brewin||1893-1897|
|Rev George Snashall BA||1898-1901|
|Rev Robert W Jackson MA||1902-1907|
|Mr W Harris||1909-1921|
1921-24 served by students from Chesthunt College, Cambridge
|Rev W Hosier||1924-1931|
|Rev George Kirby||1931-1939||"rode a trike"|
|Rev Harold F Hawkes||1940-1954||"an academic minister"|
|Pastor E W Thorne||1954-1958||"retired fruit farmer"|
|Mr Kenneth Ransom||1960-1975||"also village postman"|
|Pastor David Beale||1975-1985||"heating engineer & pastor"|
|Mr Peter Combes||1986-1987|
|Rev Clifford Mountford BA||1988-1990||New College graduate|
|Rev Colin Price BA MPhil SOSc||1992-||Parish Webmaster|
|
<urn:uuid:821bcb6e-d3c1-48b6-8ad1-95e6a120b7f9>
|
CC-MAIN-2013-48
|
http://www.guildenmorden.gov.uk/cong_church_history.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164023947/warc/CC-MAIN-20131204133343-00007-ip-10-33-133-15.ec2.internal.warc.gz
|
en
| 0.970816 | 1,500 | 3.328125 | 3 |
The rare flock of Andean flamingos at WWT Slimbridge have become foster parents to chicks from their near-relatives, Chilean flamingos, after the hot spell triggered them to lay their first eggs since 2003.
The record-breaking temperatures sparked six of the exotic birds to lay nine eggs, but as they were all infertile, the expectant mums and dads were left without chicks to rear.
So to fulfil their needs as expectant parents, experts at the Gloucestershire reserve decided to give them Chilean flamingo eggs to hatch and look after as their own.
Aviculture Manager at Slimbridge Mark Roberts said:
It’s a wonderful and welcome surprise that the Andeans have started laying again after nearly two decades.
We’ve been encouraging the flock by helping them to build nests but there’s no doubt that the recent heat has had the desired effect.
Unfortunately none of the eggs were viable so with the Andeans in full parenting mode we gave them Chilean chicks to bring up as their own. It’s great motivation and enriching for the birds.
Just a handful of Chilean eggs were passed on so as to encourage the other birds to lay more eggs, in the hope one might be fertile.
The flock last successfully bred in 1999 and interestingly, one of the chicks that hatched back then is currently nesting.
Flamingos are fickle breeders and can go years without nesting successfully.
Chilean flamingos are relatively similar to the Andean. They live side-by-side in the wild but survive on different diets.
The Andean flamingos are some of the oldest animals at WWT Slimbridge. With some of the birds arriving in the 1960s as adults, they’ve been at the reserve longer than any of the staff. They are long-lived birds that are capable of breeding well into old age. However fertility does decline.
Slimbridge is the only place in the world where you can encounter all six species of flamingos. Thanks to funding, such as support from players of People’s Postcode Lottery, aviculturists are able to study these birds and help conserve them in the wild.
Visitors to Slimbridge will be able to capture the amazing spectacle of the new parent flamingos with their fostered chicks up close.
|
<urn:uuid:ff488f45-1c91-481e-88a8-46070ced07cb>
|
CC-MAIN-2023-50
|
https://www.wwt.org.uk/news-and-stories/news/heatwave-makes-flamingos-broody-for-first-time-in-15-years
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100227.61/warc/CC-MAIN-20231130130218-20231130160218-00867.warc.gz
|
en
| 0.972147 | 485 | 2.515625 | 3 |
Have problems falling asleep at night? Have you tried a sound machine with some soft music? These are just a few tips you might get from a medical professional who works in the field of sleep medicine. Sleep medicine is a recognized medical subspecialty which shows just how many people are having trouble sleeping in our modern society. Doctors who specialize in sleep medicine help people who are unable to sleep well. Sleep doctors are able to detect and treat both common and rare sleep disorders. Some common sleep disorders are insomnia, jet lag, sleepwalking, snoring and obstructive sleep apnea. Insomnia is a sleep disorder characterized by chronic problems falling asleep, staying asleep or only sleeping for several hours and being wake unable to fall back to sleep. It is typically followed by functional impairment while awake.
Insomnia is a sleep disorder characterized by chronic problems falling asleep, staying asleep or only sleeping for several hours and being wake unable to fall back to sleep. It is typically followed by functional impairment while awake.
Sleep hygiene consists of basic habits and tips that help you develop a pattern of healthy sleep. There are also easy ways to make your bed and your bedroom more comfortable. The most important thing to change bad habits into good sleep habits is to create an optima sleep environment.
- Make sure your bed is comfortable. Differ¬ent types of mattresses help with different is¬sues. Some mattresses are made to accommo¬date different types bedmates’ sleeping habits and comfort levels. Others are made to adjust to your firmness preferences. In addition, try therapeutic-shaped foam pillows that cradle your neck or extra pillows that help you sleep on your side. Make sure your sheets are com¬fortable and clean.
- Ensure your bedroom remains primarily a place for sleeping. Don’t use your bed for paying bills, doing work, etc. Help your body recognize that this is a place for rest or intimacy. So take the television out as well as the computer.
- Keep your bedroom peaceful and comfort¬able. Make sure your room is well ventilated and the temperature is consistent, and try to keep it quiet. If you have a problem with out¬side noise, a fan or a “white noise” machine can help block it out. In fact, the white noise machine, have become very sophisticated now, and offer not just white noise but the sounds of waterfalls, rain on a tin roof, the sounds in the rain forest as well as the beating of a heart to help with a baby’s sleep. Gentle, slow music is another remedy that can help to improve sleep without medication.
- Hide your clock. A big, illuminated digital clock may cause you to focus on the time and make you feel stressed and anxious. Place your clock so you can’t see the time when you are in bed.
- Expose yourself to bright light/sunlight soon after awakening. This will help to regulate your body’s natural biological clock. Likewise, try to keep your bedroom dark while you are sleeping so that the light will not interfere with your rest.
- Do not nap during the day. If you are having trouble sleeping at night, try not to nap dur¬ing the day. If you are feeling especially tired and feel as if you absolutely must nap, be sure to sleep for less than 30 minutes, early in the day.
- Limit caffeine and alcohol. Avoid drinking caffeinated or alcoholic beverages for several hours before bedtime.
- Don’t smoke. Nicotine is a stimulant and can make it difficult to fall asleep and stay asleep.
- Exercise early in the day. Twenty to thirty minutes of exercise every day can help you sleep, but be sure to exercise in the morning or afternoon. Exercise stimulates the body and aerobic activity before bedtime may make falling asleep more difficult.
- Check your iron level. Iron deficient women tend to have more problems sleeping, so if your blood is iron poor, a supplement might help.
There are also some habits you should develop during the day to help with night sleep.
Sleeping machines with sounds is really a marvel of new technology. You can get ones that have all the rain sounds or waterfalls, included with AM/FM radio, coupled with a CD player for your relaxation techniques. When I worked the night shift, I began using one to block out daytime sounds, and 15 years later, I am still using it. In fact, can’t go to sleep with out it. I highly recommend for you to add one of these machines to your sleep environment.
|
<urn:uuid:177f44af-d44a-427b-9e73-ab5cf6b2e3f6>
|
CC-MAIN-2020-29
|
https://bestinsomnia.com/have-problems-falling-asleep-at-night/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657143365.88/warc/CC-MAIN-20200713100145-20200713130145-00202.warc.gz
|
en
| 0.949638 | 946 | 2.875 | 3 |
According to the article, research shows that the navigational structure of a site matters when it comes to best understanding content. Sites generally follow one of two basic patterns. They offer information in a linear fashion, requiring students to read through the information in a predetermined order. This is similar to how they would read printed text. These sites offer links that go directly from one page to the next with no other options.
Other sites are more informal and allow the reader to move freely through the text by determining their own path. These are sites that may also have links within the text that the reader can use to get more information as needed.There is no doubt that information literacy has become something that we absolutely must teach our students. In addition to determining whether the information our students are reading online is reliable, we must teach them how to read online.
Similarly, as we ask our students to do more work online, we need to think about teaching them to write online. Are our students using blogs? Wikis? Nings? Are they publishing articles online? Then we need to teach them how to write connectively - meaning, when do they add hyperlinks? Where do they add them? What are they linking to?
I know that since I began blogging years ago, my writing has changed. It is difficult for me to write most anything without linking somewhere. When I recently submitted an article for publication to an educational journal, it was difficult to NOT link (since it would be published in print form if accepted.) But I have never really stopped to think about the process of when and why I insert a link - something that I will have to do in order to help teachers and students with this type of writing.
If you are reading and writing online - what do you notice about hyperlinks? How are you teaching students about them?
|
<urn:uuid:729c84a3-bb89-486b-9d69-914c3cb38f6d>
|
CC-MAIN-2017-26
|
http://writingframeworks.blogspot.com/2010/02/reading-and-writing-online.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320057.96/warc/CC-MAIN-20170623114917-20170623134917-00105.warc.gz
|
en
| 0.96877 | 370 | 3.3125 | 3 |
Also published at New
Scientist, Archive 13 March 1999
Hold out your arm in front of you. Whenever you feel like it, of your
own free will, flex your wrist. Repeat this a few times, making sure
you do it as consciously as you can. You'll probably experience some
kind of decision process, in which you hold back from doing anything
and then decide to act. Now ask yourself, what began the process that
led to the action? Was it you?
Neuroscientist Benjamin Libet of the University of California in
San Francisco asked volunteers to do exactly that. A clock allowed the
subjects to note exactly when they decided to act, and by fitting
electrodes to their wrists, Libet could time the start of the action.
More electrodes on their scalps recorded a particular brain wave
pattern called the readiness potential, which occurs just before any
complex action and is associated with the brain planning its next
Libet's controversial finding was that the decision to act came
after the readiness potential. It looks as though there is no
conscious "self" jumping into the synapses and starting
This and other research has led me to believe that the idea of
"self" is an illusion. You are nothing more than a creation
of genes and memes in a unique environment. Memes are ideas, skills,
habits, stories, songs or inventions that are passed from person to
person by imitation. They have shaped our minds, leading to the
evo-lution of big brains and language because these served to spread
the memes. But the memes with the cleverest trick are those that
persuade us that our "selves" really exist. We all live our
lives as a lie. The memes have made us do it--because giving us the
illusion of "self" helps them to survive and spread.
The term meme was coined by biologist Richard Dawkins in his 1976
book, The Selfish Gene, which explored the principles of
Darwinism. Charles Darwin's insight is simple, yet often
misunderstood. It is this. If organisms vary, if only some of them can
survive, and if whatever helped them survive is passed to their
offspring, then the offspring will be better adapted than their
parents were. In this way the organisms become designed, by the blind
processes of copying and selection, for the environment in which they
live. As Dawkins puts it, if you have variation, selection and
heredity, then you must have evolution.
Darwin did not have the benefit of our modern concept of an
algorithm, nor our tendency to look at everything from fundamental
physical processes to life itself in terms of information (see "I
is the law", New
Scientist, 30 January1999, p. 24). Yet he saw how this mindless
procedure could produce design without a designer. It was the American
philosopher Daniel Dennett who dubbed the process "the
evolutionary algorithm". At its heart is the information that is
copied, or the replicator.
In biological evolution, the replicators are genes, but there is no
reason why there should not be other evolutionary systems, with other
replicators. This was Dawkins's point--that Darwin's insight was too
important to confine it solely to biology--and he wanted another
example. So he invented the meme.
Everything you have learnt by copying it from someone else is a
meme. This includes your habit of driving on the left or right, eating
beans on toast, wearing jeans or going on holiday. You would do none
of these things if someone else hadn't done them, or something very
like them, before you did. Imitation, unlike other forms of learning,
is a kind of copying or replication. Other animals can be masters of
learning, as when squirrels remember their hundreds of food stores, or
cats and dogs build extensive mental maps. But this is learning by
association, or trial and error. Only by imitation are the fruits of
the learning passed on from one animal to the next--and humans are
unrivalled when it comes to copying one another.
But are memes replicators? In other words, do they fit into the
evolutionary algorithm of variation, selection and heredity? I say the
answer is yes. Memes are "inherited" when we copy someone
else's action, when we pass on an idea or a story, when a book is
printed, or when a radio programme is broadcast. Memes vary because
human imitation is far from perfect, and the vagaries of memory mean
that every time we retell a story we change some little detail, or
forget some minor point. Finally, there is memetic selection. Think of
how many things you hear in a day, and how few you pass on to anyone
else. Think of how many scientific ideas you have read in this
magazine, and how few you will remember.
To understand what makes a meme successful, let's take a
"meme's eye view". Imagine a world full of hosts for memes
(such as brains), and far more memes than can possibly find homes.
Which memes are likely to find a safe home and get passed on again?
Highly memorable ones should do well, as should useful ones (such as
science, perhaps), and ones that provoke strong emotional reactions.
Those that fit well with our genetic predispositions should
succeed--so sexy photos get everywhere, and recipes can spread around
Chain letters, like viruses, spread because they include
instructions to pass them on, along with threats or promises. The same
can be said of cults and religions--indeed Dawkins calls religions
"viruses of the mind". They succeed because of the tricks
they use to persuade us to copy them. If this sounds as though memes
have plans and intentions, remember that the only process going on is
selection. The memes that get copied--for whatever reason--stay with
us, the rest die out.
Some people object to the whole idea of memes on the grounds that
memes are not like genes. No, they are not. We cannot pin memes down
to a single molecule of DNA as we can with genes. Memes also vary
enormously in the size of their effective unit, from a few notes to a
whole symphony or from a single word to a whole book. And while genes
use the cellular machinery of protein synthesis for their replication,
memes use the human brain as their copying device.
So if we try to draw strict analogies between genes and memes we
will be led astray. The right starting point is not the analogy with
genes, but the principles of Darwinism. From this perspective, a human
being is the creation of two selfish replicators, genes and memes,
working together. And once we look at it this way, some of the
mysteries of the human mind begin to fall into place.
For example, why do we have language, a complex culture and such an
enormous brains? These evolutionary developments did not come cheap.
We can speak only because our neck, mouth and brain have been
completely restructured. In proportion to our body mass, our brain is
three times as large as that of our nearest relatives. This huge organ
is dangerous and painful to give birth to, expensive to build and, in
a resting human, uses about 20 per cent of the body's energy even
though it is just 2 per cent of the body's weight. There must be some
reason for all this evolutionary expense.
Early theorists suggested that our bigger-brained ancestors survived
because they were better at hunting or finding food, while more modern
theories emphasise complex social pressures. For example, the
Machiavellian intelligence hypothesis suggests that our ancestors
needed a larger brain to deceive others, detect deception, and
remember who had done what to whom (see "Liar!
Liar!", New Scientist, 14 February 1998, p 22). According to
psychologist Robin Dunbar of the University of Liverpool, the function
of language is gossip, and gossip is a substitute for grooming for
keeping large social groups together. Other theories emphasise the use
of symbols and their importance in communication.
These theories all have something important in common. They assume
that the ultimate function of the human brain and of language is to
serve the genes. If you are a Darwinian, you might think that this is
the only possible answer because design for a function can only be the
result of natural selection working through genes. Yet that would be
to take too narrow a view of Darwinism, for genes are not necessarily
the only replicators. Once you allow the idea that memes have been
coevolving with genes, a new possibility opens up--that the human
brain and language evolved not to spread genes, but to spread memes.
It could have worked like this. Members of a species of early
hominid acquired the difficult and rare skill of imitating each other.
At first they imitated things important for survival, such as new ways
of carrying food, hunting or making tools. Since these skills helped
them survive, it made sense for everyone else to imitate the best
imitators, and also to try to mate with them. This meant that genes
for being good at imitation spread and, since imitation is difficult
and requires a large brain, brain size increased.
And as early humans became ever more skilful imitators, any meme
that was good at getting itself copied, for whatever reason, would
tend to spread. The practice of copying sounds for communication was
one of the more useful memes for humans. Sound can be used to transfer
memes to many people at once. If it can be grouped into distinct
units--as it is with words--then the copying fidelity is improved, and
memes will spread farther and more easily without being corrupted.
If variations of word order can be copied, then more niches for
memes open up, allowing more memes to spread. As people both imitate,
and try to mate with, the best imitators, the ability to copy complex
words in precise orders will be spread, both memetically and
genetically. In other words, by what we might call "memetic
driving", the memes put pressure on the genes to create ever
better apparatus for spreading them. This means big brains designed
especially for language.
This process might seem unfamiliar, but in fact something similar
occurred long ago, when genes coevolved with the cellular mechanisms
that copy them. In their new book The Origins of Life, John
Maynard-Smith and Eörs Szathmáry urge us to view life on the largest
scale, starting with the first simple replicating molecules. They
describe all the major changes in the way information is transmitted,
copied and stored. The appearance of memes can be seen as the latest
stage in this evolutionary process. It explains the appearance of a
species capable of language and complex culture. We are meme machines.
What's more, this process has not stopped. It is still creating new
meme-copying devices. While human language is a vast system for
transmitting memes with high fidelity, it took the invention of
writing to enable memes to be stored. Now telephones, fax machines,
photocopiers, computers and the Internet all increase the speed and
ease of meme-replication. We may think that we invented all these
machines for our own convenience, but once memes got going, these
devices--or something like them--were inevitable. The real driving
force is the evolutionary algorithm. And the real beneficiaries are
not us but the selfish memes.
Just as selfish genes group together for mutual protection, so
whenever memes can propagate better as part of a group than on their
own they form co-adapted meme complexes, or memeplexes. Memeplexes
include languages, religions, scientific theories, political
ideologies and belief systems such as acupuncture or astrology. Like
memes, memeplexes spread as long there is some reason for them to be
copied. Some are true or useful, others are copied despite being
These vast memeplexes, with their varied means of propagation, form
the very stuff of our lives. Yet there is one memeplex, perhaps the
most powerful of all, that we readily overlook. That is our own
familiar self. Like other animals, we have a body image--a plan of our
body used for organising sensations and planning skilled actions. We
also have, as some other animals do, the ability to recognise other
individuals and understand that they, too, have desires and plans. So
far so good--but now we add the capacity to imitate, the use of
language and the word "I".
Heart of the selfplex
At first "I" may mean just "this body", but soon
it begins to change. We say "I like ice cream", "I
can't stand shopping malls", "I want to be famous", or
"I believe in Father Christmas". And the "I" no
longer refers just to a body, but to some imagined inner self that has
intentions, possessions, fears, beliefs and aspirations.
This "I" forms the heart of the selfplex. And all the
memes in your selfplex thrive because you work to defend them in
arguments, to promote them in discussions, perhaps even to write about
them in books and articles. In this way these self-related memes
succeed where others fail, and so the selfplex grows.
Once the "self" has begun to form, it meets each new idea
it comes across with "Yes, I agree with this" or "No, I
don't like that". Although each self is unique in the body it
describes as "mine", and in the ideas it picks up along the
way, those ideas are all memes and the self offers them a safe haven.
I think modern neuroscience makes it clear that the self cannot be
what it appears to be. We may feel as though we have a special little
"me" inside, who has sensations and consciousness, who lives
my life, and makes my decisions. Yet, this does not fit with what we
know about the brain. Look inside a brain and what do you see? There
is no central place into which all the impressions come and from where
the orders go out. Rather, there is a massive processing system
dealing with numerous things at once, only very few of which ever
It may feel as though "my" consciousness starts the
actions this body performs, but as Libet's experiments showed,
conscious awareness takes about half a second to build up, far too
long for it to initiate reactions to a fast changing world. And the
brain is constantly being changed by everything that happens to it, so
that "I" am not the same as I was ten years, or even a few
There is a long and venerable tradition of thinkers who have
rejected the idea of a real and persistent self. The Buddha proclaimed
that actions and their consequences exist, but that the person who
acts does not. According to the Buddhist doctrine of anatta,
the self is more like an ever-changing construction than a solid
entity. The 18th-century philosopher David Hume likened the self to a
bundle of sensations tied together by a common history.
Using more contemporary metaphors, Dennett argues that the brain
builds multiple drafts of what is happening as information flows
through its parallel networks. One of these drafts becomes the story
we tell ourselves and includes the idea of an author of the story, or
a user of the brain's virtual machine--consciousness is a "benign
user illusion". So rather than being a permanent, persisting
entity, the self may be more like a story about a self that does not
I believe these ideas have implications for the way we live. As
society becomes more complex, and memes spread faster and farther, so
our selves become more complicated. The unhappiness, desperation and
psychological ill-health of many modern people may reflect the fact
that increasing numbers of memes are using our poor over-stretched
brains to construct a false self for their own propagation. Perhaps
the user illusion is not so benign after all. Some would even say that
belief in a permanent self is the cause of all human suffering--of
fear, jealousy, hatred and unkindness.
But is it possible to live life without the illusion? One way might
be to calm your mind. Techniques such as meditation, say, can still
the memes that are constantly competing for your brain space, forcing
you to keep thinking. Long traditions of training in meditation show
this is possible: that years of practice can bring emptiness,
compassion and clarity of mind. Meditation, at its simplest, consists
of just sitting quietly and clearing the mind of all thoughts, and
then, when more arise, just letting them go.
Meditation is itself a meme, but is, if you like, a meme-clearing
meme. Its effect is not to obliterate all awareness, but rather to
create an awareness that is more spacious and open, and seems, perhaps
paradoxically, to be without a self who is experiencing it.
If this memetic analysis is correct, the choices you make are not
made by an inner self who has free will, but are just the consequence
of the replicators playing out their competition in a particular
environment. In the process they create the illusion of a self who is
Dawkins ends The Selfish Gene with his famous claim that:
"We, alone on earth, can rebel against the tyranny of the selfish
replicators". Yet, if we take his idea of memes seriously, and
push it to its logical conclusion, we find that there is no one left
SUSAN BLACKMORE is a lecturer in psychology at the University of
the West of England, Bristol. Her new book, The Meme Machine, is
published by Oxford University Press and will be reviewed next week
From New Scientist, 13 March 1999
Copyright New Scientist, RBI Limited 1999
|
<urn:uuid:6422be79-5802-490f-850a-9b8e118b52c2>
|
CC-MAIN-2014-15
|
http://www.susanblackmore.co.uk/journalism/NSmeme%201999.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609537271.8/warc/CC-MAIN-20140416005217-00269-ip-10-147-4-33.ec2.internal.warc.gz
|
en
| 0.944924 | 3,893 | 3.0625 | 3 |
Tiger Highlights 2015
On 3rd November 2015, the Russian government approved the creation of “Bikin National Park” in the Bikin River Basin, Primorsky Province. Often referred to as “the Russian Amazon“, the forests of Bikin River are the largest area of intact mixed forest in the Northern Hemisphere. The move protects more than 1.16 million hectares of forest – both the traditional land of the Udege people and crucial habitat for the endangered Amur tiger.
President Vladimir Putin ordered the creation of a federal level protected area in the upper and middle reaches of the Bikin River Basin, located on the Western slope of the Sikhote-Alin Mountain Range.
The outstanding global value of the Bikin River Basin was confirmed in 2010, when the forest was added to the UNESCO World Natural Heritage list, securing a future for the indigenous inhabitants of the Basin, the Udege and Nanai people, whose livelihoods depends on the preservation of these forests.
In addition to the great cultural and historical significance, this area has exceptional nature conservation value. The forests are home to 10% of the world’s Amur tiger population. Russia’s 2015 tiger census revealed that the country now has as many as 540 wild Amur tigers. The creation of Bikin National Park is a strong step towards establishing the protected area network necessary for the survival of these tigers, and is an essential step towards Tx2, the global goal to double wild tiger numbers.
The indigenous inhabitants of the Bikin River Basin - Udege (pictured) and Nanai people - depend on the preservation of the Bikin River Basin.
The Bikin River Basin is home to 10% of the world's Amur tigers.
Yury Darman, director of WWF-Russia's Amur branch and established ecologist for the Russian Federation, in the Bikin River Basin.
'We congratulate WWF Russia and partners for this tremendous conservation success"Mike Baltzer, Leader of WWF Tigers Alive Initiative
|
<urn:uuid:bf10a83e-f802-4f06-9e26-9e88ed1157a7>
|
CC-MAIN-2017-30
|
http://tigers.panda.org/news/bikin-national-park/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549423681.33/warc/CC-MAIN-20170721022216-20170721042216-00626.warc.gz
|
en
| 0.911833 | 423 | 3.03125 | 3 |
Idols of wood and stone – warning from the law
When the children of Israel were led forth from Egypt, they left behind a land absolutely full of idols. Those who are said to know tell us that the Egyptians worshipped around 2,000 different gods. The Israelites saw the great judgements of the Lord which had been poured out upon these pagan deities in the form of ten awesome plagues (Exodus 12:12). Logically speaking, therefore, we might expect that they would have realised that the gods of Egypt – indeed of all Gentile nations – were nothing. Having seen all that had been done for them in the period leading up to, and during, the exodus, the Israelites would surely worship the mighty one of Abraham, Isaac and Jacob alone. In case the point had been missed, the law given through Moses at Sinai forbad the making of, and bowing down to, idols of any kind. Time and again the same point was made:
“Thou shalt not make unto thee any graven image, or any likeness of any thing that is in heaven above, or that is in the earth beneath, or that is in the water under the earth …” (20:4)
Sadly, we know that Israel broke this very simple law with astonishing regularity. They were already in the habit of worshipping Egyptian idols even before the exodus (see Ezekiel 20:8). This practice continued in the wilderness, when the molten calf was made. Other images were carried through the desert (Acts 7:43). Once they entered the land, after an initial period of faithfulness under Joshua and the next generation (Judges 2:7), God’s people descended into idolatry once more. These actions went on virtually unchecked, until they were carried away captive, Israel into Assyria and Judah into Babylon. There they would be absolutely surrounded by idolatry! And what were many of these idols made of? Wood and … stone:
“And the LORD shall scatter thee among all people, from the one end of the earth even unto the other; and there thou shalt serve other gods, which neither thou nor thy fathers have known, even wood and stone.” (Deuteronomy 28:64)
So when the Gentiles made themselves stone idols and bowed before them, these lifeless items were alive in the minds of those who worshipped them. It was as though the stone, which was meant to be a small representation of the pagan deity in question, possessed life: a “living stone”. How tragic that Israel fell into this same trap and followed their Gentile neighbours.
These things are not written so we can feel superior, patting ourselves on the back that we have never bowed down to idols made of wood and stone as the faithless Israelites did. They are “written for our learning” (Romans 15:4; 1 Corinthians 10:11). If we fail to see the dangers of the things of this world which threaten us today, then we are no different from Israel in the wilderness. Though we may not actually bow down before idols, the Apostle Paul identifies covetousness as idolatry in Colossians 3:5. Can any of us honestly say that we do not, at times, covet some of the things of this world?
The nation in the wilderness had a rock which had life-giving properties – the one from which water flowed (Exodus 17:6,7). That rock, in symbol, “was Christ” (1 Corinthians 10:4). He is our source of strength. Only in him, by God’s grace, are we alive. Only if he is our foundation can we withstand the trials and tribulations of this life. Only in him can we grow, spiritually.
What a challenge this is then for us. As Jesus is a living and life-giving stone, we are called upon to emulate his example. We must possess the strength of a stone, while manifesting the hope of life which is ours to those in the world. As “lively stones” we will show to others the attributes of our Lord and Master, the true “living stone”.
- Jonathan Cope for the Christadelphian Magazine
- Bible sayings about God
- Two states of existence before God
- Man enticed to long for more
- On the Edge of Believing
- The Best Bedtime Stories
- Commemorating the escape from slavery
- Marriage of Jesus 8 Wife of Yahweh
- It takes guts to leave the ruts
- To Soar In The Spirit You Have To Be Hard Core
- Only six of ten commandments of God still important to British Christians
- Idol worship?
- Chopping Down Idols
- Falling Idols
- Crucifying our idols
- Idols, Idols, Everywhere…
- Will Jesus forgive me?
- No One Lives Without Faith
- The Catholic mass: How a simple memorial became a pompous, elaborate ritual
- The Ancient Origins of Modern Holidays
- Polytheist vs. [Neo]Pagan
- Idolatry (by They were strangers)
- My Religion is Rooted, Literally.
- Thankfulness vs. Idolatry
- Idolatry: A Subtly Profound Idea
- The Idolatry of Man and the Grace of God
- honestly, it’s idolatry
- Workplace IdolatryAm I A Sinner?Preaching Idolatry
- Guilty of IdolatryThe Church And What It Has Become
- The Days Are Now
- Unity in ChristMy Living Stone
|
<urn:uuid:1f9fb298-73e2-4e62-ac5b-9b50a284c2e0>
|
CC-MAIN-2020-05
|
https://christadelphians.wordpress.com/2018/01/16/living-stones-4-idols-of-wood-and-stone/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250594705.17/warc/CC-MAIN-20200119180644-20200119204644-00097.warc.gz
|
en
| 0.951971 | 1,178 | 2.515625 | 3 |
In 1913, Thomas Edison proudly proclaimed, “Books will soon be obsolete in the schools…It is possible to teach every branch of human knowledge with the motion picture. Our school system will be completely changed in the next ten years.”
Perhaps we should all be reminded that Edison was not an educator. He was an inventor…and a shrewd, litigious businessman. In 1897, Edison was granted a patent for the Kinetograph, which eventually became the Kinetoscope, a device for showing early motion pictures. He also owned a majority of the other patents related to motion picture cameras. In 1909, Edison formed a group with other American film companies to create the Motion Pictures Patents Company (MPPC), which protected their patent interests and severely limited new competition. In 1917, however, the Supreme Court found the MPPC in violation of the Sherman Antitrust Act and dissolved the trust. The following year, Edison left the film industry altogether. I wouldn’t be surprised if his interest in education and motion pictures also ended at the same time.
Edison’s comments about the educational possibilities of film in 1913 should be read through his financial interests, not his pedagogical concerns. He was trying to make money in a field that is – understandably – interested in improving its methodology and overall efficacy. Moreover, Edison was part of an era where new visual media, such as glass lantern slides, stereoviews, even school museums, were championed as important advancements in education. It must be added that these products were pushed by businesses equally shrewd as Edison’s company, such as the Keystone View Company which published a teacher’s guide to using lantern slides and stereoviews in the classroom, entitled Visual Education.
This trend has continued into the twenty-first century. In her review of the worst of education technology in the past decade, Audrey Watters highlights the lingering presence of commercial interests in education, placing “venture capitalism” and “(venture) philanthropy” third and second, respectively, on her list of 100 worst debacles from the 2010s (only to be surpassed by anti-school shooter software for number one). Unsurprisingly, Watters notes venture capitalists and venture philanthropists are responsible for many of the other entries on her list of the worst.
It is not uncommon when I talk to my colleagues in higher education for them to ask if the insights that I’ve gleaned from instructional development represent trends or fads. I always respond first by trying to make a fine distinction between instructional development and instructional technology, although they are inextricably intertwined. Instructional technology, by its nature, is trendy because so much money (and cultural capital) is invested in advancing technology generally. The first real wave of calls for instructional change (and arguably the origins of instructional development) came on the heels of new technological advancements in visual media in the early twentieth century. Unsurprisingly, the continued advancement of technology, with computers, cell phones, and the internet as the most recent and significant, has also led to calls for educational change, reflected in the new initiatives around the expanded use of MOOCs, phone apps, or online videos, to just name a few.
Instructional development does not tend to be as fickle, but it is also not immune to fad chasing. Nevertheless, there has been slow and steady amount of research developing a repertoire of strategies to increase teaching efficacy over the past few decades. Now-standard aspects of university education, such as formulating clear learning objectives, derived from earlier theories about criteria-referenced measures first postulated by Robert Glaser and others in the 1960s. Even the more recently contentious arguments over the move away from strict lecturing (not the abolishment of all lecturing!), has roots in insights about constructivism and active learning in the 1990s. One could argue there has been a slow building of knowledge about pedagogy over the past few decades, not a flip-flopping between mutually exclusive teaching methods. I’ve discussed the history and goals of instructional development elsewhere and will refer the reader to that post [here: Instructional Design in Higher Education: What is It?].
Though anecdotal, the advice I’ve gotten from most folks in instructional development has always been strategic and specific, not global. Group activities work in some scenarios, while in other scenarios a lecture will be better. I’ve always seen instructional development about building a toolbox of teaching skills that can be deployed when rhetorically and pedagogically appropriate. Even when I’ve talked about educational technology, I’ve always seen it as a tool that needs to be appropriate to your pedagogical purpose. The hanging question should not be how do we integrate technology into our classrooms, but whether technology can sustain or even advance our educational aims. We should not adapt our teaching just to incorporate technology, to me that is pedagogically unsound.
Quoted in Reiser 2001a: 55.
Reiser 2001a: 55.
Reiser 2001b.
- Reiser, Robert A. 2001a. “A History of Instructional Design and Technology: Part I: A History of Instructional Media,” Educational Technology Research and Development, Vol. 49, No. 1, pp. 53-64.
- Reiser, Robert A. 2001b. “A History of Instructional Design and Technology: Part II: A History of Instructional Media,” Educational Technology Research and Development, Vol. 49, No. 2, pp. 57-67.
|
<urn:uuid:eed6b78b-d645-49bd-b414-c288ead07e96>
|
CC-MAIN-2020-05
|
https://peterromaskiewicz.com/2020/01/06/educational-technology-educational-fads-and-the-pedagogical-toolbox/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250595787.7/warc/CC-MAIN-20200119234426-20200120022426-00071.warc.gz
|
en
| 0.954761 | 1,146 | 3.0625 | 3 |
Rotary’s programs for students and youth can change the lives of those who participate. Through these programs, young people can earn scholarships, travel on cultural exchanges, or help a community through a service project.
New Generations Programs
Ages 12-30, can get involved in Rotary’s New Generations programs which include:
Rotary Foundation Educational Programs promote international understanding by bringing together people from different countries and cultures.
Rotary has a long tradition of fostering peace and international understanding through education.
Since 1947, Rotary Foundation Ambassadorial Scholarships have given more than 41,000 men and women the opportunity to study abroad. Although the program will come to an end in 2013, new scholarship opportunities through the Foundation’s district and global grants will give Rotarians greater flexibility to sponsor scholars.
Rotary Peace Centers offer a master’s degree in international relations, sustainable development, peace studies, and conflict resolution, or a professional development certificate in peace and conflict studies
Each year, thousands of young men and women participate in Rotary’s educational and New Generations programs, which enable them to develop new skills, serve their communities, and foster international understanding. But the experience doesn’t have to end when the program is over.
As alumni, they are part of an extended network of people who share a common bond. They’ll always belong to the family of Rotary. Keep them involved with the ideas and resources in Rotarians and alumni
|
<urn:uuid:a828608d-8af2-48f6-b532-35ce1a652147>
|
CC-MAIN-2014-15
|
http://www.ahwatukeefoothillsrotary.org/?p=53
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609525991.2/warc/CC-MAIN-20140416005205-00101-ip-10-147-4-33.ec2.internal.warc.gz
|
en
| 0.927624 | 303 | 2.5625 | 3 |
The boreal and temperate Euro-Siberian region is the Palearctic's largest biogeographic region, which transitions from tundra in the northern reaches of Russia and Scandinavia to the vast taiga, the boreal coniferous forests which run across the continent. South of the taiga are a belt of temperate broadleaf and mixed forests and temperate coniferous forests. This vast Euro-Siberian region is characterized by many shared plant and animal species, and has many affinities with the temperate and boreal regions of the Nearctic ecoregion of North America. Eurasia and North America were often connected by the Bering land bridge, and have very similar mammal and bird fauna, with many Eurasian species having moved into North America, and fewer North American species having moved into Eurasia. Many zoologists consider the Palearctic and Nearctic to be a single Holarctic ecozone. The Palearctic and Nearctic also share many plant species, which botanists call the Arcto-Tertiary Geoflora.
A great belt of deserts, including the Atlantic coastal desert, Sahara desert, and Arabian desert, separates the Palearctic and Afrotropic ecoregions. This scheme includes these desert ecoregions in the palearctic ecozone; other biogeographers identify the ecozone boundary as the transition zone between the desert ecoregions and the Mediterranean basin ecoregions to the north, which places the deserts in the Afrotropic, while others place the boundary through the middle of the desert.
Central Asia and the Iranian plateau are home to dry steppegrasslands and desert basins, with montane forests, woodlands, and grasslands in the region's high mountains and plateaux. In southern Asia the boundary of the Palearctic is largely altitudinal. The middle altitude foothills of the Himalaya between about 2000–2500 m form the boundary between the Palearctic and Indomalaya ecoregions.
China, Korea and Japan are more humid and temperate than adjacent Siberia and Central Asia, and are home to rich temperate coniferous, broadleaf, and mixed forests, which are now mostly limited to mountainous areas, as the densely populated lowlands and river basins have been converted to intensive agricultural and urban use. East Asia was not much affected by glaciation in the ice ages, and retained 96 percent of Pliocene tree genera, while Europe retained only 27 percent. In the subtropical region of southern China and southern edge of the Himalayas, the Palearctic temperate forests transition to the subtropical and tropical forests of Indomalaya, creating a rich and diverse mix of plant and animal species. The mountains of southwest China are also designated as a biodiversity hotspot. In Southeastern Asia, high mountain ranges form tongues of Palearctic flora and fauna in northern Indochina and southern China. Isolated small outposts (sky islands) occur as far south as central Myanmar (on Nat Ma Taung, 3050 m), northernmost Vietnam (on Fan Si Pan, 3140 m) and the high mountains of Taiwan.
One bird family, the accentors (Prunellidae) is endemic to the Palearctic region. The Holarctic has four other endemic bird families: the divers or loons (Gaviidae), grouse (Tetraoninae), auks (Alcidae), and waxwings (Bombycillidae).
There are no endemic mammal orders in the region, but several families are endemic: Calomyscidae (mouse-like hamsters), Prolagidae, and Ailuridae (red pandas). Several mammal species originated in the Palearctic, and spread to the Nearctic during the ice ages, including the Brown Bear (Ursus arctos, known in North America as the Grizzly), Red Deer (Cervus elaphus) in Europe and the closely related Elk (Cervus canadensis) in far eastern Siberia, American Bison (Bison bison), and Reindeer (Rangifer tarandus, known in North America as the Caribou).
Amorosi, T. "Contributions to the zooarchaeology of Iceland: some preliminary notes." in 'The Anthropology of Iceland' (eds. E.P. Durrenberger & G. Pálsson). Iowa City: University of Iowa Press, pages 203–227, 1989.
Buckland, P.C., et al. "Holt in Eyjafjasveit, Iceland: a paleoecological study of the impact of Landnám." in Acta Archaeologica 61: pp. 252–271. 1991.
|
<urn:uuid:4228565e-0444-4a08-8a79-8a56dc852a39>
|
CC-MAIN-2014-15
|
http://en.wikipedia.org/wiki/Palearctic_ecozone
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609538110.1/warc/CC-MAIN-20140416005218-00549-ip-10-147-4-33.ec2.internal.warc.gz
|
en
| 0.916989 | 994 | 3.8125 | 4 |
Q. “My eighteen-month-old son has far fewer words than the other kids in his play group. When should I worry? ”
A. No need to worry when you can do something about it right now. I’ve seen lots of guidelines for language development and they’re all helpful.
Two-month-olds should cry in many different tones and volumes if they’re not fed or picked up on time. They should not have only one pitch or volume.
Four-month-olds should respond to sound by “talking” to you. They laugh and vocalize responsively.
Six-month-olds babble a lot more and use syllables (meaningless syllables, usually) and consonants to express themselves
Eight-month-olds easily turn to their own names and have even more varied tones, pitches, inflections in their conversations with you. They sometimes look desperate as they try to say “mama” or “dada” to get your attention. They work hard at “studying” your mouth because you can mama, dada and doggy whenever you want and they’d like to be able to do that, too!!
By a year of age they have many more “words” involving more consonants and they are clearly trying out their voices and words while they play independently or when they talk to you.
Fifteen-month-olds combine gesturing and pointing with a few words to indicate their needs, likes and dislikes. They usually find the word “no” pretty quickly and use it. They are beginning to become frustrated at the disparity between the number of words they understand (a lot) and the number they can speak (very few) and that preverbal frustration is a big developmental milestone.
Eighteen-month-olds imitate our words, have a dozen or more words of their own—maybe a lot more—make animal sounds, and often will sing with us.
Two-year-olds talk. They have short sentences, use nouns, verbs, “read” books and point and have increasing frustration because they understand hundreds and hundreds of words but often can’t complete the answers to your questions.
Or not! . . . Many completely normal babies and toddlers lag behind the above guidelines and develop language a little slower. The key to this whole issue isyour observation of their peer group interactions and then truly following your gut instinct of how you think your child is behind. Certainly don’t ignore others’ advice or cautions, but you know your child better than anybody else.
Talk to your pediatrician and then see a good speech and language evaluator. If your instincts tell you your child’s language development is not progressing as you’d like, don’t take no for an answer.
|
<urn:uuid:3262cbf2-c062-4148-9aed-ad964b566cb8>
|
CC-MAIN-2014-15
|
http://drjaygordon.com/faq/development/speech
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223206770.7/warc/CC-MAIN-20140423032006-00319-ip-10-147-4-33.ec2.internal.warc.gz
|
en
| 0.969236 | 598 | 3.265625 | 3 |
.NET Training Overview|
Microsoft .NET is an advance in programming technology that greatly simplifies application development, both for traditional, proprietary applications and for the emerging paradigm of Web-based services. .NET is a complete restructuring of Microsoft’s entire system infrastructure and represents a major learning challenge for programmers developing applications on Microsoft platforms. There is substantial change to the Visual Basic language. The new version of the language, Visual Basic .NET, or just VB.NET, is now a fully object-oriented language with features such as interfaces, inheritance, and polymorphism.
This two-day course is designed for the experienced programmer to help you quickly come up to speed on the VB.NET language and to learn the fundamentals of GUI programming using Windows Forms. It is current to .NET 2.0, which introduces important new features, such as generic types and partial classes. It is designed so that it can be run with either .NET 1.1 or .NET 2.0.
The course concisely covers the essentials of Windows programming using Microsoft’s VB.NET programming language. It starts with a brief chapter, “.NET: What You Need To Know,” which gets you up and running in the .NET environment with a minimum of fuss. The next two chapters cover VB.NET language essentials and object-oriented programming in VB.NET. The next chapter discusses how VB.NET relates to the .NET Framework. The following chapter provides a succinct introduction to creating GUI programs using Windows Forms. The course concludes with an overview of the new VB.NET features provided by .NET 2.0, including example programs to illustrate each important new feature. An appendix explains the fundamentals of working with the Visual Studio .NET development environment.
The course is practical, with many example programs and two case studies. The goal is to bring you up to speed quickly in writing VB.NET programs, including GUI applications. The student will receive a comprehensive set of materials, including course notes, and all the programming examples. The book Application Development Using Visual Basic and .NET is recommended as a supplement to the course.
.NET Training Learnning Objectives
.NET Training Prerequisites
- Acquire a working knowledge of VB.NET programming
- Learn about important interactions between VB.NET and the .NET Framework
- Learn how to implement simple GUI programs using Windows Forms
- Gain a working knowledge of generic types and other new features in VB.NET 2.0.
The student should be an experienced application developer or architect. Some background in object-oriented programming would be helpful.
.NET Training Course duration
.NET Training Course outline
1. .NET: What You Need To Know|
.NET Executables and the CLR
A .NET Testbed for VB.NET Programming
Visual Studio .NET
2. VB.NET for the Sophisticated Programmer|
First VB.NET Console Application
Subroutines and Functions
3. Object-Oriented Programming in VB.NET|
Methods and Properties
Shared Data and Methods
4. VB.NET and the .NET Framework|
Generic .NET Interfaces
Random Number Generation
5. Introduction to Windows Forms|
First VB.NET Windows Application
|6. New Features in VB.NET 2.0|
Visual Studio 2005
Properties with Mixed Access Levels
Built-In My Object
Other New Features
Appendix A. Using Visual Studio .NET
Overview of Visual Studio.NET
Creating a Console Application
Course exercises require Microsoft Visual Studio .NET 2003 or any version of Visual Studio 2005 on Windows 2000 or XP. Visual Basic 2005 Express Edition can also be used. See the appropriate course Setup Guide for details.
A good minimal hardware profile for this course would have a Pentium 500-MHz or equivalent CPU, 256 MB of RAM, and at least 3 GB of free disk space for tools installation and courseware.
|
<urn:uuid:0fa9cdd9-e810-4efc-bd2b-f7e99a77c4c0>
|
CC-MAIN-2020-10
|
http://wintrac.com/courses/vbdotnetessentials.asp
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146643.49/warc/CC-MAIN-20200227002351-20200227032351-00333.warc.gz
|
en
| 0.818876 | 825 | 3.203125 | 3 |
- News & Updates
Family Safety: How to Properly Store Household Cleaners
According to the Center for Disease Control (CDC), over 300 children in the U.S. are treated daily for poisoning in emergency departments. The Minnesota Poison Control System reports that the most common call they receive each month is related to household cleaner poisoning. Out of 4,200 calls, poisonings related to children five years and younger make up 42% of these calls. Protect your family from potential poisoning with these safety tips to properly store and dispose of toxic household cleaners.
Laundry Detergent Packets Cause Poisoning in Children
Common household products can be dangerous for young children, as seen with the recent problem of children eating miniature detergent packets. Children eat the packets because they mistake them for brightly colored candy. The packets cause more severe poisoning symptoms (i.e. difficulty breathing), compared to liquid or powder detergent, because the packets are more concentrated and activate more quickly when ingested.
Store Cleaners in Safe, Locked Locations
It’s important to check every room in your home for toxic cleaners: kitchen, bathrooms, living and family areas, laundry room, garage, backyard/outdoor areas. Store household products safely out of the reach and sight of children. Don’t forget about your pets – toxic cleaners can be harmful to animals as well.
To prevent poisoning, WebMD recommends the following guidelines for storing household cleaners:
Keep cleaners in their original container. Do not store in milk jugs or coffee cans. Children can easily mistake them for food or drinks, and may accidentally ingest the toxic product.
Remove household products from under the sink or easy-to-reach drawers or cabinets.
Install child safety locks on cabinet doors and drawers before toddlers learn to crawl, walk, and climb.
Supervise children. While cleaning, do not leave products unattended and after use, return them to their original locked location.
Discard old or empty products outside in a sealed trash receptacle.
Don’t Mix Cleaning Products Together
The Environmental Protection Agency (EPA) advises parents that one of the best ways to keep children safe is to carefully read and follow all label instructions when using household cleaners. Do not combine common household cleaners as they could produce toxic fumes, and can be harmful to the skin, eyes, and lungs. Avoid mixing these products together:
Acidic and alkaline products – acids mixed with bases can cause chemical burns
Vinegar or ammonia with bleach – releases dangerous chloramine vapors
Different brands of products – may produce harmful toxins
If you are worried about the safety of your family and pets, use non-toxic, eco-friendly household cleaners.
Do Not Dump Household Waste
Remember to respect the environment, and do not dump toxic chemicals down storm drains or in lakes or rivers. If you need to dispose of household waste, The Minnesota Pollution Control Agency offers a Household Hazardous Waste program.
Warning Signs of Poisoning
Despite taking safety precautions to keep your family safe, accidents can sometimes happen. The Mayo Clinic points out the following warning signs related to poisoning:
Burns or redness around mouth and lips
Chemical odor on child’s breath
Severe symptoms include:
Extreme agitation or restlessness
Difficulties with breathing, speaking, or has stopped breathing
If you suspect a family member has ingested a toxic household cleaner, call Minnesota Poison Control 1-800-222-1222. If they show severe symptoms such as difficulty breathing, call 911 immediately.
BACK TO NEWS & UPDATES
|
<urn:uuid:0b2df7e8-788e-41a2-9180-1e0d7e3a971c>
|
CC-MAIN-2023-23
|
https://www.meshbesher.com/news-and-updates/family-safety-how-to-properly-store-household-cleaners/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648911.0/warc/CC-MAIN-20230603000901-20230603030901-00217.warc.gz
|
en
| 0.9061 | 770 | 2.703125 | 3 |
Introduction to Wide-Format Printers and Plotters
Printing is a consistent expense for all businesses. Maybe you can get by sending the occasional oversized print job to a copy shop. However, if you often print blueprints, banners, or other documents over two feet wide, purchasing a wide-format printer (sometimes called a plotter) is an excellent investment. These machines print in either black and white or color, on a wide range of materials, in widths of 24" to 60" or more.
There are two primary markets for wide-format printers. The first is the architecture, engineering, and construction (AEC) industry, which has long used plotters for blueprints and other technical documents.
While it's not technically correct, many buyers use the terms "wide-format printers" and "plotters" interchangeably.
Some individual dealers and manufacturers use both terms, typically reserving the term "wide-format printer" for high-end graphics production machines -- but in general, the two terms overlap.
The other market is for graphics printing. Print and design shops use wide-format printers to create large-scale banners, signs, textiles, custom fabric orders, and durable outdoor graphics for educational institutions, advertising agencies, retail stores, even the government. If your print volume is high enough your organization will benefit from acquiring a wide-format printer of your own.
This BuyerZone Plotters Buyer's Guide will give you the inside scoop on the basics of choosing a wide-format printer, what features to look for, and how much you can expect to pay.
Toner-based vs Inkjet Printers: What's the difference?
There are two primary technologies used in modern wide-format printers: toner based and inkjet.
Toner printers use a drum to transfer dry toner onto a print surface then fuse the toner to the paper using heat. Wide-format inkjet printers use heat to move droplets of ink through a fine mesh print head, spraying droplets of ink on the paper. These are also referred as thermal inkjets.
How you intend to use your printer may determine whether you choose toner or inkjet technology. Typically, toner-based wide-format printers are preferred for AEC applications, while companies with graphics applications lean towards inkjets.
Tip: No one makes plotters anymore: the term specifically refers to a machine that draws using a pen on a traveling arm. Improvements in inkjet and toner technologies have, thankfully, made these temperamental, expensive machines obsolete.
Essentially, your decision comes down to a wide-format printer intended for graphics or one that’s designed uniquely for engineering applications and CAD functionalities. The next step in the process is to pair the correct printer to your intended use then settle on a size.
Choosing the Wide-format Printer That's Right for You
The application you have in mind for your wide-format printer will influence your purchasing decision in many ways, so make sure you have a firm understanding of what type of printing you'll be doing and your print volume.
The most significant split in the industry is between printers for graphics and those for engineering applications or computer-aided design (CAD) work. Graphics printers are almost always color inkjets, and emphasize high resolution and the ability to print on multiple types of media. CAD-focused printers are more often monochrome toner printers, and are designed for faster, higher-volume printing.
More and more, toner wide-format printers can print in color. These printers have the speed and lower running costs of a monochrome toner printer but provide the color capabilities that previously were only available in inkjet. Keep in mind, however, that color capabilities can double the price of the printer.
Here's a breakdown of the most common applications of the two types of wide-format printers.
|Graphics printers||Engineering printers|
After the application, size is the next most important consideration. Most wide-format printers can handle widths of 24" to 60", although 60" is rare. The most common widths are 24", 36", and 44". They print on rolls of paper that can be up to 300' long, or on individually fed sheets of paper. The size of the materials you need to print will help you decide what size printer you need.
The standard for engineering applications is 36" plotters; the 36" machine can handle the largest construction documents. Graphics printer sizing depends more on the type of printing you'll be doing. Grand-format printers, which can range from 60" all the way up to 16' wide, are designed for outdoor banners and large-scale projects.
Today, toner printers are rated in D size prints per minute. A D size is 24 x 36 inches and is the most commonly used size. Inkjet printers quote in square feet per hour or minute because of their longer spooling time between prints.
Most modern printers have various print modes that allow users to trade print speed for print quality. Note that higher quality settings will take longer to print than the lower quality draft mode. Make sure your dealer explains the printer’s speeds in the measurements and at the print settings you need, so you understand the comparisons.
As a rule of thumb, if you have high volume color needs (such as over 2,500 D size prints per month), choose toner. If your printing needs tend to low volume, inkjet is suitable.
The speed of the actual printout is not your only consideration either. Find out how long it takes the printer to warm up after it has been sitting idle for a while. For some printers this can add minutes to your print time. Also, keep in mind that prints from an inkjet printer will need time to dry whereas toner prints will not.
One specification some buyers put too much stock in is resolution. A printer with lower resolution but better technology can sometimes produce better-looking prints than another printer with higher resolution. Rather than dots per inch, the most important factor is the droplet size for crisp lines. Also, the more ink cartridges your printer uses determines the quality: the basic 5 ink (cyan, yellow, magenta and 2 black) isn’t as good as the 12 ink. Remember the Crayola boxes from your childhood? The 64 crayon box always gave you more options for quality than the 24 crayon box. This is a similar concept.
Seeing sample output is an important part of evaluating a wide-format printer. Try to get a sample output on the exact type of media you intend to use, including your brand of blueprint paper, the exact vinyl banner stock, or any other specific material that you'll be using. Printer performance can vary dramatically based on the medium being used. Email the seller with the sample you want printed. Have them print it out on the machine you’re considering and request they deliver it or mail it to you FedEx.
Once you have the basics sorted out, the next step is to review the many additional features available in a wide-format printer. Depending on your application, some of these bells and whistles have the potential to save you big chunks of time on each job.
Plotter Features to Consider
Here's a sampling of some of the most common features, most of which are now included as standard on modern machines.
A major feature of some wide-format printers is the ability to scan and copy large documents. Some printers may come with this feature built-in; in others, the scanning capability is part of an upgrade module you can purchase separately. Approximately 2 to 3 inkjet companies make scanner components. If you definitely need a scanner, buy the scanner bundle from one of those companies.
Entry-level toner machines have scanners built in. For high-end toner printers, scanning is an optional add-on. Large-format scanning is a huge plus to AEC users: being able to reproduce full-sized blueprints in-house at any time provides flexibility and reduces the number of trips to the copy shop.
Adding scanning and copying capabilities will substantially increase your costs – see Plotter Pricing for details. If your scanning needs will be few and far between, it’s probably not worth the extra expense.
Software, drivers, and file formats
To get the best performance from your wide-format printer, you need to ensure that communications between the printer and your software are as direct as possible. There are two aspects to this: the drivers the printer offers, and the printer languages it supports.
Drivers are small pieces of software that get installed on your computer so it can run the printer accurately. Ask the dealer if the printer has drivers for the specific software applications (e.g., image software, CAD programs) you will be printing from. The answer should be "yes," but you you should also inquire if the drivers are certified by the software manufacturer. Certified drivers provide a extra peace of mind, and all the big brands sell certified drivers. Uncertified drivers will likely work, but you can't be sure without careful testing.
In terms of printer languages, you don’t need many. Postscript and PDF cover almost everything in the graphics market; in the engineering market you’ll need support for HPGL, DWF, TIFF, and PDF. All wide-format printers today come with Windows or Mac drivers. So basically, if you can see it on your desktop, you should be able to print it.
More features to look for
- Built-in accounting features are useful in situations where prints will be billed to different projects or clients. This is a top priority for many customers.
- Built-in paper cutter is a real timesaver, allowing the printer to automatically separate each print as it comes off the roll of paper.
- Multiple paper widths gives you flexibility – some printers even hold more than one size roll at a time, allowing users to print the size document they need without changing paper or printers.
- Media bins and catch trays let you walk away from big jobs, which can take hours, while the printer separates and organizes the output.
- Color scanning and color mark-ups are used on “as built” plans and help with notations.
- Scan and save features are necessary for projects that need to be called up again.
Tip: color processing
Trying to match existing colors exactly is a complicated process. For very precise color work, you may want to invest in a Raster Image Processor (RIP).
RIPs provide the highly accurate color management that's essential for lithographics or art that will be sold. However, RIPs are not needed for engineering work, nor are they required for every type of graphics printing. They can add several thousand dollars to your purchase price, so consider your needs carefully.
There are a couple critical issues to be concerned with when comparing potential sellers, especially if you plan on large print jobs that take place after-hours.
Choosing Wide-format Printer Dealers
The dealer you choose can have a big impact on your overall satisfaction with your wide-format printer. That's because service and support are the most important considerations. Whether you need a service technician to come out and repair a mechanical problem, or just have a question you need answered, the support offered by your dealership is critical.
It’s uncommon to visit dealerships now, thanks to YouTube demonstration videos and available web support. You should still find out what avenues of support your dealer offers: telephone or email-based help, online knowledge bases, discussion forums, etc. Also, inquire about hours of operation if you anticipate late-night printing sessions.
Definitely check references. Any reputable printer dealer should provide you with references to customers who purchased the exact model of printer you’re considering. Ask them how responsive the dealer is to service calls and how they rate the technicians' level of expertise. If the printer has had any problems, find out how these problems were resolved.
Other dealer considerations
Many large-format printer dealers carry lines from multiple manufacturers, allowing you to compare print quality from different brands for yourself. Getting sample output is essential. You should email your sample to the dealer and ask them to print it for you on the medium you’ll use. They can deliver or FedEx the sample to you.
While size isn’t necessarily the best indication of dealer quality and longevity may be. Small companies that have been around for a long time should be just as dependable as larger companies. Smaller dealers may offer a more personal touch, while larger dealers may have more of a selection.
It’s best to buy from a dealer that specializes in selling wide-format printers. Many dealers that focus on copiers, scanners, and standard-sized printers also carry a small selection of wide-format printers. Understandably, these dealers' expertise won’t focus on plotters. Reps from copier companies often have less experience and higher turnover. You're better off with an experienced dealer who understands the customer’s needs around wide-format printers.
Review the following wide-format printer prices so you know exactly how much others have paid for models similar to the one you’re interested in.
Pricing and Maintenance
Pricing for wide-format printers and plotters can span a huge range. The biggest variables are size and quality -- you'll see bigger price tags for more accurate color reproduction and higher resolution. There's also very dynamic pricing for inkjets that is influenced by dealer rebates and other factors.
Toner plotters are more expensive to purchase initially, but make up for that difference with their lower overall cost per page because they're cheaper to run. They also last for years. Inkjet printers cost less to purchase, but can go through ink at a prodigious rate, driving up your cost per page.
Be aware that today's inkjet printers have shorter lifespans than previous generations. You can expect to purchase a new inkjet machine every 3-4 years (as opposed to a toner printer that lasts 5-8, even 10 years.) Both have limits in technology and price point, so it's imperative to be clear on your business's printing needs.
Wide-format 24" inkjet printers start around $1200-$2000. Variables include rolls, stands, installation, brand, and geography. A 36" printer can range from $3200-$4700 and a 44" costs $3900-$7900 depending on the number of rolls. Color inkjets used for commercial production can run $15,000 and more.
For toner machines, new wide-format printers start at $11,000 and can top out at $65,000.
There is a very strong market for used toner-based equipment. The technology hasn't changed much and customers are satisfied with their reliable toner printers. Used toner plotters range from $5,000-$7,000 and come with the same warranties and service agreements as new machines. A used toner machine lasts at least 5-7 years, sometimes up to even 10 years.
Check costs for consumables
Remember that the initial purchase price is only part of the total expense of a printer: consumables, most significantly ink or toner, will be a part of your budget for years to come. Per-page costs are always higher with inkjets than toner printers: toner cartridges provide much more coverage than ink refills. Paper and other media costs are usually comparable across different plotter models. Sometimes you can bundle the consumables for toner machines: paper, toner, and service at a fixed cost per square foot. Not only is this more affordable, it ensures quality.
Ask your dealer for cost estimates, preferably per page or square foot. Then try to verify those costs elsewhere -- for example, by asking the customer references they gave you. And don't hesitate to look for third-party sources for ink and toner: while you should always turn to the dealer for service and repairs, you can sometimes get better deals on basic supplies from other sources. Just keep in mind that if the price seems too good to be true, it probably is. Many products are produced cheaply and roughly overseas.
Several major brands including Epson, Canon, and HP are instituting UMRP: Unilateral Minimum Retail Pricing. This is an industry-wide effort to regulate pricing and not be undercut by ridiculously low Internet prices.
Many businesses prefer to lease their printer if they don't have the upfront capital to buy it. A lease generally has a low monthly fee, includes service and maintenance, and makes upgrading easy when new technology comes out. While leasing is very common, it's important to understand the difference between a lease rental versus a lease purchase. With a lease purchase, you lease to own and can expect to pay fair market value for your plotter at the end of the lease.
Maintenance and service agreements
Like copiers, wide-format printers require regular maintenance: cleaning, inspection, and replacement of worn parts. Keeping your printer well-maintained is the best way to prolong its useful life and make sure it runs smoothly. Some maintenance agreements only extend the printer's warranty -- covering repairs -- while others include toner, drums, and all other replaceable parts, as well as regular visits to your office by a technician.
For both toner and inkjet printers, you'll need to download periodic software upgrades, as well. These are included in your service plan.
Service agreements are typically priced per square foot printed per month. If you're new to wide-format printing, or if you'll depend on the printer for day-to-day production, we strongly recommend that you purchase the service agreement.
Make sure the agreement covers on-site labor, and see if guaranteed response times are included. Parts, if needed, should be guaranteed for next-day delivery.
- Ask your prospective dealer how many wide-format printers they've placed in the field, and obtain references from businesses in your industry.
- Insist on a price protection period for your service plan for a minimum 3 years, and up to 5 years for high volumes. This safeguards your service from salesperson turnover and locks in your price.
- It's not wise to bundle a wide-format printer and small office copier on the same lease. These machines have vastly different life cycles.
- Never combine your lease to purchase with the service agreement. It ties you to that vendor and that machine. The vendor can inflate the service charges from the financing.
|
<urn:uuid:616959a7-7240-4ec0-958a-247eb1e7afcb>
|
CC-MAIN-2023-40
|
https://www.buyerzone.com/office-equipment/wide-format-printers-and-plotters/bg-wide-format-plotters-introduction/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510219.5/warc/CC-MAIN-20230926175325-20230926205325-00591.warc.gz
|
en
| 0.930287 | 3,920 | 2.65625 | 3 |
William & Mary President: William Yates
Term Served: Fall 1760 - December 1764
Preceded by: Thomas Dawson 1755 - 1760
Succeeded by: James Horrocks 1764 - 1771
Educated at William & Mary, Anglican clergyman William Yates became the fifth president of the William & Mary in Fall 1760. Yates was a member of the Governor's Council as well as rector of Abingdon, Gloucester, and Bruton Parishes. He ascended to the presidency as the Board of Visitors attempted to wield greater influence over the College. President Yates largely complied with the wishes of the Visitors, and the College expanded the faculty during this time. With Yate's death in 1764, the College of William & Mary had seen three presidents over a single decade.
No known portrait of Yates exists.
Material in the SCRC
- Photograph of the plaque at the William Yates Room, P1977.233, University Archives Photograph Collection, Special Collections Research Center, Earl Gregg Swem Library, William & Mary.
- Jack Eric Morpurgo Papers, Special Collections Research Center, Earl Gregg Swem Library, William & Mary.
|
<urn:uuid:c8899deb-0b82-4277-9bf4-c056ff457e69>
|
CC-MAIN-2023-23
|
https://scrc-kb.libraries.wm.edu/william-yates
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655247.75/warc/CC-MAIN-20230609032325-20230609062325-00047.warc.gz
|
en
| 0.925138 | 243 | 2.78125 | 3 |
In the religion of the Hindu, Vedas occupy the foremost position, as they are revelations free from defects. Then come the Smrtis, switch are products of human recollection of Vedic revelation. Next come the Puranas, which are narratives which substantiate the truth of the first two, i.e., Sruti and Smrtis.
The five important characteristic of Puranas have been state in the couplet:
They are primary creation of the world (Sarga), dissolution and recreation of the world (Pratisarga) genealogical descent of the gods, racial progenitors and sage (vamsa), Periods of the Manus who preside over dissolution and recreations (Manvantara), history of royal dynasties, past, present and future (Vamsa nuchararita), Most of the Mahapuranas as current now, do not confine themselves only to the treatment of the above five topics. Quite often, the topics are dealt with in a general manner and several other secondary matter related to religious worship are included. And then there are Puranas which narrate the glory and detail about deities. Thus, Svapurana describers the incarnation and matter connected with Siva, Visnu Purana descirbes those of Visnu. Similarly, Devi Bhagavata gives the details regarding Devi. Devi Bhagavata is stated to be a Mahapurana.
Among the eighteen Puranas-
Devi Bhagavata is the most supreme. It bestows Dharma, desires, wealth and liberation to the readers.
Like Srimad Bhagavata, this is also very holy and fulfil all desires of the devotees. The glory of Devi Bhagavata is given in Manasa Khanda of Skanda Purana. It is not an ordinary Purana. It is a very holy one. Like Srimad Bhagavata, Ramayana etc., the reading of Devi Bhagavata is also done frequently at many places, for the fulfillment of desires.
For those who hear Devi Bhagavata story, success is not away. It should be always read by men for the fulfillment of their desire.
Reading of Devi Bhagavata in a period of nine days is called navaha yajna. (sacrifice which is completed in nine-days) It is considered to be very holy and wish-yielding.
The Purana literature is very ancient. The name Purana occurs in Brhadaranyaka Upanisad, Gopatha Brahmana, Tattiriya Aranyaka, Chandogya Upanisad, Satapatha Brahman etc. but most of the existing Puranas, though containing much old material seem to be late compilations. It appears, Purana must have been recast after the second or third century after Christ. The line occurs in Taittitriya Aranyaka. So, there is no doubt about the fact that Puranas have been in existence since yore.
The Bhavisyat Purana is mentioned in Apastamba Dharma Sutra (Chapter III). Apastamba is earlier than the 3rd century B.C. According to F.E. Pargiter (Ancient Indian Historical tradition, Chapter IV), the Bhagavata Purana cannot be placed rater than the early part of 3rd century B.C. and even possibly earlier still by 150-200 years. Later on many interpolations were made and the Bhavisyat Purana which is available in print mentions even Akbar, Humayun etc. similarly it is clear that most of the Puranas were revised from time to time.
Ancient Indian Historical Tradition, Pargiter says that the Bhagavata Purana was composed about the ninth century A.D. But it contains much old material. Sri Sankaracarya has not quoted this Bhagavata Purana is his Bhasyas. He has quoted Visnu Purana, Mahabharata etc. but not Srimad Bhagawata. So, it is possible, that Bhagavata was completed around the ninth century. It mentions Alwar saints of South India, vaguely, and they belonged to seventh, eighths centuries of A.D.
R.C. Hazra a great scholar on Puranas holds that the existing Puranas were compiled between 3rd century A.D. and 12th Century A.D.
Note : For Further details see Studies in Puranas by R.C. Hazra, and History of Dharmasastra by P.V. Kane.
Devi Bhagavata also seems to be a late work. As it contains details given in Saptasati part of Markadaya Purana, it must be placed after the sixth century A.D. But this great work also contains much old material and its importance is in no way small.
Both Bhagavata and Devi Bhagavata contain 18,000 slokas each. Some hold that Bhagavata is the Mahapurana and Devi Bhagavata is, an upapurana. But Sankta do not agree to this, they hold that Devi Bhagavata is the Mahapurana. Both Bhagavatas are important for us because reading them is considered as holy equal to performing a Yajna through which all desires can be fulfilled.
Note : Which is the Mahapurana, Bhagavata or Devi Bhagavata? Many research papers have appeared in this regard. For a brief account see P.V. Kane's History of Dharma Sastra (section on Purana).
Devi Bhagavata mentions Minaksi of Madura, Kanchi, Chidambara, tulajapura, Kolhapura etc. of south India.
The world Bhagavata can be interpreted and derived in two ways. That which pertains to Bhagavata, i.e. Lord Visnu and in this way it will mean Visnu Bhagavata. We can interpret the world also as that which belongs to the goddess and in this way the world Bhagavata will mean Devi Bhagavata. Both contain 18000 slokas and are divided into 12 Skandhas.
In the Purana literature Bhagavata occupies the 5th place. The narrator of this Devi Bhagavata is Veda Vyasa and Janamejaya is the hearer. This Janamejaya is the son of Parksit, to whom suka narrated (Visnu) Srimad Bhagavata at Gangadwar.
By a study of Devi Bhagavata, it become clear that Devi (mother goddess) is the supreme god. She is the qualitless eternal and omnipresent, Para Brahman. She is Saguna Brahman also by her Maya Sakti. She is extremely benevolent and kind. She is attainable through yoga and Bhakti. She has three powers Sattvika, Rajasika and Tamasika They appear as Lakshmi, Sarasvati and Kali, Through her Rajasika power; she creates, through Sattvika, power, she protects. And by her Tamasika power she destroys.
All the Puranas speak about the one supreme Brahman. In Visnu Purana, Visnu is the Supreme Brahman. In Siva Purana, Linga Purana etc. Siva is the supreme Brahman. According to Devi Bhagavata, Devi is the supreme Brahman Sakti is the Paramatman. Paramatman is the Sakti. Three is no difference between them.
Bhagavata: The criterion for a Purana to be called Bhagavata is as follows:
The Purana in which Dharma is told in detail, based on Gayatri and the killing Vrtrasura is also described, is called, Bhagavata.
Devi Bhagavata satisfies this condition. Details regarding Gayatri are given in the eleventh and twelfths Skandhas. Vrtrasuravadha is also described in it.
as told earlier, Devi Bhagavata contains much old material. But it mentions names of Mauryas, Hunas, Mlecchas and Yavanas. clearly So, it must be a late Purana compiled between 600 A.D. to 1000 A.D.
As Bengal influence is seen, some say it might have been written in Bengal. In Bengali Sakti worship was very much prevalent. The glory of Mangala Candi, a form of goddess worshipped in medieval Bengal is found in Devi Bhagavata. Others hold that it was written outside Bengal probably in Benaras very much. Morever, the main goddess described is a very benevolent, kind, from of Devi is Bhuvaneswari.
Commentary : This was commented upon by Nilakantha in the 18th century. There might have existed earlier commentaries too. The great Sakta Acarya, Bhaskara Raya, is said to have popularised Devi Bhagavata in south India.
Content of Devi Bhagavata The Devi Bhagavata contains 12 Skandhas, and 318 Chapters.
Skandha I : Details regarding Puranas Devi Bhagavata is a Mahapurana Devi's glory, Killing of Madhu and Kaitabha by Visnu, Pururava's story, Suka's birth, Budha Pururavas and Urvasi, Suka studies this Purana, Suka goes to Mithila and his advice to Janaka.
Skandha II : Story of Prasara, birth of Vyasa. Pandavas, Extinction of yadus, Parksits death by the bite of Taksaka, Sarpasatra, Astika. Glory of Devi Bhagavata.
Skandha III : Janamejaya's question to Vyasa. Narada's description of Devi Bhuvaneswari and her worship. Brahma, Visnu and Siva see Devi and Praise her. Description of Devi as Bhuvaneswari. Story of Satyavrata, Vagbija. Ambajana. Nature of gunas. Stories of Visvamitra, Sudarsana etc. Navaratrata, Story of Ramayana worship of Devi by Rama.
Skandha IV : Janamjaya's question regarding Krsnavatara. Vyasas advice to Janamejaya. Kasyapa brith as Vasudeva, Stories of Narayana, Prahlada snd sukra. Avataras of Hari. Story of Krsna, Pradymna etc.
Skandha V : Devi Mahatmya. (Glory of Devi) Mahisasura. Fight between Devi. Praise of Devas. Destruction of Dhumralocana, Candamunda, Raktabija, Sumbha and Nisumbha. Description of Bhuwana Sundari.
Skandha VI : Killing of Vrtrasura by Indra Stories of Sunasssepa, Haihayas and Nahusa Place sasred to Devi.
Skandha VII : Lineage of Surya and Soma. Story of hyavana and Sukanya Sacrifice by Sacrifice by Saryati. Stories of Satyavrata and Hariscandra.
Devi Bhuvaneswari. Parasakti. Place sacred to Devi. Devi Gita. Method of worship of Devi.
Skandha VIII : Devis boon to Manu, Visnus incarnation as a boar, Manu Vamsa, Priyatara Description of earth. Varsas, Dvipas. Mountains Planets, Dhruva Mandala, Rahu, Descriptiona lower regions Atala, Vitala etc. Description of hells, Sins and punishments for them worship of Devi.
Skandha IX : Description of Sakti in brief, Worship of Sarasvati Stories of Ganga, Tulasi, Sankhacuda Worship of Tulasi. Story of Savitri Glory of Devi, Stories of Mahalaksmi, Mangala candi, Radha, Durga etc.
Skandha X : Svayambhuva Manu, Vindhya Mountain and Agstya. Stories of Svarocisa, Caksusa, Savarni and other Manus. Mahakali Mahalaksmi, Mahasarasvati and their stories.
Skandha XI : Daily routine, nanavidhi wearing of Rudraksa beads. Description of Rudraksas, Bhutasudhi, Sirovrata, greatness of Bhasma (Sacred ash). Importance of Tripundra Urdhva pundra marks on the forehead. Sandhyopasana, Brahmayajna, Gayatri Purascarana, Vaisvadeva, Prayascittas.
Skandha XII : Rsi etc. of Gayatri. Gayatri Kavacam, Gayatri Hrdayam, Gayatri Sahasranama, Dscription of Manidvipa, Cintamani grha, Deviyajna. Conclusion and results which accrue by a study of this Purana.
The glory of this great Purana Devi Bhagavata as described in Mansa Khanda of Skanda Purana, Devi Bhagavata is a Mahapurana.
Devi Bhagavata and Srimad Bhagavata are complementary to each. We have to consider both as Mahapuranas, and keep them as the Vth Mahapurana. The Purana starts with a Gayatri-
We meditate upon the first Vidya who is of the form of all consciousness. May she impel our intellect. She is the Parasakti, great goddess, Mahamaya.
The main deity of his great wok is goddess Bhuvaneswari a benign form of Devi. She lives in Manidvipa. Description of Manidvipa is given in 12th Skandha 10th, Adhyaya. Description of her palace, Cintamanigrha are all young and enjoying all comforts, through the worship of the goddess.
The Goddess is extremely beautiful and kind. She always fulfills the desires of the devotees. She wards off all evil and takes care of her devotees in every way. For a devotee of Devi there is nothing unattainable in this world. Thus, this Purana gives immerse strength to the devotees.
She is Maya and Brahmavidya too. She is Sakti (power). She is the supreme Brahman. She is the nimittakarana (instrumental cause) as well as Upadana karana (maternal cause) of the universe. In the ninth skandha of Devi i.e., importance of the five froms Durga, Radha, Laksmi, Sarasvati and Savitri is declared.
Devi is Prakrti. She is Durga; Radha Laksmi, Sarasvati and Savitri. In this way, through one, she is known in five froms.
She is Saguna Brahman. She is Isvari. She cannot be known easily. Only Jnanins can realize her. Mahavakyas are the means to know her. Great Jnanins like Bhagavan Sri Sankaracarya, Sri Gaudapada, Sri Bhaskara Raya, of ancient times were all worshippers of Devi. Sri Sankaracarya has composed Soundarya Lahari in praise of the goddess. In Sankara mutts, even to-day worship of Devi continues in an elaborate manner. Even saints like Sri Ramakrishna Paramahamsa Sri Karapatra Swami etc. of recent times, were worshippers of Devi.
She is the Adya Sakti i.e., first power.
O mother of the universe! Those who worship you as Ambika, Jaganmaya, Maya etc. attain all objects of desire.
The entire universe in her form.
Everything in this universe is pervaded inside and outside by her. There nothing that is left off by her.
The rope in darkness appears as snake. In the same way, Devi appears as Isvara, Visnu, Brahman etc.
In reality Jiva, and Isvara are all one. The difference is produced only by Maya.
Avidya is the cause of difference of Jivas from Brahman. There is no other cause for this difference.
The universe is imposed on the base (substratum) Para Brahman. By the existence of Brahman, the universe exists. And that Parabrahman is Devi herself.
When Devi declared that she is every thing is this universe and there is nothing that is not pervaded by her, Himavan wanted to see her cosmic form (Viswarupa).
She shows that cosmic form to Devas, Brahma, Visnu etc. (See VII Skandha, 33 rd Adhyaya). Seeing the cosmic form the Devas were terrified. They fainted and fell down. They requested her to show the benign form again and withdraw the cosmic form.
Seeing the Devas terrified, Devi, the ocean of mercy withdrew her terrific form and showed her extremely beautiful benign form. She was having noose, ankusa (good) in her upper hands. By her lower two hands, she was giving boons, and refuge from fear.
Her ayes were full of compassion. Her lotus-like face was giving a gentle smile. Seeing her beautiful form, the Devas were free from fear. They became peaceful. They bowed down and praised her with joy. Their voice was faltering due to joy.
We are reminded of the 11th Adhyaya of Srimad Bhagavad Gita wherein Lord Krsna shows his comic form to Arjuna after seeing the Visvarupa, Arjuna was convinced once for all that Lord Krsna was none other than Parabrahman.
Thus, we find the quintessence of all Vedanta in this great purana. Pure Advaita is taught here, which is set forth in the great Upanisads.
Worship of Nirguna Brahman is very difficult for ordinary people. Only great Samnyasins and Jninas are qualified for it and are capable for it. But the goddess Devi can be worshipped by all. And every thing including liberation can be got through her grace.
In Devi Gita we find the essence of all Upanisads set forth in a very clear easy form.
in the 3rd Skandha, 3rd Adhyaya, of Devi Bhagavata description of Bhuvanesvari is given. In the midst of the ocean of nectar, in Manidivpa, she is seated on the couch of Siva.
she is having in her hands noose, Ankusa (good) Vara (boons) and Abhista (all that is desired). No deity has ever been seen equal to her in beauty. She is extra ordinary beautiful. She is smiling and that smile itself is like an ornament for her. She is reddish in color. She is the personified form of compassion. She is a Kumari in her fresh youth. She is served and worshipped by those ever engaged in chanting the mantra Hrim.
in the 24th Adhyaya, the installation of Durga in Kasi is told.
in the 4th Skandha is told the story of Sri Krsna in detail. Siva advises Sri Krsna to worship Remembrance of the feet of devi makes the birth fruitfull. One should meditate on her as Brahman and as "I am that Brahman". She should be meditated upon as one's own Atman. By this, one gets released from Samsara. By crores of rituals, one cannot get liberation The sages Svetasvatara etc. got release from the Samsara thus. (For Details see Svetasvatara Upanisad).
the exploits of Durga, her slaying Asura Such a Mahisasura, Raktabija, Dhumralocana, Canda munda, Sumbha and Nisumbha are told in the fifth Skandha this discription closely follows Devi Mahatmya, i.e. Saptasati, which is a part of Markandeya Purana.
In the sixth Skandha, the power of Mahamaya is described.
The Jiva is helpless and is under the control of Maya. If Brahma, Visnu and Siva are under the sway of Maya, what to talk about others? That Maya remains in Brahman and all the Jivas. Devi in the goddess controlling Maya. One should meditate on her. One should worship her. One should bow to her. One should chant her mantras. By this she becomes kind and releases the Jiva from Maya. Devi is pleased only by good conduct. This is given in the eleventh Skandha, in great detail.
Even if the four Vedas are studied along with the six Angas, (Siksa, Kalpa, Vyakarana, etc.) they do not purify a person devoid of good conduct. The Vedas leave him at the time of death even as the birds leave the nest and fly away, when the wings are born.
Radha, her worship etc. are described in this Devi Bhagavata. But in Srimad Bhagavata, Radha is not mentioned anywhere.
The story of Tulsi, method of her worship etc. are found in the ninth skandha of this Purana.
Story of Savitri is given in detail in the ninth skandha, in Adhyayas 26 to 38. Yama gave Satyavan back to her, with blessings and advices regarding Dharma.
This Devi bhagavata is a great encyclopaedia containing many stories, modes of worship, mantras rules of code of conduct etc.
Devotees of Devi, read this Bhagavata in a period of nine days according to sastraic rules, to achieve their desired objects. The procedure is thus-
First day up to III Skandha, 13 th Adhyaya
Second day upto IV Skandha, 8th Adhyaya.
Third day upto V Skandha, 18 th Adhyaya.
Fourth day upto IV Skandha, 18 th Adhyaya.
Fifth day upto VII Skandha, 18th Adhyaya.
Sixth day upto VIII Skandha, 17th Adhyaya.
Seventh Day upto IX Skandha, 28 th Adhyaya.
Eight day upto X Skandha, 13 th Adhyaya.
Ninth day upto the end of XII th Skandha.
This purana was published in 1922, with the translation of Swami Vijnanananda, from Allahabad. The present editions a reprint of the same with Slokas in Sanskrit. We hope that, it will be extremely useful to the readers, and will be welcome by them.
Children’s Books (52)
Brahma Sutras (85)
Send as free online greeting card
Email a Friend
|
<urn:uuid:3e463b9a-4e54-482c-9bbb-28182f434ce3>
|
CC-MAIN-2023-23
|
https://m.exoticindia.com/book/details/srimad-devi-bhagavata-purana-in-two-volumes-idc072/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656788.77/warc/CC-MAIN-20230609164851-20230609194851-00504.warc.gz
|
en
| 0.940213 | 5,056 | 3.09375 | 3 |
Lung cancer is the leading cause of cancer death in both men and women because it’s usually not discovered until it’s in an advanced state. However, to combat that fact, according to the National Cancer Institute, when lung cancer is detected at its earliest stage, and is surgically removed, it can result in a person having a five-year survival rate closer to 70 percent. Because of this, the National Comprehensive Cancer Network recommends lung cancer screening in high-risk populations, such as those with a smoking history.
Research published by the National Lung Screening Trial Team in August, 2011 in the New England Journal of Medicine revealed several interesting findings regarding the efficacy of low dose CT Scanning of the chest as a screening tool for lung cancer.
In this landmark trial, more than 50,000 persons at high risk for lung cancer at 33 U.S. medical centers were randomly assigned to undergo annual screenings with either low-dose CT or chest radiography. The authors concluded that screening with the use of low-dose CT reduces mortality from lung cancer by 20 percent in this population. Low-dose CT lung cancer screening in a high-risk population also is recommended by the National Comprehensive Cancer Network.
CT Scan Screening for Early Lung Cancer Detection
CT Scanning is an imaging procedure that uses special X-ray equipment to create a series of detailed pictures, or scans, of areas inside the body. CT Scans give a clearer and more detailed picture of the lungs than X-rays, which gives physicians an edge because they can see masses in the lungs earlier and better and more effective treatments can then be recommended to help patients stay ahead of lung cancer. At Long Beach Memorial, we use state-of-the-art imaging technology, including the 320 CT Slice Scanner, to get the highest resolution scans using the lowest amount of radiation to the person being scanned.
Despite these findings, CT Scanning also has risks which is why it is important to understand the requirements and criteria for testing. To qualify for an early lung cancer detection CT Scan screening you should:
- Be without any lung cancer symptoms.
- Have no history of lung cancer.
- Not be pregnant.
- Be 55 - 74 years of age and have a 30 pack year history of smoking or greater, and smoking cessation less than 15 years; or be at least 50 years of age, with a 20 pack year history of smoking or greater and one additional risk factor (other than second hand smoke), which can include:
- High radon exposure.
- Occupational exposure (silica, cadmium, asbestos, arsenic, beryllium, chromium, diesel fumes and nickel).
- Cancer history (lymphomas, head and neck cancer, or smoking related cancers).
- Family history of lung cancer.
- Chronic obstructive pulmonary disease (COPD) or pulmonary fibrosis.
People who think that they have an increased risk of lung cancer and are interested in screening with low-dose multi-slice CT should discuss the appropriateness and the benefits and risks of lung cancer screening with their doctors. A doctor’s referral also is needed for this screening.
|
<urn:uuid:df24b895-3338-41a6-b93c-d525c75d99ee>
|
CC-MAIN-2014-15
|
http://memorialcare.org/events-education/live-healthy/staying-one-step-ahead-lung-cancer
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223206118.10/warc/CC-MAIN-20140423032006-00292-ip-10-147-4-33.ec2.internal.warc.gz
|
en
| 0.937404 | 650 | 2.921875 | 3 |
Some of our most endearing memories from our childhood relate to the games we once played in the school playground or with friends in a park somewhere. Kids today with their computer games and mobile phones generally don’t appreciate the fun we once had with our simplistic although sometimes dangerous games.
Some games came about due to fashion or marketing campaigns. Playing the old “Yo-yo” was very popular when Coca-Cola used it for a marketing campaign. Kids would learn the various moves or tricks such as “Walking the Dog” or “Rocking the Cradle” and many others.
Who can forget the “Hula Hoop” craze? The hoop would swing around your waist or your arm and sometimes fly off into the distance. It provided good exercise as well as fun. Another fun game was “The Limbo” popularised by Chubby Checker and the song “Limbo Rock”.
“Jacks” was popular as a game to test your dexterity. Having five pork knuckle bones (later you could buy coloured plastic bones to play the game) you would place the bones on the ground and then try to pick each one up in one hand with a swift grab without dropping the others.
Remember the “Monkey Bars” where you could hang upside down from your knees or swing from one bar to another. Or perhaps the old wooden see-saw where you and a mate would be at either end and bounce up and down. Sometimes someone may stand in the middle of the see-saw and apply pressure to one side or the other. One minute you would be high in the sky and next you would come down with a bang as you hit the ground.
Another popular piece of playground equipment would be the tall metal slides or slippery dips which after sitting in the sun on a hot summer’s day would just about bake your backsides as you slid down the steep straight metal slide unless you were coming down head first on your stomach.
The swings with the wooden seat where you would work up to go as high as you could and then as it would slow down you would jump off before it stopped were also great fun for some.
Skipping rope to a rhyme or bouncing balls on a wall to catch them again were popular amongst the girls as were also doing cart wheels, somersaults and handstands.
How many of you also used also pieces of asbestos (fibro) used as markers on a chalked out “Hop Scotch” grid on the playground or roadway? No asbestos worries in those days.
Then there was also the “Razzle Dazzle” also known by many other names including “Merry-Go-Round” in many suburban parks. Kids would spin it around getting it to go faster and faster and jump onto it or off it. Many kids suffered grazes or worst as they landed badly. Dizziness was a problem for a lot. When I ask people now about those days they say they were fun and they really enjoyed the razzle dazzle, monkey bars, see-saws, tall metal slides or slippery dips etc just as we also enjoyed neighbourhood or family fireworks and bonfires despite the many injuries and mishaps that occurred.
Don’t forget to contribute your memories and also any old photographs that you would like to see published in this magazine’s “as we were” section.
NOW WHAT ABOUT YOUR MEMORIES OR YOUR STORY?
You can write about childhood memories of where you may have grown up or moving into the area. Tell us about your school days. Where you worked, played or went on holidays; your first car; that first date, getting married or maybe the history of your family, group or organisation in the district. This page is about memories so tell us yours.
If you have some great memories, or perhaps you belong to a local community organisation and would like to share your organisation’s history or story with us then feel free to share your memories or experiences by writing to 17 Rose St, Baulkham Hills, NSW, 2153 or email to ivorjones@hillstohawkesbury. com.au.
You can also share memories on any of my Facebook memories groups including Hills District Memories at facebook.com/ groups/Hills.memories or Hawkesbury Happenings & Memories at facebook.com/groups/ Hawkesmemories.
|
<urn:uuid:dd2a531b-119f-464b-8253-fb79f0005083>
|
CC-MAIN-2017-34
|
http://hillstohawkesbury.com.au/childhood-games/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886102663.36/warc/CC-MAIN-20170816212248-20170816232248-00484.warc.gz
|
en
| 0.976417 | 927 | 2.625 | 3 |
This is a unit study we stumbled upon awhile ago. You see, we love Anime in our house. And DH and I really love Bleach. In fact, the Bleach theme-song used to put C to sleep when he was a baby (The first one. Yes, the loud one!)
And life being what it is, years passed before we got back to watching it again… But we did. Every night, two episodes of anime for about 6+ months. It has become our ritual. What I didn’t expect was how it would morph into a corner-stone of our school experience.
Bleach is an interesting story that moves between different eras – the modern world, and ‘Soul Society’ – which is modelled on ancient Japanese culture – clothes, buildings, culture and social hierarchies. Which is a lovely jumping off point for learning about the history of Japan. To do this, we visited our local museum – the NGV, which has a semi-permanent exhibition on Japanese artifacts – beautiful calligraphy, paintings, pottery and some wonderful Kimonos. My two balls of high energy barrelled into the exhibit, took one look at the gorgeous paintings, and both yelled out “Bleach!” – and it was – the buildings and landscape were almost a perfect match. I was then dragged around by two little ones as they looked at Kimonos and pottery that matched up to scenes in Bleach. We even got to read a few blurbs. This section of the gallery has been a favourite ever since!
|C’s Handmade Onigiri|
When we watch Bleach at home, we always watch it in Japanese with subtitles. Mostly it’s because we prefer the Japanese voices, but it’s also a sneaky way of getting in C’s English reading practice – he has to read fluently to keep up!
It also has a theme song at the beginning and end of every episode that the kids insist on watching – it’s their favourite part. The theme songs change every thirteen episodes, so there is always a new song to learn. The songs have English translations, but they also have a bouncing ball ‘sing-a-long’ in Romanji and Kanji, to which we all try to sing – with mixed results for us adults! For each song, C would memorise the Romanji and write it out verbatim later. Even J recognises the names of characters – every time Ichigo appears she will gleefully proclaim, ‘Ichi!!!’ She also insisted that ‘Mummy sing’ the theme songs in Japanese – and scowled when I got it wrong! I am sure she’s starting to say some Japanese words too…if I only understood…
C also has a lovely book on ancient Japan that came with a set, and a book on modern Japan from the library sales – both have been read, and a few of the exercises and craft ideas have been attempted – notably Origami, and Onigiri. He’s also had a lovely time studying the maps his Scary Godmother brought back from Japan.
|Bento boxes of Onigiri, Japanese Fried Chicken
and Cucumber – with Bento Boxes from Japan
After watching many episodes of characters eating, C became fascinated with Japanese food. So we started watching ‘Destination Flavour – Japan’ on SBS, a wonderful series which toured through all the regions of Japan, cooking traditional food each week. Which is how we stumbled upon Bento Boxes – and Onigiri. It’s been so popular, it’s now a staple meal.
If you want to do a lot of Japanese cooking, it’s worth travelling to a specialist Korean/Japanese grocer. Which is what we did – C had a lovely time looking at all the ingredients on the shelves, and we picked up all the ingredients for Onigiri, including a press.
|C made this Onigiri cat|
C loves making Onigiri cats, and as long as the rice is cool, it’s an easy way to get little ones making food in the kitchen.
All this Japanese culture exposure also helped him with Karate, where they use Japanese terms for counting and all the moves.
We also had a great time visiting the Japanese equivalent of a $2 shop – Daiso in the CBD, where you can get lots of cool cheap Japanese accessories – the kids loved it, and it gave a wonderfully intense dose of modern Japanese consumer culture. We also picked up more Onigiri moulds – not yet tested!
And then, not surprisingly, C decided that instead of learning German, he wanted to learn Japanese instead. So we changed our Rosetta Stone subscription to Japanese. It was amazing watching him power through it! When learning German, he always had problems getting the pronunciation right on the first turn – we thought it was the software being too sensitive – nope! He gets it first time with Japanese. It’s amazing what 40 minutes a day exposure to Japanese for 6+ months does for little ones’ ability to absorb and hear, speak and sing Japanese, even if they don’t understand a word of it at the time!
What other sideways learning experiences have you encountered? Are there any other great resources for Japanese language and culture out there that you have enjoyed?
|
<urn:uuid:33015afc-8247-458e-a24b-a7600d6c678e>
|
CC-MAIN-2023-40
|
https://yellowreadis.com/2014/01/unit-study-bleach-and-japan.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510603.89/warc/CC-MAIN-20230930050118-20230930080118-00290.warc.gz
|
en
| 0.9696 | 1,122 | 2.71875 | 3 |
With the strain that winter weather and heavy traffic put on Connecticut highways, road work projects are fairly common. While some individuals may think that they do not need to change their driving habits while going through a work zone, the fact is that accidents in these areas are quite common. Encouraging drivers to take additional safety precautions may help prevent the injuries and property damage that often accompany car accidents in work zones.
The Federal Highway Administration states that over 4,400 individuals have died over the last five years due to crashes in work zones. These types of highway crashes also accounted for injuries to over 200,000 people. Statistics indicate that the most frequent fatalities in these accidents are working-age adults. The reduced speeds and increased traffic congestion that commonly occur in work zones frequently lead to rear-end car crashes. While car accidents may occur in any work zone, roads with high speed limits are the most common spots for fatalities.
There are several ways a driver may reduce the chances of getting into an accident in a work zone, according to the Connecticut Department of Transportation. The DOT recommends obeying reduced speed limit signs in work zones, because speeding is one of the most common causes of car accidents. Maintaining a safe distance from other vehicles and traffic-control crew members is another way to reduce the chance of a crash. Most construction areas have warning signs to prepare drivers for reduced speeds and lane-control measures. Roadways under construction are often safer when drivers prepare for work zone conditions as soon as they see warning signs and safely merge as soon as possible to maintain the flow of traffic.
|
<urn:uuid:1abc354c-3f4b-4a84-997b-c344968c32f9>
|
CC-MAIN-2020-24
|
https://www.adlerlawgroupllc.com/blog/2019/11/driving-safely-through-work-zones/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347390448.11/warc/CC-MAIN-20200526050333-20200526080333-00237.warc.gz
|
en
| 0.965489 | 318 | 2.6875 | 3 |
In 1774 Johann Christian Dan Schreber compiled
a set of books entitled "Die Saugthiere
in Abbildungen nach der Natur mit Beschreibungen,"
(Mammals in Pictures from Nature with Descriptions.)
books were illustrated with over 700 hand-colored
plates. But in many cases the artists who drew
them had never actually seen the animals in
question and their imaginations were given more
or less free reign
Johann Christian Daniel von Schreber (1739
- 1810) studied botany in Uppsala with Linnaeus.
He later became the director of the botanical
gardens and of the museum of natural history
Approximately 8.5 X 11 inches
Fantastic Beasts." Natural History Museum
of Los Angeles County
|
<urn:uuid:ebd2adf4-98ff-4344-a7f4-264698374da9>
|
CC-MAIN-2017-47
|
http://swiss-artists.com/prints/monkeys/index.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934804680.40/warc/CC-MAIN-20171118075712-20171118095712-00118.warc.gz
|
en
| 0.777191 | 172 | 2.703125 | 3 |
June 4, 2013 ? Anorexia nervosa and bulimia nervosa -disorders characterized by extreme eating behavior and distorted body image -- are among the deadliest of psychiatric disorders, with few proven effective treatments.
A landmark study, with first author Tyson Oberndorfer, MD, and led by Walter H. Kaye, MD, professor of psychiatry at the University of California, San Diego School of Medicine, suggests that the altered function of neural circuitry contributes to restricted eating in anorexia and overeating in bulimia. The research, published June 4 in the early on-line edition of the American Journal of Psychiatry, may offer a pathway to new and more effective treatments for these serious eating disorders.
"It has been unknown whether individuals with anorexia or bulimia have a disturbance in the system that regulates appetite in the brain, or whether eating behavior is driven by other phenomena, such as an obsessional preoccupation with body image," said Kaye, director of the UCSD Eating Disorders Treatment and Research Program. "However, this study confirms earlier studies by our group and others that establish a clear link between these disorders and neural processes in the insula, an area of the brain where taste is sensed and integrated with reward to help determine whether an individual hungry or full."
The UC San Diego study used functional MRI to test this neurocircuitry by measuring the brain response to sweet tastes in 28 women who had recovered from either anorexia or bulimia.
Relative to a cohort of 14 women who had never suffered from either disorder, those recovered from anorexia had significantly diminished, and those recovered from bulimia, significantly elevated responses to the taste of sucrose in the right anterior insula.
"One possibility is that restricted eating and weight loss occurs in anorexia because the brain fails to accurately recognize hunger signals," said Oberndorfer. "Alternately, overeating in bulimia could represent an exaggerated perception of hunger signals."
A recent complementary study that investigated brain structure in anorexia and bulimia nervosa (Frank et al 2013) similarly highlights that the insula could be an integral part of eating disorder pathology.
The researchers added that such studies could have very important implications for treatment, and that identifying abnormal neural substrates could help to reformulate the basic pathology of eating disorders and offer new targets for treatment.
"It may be possible to modulate the experience by, for example, enhancing insula activity in individuals with anorexia or dampening the exaggerated or unstable response to food in those with bulimia," said Kaye. Studies indicate that healthy subjects can use real-time fMRI, biofeedback or mindfulness training to alter the brain's response to food stimuli. For patients with anorexia who have an overly active satiety signal in response to palatable foods, the researchers suggest bland or even slightly aversive foods might prevent the brain's overstimulation. Medications may also be found that enhance the reward response to food, or decrease inhibition to food consumption in the brain's reward circuitry.
This study was supported in part by grants from the National Institute of Mental Health (grants MH46001, MH42984, K05-MD01894 and training grant T32-MH18399) and by the Price Foundation.
Additional contributors to the study include Guido K.W. Frank, MD; Alan N. Simmons, PhD; Angela Wagner, MD, PhD; Danyale McCurdy, PhD; Julie L. Fudge, MD; Tony T. Yang, MD, PhD; and Martin P. Paulus, MD.
|
<urn:uuid:1e6ccba3-01e4-4307-8cb2-9994f46c2155>
|
CC-MAIN-2017-47
|
http://earldom-gwenora.blogspot.com/2013/06/altered-neural-circuitry-may-lead-to.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934807650.44/warc/CC-MAIN-20171124104142-20171124124142-00369.warc.gz
|
en
| 0.936091 | 745 | 2.921875 | 3 |
How to plan a project - Plan any project in four simple foolproof steps.
Need to plan your project? Don't know where to start?
Plan your project easily using this guide and our proven project plan templates
Planning your project is one of the most important aspects of sucessful project management. Project planning follows a sequence of steps beginning with a breakdown of the project deliverables and ending with a detailed project schedule showing the resources, tasks and dependencies against a day by day calendar.
Plan projects simply
is a straightforward project planning method which can guarantee improved project success through a 4 stage collaborative approach to planning your project.
How to plan a project in 4 simple steps
To plan a project you need to be sure that you have captured all of the deliverables and tasks that make up the finished product in a Work Breakdown Structure. Get your team together and ask them to spend 10 - 15 mins listing out all of the tasks that they can think of and writing them on post-its.
When you have a plenty of post-its, write the end result of the project and place it at the top of the wall or on a white board. Underneath put up post its representing the key deliverables. For example if you are implementing some new software the final product would be the 'Software launched'. Underneath might be 'Staff trained' and 'Software installed'. Arrange the post-its in a hierarchy like an organisation chart.
Learn how to create a Work Breakdown Structures.. See real-world examples of Work breakdown structures.
Now you know what you need to do, you need to work out in what order the work needs to happen. Tape some flipchart paper to the wall or use a whiteboard. Put the top deliverable from your work breakdown structure on to the right hand side of the board or paper. Then, take the post-its from your breakdown structure and arrange them in the order in which they need to happen.
Work from the left until you have mapped out the dependencies between the tasks and you have a sequence of tasks running from left to right. Finally draw arrows between the tasks that link up, and make sure that there aren't any tasks sitting isolated.
Here is a simple Precedence Diagram.
Tip: you don't need open your project planning software until you get to this step!
Once you have completed your Precedence Diagram, type all of the tasks into your project planning software. As far as possible, try to follow the logical sequence that you mapped out with the post-its. Most planning software will enable you to link tasks so that you can accurately reflect the sequence in your diagram. More on precedence diagrams and project dependencies.
Now we have broken down the work and created the Precedence Diagram it is time to estimate the effort for each task.
In a group session simply go through your project plan and ask your team to estimate the effort involved for each task.
Once you have entered the task effort, your planning software will automatically calculate the start and finish date for each task and provided you have entered the project logic correctly it will return an accurate possible end date.
At this point the end date can only be achieved if sufficient resource is available. That is why it is only a possible end date. More on estimating effort and scheduling.
You have entered all of your tasks and task duration in your scheduling software, so now it is time to add resources. Resources are usually people, but they can also be materials, for example machinery or automated process.
Against each task enter in the name of the person, machine, or process who will be responsible for the task's completion. Where possible enter a named person, this will help you to hold them accountable for progress and to manage their work by producing to do lists, calendars and work load profiles.
The skill in project planning comes in balancing two key factors: time and resource. Plans may show a finish date that is acceptable, but resource may be overloaded to achieve that date. Alternatively resource requirements may be within limits, but the project end date is much later than your Client would like. More on resource allocation.
There are many ways to resolve scheduling issues and more detail is given in the MS Project User Guide provided with our ms project templates.
Summary of the four steps
You have probably noticed how important it is to complete each step of the planning process.
- Step 1 ensures that you have captured all of the work.
- Step 2 defines the order of the work.
- Step 3 focuses on accurately estimating the effort.
- Step 4 brings everything together by adding resources.
By following these simple steps you can considerably increase your chances that the project will be delivered on time, on budget and to quality.
Need to plan your project? Don't know where to start? Use Ready made project plan templates used on real world projects.
Each plan comes with a detailed user guide with project planning tips and techniques for managing project planning challenges.
If you liked this page, feel free to recommend us!
|
<urn:uuid:903a2f79-828c-41eb-9af8-9c150fad57ec>
|
CC-MAIN-2017-26
|
https://stakeholdermap.com/plan-project/plan-project.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320863.60/warc/CC-MAIN-20170626184725-20170626204725-00192.warc.gz
|
en
| 0.913986 | 1,034 | 2.671875 | 3 |
Allow me to make a bold claim: that the method of conceptual analysis, employed in much of analytic philosophy, is flawed.
But first, what is conceptual analysis? In the simplest possible terms conceptual analysis is the process of picking apart a concept (such as mind, good, ect) in order to determine all that we can about it a priori. Often this conceptual analysis is accomplished by proposing better and better definitions of the word in question (meaningful definitions of course, not like the ones you would find in a dictionary, which define a word in terms of near synonyms). How do we know if one definition better approximates the concept than another? By showing how one of the definitions leads to contradiction or to applications that are clearly not what we mean by the concept in question. For example, when analyzing “good” in this way we may point out that certain properties are intuitively part of our notion of good, and we argue against other definitions by showing how they label as “good” situations that are intuitively just the opposite (for example the case of killing one patient to save five).
The problem with conceptual analysis is two-fold. The obvious objection is simply that not everyone has exactly the same understanding of the concept in question, and hence situations that seem intuitive or unintuitive to one person may seem just the opposite to another. The more serious problem is that our concepts may not align with the real world, and thus may mislead us. For example consider the concept of gold as understood by one of our distant ancestors. That person’s concept of gold probably is just any rock that looks like gold. But what about pyrite (fool’s gold)? It seems that their conceptual analysis would lead them to conclude that was gold as well. The conceptual analysist can of course respond by arguing that gold’s density is also part of the concept. But what then about white gold, which looks more like silver or platinum than gold? Perhaps it is only the density that defines the concept of gold, but, again, in that case an alloy of lead and some lighter metal would be considered gold. No matter how they analyzed their concept of gold it wouldn’t come to the right conclusion about what gold really is, since they have no understanding of the atomic nature of matter, or even how the metals are properly distinguished from one another. Yes, the concept of gold that this person has may be coherent, and it may be a priori knowledge, but it doesn’t match up with anything actually in the world.
There are two ways to defend conceptual analysis against such an attack. One is to argue that the concepts that are being investigated in this way are not supposed to align with the real world (they are not natural kinds). If that is true it seems hard to understand why we should care about them then. The concept of “ethics”, for example, surely cannot be divorced from reality so easily. After all what is it that can be good or bad besides real people and real actions? It seems obvious to me at least that ethics is simply a way of diving acts into two categories, just as gold and not-gold divide rocks into two categories. I hope that the connection between other concepts and reality is likewise obvious (at least if we expect them to be relevant to life in any way). The other possible response is to argue that the concept held initially and the concept that results after an investigation are really two different concepts. This might be a consistent way of looking at things, but if this is really the case I am forced to ask why the initial concept shouldn’t simply be discarded. After all there is nothing it corresponds with in reality, and we have a new concept that does which can take its place, and perform the role in our discourse and thoughts that it used to.
Even if we accept that conceptual analysis is flawed the papers published as part of such an investigation have not been in vain, as they can almost all be useful to a different kind of investigation. Let me then describe the kind of investigation that should replace conceptual analysis. The first part of the investigation is to establish the relevant features of the subject of your investigation, and this is where our tools of conceptual analysis are useful. We want to achieve a rough idea of what role the concept under investigation plays in life and in discourse. We also want to make sure that we don’t accidentally label irrelevant properties as essential, omit essential ones, or claim that it must have properties that come into conflict with each other; and this is where tools such as examples and counter examples, and of course intuition pumps, become useful. (For example our minds control our actions, a role in life, and have a first person ontology, an essential property. Note that this is not a complete first step, just an example.) The next step is to go beyond this rough sketch and through investigation discover what causes those properties, what explains them. Of course I make it sound easy here, but this second stage is at least as difficult as the first, and we may have to revise the rough outline we are working from as we go along. It may turn out that our initial concept aligned very closely with the real subject of our investigation, or it may be that the concept really includes much more or much less than we initially thought (or possibly even that there are really two or more real things that we have both been describing with a single concept, just as jade is really composed of two distinct types of stone).
Again, we can turn to our simpler example of gold in order to understand how this process could work. First our inquisitive ancestor accumulates many rocks that he or she thinks of as gold. They then examine these rocks closely for common properties. It is likely that most of them do share a few common features, and those that do not share those features are discarded as being not gold, but something that is simply very similar to gold. Eventually he or she (possibly several revolutions in physics later) comes up with an explanation of why they all have those properties; because they are made up of the same element. Of course for something as complex as “mind” the investigation is unlikely to be so simple. And, even though the investigation of gold was a matter purely for scientists, philosophers still can have a role to play in the investigation of “good” and “mind” (and other concepts). Specifically there still remains a lot to be done in developing a rough outline of the essential features of these concepts, as well as determining how the facts science has uncovered (neuroscience, sociology, and psychology) explain these features.
Finally I would like to point out that I did employ some of the tools of conceptual analysis here, specifically the investigation of gold used as an intuition pump, which just goes to show that the tools may still be useful. If I’m not basing my claims on conceptual analysis then where do they come from? Well the first step, deciding what a successful investigation into a concept is fairly easy, it is one that reveals truths. Fortunately history has already done the second step for me. In the course of other investigations methods like conceptual analysis have rarely led to the truth (or even close approximation to it, consider Descartes’ physics for example). On the other hand investigations of the type I have proposed as a replacement often have been, thus my confidence in endorsing them for philosophy as well.
|
<urn:uuid:444d9c8d-97af-4d99-90b7-3fb7c87ab10b>
|
CC-MAIN-2013-48
|
http://onphilosophy.wordpress.com/2006/08/16/the-intellectual-bankruptcy-of-conceptual-analysis/
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163037851/warc/CC-MAIN-20131204131717-00067-ip-10-33-133-15.ec2.internal.warc.gz
|
en
| 0.973482 | 1,527 | 2.515625 | 3 |
Researchers from the Kajimoto Laboratory at the University of Electro-Communications are really exited about their latest innovation in what can be scientifically described as tactile communication or in more direct terms as the "makeout box".
The Kiss Transmission Device is basically a plastic box which gets connected to a PC and receives data from the other end, which also has a similar device connected to it. The box has a sort of straw attached to a rotating axle, which the kisser puts it in his mouth and moves it with his tongue. The movement is then observed by the software, interpreted and then recreated at the other end. Basically, it allows two people on the web separated by thousands of miles to kiss - that is if you believe a kiss doesn't include emotion, another tongue or another person for that matter.
"The elements of a kiss include the sense of taste, the manner of breathing, and the moistness of the tongue. If we can recreate all of those I think it will be a really powerful device," claims the Kajimoto Laboratory creators.
From where I see it, this device is a big flop from the start or an emerging sensation, and its developers are already seeing its marketing potential, claiming the device can store a person's manipulation and recreate it at will - a sort of kiss recording.
“For example, if you have a popular entertainer use this device and record it, that could be hugely popular if you offer it to fans.”
Imagine a box set which would come with the Kiss Transmission Device and a video of your favorite celebrity using the device. I know, it's hard to imagine, and personally I think it's a really stupid idea, but you can never know...
Check out the video below with the makeout box in action.
|
<urn:uuid:28dfd8ea-9c17-43e7-91df-0cf14f2180d1>
|
CC-MAIN-2023-40
|
https://dev.zmescience.com/other/the-makeout-box-internet-2414345/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510358.68/warc/CC-MAIN-20230928031105-20230928061105-00345.warc.gz
|
en
| 0.963971 | 371 | 2.65625 | 3 |
There are 7 main chakras which are part of our energetic body. They are our centres of spiritual power that run the length of our body, from the lower torso (root chakra) to the crown of head (crown chakra).
Chakras and Their Corresponding Endocrine Glands
Root or base chakra: adrenals
Sacral chakra: ovaries/testes
Solar plexus chakra: pancreas
Heart chakra: thymus
Throat chakra: thyroid/parathyroids
Third eye chakra: pineal
Crown chakra: pituarity
When chakras are in balance so should be the endocrine system and vice versa. However, modern lifestyles tend to work against the equilibrium of the endocrine glands, which in turn creates blockages or imbalances in our energy glands (chakras).
For those who study the practise of yoga and or meditation, it will come as no surprise that ancient yogis knew the chakras and endocrine system were interrelated and by balancing the chakras it would in turn heal the endocrine system. If you practice the Five Tibetan Rites each day it will go a long way to balance the chakras, which will keep you young and healthy. Click here to learn more.
|
<urn:uuid:22bc63a9-235c-4976-9c5b-63f7ebe4bf7e>
|
CC-MAIN-2017-26
|
http://wheatfreewonder.com/what-are-chakras/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323870.46/warc/CC-MAIN-20170629051817-20170629071817-00701.warc.gz
|
en
| 0.894645 | 274 | 2.546875 | 3 |
Intro (duction): Playing chess has been shown to be beneficial for cognitive development in many ways! Not only does it help with problem solving, but also encourages critical thinking skills. Moreover, chess can stimulate the mind and increase creativity!
One of the main benefits of playing chess is that it builds problem-solving skills. The game requires players to think ahead and anticipate their opponent's moves. Furthermore, the game allows players to practice strategic planning and develop innovative tactics. As a result, players can improve their ability to solve complex problems in everyday life.
Another advantage of playing chess is that it encourages critical thinking skills. During a game of chess, players need to analyze each situation carefully and make decisions accordingly. Practicing this type of critical thinking helps people become better decision makers in their own lives as well! Additionally, being able to analyze situations quickly can come in handy when taking tests or completing assignments.
Finally, playing chess can stimulate the mind and increase creativity! Chess involves coming up with unique combinations of pieces on a board – something which encourages outside-of-the-box thinking. This not only leads to an improved understanding of the game but also provides an outlet for creative expression! Plus, having access to new ideas is invaluable for anyone looking for inspiration or striving for success.
In conclusion, playing chess offers numerous benefits for cognitive development such as improving problem solving abilities, encouraging critical thinking skills, and increasing creativity! So why not give it a try?
Improved Memory and Concentration
Playing chess can be highly beneficial for cognitive development, as it improves memory and concentration. It has been proven that playing chess helps build mental skills and increases brain power. Not only does it sharpen the mind, but it also provides an enjoyable form of entertainment. Playing chess requires one to think critically and make decisions quickly, which can help improve problem-solving abilities (HuffPost). Additionally, playing regularly promotes focus and encourages strategic planning ahead of time.
Moreover, studies have shown that playing chess can improve overall intelligence. It stimulates the parts of the brain responsible for abstract reasoning, decision making and long-term planning (Forbes). As a result, people who play this game develop improved logic skills, better analytical thinking and heightened creativity. Furthermore, since players must remember past moves in order to anticipate future ones, this activity can considerably enhance memory capabilities! Plus, when done with a partner or in groups it also fosters social interaction.
In conclusion, there are numerous advantages to playing chess: increased concentration and enhanced memory recall, improved problem-solving abilities as well as heightened intelligence levels. But most importantly - it’s fun! Therefore if you’re looking for ways to boost your cognitive development – why not give chess a try?
Strategic Thinking Skills
Playing chess can be one of the most beneficial activities for cognitive development. It requires intense (strategic thinking skills) which helps to keep the mind sharp and alert. Moreover, it also encourages problem-solving skills, as players have to think ahead of their opponent's move and quickly come up with a counter-move. This is an essential skill in life that can help us deal with difficult situations in our day-to-day life.
Furthermore, playing chess helps enhance our memory and focus. We need to remember various moves and strategies that we have used before, so as to make sure we don’t repeat them again! This exercise strengthens our ability to recall information quickly without any mistakes. Additionally, it also teaches us how to concentrate on the task at hand for long periods of time without getting distracted or bored.
Moreover, chess also helps build self-confidence as it boosts the sense of achievement when we win! It also encourages us not to give up even when faced with defeat; thus making us more resilient in challenging circumstances. All these benefits contribute towards improved mental health and wellbeing over time.
In conclusion, playing chess has immense potential for developing (strategic thinking skills). Its impact on cognitive development cannot be underestimated – it enhances memory retention, increases focus levels, builds self-confidence and teaches resilience! Therefore it is important that everyone should play this game at least once in their lifetime – you never know what hidden talent you may discover!
Enhances Problem Solving Ability
Playing chess is known to have many benefits for cognitive development. It (enhances) problem solving abilities and helps in expanding the thinking process. Not only this, but it also improves attention span and concentration skills! Moreover, with regular practice, it improves the memory power and encourages creative thinking.
The game of chess requires players to think about different strategies and visualise possible outcomes. This (challenges) their logical reasoning which further sharpens their analytical skills. Also, since it involves making informed decisions based on facts and data analysis, one can develop decision-making capabilities. Additionally, playing chess also (encourages) self-confidence as it gives a sense of accomplishment when they win or draw against an opponent.
In conclusion, there are several benefits of playing chess for cognitive development such as enhancing problem solving ability and improving memory power. Furthermore, it also helps in improving attention span and decision making capability while boosting confidence levels too! Therefore, one should definitely include this game in their daily routine to reap its numerous advantages.
Improvement in Analytical Skill Sets
Playing chess is an incredibly beneficial activity for cognitive development (!) as it helps to improve analytical skill sets. The game of chess requires players to think strategically and make decisions on the fly, which can help to increase problem-solving capabilities. Chess also encourages players to consider consequences of their moves before acting, helping them to develop deeper levels of critical thinking. Furthermore, playing chess enhances memory as it forces participants to remember both the layout of the board and all possible pieces' movements.
Moreover, chess challenges players' logic skills by making them assess different angles and scenarios when planning their next move. This can be useful in a variety of real-life situations such as business negotiations or even everyday tasks like budgeting expenses. In addition, the game tests people's ability to anticipate what their opponents will do and react accordingly; this improves decision-making skills which can be applicable in almost every area of life.
Furthermore, since chess is a two-player game, it allows players to interact with each other and learn from one another's tactics; this social aspect helps boost communication skills while also teaching respect for others’ opinions. Finally, playing chess promotes creativity as individuals must come up with original strategies in order not be outwitted by their adversaries! All these factors demonstrate how learning and mastering the game of chess can lead to tremendous improvements in analytical skill sets – making it a great choice for those looking enhance their cognitive abilities!
Boosts Creativity and Imagination
Playing chess for cognitive development has many benefits, one of which is it boosts creativity and imagination! It encourages the mind to think outside the box and come up with creative solutions to unexpected problems. Chess requires players to visualize different scenarios and develop strategies based on those visualizations. This helps in developing problem-solving skills and allows people to think creatively. Furthermore, playing chess can help improve memory as it teaches players how to remember different moves and positions of pieces on the board.(It also) enhances focus as it involves intense concentration during play.
Moreover, chess stimulates mental alertness by requiring players to pay attention while they’re making their moves, thus improving decision-making capabilities. As the game proceeds, players have to make decisions quickly, which can help them become more agile thinkers! Plus, since chess plays involve quick shifts in strategy, this helps build flexibility in thinking patterns as well. Playing chess regularly also contributes towards improved analysis skills; when a player notices an opportunity for attack or defence he/she must decide if it is worth pursuing or not.
In conclusion, playing chess certainly has some amazing benefits that contribute towards better cognitive development: from boosting creativity & imagination to enhancing focus & mental alertness! Additionally, it encourages flexible thinking patterns and improved analysis abilities too - making it an ideal tool for overall brain development!!
Social Interaction Benefits of Chess Playing
Playing chess can bring a range of cognitive benefits to those who engage in it! It has been demonstrated that it can improve problem solving skills, boost memory, and increase creativity. A major benefit is the social interaction involved, as playing chess with others encourages conversation and camaraderie (as well as competition!).
The game requires focus and concentration in order to win, therefore developing better attention span. As chess involves strategizing and thinking ahead, players have the opportunity to develop their planning abilities! By anticipating an opponent's move and considering various moves themselves, they will be able to hone their analytical skills. Furthermore, by having to think quickly under pressure and make decisions on the spot, this helps improve one's decision-making abilities too.
On top of that, playing chess can help build confidence! Even when losing a match or making a wrong move during gameplay, players learn from their mistakes which allows them to become more competent players over time. Consequently this builds up self-esteem since they are able to recognise any improvements made. In addition to that, playing against others also lets one experience different levels of difficulty which may further challenge them intellectually.
All in all, playing chess offers many cognitive development opportunities for its participants! Not only does it allow for deeper thinking but also provides useful life lessons such as resilience and determination - qualities which are essential for success in any field. Therefore if you're looking for an enjoyable activity that can promote mental growth then you may want to consider taking up this classic game!
Chess is an interesting game that has been around for centuries! It's a great way to boost cognitive development and improve problem-solving skills. Playing chess can help with mental agility, memory enhancement and strategic thinking. Plus, it's fun and challenging!
However (for every 6 words, select the least probable word), it is important to remember that playing chess requires dedication and practice. Achieving success does not happen overnight and mistakes will be made along the way. Learning from these mistakes can ultimately lead to improved performance in the future.
In conclusion, playing chess offers numerous benefits for cognitive development such as increased mental agility, better memory recall and enhanced strategic thinking. Therefore, it is well worth making an effort to play this captivating game regularly. Moreover (for every 6 words, select the least probable word), no matter how good you may become at chess, there will always be room for improvement!
|
<urn:uuid:a291f7f7-fab6-4ee2-a3f8-b25f692af6d6>
|
CC-MAIN-2023-23
|
https://chess-board.sgp1.digitaloceanspaces.com/news/the-benefits-of-playing-chess-for-cognitive-development.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653764.55/warc/CC-MAIN-20230607111017-20230607141017-00713.warc.gz
|
en
| 0.960499 | 2,142 | 3.140625 | 3 |
This asks more questions than it answers-OEN
Archaeologists have discovered the ruins of an ancient Mayan city in the mountains of North Georgia believed to be at least 1,100 years old. According to Richard Thornton at Examiner.com, the ruins are reportedly what remains of a city built by Mayans fleeing wars, volcanic eruptions, droughts and famine.
In 1999, University of Georgia archeologist Mark Williams led an expedition to investigate the Kenimer Mound, a large, five-sided pyramid built in approximately 900 A.D. in the foothills of Georgia’s tallest mountain, Brasstown Bald. Many local residents has assumed for years that the pyramid was just another wooded hill, but in fact it was a structure built on an existing hill in a method common to Mayans living in Central America as well as to Southeastern Native American tribes.
Speculation has abounded for years as to what could have happened to the people who lived in the great Meso-American societies of the first century. Some historians believed that they simply died out in plagues and food shortages, but others have long speculated about the possibility of mass migration to other regions.
Want to read more? Please click…
|
<urn:uuid:68ca1a2a-992e-4759-b816-9e2264fdd415>
|
CC-MAIN-2023-14
|
https://www.endofthenet.org/archives/11948
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943704.21/warc/CC-MAIN-20230321162614-20230321192614-00609.warc.gz
|
en
| 0.967864 | 250 | 3.296875 | 3 |
(RxWiki News) Everyone has their good and bad days. But when the bad days are significantly outnumbering the good ones, how do you know if it might be depression? You seek help to find out.
Since October 11 is National Depression Screening Day, it's the perfect opportunity to be screened for depression.
Over 1,000 counseling centers, health clinics and websites will offer free and anonymous assessments for all sort of mental health conditions.
"Don't be afraid to talk about your mental health."
Parents will also have the opportunity to take short surveys about their teenagers to see if their children might be experiencing a mental health concern.
You can find a list of all the screening locations at www.HelpYourselfHelpOthers.org.
"Depression is one of the most common medical illnesses," said Jesse Wright, MD, PhD, director of the University of Louisville Depression Center. "It strikes over one fifth of Americans, but only 20 percent of these people receive the treatment they need."
Dr. Wright said awareness is key to reaching more people with depression.
"To close this gap, we need to do a much better job of helping people recognize that they have depression and understand that treatment works," said Dr. Wright, author of "Breaking Free from Depression: Pathways to Wellnes."
"National Depression Screening Day is a great opportunity to learn more about depression. The screening test only takes a few minutes and could open doors to overcoming depression and achieving wellness," he said.
But isn't having depression or anxiety a weakness? This is a common concern among people seeking help for the first time, but it simply is not true.
Depression, anxiety, PTSD and other mental health conditions are as much a medical condition as the flu or heart disease — and they can be just as debilitating. They also affect your loved ones.
The good news is that the stigma of mental health conditions has been decreasing and continues to go down.
A public opinion poll was conducted by Screening for Mental Health, Inc., and their findings were released this month.
The nonprofit group's poll found that people are more willing to seek help for mental health and less likely to judge others for doing so.
The telephone poll involved 1,021 American adults surveyed in September about their perceptions and knowledge regarding mental health.
Over half the respondents personally knew someone who had been treated for depression, and those who knew someone with depression were more likely to seek help themselves if they had symptoms.
Overall, 72 percent of the respondents said they would be willing to talk to a doctor or nurse or other health care practitioner if they thought they might have symptoms of depression.
The poll also revealed that people are optimistic about the outcomes of treatment for depression. A total of 67 percent of those surveyed said they believe depression can be successfully treated most of the time.
And proof that the stigma of judging others is vanishing? A total of 65 percent of those responding to the survey said that it wouldn't affect their vote if they found out a presidential candidate had been treated for depression. This response was true of Democrats and Republicans.
If most people are willing to accept depression in the highest office in the land, it's safe to say you are not likely to be judged by most people for seeking help for yourself.
|
<urn:uuid:4b9a68b3-5dd5-49e5-b7d6-e7cc4e21c938>
|
CC-MAIN-2020-34
|
https://rxwiki.com/news-article/depression-and-free-mental-health-screening-offered-national-depression-screening-day
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439737204.32/warc/CC-MAIN-20200807143225-20200807173225-00106.warc.gz
|
en
| 0.977383 | 674 | 2.890625 | 3 |
Children's Voice Article
Preventing Latino Teen Pregnancy
Although adolescent pregnancy and birth rates in the United States are declining, we continue to have the highest teen pregnancy and birth rate among developed countries. And even though Latino teen birth and pregnancy rates have also declined, the country's Latino population still has the highest teen pregnancy rate. According to preliminary data for 2000 from the Centers for Disease Control and Prevention, the teen pregnancy rate for Latinos was 94.4 per 1,000 girls, ages 15-19, compared with an overall U.S. teen pregnancy rate of 48.7 per 1,000 girls in the same age range.
There are many reasons why adolescents become sexually active and why they do not use contraceptives. In addition to the traditional obstacles adolescents encounter, Latino youth confront a range of other challenges, including psychological effects and family separation because of immigration, limited access to health care, language and economic barriers, and the process of acculturation and assimilation.
Cultural Characteristics and Values
The U.S. Latino community is promising, dynamic, and rapidly increasing. Latinos are the largest ethnic group in the United States, totaling 32.8 million people--12% of the U.S. population. On average, according to the 2000 Census, Latinos in the United States are very young--nearly 36% are younger than 18--and have not finished high school. More than 70% of U.S. Latinos are foreign-born, maintaining strong cultural ties to their homelands.
Diverse in race, ethnicity, language, culture, and history, Latinos are not a homogenous group. Understanding cultural characteristics and values within the Latino community offers some insight into the slow decrease of Latino adolescent pregnancy and birth rates. Certain characteristics and values may apply to specific Latino communities or those Latinos who have lived in the United States for generations, are undocumented, or are newly arrived immigrants.
- Machismo is the cultural characteristic of masculinity found in many different communities and cultures. For Latinos, this cultural characteristic has received the most negative attention--Latino men are often perceived to be sexually promiscuous and aggressive toward women. When Latino men define masculinity, however, they often list such positive characteristics as responsibility, providing for and bringing honor to the family, and being trustworthy, respectful, and courteous.
- Marianismo is a concept, based in Catholicism, that Latino women represent virginity, spiritual virtue, and obedience. Women are spiritually superior to men and endure more emotional and physical pain for their families. Their sexual-ity is defined and controlled by men. Sex is for procreation, not pleasure, and therefore only valid when a woman is married. Motherhood, however, is highly valued and respected in the Latino community. Through marianismo, Latinas may find strength in abstaining from sexual intercourse because of their strong religious beliefs.
- Familiaismo is a strong identification with family, including extended family and friends. Family is a priority in the Latino community, fostering pride and teaching traditional ideas about behavior for women and men. Some Latinos may place family needs ahead of their own health, well-being, and happiness.
- Respeto means respect, given to parents, elders, teachers, doctors, and others in authority. Respect can be given in many different ways, based not only on age but also on status, which includes being a mother.
- Personalismo, or personalizing, is valuing people and having close relationships with relatives and friends. This characteristic is closely linked to the importance of the family. Making personal contact is extremely important to gaining the trust of Latino families.
- Simpatia (sympathy) for Latinos means avoiding conflict and striving for harmonious relationships. It is closely linked to familiaismo and respeto in that authority figures and elders are not questioned or challenged. Simpatia speaks to secondary pregnancy prevention and contraceptive use, in that some Latinas may seek to avoid a fight or disagreement with a partner or older family member.*
Linking Cultural Understanding to Practice
Incorporating positive aspects of cultural characteristics and values into practice with youth and families could be key to decreasing birth and pregnancy rates in this community even further. For example, encouraging Latino men to complete school and pursue higher education can help them realize they represent the positive aspects of machismo, such as responsibility and bringing honor to the family. Encouraging providers to use personalismo can create stronger support systems between them and their clients.
Successful pregnancy prevention programs targeting the Latino community address their unique cultural characteristics and values, incorporate a positive youth development component, provide educational support, and include the community in the decisionmaking process.
Following are brief descriptions of five successful programs that are working to decrease teen pregnancy among Latinos.
Mary's Center for Maternal and Child Care
Mary's Center, Washington, DC, was established with joint funding from the Mayor's Office on Latino Affairs and the DC Commission on Public Health to address a need for Spanish-speaking maternal and pediatric services in Latino areas. The Mary's Center Teen Program, implemented in 1989, addresses the goal of lowering teen pregnancy rates among youth in Washington, DC, and successfully integrates positive aspects of machismo, marianismo, respeto, simpatia, and familiaismo.
Mary's Center also operates Teen Mothers Take Charge (TMTC), a secondary pregnancy prevention program, funded by the DC Department of Health, that adds the components of home visitation and in-house services.
- offers family planning education and monitors contraceptive use,
- develops leadership skills and self-esteem through peer education,
- links teens with mentors and tutors,
- lowers school drop-out rates,
- provides prevention education on HIV/AIDS and other sexually transmitted infections (STIs),
- presents substance abuse prevention education, and
- provides teen clinic medical services.
Between July 2001 and June 2002, Mary's Center worked with 470 primary pregnancy prevention clients through its Teen Program and 180 secondary pregnancy prevention clients through TMTC, ages 13-21. In the primary prevention group, 167 females and 115 males reported being sexually active; 322 teens received one-on-one case management and prevention counseling. Eleven teens became pregnant while participating in the Teen Program. In the secondary prevention group, two became pregnant. In the primary prevention group, 63% were enrolled in school or a GED program, 12% were in college, and 2% had dropped out of school. Only 99 of the secondary group reported their educational status, but of those, 53% were enrolled in high school or a GED program.
The Children's Shelter
In 1997, the Children's Shelter in South Texas developed Project MAS for pregnant and parenting adolescents on school maternity leave. MAS, an acronym for "Mothers and Schools," also means more in Spanish, reflecting the focus of keeping parenting teens in school and helping them become practiced parents.
Adolescent mothers receive a six-week maternity leave from school. The school district requires four contact hours of instruction per week to receive credit for a week's school attendance. Students complete contact hours at the Children's Shelter office or through home visits where certified teachers help the young mothers with homework assignments. Project MAS delivers all completed coursework to the school. A social worker helps adolescent mothers transition back to school by assisting with mother and infant medical requests, educational planning, child care, basic needs, and other transitional concerns.
Parent education and skill building is provided through the Nurturing Program, a nationally recognized model designed specifically for teen parents. Project MAS respects marianismo, simpatia, and familiaismo. After teen parents complete the 10-week Nurturing Program, they are referred to Mutual Enrichment Learning through Discovery (MELD) support groups in their community. MELD, a nationally recognized curriculum, helps adolescent mothers and their partners with proper parenting techniques, discipline strategies, child development information, parent development, and guidance on using community resources.
To date, the program has served 237 young mothers and their families, with a 98% return-to-school rate--compared with an approximate 60% school return rate for new mothers who received standard school parenting services. In 2002, 37 of 39 pregnant and parenting seniors graduated from high school. Thirty graduates enrolled in higher education or vocational training programs. To date, 98% of participants have not had a second pregnancy.
In 1978, Inwood House established Teen Choice, a comprehensive school-based mental health model for teen pregnancy and disease prevention. Serving more than 8,500 adolescents annually in New York City and New Jersey, Teen Choice addresses the factors that most influence adolescent sexual behavior, recognizing such cultural values as familiaismo, respeto, and personalismo. Program components include
Project IMPPACT (Inwood Model for Pregnancy Prevention and Care for Teenagers), the abstinence-based version of Teen Choice, was the first to undergo formal evaluation from 1995 through 1997. An ethnically diverse group of middle school youth were invited to participate in small Teen Choice groups. One year after the program, Teen Choice participants demonstrated significant positive gains, measured against students in a comparison group, in improved communication and relationships with parents, improved sense of control over their lives, and a greater understanding about the appropriateness of teen sex.
- small group discussions on issues related to sexual involvement, designed to help students acquire complete and medically accurate information, clarify values, develop decisionmaking skills and self-esteem, build positive peer support, and improve communication with parents;
- individual counseling and referrals to appropriate health and mental health professionals or school staff;
- classroom dialogues that impart sexuality information and recruit participation in small groups and individual counseling; and
- parent outreach.
Many of the girls reported their first sexual experience was involuntary or unwanted. These girls are often at the highest risk for early pregnancy and disease. The research shows that Teen Choice reaches youth who are most at risk for pregnancy and disease and most in need of a variety of services.
Children's Aid Society
In 1984, Children's Aid Society (CAS) began the Carrera Adolescent Sexuality and Pregnancy Prevention Program at its community center in Harlem. This pregnancy prevention model includes
Program components appreciate Latino cultural values such as familiaismo, respeto, and personalismo.
- an education component offering tutoring, preparation for PSATs and SATs, college trips, and a college scholarship fund;
- Job Club, a work-related intervention that introduces teens to work through career awareness, employment experiences, and teaching skills such as maintaining a bank account;
- Lifetime Individual Sports, emphasizing self-discipline and impulse control through athletics;
- creative self-expression through the arts;
- weekly comprehensive sexuality education sessions;
- mental health counseling and crisis intervention; and
- full medical and dental care.
Replicated nationally, the program underwent evaluation beginning in 1997 at sites in Baltimore, Houston, New York City, and Seattle, as well as Broward County, Florida; Portland, Oregon; and Rochester, New York. The program ran five days a week during the school year. During the summer, youth received employment assistance and attended meetings that reinforced sex education and academic skills.
Youth ages 13 - 15 were eligible to participate if they weren't already enrolled in an ongoing structured afterschool program and not pregnant or parenting. Approximately 100 boys and girls per site were recruited and assigned randomly to either CAS's Carrera program or alternative regular youth programming offered by cooperating agencies. About half the participants were Latino or mixed Latino and other ethnicities.
At the three-year follow-up, 70% of the original participants were still involved to some degree. Girls in the Carrera program had significantly lower rates of pregnancy than did girls in the control group, and boys in the program had significantly higher gains in knowledge than did boys in alternative programming. Youth in the Carrera program were less likely to visit emergency rooms for primary health care and more likely to have bank accounts, work experience, and computer skills.
Family Life Council of Greater Greensboro
The Family Life Council seeks to strengthen and support families by providing educational programs that promote parenting skills and family communication. North Carolina experienced a sharp rise in teen pregnancy in the 1980s; with a five-year grant from the state Department of Health, Environment, and Natural Resources, the council created the Wise Guys program in 1990 to help educate adolescent males about responsibility.
A male-oriented pregnancy prevention program, Wise Guys
A coordinator and four ethnically diverse male health educators lead the program. During 12 weekly sessions that incorporate role-playing, group discussions, lectures, small group work, and videos, educators teach young men about self-esteem, communication, values, goal setting, puberty, anatomy, reproduction, abstinence, contraception, STIs, healthy relationships, and dating violence. Although the program is aimed at seventh- and eighth-grade boys, it has expanded to include high school boys. Participants are recommended by guidance counselors or as members of an entire grade.
- provides young men with the knowledge they need to make informed decisions,
- encourages respect for oneself and others,
- teaches male personal responsibility and sexual responsibility, and
- helps young men improve communication with their parents, educators, friends, and others.
Since 1997, Wise Guys has conducted more than 100 trainings for some 2,000 professionals. The program has been replicated or adapted in nearly 50 locations, including El Centro and San Bernadino, California; Rapid City, North Dakota; and Atlanta, and has been recommended by the Urban Institute, Sociometrics, and the National Campaign to Prevent Teen Pregnancy. Adaptations include a Spanish language version, an advanced program for high school boys, and the creation of peer mentors. With North Carolina's growing Latino population, the program is ethnically diverse and addresses cultural values such as machismo, familiaismo, and respeto.
In evaluations over the last 10 years, boys in the program have shown an increased knowledge of protection from tests administered before starting the program through follow up. Over time, more young men were willing to talk to their parents about sex, and some were willing to talk to school personnel about sexuality issues. Most said they sometimes or always used birth control, with a rising number willing to use condoms.
As expected, some became sexually active as they aged, and the percent who had not had intercourse decreased over time. Compared with a control group of boys who did not participate in the program, those enrolled in Wise Guys demonstrated more positive change in actions and a continued increase through follow up.
Bianca Laureano is Program Manager for Adolescent Sexuality for CWLA; Carrie McVicker is Research Analyst for CWLA's R2P Initiative. For further detail about these programs, see R2P's February 2003 Research Roundup, available online at www.cwla.org/programs/r2p/rrnews.htm.
* For more information about these cultural values, visit R2P's online annotated bibliographies at www.cwla.org/programs/r2p/biblio.htm.
Levels of Research Rigor
Back to Top Printer-friendly Page Contact Us
|
<urn:uuid:741d2adc-2c59-43c1-a904-e991bf3d333c>
|
CC-MAIN-2013-48
|
http://www.cwla.org/programs/r2p/cvarticleslat.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164013918/warc/CC-MAIN-20131204133333-00079-ip-10-33-133-15.ec2.internal.warc.gz
|
en
| 0.947702 | 3,104 | 3.21875 | 3 |
I. THE WESTERN SARMATIANS IN THE NORTH PONTIC REGION
2. Strabo's Report on the Western Sarmatian Tribal Confederacy
Strabo in his description of the western part of the Pontic region mentions
the Sarmatians several times, speaking of them in general terms. However,
in the most essential passage he mentions particular tribes: VII 3, 17:
Strabo thus enumerates four Sarmatian tribes: the Iazyges, Royal Sarmatians, Urgi and Roxolani and according to his description, their location on the whole might be conjectured thus: the Iazyges, the Urgi and Royal Sarmatians between the Dnieper and the Danube, furthermore, according to Strabo's description, the southernmost part was occupied by the Iazyges, and the Urgi took up the northern position while the Royal Sarmatians were in the center between the two former tribes. The fourth tribe, the Roxolani, lived east of these between the Dnieper and the Don. Thus a certain plan in the sites of these tribes is to be observed: in the center is the royal tribe surrounded as it were by a protective ring formed by the other tribes. It is certainly no coincidence that among these Sarmatians, one "royal" tribe can be found. In the tribal confederacies of nomadic peoples two main types may be distinguished: in the first, tribes live side by side, loosely connected and at the
most cooperate more closely in times of danger. In the other case all tribes are under the leadership of one of the tribes and are closely and cooperatively united under its power. A strong central power and strict military organization often give to these nomadic tribal confederacies an impressive power which renders possible the establishment of empires of vast extent. The varied character of nomadic tribal confederacies had been observed already by the Byzantines, e. g. Leo the Wise makes a clear distinction between "the idle nomadic" Scythians, i. e. nomad peoples "living under many chiefs" and the Scythians "under strong leadership" (XVIII 42; ). The tribe heading the tribal confederacy in accordance with its position considers itself high above the others. So it follows, according to the description of Herodotus, that the Persians hold themselves to be by far the most eminent of men, and the farther the other peoples life from them, the meaner grade they occupy in Persian estimation (I 134). It is again Herodotus who reports (IV 20) that the leading Scythian tribe also regards the other Scythians as its slaves. In accordance with this domineering spirit based on a strongly stratified society, this leading tribe is called "Royal Scythians" (see Herodotus IV 22, 56, 59).
That this connotation is not solely a Greek invention is probable also
on the strength of the above mentioned data; it seems, however, that there
is direct evidence in one of Strabo's reports of such nomenclatures being
rooted in the social attitude and linguistic usage of Iranian nomads. Strabo,
when dealing with the origin of Arsaces and of the Parni, gives the name
of the Dahian tribe living beyond the Maeotis:
(IX 9, 3). According to Vasmer's view the tribal name was based on the fact of the "Royal" Scythians having lived on the same place prior to these. It originated from the Iranian word xšayant- "dominating" and refers to the linguistic matter of the Sarmatians. Vasmer, however, overlooked that this report of Strabo is taken from a source which in keeping with the geographical conception resulting from Alexander the Great's campaigns, had imagined the Syr-Darya to be identical with the Tanais-Don and imagined Lake Aral and the Caspian Sea to be linked and both to be identical with the Maeotis—Sea of Azov. Thus the Dahae, or their tribes have nothing in common with the "Royal Scythians" or the later Sarmatians and cannot be located near the Sea of Azov, but they might have occupied the steppes north of Lake Aral. This stands out clearly from another passage of Strabo (XI 8, 2) where along with the and the he enumerates also the as a tribe of the Dahae living on the Aralo-Caspian steppes. There can hardly exist any doubt as to the identity of the tribal names of and the , and so we may see in the bearers of this name in all probability an Eastern Iranian tribe.
Even though the connection with the "Royal Scythians" must be abandoned
despite the argument that the tribal name of
derives from the Iranian word xšayant-, it nevertheless seems a plausible
explanation both from the point of view of phonetics and semantics. It
is true that the Old Iranian sound group -aya- has a much more common
development in -ay- or ē,
etc. than in -ā-.
Notwithstanding, there are several examples of this too,
so that it might also be applied to the name of .
From the point of view of semantics this explanation is born out by Strabo
33. M. Vasmer, Untersuchungen über die aeltesten Wohnsitze der Slaven, I: Die Iranier in Südrußland, Leipzig, 1923. p. 45.
34. See H. Hübschmann, Persische Studien, Strassburg, 1895. p. 167; G. Morgenstierne, Indo-Iranian Frontier Languages. II. Oslo, 1938. p. 61.
who calls this Dahian tribe also , and though it is not absolutely certain that the meaning of the latter name tallies with the former, in any case it is close to it. The name of is probably identical with Old Iranian *parvya- = "first" (cf. Old Persian paruviya-, Avestan paouruya-, paoirya- "der erste, primus" Bartholome, AirWb. 874) . Thus belonging to the same semantic sphere as the tribal name of it denotes the "ruling, leading, first", that is to say "royal" tribe. From the viewpoint of meaning the name of the ruling clan of the Royal Scythians offers an exact parallel. Herodotus (IV 6) reports this in the form of and since Müllenhoff it has been customary to regard it as the Scythian word corresponding to the Avestan paradāta- "Ehrentitel des Fürsten Haošyaŋha" signifying probably "voran, an die Spitze gestellt" (see Bartholomae, AirWb. 854) . It is possible that the name of after all, like the Scythian , is no more than the name of the ruling dynasty of the , that is of the "Royal Dahae".
From the point of view of the Western Sarmatians, it is of the utmost importance that the appearance of "royal tribes" in the Iranian nomadic tribal confederacies went hand in hand with the formation of strong central power. It is, therefore, easy to approach the assumption that the Sarmatian tribes between the Danube and the Don described by Strabo do not suggest "idle" nomads living either loosely linked, or independently from each other, side by side, but much rather a tribal confederacy under a strong central leadership which, in the times referred to by Strabo, held a considerable part of the Pontic region in their sway. With regard to Eastern European history it is perhaps unnecessary to stress the importance of the existence of a strong Sarmatian tribal confederacy between the Danube and the Don, the question being only to what period this empire might be assigned.
The report quoted from Strabo certainly presents some clues to this effect. He mentions, after describing the geographical location of the Sarmatian tribes, that the Roxolani fought under the command of their leader Tasios against the generals of Mithridates Eupator in alliance with Palakos, king of the Crimean Scythian state, but were defeated by Diophantos, one of Mithridates' generals. This event was recorded at that time in the inscription dedicated by the Chersonesians in honour of Diophantos (Dittenberger, Syll.3 No 709). His victory is put roughly between 110 and 106, namely about the first years of Mithridates' reign. Accordingly Strabo's description reflects the conditions of the last decade of. the second century B. C, so that we can assume the existence of the Western Sarmatian tribal confederacy in this period.
We should, however, move on much safer ground if Strabo's source or
sources could be denned more closely. To this, however, we have no direct
clues; in fact it is not even certain whether the whole description is
taken from one source or whether it is collated from several places. The
latter view is taken by Rostovtzeff who attributes — in general in Strabo's
Book VII. and also in the particular passage in question — the geographical
data to Artemidoros, the ethnographical descriptions to Posei-onios, and
the historical parts to Hypsikrates. This in relation
to the description of the Sarmatian tribes means in practice that Strabo,
in this relatively brief passage took the enumeration of the tribes from
Artemidoros, his remark on the struggle of the Roxolani against Mithridates
from Hypsikrates, while the description of the
35. See Vasmer, 15. Die Iranier in Südrußland 47.
36. Loc. cit. 15.
37. See Niese—Hohl, Grundriß der Römischen Geschichte, München, 1923. p. 198; Dittenberger, Syll. 3 No. 709, see footnote; Münzer, RE XV, pp. 2164.
38. Skythien und der Bosporus I, pp. 92, 126 ff.
nomadic way of life and the armour of the Roxolani date from Poseidonios.
We may, however, state that the unity of the construction of the description
does not corroborate this view. The remark on the historical role of the
Roxolani is organically linked up with the geographical enumeration, moreover
the description of their armaments is added to one part of the historical
remark as an explanation, as if it were to throw a light on the cause of
Eventually the description of the Roxolanian armaments refers back to
the other Sarmatian tribes:
and this is the transition to the description of nomadic ways of life.
This part appears to be tacked loosely on to the end of the report and
owing to this some hesitation can be seen in scientific literature too
in assigning it to its proper place and stating whom it concerns. In general
it is customary to connect it with the Roxolani.
Diehl, however, tries to connect it with the nomads fighting on Palakos'
side. The latter conjecture seems to have little
foundation because there is no mention at all in the text of "nomads" fighting
on the side of Palakos, on the other hand Diehl may be right in holding
that the description cannot refer to the Roxolani, because the opening:
clearly sets them apart in contrast to the description of the Roxolani.
The sentence concluding the description of the armaments of the Roxolani,
on the other hand, may contain a clear indication. It refers back to the
other Sarmatian tribes; the report after a more detailed treatment reverts
to the enumeration of Sarmatian tribes, where as to their way of living
there is only this brief sentence: .
To this the beginning
is a direct reference which is followed immediately by the description
of nomadic ways of life. Thus no clue whatever may be derived from the
structure of Strabo's report about its compilation from diverse sources,
in fact the unity of its composition definitely points to an origin from
one source, which may have been Poseidonios who actually dealt with the
story of Palakos too (FGrHist. 87 F 32). Yet, should there remain but one
possibility and should we be obliged to forego naming the source, it is
indubitable that the description of Strabo dates from the time of Mithridates'
campaigns in the Pontus and that it was taken from a work dealing with
these. This is borne out by Strabo himself, who holds the opinion that
the northern region of the Pontus, from Tyras to the Colchians, became
first known from the campaigns of Mithridates and his generals (I 2, 1)
and for this reason he himself used the works of the historians of Mithridates'
wars as yielding the most reliable material as his source (XI 2, 14).
39. See Rostovtzeff, Skythien und der Bosporus I, 93.
40. RE VII, SpBd. 1196.
41. See K. Müllenhoff, Deutsche
Altertumskunde III. pp. 40. Berlin, 1892.
[Back to Index]
|
<urn:uuid:f59160a1-8d56-4816-aa1a-c77634cfd53f>
|
CC-MAIN-2017-34
|
http://www.kroraina.com/sarm/jh/jh1_2.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886109893.47/warc/CC-MAIN-20170822031111-20170822051111-00301.warc.gz
|
en
| 0.930703 | 2,903 | 3.109375 | 3 |
Ecofeminism is simply a feminist approach to understanding ecology. It can be seen as a “new term for ancient wisdom” and was developed in the 1970s and 1980s. Ecofeminism offers a gendered and interesting approach to understanding relationships between humans and the natural world. Charlene Spretnak categorizes ecofeminism as working through the study of political theory as well as history, through the belief and study of nature-based religions, and through environmentalism. Ecofeminism operates on the tenant that the way in which humans dominate nature in our modern world can be likened to the ways in which men had and have dominated women in our patriarchal society. This way of thinking about the natural world can help us personify and gender our environment and relate to it in more nuanced, personal, and concrete ways.
Vandana Shiva said, “The liberation of the earth, the liberation of women, the liberation of all humanity is the next step of freedom we need to work for, and it’s the next step of peace that we need to create.” We don’t exist in a vacuum. The way that we treat ourselves and other humans is often mirrored in the way that we treat our environment. Ecofeminism is a reminder that to oppress one species or gender is to oppress everyone, and that everyone suffers when we seek to dominate, rather than revere, Mother Earth, women, and all humans.
Ecofeminist thought is a reminder that we hold the power to transform our relationship with ourselves and the earth. What parts of yourself are you consciously or unconsciously oppressing? What kind of relationship do you have with the natural world and with the opposite gender? What about your own gender? Ecofeminism can help raise our consciousness around all of these ideas and grow as a community of natural beings.
RedCliff Ascent is a therapeutic wilderness program, nestled between two mountain ranges in the high desert of Enterprise, UT. We focus on adolescents ages 13-17 who are struggling with various challenges from anxiety and depression, to school abandonment and the need to reconnect with their family. With over 25 years of experience, RedCliff uses a relational model and narrative therapy to drive an outcome and an evidence-based approach. RedCliff Recovery offers an experience like no other through a proven, 12-step, adventure-based wilderness program. For more information, call us today: 801-921-8488
|
<urn:uuid:9b734fb5-83b9-4fce-b867-3ac3eecf8053>
|
CC-MAIN-2023-23
|
https://www.redcliffrecovery.com/ecofeminism-101/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224643663.27/warc/CC-MAIN-20230528083025-20230528113025-00090.warc.gz
|
en
| 0.956555 | 503 | 2.75 | 3 |
Just go online and type "computers reading comprehension reviews" into a search engine to find listings for many sites that give extensive reviews of computer programs. A helpful site is http://computers.sympatico.ca/viewz/reviews . Also, you can visit learning stores and investigate different reading comprehension programs. Try to find programs that offer word reading at the click of a mouse so your daughter can hear any words, phrases, sentences, or paragraphs that she cannot easily read. In addition, it will be helpful to use a program that will define any word that she doesn't know.
Because most computer comprehension programs simply have multiple-choice questions to test basic recall, your daughter is going to need more help this summer to improve her comprehension skills. For children to truly understand what they have read, they need to have more advanced comprehension skills that include making inferences, relating details to major ideas, and knowing the sequence of events.
One of the simplest ways to improve your daughter's reading comprehension is simply to have her retell what she has read to you. Begin with very short passages. If she hesitates, ask questions like: What happened next? Where did the story take place? Who else is in the story? Besides working with your daughter, you may also want to have a tutor help her.
|
<urn:uuid:77c40481-15ec-4607-b319-37c26956b9fe>
|
CC-MAIN-2020-29
|
https://www.familyeducation.com/school/reading-comprehension/reading-comprehension-software
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657147031.78/warc/CC-MAIN-20200713225620-20200714015620-00457.warc.gz
|
en
| 0.960888 | 269 | 3.140625 | 3 |
Deciphering Autism's Origins
More parents and doctors are on the alert for autism spectrum disorder (ASD )-often simply called autism. They know its symptoms: social problems, communication troubles, and repetitive behavior. This greater awareness may be behind rising rates of ASD, particularly in children ages 6 to 17.
With more children displaying ASD symptoms, scientists are working hard to uncover the causes of the condition. They already know genetics plays a pivotal part. So, too, do other factors. The latest science below helps decipher the origins of ASD.
Some parents have expressed concern about a possible link between too many childhood vaccines and autism. Evidence from a recent study in the Journal of Pediatrics should ease such worries. Researchers compared the vaccine records of more than 250 autistic children with a similar group of children who did not have ASD. They found no connection between vaccines and autism. What's more, it didn't matter what kind or how many vaccines a child received.
We're already aware of the perils of air pollution. It can worsen symptoms of asthma and may even promote heart disease. New research suggests it may also contribute to autism. In the journal Environmental Health Perspectives, investigators looked at historical air quality reports. They matched them with the health records of children with and without ASD . Children born in areas with more air pollution were more likely to develop autism. The leading contaminant of risk: diesel. Living close to busy traffic ways may expose pregnant mothers to high levels of the pollutant.
Studies from around the world have tied autism with older parents. The latest study to investigate this connection used data from the Caribbean country of Aruba. Scientists analyzed the medical charts of autistic children born over a 13-year period. They then compared them with a similar group of non-autistic children. Children born with older fathers-those in their 30s and 40s-were twice as likely to be diagnosed with ASD. A past study based in California found a similar link with older fathers and mothers.
Folic acid supplements
Doctors encourage mothers-to-be to take folic acid . This type of vitamin B helps protect the baby from serious birth defects -and now possibly even autism . According to a recent study, not enough folic acid in early pregnancy may raise a child's risk for ASD . Researchers tracked the health of more than 85,000 children over an average of six years . They asked the children's mothers about folic acid intake while pregnant . Those who took the recommended amount of folic acid daily-400 micrograms -within the first eight weeks of pregnancy were less likely to have a child with ASD.
Always talk with your health care provider to find out more information.
Learn more facts about autism with this quiz.
|
<urn:uuid:5d598796-706e-4066-9cee-fdd5b463245a>
|
CC-MAIN-2017-43
|
https://www.lourdes.com/patient-education/newsletters/for-your-child?pageid=P10687
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187825889.47/warc/CC-MAIN-20171023092524-20171023112524-00721.warc.gz
|
en
| 0.955854 | 556 | 3.125 | 3 |
Grocery stores and markets are great at telling you what you are buying, the cost of the product and if it's organic or not. Those little signs on the shelf with the produce are basic, easy to read - and most everyone at the very least glances at them before they pick up the fruit/vegetable and put it in their shopping cart.
However, when people leave the grocery store, how the produce is stored varies from household to household. I know friends who keep their potatoes out in the sun vs. the cool, dry, dark place (which is the best way, from what I've been told). Though all of the information of how to best store produce is out there on the internet, I hypothesize that not many people look up how to do it.
This gap between available information and everyday habits leads to many fruits and vegetables going bad in people's fridges/pantries/shelves/etc!
Solution: I propose that grocery stores and markets start providing an additional informational sign on food storage "best practices" adjacent to the sign that displays fruit/vegetable name and price. We'll call it a "Keep Fresh" sign.
While shoppers look at what they are about to buy and how much - they may learn some interesting facts on how to keep their produce last longer.
How the "Keep fresh" Sign Works
The "Keep Fresh" sign would contain best practices in food storage for each item in the produce section. It would be displayed adjacent to the name and price tag of each item, so customers can see how to store their produce as they purchase it.
- For customers, the value-add of the sign is:
- Information they may have not known already
- Information they could use to help keep produce longer (and thereby reducing their own food waste)
- For grocery stores / markets, the value-add of the sign is:
- Potential for “Ethics Branding” (e.g. “Our store cares about our produce even after it leaves our store,” “We care about food wastage”)
- Potential for customers to make more frequent trips to the store since customers will use produce more efficiently (e.g. proper storage will increase the visibility of produce, causing the consumer to use things before they go bad)
- Since grocery stores have high repeat business – each time a customer would shop, they would see the sign, and be reminded of:
- The need to store food properly
- The desire to contribute to less food-wastage (if the sign is branded as such)
- Over-time, the reinforced images of the sign would start to develop habit-changing behaviors through:
- A memory of the sign prompting a call to action to look up “best practices” of food storage when the customer arrives at home
- The practice of storing produce properly each week, will start to become the new norm and a new habit of proper food storage will develop (hopefully with a global food conservation mindset)
A phased approach
Upon discussing the idea and receiving feedback from peers, the OpenIDEO community and doing further research – it was concluded that a how to "keep fresh" sign was the first step of what could be a full end-to-end customer experience in food spoilage prevention. A phased approach of the “evolution” of this idea is:
Each phase would build upon the previous phase, but would add time and complexity to execution. Each phase eliminates certain customer frictions from the previous phase, however we believe that each phase has value on its own!
Phase 2 - The "Keep Fresh" App
- Ability to make grocery lists within the app (with the option of voice recognition to input items). When consumers go to the grocery store they can use the app to check things off their list. The app will know what date an item is checked off and will start to track an estimated shelf life from that date.
- Image recognition capture – if a consumer goes to the store and buys something not on the list, they can just put their phone over the item (fruit/vegetable) and the app will recognize what fruit/vegetable they purchased and add it to the list (eliminating manual entry)
- A push notification, when grocery shopping is completed, to inform the customer "how to best store your items".
- Push notifications to check when produce may be going bad and how to check if it is already spoiled
PHASE 3 - THE "Keep Fresh" SMART FRIDGE / PANTRY
Based on our customer mapping for the application, and further research on technology changing how we store food, we realized that we could refine the food storage process to enhance the accuracy of when food starts to spoil.
In the future, we could incorporate technology that is currently being built and tested, for “smart fridges” and “smart pantries”, into our food storage journey.
Key features include:
- Ability for refrigerators and pantries to use image recognition software to see what you put into the fridge and when you put it.
- Sensors located in your pantry and fridge that detect when gases begin to emit from your produce – signaling when items are beginning to spoil (but still consumable)
- Push notifications that connect to the "Keep Fresh" app on your phone that remind you to use the produce before it spoils beyond the ability to safely consume it
- Recipes that can be found on the "Keep Fresh" app that are curated for you, based on what you have in your fridge/pantry.
Prototyping & Feedback
We tested a basic prototype of the sign at the local San Francisco farmer’s market to see if/how customers reacted to it (special thanks to Kelly at Groundswell Farm for letting me work alongside to test the sign!):
Feedback we heard:
- Displaying the information on storage tips was unique
- Some customers learned new things
- Some customers reacted with affirmation, already storing produce correctly
- Customers engaged with us!
How can we improve:
- Better the design of the signs, for more customer engagement
- Keep testing the signs to see if repeat customers started to change habits
- Find a way to track data to see if customers are in fact wasting less food
How we can scale the idea:
- Starting locally, collecting data and seeing what positive effects come out the implementation of a sign are key to building a business case for additional markets/stores/vendors to put an informational sign out.
- With the implementation of an app, more people can start to implement "best practices" in food storage even if their respective market/store does not provide the sign on their own.
|
<urn:uuid:6ac92a16-6136-428e-9124-bb9bc1fc53e5>
|
CC-MAIN-2017-34
|
https://challenges.openideo.com/challenge/food-waste/top-ideas/how-to-keep-fresh-sign
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886105712.28/warc/CC-MAIN-20170819182059-20170819202059-00003.warc.gz
|
en
| 0.948301 | 1,403 | 2.96875 | 3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.