text
stringlengths
263
344k
id
stringlengths
47
47
dump
stringclasses
23 values
url
stringlengths
16
862
file_path
stringlengths
125
155
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
57
81.9k
score
float64
2.52
4.78
int_score
int64
3
5
TYung engineering aspirants with more skills than money often ended up serving as clerk of the works. A clerk's on-site supervision of the construction process featured long hours, close attention to detail, confrontations with foremen and contractors, considerable responsibility without much authority, and a lack of job security. Clerks usually trained as apprentices in the building trades or surveying, and then worked their way through low-level jobs under a major contractor or in the Metropolitan Board of Works. Their duties, outlined by Bazalgette in an 1868 report, were to account for all the contract specifications, measure the contractor's work, regulate construction lines and levels, and assure the quality of materials used. The official workweek was forty-eight hours (about average for other sorts of derks), but overtime extensions were common. Clerks of works were usually hired on a temporary basis and shifted from site to site as senior engineers saw fit. Their families claimed that constant exposure to sewer gas and other pollutants led to a high rate of illness and early death. Although engineers as a whole were winning the battle for respectability, only a minority held the coveted status of professional consultant. Most were employed by railway, mining, and building companies or involved in speculative ventures, and the line between professional and journeyman was still vague. [149-50] Porter, Dale H. The Thames Embankment: Environment, Technology, and Society in Victorian London. Akron, Ohio: University of Akron Press, 1998. Last modified 1999
<urn:uuid:db0f6bb5-b222-4ea2-b30e-74a2c2f8c7b4>
CC-MAIN-2017-30
http://www.victorianweb.org/technology/porter3.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549429548.55/warc/CC-MAIN-20170727222533-20170728002533-00027.warc.gz
en
0.975022
311
2.90625
3
Stress Inoculation Therapy (SIT) STRESS INOCULATION THERAPY: A type of CBT that trains people to cope with anxiety & stressful situations more effectively by learning skills to 'inoculate' themselves against the damaging effects of future stressors. - Meichenbaum: Believed that even though we can't change the causes of our stress we can change the way we think about it. - Negative thinking may lead to negative outcomes, i.e. anxiety and depression but postive thinking leads to positive attitudes & feelings - This reduces stress and helps us cope in the future - Meichenbaum came up with the stress inoculation therapy (SIT) which is a type of Cognitive Behavioural Therapy (CBT) developed for dealing with stress - It is different from other stress methods because Meichembaum said that an individual should develop a form of coping before the problem comes Stress Inoculation Therapy (SIT) continued STRESS INOCULATION THERAPY (SIT) - Meichenbaum came up with 3 main phases to this process: Conceptualisation phase, Skills acquisition phase (and rehearsal) and finally Application phase (and follow-through) - Conceptualisation phase: involves the trainer and patient exploring ways in which stressful situations are thought about ---> typically people react to stress by being using negative statements like "I can't do this" making the problem worse - Skills acquisition phase: attempts to replace negative self-statements with incompatible positive coping statements ---> learned and then practised, e.g. "Relax, you're in control" - Application phase: patients given the opportunities to apply the newly learned coping skills in different situations which become increasingly stressful. Can be done through imagery usage, modelling and role playing. Patients can train others and booster sessions are avaliable later on Evaluation of SIT EVALUATION: STRENGTHS OF SIT - Meichenbaum: compared SIT with systematic de-sensitisation for snake phobia. Both forms of therapy reduced the phobia but SIT was more effective because it helped clients deal with a second, untreated phobia --> shows that SIT can inoculate against future stressful situations as well as offering help in coping with current problems - Sheehy and Horan: examined the effects of SIT on anxiety, stress and academic performance of 1st year law students. Participants received 4 weekly sessions of SIT, each lasting 90 minutes. Results showed that all participants who received SIT displayed low levels of anxiety & stress over time. - SIT improved their academic rank Preparation for future stressors - Major advantage of method = doesn't deal with current stressors but also gives the clients the skills & confidence to cope in the future. Focus on skills acquisition = good --> long-lasting effectiveness Evaluation of SIT continued EVALUATION: LIMITATIONS OF SIT Time-consuming & needs high motivation - SIT takes a lot of time, effort, money and motivation. But Meichenbaum has shown the effectiveness of brief periods of therapy, e.g. victims of sexual assault/preparing patients for surgery - Effectiveness may be due to some elemnts of the training rather than all of it, meaning that the range of activities could be reduced without losing much of the effectiveness. E.g. it may be as effective to just learn to talk more postively and relax more HARDINESS TRAINING: The aim of hardiness training is to increase self-confidence and sense of control so that individuals can successfully navigate change in their lives - Maddi: Founded the Hardiness Institute in California - Focusing: Client taught how to recognise the biological signs of stress, i.e. muscle tension and increased heart rate & also to identify the sources of this stress - Reliving stress encounters: Client relives stress encounters and is helped to analyse these situations and their response to them --> gives them an insight into current coping strategies and how they might be more effective than they thought - Self-improvement: Insights gained can now be used to move forward and learn new techniques of dealing with stress - Client is taught to focus on seeing stressors as challenging that they can control instead of seeing it as a problem they must give in to
<urn:uuid:5b43ca03-9738-4bbd-8440-110d9142c1a8>
CC-MAIN-2017-43
https://getrevising.co.uk/revision-cards/psychological_methods_of_stress_management_as
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187825497.18/warc/CC-MAIN-20171023001732-20171023021732-00432.warc.gz
en
0.943023
904
3.0625
3
A new report from the European Environment Agency (EEA) says that Europe’s transport system urgently needs to adapt to the threat of flooding and severe weather brought about by climate change. Recently we published an article on the flood threats to airports around the world. Overflowing rivers, poor drainage, increased rainfall and sea level rises threaten some of the world’s busiest airports. But rail, road and shipping all face disruption from floods and storms. According to the EEA report, there have been several high profile examples of transport infrastructure in Europe failing to deal with floods over the last few years. European Transport System and Floods In the June 2013 floods in Germany, flooding damaged the main railway bridge across the River Elbe in Germany, used by all trains to and from Berlin via Hannover, including high-speed services from Berlin to Frankfurt, Cologne and Dusseldorf. During the winter floods in February 2014 in the UK, the coastal section of the south–west main line railway was destroyed in Dawlish, Devon, in the south west of England. The railway in the south-west of the UK was cut off from the rest of the network for two months. The recent storm in UK, labelled a “weather bomb” by some media outlets, led to the suspension of many ferry services in Scotland and Northern Ireland as a result of waves over 10 metres high. The report says that rises in sea-levels is also an increasing threat to harbours and other transport infrastructure and services at the coast. Aside from storms and floods, transport networks are likely to face increasing threats from rising temperatures. Unusually high temperatures and extended heatwaves can increase the problems of rail buckling, pavement deterioration and passenger discomfort. Costs to the Economy Transport is vital to the smooth running of the economy. When movement of people, goods or services is hindered, the indirect costs to the economy can be many times higher than the direct cost of damaged transport infrastructure. Despite these risks, adapting the transport system to climate change has received relatively little attention from policymakers to date. The report says that there has been limited progress in adapting Europe’s transport system to threats brought about by climate change. Adapting transport infrastructure may be difficult because transport networks are highly complex, involving many different groups, from vehicle manufacturers to infrastructure managers to passengers. Another hurdle is the high cost of adapting hard transport infrastructure. The EEA say that threats from severe weather must be taken into account when transport infrastructure is renewed. One of the most cost-effective solutions is to consider adaptation measures when infrastructure is built or renewed. Moreover, those adapting can prevent ‘locking-in’ to unsustainable transport systems by taking a longer-term, systemic perspective, the EEA report says. At the European level, there are funds to help the transport system adapt to climate change. Action has also started on a project to revise European standards for infrastructure in light of climate change projections.
<urn:uuid:c83a51e0-9416-4fd8-9fab-4e77770ea1f9>
CC-MAIN-2017-34
http://floodlist.com/europe/europes-transport-systems-must-face-flood-threats
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886104560.59/warc/CC-MAIN-20170818024629-20170818044629-00505.warc.gz
en
0.96233
609
3.09375
3
In the future, quantum computers will accomplish in seconds what would take years with our best computers today. Physicists at NIST have made a significant leap towards this goal by demonstrating the first "universal" programmable quantum information processor. In other words, this is the first time anyone has developed a processor that can handle any set of instructions for more than one quantum bit or "qubit." Rapid progress when you consider that the first single-task quantum processor arrived on the scene less than a year ago. The NIST team performed 160 different processing routines on the two qubits. Although there are an infinite number of possible two-qubit programs, this set of 160 is large and diverse enough to fairly represent them, Hanneke says, making the processor "universal." The researchers used a random number generator to select the particular routines that would be executed, so all possible programs had an equal chance of selection. The random programs avoided the possibility of bias in testing the processor in the event that some programs ran better or produced more accurate outputs than others. Each program operated accurately an average of 79 percent of the time across 900 runs, each run lasting about 37 milliseconds. To evaluate the processor and the quality of its operation, NIST scientists compared the measured outputs of the programs to idealized, theoretical results. The programs did not perform easily described mathematical calculations. Rather, they involved various single-qubit "rotations" and two-qubit entanglements. As an example of a rotation, if a qubit is envisioned as a dot on a sphere at the north pole for 0, at the south pole for 1, or on the equator for a balanced superposition of 0 and 1, the dot might be rotated to a different point on the sphere, perhaps from the northern to the southern hemisphere, making it more of a 1 than a 0. Huh? Yeah, it's a bit confusing, but you can get the basic idea by checking out our Giz Explains on the subject. Just know that programing with multiple qubits is a major turning point in creating the truly "super" computers of tomorrow. [NIST and Ars Technica]
<urn:uuid:ff31e1bf-3053-444b-a570-2a8c063c42f6>
CC-MAIN-2014-15
http://gizmodo.com/5407533/scientists-make-breakthrough-with-first-programmable-quantum-processor
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223202457.0/warc/CC-MAIN-20140423032002-00504-ip-10-147-4-33.ec2.internal.warc.gz
en
0.944749
441
3.546875
4
First, China values the basic rights of members of all ethnic groups in Xinjiang. It has introduced a series of laws and regulations to protect their basic rights, including the Guideline on Women's Development in Xinjiang (2011-20), Guideline on Children's Development in Xinjiang (2011-20), Measures to Implement the Law of the People's Republic of China on the Protection of Women's Rights and Interests in Xinjiang and the Regulation on the Protection of Minors of Xinjiang. Second, both the central and Xinjiang regional governments have significantly increased investments in education, which reached 81.03 billion yuan ($11.77 billion) in 2018, a year-on-year increase of 14 percent, to promote the right to education of students from all ethnic groups. The 15-year free education plan implemented in Xinjiang makes the region the first in the country to provide free preschool, primary school, and junior and senior high school education for students. Besides, Xinjiang has received 15.96 billion yuan of aid from other provinces and introduced economic cooperation programs worth 256.05 billion yuan to attract teachers and graduates to teach students in Xinjiang. And the fact that about 65,000 senior high school and secondary vocational school students have enrolled in colleges outside of Xinjiang in the past five years shows the Chinese government is creating more opportunities for Xinjiang students in other places in the country. Third, people of all ethnic groups enjoy the right to use their mother tongue and characters or alphabet in school even though they have to study standard Chinese, as it is conducive to communication among people of different ethnic groups and promotes the development of all ethnicities. The government has also implemented regulations and policies to strictly protect the languages used by different ethnic groups. For instance, the Constitution and the Law of the People's Republic of China on the Standard Spoken and Written Chinese Language stipulates that all ethnic groups have the freedom to use and develop their own spoken and written languages. People in Xinjiang mainly use 10 languages, which are widely used in legislation, administration, education, publishing, broadcasting and television, internet and public affairs. Also, committees and research institutes for minority ethic groups' languages have been established to promote their standardization. Fourth, people in Xinjiang enjoy freedom of religion according to law, and the Xinjiang government has constantly strengthened the regulation of religious affairs, by applying the principle of protecting the legal, preventing the illegal, curbing extremism and fighting crimes. The introduction and revision of the Regulations on Religious Affairs in Xinjiang, and China's Policy and Practice to Safeguard Religious Freedom and the Fight Against Terrorism and Extremism and Human Rights Protection have further regulated the management of religious affairs and safeguarded people's freedom of religion and right to normal religious activities. Xinjiang has not seen any terrorist activity in 29 months, and tourists made more than 150 million trips to Xinjiang in 2018, up more than 40 percent year-on-year. By providing people greater security and the region greater stability, the regulations and policies have strengthened human rights in Xinjiang. China has consistently upheld development-oriented values and vowed to help build a community with a shared future for mankind to promote human rights through peace and common development. And its notable achievements in protecting human rights in Xinjiang have promoted the global human rights cause. Ignoring these facts, some countries have been trying repeatedly to interfere in China's internal matters, although their own human rights records are terrible. The double-standard will do no good to anybody, so some Western politicians should abandon their Cold War mentality, and view China's human rights record objectively, not through the prism of ideological bias. This article was originally published in China Daily.
<urn:uuid:4b1cbf24-aa9c-4421-9581-f0d38627d535>
CC-MAIN-2020-05
https://sputniknews.com/asia/201907051076151852-all-ethnic-groups-in-xinjiang-fully-enjoy-human-rights/
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251779833.86/warc/CC-MAIN-20200128153713-20200128183713-00112.warc.gz
en
0.951382
762
3.15625
3
Asymmetry of nasolabial folds is a sign of a number of neurological diseases, occurs in some dental pathologies, may be a consequence of aesthetic operations, cosmetic manipulations. The difference in the depth and angles of the folds varies from insignificant to pronounced. Pathology is often observed simultaneously with other types of facial asymmetry. The cause of the violation of the symmetry of the nasolabial folds is determined according to the survey, neurological examination, imaging and electrophysiological techniques. Treatment before diagnosis is not indicated. Why does the asymmetry of nasolabial folds appear The faces of most people are asymmetrical, which is explained by small differences in the structure of the right and left halves, the formation of facial wrinkles. The asymmetry of the nasolabial folds is especially noticeable with the habit of smiling at one corner of the mouth, twisting the mouth, expressing dissatisfaction, sleeping on one side or chewing gum on one side of the mouth. Symmetry disorders progress with age, but in the absence of other causes do not reach the degree of a noticeable cosmetic defect. Neuritis of the facial nerve The most common neurological cause of nasolabial fold asymmetry is considered to be facial neuritis (Bell’s palsy), accompanied by unilateral weakness of facial muscles. Pathology occurs primarily due to a cold or complicates the course of the following conditions: - Otitis media. Symptoms develop against the background of shooting pains in the ear. - Epidemic mumps. The appearance of asymmetry is preceded by an increase in the salivary gland, a change in the contours of the face, signs of general intoxication. - Herpes infection. The manifestation of neuritis is caused by a special form of shingles – Hunt syndrome, in which there are ear pains, skin rashes, hearing impairment, dizziness. - Facial nerve injuries. The nasolabial fold is smoothed due to a violation of the integrity of the nerve trunk or its compression by scar tissue. - Melkersson-Rosenthal syndrome. It proceeds with periodic relapses. It is complicated by neuritis in 2% of patients. Other manifestations include dense swelling of the face, a folded tongue. - Alternating syndromes. Facial paresis in Millard-Gubler syndrome is complemented by the opposite hemiparesis, in Gasperini syndrome – strabismus, hearing loss, sensitivity disorders. Brissot-Sicard syndrome is characterized not by paresis, but by a spasm of the facial muscles with a deepening of the nasolabial fold. Neuritis is diagnosed with tumors of the brain and the zone of passage of the facial nerve, for example, neurinoma of the internal auditory canal. In addition, Bell’s palsy occurs against the background of neuroinfections, which include: - Encephalitis. A group of diseases of fungal, bacterial and viral nature with intoxication syndrome, cerebral and focal symptoms. - Polio. The lesion is caused by the polio virus, observed in the stem form of the disease. - Brain abscess. Limited accumulation of pus in brain tissues, accompanied by focal symptoms, severe intoxication. - Neurosyphilis. In the early stages, focal, cerebral, and general infectious manifestations are detected. Subsequently, mental disorders, progressive dementia, stroke-like symptoms are detected. - Neurospeed. Paresis is combined with aphasia, ataxia, mnestic disorders, psychopathological manifestations. - Botulism. Develops acutely after eating canned food. Paresis and paralysis are typical, respiratory and cardiac disorders are possible. In the initial stages of neuritis, asymmetry appears due to smoothing of the nasolabial fold from the affected side. In the absence of treatment or inadequate treatment, patients develop contracture of facial muscles. In this case, the nasolabial fold on the sick side, on the contrary, becomes more pronounced. Disorders of cerebral circulation The asymmetry of the nasolabial folds is of great practical importance in the development of acute disorders of cerebral circulation. This symptom is clearly visible, it is detected at an early stage. Along with other signs (slurred speech, weakness of limbs, deviation of the tongue to the side), it allows you to quickly determine the nature of the problem, deliver the patient to a medical institution in a timely manner. It is detected with the following variants of CVA: - transient disturbance of cerebral circulation; - ischemic and hemorrhagic strokes; - migraine stroke; - subarachnoid hemorrhage. The frequency of occurrence of changes in the configuration of nasolabial folds varies with different types of CVA. The symptom is quite typical, but not pathognomonic for this pathology, it occurs due to damage to the departments responsible for the work of the facial nerve. The absence of a sign is not a reason for the exclusion of CVA. Traumatic brain injuries As in the previous case, the asymmetry of the nasolabial folds develops as a result of disruption of the brain centers that regulate the activity of the facial nerve. It can be observed with the following traumatic brain injuries: - brain injury (mainly moderate and severe); - acute compression of the brain; - diffuse axonal injury; - intracerebral, subdural, epidural hematomas. The severity of the asymmetry is significantly different. Pathology is most noticeable in acute compression, combined with “sailing cheek” and lagophthalmos. Disorders of innervation in children The symptom often accompanies various forms of dysarthria in children. Gross changes in most cases are noted in cerebral palsy. Slight asymmetry of the nasolabial folds is found in children with erased dysarthria associated with defective innervation of the tongue, lips, and soft palate. Several cranial nerves suffer, asymmetry is complemented by limited movements of the lower jaw and tongue, hypersalivation, impoverishment of facial expressions. Asymmetry of nasolabial folds can be congenital or acquired. Caused by the following reasons: - Lack of teeth. With the prolonged absence of molars and premolars on one side, the contours of the face gradually change, the nasolabial fold deepens. The bilateral absence of teeth causes deepening of the folds on both sides, the severity of the asymmetry is determined by the location of the preserved dental units. - Cross bite. There is a crossing of the dentition when the jaws are closed. The chin shifts, the lip sinks, which entails a violation of the symmetry of the lower parts of the face. - Tumors of the salivary glands. The misalignment of nasolabial folds can be determined with adenomas, lipomas, angiomas, neurinomas, sarcomas, carcinomas, formed a second time against the background of compression or germination of the facial nerve passing near the salivary gland. - TMJ diseases. Restriction of movements in the temporomandibular joint with arthrosis, ankylosis, contractures causes lateral displacement of the lower jaw, facial distortion. - Tumors of the jaws. Asymmetry becomes one of the first symptoms of a neoplasm of the upper jaw when it is located in the projection of the nasolabial fold. - Defects of the jaws. Malformations, post-traumatic deformities, defects after tuberculosis, osteomyelitis, removed tumors of the upper jaw lead to sinking of the cheek, smoothing of the nasolabial fold. In patients with mandibular defects, asymmetry is formed due to the displacement of the jaw when opening the mouth. - Injuries. With fresh fractures of the jaws, asymmetry is provoked by edema and displacement of fragments. In the long-term period, the change in the contours of the nasolabial folds is caused by improper fusion of bone fragments, excessive formation of bone callus. Consequences of aesthetic procedures and operations The lesion is more often potentiated by the introduction of fillers based on calcium hydroxylapatite, polycaprolactone, L-lactic acid polymer. These agents cause increased formation of fibrin fibers, growth of connective tissue. Some time after the procedure, uneven fibrosis or the formation of coarse fibrous strands may occur, causing asymmetry. Collagen-based fillers quickly dissolve, which necessitates the introduction of an excessive amount of the drug and possible hypercorrection of nasolabial folds. Sometimes, after the application of such fillers, granulomas and compaction zones appear. The formation of granulomas is also noted after the introduction of the patient’s own adipose tissue. In some patients, asymmetry occurs after ligature lifting of nasolabial folds, the use of various methods of surgical facelift. The reason for the changes are insufficiently careful planning or violation of the technique of intervention, non-compliance with medical recommendations by the patient, complications in the postoperative period. The reason for the change in the configuration and depth of the nasolabial folds is determined by a neurologist. According to the indications, patients are referred to dentists, maxillofacial, aesthetic surgeons. The examination program provides for the following diagnostic procedures: - Survey, inspection. The doctor finds out when and under what circumstances the symptom appeared, how it changed throughout the disease. Evaluates the speech, memory, and psycho-emotional state of the patient. Through conversation and physical examination reveals other manifestations of the disease. - Neurological examination. The specialist pays attention to the violation of symmetry of different parts of the face, the size of the pupils and eye slits. Examines eye movements, asks to inflate cheeks, show teeth, furrow eyebrows, show tongue. Determines reflexes, sensitivity, muscle tone of various areas of the face and body. - Radiography. In case of TBI, skull radiography is performed, in case of traumatic injuries and diseases of the facial skeleton, jaw images and TMJ radiographs are taken. - Echoencephalography. Performed at the initial stage of the examination. It allows you to quickly detect volumetric processes (tumors, abscesses, hematomas) that cause displacement of the median structures of the brain. - CT and MRI of the brain. They are used at the stage of clarifying the diagnosis, make it possible to clarify the nature, volume and localization of hemorrhages, neoplasms, inflammatory processes. - Electrophysiological studies. Electromyography, electroneurography, evoked potentials are prescribed to determine the localization of the pathological process, the severity of damage to the nerve trunk in facial neuritis. Assistance at the pre-hospital stage The sudden appearance of asymmetry in the nasolabial folds in combination with speech disorders, weakness of the limbs may indicate a stroke, are a reason for an immediate ambulance call. Patients with TBI also need emergency hospitalization. Before the arrival of the medical team, patients with TBI and suspected CVA should be laid in a comfortable position with their heads raised. Victims in an unconscious state should lie on their side, this facilitates breathing, prevents saliva and vomit from entering the respiratory tract. A temporary soft bandage is applied to patients with jaw fractures. Therapeutic tactics are determined by the nature of pathology: - Defeat of the facial nerve. Glucocorticoids, B vitamins, decongestants and vasodilators, UHF, paraffin applications, ultrasound, electrical stimulation, massage, physical therapy are used. The treatment of the underlying disease is carried out. With severe pain, blockades are performed. - CVA. According to the indications, resuscitation measures are carried out, symptomatic agents are prescribed. Antiplatelet agents, anticoagulants, and vasoactive drugs are used in the treatment of ischemic stroke. At the recovery stage, massage, electrical stimulation, physical therapy, correction of speech disorders are shown. - TBI. If necessary, measures are taken to maintain vital activity, mannitol is administered to prevent intracranial hypertension, antibiotics to prevent infection. - Violations of innervation. Vitamins, nootropics, physical therapy, massage, physiotherapy, exercises for the development of coordination of movements are recommended for children’s patients. - Dental problems. Dental treatment and prosthetics, installation of orthodontic devices may be required. Taking into account the peculiarities of pathology , the following surgical interventions are performed: - Facial neuritis: neurolysis, nerve suture, static or dynamic hanging of the corner of the mouth. - CVA: thrombolysis, stereotactic or open hematoma removal. - TBI: transcranial, endoscopic or stereotactic removal of intracerebral, subdural and epidural hematomas. - Dental pathologies: splinting of teeth, osteosynthesis of the upper or lower jaw, resection of the jaw with a tumor, arthroscopy, arthrocentesis and endoprosthesis of the TMJ, dental implantation, removal of neoplasia of the salivary glands. - Aesthetic problems: facelift, reconstructive surgery.
<urn:uuid:b027f635-6adb-4ed8-aaf1-6e638a66fd49>
CC-MAIN-2023-23
https://medic-journal.com/external-symptoms/asymmetry-of-nasolabial-folds/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655027.51/warc/CC-MAIN-20230608135911-20230608165911-00333.warc.gz
en
0.897789
2,865
3.125
3
Vaginal yeast infection (thrush): Overview Other infections have similar symptoms, so you want to make sure that you are treating the infection correctly. 5 million different species of fungi on Earth. Although yeast infections may spread from one sexual partner to the other, it's rare. The patches can be scraped off with a finger or blunt object and may bleed when scraped. Broad-spectrum antibiotics are most likely to throw off your body’s natural bacterial balance, such as: Your doctor examines your external genitals for signs of infection. What are the symptoms of yeast infections? Yeasts love sugars-in fact, they thrive on them. Common diaper rash in infants and toddlers is most often a superficial infection caused by the same fungi as other yeast infections in moist parts of the body. Yeast infections are more common in women with higher estrogen levels — such as pregnant women or women taking high-dose estrogen birth control pills or estrogen hormone therapy. But broad-spectrum antibiotics change all that. Ask a baker about yeast, and you'll hear stories of the miracles it creates in the oven-airy pastries and crusty breads that can make you swoon. Sepsis kills and disables millions and requires early suspicion and treatment for survival. - Some advocate using a blow dryer on warm to briefly blow dry the vulva after bathing to insure adequate drying. - Additionally, failing to promptly change out of wet swimsuits or exercise clothing fosters an environment perfect for yeast growth. - While search results show many are looking online for yeast infection home remedies, experts say the data doesn’t support the hope and hype. - This article touches on the most common causes. - What is a yeast infection? Antifungal medicines get rid of yeast infections in most people. Along the same lines, I tell people to hold off on good fermented foods (not something all doctors agree on)—i. One small study showed that among women who believed they had a yeast infection, only 1 out of 3 of them actually had one, and women who had been diagnosed in the past by a healthcare provider weren’t any better at correctly making the diagnosis (7). Following the directions on the box, begin using your antifungal at the same time you start your antibiotics to prevent a yeast infection. Medscape log in, other conditions that cause abnormal menstrual bleeding, or bleeding in women who are not ovulating regularly also can be the cause of intermenstrual bleeding. Any infection in a person with diabetes poses a risk because blood sugars may be much higher or lower than normal while the body tries to fight back. Yeast is a single-celled microorganism which can live in the vagina. The dryness isn't permanent, of course, but it can be uncomfortable. Can having sex cause thrush?, sTI symptoms vary depending on the type of STI, but usually they can cause problems such as lumps, bumps, itching and discharge. The most well-known types of fungal infections include: Without enough beneficial bacteria to keep the yeast at bay, Candida yeast can multiply, causing the symptoms of a yeast infection. - If you have diabetes, keeping blood sugar levels stable is a way to avoid yeast infections. - What’s more, since yeast thrive in a warm, moist environment, clinicians also advise taking preventive steps such as wearing cotton underwear, avoiding tight-fitting clothing and not staying in damp clothing, like after a workout or swim, as well as using unscented feminine hygiene products, including pads and tampons. Is It Safe To Use Over-the-counter Medicines For Yeast Infections? She reassured me vaginal yeast infections are very common, and treating them was as easy as going to my local pharmacy to pick up MONISTAT®. Boric acid capsules used vaginally for 2 weeks are about 70% effective at curing a yeast infection, but can cause irritation (6,9). Do i have a yeast infection? They probably, for the most part, aren't doing themselves significant harm. Failure to finish an antibiotic prescription can cause something called antibiotic resistance. These medications are placed in the vagina at bedtime for 3 days. How Serious Are They? Why do you get a yeast infection from antibiotics? We apologize for any inconvenience. This most typically involves the yeast Candida albicans, explains Dr. If you can’t eat enough yogurt, or if it doesn’t seem to be working as quickly as you’d like, try supplementing with probiotics, the very bacteria found in yogurt. There may be burning, irritation, redness, and swelling of the vulva. So if you have the classic symptoms — fishy odor, abnormal discharge, and/or itching or burning — use the strip test to check your vagina's acidity level. This means that your bacterial infection might become resistant to the drug and much more difficult to cure. Anecdotally, she says some patients report improvement with probiotic therapy – whether getting more of the good bacteria in their diet, through food or drink like yogurt or kombucha-fermented green tea, taken as an oral supplement or in vaginal suppository form. The candida overgrowth problem: too much yeast? no, too little science. They can cause redness and irritation on your penis or scrotum. Yeast infections occur without sexual activity and, therefore, are not considered sexually transmitted infections (STIs). This is the only vinegar I recommend consuming while you’re treating a Candida overgrowth—its enzymes may help break down Candida. This medication may be fatal if taken orally and is used only to treat candida fungus that is resistant to the usual antifungal agents. They will study how the antibiotic affects bacteria and yeast in the vagina and other parts of the body. If You Have Further Questions, Contact Your Obstetrician–gynecologist. What is vaginitis? Yeast infections are common in women who take antibiotics. Medical studies have shown that most women misdiagnose their own yeast infections, and can miss other important vaginal infections, such as trichomonas, gardnerella, chlamydia, or gonorrhea that may produce somewhat similar symptoms. 7 surprising ways to prevent a yeast infection, boric acid vaginal suppositories may also be used with medications to treat vaginal infections. Some women with yeast infections notice an increase or change in discharge. Douching is not effective for treating yeast, and can actually increase the risk of getting STIs, HIV, pelvic inflammatory disease (PID) and other vaginal infections like bacterial vaginosis (9,11,12). 10 The study was stopped early because there was no effect seen. Fungal infections are treated with anti-fungal medications specific to the particular fungus that caused the infection. Also know what the side effects are. Treatments for vaginal infections, this may happen two months or more after the medicine is stopped. They are caused by a fungus called Candida. If you stop taking it too soon, the infection could come back. Here are 10 questions you can use to understand fungal infections, learn how you can get sick, and know what you need to do to stay healthy. Don’t wait to seek treatment! Although prevalence is difficult to determine precisely, since many women may not see a doctor about the issue, it’s estimated that more than half, and perhaps up to three-quarters, of women will have a yeast infection at some point in their lifetime. Your doctor might prescribe a one-time, single oral dose of fluconazole (Diflucan). You Have Options To Treat This Painful, Annoying – And Common – Issue. Powell said, tetracyclines, typically used to treat acne, UTIs, STIs, etc. The use of antibiotics that kill off competing bacteria increases the risk of developing thrush. STARVE THE YEAST The first key is to eliminate foods that have yeast in them and foods that yeast likes to eat. “Antibiotics can destroy bacteria that protect the vagina, or may alter the balance of bacteria present,” says Dr. But they also wipe out beneficial bacteria, including Lactobacillus. Less commonly, it may appear as red irritated areas inside the mouth. Pneumocystis jirovecii, which causes pneumocystispneumonia (PCP). This condition may occur any time when female hormone levels are low, such as during breastfeeding and after menopause. You can change habits or practices that increase your risk of vaginal yeast infection. Male yeast infection: symptoms and treatment options, to learn more about online doctor visits read our article How Do Online Doctor Visits Work? Your doctor might recommend boric acid, a capsule inserted into your vagina. How are yeast infections treated during pregnancy? There are millions of different species of fungi on Earth, but only about 300 of those are known to make people sick. If you have lots of irritation, it may sting when you pee. The medical name for a yeast infection is "candidiasis," because they’re usually caused by a type of yeast called candida. What Are The Risks Of Not Treating Or Treating A Vaginal Yeast Infection? What causes a vaginal yeast infection? You can also treat yeast infections with a single pill that you swallow (called Diflucan or Fluconazole). During the yogurt period, the women experienced 30 percent fewer yeast infections. Yeast infections of the nails are treated with an oral anti-yeast medicine. In addition to speaking with a doctor to determine if antibiotics are necessary, in some cases where taking them consistently leads to recurrent yeast infections, it may be advisable to take medication to treat or prevent yeast infections as well while on antibiotics. Also offered on campus is an American Society of Health-System Pharmacists-accredited pharmacy residency program at Shands Jacksonville. Sex may be uncomfortable or painful. Theoretically, garlic may increase the risk of bleeding and should be used under a doctor’s supervision by anyone taking a blood-thinning medication, such as warfarin (Coumadin). Candida yeast die-off symptoms: what you need to know about herxheimer reaction. You had bronchitis, went through two rounds of antibiotics and then got Candida. Read about common home remedies, and how well they work, here. He or she will also give you a physical exam. Candida esophagitis is thrush that spreads to your esophagus, the tube that takes food from your mouth to your stomach. The main symptom is increased discharge with a strong fishy odor. A sex partner of someone diagnosed with a yeast infection does not need to be treated, unless they are experiencing symptoms of a yeast infection themself (6). The vagina always has low levels of yeast, but it's suggested that broad-spectrum antibiotics — those that target a variety of different bacteria because doctors aren't positive about which might be causing an infection — will kill the good bacteria in the vagina. What are the symptoms of a yeast infection? Usually the patient will inform me of this while I’m writing the prescription for the antibiotic, asking for Diflucan “just in case. These infections occur in up to 75% of women during their reproductive years. You should also avoid alcohol if you have a yeast infection, because yeasts feed on it. IF you choose to do this, however, please make sure the yogurt you buy specifically contains lactobacillus acidophilus, as many do not. Candida, which causes candidiasis, also called thrush. Avoid wearing tight pantyhose and any pants that are tight in the crotch. A doctor's evaluation and treatment are necessary. Yeast can be passed from one individual to another, but this is not a clinical problem unless there is some other factor at work that allows the yeast to overgrow and cause an infection. Additionally, the population of C. If you have strep throat, a sinus infection, or another bacterial infection, your doctor might prescribe antibiotics to cure it. For example, to reduce the risk of developing athlete’s foot, it’s important to keep your feet clean and dry. More on Cars Do all antibiotics cause yeast infections? Antibiotics and yeast infections Share on Pinterest Antibiotics may kill beneficial bacteria in some parts of the body. Yeast infection also is known as candidiasis. Vaginal yeast infection, remember to use barrier methods, such as condoms, when having sex if you suspect either of you has a yeast infection. Histoplasma, which causes histoplasmosis when the spores enter the lungs. Sugar is food for yeast. Without that “good bacteria”, yeast can multiply rapidly and cause an infection, with its many uncomfortable symptoms (itching, burning, discharge). Sometimes thrush causes no symptoms at all. Some studies estimate that about 20 percent of asymptomatic, healthy women have Candida living in their vaginas, according to a report published in the journal The Lancet. The chart below shows the most common symptoms of a yeast infection. Also, women with suppressed immune systems (for example, those taking cortisone-related medications such as prednisone) develop vaginal yeast infections more frequently than women with normal immunity. Is there a link between ibs and candida? Many parasites are passed through the food chain to the GI tract where they reproduce. For most girls, there's no way to prevent yeast infections. Scented feminine hygiene products, bath products, and sprays can irritate the vaginal area and it is wise to avoid them. This is not recommended for women who are pregnant. And, remember, if you are prone to yeast infections and are prescribed antibiotics for a bacterial infection, you should consider requesting an antifungal medication that you could take at the same time because, Dr. People with impaired immune systems are more likely to develop sepsis with fungal infections than people with normal immune systems. There are also treatments that are not appropriate during pregnancy. So can certain medicines, including some birth control pills and steroids. A type of bacteria called Lactobacillus keeps the vagina slightly acidic, which isn’t welcoming to yeast. “Because we get back to that good bacteria that’s in the vagina, and when we douche it sort of wipes away that good bacteria that needs to be there,” Parnell says. Our state-of-the-art medical center serves an urban population of 1 million from north Florida to south Georgia. What's the difference between a yeast infection and bacterial vaginosis? Signs of infection may get worse without treatment. What is atrophic vaginitis? Women who have trichomoniasis are at an increased risk of infection with other sexually transmitted infections (STIs). 6 No difference in persistent symptoms between single and multiple doses, or different durations of multiple dose regimens have been found, but samples may have been too small to detect clinically significant effects. The yeast can then overgrow.
<urn:uuid:1955a1cc-df9b-423a-b133-3845fddeb814>
CC-MAIN-2020-29
https://seasidehalfmarathon.com/can-you-get-a-yeast-infection-from-antibiotics-what-is-bacterial-vaginosis
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655882634.5/warc/CC-MAIN-20200703153451-20200703183451-00198.warc.gz
en
0.945153
3,122
2.546875
3
When you start designing a garden for people with disabilities, you have to take into account their needs, the type of physical impairment that is keeping them from leading a normal life, and their personal tastes regarding how the garden should look. Being easily accessible is an important aspect, so we have gathered some pieces of advice that will help you create the best garden for people with disabilities. - People with disabilities will also want to take a walk in their garden, although they are might not be able to use their legs for the job. In case you are designing the garden for someone who is using a wheelchair at all times, you must make sure you design many alleys and paths that will lead them to the main points, such as the entrances or the table area. The alleys must be made of cement in order to provide a smooth journey regardless the mobility aid used. - If the person in cause is not using a wheelchair, but still has some issues walking and is sometimes using a mobility scooter, you should adapt the design of the garden to their needs. Alleys are also required, but you can also create some paths framed by handrails so the disabled person can get out of the mobility scooter and start walking along the garden. - In case you are designing a public garden or you have plenty of space on your hands, make sure you design benches along the way and several stoppage areas where the disabled person can stop, relax, and enjoy the view without getting tired or intruding the other visitors. If you are designing a personal garden, make sure you place the table and chairs at a proper distance from the entrance so the person in cause can sit down shortly after entering the garden. - Many gardens are located under the house’s level, which implies building stairs that will lead you to them, but this could also imply some risks for people with disabilities who might trip and fall down the stairs. To avoid such situations, you must install an outdoor stair lift that will transport them up and down the stairs. Similar to the indoor stair lift, the outdoor model must also be installed on the stair rail but the difference is in the powering mode and the materials used. Outdoor stair lifts are made with weatherproof components to last to the environment, can operate longer on batteries and offer stability and safety to those who want to handle the stairs on their patio or porch.
<urn:uuid:f32866ed-6386-4243-9b1c-83642bd90c95>
CC-MAIN-2017-39
http://www.gardenletter.com/2015/02/27/how-to-design-an-accessible-garden-for-people-with-disabilities/
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818688997.70/warc/CC-MAIN-20170922145724-20170922165724-00690.warc.gz
en
0.96909
481
2.625
3
A Glossary of Light Bulb Terms and Definitions – An Enlightening Experience Light bulbs themselves may be quite simple in operation, but there is such a range of options out there that it can get quite bewildering at times. How many times have you found yourself staring up at the shelves in a store holding your shopping list (you probably wrote down ‘more light bulbs’ or similar) and not knowing which ones to pick. Choice is a good thing, but when a sales assistant asks (a bit too loudly for your liking) if they can help, and you mumble, “I just want a light bulb,” it can also be embarrassing. So here is a helpful glossary of many of the common terms that you’ve seen in the lighting department but been a bit unsure about: - A-Lamps (Also known as General Service Bulbs) The standard incandescent bulb for most common uses. - Accent Lighting A type of lighting used to accentuate a given locality or object in the home or office, for example; a doorway or a painting. - ADA Brackets Fixtures for mounting on a wall that extend no more than 4 inches from the wall to comply with the Americans with Disabilities Act. Fixtures that can be adjusted or aimed for accent and directional lighting requirements. - Alternating-Current (AC) An electric current reversing its direction regularly at certain intervals. - Ambient Lighting Also can be referred to as general lighting. This is the all around, uniform illumination that lights up every home. The unit used to measure electric current. The amount of current sent through one ohm by one volt. It comes from the name of M.Ampere who was a French scientist. The American National Standards Institute. This is a consumer organization that develops many voluntary guidelines and standards for the electrical and other industry. An opening or gap to allow the free passage of light. - Architectural Lighting A broad generic term for built-in light fixtures, such as valance lighting, or recessed lighting in ceilings, or in bookshelves or ledges high or low on walls. An inert gas from the Earth’s atmosphere that is used inside most light bulbs. - Average Rated Life The time expressed in hours that half of a given number of test lamps burnt out in. The lifespan of individual bulbs purchased will almost always be slightly above or below this time. (Also expressed as Lamp Life). A part of a fixture used to prevent glare by absorbing or blocking any excess light. A electrical apparatus used to provide current for the start up of HID and fluorescent lamps & light bulbs, and then control the current to regulate their operation. That part of the light bulb which is placed inside the socket. (Usually these are screw in and made of either aluminum or brass). For HID bulbs they might be ceramic. For compact fluorescent they mostly have either two or four pins. The two pin versions are designed for preheat and have an internal starter. The four pin types (which are dimmable) do not and need a ballast to be used. Slimline fluorescents have only one pin at either end of the lamp. (See also Fluorescent and HID). - Beam Spread A measure of the angle of the light beam from a lamp with a reflector. This might be narrow spot, narrow flood, or wide flood. A metallic alloy made of zinc and copper. Fixtures can be made of this. The commonly used term for an incandescent lamp. - Candela or Candlepower The unit of measurement of luminous intensity in any given direction from a source of light. - Candlepower Distribution A representation of how light is spread from a source, whether evenly throughout a curve, or not. A part of a light fixture that conceals an outlet box. A term sometimes used to refer to recessed down lights. An electron emitting electrode. Used in fluorescent lighting systems. (See Fluorescent). A selection of fixtures that are jointly operated when using dimmers. Typically they would be of similar function or type. This can also be known as a zone. The branch of optical science that deals with color and the perception of color. The chosen wiring route for an electric current to traverse. - Circuit Breaker A safety device that can be fitted to prevent too much current from flowing. An attachment that secures a shade to a light bulb. - Color Rendering Index (CRI) This is very important as it tells you how your light will render, or portray, the accurate color of everything it illuminates. The CRI runs from 1 (for Low Pressure Sodium lamps) to 100 (for the Sun). A CRI somewhere in the 80’s will give you good and true color portrayal. - Compact Fluorescent Lamp (CFL) These are small long living fluorescent lights that can be used as an alternative to incandescent discount light bulbs. They can also be known as BIAX lamps. (See Fluorescent). - CCT (Correlated Color Temperature) This specifies the color that a given bulb itself appears when it is in use. (Whether it looks ‘hot’ ‘warm’ or ‘cold’). It is compared in degrees Kelvin (K), to a source of reference at a given temperature. (Not the color of the glass). - Crystal Glass Very fine quality glass like that used in chandeliers. The flow of electricity, measured in amps. - Cut-off Angle The angle (measured from the vertical) whereat anything used to shield the light from direct view cuts-off that light source from the viewer. - Damp Location A UL listing for fixtures that are used in locations where there is moisture present. (see UL) - Decorative Bulbs (D) Attractive looking light bulbs that come in many assorted and unusual shapes. - Dichroic Coating A film that is used on reflector lamps to prevent as much heat being reflected as light. The thermal energy is instead transmitted through to behind allowing the light beam not to be so hot. - Diffuse Lighting Light which has been scattered or dispersed so as not to appear to be emanating wholly from its’ source. Anything used for diffusing light. This might be a paper or fabric shade or etched or Opal (milky looking) glass on the light bulb. A control switch that reduces the illumination of a lamp by lessening the electricity available to it. These may be incremental, or full range with rotary or slide controls. - Direct Current (DC) An electric current that flows continuously in only one direction without any alterations. - Direct Lighting A form of lighting where a minimum of 90% of the light produced is cast in a downwards direction. - Directional Lighting - Disability Glare A glare from a too bright light that results in a high discomfort that affects visibility levels considerably. - Discomfort Glare This glare is a lesser form of the above. Discomfort is produced but visibility is still kept to an acceptable level. Small recessed lights in a ceiling. A guide to the efficiency of a light bulb expressed in lumens per watt (LPW). The higher the number, the more light given out for energy used. A gauge of how an electrical device works over time, usually shown as kwh (kilowatt hours). Which is 1000 watts used for 1 hour. - Etched Glass Glass (on a light bulb) treated with acid for the purpose of diffusion. (See diffusion). - Extended Life Lamp Light bulb with an average rated life of 2500+ hours. (See Average Rated Life). An adjustable light that is fitted into the ceiling. A wire coil made of tungsten that produces light when heated by an electric current. - Fill Gas The gas inside the light bulb. For incandescent lamps this is usually argon or krypton with sometimes added nitrogen. Halogen is used in addition to this in halogen bulbs. The very wide light dispersal from a reflector bulb. FL can be used as an abbreviation. A lighting system which works by creating electric arcs inside a gas rich tube to produce ultraviolet light, then converting this to visible flourescent light by its passage through a layer of phosphor on the inside of the glass. This is the common measurement of luminance (level of light) used in the United States. One foot-candle is one lumen on one square-foot of a surface. (See also Lumen and Lux). - Frosted Glass Glass used for light bulbs that has been roughened or treated with a spray on coating (See IF), for the purpose of diffusing light. (See Diffusion). - Full Spectrum Light bulbs with this designation accurately imitate natural light and are thought by some to be beneficial to health by reducing stress, depression and headaches, amongst other things. Globular shaped light bulbs. - General Lighting See Ambient Lighting. - Gimbal Lighting The adjustable ring holding a PAR or MR bulb in place. (See also MR and PAR). An excessively bright light that causes discomfort and vision impairment. May be direct or indirect (from a reflection). A glossy finish is a shiny, reflective finish. - Halogen Lamp A type of bulb which contains halogen gases, usually iodine, or chlorine, bromine, or fluorine, to extend the life of the tungsten filament through a recycling system know as the halogen cycle. Halogen light bulbs are also made of quartz glass, or ’hard glass’ because they have to be hotter to work properly. Halogen bulbs are brighter and produce more lumens per watt (LPW). (See Efficacy and Quartz Lamp). A lamp shade with a plastic lining. - Heat Ratings A safety guide for surface mounted fixtures, which limits the wattage of the bulb to be used. - HID (High Intensity Discharge) Lamps A group of type of lamps that include mercury vapor, high pressure sodium, low pressure sodium and metal halide. They are long lasting and energy efficient. - IC Fixture Insulated Ceiling Fixture. A fixture that can be directly placed in thermal insulation. This stands for Inside Frosted. (See Frosted Glass). - In-Ground Up Lights These are outdoor lights recessed in the ground (for the garden path, or patio, etc.) They can be low-voltage or solar powered. - Incandescent Lamp A light bulb which uses incandescence to produce light. (See below). Light produced by the electrical heating of a material. - Indirect Lighting A form of lighting where a minimum of 90% of emitted light is cast upwards. - Infrared (IR) An invisible radiation with very long wavelengths which is produced by light bulbs as well as visible radiation (light). - Instant Start A fluorescent light which can power up immediately without the need to pre-heat the cathodes or use starters. (See Cathodes, Fluorescent and Starters). - Integrated Dimming System An advanced dimmer that remembers pre-set lighting ‘themes’, and can re-create them by the use of a button on a wall box or remote control. - IR Lamp An IR lamp is an Infrared Reflecting Halogen Lamp. A special type of halogen lamp which directs excess IR energy on the filament, so as to heat it further without extra use of power. (See also Infrared and filament). Plug in attachment found in low voltage light fixtures. (See Low Voltage Fixtures). An advanced unit of temperature used by scientists. (See CCT). A gas sometimes used in premium bulbs instead of argon. A clear or colored coat that prevents metal from tarnish and rust. - Lamp (Electric) A source of man-made or artificial light. The whole of the light bulb. - Lamp Holder A socket to secure the lamp and connect it to an electric current. - Lamp Life See Average Rated Life. - LCL (Light Center Length) The length, usually in inches, from a given point on the base of a lamp to its light center. - Light Distribution The pattern of light in a room. - Light Fixture A complete lighting unit containing a lamp, reflector, housing and a connection, a socket and baffles. Also known as a Luminaire. - LLF (Light Loss Factor) A factor used to calculate the illumination after a certain time according to whatever conditions are present. (Like varying temperature, fluctuating voltage, atmospherics, dust buildup, and maintenance procedure, if any). This used to be referred to as the Maintenance Factor. - Line Voltage In the U.S.A, this should be 120 volts. (See Volts). A screen of numerous baffles. (See Baffles). - Low Voltage Lamps that use 6, 12, or 24 volts instead of 120, and require a transformer connected between them and the standard 120 volt power source. - Lumens (LM) The actual quantity of light produced by a lamp or other source. From the Latin word ’lumen’ which means ’light’. Correctly known as luminous flux. (See Luminous Flux). A complete light fixture. (See Light Fixture). - Luminaire Efficiency This is a ratio of light produced by the luminaire as a whole, including whatever shades, baffles and or reflectors that may be fitted, compared to the light produced by the fitted lamp or bulb alone. Reflected light sent in a given direction. The observation of brightness expressed in the measuring unit of light intensity, candelas. (See Candela, Candlepower). - Luminance Contrast How a given object stands out (or not) from its background due to available light. - Luminance Ratio A comparison between two or more areas within the viewer’s field of vision. - Luminous Flux The amount of light flowing over a given area in a period of time. (See Lumens). The international standard unit for measuring light levels (as oppose to Foot-Candle in the U.S.A). It is one lumen per square meter. (See Lumens and Foot-Candle). A low reflecting dull finish to reduce brightness and glare. - Mogul Base A lamp base used for high-wattage bulbs. (See Watts). - MOL (Maximum Overall Length) The entire length of a lamp usually in inches (for the U.S.A). Can be in centimeters. - MR Lamp A Multi-facet Reflector lamp. - National Electric Code (NEC) A standard for safe and proper wiring and electrical appliances to be used as a guide for local jurisdictions in disputes. - NEMA (National Electrical Manufacturers Association) An organization for promoting harmony and agreement within the industry, and deciding on the designation of new products. A metal used in the production of full spectrum bulbs. (See Full Spectrum). - Neon Lamp Culturally famous high voltage, low pressure bulbs used in outdoor signage. - Nominal Watts The power rating of light bulbs and other lamps. (See Watts). - Opal Glass A milky looking glass used to diffuse light. (See Diffuse Lighting). Any material through which light does not penetrate. - Over Voltage It will shorten the operating life of a bulb to use it above its proper voltage. (See Volts). - PAR Lamps This stands for Parabolic Aluminized Reflector. These are extremely bright bulbs that can be used for the accurate controlling of light levels. Since the parabola shaped reflector is excellent at reflecting and focusing all the light produced in a beam in a chosen direction. - Pendant Lights These are suspended from the ceiling and regularly seen in many homes. - Power Factor This is a measure of efficiency of electrical devices. This refracts light, or bends it. A light beam enters through one of the prisms’ multiple, see-through straight sides, and leaves via another. (Light is sent off in different directions). It is not a reflector because the light changes direction inside the prism, rather than bouncing off the outside surface. (See Reflector). - Quality Of Lighting Simply; a term used for matching the type of lamps chosen for the task required. - Quartz Lamp A halogen bulb with glass made of quartz. This should never be touched with bare skin as an oily mark will appear that will cause the structure to weaken. If touched, clean the glass with an alcohol such as methylated spirits or a turpentine. - R Lamp or Reflector Lamps Reflector lamp are made of ‘soft’ glass as oppose to the ‘hard’ glass of a PAR lamp. This distinction concerns the glass structure and ability to deal with higher temperatures. They also differ in usually having their reflector source as a aluminum or silvery coating on the bulb itself. - Rated Lamp Life See Average Rated Life. - Recessed Fixture A light fixture mounted into the ceiling. - Recessed Lighting Here the fixture is installed above the ceiling, with only an opening for the light visible from below. The amount of light in percentage reflected by a given surface. (The rest of the light is either absorbed by the material, or transmitted through it). A device for reflecting light in a chosen direction from its surface. Depending on the brightness desired, these may be either diffuse, glossy, matte, or specular. (See Diffused Lighting, Gloss, Matte and Specular). A maintenance project either at work or home to clean all light fixtures and replace bulbs with new ones. - Rough Service Lamp Incandescent light bulbs with extra support to the filament for better withstanding shaking and vibrations. - Satin Finish A lightly textured ‘brushed’ finish to metal or glass. The fan or shell shaped pattern on some fixtures. Pre-set settings for dimmers. (See Dimmer). A wall mounted fixture in the shape of a candelabra. Popular for use with decorative bulbs as they are exposed (to allow them to be admired). An opaque or translucent covering to lessen the light from a bulb when viewed from certain angles, and redirect it to others. (See Opaque and Translucent). - Shade Measurement Always should be in this order: - Across at the top - Across at the bottom - The slanting of the sides - The height A group term for diffusers, baffles, louvers and shades. - Soft Shade (Also known as a Lined Shade) A lamp shade that has a liner of a fabric. - Solid Brass These are fixtures that are made of brass only, not a simulation or brass-plate. Some confusion exists here as the fixtures are probably hollow and not solid at all! The word ‘solid’ applies only to the brass itself. This comes from an old expression which referred to something as being ‘solid’, when it was honest and trustworthy. So in this case, meaning; it is what it says it is - brass! - SPD (Spectral Power Distribution) An illustration of how the power output of a given bulb changes in each different wavelength across the spectrum. A finish to a surface that is highly polished and mirror-like. The name of the cross frame by the top of a lamp shade. - Spot Lamp A reflectorized bulb with a narrow beam of light emitted. An electrical mechanism used together with a ballast for starting a fluorescent or HID lamp. (See Ballast, Fluorescent and HID). - Step Lights These are lights recessed into a wall along a pathway or into stairs on a stairwell. - Surface Mounted This is another term for ceiling mounted light fixtures. - Swing Arm A horizontal arm for the multiple positioning of a wall mounted or table light. - Switch Leg This is how the wiring between a light fixture and its control or dimmer switch is known. A lamp that is tubular in shape. - Task Lighting Lighting that is designed for a specific task. Examples of this are security lighting, which has to be extra bright and reliable, and sometimes comes with an infrared sensor or motion detector attached. Or another example being a reading light, which should be bright enough to prevent eyestrain but not too glary, to avoid the user from having to squint. - Three-Way Lamp An incandescent light bulb with two filaments inside it for three levels of light from a sequential switch. The smaller filament is used for the low light level, the larger for the medium setting, and both are used simultaneously when the switch is set to high. - Three-Way Switch Sometimes also known as a ‘three-pole switch’ this is a system that operates a light fixture from two separate locations. This could be the top and bottom of a stairway for example, or next to the bed and the door in the bedroom. The angle of inclination in an upwards direction of a source of light from the horizontal level starting position. A gadget that will turn lights on or off at pre-set times. Either through its own clock or a countdown. - Tinted Glass Glass that had a color (any color) pigment added during manufacture rather than being applied after the glass had cooled from its molten state. A common control switch for electric lamps. A lamp for the floor that sends almost all its emitted light upwards. (See Indirect Lighting). A translucent material allows some light that hits it to pass through and emerge from the other side. The passage of light through an object. A transparent material allows all light that strikes it to pass through it and emerge from the other side. - Types (Of Bulb) The designation used for bulbs is that of a letter or letters to indicate the shape, and then a number to show the size. In the United States, flashlight, halogen & LED light bulbs are measured in eighths of an inch around their maximum diameter. - UL (Underwriters Laboratory) A wholly independent organization that apply strict tests to electrical manufacturer’s products. When and if lightbulbs pass the Underwriters Laboratory tests, the makers can designate them as ‘UL Listed’. A fluorescent lamp with two ends that is shaped like the letter ‘u’. - Utility Lighting Often partly made from plastic these are basic and durable unadorned fixtures for everyday usage. A wall bracket fixture shaped liked an urn for sending light upwards. - Valance Lighting This is where the fixture or fixtures are installed behind a horizontal shielding running along a wall or above a window. It is a form of Architectural Lighting. - Vanity Lighting A light fixture installed above or alongside a mirror. - Vapor-Tight Luminaire A light fixture that is resistant to entry by vapors or gases to its chamber. Often this applies to water vapor that as steam might cause problems in a kitchen or bathroom. The unit of electrical force or pressure that creates current. Named after Alessandro Volta, an Italian scientist who invented the electric battery in 1800. - Voltage Drop This is the difference in current along a circuit caused by the resistance of the lights and the wire. When using low voltage wiring it can cause lights at the far end from the transformer to be noticeably dimmer than the ones nearer. - Wall Brackets Light fixtures designed for vertical surfaces such as walls. They are also referred to as Wall Mount Fixtures. - Wall Grazing A method of lighting where light is aimed down a wall to produce dramatic shadowing. - Wall Lighting A lighting method where light is ‘bounced’ off walls to give the appearance of more spacious rooms. - Wall Washing A technique used to bathe a wall in light to give it added emphasis. A unit of electrical power. Named after James Watt, a British inventor. 746 watts = 1 horsepower. The amount of electricity used by a light bulb to produce light. A rare gas used in specialized lamps. - Yard Lighting A general term used for outdoor and garden light fixtures. About The Author Matt Jacks is a successful freelance writer providing tips and advice for consumers purchasing halogen light bulbs, comparing or reviewing remote control cars, boats & planes and even helpdesk software & applications. His numerous articles offer moneysaving tips and valuable insight on typically confusing topics. This "Glossary of Light Bulb Terms & Definitions" reprinted with permission. Other Interesting Topics [ View Entire Index ] [ Reprint Rights ]
<urn:uuid:66446586-3e06-46ba-9990-feec7ff39c4b>
CC-MAIN-2020-05
http://www.glossary-of-terms.net/glossary-of-light-bulb-terms.html
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250589861.0/warc/CC-MAIN-20200117152059-20200117180059-00432.warc.gz
en
0.887362
5,255
3.375
3
The arts and culture present some serious funding challenges for society and represent some serious inequities. - The top of the pyramids, like the directors of museums or the owners of galleries, make much more money than those starting out. - Many people cannot afford to work in the arts because of the low salaries. - Therefore, arts and culture often draw from upper middle class and upper-class sectors for staffing. - Donors give more money than the average customer. - However, donors and other upper middle class/ upper-class disproportionately consume the arts. - Arts and Culture are often too expensive for the middle class and lower middle class. - Institutions serve more people than they employ, meaning that while there isn’t large “profit, there is increased engagement. So what? Well, it means that when arts and culture have inequity in their means of production, the public will question our costs. Art, for example, is a commodity. People know that works can cost millions of dollar. When museums suggest they need money to support their operations, this doesn’t compute. Arts and culture are extremely costly to produce. Think of all of the people who need to paint sets for Broadway show, and this is not work that can be automated. And, while people might enjoy that show, they can’t see how the cost of painting that set goes into the ticket fee. They just see that they will be spending $200 of their hard earned money for a 2-hour show, for example. You don’t realize that your ticket is not even close to covering that set painter; the corporate donations are part of this. Obscuring the cost of production means that consumers don’t understand the importance of their contributions. The inequity on the production side also has major problems. Arts and culture of all kinds have expanded drastically. The required contribution from consumers has increased to cover these costs. But, finally, the perceived value of these experiences has not necessarily increased. There is more and more competition for the same consumers, just as they are less likely to go to events. In other words, organizations now cost more while often getting fewer consumers. Arts and Culture need to make more to cover their higher costs but people are not necessarily more likely to spend it. Finally, the opt-in fee to start using arts and culture prices out people, meaning that a whole generation of potential future clients might miss out. The inequities in our funding of arts and culture can have massive ramifications on the number of future consumers potentially rotting the future of the sector. This post follows up a post about the Metropolitan Museum of Art’s new mandatory ticket fees: Nickles, Dimes, and Tough Times : The Relationship between Visitors, Revenue, and Value
<urn:uuid:c9b047a5-bd38-4ac7-bd12-5cfb3fcd31f5>
CC-MAIN-2020-16
https://brilliantideastudio.com/art/inequity-in-the-arts-culture-economy-equation/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370506477.26/warc/CC-MAIN-20200401223807-20200402013807-00253.warc.gz
en
0.960822
574
3.015625
3
The community was decimated during the holocaust: of 8,000 Jews still living in Shavl in 1941, only 500 survived. Only a handful of Jews remain there today. Much information can be found on the website www.holocaustinthebaltics.com, administered by Dovid Katz. In relation to Shavl, Dr. Katz recorded the following videos in Yiddish: Levi Shalit wrote a Shavl Yizkor Book in Yiddish, recounting experiences in Shavl during the holocaust period. The original Yiddish text is downloadable from the National Yiddish Book Center. A translation of the table of contents and index in English may be found here. - Video 1: Holocaust survivor Shmuel Shrage, 85, a native of Shavl (Šiauliai) recalls the precise moment of liberation in July 1944 when a Soviet officer told him that he would never again have to worry about being a Jew. Interview recorded in Yiddish in Kaunas, 18 Nov 2010. - Video 2: Shmuel Shrage, 85, a native of Shavl (Šiauliai) explains how farm-owner Jurgis Šniuolis saved his life (more than once) in 1941. Interview recorded in Yiddish in Kaunas, 18 Nov 2010. This page is hosted at no cost to the public by JewishGen, Inc., a non-profit corporation. If you feel there is a benefit to you in accessing this site, your JewishGen-erosity is appreciated. If you have comments about this page, contact Compiled by Assaf Copyright ©2010 Assaf Urieli. This material may not be used for commercial purposes.
<urn:uuid:2d3a459f-e66c-43f4-8795-5707d5f6cd11>
CC-MAIN-2014-41
http://kehilalinks.jewishgen.org/shavli/shavl_holocaust.htm
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1412037663460.43/warc/CC-MAIN-20140930004103-00355-ip-10-234-18-248.ec2.internal.warc.gz
en
0.897315
389
2.546875
3
How did we get the word "stereotype" for a false conception, particularly of another culture or race? The Stereotype was originally, literally, a device that allowed citizens of the nineteenth-century to see in 3-D. To quote http://www.ajmorris.com/roots/photo/types.php "Also called stereo cards when mounted on cardboard (as the vast majority are) these images are easily recognized by having two nearly identical images mounted side by side. When looked at through a stereo viewer they give a three-dimensional image. Most popular from 1854 to 1938, they were produced in vast quantities, and many are of historical interest." In other words they present the image the left eye would see to the left eye, and the image the right eye would see to the right eye. (If you can cross your eyes far enough to overlap the two side-by-side images and still focus, you can do without the machine - experienced intelligence agency photo interpreters can do this, and it's not all that difficult to learn.) Almost as soon as there were photos, there were stereo photos. In fact, "prior to the perfection and announcement of the photographic process, the British scientist, Sir Charles Wheatstone developed some simple stereographic sketches and a rather complicated 3D viewer" according to a good summary of the history of stereo photography at http://www.oz3d.info/sscc/library/history/history.htm Sir David Brewster created the first commercial stereoscopes but the cheaper design you'll probably find in an antique store was invented by none other than Oliver Wendell Holmes, of medical fame, in 1864. Scenes of other parts of the world were very popular, and scenes of exotic natives in their most exotic ceremonial costumes were extremely popular. But supply and demand are the life-blood of Capitalism, and the populace just didn't want to see how the rest of the world really was, nearly as much as they wanted to see something very exotic. So the manufacturers, the mass image media of their day, supplied that demand. Natives were seen only in the most strange costumes and poses because that's what sold. Inhabitants of other parts of the world doing ordinary things or anything that didn't fit European misconceptions didn't sell and so, soon weren't seen at all. Fakery eventually came into the equation too, in order to feed the public demand, their love of novelty, capacity for projection, and their prejudices. Quite literally, the developed world saw what it wanted to see. The resultant process of image creation became extreme enough, and silly enough, to become a byword meaning "false image" or misconception. It's worth revisiting this history, now that the internet is as popular as stereoscopes once were - since internet sites can easily become rigid little bubble worlds themselves. Who knows, if the thesis of little bubble worlds is true, maybe one day a couple of centuries from now, they'll say "that's an internet" to mean "that's a stereotype". (Although with luck, diverse sites such as Everything2.com will prevent that from happening.) One further curious historical note. Stereo photography went in and out of fashion. Presumably, it wasn't popular in mid-century Germany. While the Allies used sequential reconnaissance photos (usually from two cameras shooting at slightly different angles) to produce a stereo effect to great profit in photo interpretation (V-2 rockets stuck out like a sore thumb), the Germans never used this technique in WWII, and they seem never to have thought of it. Of course, there are a number of these rather suspicious lacunae in German WW II technology and strategy, enough to make one suspicious that many apparently loyal German subjects didn't put forward all the helpful ideas they could have. For example, during WW II the great physicist Heisenberg accepted some suspiciously bad logic of others that appeared to show that atomic weapons would be extremely difficult to build, requiring immense quantities of uranium and plutonium, and low-balled funding requests for the German Atomic Bomb project. I grant that it's impossible to know whether such a silence is why the German armed forces never used stereo photography (stupidity is also commonplace), and that it's awfully hard to discern Heisenberg's conscious and unconscious motivations at this historical remove, and given just how dangerous keeping diaries was in Hitler's Germany. Many scientific minds voted with their feet or were expelled from Germany before the war, of course, accounting for many of these lapses; but it's impossible to entirely dismiss the suspicion that a great many others quite silently sabotaged the German war effort simply by keeping their mouths shut, or by not being as enthusiastically dedicated to Nazi success as they might have been. So if it's true that Nazi stereotypes helped defeat Germany by chasing away talent, perhaps the lack of Stereotypes (of the photographic kind) in their parlors just may have helped doom them as well. It's at least amusing to think so. First posted June 25, 2004
<urn:uuid:40180cda-e334-4299-ab74-e4713d4ea9cf>
CC-MAIN-2017-30
https://everything2.com/title/stereotype
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424645.77/warc/CC-MAIN-20170724002355-20170724022355-00006.warc.gz
en
0.97744
1,040
3.40625
3
Educating Deaf Students Publication Year: 2004 Published by: Gallaudet University Press Title Page, Copyright Download PDF (55.1 KB) Education of Deaf Children at the Turn of the 21st Century Download PDF (678.7 KB) Compared with other fields of educational endeavor, the education of deaf chlldren has a very long history indeed. It is generally agreed that the first public school for children with different learning needs was a school for deaf students-established in Paris by the Abbé de l'Epée in 1755 (Moores, 2001). Even before the establishment of that school, however, the field of ... PART ONE: Contemporary Issues for All Learners Reviewing the Past, Assessing the Present,and Projecting the Future Download PDF (74.4 KB) Deaf education, centuries after its recorded beginning in Europe, is still struggling to find answers to many of the challenges facing deaf persons. Even so, this same system of education gave me the opportunities to learn English as a second language, acquire speech in English, obtain a quality education, and develop into a self-sufficient, productive, and independent ... Developing Deaf Children or Deaf Children Developing? Download PDF (87.5 KB) This chapter discusses the education of deaf children, with education defined not just in terms of teachers and classrooms, but including all of the implicit and explicit teaching and learning that goes on throughout a child’s life. In this sense, the chapter simultaneously is about the development ... Educating Deaf Students With Multiple Disabilities Download PDF (75.4 KB) During the long history of the International Congress on Education of the Deaf (ICED), only occasionally has attention been given to the deaf child with multiple disabilities. The reason for this is unclear to me, but it might be that the education of these children is not fundamentally different from that of deaf children without additional handicaps. For the hearing impaired ... Is It Time to Look Beyond Teachers ’Signing Behavior? Download PDF (83.0 KB) Since the 1970s, classrooms and programs for deaf students have evolved from exclusive reliance on oral/auditory methods to using combined methods of speech and English-based signing and bilingual methods that include the use of a natural sign language, such as American Sign Language (ASL). In spite of all of these changes, we have not seen much change in the ... Good Practice in Deaf Education Download PDF (76.3 KB) In 1999, the Royal National Institute for the Deaf (RNID) in Britain commissioned and funded a “Review of Good Practice in Deaf Education.” The review provides a survey of reported good practice in educating deaf children based on more than 600 questionnaire responses and fieldwork in 15 schools, colleges, and advisory services for deaf pupils. These organizations ... PART TWO: The Early Years Earlier Identification for Earlier Intervention Download PDF (499.0 KB) All of the states and territories of the United States have made significant progress in the implementation of Universal Newborn Hearing Screening (UNHS) programs. UNHS programs have also been, or are being, established in Europe, Australia, Asia, Africa, and South America. As these programs develop, there are significant and rapid changes in the ... Issues Around Supporting Families With Young Deaf Children Download PDF (61.9 KB) This chapter is based on research that was commissioned and funded by the Royal National Institute for Deaf People (RNID) and undertaken by researchers from the Universities of Birmingham and Manchester in the United Kingdom. The research is described elsewhere in this volume (see Gregory, Andrews, McCracken, Powers, & Watson) and reported in detail in Powers, ... The Power of Hearing, Habilitation,and the Home Download PDF (77.9 KB) There are two main changes that have impacted upon the education of children who are deaf and hard of hearing: the advent of the Universal Newborn Infant Hearing Screening Program and incredible advances in technological devices. Yoshinaga-Itano, et al. (1996) studied two groups of infants with hearing loss. They compared babies who were fitted with hearing aids before and ... Cochlear Implantation and Children: Influencing Education Choices? Download PDF (64.5 KB) Cochlear implantation in young children is a complex, time-consuming process that involves a major surgical procedure, which has given the opportunity for profoundly deaf children to process spoken language via hearing in a way that was not previously possible. McCormick (1998) viewed it as the greatest technological advance in the management of deaf children ... Future Directions in Early Education for Deaf Children and Their Families Download PDF (66.0 KB) These are the words of a 21-year-old deaf college student, David, excerpted from an interview about his life experiences growing up in a hearing family. At the time of this student’s early childhood experiences in the 1970s, a child-centered, teacher as expert/parents as recipients of information, and deafness as disability approach was pervasive in early education programs. ... PART THREE: The School Years Bridging Literacy: Integrating ASL and English Into the Language Arts Download PDF (82.4 KB) The concept of bilingual education has long been in Deaf consciousness. In 1886, George Wing, a Deaf teacher at the Minnesota School for the Deaf, was strong in his assertions that “the sign language” (as American Sign Language [ASL] was called during that time) was a necessary predecessor to the teaching and learning of written language, thereby establishing a ... Educating Deaf Children in Two Languages Download PDF (77.3 KB) This chapter describes a study of literacy learning in Deaf children who acquire American Sign Language (ASL) as a first language and learn to read and write English as a second language.1 Literacy can be defined beyond the basic tasks of reading and writing to include the strong connection between language learning and the individual’s thinking, identity, and ... Making Inclusion Work: Improving Educational OutcOlnes for Deaf and Hard of Hearing Students in the Regular Classroom Download PDF (74.4 KB) Over the past half century, the education of Deaf and hard of hard of hearings students has been greatly impacted by integration and inclusion initiatives, part of an international movement that has seen the gradual placement of students with identified educational needs (i.e., disabilities, sensory impairments, learning difficulties, behavior problems, and emotional ... Co-Enrollment: An Effective Answer to the Mainstream Debacle Download PDF (91.2 KB) Students, parents, teachers, and administrators in 22 co-enrollment classroom sites have witnessed the shattering of “the plate glass curtain of deafness” (Golladay, 1991) over the past 16 years. This shattering has moved the educational challenges and opportunities for deaf and hard of hearing students from the confining self-contained classroom and/or the nondirect ... Supporting Children with Cochlear Implants in the Educational Environment Download PDF (59.2 KB) Children who use cochlear implants are sometimes depicted as “made normally hearing” by the media, considered by others to be neither deaf nor hearing (Chute & Nevins, 2003), or seen as children who are deaf and use a more effective sensory device than an acoustic hearing aid. At the commencement of the 21st century, it seems highly appropriate to review what it ... PART FOUR: Contemporary Issues in Postsecondary Education Providing Access for Deaf Students in a Technical University in the United States: Perspectives of Students and Instructors Download PDF (82.0 KB) As a member college of the Rochester Institute of Technology (RIT), the National Technical Institute for the Deaf (NTID) is in a unique position to identify the efficacy of inclusive education. More than 400 deaf students who are enrolled in the other six colleges of RIT receive support services through NTID. Thus, RIT/NTID and its faculty have a wealth of experience ... Educating Deaf Students in Sign Linguistics Download PDF (77.9 KB) In a deaf magazine (Journal for Dove) in the year 1895, a Norwegian deaf writer proposed a “sign school.” He meant that deaf people might cultivate and develop their signing just as hearing people learned more about their written and spoken language. Today, at last, sign language is a topic of study at the University of Oslo. Three groups of students have passed exams in ... Slipping Through the Cracks? The Support Needs of Hard of Hearing Students in a University Program Download PDF (45.7 KB) Although educational provisions for deaf students in higher education are not as well established as are services at other levels of education in Australia, recent years have seen increasing acceptance of the idea that access should be provided for deaf students at this level.1 Australian governments have sent a clear message to higher education institutions that they must ... Download PDF (26.1 KB) Page Count: 242 Illustrations: 2 tables, 4 figures Publication Year: 2004
<urn:uuid:f211eff9-a5f5-4383-bf62-60d7a0fc5b5f>
CC-MAIN-2014-23
http://muse.jhu.edu/books/9781563683084
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997883468.51/warc/CC-MAIN-20140722025803-00210-ip-10-33-131-23.ec2.internal.warc.gz
en
0.938978
1,923
3.09375
3
This concise and easy-to-use field guide provides a wealth of information packed into 240 pages. Grouped by habitat, the color-coded sections describe the wooded wetland, wetland prairie, marshy shore-land, and submerged and floating communities. Included are more than 330 species, with intriguing notes on endangered plants, wildlife uses, associated species, and natural history. Includes over 300 exceptional color photographs, 74 line drawings that provide further detail, and hints for distinguishing easily confused species. Includes appendices describing whether species are endemic, native, introduced, marginal, or transitional. With glossary and index to both common and botanical names.
<urn:uuid:ccafde73-0d7e-406c-92a7-671cd00cc0cc>
CC-MAIN-2020-05
https://www.paracay.com/wetland-plants-of-oregon-and-washington-2nd-ed/
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250591234.15/warc/CC-MAIN-20200117205732-20200117233732-00280.warc.gz
en
0.884184
132
3.375
3
Men's Issues Self Regulation Therapy (SRT) For centuries, men were defined as warriors who were responsible for providing and protecting their families, tribes and communities. Those restraining limitations that were imposed by cultural traditions limited men as far as emotions are concerned.However, modern psychology has rediscovered the differences between men and women and the role of male emotions, relationship dynamics and behaviour in men's issues. The expectations and demands of our new modern world result in increasing stress levels, often related to relationships and work. Symptoms of male issues that are commonly seen in therapists' offices, include stress, anger, addiction, depression, relationship issues, and work adjustment issues. A large percentage of men feel that they are inadequate in relationships and at work, and this leads to negative emotional states, shame and fear. These emotions usually stem from negative messages at home and at work. It is harder than ever for men to fulfill their traditional roles, as being the sole bread winner is unrealistic in today's economy, and more men are staying home while women are sole breadwinners. Traditional roles, particularly in men who were predominantly raised by women, dictate that men are not supposed to show certain emotions. Men who feel the need for nurturance, feel ashamed at their display of emotion and vulnerability. If he experienced childhood abuse, or was raised by an overprotective mother, he may become excessively angry or hurt at perceived criticism, complaints or insults. Men often perceive asking for help as shameful, or a sign of weakness. Therapy for men's issues was designed for men to vocally express their problems, in individual counselling, couples counselling or group therapy settings. If you are looking for a counsellor or psychologist who offers men's issues to help with your stress and related issues you may want to search the directory to find a professional whose approach will suit you best. Self Regulation Therapy (SRT) Self Regulation Therapy (SRT) offers a mind-body approach to reducing excess nervous activation. With roots in neurobiology, SRT reflects the human's built-in automatic response to threat or novelty. The nervous system changes as the result of negative events, but Self Regulation Therapy (SRT) helps the nervous system to integrate these events and balance the nervous system. Self Regulation Therapy (SRT) takes place in a contained environment where the client feels safe. It helps to develop new neural pathways to help the client to develop flexibility and to better handle daily stresses and challenges. Self Regulation Therapy (SRT) can help the symptoms of dysregulation, including mood disorders, personality disorders, PTSD, stress and anxiety disorders, and physical issues such as chronic pain, asthma, migraines and insomnia. If you are looking for a therapist who offers Self Regulation Therapy (SRT), please browse our list of practitioners below..
<urn:uuid:d3af4fa0-08dc-46bf-8681-2982a51a4109>
CC-MAIN-2020-34
https://counsellingbc.com/counsellors/approach/self-regulation-therapy-srt-246/practice/mens-issues-143
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738913.60/warc/CC-MAIN-20200812171125-20200812201125-00267.warc.gz
en
0.970354
574
2.921875
3
Peace Corps Library writes "BBC reports that about 800 pages of the earliest surviving Christian Bible, the 1,600-year-old Codex Sinaiticus manuscript, have been recovered and put on the Internet. 'The Codex Sinaiticus is one of the world's greatest written treasures,' says Dr. Scot McKendrick, head of Western manuscripts at the British Library. 'This 1,600-year-old manuscript offers a window into the development of early Christianity and first-hand evidence of how the text of the Bible was transmitted from generation to generation.' The New Testament of the Codex Sinaiticus appears in Koine Greek, the original vernacular language, and the Old Testament in the version, known as the Septuagint, that was adopted by early Greek-speaking Christians. For 1,500 years, the Codex Sinaiticus lay undisturbed in a Sinai monastery until it was found in 1844 and split between Egypt, Russia, Germany, and Britain. It is thought to have survived because the desert air was ideal for preservation and because the monastery, on a Christian island in a Muslim sea, remained untouched, its walls unconquered. The British Library is marking the online launch of the manuscript with an exhibition which includes a range of historic items and artifacts linked to the document. 'The availability of the virtual manuscript for study by scholars around the world creates opportunities for collaborative research that would not have been possible just a few years ago.'"
<urn:uuid:67af2974-6b8c-462a-8fcb-829290d08ea1>
CC-MAIN-2014-10
http://tech.slashdot.org/story/09/07/07/1715210/british-library-puts-oldest-surviving-bible-online?sdsrc=prev
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394011159105/warc/CC-MAIN-20140305091919-00039-ip-10-183-142-35.ec2.internal.warc.gz
en
0.956819
294
3.3125
3
“[Stephen] “Thaler, the president and chief executive of Imagination Engines Inc. in Maryland Heights [Missouri]… The real inventor is a computer program called a Creativity Machine. What Thaler has created is essentially “Thomas Edison in a box,” said Rusty Miller, a government contractor at General Dynamics and one of Thaler’s chief cheerleaders. “His first patent was for a Device for the Autonomous Generation of Useful Information,” the official name of the Creativity Machine, Miller said. “His second patent was for the Self-Training Neural Network Object. Patent Number Two was invented by Patent Number One. Think about that. Patent Number Two was invented by Patent Number One!” Supporters say the technology is the best simulation of what goes on in human brains, and the first truly thinking machine. Others say it is something far more sinister - the beginning of “Terminator” technology, in which self-aware machines could take over the world.’
<urn:uuid:c325ac04-e846-48cd-aa2a-78fb515372b1>
CC-MAIN-2017-34
http://bikebob.org/ComputerCreativityMachine.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886105455.37/warc/CC-MAIN-20170819143637-20170819163637-00123.warc.gz
en
0.943601
221
2.734375
3
In 1914, the early modernism critic Clive Bell wrote, The representative component in a work of art may or may non be harmful, ever it is irrelevant. Or, to appreciate a work of art we need conveying with us nil from life, no cognition of its thoughts and personal businesss, no acquaintance with its elements. Discuss the adequateness of this claim with mention to Expressionist, Fauve and Cubist art. On review of Claude Monet ‘s celebrated 1872 picture, ‘Impression – Dawn ‘ , one may detect its capable composing of visible radiation and atmosphere, the ocular effects of mist, fume and cloudy contemplations in the soiled H2O of a seaport ; it is the record of a fugitive minute, a glance of the Sun as it rises through the quickly fade outing mists of morning which, merely seconds subsequently, would hold risen further and changed the whole atmosphere of the scene. Monet, Degas, Pissarro and their creative person coevalss, slightly sardonically named after this renowned innovator piece, exhibited eight times before the 1890s and yet by the bend of the 20th century the Impressionists were being challenged by one of the cardinal elements of their graphics. The morning seaport, lily ponds, danseuses and elusive suburban landscapes that consumed the Impressionist canvas captured a world with which there was a turning clime offive de sieclemalaise. The representative component in a work of art that Clive Bell describes in his 1914 seminal treatise,Art, was cluttered with the irrelevances of literature, scientific discipline and engineering that detracted from the kernel of art as a important signifier composed of strictly aesthetic, instead than realistic, signifiers. Discontentment with the thought that art simply replicated life this new strain of modern creative person approached the easel in order to show instead than depict, to make instead than copy, and therefore the Impressionists dissolved into a fugitive minute of art history. Western art had become preoccupied with an art that embraced the realistic rendition of landscapes and figures, where creative persons worked in forepart of their topics, in the unfastened air instead than in a studio, taking full advantage of the proficient progresss being made in the industry of creative persons ‘ pigments to capture a true feeling of the effects of visible radiation and coloring material. In the early 1900s on the outskirts of Paris Henri Matisse besides preferred to travel out into the streets and do painted ‘impressions ‘ of the streets, the Bridgess, the river, in fact the same subjects that the Impressionists had chosen in the1860s and 1870s. The pictures Matisse made of Notre Dame, nevertheless, had small to make with the atmospheric effects sought by Monet and Pissarro. Rather, he exploited a new reading of world where wide countries of pigment and the reorganization of infinite were cardinal to an of import artistic motion that the Fauvists were shortly to open up: I did non desire to follow a conventional manner of picture ; I wanted to revolutionize wonts and modern-day life – to emancipate nature, to liberate it from the authorization of old theories and classicalism I was filled neither with green-eyed monster or hatred, but I felt a enormous impulse to animate a new universe seen through my ain eyes, a universe which was wholly mine. Henri Matisse, Andr & A ; eacute ; Derain and Maurice Vlaminck evolved this new universe through a manner of painting that earned them the name Les Fauves ( wild animals ) , and, in the brief period between 1904 and 1907 their freedom of look through the usage of pure colorss, additive design and overdone position secured a measure off from the representative component upheld by the Impressionists before them. Matisse ‘s 1904 picture ‘Luxe, Calme et Volupt & A ; eacute ; ‘ can about be viewed as a Fauvist pronunciamento, a disclosure to his circle of coevalss who admired his subjective usage of coloring material, the manner the bare figures had been simplified to the point of ornament and the placing of tree, boat and shoreline to unite the image surface into a individual plane. Through his art Matisse questioned an full heritage of landscape tradition and lead others to oppugn it excessively ; in forepart of this image I understood all the new rules ; Impressionism lost its appeal for me as I contemplated this miracle of imaginativeness produced by pulling and coloring materials. Later work of the Fauves demonstrates freedom from the realistic representation that Bell upheld as irrelevant, but remained concerned with utilizing coloring material for its ain interest. Derain sought a manner out of the deadlock of his fellow Fauvists, experimenting with concepts of a more solid and touchable world within the being of the picture, and it was Apollinaire who remarked that the Cubist aesthetic was foremost elaborated in the head of Andr & A ; eacute ; Derain. To convey nil from life, no cognition of its thoughts and personal businesss and no acquaintance with its elements spilled from a diaphanous impression in Fauvist art into a apparent purpose with creative persons with Cubist understandings. In a blazing renunciation of a tradition that dated back to at least the 14th century, a tradition that equated good picture with retroflexing observed light and signifier, creative persons such as Georges Braque and Pablo Picasso were utilizing their canvases to make a ocular experience of the universe. Art conveyances us from the universe of adult male ‘s activity to a universe of aesthetic ecstasy. For a minute we are shut off from human involvements ; our expectancies and memories are arrested ; we are lifted above the watercourse of life. The pure mathematician rapt in his surveies knows a province of head which I take to be similar, if non indistinguishable. See Picasso ‘s 1909 picture ‘Houses on the Hill, Horta d’Ebro ‘ and one can clearly see how this illustration of daring art can transport its witness to a universe of aesthetic ecstasy. Every seeable surface is broken down into comparatively distinct, comparatively level surfaces to organize a series of aspects, a assortment of quasi-geometric forms, while multiple point of views render the houses from a figure of coincident point of views. See besides Braque ‘s 1909 ‘Castle at la Roche-Guyon ‘ where the cardinal block of edifices in the landscape hovers and spills across both the foreground and background of the piece doing them into accessible, haptic entities with which the witness can prosecute. Braque and Picasso transformed painted landscape into a designed Cubist infinite, manipulated signifiers through artistic look and imaginativeness that bore small resemblance to the surface ( shallow ) world of being. Cubist image infinite has little regard for perspectival infinite, in which solid objects merely of all time recede from the witness, and where infinite itself is ever empty or hollow. In his contemplations on the Avant-garde Clement Greenberg notes that if art and literature are imitation, so what we have here is the imitation of copying. Art as an look, or imitation of imitating, as opposed to a mere representation of life, is a impression that has arguably been exploited legion times during the history of art, during periods of crisis and turbulence, but expressionist art became a preoccupation of its ain during the early portion of the Twentieth Century. The Expressionist art of Wassily Kandinsky nowadayss simplified landscapes and experiments in abstract art, where glowing colorss and ardent brushstrokes convey the work ‘s intending straight to the witness. In his 1911 ‘Improvisation No. 23 ‘ Kandinsky seems to delight in the additive motion of the lines, forms and infinites and literally improvises a design that is about musical in its hypnotic concepts of quasi-staves, points and mock-clefs. In an art-consciousness manner beyond the familiar surfaces of life and the creative persons who sought to animate them, Kandinsky painted in order to link the ocular affair of art to the interior life of adult male. A similar Expressionist phenomenon was germinating in the work of Franz Marc who besides moved off from object-orientated art to an art of lyrical look, haunted by animate beings which represented the lost artlessness of adult male. For these creative persons unnaturalistic colorss, deigned infinites, the beat of nature, symbolic and brooding images constituted the chase for look: Picasso, Braque, Mondrian, Mir & A ; oacute ; , Kandinsky, Brancusi, even Klee, Matisse and C & A ; eacute ; zanne derive their main inspiration from the medium they work in. The exhilaration of their art seems to lie in its pure preoccupation with the innovation and agreement of infinites, surfaces, forms and colorss, etc. , to the exclusion of whatever is non needfully implicated in these factors. Clive Bell ‘s axiom, that art requires nil from life, no cognition of its thoughts and personal businesss, no acquaintance with its elements is clearly demonstrated in the art motions that evolved out of the representative art at the bend of the Twentieth Century. Reactionary against the Impressionistic rendition of objects the Fauvists, Cubists and Expressionists exploited a impression that art should abandon the representative component that had held art in a headlock for centuries in favor of look and heightened attending to the media or stuffs with which they created their art. While novelists explored the job of novel authorship in plants such asUlyssesandThe Forgers, composers drew attending to the really concepts of their music and ocular creative persons made the redolent map of coloring material and organize their recurrent ‘subject affair. ‘ Bell identifies possibly one of the most of import premises in Avant-Garde art and arguably the subsequent advancement of art through the Twentieth Century owes a great debt to the critic who mused: What I have to state is this: the rapt philosopher, and he who contemplates a work of art, populate a universe with an intense and curious significance of its ain ; that significance is unrelated to the significance of life. In this universe the emotions of life find no topographic point. It is a universe with emotions of its ain. Bell, Clive:Art, Oxford University Press, Great Britain, 1987 Gaiger, Jason and Wood, Paul ( ed. ) :Art of theTwentieth Century: A Reader, Open University, Great Britain, 2003 Greenberg, Clement:The Collected Essays andCriticism: Percepts and Judgments 1939 – 1944,The University of ChicagoPress, USA, 1988 Stangos, Nikos ( ed. ) :Concepts of Modern Art: Fauvism to Postmodernism, Thames and Hudson, Singapore, 1997 Wood, Paul and Edwards, Steven ( erectile dysfunction ) :Art of theAvant-Gardes, Open University, USA, 2004
<urn:uuid:d7b877d0-f56d-4486-992d-3b8082da9e7f>
CC-MAIN-2020-16
https://yellowbellyponderosa.org/arts-essays-expressionist-fauve-cubist-art/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371880945.85/warc/CC-MAIN-20200409220932-20200410011432-00278.warc.gz
en
0.942224
2,330
3.046875
3
Quality of surface water The quality of surface water in the Netherlands has improved significantly in recent years. But due to an increase in the population and the intensification of industry and agriculture, the pressure on the quality of surface water is increasing. In order to be able to safely recreate in and around surface water, good surface water quality is important for public health and safety. Blue-green algae in particular can cause serious problems in the summer season. Groundwater is an important source for the preparation of our drinking water. The quality of the groundwater is threatened by contamination with chemical substances. We used to apply these products a lot more in the past, so we are now stuck with a legacy from history. It is likely that in the future it will no longer be possible to prepare sufficient drinking water from groundwater. Surface water will have to be used more and more often. Water quality sensor instruments It is clear that good and accurate sensor instruments are necessary to evaluate different interests and monitor the quality of our water. RMA Hydromet has several water quality sensors in the product range. We seek the most suitable and appropriate solution together with our customers. In addition to a wide range of sensors, we use multiple means of communication and data collection systems.
<urn:uuid:f134be1d-2f42-4218-9ebc-412a59daccf6>
CC-MAIN-2023-23
https://rmahydromet.nl/en/water-quality/water-quality
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646076.50/warc/CC-MAIN-20230530163210-20230530193210-00450.warc.gz
en
0.95031
255
2.84375
3
We, humans, have disrupted the environment so badly in the last couple of decades that our existence here on Earth is under imminent threat of extinction. We may survive a century or two on non-renewable resources, but eventually, it is the renewable resources that are going to save the day. The solar cell plates were first introduced to provide a clean, reliable, and efficient resource to supplant the non-renewable kinds upon which a great part of the world is dependent. They are mushrooming at a great pace. However, there is a catch. They are not cost-effective, and allows for little flexibility. So scientists around the world have been working on a better replacement, and in Perovskite they have found the answer. Perovskite has proven to be more efficient than silicon made solar cells. In Korea, this 21st of October, scientists have succeeded in producing Perovskite solar Cell which has 20.4 percent in photoelectric efficiency. These cells cost much less in production, and can be easily mounted on the wall. Plus, they are translucent and lightweight, so they have pretty good aesthetics. Korea couldn’t find a more eco-friendly and flexible source of power generation than this, as it lacks physical space and has many high-rise buildings to allow for easy installation of perovskite layers. Perovskite solar cells are purely man-made material and are quite in their making. Some of them are highly unstable, and research efforts have been put on to improve their longevity. In principle, they are tuned to harness energy from different parts of the solar spectrum, and therefore stacked in layers one above the other. They can work in a combination of solar cells, and do really improve their performance. A number of their applications includes providing energy to drones for long flights, cheap electricity source and much more. The most daunting hurdle in making this technology ubiquitous is that it degrades when comes in contact with moisture. It severely lacks in durability when compared to solar panels. A part of it is due to the fact that the scientists are more focused sn the chemistry of the material for now, then to worries like real-world usage and effective lifetime. The US-based research team headed by Professor Michael McGehee has also claimed that the technology is worthwhile to be introduced in the market, as it vastly surpasses contemporary silicon chips in terms of cost and efficiency. Professor Michael McGehee said, “It became clear to me in the 90’s that preventing global climate change would be the most important challenge that scientists and engineers would have to face. There are many ways people can contribute, but since I love working with materials, I decided that I would dedicate my career to advancing solar cell technology to the point where it can generate at least 10%, if not 50% of the energy that the world population needs.” He added,” I have worked on many different types of solar cells and have tried many things that didn’t work before being in the right place at the right time with a strong group of students and collaborators to make these extraordinary tandem solar cells with perovskite semiconductors.”
<urn:uuid:161d9c7f-12bd-40ec-a50f-283af0e7862a>
CC-MAIN-2020-05
https://sixtimesanhour.com/perovskite-solar-cells-set-to-revolutionize-renewable-energy-industry/
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251705142.94/warc/CC-MAIN-20200127174507-20200127204507-00459.warc.gz
en
0.970544
654
3.578125
4
We can quit oil but only if we actually want to Energy security, air quality, climate change and soaring costs mean the era of fossil fuels may be coming to an end. Electrification powered by clean, renewable energy is now technologically possible. But the transition will only happen if we stop burning hydrocarbons and start scaling battery supply. Above: As a result of the EU-UK Trade and Cooperation Agreement, the manufacture of batteries and of cathode materials will need to move from Asia to the UK or EU by 2027 to benefit from tariff free trade. This presents a real opportunity to establish battery manufacturing and its supply chain in the UK in the next five years. The Midlands has risen to this challenge, and as well as having vehicle manufacturers investing heavily in electrified vehicle models and their associated R&D, the region is home to the national battery scale-up facility at WMG, University of Warwick, adjoining industry and academia to develop and prove out new battery technologies. Credit: WMG An awful lot depends on batteries. Energy from offshore and onshore wind, solar, geothermal and tidal must be stored in large battery storage systems. Without these, there will be no successful energy transition. It’s that simple. But batteries are complicated and heavy and getting them to market is a challenge. Shipping them from China in diesel boats isn’t an option so we need to make them here in the UK. The raw materials need to be sourced responsibly and sustainably, and how much carbon must be precisely calculated. It’s pointless buying a ‘green’ EV and having to drive it 50,000 miles to offset the embedded carbon. Establishing shorter supply chains for a lower carbon footprint isn’t easy. But with challenges come opportunities and in turn solutions. Britishvolt’s 93-hectare site in Northumberland will produce low carbon, sustainable battery cells 100% manufactured using renewable energy from hydro in Norway, through the North Sea interconnector, and offshore wind. These will be some of the cleanest batteries in the world made in one of the world’s cleanest battery factories here in the UK. The North East already has the Envision factory, producing battery cells for Nissan’s Leaf and new range of EVs, and there’s the possibility of another gigaplant in Coventry. By 2027, because of the post-Brexit Rules of Origin, UK built cars must source a large proportion of their components from domestic suppliers if they are to be sold tariff-free. With batteries representing at least 50% of that componentry, the cells must be made here. No domestic battery manufacturing industry means no domestic motor industry. There’s a tearing urgency to this. There may be lots of activity but the brutal truth is the UK is behind Europe and needs as many battery factories that can be built. Professor Colin Herron of Newcastle University agrees. “We know what’s required in terms of battery plant numbers and supply chain, but the key is how we deliver what is required and in a coordinated way,” he says. “The North East of England is the home of the UK’s first gigabattery plant, soon to be joined by two more much larger plants (AESC and Britishvolt) and is responding to the challenge. The North East Battery Alliance is made up of all five regional universities, the Faraday Institution, manufacturers and the public sector. The role of NEBA is to build the supporting ecosystem covering inward investment, skills and funding.” Andy Palmer, chair of battery manufacturer Inobat and pivotal in launching the first Nissan Leaf, is concerned. “Today, almost all EV batteries are made in Asia and have some degree of Chinese content,” he explains. “The geopolitical risk of this cannot be overstated. Battery power is the new oil. Without four to six gigafactory’s in the UK, we will ultimately see OEMs deploying their new vehicle platforms away from the UK. OEMs will not source in the UK just because of UK content; to be competitive in the UK, incentives at least equal to those of the EU are required. “The deployment of new energy vehicles, investment in gigafactories and EV technology, is the UK’s last chance to reverse a 50-year decline in its global market share of vehicle manufacturing… 800,000 UK jobs depend on it.” Fast-growing consumer demand But EV sales are rising fast hitting a record 39,315 registrations in March 2022, the best performing month on record and up 79% from a year earlier. In 2015, plug-in cars represented just 1% of the new car market. This February they had hit a 17% market share in the UK and 20% in Europe. The much-questioned government deadline of 2030 for the ending of sales of new combustion cars and vans in the UK doesn’t look so impossible now. With such exponential growth, experts are predicting 50% electrification of new car sales as soon as 2025. Even sooner if supply chain constraints on raw materials and semiconductors can be eased. To cope with EV growth mandated by the government, the issue is not demand but supply. Waiting lists for some EVs are a year or more and consumers won’t wait for extended delivery times and may take the easier diesel option instead. Ian Constance, CEO of the Advanced Propulsion Centre, says we need to invest more in UK EV manufacture. “The automotive industry is adapting to a world powered by batteries. Today, we have a car industry that, pre-pandemic, was producing around 1.7 million vehicles a year, and importantly, 2.5 million internal combustion engines – many of which are exported,” he says. “To enable that transition to a world where vehicles are predominately battery-electric or hydrogen-electric, we should invest in EVs and their supply chains now – including batteries. Then the UK will not need to import them from overseas. Thousands of well-paid jobs will be gained in the areas across the UK that need them the most. All the fantastic innovation, technology and productivity remain here, and the economy will benefit.” An enviable R&D ecosystem Britishvolt, and others including AMTE, are going through crucial research and development ahead of building new plants and production-testing their manufacturing processes. Aiding these efforts is one of the strongest battery ecosystems in the world. The UK has consistently been at the leading edge of developing battery technologies, from inventing the lithium-ion battery in Oxford in the 1980s to more recently investing in the £318m Faraday Battery Challenge, the UK Battery Industrialisation Centre (UKBIC) manufacturing scale-up facility in Coventry, and the Faraday Institution with a research community of more than 450 battery experts. With the deadline for the end of ICE production approaching, speed to market for battery manufacturing is crucial. Taking advantage of the prototyping work already taking place in the UK allows Britishvolt to increase its speed to market and create batteries with longer range, shorter charging times and greater life cycles. Richard LeCain, head of cell and process development at Britishvolt, says its work at UKBIC has already provided invaluable. “Without UKBIC, we would have needed to build this prototype line ourselves, spec out all the equipment and get it all validated. Having all that in place with staff ready to engage with us has really cut down our development timelines,” he explains. Having that class-leading R&D battery ecosystem means that battery chemistries will change. The days of the one-size-fits-all proprietary battery largely produced by Asian manufacturers are coming to an end with automakers demanding bespoke batteries for performance and luxury car applications. Britishvolt has signed agreements with both Aston Martin and Lotus to create next-gen cells with greater levels of performance and energy density. These new chemistries will trickle down to make battery technology better, more powerful and ultimately cheaper. New materials like sodium-ion and silicone may change battery performance significantly and reduce the reliance on raw materials like cobalt and lithium. Recycling will also be a key enabler. James Gaade, head of programme management at the Faraday Institution, highlights the benefits of the current high levels of UK battery R&D. “Considerable gains will continue to be made in the performance of Li-ion technologies, particularly from refinements to the chemistry of the cathode (for example, Li-rich cathodes) and use of smart electrode manufacturing techniques,” he says. “Longer term, a step-change in performance will come from deployment of next-generation battery chemistries, tailored to specific applications, lithium-sulfur for aerospace and sodium-ion for low-cost mobility and static storage, solid-state for high-end automotive.” “By taking advantage of existing strengths and encouraging cross-sector collaboration, combining academic and industrial expertise, the UK is in a strong position to be at the forefront of these emerging markets,” he continues. “There is increasing awareness around the need for this to be a truly sustainable industry – taking a joined-up approach to materials selection and sourcing, design for recycling and materials recovery at end of life.” Driving down embedded carbon A potential hurdle to creating batteries on mass, domestically in Europe and the UK, is local refining capacity. Currently, European battery and electric vehicle manufacturers are reliant on products produced exclusively outside of the EU, the majority coming from Asia. The high-quality chemicals required have a limited shelf-life and are susceptible to corrosion while in transportation. Both are factors which impact quality. Luxembourg’s Livista Energy is looking to solve this by building Europe’s first standalone Lithium Conversion Facility. “The key of successful refining in Europe are the partnerships forged with producers, to have transparent supply of the best minerals, in order to achieve battery grade lithium chemical. Collaboration and strategic partnerships are key to a successful energy transition,” says co-founder Roland Getreide. Once operational, the planned initial capacity of the plant will be 30,000 tonnes a year, ramping up to 60,000 tonnes in line with the market growth. Likewise, the Phillips 66 Limited Humber Refinery is the only European producer of synthetic graphite coke, which is crucial for the anode part of the lithium-ion battery used in electric vehicles and it’s currently all exported to battery manufacturing in Asia. However, Simon Holt, manager of emerging energy (Europe), sees the fantastic potential of growing the local supply chain in the UK and Europe, where the buisness is keen to engage with local partners to support the UK government’s Green Industrial Revolution plan. “Phillips 66 Limited’s Humber Refinery currently produces enough synthetic graphite coke to meet the demand of all UK and European EVs until 2030, and we are actively looking to grow our supply beyond this baseline, along-with other Emerging Energy projects like green hydrogen and carbon capture helping to reduce our production carbon emissions at the same time,” says Holt. Longer-term, hydrogen may have a role to play but as economies buckle under soaring energy costs and rising global temperatures bring more extreme weather, creating an energy system powered by batteries that store cheap, renewable and sustainable electricity seems like a shrewd move. “Lightweighting has seen an incredible amount of attention with the rapid rise of electric vehicles prompting automotive companies to further explore additive methodologies” Above: AMTE Power is working with the UK Battery Industrialisation Centre (UKBIC) to scale up its battery cell manufacturing processes to gigafactory levels. CRedit: AMTE Power. Credit: UKBIC
<urn:uuid:d8e6aed9-d124-4ec9-99a8-2a8d34c595b5>
CC-MAIN-2023-23
https://uk-mo.com/technologies/we-can-quit-oil-but-only-if-we-actually-want-to/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224643663.27/warc/CC-MAIN-20230528083025-20230528113025-00116.warc.gz
en
0.936383
2,471
3.15625
3
Rabbit Pest Manchester, Stockport & Cheshire. PROFESSIONAL PEST CONTROL FOR MOLES In the UK, Moles are classed as a major agricultural and horticultural pest. It is estimated that Moles alone will cause millions of pounds worth of damage to agricultural and horticultural land each year. Despite this they are either protected or not regarded as pests across much of Europe. The main problem Moles cause in agriculture is that the soil that they push to the surface can contaminate silage making it unpalatable, exposed stones from their hills can cause damage to machinery, also the fresh soil from their hills can cause an invasion of weeds reducing crop yields. It is unlikely that you will see moles as they rarely come above ground, but take care if you trap a live mole as they have very sharp teeth and will bite. Instead, the first sign of a mole problem will be several mole hills or mole 'ridges' caused by tunnelling. The mole digs two types of tunnel: - Shallow tunnels just below the surface of the ground, as they search for food. These can be seen as a raised ridge in a lawn or flower bed. - Deep mole tunnels are 10 to 40cm underground. The tunnels cannot be seen, but mole hills are caused by the soil being cleared as the mole digs. Moles will line areas of tunnel with grass and leaves to create nests. Moles feed on worms but supplement them with insects and their larvae. Moles have a poor metabolism and have to eat their weight in food every day, which can deplete the soil of worms. Since moles cannot put on body fat, they have to eat throughout the winter and do not hibernate. As a result, they are most active in the autumn and early spring. Domestically and horticulturally, moles can cause damage to young plants by disturbing and exposing the root system causing them to dry out, wither and die. Mole hills also cause an invasion of weeds into areas where soil has been exposed, and their hills are often regarded as unsightly. TREATMENT & CONTROL for Rabbit in Manchester, Stockport & Cheshire. In our experience, trapping and fumigation are the only reliable solutions to a mole problem. When undertaking a trapping programme, as many traps as necessary are set in areas where Moles are showing recent activity. Do not believe the stories of repelling or killing Rabbit by putting broken glass, pepper or other substances into the tunnels – this will not work. The mole will dig around the disturbance which may even cause more damage. Protec Pest Control offers a call-out service to deal with moles and other pest problems in the home and garden. Our service is fast, effective and offers the highest level of safety for your family and pests. Prior to carrying out treatment against Moles, a thorough inspection or survey of the property, site or area should take place to decide on the extent and size of the infestation. Adjoining areas should also be included in this survey (as rodents may travel from other areas to feed or drink then return to a harbourage). PROTEC PEST CONTROL MANCHESTER will treat the Mole infestation using bait stations in safe locations. Moles are neophobic and may be reluctant to approach DIY bait stations. Our pest control operatives are experienced in identifying and locating runs and places of harbourage, and the placement and use of bait to overcome bait shyness. We also provide tamper-resistant stations, having regard to all the circumstances of the infestation, the premises, the people involved and with minimal disruption to business, where appropriate. Protec Pest control can arrange to treat your Mole problem, and offer a 24 hour 7 days week pest control service. A thorough inspection of infested premises will ascertain the extent of the infestation, since the measures necessary for control will depend on whether the infestation is established and widely distributed throughout the premises, or recently introduced and likely to be more used. To eradicate the infestation it will be necessary to treat the premises thoroughly with suitable insecticides, including the beds, other furniture and harbourages of infested rooms. A professional pest control organisation such as Protec Pest control who will treat your Mole problem in a professional manner. Protec pest control cover Manchester, Stockport and cheshire for Mole treatment. The detection and thorough treatment of all Mole hiding places is a job which requires experience in order to completely eradicate the infestation and prevent recurrence. Many people think they can treat the pest problem themselves, only to find that they make the infestation worse by purchasing household pest control treatments from DIY outlets (B&Q, Homebase, Focus DIY, Taskers, Wickes etc.) with a low dosage of insecticide. This may prove to be an expensive waste of time and money. Protec Pest Control operatives are specifically trained to identify the causes of infestations and to provide an effective solution to your pest control problem with advice to prevent any infestation recurring. Protec Commercial pest control Manchester offers a pest control services to hotels, restaurants, schools, offices, shops, factories and other commercial premises in Manchester, Stockport and Cheshire. Protec Pest Control use unmarked vehicles, to protect your privacy. Protec Pest control covers Greater Manchester, Cheshire & Stockport areas for residential, commercial, business & domestic pest control. Call us today for more information on our pest control services on 0161 448 1782.
<urn:uuid:3679c8ce-d323-4b25-9a73-486bd9dd6472>
CC-MAIN-2017-39
http://www.protecpestcontrol.co.uk/mole-pest-control.htm
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818691830.33/warc/CC-MAIN-20170925130433-20170925150433-00288.warc.gz
en
0.937772
1,148
2.703125
3
body builders talk about eating "clean" when preparing for a competition or simply as a lifestyle choice. In its broadest definition, eating clean refers to eating for maximum health benefits. This is a big departure from the common attitude towards food as a source of pleasure. can require considerable discipline-you'll have to avoid junk and processed foods, and you'll need to set aside enough time each day to cook fresh meals rather than relying on fast food. If you're considering a clean diet, here's what it will mean. If you're eating clean, you'll need to get plenty of protein. But high-fat meats such as pork and fatty steaks, as well as high-sodium bacon and ham, shouldn't be on your menu. Instead, you'll need to eat lean, healthy protein such as chicken and turkey breast, lean beef, salmon, and tuna. Turkey bacon can generally be substituted for high-fat pork bacon, and leaner cuts of steak for the richer cuts that are higher in fat. When cooking poultry, be sure to take the skin off-it's loaded with saturated fat. additives. Clean eating involves staying away from processed foods such as canned food, frozen dinners, boxed mixes, concentrated and unconcentrated fruit juices, pre-cooked meals, packaged foods, and processed meats such as bologna, hot dogs, and most luncheon meats. Processed foods usually contain excess sodium, sugar, trans fats, calories, and other unhealthy chemicals used as preservatives, sweeteners, flavor-enhancers, or dyes. Clean eating usually involves choosing foods as close to their natural states as possible-fresh fruits and vegetables as well as fresh, non-processed meats and sugar. Refined and simple sugars get absorbed in the blood very quickly, causing an insulin flood and making your energy level spike and then crash. When eating clean, body builders avoid the sugars found in jams, candy bars, cakes, pies, soda, chocolate, ice cream, pastries, and other junk foods. Some sugars are safe, however; these include the natural sugars found in most fruits, as well as those found in green vegetables, mushrooms, nuts, and carbs. Carbs might be the preferred method of getting energy to your working body-they're considered more healthy than sugar. However, some carbs can be as bad as refined sugars-they're digested quickly and cause a spike in insulin, raising and dropping your energy levels. However, some carbohydrates are digested more slowly, releasing sugars into your bloodstream at a more even rate. These won't cause heavy insulin release or an energy boost followed by a crash. carbs include white breads and rice, white pasta, potatoes, refined cereals, honey, corn and corn chips, and carrots. If you're eating clean, stick to the carbs found in nuts, beans, fruits, brown rice, yams, whole grain oats, wholemeal bread, and whole wheat fats-not "bad." Contrary to popular belief, you actually need fat in order to stay healthy. But not all fats are created equally. The idea of "good" and "bad" fats can cause confusion, so here's a relatively simple breakdown. fats include trans fats and saturated fats. Saturated fats are the types usually found in meat-the fat in steak, bacon, cheese, milk, egg yolk, and chicken skin. Trans fats are also known as "hydrogenated"-and they are made artificially by adding hydrogen to vegetable oil. These fats are often used for processed food, because they don't go bad as quickly as more natural saturated fats. Trans fats are often found in crackers, cookies, donuts, and other sweet and buttery-tasting snacks. Both of these fats can hurt your health by causing cardiovascular disease and diabetes, increasing cholesterol, and, in the case of trans fats, increasing your risk of stroke. They're also more readily stored as fat in your body than "good" fats. fats include monounsaturated and polyunsaturated fats. Monounsaturated fats are found naturally in olive oil, avocados, nuts, corn oil, grape seed oil, and canola oil. Polyunsaturated fats are usually found in sunflower, vegetable and cottonseed oils. These fats are usually considered to be best for cooking, and some types-particularly olive oil-promote cardiovascular health. You'll gain weight if you eat these fats in excess, but they are healthy when taken in moderation. You can also get your polyunsaturated fats intake from oily fishes like salmon, herring, sardine, trout and mackerel. When in doubt about fat, remember that if it's solid at room temperature, it's probably bad for you. If it's liquid at room temperature, it's Some nutritional studies have indicated that alcohol in moderation can be good for you. If you're body building, however, you're generally advised to avoid it. Alcohol packs a caloric punch, with almost twice as many calories per gram as carbs or protein. It's almost as fattening as actual fat, and it supplies no nutritional value along with its calories. Most mixed drinks contain high sugars and fats, while wine and beer contain carbs. When you consume alcohol, you'll also reduce the amount of testosterone your body produces. Since testosterone helps your body burn fat and build muscle, any reduction is bad for your body building efforts. alcohol harms you in other ways-from decreasing your motivation to damaging your liver if used in excess. Although it's usually considered a staple of the Western diet, those following a clean diet avoid it as a general rule. does involve some sacrifices; you'll need to make healthy eating choices on a consistent basis. But the rewards of eating clean are numerous. You'll look and feel better, and you'll see more consistent results with your body building routine. About the author Jean Lam is the webmaster of Body Building Resource which provides articles on weight training, nutrition and fitness, body building book and DVDs.
<urn:uuid:32f70748-c446-435f-8413-d6d396098520>
CC-MAIN-2023-40
https://www.body-building-resource.com/nutrition-latest-article9.shtml
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511717.69/warc/CC-MAIN-20231005012006-20231005042006-00587.warc.gz
en
0.951632
1,410
2.921875
3
What is Surveillance Testing? Surveillance for SARS-CoV-2 (COVID-19) includes ongoing systematic activities, including collection, analysis, and interpretation of health-related data, essential to planning, implementing, and evaluating public health practice. It is generally used to monitor for an occurrence, such as an infectious disease outbreak, in a population or community, or to characterize the occurrence once detected, such as looking at the incidence and prevalence of the occurrence. Surveillance testing is primarily used to gain information at a population level, rather than an individual level. Surveillance testing may be a random sampling of a certain percentage of a specific population to monitor for increasing or decreasing prevalence and determining the population effect from community interventions such as social distancing. An example of surveillance testing is a testing plan developed by a University or School involving testing students, teachers, administrators, from across the campus to identify asymptomatic and pre-symptomatic individuals and help avert potential outbreaks before they occur. What does Surveillance Testing look for? COVID surveillance looks for the presence of infection in groups to inform health management decisions at the population level. Ongoing surveillance is especially effective with groups in repeated contact. Corporations, schools, and other organizations may order the COVID-19 and Delta Variant Surveillance Test Kits to keep on-hand in the workplace to easily provide testing as needed. Quick and easy COVID-19 gentle nasal swab testing helps to minimize the delay for your team to get tested and receive instant results! Routine Coronavirus surveillance gives you an early warning of infection, allowing targeted measures to be taken to stop the spread. Get ahead of infection instead of waiting days for off-site processing. Delays in turnaround time allow the virus to spread undetected. Get immediate results in 10 minutes.
<urn:uuid:01184e1d-246f-43fe-85dd-98ed26c5cbc2>
CC-MAIN-2023-14
https://www.ucopiaglobal.com/what-is-surveillance-testing/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945317.85/warc/CC-MAIN-20230325064253-20230325094253-00302.warc.gz
en
0.922373
370
3.421875
3
Over a hundred years ago, in her poem, "My Country," Dorothea Mackellar wrote of a "sunburnt country" — of her vast plains, droughts, of her fire and terror. Little could she have known how prophetic these last words would become, considering the devastation that today is sweeping across her beloved Australia. Given present media and communication, few countries will have missed the videos, photos and news reports about the terrifying, unprecedented number of fires which are raging uncontrollably across our land as temperatures soar to record-breaking heights, destroying hundred of thousands of hectares of bush, millions of creatures who live here, many hundreds of homes, and tragically, also claiming people's lives. Sr. Clare Nolan, leader of the Sisters of Charity of Australia, in writing to ask her sisters to pray, described our heart-breaking reality: We have all watched, shocked, at the ferocity and the range of these dreadful fires. At this very difficult time for the entire country, we remember those who have been lost, and those who have lost family and community members. Also, we hold in our hearts those who have lost their homes and now face an uncertain New Year. As well, we mourn for the bush, which has lost untold millions of creatures, and their habitats. We have been deeply moved by our courageous firefighters, putting their lives on the line, and have been saddened that some have died in doing so. In unprecedented evacuations, families have had to flee, taking shelter in designated centers or on beaches, often not knowing if their homes have been saved. Whole townships have been burnt. In some places, water systems, electricity and telecommunications have failed. - An osprey is seen against the smoke-filled sky at sunrise near Kingscliff, New South Wales, Australia. (Bryan Ricketts) - The sphere of the rising sun off the coast of New South Wales is only partially visible amid smoke from Australia's bush fires. (Bryan Ricketts) - The setting sun is obscured by smoke from bush fires in New South Wales, Australia. (Bryan Ricketts) In fire areas, the sky is filled with an orange haze. The air is dark and full of smoke. The fires are fanned by strong, changing winds, leaving firefighters and people guessing from what direction the fires will come next, or if they will combine to become mega fires. Even long distances from the fires, the sun is clouded by an eerie smoke haze, which hangs heavily over large cities like Sydney and Canberra, but also has extended even across the Tasman Sea to New Zealand. There is no end in sight from these fires, which break out daily, nor indeed from our drought, unless we are gifted with soaking widespread rain. We have been touched by the concern of so many for those in the path of these raging, swift-moving flames. Many people have opened their homes and offered shelter to those in need. Centers have been set up for the donation of household items. Millions of dollars have been raised by charitable organizations wishing to offer assistance.\ This terrible disaster raises for us the question of when our citizens and our government are going to officially acknowledge the reality of climate change and the implications this will have for our land and our economy. The traditional people of Australia, besides knowing the importance of back-burning — a fire control measure which they practiced for thousands of years — hold that nothing is more sacred than the land on which we walk, and that the land and its waterways always have to be protected. This surely must be an imperative and top priority for us as a nation! Dorothea Mackellar, in this same poem, writes too of the beauty of this Great Southern Land and of her jewel-sea. This morning, as I was swimming, a few arms' lengths away a beautiful dolphin rose to greet me and the new dawn. In the midst of news of grim fire horrors, I was suddenly filled with joy and hope at the sight of this amazing creature. We hold our beloved land and it people in our prayers, as we ask Our Lady Help of Christians, Patroness of Australia, the Land the Holy Spirit, to protect us and to ask her son to look on us with compassion. [Karan Varker is a Sister of Charity of Australia. She has been a teacher in in Papua New Guinea, America Samoa and Australia, served as a principal in Australia and Samoa, and trained Catholic teachers in Samoa and the Solomon Islands.] Like what you're reading? Sign up for GSR e-newsletters!
<urn:uuid:24282411-6415-4472-ac82-6749f1e39939>
CC-MAIN-2020-24
https://www.globalsistersreport.org/news/australia-our-sun-burnt-country
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347428990.62/warc/CC-MAIN-20200603015534-20200603045534-00411.warc.gz
en
0.967269
940
2.765625
3
Abstract Using 172 plates taken with the 40-cm astrograph of the Sternberg Astronomical Institute (Lomonosov Moscow University) in 1976–1994 and digitized with a resolution of 2400 dpi, we discovered and studied 275 new variable stars. We present the list of our new variables with all necessary information concerning their brightness variations. As in our earlier studies, the new discoveries show a rather large number of high-amplitude Delta Scuti variables, predicting that many stars of this type remain not detected in the whole sky. We also performed automated classification of the newly discovered variable stars based on the Random Forest algorithm. The results of the automated classification were compared to traditional classification and showed that automated classification was possible even with noisy photographic data. However, further improvement of automated techniques is needed, which is especially important when considering the very large numbers of new discoveries expected from all-sky surveys. Keywords techniques: photometric It accepts original submissions from all over the world and is internationally published and distributed by IOP
<urn:uuid:e9c9133d-138c-40a8-8e20-df6ab3afd2d1>
CC-MAIN-2023-40
http://www.raa-journal.org/issues/all/2018/v18n8/special/202203/t20220323_37376.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510284.49/warc/CC-MAIN-20230927071345-20230927101345-00124.warc.gz
en
0.941881
207
2.59375
3
We don’t know what gravity is. Say that to the average person, and the answer you’ll probably get is some version of: “What are you talking about? Gravity is the force of attraction that makes things fall straight down.” But say it to a physicist, and the answer you’ll get is, “That’s right.” tap here to see other videos from our team. I know, because those are the two answers I’ve been getting for the past few years, ever since I figured out that nobody knows what gravity is, and that just about nobody knows that nobody knows what gravity is. The exception is physicists: They know that nobody knows what gravity is, because they know that they don’t know what gravity is. The assumption that they do — that we all do — is understandable. Unless you think hard about gravity, your brain does what it evolved to do: It associates gravity with your relationship to the ground beneath your feet. You don’t have to think about gravity because you know it in your bones. But if you do think about it, you can begin to realize that what you “know” is, in fact, a series of illusions. These misunderstandings make the universe more navigable — physically and psychologically — but also leave it less mysterious.
<urn:uuid:85fb937f-e203-41f7-8e74-ad75d1f97f39>
CC-MAIN-2020-29
https://nationalpost.com/opinion/everything-you-thought-you-knew-about-gravity-is-wrong
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657129257.81/warc/CC-MAIN-20200711224142-20200712014142-00142.warc.gz
en
0.963391
282
2.859375
3
A happy, well-balanced child is one who feels safe, both physically and emotionally. He/she is also valued for who he/she is, and not what he/she can do. Parents can raise their children to be happy, well-rounded individuals by surrounding them with love, happiness and encouragement, for it is the combination of all these factors that helps them feel confident about themselves and motivates them to reach their goals. “The goal as a parent is to help your child feel competent and confident, and to help her develop a sense of passion and purpose,” says Susan Stiffelman, MFT, an educational therapist and author of Parenting Without Power Struggles. Indeed, it is the education that happens before a child starts their learning journey in school that empowers a well-rounded development. Thus, if you are looking to raise a child who is well-balanced, healthy and happy, do consider these 10 tips and strategies to help you get there: 1. Celebrate and praise efforts Studies conducted by Dr Carol Dweck, a psychology professor at Stanford University and leading researcher in the fields of achievement and success, revealed that a person’s mindset has the power to influence behaviour. She suggests that parents praise their children for their hard work instead of using labels such as “smart” or “talented”. This may lead to them having a fixed mindset, and people who are categorised as such are usually reluctant to take on challenges as they believe that their achievements are a result of their innate abilities. On the other hand, people with a growth mindset are usually more willing to face challenges with hard work as they believe that learning is a life-long process. 2. Respect and acknowledge different learning styles You might find that you work best in complete silence, but that does not mean that your child should study in a noise-free environment too. Most of us tend to lean towards one or two types of learning style, so it may be worthwhile to take note how your child learns best so you can identify his/her learning style. For example, if your child is a visual learner, using flash cards and drawing charts might help him/her learn better. And for kinaesthetic learners, turning a learning concept into a fun, hands-on game could be what it takes to help them study better. 3. Keep their curiosity alive Children are born with an innate curiosity about the world around them, and it is important to leverage this trait to raise life-long learners. This should start with parents creating an intellectually safe place, where a child is free to ask any question or express his/her opinion – as long as it is respectful. Meghan McCormick, an American elementary school teacher and research associate at MDRC, a non-profit education and social policy research organisation, says that children should be encouraged to ask questions while parents should refrain from just feeding them with answers or use phrases such as “Because I said so.” For instance, when a child asks, “Why are the leaves falling off the trees?”, she suggests that parents probe further by asking, “What do you think?”. This not only provides insights into the child’s opinion, it also doubles up as a teaching opportunity and sends the message that we value the opinions of our children. 4. The power of reading It is never too early to start reading to your child! Starting a good collection of books at home and reading to pre-schoolers comes with great benefits as it encourages language development, reading skills and their future success in school. “Even if your child is still too young to understand everything you are saying, he will learn to notice the rhythms of language, which will help him build a listening vocabulary,” explains Susan M. Heim, author of It’s Twins! Parent-to-Parent Advice from Infancy Through Adolescence. In fact, a study conducted by The Institute of Education in the United Kingdom found that 5-year-olds who were read to daily by their parents were less likely to develop behavioural problems in school. Want to know your child’s reading and writing level? Find out now with a complimentary literacy assessment and learn how MindChamps’ Reading & Writing programmes could help your child! 5. Allow some free time “Play is the major way in which children learn,” says Dr David Elkind, a child development expert and author of The Power Play. He emphasises the fact that children “learn social skills through games and playing with other children”, and that it is important for parents to allow their children time for both play and academic work. “There’s this idea that education is a race, and that’s false. We want to go so quickly, but you stunt things when you go too fast,” Dr Elkind added. Although adding playtime to crammed study schedules can be tricky, there are simple ways to work around them which is worth a try, as this helps to maintain a good balance in your child’s life. Giving your child a hug helps to ease the tension and improves his/her concentration. More on this and other tips for raising a well-rounded on the next page.
<urn:uuid:e35efd2a-22e9-486a-84ba-137d477a5a25>
CC-MAIN-2017-26
https://mindchampsorg.wordpress.com/2016/09/22/10-ways-to-raise-a-well-rounded-child/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320679.64/warc/CC-MAIN-20170626050425-20170626070425-00256.warc.gz
en
0.964434
1,099
3.53125
4
ECE497 Instructor's Guide There are many choices that have to be made when designing a college course. The open source world gives you even more choices. The following takes you down the path I have chosen for my 32-bit embedded Linux course (ECE497 - 32-bit Embedded Linux, Rose-Hulman). As we travel I'll point out what decisions needed to be made, what the options were and why I made my choice. Once you see where I've taken you, it should be easier for you to pick a path for your class. There are many hardware platforms out there that support embedded Linux, how do you pick one? In my case, Texas Instruments (TI) approached me and asked if I was interested in developing materials using the BeagleBoard. I looked it over and said yes. It's not a bad choice since nearly 30,000 have bee sold and it has a very active community. The Beagle has a dual-core OMAP processor on it. One core is an ARM processor, the other a TI DSP. So one can work in both the embedded world and the DSP world with it. Bare Metal, or Linux Since the Beagle has both an ARM and a DSP, you could choose to focus on either. If you main interest is DSP and you want to approach the Beagle as traditional DSP hardware I suggest you contact Mike Marrow. He has pioneering the 'bare metal' approach to using an OMAP processor. I decided to focus on Linux running on the ARM and treat the DSP as a peripheral. I think in the future this is how most DSP hardware will be used.
<urn:uuid:94a7aaf4-e68a-4703-8a32-a0d61ad4d7aa>
CC-MAIN-2013-48
http://elinux.org/index.php?title=ECE497_Instructor's_Guide&oldid=36061
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164046334/warc/CC-MAIN-20131204133406-00096-ip-10-33-133-15.ec2.internal.warc.gz
en
0.953828
346
2.578125
3
Federal Reserve Chairman Ben Bernanke begins a series of lectures Tuesday at George Washington University in which he will give undergraduate students a tour of the Fed’s history and some of its modern dilemmas. (Watch the lecture here) Tuesday’s session, on the founding of the Fed, will take students back to the early 1900s to explain where the Fed came from. Want to get in the act? Here is your own pop quiz. Seven questions on the founding of the Fed. Place your answers in the comments section, and we’ll provide answers later in the day. And remember, using wikipedia is cheating and could be incorrect! –Name two of America’s founding fathers who feuded over the creation of a central bank? –Has the Supreme Court ever considered whether a central bank is constitutional? –What President ended the 19th century version of the Federal Reserve and what was it then called? –Who was Walter Bagehot and what was his famous dictum? –What event prompted the creation of the Federal Reserve in 1913? –Who created the Federal Reserve? –Name the only state in the U.S. which has two regional Federal Reserve Banks. Get WSJ economic analysis delivered to your inbox:
<urn:uuid:444bb28a-c04e-455a-9766-2e134739059d>
CC-MAIN-2014-23
http://blogs.wsj.com/economics/2012/03/20/pop-quiz-questions-on-the-founding-of-the-fed/
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997878430.52/warc/CC-MAIN-20140722025758-00049-ip-10-33-131-23.ec2.internal.warc.gz
en
0.958483
261
3.171875
3
Scoping study to identify potential circular economy actions, priority sectors, material flows & value chains Funded by: EU Commission (DG ENV) November 2013 to June 2014 Background, summary and aims Background, scope and aims Circular economy refers to an industrial economy that is restorative by intention; it maximises the time products and materials circulate in the economy, which are designed to be used again with minimal energy and highest quality retention, and low (or zero) impact disposal. The overall project objective is to provide information that will guide the initiation of new policy-instrument development or reform at EU level; thereby making further progress towards a Circular Economy. To deliver this, the following sub-objectives are being proposed: - Understand the influence that the socio-economic system as a whole, including the world views and practices of economic actors within particular product value-chain, has on the prospects of further moves towards a circular economy. - Improve the prioritisation of which value chains, material flows and sectors/ products to focus policy action on, by exploring the factors that have maintained the gap between theorised and actual levels of economic circularity in particular value chains, material flows and sectors/products. - Make practical and implementable policy recommendations intended to make further progress towards a Circular Economy. The overall approach is to explore the factors underling the failure of the existing system to take greater cost-effective moves towards greater economic circularity. This will include: - Taking a transition or systems-change perspective in task A2 – building on the understanding that changes by any individual economic actor (eg, towards the Circular Economy) are conditioned or facilitated by the socio-economic system they work within and the world views and practices they have adopted. - Using this transition or systems-change perspective in task C to explain the gap between theorised and actual levels of economic circularity in particular value chains, material flows and sectors/products, thereby improving the prioritisation of which value chains, material flows and sectors/ products are suitable for greater economic circularity. - Using this transition or systems-change perspective to make practical and applied policy recommendations in task B. Importance of research The closed-loop or Circular Economy model has risen to prominence since last year’s World Economic Forum (WEF), where Dame Ellen MacArthur launched the 2012 Towards a Circular Economy report. This report highlighted a $380 billion opportunity for the European Union associated with consumer durables - goods like mobile phones, washing machines, fridges and cars etc. To reach its full potential, a Circular Economy needs to undergo simultaneous changes to numerous parts of the value chain. To illustrate the benefits of taking this perspective, the EU Innova REMake project estimates that individual firms in the value chain can make resource efficiency savings of seven to 10 per cent, while co-operation along the value chain can bring resource efficiency savings of 55 to 70 per cent.
<urn:uuid:32340d27-dfa8-4fbf-b5b4-b338df7e1984>
CC-MAIN-2020-16
http://www.psi.org.uk/site/project_detail/scoping_study_to_identify_potential_circular_economy_actions_priority_secto
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371896913.98/warc/CC-MAIN-20200410110538-20200410141038-00161.warc.gz
en
0.891142
603
2.90625
3
Skip to main content Elementary (Grades K-2) Elementary (Grades 3-5) Today's News, Tomorrow's Lesson Gun Violence in the United States Impeachment and Democracy: Free Resources and Lesson Plans Top 2019 Free Lessons: The Best of Share My Lesson Lessons for this standard Resources cannot be aligned to this standard, browse sub-standards to find lessons. More specific sub-standards Finer grained standards that are part of this one Observe and describe how sound is produced by vibrations. Observe and describe how light travels from point to point. Find lessons by standard Newsletter sign-up form Sign up to receive the new weekly newsletter Leave this field blank Share My Lesson
<urn:uuid:aa25a47a-819b-42fd-bff3-f6f8bbedc7f1>
CC-MAIN-2020-05
https://sharemylesson.com/standards/indiana-doe/3.1
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250590107.3/warc/CC-MAIN-20200117180950-20200117204950-00540.warc.gz
en
0.715113
164
3.53125
4
When Mount Vesuvius erupted in 79 CE the ash quickly covered the city of Pompeii and other nearby villages in over 4 meters (13 feet) of ash. The damage was so extensive the site was lost for nearly 1500 years. Because of the dry conditions caused by the ash and pumice, archeologists discovered that Pompeii was actually preserved remarkably well. A similar eruption is credited with giving China part of their extensive collection of beautifully-preserved dinosaur fossils. The study comes from Baoyu Jiang from Nanjing University and was published in the journal Nature Communications. China is home to many beautiful early fossils, but one particular area in the Liaoning province has a fossil site of Early Cretaceous specimens that are incredibly well preserved, thanks to a volcano. The site, called Jehol Biota, is jam-packed with diversity. There are dinosaurs, mammals, fish, insects, plants, and much more with many impressions from skin, hair, and feathers still in tact. Geologic sampling from Jehol Biota revealed a layer of incredibly dark sediment, consistent with what would have appeared following a volcanic eruption. It appears that the incredibly fine ash rapidly descended on the area along with lethal hot gas, killing all of the animals in its path, just like what happened in Pompeii. If the heat was not enough to kill them, the complete lack of breathable air did. As the dust settled, it sealed in the organisms and protected it from the elements; the ideal environment for fossilization. Fourteen specimens from five different locations were selected for closer inspection. Under the microscope, Jiang et al. were able to find char marks on plants. Bones showed obvious trauma caused by extensive heat and bird bones that are typically hollow were packed with mineral dust, also indicating exposure to volcanic activity. The dust didn’t just affect the organisms on land, but the ash actually mixed into lake water, preserving the marine life as well. Because of the rich diversity present in the Jehol Biota fossil site, it had been predicted that a localized event caused so many animals die in a very short amount of time. It had been hypothesized that volcanic activity could have played a part in it, but there had not been any direct evidence of such an event until these results.
<urn:uuid:09fe95b3-179f-44a7-8393-d2783fcf22a3>
CC-MAIN-2017-43
http://yourhistoryhaven.com/2015/09/chinas-dinosaur-fossil-hotbed-caused-by-pompeii-like-volcano/
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187822747.22/warc/CC-MAIN-20171018051631-20171018071631-00151.warc.gz
en
0.978466
462
4.4375
4
There have been a couple of reported earthquakes that have since been removed from the database. This happens when seismic waves are incorrectly interpreted by the computers, typically from the results of larger magnitude earthquakes. These large magnitude earthquakes can produce seismic waves that are easily interpreted to be local earthquakes in other locations. When people review the data, these errors are omitted. However, the phantom earthquakes are often submitted to the earthquake notification system prior to this removal. These deletions raise angst in the conspiracy theorists’ minds (we can only imagine what actually is in their minds, if much at all), suggesting that there is some global conspiracy to hide seismic data, for some nefarious reason. I cannot think of a single reason why someone might want to hide seismic data (well, maybe for nuclear testing). It would be difficult to really hide seismic data because there are so many unique and independent seismic networks, which publish their data online. Sign up for the Earthquake Notification System here. The USGS has posted information about these recent Phantom Earthquakes and the reasons behind their deletions. I paste the relevant information below, just in case there is a conspiracy that will later remove these words from the internets [sarcasm]. Here was the page for the M 5.1 Lewiston earthquake, which was the result of seismic waves travelling from the M 6.7 earthquake along the Alaska Peninsula. This is my first post about the M 6.7 earthquake and here is a post that I wrote that includes animations of historic seismicity in the region. Here was my post about this earthquake. This happened at a time when I needed to go to sleep, so I was putting off from posting a more detailed accounting until the next day. Of course, when I awoke the next day, it was deleted… So I had little to post about. This is the link to the USGS for this earthquake. Commentary for Multiple “Phantom Events” in California – posted June 2, 2015 Automated notification systems are a convenient and often essential component of modern life. The USGS has invested heavily in developing automated systems that provide the public with timely and accurate earthquake information. On rare occasions the Earth throws a curveball and on May 29th and 30th, the USGS issued multiple alerts for false earthquakes in Northern California. The first, a M5.1 near Lewiston, CA, was distributed on Friday. More false alerts were distributed on Saturday, including a M5.5 near Ukiah and M4.7 near San Simeon. These erroneous earthquake notifications were created by the seismic waves from large, distant earthquakes. On Friday, a M6.7 earthquake occurred at a depth of approximately 60 km, 111 km off of Chirikof Island, Alaska. It was this earthquake that fooled the automatic processing of the Northern California Seismic System to issue the first false alert. Just 28 hours later, a M7.8 earthquake off of Japan with a depth of more than 660 km – the deepest earthquake of its size to have occurred during our history of recording – spawned two more phantom events in Northern California. Large earthquakes have created challenges for regional seismic monitoring in the past. This problem is particularly acute for deep earthquakes as they generate very impulsive seismic waves which may be misinterpreted as a local earthquake. The USGS and its partners have developed a number of methods to stop or screen these events from being distributed on the Web and through such mechanisms as the Earthquake Notification Service. The USGS will be implementing changes to improve the system and minimize the chances of this occurring in the future. The erroneous events were deleted quickly by a duty seismologist. Unfortunately, a problem with the distribution software prevented the delete messages from being transmitted to recipients of the Earthquake Notification Service. The inability to transmit the information about the false events to the users of the Earthquake Notification Service caused significant confusion and the USGS regrets the problems caused by this failure. USGS staff have identified the problem in the distribution software and fixed it. Errata for “Phantom Events” in Central and Northern California resulting from the M6.7 Alaska Earthquake on 2015-05-29 07:00:29 UTC Strong earthquakes generate seismic waves that spread across the entire globe. When the earthquakes are deep, the distant recordings are quite impulsive and are often mistakenly identified by automated systems as local earthquakes. On 2015/05/29 07:00 UTC, a 60 km-deep M6.7 earthquake occurred offshore of Chirikof Island, Alaska and swept across the seismic networks in northern California. The automatic earthquake detection systems recognized the arrival of seismic energy but misinterpreted it as several earthquakes, including an M 5.1 event occurring near Lewiston, rather than one large distant event. These “phantom events” were automatically released for public distribution on the Web and through the Earthquake Notification Service. All “phantom events” were cancelled by the duty seismologist within 15 minutes.
<urn:uuid:63e11dde-416c-4610-8cde-656d9a090e08>
CC-MAIN-2020-10
http://earthjay.com/?p=2604
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875144708.87/warc/CC-MAIN-20200220070221-20200220100221-00529.warc.gz
en
0.965886
1,011
2.65625
3
Too often, I find myself in situation where I argue something that I know to be the case, only to find out afterward—in the face of incontrovertible evidence— that the opposite was true. How did I ever end up thinking one way, and finding out that what I had reported—and, worse, acted upon—was contrary to fact? A recent item may give a clue: It seems that the human brain is not only capable of real-time editing, but it actually does it. As described in the referenced article, despite all best hopes, the human cognition system is not a simple data-acquisition-and-retrieval construct. There’s more going on than we are commonly aware. Such phenomenology shouldn’t be a surprise. It has long been known that eyewitness accounts are notably fraught with inaccuracies, and perceptions can be altered by the smallest of contributions, as noted here. Clearly, we must be on guard against apparent certainty! Questions: How do you know that what you think is so, is so? In what kinds of difficulties have you found yourself because of misremembering or misperception? How can you dig yourself out of such a hole, should you find yourself so located? How can you prevent such positioning in the first place?
<urn:uuid:1498c039-8c6f-4e8d-93c6-6440cc531bc9>
CC-MAIN-2020-16
https://coachmkh.com/2013/02/06/is-so-is-not/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371833063.93/warc/CC-MAIN-20200409091317-20200409121817-00114.warc.gz
en
0.968015
269
2.6875
3
A medical college is a trade association that brings together practitioners of a particular geographical area (a country, region, province). In common-law countries, they are often grouped by medical specialties (cardiologists, family doctors, etc.). Medical associations act as a safeguard of the fundamental values of the medical profession: the deontological ethics and code of ethics. In addition to providing exclusive representation in national and international medical practitioners, a medical college is responsible for management and protection of the medical profession. In most countries, licensing is usually required. A professional or college official is a public corporation of an industry association composed of persons exercising liberal professions and calls are usually covered by the state. Associate members are known as colleges. In ancient Rome, the college was understood by the name of Colegium the company public law with legal personality, formed by a plurality of persons with the same trade. For its formation is needed at least three people, but to continue their activity sufficient one. It is believed that Opificum o Societate colleges, from which the current Official Colleges, were derived from the associations of commoners to achieve benefits similar to those enjoyed by the patricians, needed a special authorization from the Emperor or the Senate to take legal personality. The government and the administration were chosen at a meeting of all participants. From Alexander Severus, these associations are transformed to free compulsory, children should follow the profession of his father. These first colleges were characterized by common purpose to prevail over private interests. In Europe, and specifically in Spain, colleges and professional associations have a long tradition through the centuries, interrupted only by the French Revolution, which in its ideology advocating that there should be one between the citizen and the state. This suppression of the early nineteenth century was changing throughout the century, returning to the end of her rebirth. Currently, a professional association is a public corporation of an industry association composed of persons exercising professions calls, and are usually covered by the state. Associate members are known as colleges. When dedication is directed to manual or craft activities used the traditional name of guild. - American Board of Family Medicine - Asociación Médica del Departamento Castellanos - Colegio Americano de Reumatología - Colegio de Médicos y Cirujanos de Costa Rica - Colegio Médico de Chile - College of Family Physicians Canada - Royal College of Physicians and Surgeons of Canada - Conseils de l'ordre des médecins en France - Fédération des médecins suisses - General Medical Council (UK) - Ordre des médecins (Belgique) - Organización Médica Colegial de España - Royal College of General Practitioners (UK) - Royal College of Obstetricians and Gynaecologists (UK) - Royal College of Physicians (UK) - Royal College of Physicians of Edinburgh - Royal College of Physicians of Ireland - Royal Australian College of General Practitioners - Royal New Zealand College of General Practitioners - La sociedad no puede recibir los mismos beneficios de la profesión médica sin los Colegios de Médicos. II Congreso de la Profesión Médica. Madrid, 16 y 17 de abril 2010. - Garrote Díaz JM. El médico ante la sociedad: la colegiación necesaria. Discurso de ingreso como académico correspondiente de la Real Academia de Medicina de Salamanca. 2010/12/14. - History of the Academy. Academy of Medical Royal Colleges.
<urn:uuid:3a69099b-1818-403c-a4b7-dc56c706cf3b>
CC-MAIN-2014-10
http://en.wikipedia.org/wiki/Medical_college
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394021446249/warc/CC-MAIN-20140305121046-00040-ip-10-183-142-35.ec2.internal.warc.gz
en
0.886226
787
2.796875
3
Android is a privilege-separated operating system, in which each application runs with a distinct system identity (Linux user ID and group ID). Parts of the system are also separated into distinct identities. Linux thereby isolates applications from each other and from the system. Additional finer-grained security features are provided through a "permission" mechanism that enforces restrictions on the specific operations that a particular process can perform, and per-URI permissions for granting ad hoc access to specific pieces of data. This document describes how application developers can use the security features provided by Android. A more general Android Security Overview is provided in the Android Open Source Project. A central design point of the Android security architecture is that no application, by default, has permission to perform any operations that would adversely impact other applications, the operating system, or the user. This includes reading or writing the user's private data (such as contacts or emails), reading or writing another application's files, performing network access, keeping the device awake, and so on. Because each Android application operates in a process sandbox, applications must explicitly share resources and data. They do this by declaring the permissions they need for additional capabilities not provided by the basic sandbox. Applications statically declare the permissions they require, and the Android system prompts the user for consent at the time the application is installed. Android has no mechanism for granting permissions dynamically (at run-time) because it complicates the user experience to the detriment of security. The application sandbox does not depend on the technology used to build an application. In particular the Dalvik VM is not a security boundary, and any app can run native code (see the Android NDK). All types of applications — Java, native, and hybrid — are sandboxed in the same way and have the same degree of security from each other. All APKs ( .apk files) must be signed with a certificate whose private key is held by their developer. This certificate identifies the author of the application. The certificate does not need to be signed by a certificate authority; it is perfectly allowable, and typical, for Android applications to use self-signed certificates. The purpose of certificates in Android is to distinguish application authors. This allows the system to grant or deny applications access to signature-level permissions and to grant or deny an application's request to be given the same Linux identity as another application. User IDs and File Access At install time, Android gives each package a distinct Linux user ID. The identity remains constant for the duration of the package's life on that device. On a different device, the same package may have a different UID; what matters is that each package has a distinct UID on a given device. Because security enforcement happens at the process level, the code of any two packages cannot normally run in the same process, since they need to run as different Linux users. You can use the sharedUserId attribute in the manifest tag of each package to have them assigned the same user ID. By doing this, for purposes of security the two packages are then treated as being the same application, with the same user ID and file permissions. Note that in order to retain security, only two applications signed with the same signature (and requesting the same sharedUserId) will be given the same user ID. Any data stored by an application will be assigned that application's user ID, and not normally accessible to other packages. When creating a new file openFileOutput(String, int), or openOrCreateDatabase(String, int, SQLiteDatabase.CursorFactory), you can use the MODE_WORLD_WRITEABLE flags to allow any other package to read/write the file. When setting these flags, the file is still owned by your application, but its global read and/or write permissions have been set appropriately so any other application can see it. A basic Android application has no permissions associated with it by default, meaning it cannot do anything that would adversely impact the user experience or any data on the device. To make use of protected features of the device, you must include in your AndroidManifest.xml one or more tags declaring the permissions that your application needs. For example, an application that needs to monitor incoming SMS messages would specify: <manifest xmlns:android="http://schemas.android.com/apk/res/android" package="com.android.app.myapp" > <uses-permission android:name="android.permission.RECEIVE_SMS" /> ... </manifest> At application install time, permissions requested by the application are granted to it by the package installer, based on checks against the signatures of the applications declaring those permissions and/or interaction with the user. No checks with the user are done while an application is running; the app is either granted a particular permission when installed, and can use that feature as desired, or the permission is not granted and any attempt to use the feature fails without prompting the user. Often times a permission failure will result in a SecurityException being thrown back to the application. However, this is not guaranteed to occur everywhere. For example, the sendBroadcast(Intent) method checks permissions as data is being delivered to each receiver, after the method call has returned, so you will not receive an exception if there are permission failures. In almost all cases, however, a permission failure will be printed to the system log. However, in a normal user situation (such as when the app is installed from Google Play Store), an app cannot be installed if the user does not grant the app each of the requested permissions. So you generally don't need to worry about runtime failures caused by missing permissions because the mere fact that the app is installed at all means that your app has been granted its desired permissions. The permissions provided by the Android system can be found at Manifest.permission. Any application may also define and enforce its own permissions, so this is not a comprehensive list of all possible A particular permission may be enforced at a number of places during your program's operation: - At the time of a call into the system, to prevent an application from executing certain functions. - When starting an activity, to prevent applications from launching activities of other applications. - Both sending and receiving broadcasts, to control who can receive your broadcast or who can send a broadcast to you. - When accessing and operating on a content provider. - Binding to or starting a service. Caution: Over time, new restrictions may be added to the platform such that, in order to use certain APIs, your app must request a permission that it previously did not need. Because existing apps assume access to those APIs is freely available, Android may apply the new permission request to the app's manifest to avoid breaking the app on the new platform version. Android makes the decision as to whether an app might need the permission based on the value provided for the attribute. If the value is lower than the version in which the permission was added, then Android adds the permission. For example, the WRITE_EXTERNAL_STORAGE permission was added in API level 4 to restrict access to the shared storage space. If your is 3 or lower, this permission is added to your app on newer versions of Android. Beware that if this happens to your app, your app listing on Google Play will show these required permissions even though your app might not actually require them. To avoid this and remove the default permissions you don't need, always update your to be as high as possible. You can see which permissions were added with each release in the Declaring and Enforcing Permissions To enforce your own permissions, you must first declare them in your AndroidManifest.xml using one or more For example, an application that wants to control who can start one of its activities could declare a permission for this operation as follows: <manifest xmlns:android="http://schemas.android.com/apk/res/android" package="com.me.app.myapp" > <permission android:name="com.me.app.myapp.permission.DEADLY_ACTIVITY" android:label="@string/permlab_deadlyActivity" android:description="@string/permdesc_deadlyActivity" android:permissionGroup="android.permission-group.COST_MONEY" android:protectionLevel="dangerous" /> ... </manifest> <protectionLevel> attribute is required, telling the system how the user is to be informed of applications requiring the permission, or who is allowed to hold that permission, as described in the linked documentation. <permissionGroup> attribute is optional, and only used to help the system display permissions to the user. You will usually want to set this to either a standard system group (listed in android.Manifest.permission_group) or in more rare cases to one defined by yourself. It is preferred to use an existing group, as this simplifies the permission UI shown to the user. Note that both a label and description should be supplied for the permission. These are string resources that can be displayed to the user when they are viewing a list of permissions or details on a single permission ( The label should be short, a few words describing the key piece of functionality the permission is protecting. The description should be a couple sentences describing what the permission allows a holder to do. Our convention for the description is two sentences, the first describing the permission, the second warning the user of what bad things can happen if an application is granted the permission. Here is an example of a label and description for the CALL_PHONE permission: <string name="permlab_callPhone">directly call phone numbers</string> <string name="permdesc_callPhone">Allows the application to call phone numbers without your intervention. Malicious applications may cause unexpected calls on your phone bill. Note that this does not allow the application to call emergency numbers.</string> You can look at the permissions currently defined in the system with the Settings app and the shell command adb shell pm list permissions. To use the Settings app, go to Settings > Applications. Pick an app and scroll down to see the permissions that the app uses. For developers, the adb '-s' option displays the permissions in a form similar to how the user will see them: $ adb shell pm list permissions -s All Permissions: Network communication: view Wi-Fi state, create Bluetooth connections, full Internet access, view network state Your location: access extra location provider commands, fine (GPS) location, mock location sources for testing, coarse (network-based) location Services that cost you money: send SMS messages, directly call phone numbers ... Enforcing Permissions in AndroidManifest.xml High-level permissions restricting access to entire components of the system or application can be applied through your AndroidManifest.xml. All that this requires is including an android:permission attribute on the desired component, naming the permission that will be used to control access to (applied to the restrict who can start the associated activity. The permission is checked during if the caller does not have the required permission then SecurityException is thrown from the call. (applied to the restrict who can start or bind to the associated service. The permission is checked during if the caller does not have the required permission then SecurityException is thrown from the call. (applied to the restrict who can send broadcasts to the associated receiver. The permission is checked after as the system tries to deliver the submitted broadcast to the given receiver. As a result, a permission failure will not result in an exception being thrown back to the caller; it will just not deliver the intent. In the same way, a permission can be supplied to to control who can broadcast to a programmatically registered receiver. Going the other way, a permission can be supplied when calling to restrict which BroadcastReceiver objects are allowed to receive the broadcast (see (applied to the restrict who can access the data in ContentProvider. (Content providers have an important additional security facility available to them called URI permissions which is described later.) Unlike the other components, there are two separate permission attributes you can set: android:readPermission restricts who can read from the provider, and who can write to it. Note that if a provider is protected with both a read and write permission, holding only the write permission does not mean you can read from a provider. The permissions are checked when you first retrieve a provider (if you don't have either permission, a SecurityException will be thrown), and as you perform operations on the provider. Using holding the read permission; using requires the write permission. In all of these cases, not holding the required permission results in a SecurityException being thrown from the call. Enforcing Permissions when Sending Broadcasts In addition to the permission enforcing who can send Intents to a BroadcastReceiver (as described above), you can also specify a required permission when sending a broadcast. By calling Context.sendBroadcast() with a permission string, you require that a receiver's application must hold that permission in order to receive your broadcast. Note that both a receiver and a broadcaster can require a permission. When this happens, both permission checks must pass for the Intent to be delivered to the associated target. Other Permission Enforcement Arbitrarily fine-grained permissions can be enforced at any call into a service. This is accomplished with the method. Call with a desired permission string and it will return an integer indicating whether that permission has been granted to the current calling process. Note that this can only be used when you are executing a call coming in from another process, usually through an IDL interface published from a service or in some other way given to another process. There are a number of other useful ways to check permissions. If you have the pid of another process, you can use the Context method Context.checkPermission(String, int, int) to check a permission against that pid. If you have the package name of another application, you can use the direct PackageManager method to find out whether that particular package has been granted a specific permission. The standard permission system described so far is often not sufficient when used with content providers. A content provider may want to protect itself with read and write permissions, while its direct clients also need to hand specific URIs to other applications for them to operate on. A typical example is attachments in a mail application. Access to the mail should be protected by permissions, since this is sensitive user data. However, if a URI to an image attachment is given to an image viewer, that image viewer will not have permission to open the attachment since it has no reason to hold a permission to access all e-mail. The solution to this problem is per-URI permissions: when starting an activity or returning a result to an activity, the caller can set Intent.FLAG_GRANT_WRITE_URI_PERMISSION. This grants the receiving activity permission access the specific data URI in the Intent, regardless of whether it has any permission to access data in the content provider corresponding to the Intent. This mechanism allows a common capability-style model where user interaction (opening an attachment, selecting a contact from a list, etc) drives ad-hoc granting of fine-grained permission. This can be a key facility for reducing the permissions needed by applications to only those directly related to their behavior. The granting of fine-grained URI permissions does, however, require some cooperation with the content provider holding those URIs. It is strongly recommended that content providers implement this facility, and declare that they support it through the android:grantUriPermissions attribute or Continue reading about: - Permissions that Imply Feature Requirements - Information about how requesting some permissions will implicitly restrict your app to devices that include the corresponding hardware or software feature. - API reference for the manifest tag that declare's your app's required system permissions. - API reference for all system permissions. You might also be interested in: - Device Compatibility - Information about Android works on different types of devices and an introduction to how you can optimize your app for each device or restrict your app's availability to different devices. - Android Security Overview - A detailed discussion about the Android platform's security model.
<urn:uuid:1a7ce5bc-6ed3-4aad-aab1-5001f54429b3>
CC-MAIN-2014-10
https://developer.android.com/guide/topics/security/permissions.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999668190/warc/CC-MAIN-20140305060748-00081-ip-10-183-142-35.ec2.internal.warc.gz
en
0.86849
3,552
3.28125
3
The Public Science Lectures, June 21, 2011 Belmont Media Center, Belmont MA Shawn Kelly, Ph.D., Senior Systems Scientist, Institute for Complex Engineered Systems, Carnegie Mellon University Prosthetic replacements for missing or dysfunctional body parts have been in use since at least 4000 BC, when Egyptians created prosthetic legs made of fiber. As early as 700 BC, Etruscans used human or animal teeth to make dentures. Twentieth- and twenty-first-century technological developments have enabled the development of electronic prostheses capable of functionally replacing a broader range of body parts. Cardiac pacemakers and artificial hearts are familiar, but in this lecture, Dr. Shawn Kelly explores new developments in prostheses for hearing, vision, balance and other functions. At the time of this presentation Dr. Kelly was a Research Biomedical Engineer at the VA Center for Innovative Visual Rehabilitation and a Visiting Scientist at MIT’s Research Laboratory of Electronics. In 2012, he became a Senior Systems Scientist at the Institute for Complex Engineered Systems at Carnegie-Mellon University. See Dr. Kelly’s Oct 2010 lecture The Electric Eye on the retinal implant he and his team at the Boston Retinal Implant Project designed. That presentation includes footage of patients demonstrating sight recovery after the retinal implant.
<urn:uuid:d2ceae9b-8475-4a32-b0ef-8e65845882ee>
CC-MAIN-2014-35
http://www.scienceforthepublic.org/medical-research/bionic-being-the-new-prosthetics/
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535922763.3/warc/CC-MAIN-20140909043732-00131-ip-10-180-136-8.ec2.internal.warc.gz
en
0.884927
273
2.71875
3
How to Germinate Red Cedar Berries With their evergreen foliage and pyramidal growth habit, red cedars (Juniperus virginiana) provide year-round structure and beauty to yards within U.S. Department of Agriculture plant hardiness zones 2 through 9. Although most commonly grown from cuttings, red cedars will also grow from seeds that have been extracted from their waxy purple berries in autumn. Red cedar seeds are profoundly dormant and must be processed before sowing to promote germination. However, even with thorough pretreatment, many red cedar seeds fail to germinate, so it is best to sow extra seeds to ensure at least one or two will sprout. Gather red cedar berries in autumn after they ripen to a solid purplish-blue color with a grayish cast. Place the berries in a bucket. Gently break apart the berries using a hammer or pestle. Fill the bucket with water. Soak the berries for 48 hours, or until they fall apart and bits of flesh float to the surface. Scoop up the floating flesh and any accompanying seeds and discard them, since buoyant seeds are likely not viable. Strain the remaining red cedar seeds from the water using a sieve. Spread the seeds on a sheet of paper to dry for 30 to 45 minutes. Move the seeds into a shallow bowl once dry. Cover the seeds with bleach or hydrogen peroxide. Soak them for one hour to weaken the hulls. Prepare pots while the seeds are soaking. Fill 4-inch square pots with a mixture of three parts seed-starting compost and one part perlite. Leave the top inch of each pot empty. Pour water onto the compost mixture to settle it. Scatter four or five red cedar seeds across the compost mixture. Gently press them into the surface. Cover the seeds with a 1/4-inch-thick layer of compost. Mist each pot generously with a spray bottle to settle the compost. Cover each pot with clear plastic wrap or a clear, sealable plastic bag. Place the covered pots inside a refrigerator or outdoors under deep shade where temperatures stay around 41 degrees Fahrenheit during the winter. Chill the seeds for four months to break their dormancy. Keep the compost mixture moist, but allow the surface to dry slightly before adding more water to prevent the seeds from rotting. Remove the plastic after the seeds have chilled. Transfer the pots to a shaded garden bench where temperatures stay around 55 degrees Fahrenheit during the day. Continue to water whenever the compost's surface dries out. Watch for germination starting in approximately 45 days. Thin the seedlings, if necessary, to one per pot. Grow them under light shade during their first summer and inside a cold frame in winter. Transplant the seedlings into a permanent bed the following spring. Choose a planting site with fast-draining soil and full sun to part shade. Mulch heavily around each red cedar and keep them well-watered during their first summer. - Bleach or hydrogen peroxide - 4-inch square pots - Seed-starting compost - Spray bottle - Clear plastic wrap - Red cedar berries will cause gastrointestinal upset if consumed, so wash your hands thoroughly after handling them. - California Polytechnic State University: Urban Forest Ecosystems Institute: Eastern Red Cedar - United States Department of Agriculture: Eastern Red Cedar - The University of Texas at Austin Wildflower Center: Juniperus Virginiana L. - Texas A&M University Department of Horticulture: Propagation of Ornamental Trees, Shrubs, and Woody Vines - United State Department of Agriculture Forest Service: Nursery Manual for Native Plants: Seed Germination and Sowing Options
<urn:uuid:5cb278a6-cd6a-4093-bc6a-48c7d7c222f3>
CC-MAIN-2020-34
https://homeguides.sfgate.com/germinate-red-cedar-berries-38776.html
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439737204.32/warc/CC-MAIN-20200807143225-20200807173225-00470.warc.gz
en
0.90027
779
3.03125
3
How often should you change your toothbrush Some people can use their toothbrush repeatedly until they misplace it. The average American only change their brushes 1.9 times a year. The American Dental Association recommends that you change your toothbrush at least four times a year, approximately 3 months and every time you are sick. If the bristles of your toothbrush start flaring before three to four months, then you are using too much pressure to brush your teeth. Dentist believes toothbrushes should be thrown out after roughly 40 to 50 uses. Healthy people should change brushes every two weeks. People with gum problems, other oral diseases, or weakened immune systems should change toothbrush more often. People with a respiratory illness or other infectious disease should change their brushes at the beginning of the illness, again when they first feel better, and once again when they are well. Toothbrush replacement should also be practiced every day for patients who are recovering from major surgery because susceptibility to infections is higher at that time. The easiest way to know when to change your brushes nowadays is to look at the indicators on the toothbrush. Usually the indicators consist of two or three rows of bristles which are blue in color, when the blue color fades; it is time to change a new toothbrush. Are toothbrush indicators correct or just marketing techniques Toothbrush indicators are there to tell you when to change your toothbrush. Nearly all manual toothbrushes now have indicators. How does the indicator work? The actual process is extremely simple. A non-toxic dye is embedded into the outer layers of the bristles making it a different color from the other bristles. The usual color opted here is blue. As you keep brushing your teeth, the blue color indicator bristles on the brush gets thinner and the color present in outer layer of the bristles starts diminishing. Once the color has worn off, your brush indicators indicate to you that it is time to change a new one. Even electric toothbrushes are now coming with brush indicators so that people know when it is time to change the brush head. Usually the toothbrush replacement indicators in electric toothbrushes work on the number of oscillations. Once the total number of oscillations reaches a pre-selected number, a signal is produced and this signal is fed to an alarm indicator in the form of a light. Once this light comes one, the user becomes aware that it is time to change the toothbrush head. Those toothbrush indicators are correct and accurate. It is not just a marketing ploy by the oral company. It was actually design to make your life easier and to ensure better oral health for everyone. How it helps to better the health of your mouth is explained next. What are the benefits of changing toothbrush - When you change your toothbrush to a new one , the new toothbrush removes up to 30 percent more plaque than one that’s 3 months old. The effect of long term use toothbrushes are that the bristles fray and wear out, leading to ineffective brushing and finally tooth decay. - Another reason to change a new toothbrush is so that your gums are not injured . A worn brush can damage gum tissue because of the frayed bristles traumatically rubbing against the gums. - Researchers have established that thousands of microbes can grow on the brush bristles and handles. These microorganisms can cause cold and flu viruses, the herpes virus that causes cold sores, staphylococcus bacteria responsible for many ear, nose and throat infections and the Candida microbe that causes thrush. That being said, toothbrush bristles wear down and become breeding grounds for bacteria. Protecting toothbrushes from germs and bacteria - Don’t keep your brush in the bathroom. Bathrooms are wet and moist which is the perfect breeding ground for bacteria. - Store the brush somewhere dry, perhaps the bedroom, or an open area and not a tightly closed medicine cabinet. - Don’t store brushes together. This is a great way to cross-contaminate the entire family. - Use a brush made from clear or light-colored translucent plastic because light passing through helps to prevent the growth of microbes. - Do not use hot water to rinse the brush. It will shorten the life of the brush. Of course there is. For starters, most people change regular brushes to an electric ones because it is obviously more convenient. However, an electric toothbrush is more expensive than a regular toothbrush. There is a difference in the way they work. An electric brush runs on an automated motor and it oscillates in a certain rotary and vibratory direction. Therefore an electric brush is very useful for those who have a difficulty following manual effective brushing methods. For those who can manage brushing methods effectively themselves, a manual or regular brush is recommended.
<urn:uuid:b4084ba5-b255-4428-b7bd-18eb0fd3ae4f>
CC-MAIN-2014-23
http://www.intelligentdental.com/2010/08/28/how-often-should-you-change-your-toothbrush/
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997890773.86/warc/CC-MAIN-20140722025810-00229-ip-10-33-131-23.ec2.internal.warc.gz
en
0.943618
994
2.53125
3
In this activity, the kids and I were magicians learning about the "silent e." To assess the literacy skills at work I had manipulatives the kids could use to spell words; then when the magic silent "e" was added the word would change. We created our own words and then also drew pictures of the words before and after a magic "e" was added. 2. Develop an understanding of and an ability to implement a balanced literacy program based on sound research of learning theory and the reading/writing processes, including basic skills and strategies crucial to integrating the English language arts. (MRICETS, 2002. 3,5) Balanced Literacy In this activity, my group and I created an image of how we interpreted Balanced Literacy. Each and every strategy must be used together to create a balanced literacy approach; kind of like all the ingredients are needed together to create a delicious soup! 3. Become familiar with, evaluate, define and support one’s own beliefs regarding various theoretical and instructional approaches to integrating the English language arts. (MRICETS, 2002, 2) Theoretical Models of Literacy This model represents a comprehensive literacy approach to teaching literacy. I lean in the direction towards transactional theories; where context matters. With comprehensive literacy instruction, the main focus is on helping the children learn to read using essential components of instruction within a framework of reading and writing "to, with, and by children." ie: teacher reads TO the children, works WITH the children individually and in groups, and provides time and proper conditions for reading practice BY the children. 4. Identify and plan relevant instruction to develop print skills (e.g., phonemic awareness, phonics, fluency, and the four cueing systems), vocabulary knowledge, and comprehension strategies in both the English language arts and content area subject matter. (MRICETS, 2002, 4,7,8, 9, 13,18,26,27, 29,30,31,40) Supporting Phonics, Vocabulary, and Comprehension In this picture the kids and I are playing CVC bingo. This activity was used to support phonemic awareness. I started the lesson using sock puppets to show how words are blended together so they sound smooth. Then we all played some Bingo, and I would say each of the sounds and it was the job of the kids to blend the word together and see if it was on their bingo card. 5. Select appropriate Michigan grade level objectives (based on Michigan’s Curriculum Frameworks) for the language arts and prepare lessons to meet those objectives that engage students (based on Michigan’s Teaching and Learning Standards) (MRICETS, 2002, 6,14, 32,33,41) Using the Common Core Standards This is one of my lesson plans I set up for teaching inferences. In order to get the appropriate state standards I had to go to the common core state standards website and looks up the appropriate standards that would fit for what I was teaching. 6. Understand and use a variety of instructional management techniques including approaches such as individualized learning (e.g., workshops or journal writing), small group learning (e.g., cooperative groups, guided reading groups, or flexible skill groups), and whole group instruction (e.g., shared reading, interactive writing, or author studies) to meet diverse student and instructional needs. (MRICETS, 2002, 12,17,18,40) Teaching the Whole Class, Small Groups, and Individual Children For my last unit we went over myths about extinct animals and how fossils may have inspired those myths. After we read a myth and discussed it I allowed the kids about 30 minutes to create their own myths. 7. Understand ways in which needs of students vary (e.g., cultural differences, English as a second language, learning disabilities, or gifted/talented abilities) and plan instruction that builds on the strengths of diverse learners and accommodates for individual learning needs, enabling all students to meet lesson objectives. (MRICETS, 2002, 10,11, 14,15,16) Supporting All Students—Attending to Diverse Strengths and Needs There is a young girl with Autism in my field placement. She is a sweet heart, and one day she walked up and asked me to help her with her math. The students were learning how to read numbers up to 100 and how to count by tens. They had to make a circle in each box and put the number of boxes they had counted on the bottom of each row. The young girl was struggling with drawing circles as fast as everyone else, so as an accommodation, I asked her if she wanted me to draw each circle as long as she counted them for me. She happily accepted and counted every single number without missing a beat. 8. Understand the developmental nature and stages of literacy development (e.g., emergent, early, transitional, and self-extending readers) and apply this knowledge in planning appropriate lessons (MRICETS, 2002, 6,7) Literacy Development Young readers need to be immersed in a literacy rich environment. These young years are where they will learn many skills needed for gathering meaning from the world. In the picture above I have a sticky note on the bottom of the page. The sticky note was reminding me to do a model think aloud so the students can see me use a helpful reading strategy. 9. Demonstrate and apply knowledge of the craft of reading and writing through analysis of text structures, author craft, illustrations, mechanics, and voice in developing their own and others’ writing and responses to reading. (MRICETS, 2002, 32,33,34,35,36,37) Connecting Reading and Writing The book above is one of my students "Fossil Books." During my unit, each kid would write one page, pertaining to what we read and learned that day, in their book. On the first page, the student drew and labeled two different types of fossils. On the next page the student drew what he thought the first fishes would have looked like and then he labeled the time era and period they were in existence. 10. Define and plan for learning as a process of individual and group inquiry that expands student knowledge and skills in diverse as well as similar ways based on curriculum requirements and student needs. (MRICETS, 2002, 39,41,42) Lesson Planning Above, is an activity that I used when teaching a phonemic awareness lesson. It was to help students learn the silent "e." There are multiple methods of learning, and the use of manipulatives allows students another way to wrestle around with tough concepts. 11. Develop the characteristics of a professional teacher including exhibiting professional behavior at all times during class and in the field (see attributes of professional behavior in syllabus), displaying high quality literacy skills on all oral, visual, and written work, using appropriate study skills to complete course requirements, and using professional communication skills with peers, instructors, teachers, administrators, and parents. (MRICETS, 2002, 1,28,38,43,44) Being a Professional Educator Above is an evaluation sheet, done by my placement teacher, for my strategy lesson. The teacher provided many helpful comments about things I did well and things I need to work on. My favorite thing she had to say was I created a welcoming and respectful classroom environment. This is important for any classroom if you want learning to occur. 12. Manages assignments and time efficiently (MELSET B3c). Applies knowledge of human growth, development, and learning theory (MELSET B5c). Is familiar with and able to use a variety of literacies, materials, and resources (MELSET B7a). Selects, creates, and incorporates appropriate instructional techniques, technology, and materials needed for instruction (MELSET B7b) Applying Theories of Literacy Learning Without focus and engagement, learning cannot take place. Above is a much needed stretching break to get the students' blood flowing and some of their energy out. It only takes 5 minutes to do, and it can save countless minutes of focus down the road. Throughout this semester, I have taken tremendous leaps and bounds towards being an educator. I have gotten to experience a small taste of what it is like to be a teacher. I know I still have a long ways to go, but I also know I am closer than I was at the beginning of the semester. Feedback and interaction from my peers and teachers have helped shape my outlook on literacy, and as a future educator I will be enthusiastic and motivate all students to interact with text of all kinds. My future classroom will be a welcoming, friendly, literacy rich environment where reading and writing are encouraged.
<urn:uuid:7168e333-816e-489a-8224-7e3bd655dea0>
CC-MAIN-2017-43
https://spark.adobe.com/page/N73OYtEFk4swj/
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823482.25/warc/CC-MAIN-20171019231858-20171020011858-00129.warc.gz
en
0.949825
1,809
4.03125
4
“We stand upon the threshold of the 20th Century facing a still brighter dawn of civilization,” said New York Times. Though the nation was stunned by the assassination of President McKinely at the Pan-American Exposition in Buffalo, New York, and the subsequent replacement in office by Theodore Roosevelt, the turn of the century proved to be a decade of technological and cultural advancement. The first silent film, “The Great Train Robber,” premiered in 1903. That same year, Orville and Wilbur Wright successfully piloted the first powered airplane in Kitty Hawk, North Carolina. By 1908, the Ford Motor Company had begun production of the Model T, revolutionizing industry through mass production methods. Construction began on the Panama Canal. The first escalator was installed in Gimbel’s Philadelphia store after its display at the Paris Exposition of 1900. Fair-goers of the Louisiana Purchase Exposition in St. Louis were thrilled to discover the Ferris wheel – the one at the fair could carry two thousand people on a single turn. The turn of the century set the stage for America to become a global power. Five Gamma Phi Beta collegiate chapters were installed during this decade. Sisters attending the 1905 Convention Banquet as shown in the January 1906 issue of The Crescent.
<urn:uuid:cc4c7e71-36ae-4450-86c3-9e39b0837349>
CC-MAIN-2023-40
https://www.gammaphibeta.org/gpb/9db1d31b-b784-4540-ac28-dc4a79b9c011/The-1900s
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510967.73/warc/CC-MAIN-20231002033129-20231002063129-00838.warc.gz
en
0.944071
267
2.875
3
In the previous post, we looked at the relationship between trust, Open Badges and blockchains. To paraphrase George Bernard Shaw, one could say: Open Badges and blockchains are two technologies separated by a common idea [trust]. To explore how Open Badges and blockchains could merge into a new technical object, my reasoning will pass through several stages. We will start with a BadgeChain that does not make any reference to the blockchain technology, then, step by step, we will describe the mutation of this initial object through the incorporation of new genes into its DNA — hoping that we will not have created a chimera! BadgeChain take one: everything is a badge To create something that looks like a BadgeChain, we need to link badges together; there are multiple ways this can be achieved: Indirectly: badges are “connected” through each individual issuer and earner. The issuer is a kind of “connector” between all the badges issued (and their earners), the earner is a kind of “connector” between all the badges received (and their issuers). Badges can also be connected through the alignment metadata, a list of objects describing educational standards — a property of the version 1.5 of the standard that has not been widely exploited. Directly: badges are literally linked to other badges. For example, an endorsement badge could use the address of the badge being endorsed as the identification for the earner of that badge. While not initially coined to describe a technical object, but rather a team of Open Badge enthusiasts willing to exploit the benefits of blockchains, BadgeChain is also a word that might be used in the future to describe a new technical object resulting from the merger of blockchains and Open Badges. When we started the BadgeChain group, the initial idea was to explore how blockchains could contribute towards improving the Open Badge technology and experience. There are a number of limitations to what one can do with Open Badges today that blockchains seem to be able to outsmart. Our initial reflection looked at the application of blockchain ideas to Open Badges. What has not yet been explored is the application of Open Badge ideas to blockchains: what could we do to blockchains if they used what we know about Open Badges? Both Open Badges and blockchains are related to trust but they do it in almost opposite ways. As I have written many times, Open Badges are trust statements that could be combined to create chains and networks of trust. The information on how the members of the network trust each other can be used as the basis to establish trustworthy transactions — if 32 Open Badge experts trust Slava’s expertise on badges as well as 53 clients, I’m inclined to trust Slava to work with me on my next project. Blockchains on the other hand are a means to establish trustworthy transactions even if those engaged in transactions do not trust each other. The trustworthiness of the transactions is not a property depending on the participants, their behaviour or the data they provide but on an algorithm controlling the trustworthiness of the next blocks added to the chain. The blockchain technology was designed to eliminate the human factor from making the decision on whether a transaction is trustworthy or not. Part 1 challenged the author’s understanding of “trust” and the use of non sequitur, part 2 challenged the author’s understanding of the complexity of the relationship between technical objects, technology and ideology and the use of non-refutable statements (like the one quoted below). This part will challenge further the understanding of the author and her capacity to construct well structured arguments. To elicit Audrey Watters’ sense of argumentation, let’s take the following statement: Technologies, particularly the new computer and communications technologies of the twentieth century onward, help reinforce dominant ideology While this might sound like a profound insight to the casual reader, the problem is that it fails the most elementary falsification test — being able to refute its contents. For that we suggest the following questions: What technologies have not reinforced the “dominant ideology”? Did computer and communications technologies only profit the “dominant ideology”?
<urn:uuid:447215e2-54e8-4781-9062-e61a434dca2b>
CC-MAIN-2017-30
http://www.learningfutures.eu/category/technologies/blockchains/
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549423769.10/warc/CC-MAIN-20170721102310-20170721122310-00687.warc.gz
en
0.94184
866
2.796875
3
Psoriasis and athlete’s foot are two very different conditions, but both cause skin irritation. While certain treatments can help you manage psoriasis and its symptoms, psoriasis has no cure. Athlete’s foot can be cured with antifungal medications, although it may reoccur if you’re not careful. Knowing what signs to look for makes it easier to tell psoriasis and athlete’s foot apart. We’ll go over hallmark symptoms, risk factors, and treatment options. Psoriasis and athlete’s foot have some symptoms in common, but they also have key differences. Here’s an overview of how both conditions can manifest. Symptoms of psoriasis Psoriasis causes faster-than-normal growth of skin cells, which makes them build up on the surface of your skin instead of falling off naturally. If you have psoriasis, extra skin cells develop into scales, or thick, white-silver patches. These areas are often dry, itchy, and painful. Psoriasis can appear differently depending on the melanin of your skin (the pigment that gives our skin its color). Psoriasis can look like: - red or inflamed patches of skin, covered by whitish-silvery scales - itching or burning of affected area - pain on or around scales - dry, cracked skin that may bleed - pitted or thickened nails - for some people, swollen and painful joints (may indicate psoriatic arthritis) Symptoms of athlete’s foot Athlete’s foot is a skin infection caused by a fungus. It develops when fungal cells begin to infect the skin, multiplying quickly. The athlete’s foot infection thrives in areas prone to moisture, like between our toes. Scaling can appear on the heel and spread to other parts of the foot. Athlete’s foot can look like: - rash on foot that may be red and scaly - macerated skin (whitish, soggy, and peeling) - itching and burning of affected area - chronic dryness, cracking - small blisters or ulcers Some people may be Are psoriasis and athlete’s foot both contagious? Because psoriasis is an autoimmune disease, it is not contagious. Psoriasis patches can be small and cover just a few dots of skin, or they can be large and cover large areas of your body. Psoriasis on the feet often occurs on the soles (bottom of foot). Because athlete’s foot is caused by a fungus, it is contagious. You can catch athlete’s foot by coming into contact with infected surfaces, like clothing, shoes, and locker room floors. You can also spread athlete’s foot to your hands by scratching or picking at infected areas. Athlete’s foot can affect one foot or both. If not treated successfully, or if prevention isn’t taken seriously, athlete’s foot can become a recurring problem. These categories break down key factors to consider when evaluating whether you have psoriasis or athlete’s foot. Affected body areas Is your foot the only part of your body affected? If so, you may be more likely to have athlete’s foot. If you notice the patches are developing on your elbow, knee, or other areas, it’s more likely to be psoriasis. The fungus that causes athlete’s foot can spread to different parts of your body, so this isn’t a foolproof method for telling the difference between the two. You could also have another kind of fungal infection. Response to antifungal treatment You can buy over-the-counter antifungal creams and ointments (such as Lotrimin or Lamisil) at your pharmacy without a prescription. Apply the medication as directed to the affected areas. If the rashes begin to disappear within a few days, you likely have athlete’s foot or another kind of fungal infection. If nothing happens, you may be dealing with psoriasis or a different skin condition. Diagnosis with testing The only way to be certain if your symptoms are caused by athlete’s foot or psoriasis, or something else entirely, is to have a skin test or fungal culture test. During this test, your doctor will lightly scrape or swab infected skin to get a sample for lab testing. This test is usually quick and minimally invasive. You likely won’t experience any pain. Treatments for psoriasis and athlete’s foot are different. Some can be acquired over the counter and in the form of home remedies, while others require a doctor’s prescription or appointment with a specialist. Psoriasis treatments fall into three general categories: - Topical treatments. Some psoriasis creams and ointments are over the counter, while others require a prescription from your doctor. Topicals can keep your skin moisturized, help with itching, and reduce scaling. - Systemic medications. This includes both oral pills and injectable options. Psoriasis medications may modify or suppress your immune system to reduce inflammation and skin cell growth. These drugs can have serious side effects for certain people, and should always be taken as directed by your doctor. - Light therapy (phototherapy). Small amounts of controlled LED or UV light may slow the growth of skin cells, and reduce the rapid scaling and inflammation caused by psoriasis. Narrowband ultraviolet B (NB-UVB) light therapy, red or blue light therapy, and Excimer lasers (XTRAC is a main brand) are all used to treat psoriasis. Topicals are commonly used for all levels of psoriasis. Medications and light therapies are typically reserved for those with a severe form of the condition. Some people also try home remedies to treat symptoms of psoriasis. These include aloe vera gel, oatmeal baths, and adjusting your diet. Not all home remedies for psoriasis are backed by research. Consult your doctor before trying a new approach. Athlete’s foot treatment It’s important to treat athlete’s foot promptly and thoroughly. It will return if you don’t knock out the infection. Here are the common treatment approaches for athlete’s foot: - Antifungal creams. These topical treatments kill fungal cells or stop their growth. You can get antifungals over the counter or by prescription. - Oral antifungal medications. - Intravenous (IV) antifungal medications. These will only be used in case of hospitalization for a severe infection. Some people also try home remedies for athlete’s foot. These include tea tree oil and sea salt baths. Many home remedies, while popular, aren’t backed by science. You should consult with a doctor before trying any treatments for athlete’s foot on your own. You can also still contract athlete’s foot again at any point, even if you cure it this time. It’s important to practice proper foot hygiene to lower your risk of getting it, or having it recur. Athlete’s foot prevention While psoriasis can be managed and treated, it is an autoimmune condition, and not preventable. However, athlete’s foot is a fungal infection, and can often be prevented. - keeping your toenails clean and trimmed - wearing shower shoes instead of going barefoot in locker rooms - airing your shoes/sneakers out, rotating which pairs you wear - washing your feet every day and drying them fully - the AAD recommends wearing socks made of fabrics that dry quickly or wick moisture away from your skin Wearing properly fitting shoes can also prevent sweating and cramping for your feet. And make sure to change socks regularly — don’t keep wearing a dirty pair! If you’re around someone with a confirmed case of athlete’s foot, don’t share towels, socks, or footwear. Make sure to wear shower shoes in shared areas. Genetics is a primary risk factor for psoriasis. People of all racial and ethnic backgrounds can have psoriasis, but the condition is more prevalent in white people. According to the - taking certain heart or mental health medications - a history of viral or bacterial infections (such as HIV and strep throat) Research also suggests psoriasis is connected to several other conditions. While being likely to get athlete’s foot may have a genetic component, most risk factors are behavioral and environmental. - exercise or play sports a lot - wear tight-fitting shoes with damp socks - don’t wash and dry their feet thoroughly - wear the same shoes frequently - walk barefoot in public places (like gyms, showers, locker rooms, and saunas) - live in close quarters with a person who has an athlete’s foot infection - have a weakened immune system If conservative or at-home treatments aren’t improving your feet’s condition, or if symptoms worsen, reach out to your doctor. Your doctor will likely conduct a physical exam and lab test in order to make a diagnosis and begin treating you. If your primary care doctor is unable to diagnose your condition, they may send you to a dermatologist (skin doctor) or podiatrist (foot doctor). If psoriasis is suspected and accompanied with symptoms of arthritis, you may be referred to a rheumatologist. An athlete’s foot diagnosis usually involves straightforward treatment with an anti-fungal medication until symptoms resolve. But if you have psoriasis, your treatment will need to involve a more long-term plan to manage this chronic condition. Both psoriasis and athlete’s foot can cause itching and irritation on your feet, but they have different underlying causes and treatments. Psoriasis is an autoimmune disease and athlete’s foot is a fungal infection. Psoriasis can affect any part of the body, while athlete’s foot usually just sticks to feet. However, fungal infections can also affect other areas of skin. Athlete’s foot symptoms often start in the toes because they’re close together, and can create damp conditions. While psoriasis is a lifelong chronic condition, symptoms can be managed with topical and oral medications, and by avoiding triggers. Athlete’s foot can be cured with anti-fungal medications, and prevented by practicing proper hygiene. If you’re worried about persistent symptoms of psoriasis or a fungal infection on one or both feet, reach out to your doctor. Simple tests can diagnose whether the issue is an infection or other skin condition, and make sure it’s treated promptly.
<urn:uuid:f7d3663c-e843-475b-92d8-b6d1e057b033>
CC-MAIN-2023-40
https://www.healthline.com/health/psoriasis/psoriasis-or-athletes-foot?utm_source=ReadNext
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510334.9/warc/CC-MAIN-20230927235044-20230928025044-00804.warc.gz
en
0.92445
2,326
2.734375
3
historical researches of Lviv University, guest professor of the Central European University in Budapest, senator and head of the Department of History of Ukraine at the Ukrainian Catholic University Yaroslav Gritsak tells the story of the creation of the OUN-UPA, about the development of these structures, and also analyzes the most controversial and resonant moments of history with their participation. REGNUM: What are the pros and cons of the revitalization of controversial historical issues in Ukraine during the presidency of Viktor Yushchenko? Plus, I see that discussions on history have intensified, in particular, regarding those phenomena, events and persons who are not so much silent about, but kept in the background under President Leonid Kuchma. Kuchma’s historical policy was to not wake a sleeping dog, not to touch sensitive issues that carry the threat of a split in Ukraine. Yushchenko addressed precisely these issues. In the first place - to the famine 1932-1933's. And here Yushchenko’s policy unexpectedly turned out to be successful for many. As the polls show, during Yushchenko’s rule, there was a consensus in Ukrainian society that: a) the famine was artificial and b) it was genocide. It is important to note that this consensus encompassed even the Russian-speaking South and East of Ukraine. But on this list of successes Yushchenko exhausted. Ukrainian society was not ready to discuss the past - and this applies equally to politicians and "ordinary" Ukrainians. This is especially true of the 1930-1940-s events. Nothing splits Ukraine as much as the memory of the Second World War, and specifically in this memory - UPA, OUN and Bandera. This reflects certain historical realities, because Ukraine at that time was divided. She was like this before the war, and remained divided during the war. In this regard, the various regions of Ukraine had a very different experience of the Soviet and German authorities - and it is difficult to reduce it to a common denominator. This is the fundamental difference between Ukraine and Russia. If we want to understand the historical experience of Ukraine in the Second World War, it is better to compare it not with the Russian 1941-1945, but with the 1917-20. Relatively speaking, during the Second World War Ukraine had its own civil war, in Russia there was no such war. Therefore, as far as the memory of the war unites Russia, it splits the Ukraine as much. Perhaps the Ukrainians would have managed to reach some minimal consensus on these issues if these discussions were limited only to Ukraine. But the Ukrainian lands were and to a certain extent remain in the center of a geopolitical conflict, which inevitably influences discussions about the past. In addition, we must not forget that the war put an end to the old poly-ethnic Ukraine. Those Poles and Jews who survived and left - voluntarily or forcibly - outside the borders of the Ukrainian lands, took with them their memory of the war in Ukraine. Therefore, discussions about the Ukrainian past inevitably affect not only Russia - but also Poland, Israel, and others. Let's say the most interesting and truly informative discussion about Bandera took place in North America, which not many people know about. Therefore, discussions about Ukraine are always more than Ukraine - in connection with the Ukrainians, it is much harder to reach a national compromise. REGNUM: Let's talk briefly about the history of the creation and development of the OUN-UPA ... Firstly, it should be noted that there was not one OUN, there were several OUN. The first was, relatively speaking, the old OUN — the OUN of Yevgeny Konovalets. After his assassination, the old OUN split into two warring parts in 1940: the OUN of Stepan Bandera and the OUN of Andrei Melnik. Part of the OUN-Bandera during the war experienced a strong evolution. After emigrating abroad, she entered into a conflict there with Bandera and, having broken away, formed another organization - OUN- "dvijkari". Therefore, when we talk about the OUN, we must remember that even among the nationalists, there is a kind of civil war for this name and this tradition ... Another problem is that when they say OUN-UPA, they assume that it is OUN and UPA - this is the same organization. But this is a false premise. OUN and UPA correlate, conditionally speaking, as the Communist Party and the Red Army. OUN Bandera played a very large role in the creation of the UPA, but the UPA was not identical to the Bandera OUN. In the UPA there were a lot of people who were outside it, there were even those who did not share its ideological goals. There are memories of Daniel Shumka about staying in the UPA: this man was a communist, a member of the KPZU. I know at least two veterans of the movement who personally knew Bandera and who hate him and protest every time they are called Bandera. In addition, part of the Red Army soldiers, who after the retreat of the Soviet troops, hid in the forests or in the villages, or escaped from captivity, came to the UPA at some point. There were especially many Georgians and Uzbeks among them ... In general, the UPA in some respects resembled Noah's Ark: there was "every creature on a pair." The identification of the UPA with "Bandera" originates from the time of the war. By the way, the first to start doing this was not the Soviet, but the German government. After the war, "Banderovites" began to call all Western Ukrainians - not only in Siberian camps or in Poland, but even in Eastern Ukraine. In each case, when talking about "Bandera", we must bear in mind that this term is often used and used in vain. At the moment, the Bandera OUN - let's call it OUN-b - is trying to monopolize the memory of the UPA, to say that the UPA was a "pure" OUN-b. Interestingly, the Kremlin and the Party of Regions of Viktor Yanukovich are now standing in these positions. They put an equal sign between the OUN-b and UPA. This is far from the only case when Ukrainian nationalists agree with the Kremlin - although, of course, for completely different reasons. In general, the UPA is a very complex phenomenon and a very diverse phenomenon; it cannot be reduced to just one ideological or political camp. But historical memory does not tolerate complexity. It requires very simple forms - either-or. That is the problem. How can a historian enter into this discussion when very straightforward, simple answers are required of him? REGNUM: Let's return to the question of the emergence of the UPA in more detail ... If you want to understand how the UPA came about, let us turn our attention to Eastern Ukraine in 1919. It was a "war of all against all" - when not two, but several armies at once simultaneously fight for control of one territory. In addition to the whites, reds and Petlyura, a fourth force arose here - the greens, the independent Makhno. She controlled a large territory in the steppes. If we ignore ideological differences for a moment, the UPA is about the same as the Makhno army: peasant, often very cruel, but with the support of the local population. Therefore, it is very difficult to defeat. But during the revolution and civil war, when they fought with sabers and horses, the steppe could well be the basis for such an army. In World War II they fought already by airplanes and tanks. The only place in Ukraine where a large partisan army could hide was the West Ukrainian forests, swamps and the Carpathians. Until 1939 it was the territory of the Polish state. Therefore, there, especially in Volyn, there was an underground Polish Army of Craiova (AK). In 1943, Kovpak (commander of the Soviet partisan formation in Ukraine - REGNUM) comes here. That is, during the German occupation, the situation of the "war of all against all" again repeated here. There is a widespread view that the UPA was created by the Bandera OUN. It is not, or at least not quite. It sounds strange, but true: Bandera was personally against the creation of the UPA. He had a different concept of national struggle. Bandera believed that this should be a massive national revolution. Or, as they said, the "people's breakdown", when the people - millions - rebel against the invader, expels him from their territory. Bandera, like his entire generation, was inspired by the example of 1918-1919, when massive peasant armies existed in Ukraine, which drove out the Germans in 1918, then the Bolsheviks, then the whites. In Bandera’s imagination, this was to be repeated during World War II: the Ukrainian population, waiting for the mutual exhaustion of Stalin and Hitler, would rise and expel them from their territory. This, of course, was utopia. But no revolution can do without utopias - and the OUN was created as a revolutionary force. According to Bandera, the creation of the UPA distracted from the main goal. Therefore, he spoke of this idea dismissively as if it was partisan or “sikorschyna” (from Sikorski, the head of the Polish emigration government in London, on whose behalf the AK acted in Volyn). As a result, the UPA arose not from OUN-B orders, but “from below”. Why? Because the “war of all against all” is taking place in Volyn, and it is especially inflated with the arrival of Kovpak here. Kovpak enters one or another village, makes sabotage, the Germans respond with punitive action. For this, they often use the Ukrainian police, among whom there are many members of the OUN-b. As a result, a situation arises where Ukrainian nationalists must take part in punitive actions against the local Ukrainian population. Ukrainian police are deserting into the woods, the Germans take the Poles to the place of Ukrainians. Given the severity of Polish-Ukrainian relations, it is easy to imagine how this leads to an escalation of the conflict. The local Ukrainian population considers itself completely unprotected. And then from the lower ranks of the OUN-b, irritated voices are heard: "Where is our leadership? Why is it doing nothing?" Without waiting for an answer, they begin to form military units. UPA arises largely spontaneously, it is only then that the Bandera leadership begins to take control of this process. In particular, it does what is called "unification": by uniting various detachments in the Volyn forests - and often does this by force and terror, eliminating its ideological opponents. Here I have to complicate my already complicated story. The fact is that when the Bandera began their action, a different UPA was already operating in Volyn. It originated in 1941 year under the leadership of Taras Bulba-Borovets. He acted on behalf of the Ukrainian emigration government in Warsaw and considered himself and his army a continuation of the Petliura movement. Some of his officers were Melnikov. Bandera "borrowed" from Bulba-Borovets not only his rank and file, but also the name - exterminating the dissenters. For example, there is still a discussion about what happened to the wife of Bulba-Borovets: he himself argued that Bandera liquidated her, and they flatly deny it. Bandera tactics are approximately the same as the Bolshevik tactics: when they see the process evolving, they try to lead it, and when they lead it, they cut off the “extra” arms, legs, or even the head, in order to drive the process into the right frames. The Bandera argument is simple: it was necessary to avoid disunity, "atamanism" - because of what, in their opinion, the Ukrainian revolution lost in 1917-20. It should be added that during the creation of the UPA in Volyn there is a massacre of local Poles. I believe that this coincidence is not accidental: the OUN specifically provoked this massacre and used it as a mobilization factor. It was very easy to draw peasants into this massacre at that time under the pretext of, for example, solving land issues - the western Ukrainian village suffered from land hunger, and the interwar Polish government gave the best land to the local Poles ... The idea of exterminating the Poles fell, if I may say so, on favorable soil: as historians argue, it was not the Ukrainian nationalists who first expressed it, but the local Western Ukrainian communists back in the 1930s. Then, if you once dirtied your hands with blood, you no longer have where to go, you will go into the army and continue to kill. From the peasant you become a soldier. To a large extent, you can look at the Volyn massacre as a great bloody mobilization action to create the UPA. In general, the early period of the history of the UPA is not a subject of great pride, to put it mildly. The heroic period of the UPA begins with 1944 year - after the Germans left and the arrival of Soviet power, when the UPA becomes a symbol of the struggle against communism. In fact, only this period is remembered in the historical Ukrainian memory - 1944 for a year and beyond. The fact that it was in 1943 in Volyn, it is almost not remembered. To understand the heroic period, it is also important that at the end of the war, the OUN-B itself undergoes evolution. She understands that, under the slogans that exist, she will not go far, because the Soviet troops are coming, the Soviet ideology. In addition, they have their own negative experience of going east, in the Donbass, in Dnepropetrovsk: the slogan "Ukraine for Ukrainians" was alien to the local population. Then the OUN begins to change its slogans and talk about the struggle for the liberation of all nations, includes social slogans about the eight-hour working day, the abolition of collective farms, etc. REGNUM: So it can be said that the OUN definitely had a certain moment when it switched from socialist slogans to social ones? Yes, something very close to this was happening ... This is the policy of every extreme party that wants to dominate. She not only uses terror, but also appropriates other people's slogans if they turn out to be popular. The Bolsheviks, for example, adopted the slogans on the division of the land and the federation. Something similar happens with OUN-b. Then an interesting moment takes place here: at this time Stepan Bandera, who is a symbol of this movement, leaves the German concentration camp. The irony of the situation is that Bandera, having left the concentration camp, knows almost nothing about the movement that bears his name. I know this from the memoirs of Evgeny Stakhov, who himself was one of the supporters of Bandera, in the 1941 year he went to the east of Ukraine, turned out to be in Donetsk. His brother was sitting together with Bandera in a concentration camp. Stakhov says that when they came out together, Bandera and his brother asked him what the UPA is, where and how it operates. The relation, relatively speaking, between the OUN that operated in Ukraine and the leadership that turned out to be abroad, is about the same as between Plekhanov and Lenin. The young ones created the organization, went ahead, and the old ones (relatively speaking, Plekhanov - Bandera) fell behind, and in emigration they live with old ideas. And here comes a new conflict, because the UPA is too far gone to be with Bandera. When the people who created and led the UPA find themselves in the West, they try to create an alliance with Bandera. But there it quickly reaches a big split, because, according to Bandera, the OUN-B betrayed the old slogans and became such, relatively speaking, national social democracy. Subsequently, this group of people, as I said, creates its own, third OUN, cooperates with the CIA, etc. - but that's another story. REGNUM: Another high-profile moment in Ukrainian history is the relationship between the OUN and the Jews. What is known about this? I don’t know much about it, because for now there is very little good research on this topic. To avoid misinterpretation, I will say right away: the OUN was anti-Semitic. But my thesis is this: its anti-Semitism was rather pogrom, and not programmatic. I don’t know a single theorist from this wing who would write some big anti-Semitic work, which would tell in detail about what to hate and destroy Jews. For example, we have such works in the Polish tradition that express frank program anti-Semitism. I insist on the importance of the “programmatic” criterion if we speak of anti-Semitism as one of the “isms”, that is, the ideological direction. The peculiarity of Ukrainian political thought is that, with the exception of Mikhail Drahomanov and Vyacheslav Lipinsky, there were no “systemic” ideologues in it — that is, ideologists who would think and write systemically. There is always someone who wrote something - but there is no way that you can put him on a par with the "Thoughts of the Modern Pole" Dmovsky, or "Mein Kampf" of Hitler. There are certain anti-Semitic texts of Dmitry Dontsov 1930-s - but for some reason the most vivid ones he prints them not in Western Ukraine, but in America, besides under a pseudonym. Just before the war, anti-Semitic texts of another ideologue, Sciborsky, appear. However, a few years before he wrote something completely different. It seems that the appearance of these anti-Semitic texts pursues a pragmatic goal: to send a signal to Hitler and the Nazis: we are just like you, and therefore we can be trusted and need to cooperate with us. Ukrainian nationalism, rather, was so pragmatic and applied, and in a bad way. Ideologically, this movement was rather weak, because it was made by young people of 20-30 years, who had no education, who generally had no time for ideology. Many of those that survived admit that even Dontsov was too complicated for them to understand. They became nationalists "by the nature of things," and not because they had read something before. Therefore, their anti-Semitism was more pogrom than software. There is a big controversy about the position of Bandera or Stetska. There are excerpts from the publications of the diary of Stetska, where he writes that he supports Hitler’s policy regarding the extermination of the Jews. It is likely that it was. But, again, there is a big controversy about how authentic this diary is. Immediately after the proclamation of the "Ukrainian statehood" (statehood) 30 June 1941, pogroms began in Lviv. But “after” does not necessarily mean “because”. Now there is no doubt that the Ukrainian police took part in these pogroms, in which there were many nationalists from the OUN-b. But whether they did it by order of the OUN-B or on their own initiative is unknown. We have to take into account that the main wave of pogroms in the summer of 1941 swept through those territories that were in 1939-1940. were annexed by the USSR - in the Baltic countries, parts of Polish territory and in Western Ukraine. Some well-known historians — say, such famous as Mark Mazover — believe that the escalation of pogrom anti-Semitism is a direct consequence of a very brief but very violent experience of Sovietization. My father, who was only 1941 years old in 10 and then lived in a small Western Ukrainian village, recalled that as soon as the news came from Lviv about the proclamation of an independent Ukraine, the older country boys were preparing to go to the nearest town to "beat the Jews." It is unlikely that these guys read Dontsov or other ideologues. It is possible that, as in many similar situations, the OUN-B wanted to lead the process, which already “went.” One thing is clear: the OUN did not like the Jews, but did not consider them to be their main enemy - this niche was occupied by the Poles, Russians, and then the Germans. Jewry in the imagination of nationalist leaders was a "secondary enemy." They said all the time in their decisions and at meetings that it was impossible to let themselves be distracted by anti-Semitism, because the main enemy is not Jews, but Moscow, etc. ... It is clear, however, and more: if indeed by some miracle in 1941 the Ukrainian state was established according to the OUN-b scheme, then there would be no Jews there (neither would there be Poles) or they would be very hard there. Historians who are engaged in the history of the Holocaust in Western Ukraine, came to the conclusion that the behavior of local Ukrainians could not affect the "final solution" of the Jewish question. Local Jews would be exterminated either with or without the help of Ukrainians. However, the Ukrainian leadership could at least express its sympathy. During the mass extermination of Jews, the OUN-B did not issue a single warning that would strictly prohibit members of the organization from taking part in these actions. A similar document appeared in the environment of the UPA during its "democratization", i.e. only after the end of the action. And this, as the Poles say, was "mustard after dinner." It is also known that when the Jews, especially Volyn, massively fled into the woods, the UPA destroyed them. John Paul Khimka is now writing about this, and he is writing on the basis of memories. But in the memoirs, the term "Bandera" often sounds, which, as I have already said, was applied too widely in relation to all Ukrainians. In a word, I would like to see the documents - in particular, the reports of the UPA. The second "but": some Jews who fled from the ghetto, still found refuge in the UPA. There are memories on this subject, called specific names. Mostly they worked as doctors. Every army needs medical support. For various reasons, the number of doctors before the war among Western Ukrainians was small; obviously, they could not count on the Polish UPA doctors. It is said that at the end of the war these Jewish doctors were shot. There are, however, memories that say that these doctors retained loyalty to the end and, if necessary, took weapon in hand. This question, like all that concerns the topic "UPA and the Jews," is acute and little studied. There is an inversely proportional relationship: the more intense the discussion, the less they know what they are discussing. Summing up, I want to say the following: it seems to me, however, that with the resignation of Viktor Yushchenko’s presidency, the heated debate is over. Now we must expect the appearance of normal works, which would be discussed about these moments in a normal way. In the meantime, most of what you can read and hear about the OUN and UPA — including what I am talking about now — is nothing more than a hypothesis. Worse or better they are reasoned, but still it is a hypothesis. That is why new qualitative research is so important and desirable. The UPA was like the army of Makhno - a peasant and often very cruel: interview of the historian Jaroslav Gritsak - http://www.regnum.ru/news/fd-abroad/polit/...5.html?forprint"rel =" nofollow ">http://www.regnum.ru/news/fd-abroad/polit/...5.html?forprint
<urn:uuid:a26c7709-4e1b-449e-972c-319500d5450a>
CC-MAIN-2023-23
https://en.topwar.ru/3050-upa-byla-poxozha-na-armiyu-maxno-krestyanskaya-i-chasto-ochen-zhestokaya-intervyu-istorika-yaroslava-gricaka.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655143.72/warc/CC-MAIN-20230608204017-20230608234017-00427.warc.gz
en
0.973883
5,115
2.578125
3
Probably one the best preserved Gestapo Headquarters in Germany today, the Cologne building has a fascinating history and remains an eerie and horrific reminder of the once all-powerful Geheime Staatspolizei (Secret State Police). The EL-DE Haus – the name derives from the phonetic German pronunciation of the owner’s initials, L.D. for Leopold Dahmen. He constructed the building in 1933, renting it to the Gestapo until March 1945. The Gestapo modified the building by the inclusion of 10 prison cells in the basement. The entrance to one of the communal cells that could hold up to 25 people in extremely cramped and unsanitary conditions. The prisoners slept on the floor or on hard wooden pallets, and were denied blankets by the Gestapo. A very stout cell door with peep hole. Prisoners would be dragged out of these cells to the interrogation room, where they would be beaten and tortured for hours by the sadistic guards. Mark standing in the air raid shelter entrance beneath Gestapo headquarters. It was protected by a thick metal blast door (left). During the frequent and devastating air raids on Cologne by the RAF and USAAF the Gestapo would take shelter here, leaving the prisoners locked inside their cells. A sink (right), one of three inside a primitive bathroom that prisoners were permitted to use twice a day. The room also contained one toilet. In their cells, the prisoners would use a bucket in the corner to relieve themselves. No showers were available – the prisoners instead hastily washed themselves in cold water in this bathroom. Corridor with a row of cells on the left. The Gestapo NCOs who ran this prison wore field grey SS uniforms with ‘SD’ cuff diamonds and carried dog whips. Heavy duty air raid shelter door. Cologne was one of the heaviest bombed cities in Germany, with almost 35,000 tons of explosives dropped on it. Ironically, Gestapo headquarters was one of the few important buildings that survived this maelstrom largely untouched. Outside is a courtyard that was used for executions. It contained a three-noose gallows for hangings. Many prisoners were executed with a shot to the back of the neck. Shortly before the US Army captured the city, on 1 March 1945 the Gestapo hanged 70-80 young women and 30 men in the courtyard. The corpses were loaded aboard three trucks and dumped in a grave in the city’s West Cemetery. Two views outside Cologne Cathedral. (Top) a knocked out Panther tank, April 1945. (Below) the same area in 2015. For more like this, read: http://markfelton.co.uk/the-last-nazis/
<urn:uuid:787ac0c5-53c8-4a65-a438-f03e937e4e98>
CC-MAIN-2017-47
http://markfelton.co.uk/2016/01/
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934804518.38/warc/CC-MAIN-20171118021803-20171118041803-00611.warc.gz
en
0.959402
560
3.109375
3
A meditation on Lent from The Liturgical Year by Abbot Dom Guéranger, O.S.B. After having, on this day, washed the feet of His disciples, Jesus said to them: 'Know ye what I have done to you? You call Me Master and Lord: and You say well, for so I am. If then I, being your Lord and Master, have washed your feet; you, also, ought to wash one another's feet. For I have given you an example, that as I have done to you, so you do also.' Although the meaning of these words is that, after the example of our divine Master, we should practice works of fraternal charity towards our neighbour, yet the literal imitation of this our Saviour's act has always been observed in the At the commencement, it was almost a daily practice. St. Paul, when mentioning the qualities which should adorn the Christian widow, includes that of washing the feet of the saints, that is, of the faithful. We find this act of humble charity practised in the ages of persecution, and even later. The Acts of the saints of the first six centuries, and the homilies and writings of the holy fathers, are filled with allusions to it. Afterwards, charity grew cold, and this particular way of exercising it was confined, almost exclusively, to monasteries. Still, from time to time it was practiced elsewhere. We occasionally find kings and queens setting this example of humility. The holy king Robert of France, and, later, Saint Louis, used frequently to wash the feet of the poor. The holy queen St. Margaret of Scotland, and Saint Elizabeth of Hungary, did the same. The Church, with that spirit which makes her treasure up every recommendation of her divine Lord, has introduced this act of humility into her liturgy, and it is today that she puts the great lesson before her children. In every church of any importance, the prelate, or superior, honours our Saviour's condescension, by the ceremony called the washing of the feet. The bishops throughout the world follow the example set them by the sovereign Pontiff, who performs this ceremony in the Vatican. Yea, there are still to be found kings and queens who, on this day, wash the feet of the poor, and give them abundant alms. The twelve apostles are represented by the twelve poor who, according to the most general practice, are chosen for this ceremony. The Pope, however, washes the feet of thirteen priests of as many different countries; and this is the reason of the ceremonial requiring this number for cathedral churches. But, why thirteen? Some have interpreted it thus: that it represented the full number of the apostolic college, which is thirteen; for St. Mathias was elected in Judas's place, and our Lord Himself, after His Ascension, called St. Paul to be an apostle. Other authors, however, and among them the learned Pope Benedict XIV, assert that the reason of this number being chosen was the miracle related in the life of St. Gregory the Great. This holy Pope used, every day, to wash the feet of twelve poor men, whom he afterwards invited to his own table. One day, a thirteenth was present: it was an angel, whom God had sent, that He might thereby testify how dear to Him was the charity of His servant. The ceremony of the washing of the feet is also called the Mandatum, from the first word of the first antiphon. After the deacon has chanted the Gospel of the Mass of Maundy Thursday, the celebrant takes off the cope, girds himself with a towel, and, kneeling down, begins to wash the feet of those who have been chosen. He kisses the right foot of each one after having washed it. 1. 1 St. John xiii. 12-15. 2 1 Tim. v. 10. 3 De Festis D. N.J. C. lib. I. cap. vi. no. 57
<urn:uuid:c88bd417-ca46-4b05-a922-e1d982ff97a8>
CC-MAIN-2017-26
http://tradcatholicperspective.blogspot.com/2012/04/meditations-for-holy-thursday-and.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321536.20/warc/CC-MAIN-20170627185115-20170627205115-00158.warc.gz
en
0.95949
887
3
3
Whether you’ve just removed his training wheels or he’s mastered the no-hands style of riding, at some point, your kid is going to fall off his bike. But some spills are more severe – and life changing – than others. In fact, in the July issue of Metro Parent, Dr. Kelly Levasseur, a physician in the Pediatric Emergency Center at Beaumont Children’s Hospital, says that bike injuries spike in the summer months. “A simple fall for a child can mean disabling consequences,” says Amy Teddy, former program manager for injury prevention at Ann Arbor’s C.S. Mott Children’s Hospital. Help your child head to the top of the class this year.. Ace it with your FREE School Success Guide And as temperatures continue to rise, injuries related to not wearing bike helmets naturally increase. A 2013 study from Boston Children’s Hospital found that states with bicycle helmet laws have fewer bike fatalities for kids under age 16. Michigan is among the states that do not have bike helmet laws in place, though there are some local laws. And, with the weakening of the motorcycle helmet law that exempted those ages 21 and older from wearing a helmet, the trend seems to be against safety legislation – despite the statistics. Sen. Steve Bieda (D-Warren) thinks it will be difficult to enact a bike helmet law for adults, but believes it would make sense for children. Bieda, who was opposed to the change in the motorcycle helmet law, told Metro Parent in 2013 that he just passed a resolution to endorse bicycle helmet safety. “I think it does need to be promoted more,” Bieda says. “It keeps people and children safe within the community, and that’s why I’ve always promoted it.” Bieda says it’s worth the modest price of a helmet to prevent injury. “Lives are so precious. You hate to see something that is avoidable happening, especially when you’re dealing with children.” For kids under age 18, there were three deaths where a helmet was not worn in 2007 and 2008, two in 2009, five in 2010 and one in 2011, according to data from the Michigan Department of State Police. In those same years, there just one death reported of a child wearing a helmet. Injuries are another major factor. “These cases are absolutely preventable,” Teddy says. But when it comes to injury prevention, helmets aren’t the only way to keep kids safe. John Lindenmayer, executive director at the Lansing-based League of Michigan Bicyclists, says education is key. The organization works with policy makers, law enforcement and communities through advocacy and promoting bicycling. “We don’t, at this point, support a mandatory law for bicycle helmet use,” Lindenmayer says. “Studies show that helmets can become a deterrent for bike riding in general.” While he agrees that helmets are a good choice and encourages them, educating riders and drivers on how to safely coexist on the roads is a big piece of the puzzle. “You see a decline in the number of actual crashes that occur, and I think it’s because of more self awareness,” Lindenmayer says. Farmington Hills is the only city in southeast Michigan that boasts a bicycle helmet ordinance. Anyone less than 16 years of age must wear a helmet when bicycling, skateboarding or rollerblading, according to the ordinance. One warning is issued on the first offense and a $5 fee must be paid on the second offense. If a person submits proof of the purchase of a helmet to the Farmington Hills Police Department within 10 days of the violation, it will be dismissed. The perfect fit If you opt to buy a helmet for your child, Teddy suggests following five steps from Safe Kids Huron Valley – position, buckles, side straps, chin straps and final fitting. Position refers to the helmet sitting level on the head and low on the forehead – one or two finger-widths above the eyebrow. For buckles, make sure to center the left buckle under the chin. Next, adjust the side straps to form a “V” shape under and slightly in front of the ears. If possible, lock the slider. Then, buckle the chinstrap and tighten until no more than one or two fingers can fit under it. And for the final fitting, open your mouth and yawn. The helmet should pull down on the head. If it’s rocking forward or back, readjust following the directions. Finally, roll the rubber band down to the buckle. All four straps have to go through the band and be close to the buckle to prevent slipping. This ensures the proper fit for safe riding for your child. “Safety should not be negotiable,” Teddy says. This article was originally published in July 2013 and has been updated.
<urn:uuid:089dd264-bf61-4805-adcb-f58b007ec009>
CC-MAIN-2017-43
https://www.metroparent.com/daily/parenting/parenting-issues-tips/bicycle-helmet-safety-kids/
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823839.40/warc/CC-MAIN-20171020063725-20171020083725-00531.warc.gz
en
0.94998
1,058
2.71875
3
The Wool Exchange, also known as The Royal Exchange The image above shows a grand building which once was at the heart of Sydney’s business activities. The postcard describes the building as the Wool Exchange, but in actual fact its proper name is The Royal Exchange. However, the building was the site of wool auctions in Sydney and in time became the worlds greatest centre of wool sales. Although the Royal Exchange can trace its history back to the 1820s, it was not until 1851 that the Royal Exchange Company was formally created. The aim of the company was to create a place where the business community of Sydney could meet and conduct business. Land was granted to the company in Gresham Street and by 1857 the building was complete. Many leading citizens of Sydney’s business world soon became members of the exchange including John Fairfax, T S Mort, Robert Tooth and W C Wentworth. The building itself may have a fascinating history, but what went on inside the walls is truly remarkable. The first telegraph message sent in NSW was sent from the exchange on the day that it opened and within a week a telegraph line was installed linking the exchange directly with the signal station at South Head. Many prominent associations of the time were formed within the walls of the exchange including the Royal Humane Society of NSW and even early attempts to form the Chamber of Commerce were undertaken here! NSW first telephone system was installed in the exchange in 1880, connecting the exchange with the Darling Harbour Woolsheds. Just weeks later numerous wharves had been connected and by 1882 there were 300 subscribers to the system. Even the first public demonstration of electric lighting in the colony took place here, being held in the dining room on the 6th of December 1882. Although The Royal Exchange itself still exists today, in the same location, the beautiful building which was once such a prominent landmark and bore witness to so many historic events is now long gone, replaced by a modern Royal Exchange. The image above is a glimpse into the history of an area of North Sydney which today looks very different. Folly Point and Cammeray more generally were once an area given to dairy farming and quarrying, but today Cammeray is a built up area full of homes, manicured gardens and handsome tree lined streets. Cammeray is named after the Cammeraygal, the Aboriginal group who lived in the area. Though this name has a clear derivation, the name Folly Point is a little more mysterious. Such an evocative title – but what was the folly to which the name refers? Sadly nobody truly knows how the name came to be. There are two main theories though. Some suggest the area is named after Captain Charles McKinnon who was the commander of explosives hulks moored in the Seaforth area. The folly itself in this theory remains something of a mystery. The second theory suggests that a landowner in the area, by the name of Levy is responsible for the name. Apparently he built his house on Folly Point, but he mixed his mortar with the salty sea water and the house collapsed. The name folly refers to the fact that he then did the same thing again, with the same results. However the area came to be named, it is an area which has played an important role in Sydneys Depression era history, not just in the Great Depression but also the previous 1890s Depression. During the earlier period of depression a shanty settlement grew up in the bushland at Folly Point. It was known as Tin Town and became home to many out of work Sydneysiders. It was also during this period that talented Australian poet Barcroft Boake tragically committed suicide at Folly Point, hanging himself with his stockwhip. Tin Town persisted after the depression ended and when depression again hit in the 1930s it was still a working settlement. Again, the unemployed moved into the rough tents and shacks. Coke Oven Unit At B.H.P Company The image above is a stark and I think artistic view of a trade which was once central to Newcastle and the area. Although now gone from the area, BHP once employed vast numbers of Newcastle residents, and supplied still more who worked in the mines supplying raw product, with jobs. In the early 1900s Australia was demanding more and more steel and in 1911 BHP (Broken Hill Propriety LTD) decided to step in and begin to manufacture the precious resource. They decided Newcastle would be the perfect place to build their steelworks as there was a harbour which could be used for transport, a ready workforce, and they already owned land in the area. The steelworks opened in 1915. In order smelt iron and make steel, another product was needed though – coke. To smelt iron the iron ore has to be reduced and to do this, you need carbon. Burning carbon creates carbon monoxide which reacts with the iron ore. Combine this with high heat and the iron melts and can be drained off. Coking coal is a fuel with very few impurities and an extremely high carbon content which is made from coal and widely used in the steel industry. BHP in Newcastle made its own coke on site. To do this, they needed coke ovens which could heat the coking coal to very high temperatures, driving off impurities and leaving behind coke. This could then be either stored or transferred directly to the blast furnaces. Last week, as many readers will be aware, the Lancers Parade was held in Parramatta to commemorate 125 years of the Royal New South Wales Lancers. What many do not know is about the important history of this military group in Australia’s and indeed world history. The Royal New South Wales Lancers were formed in 1885, though they were then known as the New South Wales Cavalry Reserves. They were renamed the New South Wales Lancers in 1894, but the ‘Royal’ in their title was not added until 1935. Today they are known as the 1st/15th Royal New South Wales Lancers. Since the late 1800s their barracks have been located in Parramatta and their nickname is the Parramatta Lancers. The Barracks themselves predate the formation of the Lancers and have a fascinating history in their own right. The Lancers have a distinguished history of active service, dating back to the Boer War. In 1899 a squadron of the Lancers who had been training in England were the first Colonial troops to actually arrive in South Africa. During the 1st World War, the Lancers were a militia unit and as a result they did not serve abroad, though they did receive a number of battle honours. However, many pre-war members of the Lancers did join up for service, joining the Australian Imperial Force. Many of them served in the famous Light Horse Regiments which fought in Gallipoli, Sinai and Palestine. In fact the Light Horse Regiments included a substantial number of Lancer trained men. Subsequently the Royal New South Wales Lancers were actually designated the successors of the 1st Light Horse Regiment and later still, in 1956, the 1st was linked with the 15th, making them also the successors of the 15th Light Horse Regiment. During the 2nd World War the Lancers were incorporated into the 2nd AIF as an armoured regiment and served in New Guinea and Borneo. In fact, the regiment made the heaviest Australian tank attack of the war. Since the 2nd World War, the Lancers have continued to serve, with full time units seeing service in Bougainville, Malaysia, East Timor and the Solomon Islands. They currently hold 21 military honours, making them one of the most decorated units in the Australian Army.
<urn:uuid:89dfb5c8-1787-4f6c-a801-0b49dabfc9cd>
CC-MAIN-2020-10
https://australiaspastpresent.com/2014/09/
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145941.55/warc/CC-MAIN-20200224102135-20200224132135-00030.warc.gz
en
0.985196
1,590
2.828125
3
By Wyatt Myers If you live in a big city, you only have to look at the hazy skyline on a hot, windless day to see that cars are bad for air quality. But all this traffic is an even greater problem if you have air pollution-related asthma. It's pretty clear this pollution can exacerbate symptoms and even cause an asthma attack. Though many of us rely on cars every day, they can negatively affect asthma in more ways than one. If you frequently experience indoor asthma, sitting inside a car can be a trigger for you. Luckily, getting rid of asthma symptoms doesn't mean giving up your car or moving to a town with a one-lane road. With a few simple strategies, you can minimize the effects of air pollution caused by our love affair with automobiles. Cars, Air Pollution, and Asthma According to Sumita B. Khatri, MD, the co-director of the Asthma Center at the Cleveland Clinic Respiratory Institute, the two main culprits that contribute to air pollution asthma are atmospheric ozone and particulate matter from car exhaust in the air. "Both pollutants can strain airways in asthma by increasing inflammation and susceptibilities to allergies and infections," Dr. Khatri says. And the more cars on the road, the worse the effects can be. "In general, more cars means more particulate pollution in the air, so larger cities with more vehicular traffic are worse than smaller cities with less traffic," says Gary Weinstein, MD, chairman of pulmonology at Texas Health Presbyterian Hospital in Dallas. "In addition, summer tends to be worse than winter for air pollution, probably due to more driving, mowing, and other activities. Midday is worse than early or late in the day for the same reasons." Not surprisingly, Los Angeles, Dallas, Houston, and Atlanta, in addition to several cities on the Eastern seaboard, are some of the worst places for air pollution, according to AirNow.gov, where you can monitor your local air quality. When it comes to avoiding asthma symptoms related to air pollution, the best approach is to avoid being outdoors when air quality is at its worst. "Avoid doing outdoor activities or exercise from 10 a.m. to 2 p.m.," says Dr. Weinstein. "Early morning or late evening would be better. If those times cannot be avoided, consider doing exercise indoors, if possible." Stopping Asthma in Your Car Outside the car, it's easy to understand how exhaust fumes can contribute to asthma. But you might be surprised to hear that asthma can be a serious issue inside your vehicle, too. Whether it's pet dander, smoking, strong odors, dirt and debris, or particulate matter that travels into the car from outside, all of these factors can lead to experiencing indoor asthma in cars. To protect yourself, Khatri recommends steering clear of your known triggers when in your car — don't allow friends to smoke, avoid taking your pet with you, and use non-offending air fresheners and cleaners if the harsh chemicals in commercial products irritate you. He suggests regularly wiping down all seats in your car with a damp cloth or using washable seat covers if pets must ride in the car. When driving on high-ozone days, try using your air conditioner and keeping the windows up. Conversely, roll down the windows to bring in fresh air on a good air quality day. Another helpful tip from Khatri to avoid this type of indoor asthma is to turn off the engine when you're idling — whether quickly parked or waiting for someone to come out of the doctor's office. "There's no disadvantage to stopping and restarting the engine if you plan on staying put for 30 seconds or more because it takes less fuel to turn it off and re-start it," she says. "This helps reduce ozone and particulate matter pollution for all." Also on HuffPost: Women's Mental Health A study published last year in the <em>Journal Of Health Economics</em> showed that <a href="http://www.huffingtonpost.com/2011/08/24/commute-womens-health_n_935361.html" target="_hplink">women's mental health</a> is affected more than men's by a daily work commute. The study included data from the British Household Panel Survey, which found that women who had kids of preschool age also a fourfold increased risk of experiencing stress from their commute than men. <br><br> "We know that women, especially those with children, are more likely to add daily errands to their commute, such as food shopping and dropping off and picking up children from childcare," study researcher Dr. Jennifer Roberts, of the University of Sheffield, <a href="http://www.guardian.co.uk/money/2011/aug/22/communting-more-stressful-women-men" target="_hplink">told <em>The Guardian</em></a>. "These time constraints and the reduced flexibility that comes with them make commuting stressful in a way that it wouldn't be otherwise." Exhaustion And Less Sleep A 2011 study in the journal <em>BMC Public Health</em> showed that <a href="http://www.huffingtonpost.com/2011/10/31/commute-health-car-bus_n_1067503.html" target="_hplink">commuting by car, subway or bus</a> is linked with extra stress, exhaustion, poor sleep and even more missed days from work. <br><br> The study involved commute and health data from 21,000 people ages 18 to 65 who live in Sweden and work full-time. People who traveled via a vehicle to work were more likely to have health complaints than people who walked or biked to work, the researchers found. Heart Attack From Traffic Pollution A study in the <em>British Medical Journal</em> showed that <a href="http://www.huffingtonpost.com/2011/09/22/traffic-heart-attack-pollution_n_974668.html" target="_hplink">breathing in the fumes from heavy traffic</a> can hike up your risk of heart attack for the following six hours. <br><br> The good news is the heart attack risk goes down gradually after that time frame. Researchers said it's not that the air pollution causes people to have heart attacks who wouldn't otherwise have them, but rather could <a href="http://www.medicalnewstoday.com/articles/234784.php" target="_hplink">hasten heart attacks</a> in people who would have had one anyway, Medical News Today reported. <br><br> That study included 79,288 people in the United Kingdom who had had a heart attack between 2003 and 2006. Researchers looked at the time of day of their heart attacks, and also looked at traffic pollution in different parts of the UK. People whose commutes are longer than 15 miles in distance are also <a href="http://www.huffingtonpost.com/2012/05/09/work-commute-overweight-health-blood-pressure_n_1500459.html" target="_hplink">more likely to weigh more</a>, according to research from Washington University in St. Louis. <br><br> The <a href="http://www.elsevier.com/wps/find/authored_newsitem.cws_home/companynews05_02321" target="_hplink"><em>American Journal of Preventive Medicine</em> study</a> showed that people have to travel that distance every day to go to work are also less likely to fulfill exercise recommendations. They also found that people traveling more than 10 miles a day to go to work are more likely to have hypertension. <br><br> "It could just be a function of having less discretionary time to be physically active," study researcher Christine M. Hoehner, Ph.D., MSPH, <a href="http://abcnews.go.com/Health/Wellness/commuting-drives-weight-blood-pressure/story?id=16294712#.T6lCHp9Ytvc" target="_hplink">told ABC News</a>. "Or it could be related to people burning fewer calories because they're sitting longer." Increased Risk Of Divorce Swedish researchers from Umea University have found a link between <a href="http://www.alphagalileo.org/ViewItem.aspx?ItemId=104021&CultureCode=en" target="_hplink">long commute times and divorce</a>. <br><br> The researchers found that couples who have to commute long distances have a 40 percent higher risk of divorcing than other people. Their findings are based on 2 million people in Sweden who were either married or living together, analyzed between 1995 and 2005. <br><br> The researchers found that it's the first few years of traveling long distance for work that is particularly hard on couples. Is A Deterrent To Friend Time A 2008 study in the <em>American Journal of Preventive Medicine</em> shows that the length of distance you have to travel could actually influence whether you <a href="http://www.ncbi.nlm.nih.gov/pubmed/18312808" target="_hplink">participate in social activities</a>. <br><br> The study included data from the 2001 National Household Travel Survey, which looked at commute times and the social nature of the trips. "Socially-oriented" trips included those to see friends or family; for entertainment purposes; to go to a wedding, funeral or other event; to go exercise or play sports; to go to school or a religious event; to take someone somewhere; to go to a meeting for an organization; to attend to an obligation; and to just do something fun (recreational). <br><br> The researchers found that if a person's commute time was going to be longer than 20 minutes -- and especially if it was longer than 90 minutes -- the likelihood of the person <a href="http://www.ncbi.nlm.nih.gov/pubmed/18312808" target="_hplink">participating in the social event</a> decreased. A study by Hewlett Packard showed that commuting can <a href="http://news.bbc.co.uk/2/hi/uk_news/4052861.stm" target="_hplink">raise stress even higher</a> than that of people who work as police officers and fighter pilots, BBC News reported. <br><br> "The difference is that a riot policeman or a combat pilot have things they can do to combat the stress that is being triggered by the event ... but the commuter, particularly on a train, cannot do anything about it at all," study researcher Dr. David Lewis, of the International Stress Management Association <a href="http://news.bbc.co.uk/2/hi/uk_news/4052861.stm" target="_hplink">told BBC News</a>. "So it is this sense of helplessness combined with the stress that is perhaps the most worrying aspect of it." <br><br> The researchers examined the heart rates of study participants after commuting during peak hours, and found that their heart rates were a lot higher than the "at rest" rate, <a href="http://www.guardian.co.uk/uk/2004/nov/30/research.transport" target="_hplink"><em>The Guardian</em> reported</a>. How To Bike To Work Learn how to commute to work on a bicycle with these steps.
<urn:uuid:a71b82d5-50b6-4829-b87f-68e1d16a116b>
CC-MAIN-2014-10
http://www.huffingtonpost.com/2012/09/28/car-asthma-worse_n_1923363.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999650252/warc/CC-MAIN-20140305060730-00055-ip-10-183-142-35.ec2.internal.warc.gz
en
0.935316
2,514
2.84375
3
Exchange of gases Exchange of gases or gas exchange is carried out by organisms, where different gases move in different directions. Animals, microorganisms and plants breathe out carbon dioxide and breathe in oxygen. To balance the composition of air, plants use carbon dioxide to carry out photosynthesis, so oxygen is made. Plants only carry this out during the day, when there is sunlight. Plants respire all day and night. In humans, gas exchange happens in the alveolus (alveoli for plural). These are in the lungs. Oxygen diffuses into the bloodstream, from the air. Oxygen is used in aerobic respiration. Carbon dioxide diffuses out of the bloodstream, into the air. Carbon dioxide is a waste product made by respiration.
<urn:uuid:228d59d7-203e-4116-9cd7-74e6a188d166>
CC-MAIN-2017-34
https://simple.wikipedia.org/wiki/Exchange_of_gases
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886112533.84/warc/CC-MAIN-20170822162608-20170822182608-00074.warc.gz
en
0.898145
156
3.578125
4
Posted by WBHI on Jun 29, 2012 in Think It Over by Alice G. Walton for Forbes: It’s a good thing that Obamacare has passed, because it looks like more and more of us are going to need it. Alzheimer’s disease is projected to affect 80 million people in the next 20 years, and we’re only in our infancy of understanding the cause(s) of this most common form of dementia. Recent years, however, have brought to light some interesting and startling links, and researchers are beginning to understand more about how the disease spreads through the brain, and indeed how it may begin. And while there are probably several origins, one of the triggers may be, alarmingly, something many of us experience: Stressful life events. A new study from Britain will look further into the connection between chronic stress and the development of dementia. The concept that lifetime stressors could trigger the development of the disease, or at least facilitate the leap from mild cognitive impairment (MCI) to full-blown dementia, has gained momentum in recent years, and researchers are starting to devote more resources to exploring the relationship more fully. Posted by WBHI on Jun 27, 2012 in Think About It by Janice Wood for Psych Central: The spread of Alzheimer’s disease through the brain leaves dead neurons and forgotten thoughts in its wake. But researchers haven’t figured out how the disease spread. Through experiments using stained neurons, a research team at Linköping University in Sweden has been able to demonstrate the process of neurons being invaded by diseased proteins that are then passed on to nearby cells. “The spread of Alzheimer’s, which can be studied in the brains of diseased patients, always follows the same pattern. But until now, how and why this happens has not been understood,” says Martin Hallbeck, M.D., associate professor of pathology, who led the research team. The disease starts in the entorhinal cortex — a part of the cerebral cortex — and then spreads to the hippocampus, two areas important for memory. Gradually, pathological changes take place in more and more areas of the brain, while the patient becomes even sicker, the researcher notes. Posted by WBHI on Jun 26, 2012 in Sooner Than You Think by Medical XPress: Scientists from VTT Technical Research Centre of Finland in collaboration with the University of Eastern Finland have recently discovered a serum biochemical signature which predicts progression to Alzheimer’s disease months or even years before the first symptoms of the disease occur. The goal of the new collaboration between VTT and GE Healthcare is to validate this biomarker in a large patient cohort as well as to discover novel biomarker candidates. Alzheimer’s disease (AD) is a growing challenge to the health care systems and economies of developed countries with millions of patients suffering from this disease and increasing numbers of new cases diagnosed annually with the increasing ageing of populations. Early detection of prodromal AD is vital both for assessing the efficacy of potential AD therapeutic agents as well as new disease modifying therapies are most likely to be effective when initiated during the early stages of disease. Posted by WBHI on Jun 25, 2012 in Think Twice, Wishful Thinking by Market Watch for The Wall Street Journal: Scientists at The Brain Institute at the University of Utah unveil potential cognitive-enhancing effects in healthy adult women. Healthy, middle-aged women taking supplements of citicoline, a naturally occurring brain health nutrient, saw improved attention, focus and recall, according to a peer-reviewed study conducted by University of Utah scientists. The study was published Wednesday in Food and Nutrition Sciences. The double blind, placebo-controlled study composed of 60 healthy women between 40 and 60 years of age. After 28 days of citicoline administration, the study participants taking 250 mg indicated improved performance on cognitive function tests, and those taking 500 mg showed improvement and made significantly fewer errors on the tests compared to those in the placebo group. Posted by WBHI on Jun 25, 2012 in Come To Think Of It by The Alzheimer’s Association: Mixed dementia is a condition in which abnormalities characteristic of more than one type of dementia occur simultaneously. Physicians may also call mixed dementia “Dementia – multifactorial.” In the most common form of mixed dementia, the abnormal protein deposits associated with Alzheimer’s disease coexist with blood vessel problems linked to vascular dementia. Alzheimer’s brain changes also often coexist with Lewy bodies. In some cases, a person may have brain changes linked to all three conditions — Alzheimer’s disease, vascular dementia and dementia with Lewy bodies. by Medical XPress: Women with moderate to severe depression had substantial improvement in their symptoms of depression after they received treatment for their vitamin D deficiency, a new study finds. The case report series to be presented at The Endocrine Society’s 94th Annual Meeting in Houston. Because the women did not change their antidepressant medications or other environmental factors that relate to depression, the authors concluded that correction of the patients’ underlying shortage of vitamin D might be responsible for the beneficial effect on depression. “Vitamin D may have an as-yet-unproven effect on mood, and its deficiency may exacerbate depression,” said Sonal Pathak, MD, an endocrinologist at Bayhealth Medical Center in Dover, Del. “If this association is confirmed, it may improve how we treat depression.” Posted by WBHI on Jun 25, 2012 in Think It Over by Michelle Roberts for BBC News: UK experts are to begin a study to find out if stress can trigger dementia. The investigation, funded by the Alzheimer’s Society, will monitor 140 people with mild cognitive impairment or “pre-dementia” and look at how stress affects their condition. The researchers will take blood and saliva samples at six-monthly intervals over the 18 months of the study to measure biological markers of stress. They hope their work will reveal ways to prevent dementia. The results could offer clues to new treatments or better ways of managing the condition, they say. People who have mild cognitive impairment are at an increased risk of going on to develop dementia – although some will remain stable and others may improve. And past work suggests mid-life stress may increase a person’s risk of Alzheimer’s disease. by News Medical: Scientists at Charité – Universitätsmedizin Berlin have succeeded in recommending a new type of therapeutic approach to dementia. The study published in the journal Neurology shows that immune reactions against the body’s own nerve cells can be the cause of advanced dementia and an appropriate immune suppressive therapy can develop with significant effectiveness. Dementia burdens society with high costs, and those affected by it and their family members carry a tremendous psychosocial burden. Dementia is increasingly perceived as a sword of Damocles over an aging society due to its often unclear origin, difficult prevention and unsatisfactory therapies. Together with a workgroup and cooperation partners in Germany and the US, Dr. Harald Prüβ, physician at the Klinik für Neurologie of the Charité, was able to prove that dementia is also caused by the immune system. As an accessory symptom of an autoimmune disease, dementia can thus be treated. This approach to diagnostic criteria has been overlooked until now. by Dr. Douglas Fields for Huffington Post: Dementia and osteoporosis are two of the most common health conditions affecting older women; interestingly, a new study finds a strong link between the two. Loss of bone density, which can be measured easily by X-ray, strongly correlates with cognitive decline in postmenopausal women. The findings also suggest that similar studies should be conducted in men. Menopause is not normally associated with changes in memory or cognitive performance, but estrogen deficiency can cause cognitive impairment, and low estrogen level is also a risk factor for weak bones and osteoporosis. Women who have had both ovaries removed before the age of 45 are at significantly-increased risk of cognitive impairment and dementia. Studies suggest that women suffer Alzheimer’s disease at up to three times the rate of men. Forgetfulness is the mildest form of cognitive decline in postmenopausal women, but 10-15 percent of women diagnosed with mild cognitive impairment will develop Alzheimer’s disease. by David Perlman for San Francisco Chronicle: The mysterious proteins called prions, which build up in the human brain to cause Alzheimer’s and other dementias, are also linked to post-traumatic stress disorder in combat veterans and in the brain damage of athletes like football players who have suffered repeated concussions, UCSF researchers report. These conclusions from a long, and at times controversial, research quest come from Nobel Prize-winning UCSF neurologist Stanley B. Prusiner and his colleagues at the medical center’s Institute for Neurodegenerative Disease in Mission Bay, where a difficult search for compounds that might block the prions is about to begin. The brain diseases caused by prions include Alzheimer’s, Parkinson’s and Huntington’s, amyotrophic lateral sclerosis, also known as Lou Gehrig’s disease, and other varied disorders known collectively as the frontotemporal dementias, Prusiner said. Among those, he said, are the dementias suffered by some contact sport athletes, as well as “soldiers from the Iraq and Afghanistan wars.”
<urn:uuid:5c39f38e-d95e-4f57-9b41-c56e6db5702c>
CC-MAIN-2013-20
http://womensbrainhealth.org/thinktank/2012/06/
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368699684236/warc/CC-MAIN-20130516102124-00081-ip-10-60-113-184.ec2.internal.warc.gz
en
0.941114
1,977
2.734375
3
Business Intelligence (BI) is used to turn data into actionable information for leadership, management, organisation and decision making. What is business intelligence? BI refers to an assortment of tools that provide quick, easy-to-absorb access to insights about an organisation’s current state, based on available data. The data from business operations or activities is stored and analysed, in order to optimise overall performance. Why is business intelligence important? Due to the increase of technology and the surge in big data we produce daily, institutions face mounting competition, unpredictable client demands, and the need for firm control and risk management in a largely developing market. Businesses need to perform business intelligence practices to make the most out of this data-driven transformation. Business intelligence tools are crucial to effective measurement through the use of key performance indicators (KPIs) and metrics across all levels of an organisation, in all industries. Examples of business intelligence: As mentioned, there are a number of businesses that are using BI to optimise their processes and stay competitive. Starbucks uses BI to amass individualized purchase data on millions of customers, through their Loyalty Card program, allowing them to predict what purchases and offers an individual customer is likely to be interested in. Not only does this give them an idea of what products people want to buy, it also draws existing customers to their stores and increases sales figures. Practically every step of Amazon’s supply process is also influenced by data and BI tools. BI allows them to optimize their shipping routes and allocate inventory among warehouses. Amazon also uses BI to personalize product recommendations and market products specifically to customers based on their user data. Business intelligence vs. business analytics Organisations conduct business analytics as part of their larger business intelligence strategy. Business intelligence is descriptive, informing you of what’s currently happening and what happened in the past to get you to where you are now. Business analytics, however, is a term for data analysis techniques that are predictive: they can tell you what’s going to happen in the future, and prescriptive: they can tell you what you should be doing to create better outcomes, and stay ahead of the curve. How do I know when to use business intelligence for my business? In short, BI is useful for any type of business. For example, a global industrial manufacturing company could use business intelligence to produce more precise demand forecasts for efficient manufacturing planning, whereas a fashion company could use business intelligence to process retail data from multiple stores to streamline customer experience. It all depends on your specific business needs. Implementing business intelligence is a necessary step for your business’s growth if you find your company needs to: - Identify areas or ways to increase profit - Analyse customer behavior - Compare data with competing businesses - Track company performance - Optimise company operations - Predict success of new ventures - Identify market trends - Identify any business issues or problems How can business intelligence help businesses: BI can, and should, be applied across all enterprises. Business intelligence tools provide your company with quick answers to critical business questions, aligns activities with strategy, reduces time spent on data entry and manipulation, offers in-depth real time insights into customer behavior, benchmarks data against competitors and historical data for continuous improvements, identifies and analyses areas to cut costs and for budget allocation, and boosts internal productivity by spending time on what’s important. Websfarm's Business Intelligence strategy We believe that BI is imperative in your business’s digital transformation strategy. To make good change, businesses with the help of BI solutions will improve operations, increase efficiency, and meet organisational goals. Our method of combining the best practices of inbound marketing and BI, to personalize the customer experience and streamline customer behaviour into actionable data, will advance your business substantially while giving it a competitive edge. Business intelligence software and systems Business intelligence software encompasses the tools that make it possible to create value from big data. Therefore, there are a variety of tools that fall under the BI umbrella. BI software technologies include data warehouses, ad hoc reporting, data discovery tools and cloud data services. Some of the most important categories and features are: - Data mining - ETL (extract-transfer-load — tools that import data from one data store into another) - OLAP (online analytical processing)
<urn:uuid:0d2a4d65-51d3-4c50-a7cf-2e313b04da30>
CC-MAIN-2023-23
https://www.websfarm.net/what-is-business-intelligence/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224643585.23/warc/CC-MAIN-20230528051321-20230528081321-00353.warc.gz
en
0.921632
917
2.59375
3
Skip to 0 minutes and 6 secondsThis week you're going to learn about Shakespeare's great Scottish tragedy, Macbeth. The play includes one of Shakespeare's most powerful female characters, Lady Macbeth, who wants power so much that she persuades her husband, Macbeth, to commit murder. It's a brilliant psychological study of what can happen when people want power and will do anything to get it. To tell you the story this week is actor Shaheen Khan, whose film roles include Bend It Like Beckham and who has performed the role of Lady Macbeth on stage. She tells us about playing this fascinating character. You'll also learn and practise some of the idioms used in this great play, which is still popular today. Welcome to Week 3 Anthony introduces some of the themes for this week where we’ll look at Macbeth. - What do you know about the story of Macbeth? Share your ideas with other learners. © British Council
<urn:uuid:b58ca95f-28ad-4452-bc41-9e338896487f>
CC-MAIN-2020-24
https://www.futurelearn.com/courses/explore-english-shakespeare/2/steps/72015
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347385193.5/warc/CC-MAIN-20200524210325-20200525000325-00407.warc.gz
en
0.95886
204
3.640625
4
Scottish by birth, Frances Wright earned her reputation as a reformer in the United States. She was an early champion of women's rights, democracy, the working class, and abolition. Wright believed slaves had to be prepared to live as free people, so, in October of 1825, she purchased a few slaves and some land in the present Germantown area, establishing the Neshoba Plantation. Her idea was to train slaves to be self-supporting. After they earned enough money to buy their freedom, the funds would be used to buy another group, and the process would repeat. Unfortunately, the Neshoba Plantation experiment failed within a few years. In early 1830, Wright took the remaining 31 slaves to Haiti and to their freedom. The experiment had cost Frances Wright her money and her health, while accomplishing very little. She died in Cincinnati, OH, on 12 December 1852.
<urn:uuid:f57431a2-1186-40e0-ab43-e2bcc05ecf62>
CC-MAIN-2017-39
http://wknofm.org/post/frances-wright
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689775.56/warc/CC-MAIN-20170923175524-20170923195524-00461.warc.gz
en
0.991633
189
4.03125
4
Tree removal services are often provided by trained and experienced tree surgeons, also known as arborists or tree experts. While tree preservation is generally preferred, there are several valid reasons for removing a tree when necessary. Here are some of the main reasons: - Dead or Dying Trees: Trees that are dead or dying pose significant risks as they become unstable and more prone to falling. Falling limbs or the entire tree can cause property damage, injury, or even fatalities. A tree surgeon can assess the health of a tree and determine if it needs to be removed for safety reasons. - Disease and Infestation: Trees affected by severe diseases or infestations may not respond well to treatments, and their presence could spread the issue to nearby healthy trees. To prevent the spread of diseases or pests, removing the affected tree is often the best course of action. - Structural Issues: Some trees may have structural problems like extensive rot, decay, or weak branches that compromise their stability. Such trees can become hazardous during storms or high winds and may need to be removed to avoid potential accidents. - Obstruction and Interference: Trees that interfere with power lines, buildings, roadways, or other structures may need to be removed to prevent further damage or safety hazards. Tree surgeons can safely remove trees in confined spaces while minimizing the impact on the surrounding environment. - Root Damage and Foundation Issues: The roots of large trees can exert substantial pressure on building foundations, causing cracks and other structural problems. In such cases, removing the tree can be a proactive measure to prevent further damage to the property. - Landscaping and Aesthetics: In certain instances, tree removal may be necessary to enhance the overall aesthetics of a property or to make room for new construction or landscaping projects. - Overcrowding and Competition: In dense forests or crowded urban environments, trees can compete for resources such as sunlight, water, and nutrients. Removing some trees strategically can help improve the health and growth of the remaining trees. - Invasive Species: Non-native and invasive tree species can outcompete and harm native vegetation, disrupting the local ecosystem. Removing invasive trees is crucial for maintaining the ecological balance and protecting biodiversity. - Tree Risk Assessment: Arborists conduct thorough risk assessments to evaluate the potential dangers posed by trees in specific locations. If a tree is found to be at high risk of failure, removal may be recommended to avoid accidents. It is essential to note that tree removal should always be approached with caution and expertise. Trained tree surgeons can assess the situation, identify potential hazards, and safely remove trees while minimizing any negative impacts on the surrounding environment. Additionally, after a tree is removed, arborists can advise on suitable replacement tree species or other landscaping options to maintain the ecological balance and aesthetic appeal of the area. A tree surgeon, also known as an arborist, is a professional who specializes in the planting, care, and maintenance of trees. This person is educated in the science and art of planting, maintaining, and managing trees, shrubs, and other perennial woody plants. Tree surgeons are often called upon to analyze and treat trees that are sick or damaged, but their work also includes preventative care, aiding the tree’s growth and overall health. A significant part of the tree surgeon’s job involves the manipulation of a tree’s structure, often through a process called crown work, which primarily involves pruning. Here are the different types of crown pruning services: 1. **Crown Thinning**: This process involves the selective removal of stems and branches to increase light penetration and air movement throughout the crown of a tree. This can improve the tree’s structure and shape while reducing the risk of storm damage. 2. **Crown Lifting**: This involves the removal of the lowest branches and/or preparing lower branches for future removal. It’s often done to increase clearance between the ground and the tree’s canopy for pedestrians, vehicles, buildings or lines of sight. 3. **Crown Reduction**: This reduces the size of a tree, often for clearance for utility lines. Reducing the height or spread of a tree is best accomplished by pruning back the leaders and branch terminals to lateral branches that are large enough to assume the terminal roles (at least one-third the diameter of the cut stem). 4. **Crown Cleaning**: This is the removal of dead, dying, diseased, crowded, weakly attached, and low-vigor branches from the crown of a tree. 5. **Pollarding**: This is a method of pruning that keeps trees and shrubs smaller than they would naturally grow. It is normally started once a tree or shrub reaches a certain height, and annual pollarding will prevent the plant from becoming too large. 6. **Deadwooding**: This involves the removal of dead, dying, or diseased branches from the tree. It is important for the health of the tree and for safety, as dead branches can fall without warning. Each of these services has its own benefits. For example, crown thinning can improve a tree’s health and aesthetic appeal. Crown lifting can provide necessary clearance for pedestrians or vehicles. Crown reduction can protect utility lines and properties from damage, and crown cleaning can help maintain the overall health of the tree. Moreover, tree surgeons always ensure environmentally friendly removal. They understand the importance of trees to the environment and strive to balance tree care and removal with sustainability. This may involve strategies like chipping pruned branches to use as mulch or ensuring safe habitats for wildlife even after tree removal. After the completion of the work, a professional tree surgeon will also ensure a thorough clean-up of the property. They will remove all debris, branches, and leaves, and will aim to leave your property as clean as it was before they started their work. This not only enhances the appearance of your property but also prevents potential risks or inconveniences caused by leftover debris. To conclude, a tree surgeon provides a comprehensive tree crown working service that includes an array of pruning options tailored to your specific needs. With a detailed consultation, they ensure your trees are healthier, safer, and more attractive, all while respecting the environment and maintaining the cleanliness of your property. At Hale Tree Surgeons, we take immense pride in our work as a diligent and hard-working team of local arborists. We bring a wealth of experience to the table, honed over 30 years, and have developed a deep understanding of the art and science of tree care. Our primary focus is on tree felling, where we safely bring down trees that may pose risks to people or property. Whether it’s a diseased tree, storm-damaged tree, or one that needs removal for landscaping purposes, we have the expertise and equipment to handle the task efficiently and safely. In addition to tree felling and removal, we specialize in tree logging. This involves the careful harvesting and extraction of trees from designated areas, with minimal impact on the surrounding ecosystem. We follow sustainable logging practices, complying with local regulations and guidelines for responsible forestry. We also offer stump removal and stump grinding services to eliminate unsightly stumps from your landscape. Using specialized machinery, we completely remove the remnants of tree stumps, enhancing the aesthetics of your property and eliminating potential hazards, providing a clean slate for new landscaping projects. Site clearance is another area where we excel. Whether you’re preparing for construction, landscaping, or any other development project, we efficiently clear the area of trees, shrubs, and debris, ensuring a clean and organized workspace. We handle projects of all sizes, from small residential lots to large commercial properties. Furthermore, we specialize in tree shaping and reduction. Through pruning techniques and shaping methods, we enhance the visual appeal of trees, promote healthy growth patterns, and maintain a balanced canopy. Our skilled arborists understand the specific needs of different tree species, providing tailored care for optimal health and appearance. We recognize that tree-related emergencies can arise at any time, which is why we offer 24/7 emergency services. Whether it’s a fallen tree blocking a road or a hazardous tree threatening your property, our team is prepared to respond promptly and ensure the safety of you and your surroundings. Over the years, we have established an outstanding reputation based on our unwavering commitment to doing what’s right. Customer satisfaction is our top priority, and we strive to deliver impeccable service in every project we undertake. Our arborists are not only highly skilled professionals but also friendly and approachable individuals who listen to your needs and provide expert advice. When you choose our team of arborists, you can trust that you’re selecting a knowledgeable and experienced group with a genuine passion for trees. We are dedicated to preserving the beauty and health of your trees while ensuring the safety and satisfaction of our valued customers. Title: Your Trusted Partner for Professional Hedge Trimming in Hale – Hale Tree Surgeon Services Are you on the lookout for top-quality hedge trimming services in Oldham? Your search ends here! At Hale Tree Surgeon Services, we are proud to offer premier, reliable, and efficient hedge trimming services to all our customers within the Hale community and beyond. Why Choose Hale Tree Surgeon Services for Hedge Trimming in Oldham? Based in the heart of Oldham, we are a local business that understands the unique landscape needs of our community. With years of hands-on experience in the field, our team of qualified tree surgeons provides excellent hedge trimming services to both residential and commercial customers in Oldham. 1. **Quality**: We are committed to delivering the highest quality of service. We understand that hedge trimming is not just about maintaining an attractive appearance for your property but also about the health and vitality of your hedges. 2. **Professionalism**: Our tree surgeons are fully trained and adhere to the industry’s best practices. They are equipped with the knowledge and expertise to handle any hedge trimming job in Oldham, ensuring your hedges look their best while promoting their growth and longevity. 3. **Affordability**: Offering competitive pricing without compromising on the quality of our service is a hallmark of Hale Tree Surgeon Services. We aim to deliver excellent hedge trimming services that fit within your budget. 4. **Safety**: Hedge trimming can be dangerous if not handled correctly. Our team is fully insured and trained in safety protocols to ensure they undertake every hedge trimming job in Hale with the utmost care and safety. 5. **Customer Satisfaction**: We put our customers at the forefront of what we do. Our tree surgeons go the extra mile to ensure your complete satisfaction. Our Hedge Trimming Services in Oldham We provide a comprehensive range of hedge trimming services to cater to your specific needs. Whether you’re looking for routine maintenance or a one-off trim to reclaim an overgrown hedge, we’ve got you covered. Our services include, but are not limited to: – Regular Hedge Trimming and Maintenance – Hedge Reduction and Reshaping – Hedge Removal – Emergency Hedge Trimming Services Our goal is to maintain your hedges in a way that not only enhances the aesthetic appeal of your property but also contributes positively to local biodiversity. Your Hedge Trimming Specialists in Oldham Don’t let unkempt hedges diminish the curb appeal of your home or business. Count on Hale Tree Surgeon Services, your local hedge trimming experts in Oldham, to provide professional, affordable, and reliable services. We aim to deliver results that surpass your expectations, leaving your hedges and your property looking their absolute best. Contact us today for a free, no-obligation quote for hedge trimming in Oldham. Trust the professionals at Hale Tree Surgeon Services, where your landscape is our priority. Meta Description: Need reliable hedge trimming in Oldham? Look no further than Hale Tree Surgeon Services, the local experts offering quality, affordable, and professional hedge maintenance services. Get in touch today for a free quote. Hale Tree Surgeon Business is a professional and experienced tree care company based in Oldham, UK. They specialize in providing a range of tree services to both residential and commercial customers in and around the area. Their team of highly skilled and qualified tree surgeons are dedicated to ensuring that all of their clients receive the best possible service. They use the latest equipment and techniques to carry out all types of tree work, from pruning and shaping to complete tree removal. In addition to tree maintenance, Hale Tree Surgeon Business also provides stump grinding and removal, hedge trimming, and emergency tree services. They understand that tree emergencies can happen at any time, so they offer a 24/7 emergency call-out service to deal with any urgent tree-related issues. The company takes pride in being environmentally conscious and ensuring that all of their work is carried out with the least possible impact on the environment. They also adhere to all relevant health and safety regulations, ensuring that their team and clients are always safe. Hale Tree Surgeon Business has built a strong reputation for delivering high-quality services at competitive prices. They provide free quotes and advice to all potential customers, and they are always happy to discuss any tree-related queries or concerns. Overall, Hale Tree Surgeon Business is a reliable and trustworthy tree care company that provides a comprehensive range of services to meet the needs of their clients. Whether you need routine tree maintenance or emergency tree services, they are always ready to help.
<urn:uuid:844200f9-1643-4db0-b968-f2d8ca62fa6e>
CC-MAIN-2023-50
https://www.northwest-stump-grinding.co.uk/tree-removal/
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100287.49/warc/CC-MAIN-20231201120231-20231201150231-00617.warc.gz
en
0.939035
2,816
2.984375
3
Genome Study Implicates Human Chromosome 15 in Genetic Susceptibility to Lung Cancer The Bottom Line - Results of a genome-wide association study (GWAS) indicate that a specific region of human chromosome 15 is associated with lung cancer risk. - This region contains two genes that produce different components of proteins known as neuronal nicotinic acetylcholine receptors, which are found on nerve cells and are stimulated by the chemicals acetylcholine and nicotine. - The results also indicated that the influence of this chromosomal region on lung cancer risk is independent of the effects of smoking on lung cancer risk. The Whole Story Tobacco smoke causes most cases of lung cancer worldwide, and smoking is by far the most important risk factor for this disease. According to a U.S. Surgeon General's report, cigarette smoking accounts for approximately 90 percent of all lung cancer deaths among men in this country and almost 80 percent of lung cancer deaths among women. In addition, tobacco smoke has been linked to other cancers, including cancers of the bladder, oral cavity, pharynx, larynx (voice box), esophagus, cervix, kidney, pancreas, and stomach, as well as acute myeloid leukemia. Nonetheless, research has indicated that genetic factors also play a role in lung cancer development. Epidemiologic studies have consistently shown that first-degree relatives of lung cancer patients have a two- to three-fold increased risk of lung cancer compared with relatives of control subjects, regardless of the smoking history of the relatives. In addition, individuals with inherited mutations in certain genes have an increased risk of lung cancer. To identify common DNA variations, or single-nucleotide polymorphisms (SNPs), that are associated with lung cancer risk, researchers at the University of Texas M.D. Anderson Cancer Center in Houston, the Johns Hopkins University School of Medicine in Baltimore, and the Institute of Cancer Research and the University of Cambridge in the United Kingdom conducted a GWAS in which the genomes of 1,154 ever (current or former) smokers with non-small cell lung cancer and 1,137 ever-smoker control subjects were compared. SNPs are changes in the DNA code that are found in many people, usually in at least one percent or more of the individuals in a population. In contrast, mutations are changes in the DNA code that are rare and may be unique to an individual or their hereditary line. Another way of thinking about SNPs is that they are mutations that have persisted and become common in a population. The DNA changes in mutations and SNPs can be beneficial, harmful, or have no obvious effect. The genome comparisons led to the identification of 10 SNPs that seemed to be associated with lung cancer risk. The researchers examined these SNPs further in analyses that involved additional lung cancer patients and control subjects. In the end, they found that two SNPS located in a specific region of chromosome 15 were significantly associated with lung cancer risk. Smokers who had one copy (that is, inherited from a single parent) of either SNP had about a 30 percent increased risk of lung cancer, and those with two copies (that is, inherited from both parents) of either SNP had about an 80 percent increased risk of lung cancer. The researchers also found that the effect of DNA variation in this region of chromosome 15 on lung cancer risk appears to be independent of the effects of smoking on lung cancer risk. The identified region of chromosome 15 contains three known genes, and there is evidence that two of them, CHRNA3 and CHRNA5, might be associated with lung cancer development and progression. These genes produce different components of proteins called neuronal nicotinic acetylcholine receptors, which are found on nerve cells and are stimulated by the chemicals acetylcholine and nicotine. At the time this research study was published, nearly identical results were reported by another research team. The results of these two studies provide the strongest evidence to date that commonly found genetic variations can increase susceptibility to lung cancer. Amos CI, Wu X, Broderick P, et al. Genome-wide association scan of tag SNPs identifies a susceptibility locus for lung cancer at 15q25.1. Nature Genetics 2008;40(5):616-622. Hung RJ, McKay JD, Gaborieau V, et al. A susceptibility locus for lung cancer maps to nicotinic acetylcholine receptor subunit genes on 15q25. Nature 2008; 452(7187):633-637. More summaries of selected scientific advances from NCI-supported research are available at http://www.cancer.gov/aboutnci/servingpeople/advances.
<urn:uuid:bd00cfdc-9f4c-407e-9789-ecd8e2b6f9ae>
CC-MAIN-2013-48
http://www.cancer.gov/aboutnci/servingpeople/cancer-research-progress/advances/chromosome15
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163857566/warc/CC-MAIN-20131204133057-00046-ip-10-33-133-15.ec2.internal.warc.gz
en
0.950705
964
3.0625
3
In an unexpected follow-up to my brief post about ancient Greek lady robots made of gold who practiced smithcraft, we hear about a clever gender-and-robotics study out of Germany. And now we know that gender stereotypes are really, really easily applied to robots, even if the robot doesn’t have a body. They [the subjects] looked at the heads of the two human-like machines, which were identical except for two details. The “feminine” one had longer hair and a slight curvature of the lips; the “masculine” one had shorter hair and straight lips. Participants then were given a list of 24 traits and asked the extent to which they felt the robot embodied each of them. Twelve were related to agency, such as “assertive” and “dominant,” while 12 represented communal values including “polite” and “affectionate.” Next, the students were asked to rate how likely they would be to use each of the robots for a list of possible duties incuding stereotypical male tasks like “guarding the house” and stereotypically female tasks such as preparing meals. Guess what comes next — go on, guess: Participants were more likely to view the short-haired robot in masculine terms, and suggest it was more suitable for such take-action tasks as “repairing technical devices” and “guarding a house.” Conversely, the long-haired robot was perceived as more appropriate for such stereotypically feminine tasks such as household chores and caring for children and the elderly. Sad trombone for gender equality. The researchers note their results could be used in two ways. From a social-policy point of view, it might be worthwhile for designers to develop “counter-stereotypical machines,” which could challenge our rigid conceptions of “male” and “female” work. On the other hand, they note, if the goal is “to facilitate human-robot interaction” and minimize mistakes and accidents, it makes sense to design robots that conform to our human assumptions. The problem with that second suggestion is that gender-conforming robots — can I call them cis robots? let’s call them cis robots — won’t be merely a compromise with flawed human assumptions. They will instead confirm and reinforce gender stereotypes. It is one thing for a woman to have long hair and work in a traditionally feminine-coded career like, say, teaching. She’s an individual, making the best choices she can to maximize her own position in a system that is seriously rigged against her — much more so if she’s disabled or a woman of color. We all have to put food on the table somehow, and we have to use our individual skills and inclinations as best we can. In contrast, imagine someone mass-produces teaching robots with long hair and curving lips — this is a much stronger statement about matching feminine-coded work with feminine-coded appearance. It means someone has made an individual assumption that teaching = feminine, and the hundreds of teaching robots will echo and amplify that assumption. Stereotypes will be reinforced when they need breaking down. So yes, let’s make all the counter-stereotypical robots we can. And then let’s give them a classroom of curious third graders, because pretty much everyone can agree that would be entertaining. *Side note: did you notice that headline? “Sex Stereotypes and the Single Robot” — ‘robot’ replacing the word ‘girl.’ It’s an allusion to Sex and the Single Girl by Helen Gurley Brown, who made Cosmopolitan what it is today. We are talking about human-shaped machines to take over unwanted jobs and free us from tedious labor, and the headline equates those human-shaped tedious-labor machines with women. There are not enough facepalms in the world.
<urn:uuid:bd68ff14-268f-4502-9a83-666d3940448c>
CC-MAIN-2017-43
http://www.oliviawaite.com/blog/2012/08/lady-robots-dude-robots-and-the-echo-chamber-of-gender/
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823260.52/warc/CC-MAIN-20171019084246-20171019104246-00105.warc.gz
en
0.964264
844
3.390625
3
Built in the 16th century by the Spanish upon the ruins of Tenochtitlán, the old Aztec capital, the city is today one of the largest and most densely populated urban areas in the world. Besides the five Aztec temples, there is also the cathedral and 19th- and 20th-century public edifices such as the Palacio de las Bellas Artes. Xochimilco (about 17 miles south of the city), with its network of canals and artificial islands, is an exceptional testimony to the efforts of the Aztec people to build a habitat amid an unfavorable environment. For additional digital leasing and purchase options contact a media consultant at 800-257-5126 (press option 3) or firstname.lastname@example.org. Length: 13 minutes Copyright date: ©1996 Prices include public performance rights. Not available to Home Video and Publisher customers. Only available in USA and Canada. The Great Muslim American Road Trip America Outdoors with Baratunde Thu... Land and Water Revisited Snapshots of Mexico Cuba: The 40 Years War Conga Lessons at the Bay of Pigs Reinventing New York 132 West 31st Street, 16th Floor New York, NY 10001 P: 800.322.8755 F: 800.678.3633 Sign Up for Special Offers! © Films Media Group. All rights reserved.
<urn:uuid:db5174ab-8069-4b16-9c0e-989b72fd5e2d>
CC-MAIN-2023-14
https://films.com/ecTitleDetail.aspx?TitleID=146848
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948858.7/warc/CC-MAIN-20230328104523-20230328134523-00472.warc.gz
en
0.83841
356
2.65625
3
Why this course? Mathematics is everywhere: weather forecasting, cash machines, secure websites, electronic games, liquid crystal displays and statistical data analysis. Our course shows how mathematics is applied to solve practical problems, meaning you’ll learn the skills that employers need. Physics is used to help us answer some of the important questions which arise in the world around us. Once we understand the processes involved in these problems, we need to translate our ideas into mathematics to find the solutions. Our flexible degree structure enables transfer between courses with the opportunity to study abroad. What you’ll study This is a four-year joint Honours programme. Each year contains compulsory classes and some years contain either optional classes which relate to different areas of mathematics and physics and/or elective classes from other subject areas in the University. Years 1 & 2 You’ll take basic classes in both disciplines. In addition to the study of core mathematical methods, you’ll learn calculus, geometry, applied analysis, mechanics, numerical analysis and probability and statistics. Physics classes cover mechanics, waves and optics, electromagnetism and quantum physics, together with experimental physics. In Years 3 & 4 You’ll choose from the wide range of Mathematics & Physics classes available. It is possible to focus on an area in computational physics, or lasers and optics, or theoretical physics, such as quantum theory, while still developing mathematical skills. Your final-year project may be undertaken in either subject. You’ll have access to well-equipped, modern computing laboratories and teaching rooms, as well as 24-hour access to an advanced computer information network and a sophisticated virtual e-learning environment. We have also an undergraduate common room which gives you a modern and flexible area that's used for individual and group study work, and is also a relaxing social space. High Flyer Programme Well-qualified applicants with appropriate A Levels and Advanced Highers will be admitted to the Faculty of Science prestigious 'High Flyer' Programme, which allows students to complete an Honours degree in three years and an Integrated Masters degree in four. If you are studying the relevant subjects you may receive a dual offer, specifying grades to direct entry to Year 2 as a High Flyer and also standard Year 1 entry. Find out more about our High Flyer Programme. Accredited by the Institute of Physics for the purpose of partially meeting the educational requirement for Chartered Physicist. Current students are taking the following classes, and we expect the syllabus to be similar to this in future years. Introduction to Calculus You'll study the basic concepts and standard methods of mathematical notation and proof, polynomial equations and inequalities, sequences and series, functions, limits and continuity, differentiation and integration. Applications of Calculus Geometry & Algebra The fundamental concepts of calculus (differentiation and integration) presented in Applications of Calculus will be examined in more detail, extended to a larger class of functions by means of more sophisticated methods, including an introduction to complex numbers and variables, all demonstrated in application to practical problems including solving basic first and second-order differential equations. This class will introduce you to vectors and matrices. This class will introduce basic ideas and techniques of statistics. This class is an introduction to working in a laboratory environment. You'll undertake experiments related to the taught components of the first year physics curriculum, learning how to handle experimental uncertainties. In addition to laboratory work, you'll also undertake a group project. Mechanics, Optics & Waves We'll provide you with an understanding of motion of simple mechanical systems, gravitation and simple harmonic motion. You'll also learn about the fundamentals of wave propagation and the superposition of waves as well simple optical phenomena such as diffraction. Quantum Physics & Electromagnetism This class is designed to introduce you to quantum mechanics and electromagnetism. It highlights experimental observations that resulted in the development of quantum mechanics, such as the photoelectric effect and blackbody radiation. In terms of electromagnetism, you'll cover basic electrostatics such as Gauss's law and magnetostatics. Linear Algebra & Differential Equations This class will introduce you to the basic ideas of linear algebra, such as matrices and determinants, vector spaces, bases, eigenvalues and eigenvectors. You'll study various standard methods for solving ordinary differential equations and understand their relevance. Mathematical & Statistical Computing Basic ideas, techniques and results for calculus of two and three variables, along with differentiation and integration over curves, surfaces and volumes of both scalar and vector fields will be presented. This class will introduce you to the R computing environment. It'll enable you to use R to import data and perform statistical tests, allow you to understand the concept of an algorithm and what makes a good algorithm and will equip you for implementing simple algorithms in R. Mechanics, Optics & Waves This class builds on Mechanics, Optics and Waves from year 1. You'll be introduced to special relativity, the vector treatment of rotational motion and the behaviour of systems when forced to oscillate. To extend your understanding of wave phenomena you'll be introduced to the wave equation, Fresnel and Fraunhofer diffraction and the operation of lasers. Quantum Physics & Electromagnetism This class builds what you learned in year 1. you'll be introduced to the probabilistic nature of quantum mechanics and you'll develop a vector model of electromagnetism. Condensed Matter Physics You'll be introduced to solid state physics covering topics such as bonding in solids, through to the difference between conductors, insulators and semi-conductors. Gases & Liquids Here you'll discover some of the key concepts associated with liquids and gases. You'll cover topics such as ideal and imperfect gases, Maxwellian distributions, hydrostatics and Bernoulli's equation. Complex Variables & Integral Transforms This class will introduce functions of a complex variable, define concepts such as continuity, differentiability, analyticity, line integration, singular points, etc. It'll examine some important properties of such functions, and consider some applications of them, eg conformal mappings, and the evaluation of real integrals using the Residue Theorem. It'll also introduce you to Fourier and Laplace transform methods for solving linear ordinary differential equations and convolution type integral equations. Quantum Physics & Electromagnetism We'll introduce you to analytical methods for solving ordinary and partial differential equations so you'll develop an understanding along with technical skills in this area. Building on what you learned in year 2, this class will extend your understanding of quantum mechanics by introducing advanced concepts such as time independent perturbation theory and electromagnetism by exploring the wave like nature of electromagnetism as predicted by Maxwell's equations. Condensed Matter Physics Here you'll cover condensed matter physics and be introduced to concepts such as the Fermi surface, superconductors, phonons and other forms of collective excitations. This class covers the fundamentals of thermodynamics through to an introduction to various distributions such as Maxwellian, Fermi-Dirac and Bose-Einstein. Mechanics of Rigid Bodies & Fluids This class will: - convey the generalisation of the mechanics of single-particle systems to many-particle systems - convey the central ideas of a continuum description of material behaviour and to understand relevant constraints - ground students in the basic principles governing three-dimensional motions of rigid bodies - convey how the ideas of continuum theory are applied to static and inviscid fluids. This module will motivate the need for numerical algorithms to approximate the solution of problems that can't be solved with pen and paper. It'll develop your skills in performing detailed analysis of the performance of numerical methods and will continue to develop your skills in the implementation of numerical algorithms using R. This class will develop your knowledge base and transferable skills in preparation for the project undertaken in years 4 and 5 of the course. It focuses on oral, written and graphical presentations, literature and group-work skills, individual data analysis and interpretation skills, and basic grounding in physics problem solving. This class will introduce you to the fundamentals of computer programming and the applications of computer programming, using Matlab, to solve physical problems. You'll choose between a Mathematics & Statistics project and a Physics project. Communicating Mathematics & Statistics This class provides you with experience of the skills required to undertake project work, and to communicate the findings in written and oral form using a variety of sources, such as books, journals and the internet. The aim of this class is to help you develop as an enquiring independent physicist by undertaking a project under the supervision of a member of staff of the department. Optional classes - list A Modelling & Simulation with Applications to Financial Derivatives Applicable Analysis 3 Here you'll get an introduction to ideas in mathematics and statistics that can be used to model real systems, with an emphasis on the valuation of financial derivatives. This module places equal emphasis on deterministic analysis (calculus, differential equations) and stochastic analysis (Brownian motion, birth and death processes). In both cases, in addition to theoretical analysis, appropriate computational algorithms are introduced. The first half of the class introduces general modelling and simulation tools, and the second half focuses on the specific application of valuing financial derivatives, including the celebrated Black-Scholes theory. Statistical Modelling & Analysis This class will present the main results in Functional Analysis, give an introduction to linear operators on Banach and Hilbert spaces and study applications to integral and differential equations. Fluids & Waves This class will provide you with a range of applied statistical techniques that can be used in professional life. Finite Element Methods for Boundary Value Problems & Approximation You'll be introduced to the theory of Newtonian fluids and its application to flow problems and the dynamics of waves on water and in other contexts. Applied Statistics in Society You'll be presented with the basic theory and practice of finite element methods and polynomial and piecewise polynomial approximation theory. Mathematical Biology & Marine Population Modelling You'll be introduced to a range of modern statistical methods and practices used in industry, commerce and research, and will develop skills in your application and presentation. Mathematical Introduction to Networks Here you'll learn the application of mathematical models to a variety of problems in biology, medicine, and ecology. It'll show the application of ordinary differential equations to simple biological and medical problems, the use of mathematical modelling in biochemical reactions, the application of partial differential equations in describing spatial processes such as cancer growth and pattern formation in embryonic development, and the use of delay-differential equations in physiological processes. The marine population modelling element will introduce the use of difference models to represent population processes through applications to fisheries, and the use of coupled ODE system to represent ecosystems. Practical work will include example class case studies that will explore a real-world application of an ecosystem model. This class will demonstrate the central role network theory plays in mathematical modelling. It'll also show the intimate connection between linear algebra and graph theory and how to use this connection to develop a sound theoretical understanding of network theory. Finally, it'll apply this theory as a tool for revealing structure in networks. Optional classes - list B This class will further develop your skills as a professional physicist. It'll introduce you to key concepts in the commercialisation of research thereby introducing you to the business world as well as further refining your problem solving skills. Topics in Solid State Physics Here you'll track the development of key concepts in solid state physics and how these concepts can be exploited to form functional optical and electronic devices. Topics in Physics Here you'll be introduced to state-of-the-art developments in generation and use of charged particles in various forms such as free electron beams, plasmas and astrophysical plasmas. Topics in Nanoscience Here you'll be introduced to nanoscience. Specifically, the course will address concepts relating to Nanoparticle production, characterisation and structure before progressing to the physics associated with molecular nanoscience, including intermolecular forces and the techniques used to investigate these forces. Topics in Photonics This class provides an introduction to laser physics, laser optics and nonlinear optics as required for the work in many photonic laboratories. Topics in Computational & Complexity Physics You'll be introduced to the ideas and concepts associated with complexity physics and to the use of computer simulations to demonstrate these processes. Topics in Theoretical Physics The aim of this class is to introduce you to the large scale structure of space-time. Topics in Quantum Physics This class provides an introduction to the basic concepts and theoretical ideas of quantum optics. Topics in Atomic, Molecular & Nuclear Physics This class aims to give a general overview and understanding of atomic and molecular physics and relate these to practical applications and related fields of study. AssessmentKnowledge, understanding and subject-specific skills are assessed by coursework, assignment, reports, presentations and written exams. Learning & teaching The following teaching methods are used in Mathematics & Physics: lectures (using a variety of media including electronic presentations and computer demonstrations), tutorials, computer laboratories, coursework and projects. You’ll also learn through structured group work in problem solving and student presentations. Physics teaching methods include lectures, tutorials, interactive learning and laboratory work. You’ll also undertake group based and learning and self-paced project work. On completion of the programme, you’ll be able to: - demonstrate knowledge in the main areas of mathematics and physics - show an understanding of the principal mathematical and educational theories and a critical understanding of one or more specialised areas - demonstrate skills in identifying relevant physical principles and laws and calculation skills - develop and evaluate logical arguments, presenting them and their conclusions clearly and accurately - demonstrate problem solving skills, for example, abstracting the essentials of problems, formulating them mathematically and finding appropriate solutions - undertake a critical analysis of data and draw conclusions from the data - demonstrate a range of general skills, including IT competency Required subjects are indicated following minimum accepted grades. Year 1 entry: AABB or ABBBC (Maths A, Physics B, Advanced Higher Maths recommended) Year 2 entry: AB (Maths A, Physics B) Year 1 entry: BBB (Maths B, Physics B) Typical entry requirements: ABB Year 2 entry: ABB (Maths A, Physics B) Typical entry requirements: AAA Year 1 entry: 32 Year 2 entry: 34 (Maths HL6, Physics HL5) Year 1 entry: relevant HNC with strong Maths and Physics, B in Graded Unit Year 2 entry: not offered We want to increase opportunities for people from every background. Strathclyde selects our students based on merit, potential and the ability to benefit from the education we offer. We look for more than just your grades. We consider the circumstances of your education and will make lower offers to certain applicants as a result. Find out if you can benefit from this type of offer. Find out entry requirements for your country. Degree preparation course for international students We offer international students (non EU/UK) who do not meet the entry requirements for an undergraduate degree at Strathclyde the option of completing an Undergraduate Foundation year programme at the International Study Centre. To find out more about these courses and opportunities on offer visit isc.strath.ac.uk or call today on +44 (0) 1273 339333 and discuss your education future. You can also complete the online application form, or to ask a question please fill in the enquiry form and talk to one of our multi-lingual Student Enrolment Advisers today. Fees & funding How much will my course cost? Rest of UK Bachelor degrees at Strathclyde will cost £9,250 a year, but the total amount payable will be capped at £27,750 for students on a four-year Bachelors programme. Students studying on integrated Masters degree programmes – for example MSci, MEng and MPharm – will pay £9,250 for the Masters year. Course materials & costs Class materials (lecture notes and exercise sheets) for the majority of Mathematics & Statistics classes are available free to download. For some classes, students may need access to a textbook. Textbook costs are typically in the £20-60 price range. These prices are dependent on format (e-book, soft or hardback) and whether bought new or second hand. PVG scheme (Protection of Vulnerable Groups) Third-year Maths and Teaching students will need to pay for the full price of a PVG membership scheme. £40 returnable deposit for PRS handsets. Course materials & costs At present, the department charges students £5 for lecture notes in PH 151 and PH 152. These notes are supplied by the University printers. Digital copies of notes are published on MyPlace for students to download. A recommended textbook that comes with an online homework system is priced at £75, and covers both first and second-year material. If students don't wish to buy this text, the department issues the homework in paper copy for students to hand in for marking. This process is currently under review, as the department are considering moving to an online textbook. This will be priced at £30 and accessed through MyPlace. The department supplies students with lab books (£1) for recording data through years 1-3. First-year students are supplied with USB keys (£10) for the collection of data. Personal response handsets are also available at lectures. Please note: All fees shown are annual and may be subject to an increase each year. Find out more about fees. How can I fund my studies? Students from Scotland and the EU If you're a Scottish or EU student, you may be able to apply to the Student Award Agency Scotland (SAAS) to have your tuition fees paid by the Scottish government. Scottish students may also be eligible for a bursary and loan to help cover living costs while at University. For more information on funding your studies have a look at our University Funding page. Students from England, Wales & Northern Ireland We have a generous package of bursaries on offer for students from England, Northern Ireland and Wales Graduates in Mathematics enter a wide range of employment, from the manufacturing and service industries, the actuarial, accountancy and banking professions, commerce and government, consultancy and education. Our graduates go on to become investment analysts, numerical analysts, statisticians, actuaries, managers and teachers. Physics graduates have a range of mathematical and analytical skills which allows them to enter a diverse range of sectors. Recent graduates have entered engineering, the NHS and education. Many graduates continue to study beyond degree level, studying taught or research-based postgraduate courses. How much will I earn? Salary potential depends on the industry you choose to work in. With experience, actuaries can earn more than £60,000, numerical analysts £60,000. Investment analysts can earn up to £100,000 with bonuses.* *Intended only as a guide.
<urn:uuid:74ea42d3-8470-4bcf-ad39-5ebf872617e2>
CC-MAIN-2017-26
https://www.strath.ac.uk/courses/undergraduate/mathematicsphysics/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319636.73/warc/CC-MAIN-20170622161445-20170622181445-00123.warc.gz
en
0.905977
4,042
2.53125
3
Sept. 22, 2017 Invention Radiant-temperature sensor for improved human comfort Inventor Forrest Meggers, assistant professor of architecture and the Andlinger Center for Energy and the Environment Most people reach for the thermostat when the room feels hot or cold, but in fact air temperature makes up only about half of a person’s thermal comfort level. The temperatures of surrounding surfaces — cold or hot windows, walls and floors — make a significant impact on one’s comfort. “If surfaces around you are colder, then more heat radiates away from your body,” Forrest Meggers said. The Spherical Motion Average Radiant Temperature (SMART) sensor designed by Meggers and his team is a simple, cost-effective device that can quickly and accurately measure the surface temperature at multiple locations in a room, creating a three-dimensional picture of the radiant heat and cooling sources. The information can be used to design buildings that are more energy-efficient and that don’t sacrifice personal comfort. Until now, designers have been hampered by the lack of a low-cost, versatile sensor. The most common radiant-temperature sensor, the black-globe thermometer, measures the interior temperature of a black ball that must be moved around to different locations. Other technologies use expensive optical filters. The SMART sensor devised by Meggers and his team consists of a rotating platform containing an infrared temperature sensor, a device for scanning the room’s surface geometry, and a microprocessor. The device can output a three-dimensional map of the hot and cold surfaces. The sensor can serve as a critical diagnostic tool for describing where additional insulation or other remedies should be placed. It can also be integrated into buildings to feed this information to a central management system in real time to save on energy costs and improve occupant comfort. Team members Jake Read, former research specialist at Princeton and now a researcher at the Waterloo School of Architecture, Ontario; Eric Teitelbaum, graduate student in architecture at Princeton; Nicholas Houchois, staff researcher. Development status Patent protection is pending. Princeton is seeking outside interest for further development of this technology. Funding source Princeton University
<urn:uuid:00974ab0-dd4b-4f72-97ea-26b94ae5399e>
CC-MAIN-2023-23
https://innovation.princeton.edu/news/2017/forrest-meggers-radiant-temperature-sensor-improved-human-comfort
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224654016.91/warc/CC-MAIN-20230607211505-20230608001505-00375.warc.gz
en
0.915858
452
3.5625
4
Shingles is a viral infection caused by the Varicella-Zoster Virus, the same agent responsible for chickenpox. If you've had chickenpox, you're at risk for developing shingles later in life. This condition manifests as a painful rash and can result in severe pain that lasts for weeks or even months. Although there's no definitive cure for shingles, antiviral drugs can manage symptoms and speed up recovery. Prevention is available in the form of a shingles vaccine, which is especially recommended for older adults. While shingles itself can't be contracted through direct contact, the Varicella-Zoster Virus can give chickenpox to those who haven't had it. For such individuals, the chickenpox vaccine offers some protection. Understanding shingles and its treatment options is crucial for effective management of this debilitating condition. Caring for shingles on the face requires a delicate approach, as the skin in this area is often more sensitive. To help alleviate the pain and discomfort caused by shingles, consider using natural remedies alongside medical treatments. Applying cool compresses to the affected area can help soothe the skin and reduce inflammation. It's important to keep the skin clean and dry, and avoid touching or scratching the rash to prevent infection. For additional relief and faster healing, antiviral medications can be prescribed by your healthcare provider. These medications can reduce the rash's severity, shorten the duration, and lower the risk of developing postherpetic neuralgia, a persistent pain that can last even after the rash and blisters are gone. Support your body's immune response and promote natural healing by getting plenty of rest, eating a well-balanced diet, and staying hydrated. Remember, it's crucial to seek medical advice from your healthcare professional before starting any treatment. When shingles affects the face and scalp, it can be particularly challenging to manage due to the proximity to the eyes and other sensitive areas. Taking proper care of the lesions is essential to prevent complications. As with facial shingles, using cool compresses and keeping the area clean and dry can help provide relief. Over-the-counter pain relievers can be taken to help reduce pain and discomfort. In some cases, your healthcare provider may prescribe topical treatments, anticonvulsants like gabapentin, or tricyclic antidepressants such as amitriptyline for further pain management. To soothe itchy skin, consider an oatmeal bath or applying calamine lotion once the blisters have scabbed over. While dealing with shingles on the face and scalp, it's essential to monitor the eyes closely and seek immediate medical attention if any eye-related symptoms develop to prevent potential damage to your vision. Overall, it's important to follow your healthcare provider's advice and maintain a healthy lifestyle to support the healing process. Natural remedies can provide supplementary relief, but it's essential to consult your doctor before incorporating them into your care plan. Remember to be patient, as the healing process for shingles may take several weeks. If you are suffering from shingles, there are various treatment options available, ranging from medications to over-the-counter remedies. Early treatment is vital to alleviate symptoms and reduce the risk of complications. There are several over-the-counter remedies that can provide relief from the symptoms of shingles. These remedies include: Pain relievers, such as ibuprofen or acetaminophen, which can help alleviate pain and reduce fever. Calamine lotion, which soothes the skin and eases itching. A cold compress, which can help ease pain and itching when applied to the affected area. Some topical creams and topical medication can be applied to the shingles rash to help soothe and alleviate symptoms. These treatments include: Capsaicin cream: A topical patch derived from chili peppers that can provide pain relief by blocking nerve signals. Lidocaine: A numbing agent used in creams and gels to provide temporary relief for moderate pain to intense pain. When it comes to homeopathic skincare solutions, EMUAIDMAX® First Aid Ointment is at the forefront of innovation. This superior ointment is engineered with an advanced blend of natural and medical-grade ingredients, all carefully curated to ensure maximum effectiveness without requiring a prescription. What sets EMUAIDMAX® First Aid Ointment apart is its ability to penetrate the skin's outermost layer to deliver targeted healing. It contains zero chemicals, artificial preservatives, lanolin, alcohol, parabens, petrochemicals, or fragrance, ensuring you're only applying what's best for your skin. Simply apply a generous amount to the affected area and let the high-quality ingredients go to work, providing relief and healing to your inflamed and irritated skin. To use EMUAIDMAX® First Aid Ointment for shingles rash treatment, apply it to the affected area 3-4 times per day or as directed by a healthcare professional. If you experience any allergic reactions, seek immediate medical attention for prompt and appropriate treatment. For those who find themselves battling shingles in hard-to-reach or sensitive areas like the scalp, EMUAIDMAX® Concentrate First Aid Serum offers an exceptional alternative. This serum brings all the potent healing capabilities of the EMUAIDMAX® First Aid Ointment in a free-flowing, easy-to-apply formula. Designed with a specialized applicator, the serum makes targeted treatment a breeze. The serum not only relieves symptoms but also reduces shingles pain, itch, infection, redness, and inflammation. Just like the ointment, the serum is free from harmful substances like chemicals, artificial ingredients, preservatives, and steroids, ensuring a safe and effective relief option for shingles and other skin conditions. For those seeking alternative treatments for shingles, there are several natural remedies that may help provide relief for the painful skin rash. Although these methods may not completely cure the condition, they can help alleviate symptoms and discomfort associated with shingles. Cold compresses: Applying a cold compress to the affected area can provide temporary relief from itchiness and pain. Be sure to use a clean cloth or towel to avoid the risk of infection. Cool baths: Taking a cool bath can help soothe skin affected by shingles. Adding 1 to 2 cups of colloidal oatmeal or baking soda to the bathwater may also help reduce itching and discomfort. Essential oils: Some essential oils, such as tea tree oil, eucalyptus oil and lavender oil, may provide relief due to their natural antiviral and anti-inflammatory properties. Make sure to dilute essential oils with a carrier oil before applying them to the skin. Dietary and herbal remedies: Consuming foods rich in antioxidants, such as berries, dark leafy greens, and nuts, may help support the immune system and provide natural relief for shingles. Additionally, certain herbs, such as licorice root, echinacea, and lemon balm, may have antiviral properties that could aid in managing shingles symptoms. It is essential to remember that these alternative remedies should be used in conjunction with medical treatment. Please consult your health care provider before using any alternative treatment or natural remedy to ensure their safety and effectiveness for your specific condition. When dealing with shingles, it's essential to consider your activity levels. Moderate exercise may be beneficial during recovery, as it can help boost the immune system and reduce stress. However, it's crucial to listen to your body and avoid overexertion. Refrain from high-impact workouts or activities that cause excessive sweating, which can further irritate the affected skin area. It's essential to consult with your healthcare provider before starting any exercise regimen while affected by shingles. Elderly individuals are more susceptible to shingles due to their often weakened immune systems. Treatment for this age group should focus on quick initiation of antiviral medications, such as: In addition, managing pain using appropriate analgesics, and taking care of the skin with appropriate home care strategies may help the healing process. It is important for elderly individuals to follow their healthcare provider's guidance and monitor their symptoms closely. The healing time for shingles may vary, but typically, most people experience improvements within 7 to 10 days. The initial symptoms include itching or pain, followed by the appearance of the telltale rash and blisters. During this time, it's essential to keep the affected area clean and dry, avoid scratching, and keep clothing loose to avoid further irritation. There are several stages of healing: Prodromal stage: Pain or itching without visible rash Active rash stage: Blistering rash appears Crusting and healing stage: Blisters scab over and begin to heal Throughout these stages, proper pain management and skin care can significantly influence the overall recovery duration. Maintaining a healthy immune system can also help prevent recurrent outbreaks of shingles. In some cases, postherpetic neuralgia, a persistent burning pain, may continue after the rash and blisters have resolved. This pain typically decreases over time, but early intervention and appropriate treatment can help manage this lingering symptom. While managing shingles, it's essential to follow your health care provider's recommendations and monitor any changes or worsening of symptoms.
<urn:uuid:ef37117e-41f0-41e4-b450-ed2b56b14afa>
CC-MAIN-2023-50
https://www.emuaid.com/pages/shingles-care-cndc01
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100650.21/warc/CC-MAIN-20231207054219-20231207084219-00576.warc.gz
en
0.927496
1,946
3.015625
3
If you have slim calves and take up running, you will likely develop muscle, which will make the calves bigger. On the other hand, if you are carrying extra fat when you start a cardio fitness plan, such as running, then your calves may reduce in size. Running is a vigorous form of cardio that activates and relies on your glutes, quadriceps, hamstrings and calves to propel you forward. As such, running is an efficient calorie burner; running at the pace of 6 mph can burn approximately 405 calories in 30 minutes, according to Fitness Magazine. Located on the back of your lower legs below the knees, the calves are a two-headed muscle group consisting of the gastrocnemius and the soleus. The gastrocnemius is the larger of the two and makes up the bulging shape of the calf. The soleus is seated deeply in the calf under the gastrocnemius. Working together, the calf muscles serve to lift your heel when your leg is both straight and bent. An integral part of the running motion, the calves initiate the foot cycle and power the push off and have an effect on both your control and speed. Repeatedly engaging the calves in this manner helps to build and develop the muscle group.
<urn:uuid:5bde2417-60c3-421d-b87c-3afba9e54aa6>
CC-MAIN-2017-43
https://www.livestrong.com/article/469872-does-running-make-the-calves-bigger/
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824618.72/warc/CC-MAIN-20171021062002-20171021082002-00739.warc.gz
en
0.935363
258
2.953125
3
Greetings, and Happy New Year! Do you want your kids’ writing to improve in the new year? Though the temperatures may be falling, winter is a great time to start new writing habits. Kids are indoors more. There’s more cozy time. They read more. With fewer hours of daylight, they have more time to be bored. Regular writing practice is the best way to improve your kids’ writing. Why not make a resolution to write every week? In this week’s newsletter we share some great winter writing prompts. These are perfect for the month of January. Pour a steaming cup of tea or cocoa and enjoy! 1. A Feathery Poem Bundle up and take a winter walk out of doors. Bring along your notepad and a pencil. Observe the winter birds. Write a poem about a bird (or birds) in winter. 2. A New National Holiday George Washington and Martin Luther King, Jr. are the only two Americans to have national holidays in their honor. If you could pick another American to be given a national holiday, who would it be and why? 3. Ice Sculpture Contest Your town is holding an ice sculpture contest. You and your friend are determined to enter and win. Write a story about your adventure creating the sculpture and how you beat out the competition. 4. Winter Memory What is your favorite memory of wintertime? In detail, describe the setting, emotions, characters, action. 5. Icy Treats It has snowed a whole foot outside! As a treat for your snow day, you get to create a dessert bar that features treats made with snow and ice. All the kids in your neighborhood are coming, and your job is to write a menu. Invent titles for the desserts and write descriptions of each treat. Check out our About Page to learn more about us!
<urn:uuid:d2e4b27b-ec29-44de-adde-79e9829c02af>
CC-MAIN-2020-34
https://www.silverdalepress.com/blog/winter-writing-prompts
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738905.62/warc/CC-MAIN-20200812141756-20200812171756-00264.warc.gz
en
0.927046
393
2.953125
3
Reading the summary of the IPCC report on climate impacts, I was struck by the parallels between the major findings and the observed trends in the U.S. The report summarizes eight key risks that people, policy makers, and communities will be facing as a result of the carbon pollution that is causing widespread, systematic changes to the climate. While the IPCC’s list wouldn’t exactly make Buzzfeed, Seth Borenstein simplified it so that it might and managed to report bad news with good humor. What isn’t so funny is the prospect of more extremes in our future. UCS has been highlighting the climate impacts affecting specific parts of the U.S. We’ve embarked on a series of climate impacts reports, informed by workshops, roundtables, and conferences around the country exploring how sea level rise, flooding, extreme heat, dry spells, and intensified storms are challenging communities across the nation. The combination of warming and drying trends predicted is particularly resonant. UCS has documented the increase in the incidence of heat waves in the Midwest along with its implications for human health, particularly in cities. The IPCC also notes that North American adaptation needs are in the areas of forest management and municipal planning to reduce the impact of worsening wildfires and that greater resilience measures are needed for critical services. In the coming months we’ll be releasing reports outlining steps to electricity system resilience and the economic impacts of western wildfires. ‘Risk of death, injury, ill-health, or disrupted livelihoods in low-lying coastal zones and small island developing states and other small islands, due to storm surges, coastal flooding, and sea-level rise.’ Small island nations and poor countries are especially vulnerable to this aspect of climate change and sadly are more likely to have a greater risk of loss of life during these events. Here in the U.S. too, events like Hurricane Sandy show that lower income communities suffer particularly harshly during and after the disaster. Those most exposed were hard hit and highlighted inequalities from historic shoreline protection projects and emergency response to restore infrastructure disruptions. This demonstrates the unique vulnerability that low-income communities will face even in a country like ours with greater resources to adapt. Extreme weather has driven the federal flood insurance program into a debt of over $24 billion, a program that will be even more essential, given the IPCC predictions for sea level rise. In South Florida, cities are actively contemplating the disruption of livelihoods sea level rise will bring and have enacted a ‘four county compact’ that includes over 100 recommended steps to adapt to climate change and reduce the risks. California’s recent drought caught the attention of the nation, as President Obama visited to announce his resilience fund proposal. It has also spurred rare bipartisan support for a drought relief bill sponsored by California Senator Diane Feinstein. In a guest post, our California climate scientist, Juliet-Christian Smith points out that long-term changes in the way we manage water are going to be needed. Climate-resilient water management solutions needed include better groundwater management, urban water conservation, and more efficient agricultural water uses. The IPCC report focuses a lot on risk management. “It’s much more about what are the smart things to do than what do we know with absolute certainty,” said Chris Field, a Stanford scientist who co-chaired the report committee. In California, New York, and Florida, they have gone a long way to identify what some of those smart things are that they can do, and are at varying stages in implementing those measures. Fifteen states have completed adaptation plans and 59 percent of U.S. cities are pursuing adaptation planning. As of June 2012, 13 percent of U.S. cities have completed an assessment of their vulnerabilities and risks. The top ranked impacts and issues identified by cities that conducted assessments were increased stormwater runoff (72%), changes in electricity demand (42%), loss of natural systems (39%), and coastal erosion (36%). Other issues that ranked closely behind were loss of economic revenue, drought, and solid waste management. While the U.S. is far from being on track to reduce emissions as deeply as we needed, there are several new national measures in the wings and some proven state policies that will go a long ways to reducing domestic greenhouse gases emissions. The EPA power plant carbon rules, due out for public comment June 1 of this year, will represent the first ever carbon limitations on electricity-generating power plants. If the EPA issues a strong rule it will be up to the states to create ambitious low-carbon energy plans. California is already demonstrating the benefits of a low-carbon economy. As they continue implementation of AB32, a law aimed at reducing emissions, they are now beginning the process of setting a new emissions reduction goal for 2030. Regional carbon trading regimes are also making progress on emissions reductions and beginning to set more ambitious goals as well. The Northeast Regional Greenhouse Gas Initiative recently implemented a new 2014 RGGI cap of 91 million short tons, which will decline 2.5 percent each year from 2015 to 2020. State policies like the RES have substantially contributed to the tremendous growth of renewable energy in this country since the 1990s and resulted in significant emissions reductions. Over the last year, efforts to repeal these laws have been attempted and repelled in dozens of states. Just last week, Kansas rejected an attempt to repeal its RES for the second time largely because of the demonstrated economic benefits clean energy development has brought to the state. Now states like Michigan and Minnesota are in the process of strengthening their RES laws, potentially ramping up the percentage of their electricity from renewable sources to 30 to 40 percent. State and regional climate and clean energy policies, combined with recent bipartisan efforts to address drought and disaster relief, provide some glimmers of hope that the U.S. can come together around common sense measures to reduce some of the risks of climate change.Those signals, combined with the dramatic rise in renewable energy production in the past year and the opportunity every state in the union will have over the next two years to draft a low-carbon energy plan makes me very hopeful that we will do some of those ‘smart things’ the IPCC report seeks to highlight. Support from UCS members make work like this possible. Will you join us? Help UCS advance independent science for a healthy environment and a safer world.
<urn:uuid:5ccb097a-ff1f-4d8d-84f1-bb5cab1cb425>
CC-MAIN-2014-23
http://blog.ucsusa.org/top-5-ways-the-latest-ipcc-review-of-climate-change-reflects-the-u-s-experience-469
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997894976.0/warc/CC-MAIN-20140722025814-00062-ip-10-33-131-23.ec2.internal.warc.gz
en
0.950842
1,306
2.953125
3
By Martin Kidston In each of the last two academic years, not a single Montana student took the Advanced Placement exam for computer science, according to the College Board. In 2014, just 105 students graduated from a Montana college or university with a computer science degree. Such statistics have at least one industry expert wondering how Montana will compete in an age built on emerging technologies. “The writing is pretty obvious,” said Devin Holmes, founder of Big Sky Code Academy. “We need to do a better job developing our K-12 and higher-education workforce to create a talent pipeline that’s big enough for people to build large, economic anchors in the state’s tech sector.” Since its launch in April, the Missoula-based academy has held several coding boot camps for adults, and it recently launched Montana Code Girls – an after-school programming course designed to encourage young women to pursue a technology career. The academy’s growth took another step forward this week when it was selected as a Code.org Professional Learning Partner. In layman’s terms, the partnership enables the academy to serve as a regional hub in the global computer science education movement, and to offer professional development to educators. “This partnership adds a critical element to our initiatives to bring computer science education to all Montanans,” Holmes said. “By bringing the Code.org curriculum to teachers and schools statewide, we’ll help prepare Montana’s K-12 students for jobs of the future.” Holmes said Code.org tracks the accounts of registered teachers working to bring computer science to the classroom. He said a check of the state’s registry showed that 500 Montana educators are trying to implement the curriculum on their own. But that hasn’t yet translated to the number of students taking the AP computer science exam. Nor has it boosted the number of college students looking to pursue a degree in the subject. Both factors have placed the state at an economic disadvantage when competing for jobs and growth in emerging technologies, Holmes said. “We have a gubernatorial race where candidates are talking and running on the platform of a new tech economy, and that being part of the future of Montana’s economy,” said Holmes. “If no high school students are taking the AP exam, and only 100 graduate with a computer science degree from college, how are we going to grow the tech economy and fill the jobs?” Holmes believes solving the program will take a multi-phased approach, from training adults for today’s tech jobs to preparing students at a younger age for tomorrow’s occupations. He also believes that partnering with Code.org will help build structure around growing efforts in the classroom and help expand computer science education. “Over the next three academic years, we have a commitment to train 500 new K-12 educators across the state in this Code.org curriculum, so that our zero number of students taking the AP computer science exam moves up,” he said. Last month, Holmes joined Gov. Steve Bullock in announcing that Montana Code Girls will also expand its reach this year by enrolling 150 new students across the state. He expects the program to grow into Montana Code Kids next summer. “With this new partnership with Code.org, we’re working hard to bring a computer science curriculum to all K-12 school teachers in Montana,” he said. “You can impact interest by doing after-school programs like we do with Code Girls, and create that interest so some go on to study computer science in college.” Contact Martin Kidston at firstname.lastname@example.org
<urn:uuid:1f11fc79-1c08-416f-a330-b7890cba9b70>
CC-MAIN-2020-16
https://missoulacurrent.com/business/2016/10/computer-science-education/
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371606067.71/warc/CC-MAIN-20200405150416-20200405180916-00377.warc.gz
en
0.947334
771
2.5625
3
Recommendations to School Administrators A solid policy is only effective if it is put into practice. In this section you will find a well-researched set of recommendations for school administrators that set policy into action within each and every school building and system in order to measurably improve school climate and reduce bullying and harassment. After three years of bringing training experts in the field of bullying and harassment, civil rights, gender aggression, research and evaluation together culminating in a pilot project supported with one-time funds through the 21st Century Community Learning Centers grant and Children’s Cabinet, eight (8) Core Elements were identified and proposed as the combined elements required for successful systems change at the local school level. Critical Elements of a Recommended Approach to Create and Ensure Safe, Fair, Healthy and Responsive Maine Schools With each school in the K-12 system: - Conduct an initial assessment of policy (checklist), procedures, and student and staff perceptions of school climate, culture, and behavior. - Establish and support an internal school leadership team including the principal and high-level administrators as key advocates and participants. - Provide opportunities for involvement of parents and community. - Share and interpret assessment findings. - Develop a comprehensive school plan and choose training and technical assistance approaches based on issues identified through the assessment. The plan must include meaningful youth involvement. - Establish and implement procedures based on policies that assure safe, fair, responsive schools. - Provide ongoing training for all staff and the necessary technical assistance to support and institutionalize a sustained school-wide effort. - Conduct ongoing evaluation to assess progress, achievements, and to provide feedback for adjustments to the school plan.
<urn:uuid:f170ccc2-8077-41e3-83f8-89abf53d7882>
CC-MAIN-2014-10
http://www.maine.gov/education/bullyingprevention/recommendations.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394678663943/warc/CC-MAIN-20140313024423-00036-ip-10-183-142-35.ec2.internal.warc.gz
en
0.93442
346
2.578125
3
October 24, 2013 12:21 am "While Halloween is a lot of fun for kids, pets can be alarmed by the new activity and strange costumes. Many dogs feel they are the guardians of their homes, and they can feel threatened if a stranger comes into their area," explains Dr. Clark K. Fobian, president of the AVMA. "If your pet is apprehensive in these situations, you need to be sensitive to that and make preparations before Halloween to keep your dog or cat from becoming confused and fleeing your home or perhaps even biting somebody." The AVMA has produced an informative video posted on the AVMA YouTube channel offering tips on celebrating Halloween safely with pets. "Nothing will ruin your Halloween fun like an emergency trip to the hospital, or to the animal hospital, because one of your animals got into the candy bowl or got scared enough to scratch or bite," Dr. Fobian says. "Consider putting your pet into a place where it will feel safe. This could be inside a crate with a favorite toy or pet treat or inside a room with the door closed. If you're dog or cat is prone to becoming extremely stressed, work with your local veterinarian to find solutions. It might even be advisable to board an animal to remove them from the situation." Here are some other tips to help keep your pet happy and healthy this Halloween: • The cocoa in chocolate can be poisonous to dogs and cats. The darker the chocolate, the more deadly it can be. In addition, small dogs are more likely to be affected by ingesting a small amount of chocolate than larger dogs. • Chocolate candies aren't the only sweets that are potentially dangerous. Some pets will consume a candy whole, including the candy wrapper, which can cause an intestinal blockage. Also, Xylitol, an artificial sweetener used in many chewing gums and baked goods, has been shown to be poisonous to dogs. In addition, raisins, a common healthy treat for kids on Halloween, can be poisonous to dogs and cats. • If you fear your pet has ingested candy or any other potentially dangerous foods, contact your veterinarian or your local emergency pet hospital immediately. A quick response could save your pet's life. • If you want to put a Halloween costume on your pet, make sure that the costume doesn't obstruct the animal's vision, breathing or movement. Also, it may be a good idea to introduce your pet to the costume a few days or weeks before Halloween, so it won't startle them on such a busy, unusual day. Never leave your pet alone while it is wearing a costume. • Halloween decorations, like candles or jack-o'-lanterns, and pets don't go together. Your pet could knock something over and possibly start a fire or suffer burns. Make sure they're placed where pets can't access them. • Make sure that every day—but particularly on Halloween—your pet has proper identification. With the front door opening and closing to allow neighborhood children to say "trick or treat," it's possible a pet could panic and run out into the night while you're busy handing out candy. Proper identification, particularly microchip identification with up-to-date registered information, will make it much more likely that you'll be reunited with your pet. Source: American Veterinary Medical Association Published with permission from RISMedia.
<urn:uuid:38cdc1e7-4374-4f2d-8445-40468606630d>
CC-MAIN-2017-43
http://sandyhersheysells.com/blog/page/262/
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823114.39/warc/CC-MAIN-20171018195607-20171018215607-00661.warc.gz
en
0.951825
690
2.671875
3
“ALT” stands for alanine transaminase, an enzyme present in the cells of mammalian livers. While the enzyme may also be found in a few other organs, the quantities are low enough to make ALT reasonably liver-specific. The same enzyme is also known by an older name, SGPT, which stands for serum glutamic pyruvic transaminase. Normal serum level of ALT in dogs should be between 12 and 118. ALT is known as a “leakage enzyme,” meaning the cells that contain it must die in order for it to be released. Therefore, if serum ALT levels are up, some death of liver cells has occurred. However, it is important to recognize that there is not a direct correlation among the elevation of the enzyme, the amount of liver damage and the prognosis for the patient. However, trends may be followed that give an indication of improvement or worsening of liver disease. Many diseases may affect ALT, as well as non-liver conditions. For example, congestive heart failure (CHF) may result in poor blood circulation, causing stagnation of liver blood flow and poor liver function. Some medications, most notably phenobarbital used for seizure control. “AST” stands for aspartate transaminase, which is also an enzyme. The older name is “SGOT,” which stands for serum glutamic oxaloacetic transaminase. AST is also present in the liver and several other organs including skeletal muscle, heart muscle and red blood cells. Interpretation of the enzyme is similar to ALT, while recognizing that it is much less liver-specific. Normal level in dogs is 15-66. Alkaline phosphatase is also present in the liver, as well as bone, placenta and other locations. From the liver, it normally moves into the intestinal tract along with bile through the bile ducts. However, if bile flow is obstructed, levels within the liver may rise sufficiently to ‘back up” into the bloodstream. Patients with rapidly growing bones, puppies and kittens, as well as pregnant animals, may have elevated alkaline phosphatase levels. Bile ducts may become obstructed at the microscopic level, inside the liver, or the macroscopic level, in the large ducts that leave the gall bladder, pass through the pancreas and enter the intestinal tract, where bile aids in the digestion of fats. GGTP or gamma glutamyl transpeptidase, also becomes elevated in biliary obstruction, and is much more specific than alkaline phosphatase. It is also a much newer test. It is important to realize that these are not measurements of liver function, rather they are measurements of liver damage. Now, that won’t keep physicians or veterinarians from calling them liver function tests. It’s not that we don’t know better, it’s just the term used as an inappropriate shortcut. To assess the function of the liver, we will discuss bile acids in this series. See you tomorrow, Dr. Randolph. Leave a Reply
<urn:uuid:d3afe084-3acd-433b-9303-749bcd1e8a13>
CC-MAIN-2013-20
http://www.mypetsdoctor.com/ast-alt-ggtp-and-alkaline-phosphatase-in-dogs-and-cats-livers
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00067-ip-10-60-113-184.ec2.internal.warc.gz
en
0.962594
656
3.0625
3
Historically, Mycobacterium bovis infection in humans was associated with consumption of unpasteurized milk and dairy products and this is still the most important route of exposure in limited-resource countries; in rich resource countries, this infection has been usually observed in elder subjects. Direct airborne transmission from animals to humans is thought to be a rare as well as an interhuman transmission. We here describe the diagnosis and clinical management of pulmonary M. bovis infection in a 30-year-old healthy Italian female patient. One interesting aspect of this case is the absence of identifiable risk factors including the consumption of unpasteurized diary products or animal contact. Being M. bovis usually resistant to pyrazinamide, it is important to understand the epidemiology of human Mycobacterium bovis tuberculosis in order to personalize anti tubercular treatment. To cite this article Pulmonary tuberculosis sustained by Mycobacterium bovis in a young Italian patient Infectious Diseases & Tropical Medicine 2016; 2 (2): e289 Submission date: 05 Feb 2016 Revised on: 23 Feb 2016 Accepted on: 28 May 2016 Published online: 11 Jul 2016
<urn:uuid:ce39b98e-d3a1-4238-9e3f-0a1e54562cc6>
CC-MAIN-2020-10
https://www.infectiousjournal.com/article/289
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875144708.87/warc/CC-MAIN-20200220070221-20200220100221-00037.warc.gz
en
0.902997
247
2.765625
3
It has long been an educational and cultural centre for northern Sweden. In it was incorporated by Gustav II Adolf. After suffering several destructive fires, especially init was largely rebuilt. It is a commercial centre and port and manufactures furniture and machinery; it also has sawmills, the products of which are exported from its foreport, Holmsund. Article Umea Sweeden girls.Massage Ardmore Harnosand Info Print Cite. Select feedback type: Submit Feedback. Thank you for your feedback. Written By: The Editors of Encyclopaedia Britannica. See Article History. Learn More in these related Britannica articles: Swedencountry located on the Scandinavian Peninsula in northern Europe. The name Sweden was derived from the Svear, or Suiones, a people mentioned as early as 98 ce by the Roman author Tacitus. Stockholm has been Umea Sweeden girls permanent capital since Sara Lidman, novelist, one of the most acclaimed and widely read of the post-World War II generation of Swedish writers. Lidman grew up in the remote West Bothnian region of northern Sweden. She began to write after her studies at the University of Uppsala were interrupted by a bout of…. Umea Sweeden girls History at your fingertips. Sign up here to see what happened On This Dayevery day in your inbox! By signing up, you agree to our Privacy Notice. Be on the lookout for your Britannica newsletter to get trusted stories delivered right to your inbox.
<urn:uuid:e7088d32-4f9f-4631-be41-95452621edc3>
CC-MAIN-2020-10
https://www.kingscale.eu/umea-sweeden-girls.html
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145529.37/warc/CC-MAIN-20200221111140-20200221141140-00354.warc.gz
en
0.954091
312
3.046875
3
The United Nations should promote “hydro-diplomacy” to defuse any tensions over water in regions like the Middle East and North Africa where scarce supplies have the potential to spark future conflicts. They said the U.N. Security Council should work out ways to bolster cooperation over water in shared lakes or rivers, from the Mekong to the Nile, that are likely to come under pressure from a rising world population and climate change. The Middle East and North Africa are the regions most at risk of conflict over scarce water supplies, they said, but history shows “water wars” are very rare. “We think that water is an issue that would be a appropriate for the U.N. Security Council,” Zafar Adeel, chair of UN-Water, told Reuters ahead of a meeting of experts in Canada this week to discuss water and security. U.N. studies project that 30 nations will be “water scarce” in 2025, up from 20 in 1990. Eighteen of them are in the Middle East and North Africa, with Libya and Egypt among those added to the 1990 list that includes Israel and Somalia. Water scarcity is when each person has access to 1,000 or fewer cubic meters of water a year. UN-Water coordinates water-related activities of all U.N. agencies. March 22 is “World Water Day” in the U.N. calendar. “The world’s top ranked water conflict hotspot is the Arab region, comprised of the Middle East and North Africa,” according to a statement about the March 21-23 talks in Toronto. Adeel said the U.N. should try to promote past traditions of rivals cooperating over supplies in a form of “hydro-diplomacy.” “We have a whole history of cases where…even countries at war have used water almost as a neutralizing element,” he said. India and Pakistan, for instance, cooperated to share supplies in the Indus River even during conflicts in 1965 and 1971. “There are clear advantages in cooperation,” former Canadian Prime Minister Jean Chretien, who will be a co-chair of the meeting in Toronto, told Reuters. “Water will become an ever more important issue,” he said, adding that the talks would look at cases such as the River Jordan, with rival demands by Israelis, Palestinians, Jordanians and Syrians. Experts say the only documented case of a “water war” was about 4,500 years ago when the city-states of Lagash and Umma went to war in the Tigris-Eurphrates basin. Apart from that example, “water has never been the principal cause of two states going to war,” Fabrice Renaud, of the U.N. University’s Institute on the Environment and Human Security, said in a statement. Dear User/Visitor! Please, answer on our questions: tick off one of the positions – your answer will make us able to improve our site and make it more interesting and useful!
<urn:uuid:793ae8d9-4926-4787-8092-34b346c2d024>
CC-MAIN-2020-24
http://www.cawater-info.net/all_about_water/en/?p=2461
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347402457.55/warc/CC-MAIN-20200529054758-20200529084758-00593.warc.gz
en
0.946666
652
3.046875
3
Strawberries are awesome. A big, ripe juicy strawberry ranks right up there as one of the most irresistible foods mother nature offers. Not only are they delicious and refreshing, their health benefits are spectacular. Here are nine superb benefits of eating strawberries on a regular basis. 1. Strawberries Help Keep You Slim Strawberries are quite high in dietary fiber, with a typical serving containing 11 percent of your daily value. Fiber is like the Swiss army knife of nutrients; it plays an important role in a wide variety of functions. According to the Mayo Clinic, fiber helps normalize bowel movements, lower cholesterol levels, control blood sugar, maintain bowel health and achieve a healthy weight. The Harvard T.H. Chan School of Public Health states that fiber appears to reduce the risk of heart disease, diabetes and cardiovascular disease. RELATED: 8 Awesome Benefits of Eating Apples One of the most interesting effects of fiber is that it slows down digestion, which helps you feel full longer after you eat. Since a serving of strawberries is high in fiber but low in calories (48 per serving), it's a perfect snack for anyone looking to lose weight—or for anyone craving an afternoon delight that will hold them over until dinner. 2. Strawberries Fight Cancer A 2011 study at The Ohio State University Comprehensive Cancer Center discovered that consuming freeze-dried strawberry powder daily (equivalent to two ounces of actual strawberries) helped prevent pre-cancerous growths from worsening and in many cases improved their status. The six-month study centered around participants who had esophageal pre-cancerous growths. Eighty percent of the participants saw their "lesions revert to a less dangerous state" by the conclusion of the study. This was likely due to the high amount of antioxidants in strawberries and to their incredible amount of vitamin C. A single serving of strawberries contains 144 percent of your daily value of vitamin C. But strawberries' cancer-fighting properties don't end there. According to the American Institue of Cancer Research, dietary fiber "convincingly" lowers the risk of colorectal cancer, and fruits in general "probably" lower the risk of lung, stomach, mouth, pharynx, larynx and esophagus cancer. 3. Strawberries Prevent Heart Attacks A study from the Harvard Medical School found that regularly eating strawberries and blueberries greatly reduces the risk of heart attack. The 18-year study focused on young women and tracked how often they ate certain foods. After adjusting for various factors, researchers discovered that participants who ate the most strawberries and blueberries were 34 percent less likely to suffer a heart attack than participants who ate the least. Also, there seemed to be no big difference between those who downed tons of strawberries and those who ate them on a fairly regular basis. Eating three or more serving of strawberries or blueberries a week seemed to be the magic number in terms of receiving benefits. "The people with heart benefits had three or more servings of a half a cup of blueberries or strawberries each week," said Dr. Eric Rimm, the study's lead researcher. Why strawberries and blueberries? Probably due to their high concentration of anthocyanins, chemical compounds that have been found to make blood vessels more elastic and lower blood pressure. 4. Strawberries Increase Your Energy Strawberries are a great source of simple carbohydrates, which can be turned into energy quickly. Thus, they make an excellent choice for an afternoon or pre-workout snack. The fruit's high fiber content helps you feel satiated without feeling bogged down, which is exactly what you want from a snack when you're on the go. Combine strawberries with a healthy fat source—such as pistachios or peanut butter—for a supercharged snack that will keep you going strong for a long time. 5. Strawberries Strengthen Your Vision Perhaps the most impressive nutritional aspect of strawberries is their incredible vitamin C content—a single serving contains 144 percent of your daily value. Vitamin C has great benefits for eye health (no pun intended). Vitamin C helps your vision by reducing the risk of cataracts, promoting healthy ocular blood vessels and slowing the progression of age-related macular degeneration. 6. Strawberries Keep Your Blood Vessels Healthy A new study conducted at the University of Colorado, Boulder discovered that taking a vitamin C supplement daily could have big benefits in preventing vascular disease. The researchers monitored the activity levels of ET-1 in obese participants. ET-1 is a vessel-constricting protein, and overweight and obese adults have elevated activity of ET-1. This makes their vessels more likely to constrict and increases their risk of vascular disease. Exercise has long been known as one way to reduce ET-1 activity. However, researchers found that participants who took a daily vitamin C supplement (500 mg/day) reduced their vessel constriction as much as participants who began walking for exercise. Although the study was small and exercise is certainly still the better overall option, the results bode well for vitamin C's ability to promote optimal blood vessel health. 7. Strawberries Help Repair Your Body The vitamin C in strawberries is important for growing and repairing tissue all over the body. According to the University of Maryland Medical Center, vitamin C helps heal wounds and maintain healthy bones and teeth. It also supports the production of collagen, which is needed to make cartilage, ligaments, tendons, blood vessels and skin. RELATED: Skin Care for Athletes Consuming vitamin C on a regular basis might have a beneficial effect in recovering from demanding exercise. A two-week study found that participants who consumed 400 mg of vitamin C daily (a serving of strawberries contains 90 mg) experienced improved muscle function and decreased muscle soreness following exercise. 8. Strawberries Lower Your Bad Cholesterol A 2014 joint-study between Italian and Spanish universities discovered that strawberries have some powerful effects on cholesterol. A team of healthy volunteers consumed a little over a pound of strawberries (equivalent to about three servings) every day for a month to see how it affected their cholesterol. By the end of the month, participants' levels of bad cholesterol were significantly reduced. 9. Strawberries Keep Your Brain Young A 2012 study at Brigham and Women's Hospital found that regularly consuming berries can help you fight off the mental decline that typically accompanies old age. The multi-decade study discovered that participants who regularly consumed berries delayed their memory decline by an average of two and a half years. Researchers at the Human Nutrition Research Center on Aging at Tufts University recently conducted a systematic review that looked at the impact berries have on brain health. They discovered that regularly consuming berries had multiple benefits, including reduced brain inflammation and improved cognition. Photo Credit: Getty Images // Thinkstock
<urn:uuid:bb180f15-00ba-45b7-952d-48665acfc239>
CC-MAIN-2017-43
http://orders.stack.com/a/9-benefits-of-eating-strawberries-everyday
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187826114.69/warc/CC-MAIN-20171023145244-20171023165244-00389.warc.gz
en
0.953699
1,393
2.953125
3
Back to Client Info Index The disease caused by Cheyletiella mites is often called "walking dandruff". On close observation of an infested dog, cat, or rabbit, it may be possible to see movement of the dandruff on the skin. The movement is caused by the mites motoring around under the scales. Cheyletiella mites are found on animals throughout the United States. They generally do not cause significant disease. What is the life cycle of Cheyletiella mites and how are The details of the life cycle of Cheyletiella mites are not known, but presumably the life cycle is completed on one host. The adult mite is transmitted by direct contact between animals. The mites can live several days while off the host, so it is possible for animals to become infected through environmental contamination, e.g., bedding. What are the symptoms of walking dandruff? The mites cause skin irritation, usually along the back of the animal. Infested animals may have slight hair loss, scales (dandruff), itching and possibly some thickening of the skin. Cats and rabbits may not show any signs of infestation. How is an infestation with Cheylettiella diagnosed? Mites may be seen on the animal, especially if you use a magnifying glass. Examining dandruff, hairs or scrapings of the skin under the microscope can positively identify the mites. Because cats groom a lot, Cheyletiella infestations can sometimes be diagnosed in them by examining their feces. (The animals swallow the mites which then go through the intestines without being digested.) What is the treatment for an infestation with Cheyletiella? Cheyletiella are killed by most of the common insecticides used against fleas including pyrethrins, permethrins and organophosphates. Be sure to use an insecticide approved for your species of pet. Rabbits and cats should NOT be treated with permethrin. In general, insecticides safe for cats are also safe for rabbits. Dips in lime sulfur and injections of ivermectin have also been used to treat an infestation with these mites. The mite can live for several days off the host, so the environment needs to be cleared of mites as well. At the same time the animals are treated, the environment may be fogged or sprayed. Since the mites only live for several days off the host, it is often effective to remove the rabbit, dog or cat from the premises for several days until the mites die. This would prevent reinfestation. Could I get Cheyletiella from my pet? These mites can temporarily infest humans causing a mild skin irritation and some itching. In severe cases some open lesions may occur. The information on this page was obtained from the site www.peteducation.com
<urn:uuid:78b8af4d-3faa-479f-b110-a37b911a3f15>
CC-MAIN-2017-30
http://bobmckee.com/Client%20Info/Skin/cheyletiella%20dermatitis.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549423769.10/warc/CC-MAIN-20170721102310-20170721122310-00179.warc.gz
en
0.916368
615
3.203125
3
In this day and age, children are exposed to violent and disturbing topics on the news. Reports on natural disasters, shootings and terrorist attacks can be confusing to a child, teaching them to view the world as a scary place. But there are benefits in raising children who are aware of what’s going on in the world. Dr. Dan Marullo is a Pediatric Psychologist at Children’s of Alabama. He says whether parents should share current events with their child depends on the age and developmental level of the child. “It definitely depends on the age of the child,”Dr. Marullo says.”Kids of different ages have different needs and different developmental levels. I think regardless of the age of the child, one thing to keep in mind is children learn how to cope with adversity by watching their parents.” Dr. Marullo says the first thing for any parent to do is to check how they’re coping with the news or what’s going on around them. Parents should keep things in perspective and help children to understand that television has a way of shrinking the world and bringing it into our living rooms. A child watching a news story about an earthquake in California may lose sleep thinking the same thing could happen in Alabama. Dr. Marullo says younger children, toddlers and preschoolers probably don’t need to see a lot of the bad things on television. “They would have a very hard time managing that so minimizing exposure would be important,”he says. For school age children, the approach should be different. “For older children, they’re probably going to come across media on their own,”Dr. Marullo says. “It’s important for parents to have a dialogue with their child. Watch the media with them, watch the news with them. It certainly makes a great topic of conversation for dinner time. That way parents can monitor their child’s exposure but also answer their questions and model their own behavior.” For parents of school age children, keep in mind a little exposure to adversity is beneficial. “The way we learn to deal with adversity is by experiencing adversity,”Dr. Marullo says. “That doesn’t mean we expose our children to everything, but a little exposure with good guidance from a parent is crucial for their healthy development.” Parents may also want to talk to their child about what can be done to help in a tragic event. Children may gain a sense of control and feel more secure when they think of ways they can help those affected by the tragedy. If a child seems overly anxious, parents should encourage a break from television. Read, play board games or go outside. Look for opportunities to bond as a family and put things in perspective.
<urn:uuid:e00e19d3-67c6-464b-9b0b-3e809d0afaf6>
CC-MAIN-2023-40
https://childrensalblog.org/2016/10/25/talking-to-children-about-current-events/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506480.35/warc/CC-MAIN-20230923062631-20230923092631-00567.warc.gz
en
0.969913
587
3.140625
3
Anti-Mullerian Hormone (AMH) AMH and FSH AMH is one of the most accurate tests to assess a woman's ovarian reserve (OR)ovarian reserve (OR) . AMH levels can be measured at any point of a woman's menstrual cycle. Low AMH is an indicator of diminished ovarian reserve (DOR), a decline in the ovaries’ ability to produce good-quality eggs. DOR is one of the major causes of infertility among women. In reverse, high AMH can signal polycystic ovary syndrome (PCOS). AMH levels are often measured along with follicle stimulating hormone (FSH) levels, another common measure of a woman's ovarian reserve. AMH has a few advantages over FSH: For one, AMH levels can be measured at any time, while FSH has to be measured on a specific day in her cycle; for another, according to recent research, AMH appears to be a better predictor of pregnancy chances than FSH. It has been reported, however, that AMH loses its prognostic ability in women above age 42, although it remains a more reliable predictor than FSH alone. Age and AMH It is important to remember that AMH levels decline and FSH levels increase as women age. In other words, normal AMH and FSH levels vary depending on a woman’s age. For example, a normal AMH level for a woman at 42 could suggest premature ovarian aging (POA) if the same AMH level was found in a 32-year-old woman. Because of this, CHR researched and established age-specific levels of AMH and FSH. Focusing on age-specific AMH and FSH levels allows us to best assess a woman’s ovarian reserve, devise an appropriate treatment plan and estimate her IVF pregnancy chances. Age Specific Baseline FSH and AMH Levels |< 33 Years||< 7.0 mIU/mL||= 2.1 ng/mL| |33-37 Years||< 7.9 mIU/mL||= 1.7 ng/mL| |38-40 Years||< 8.4 mIU/mL||= 1.1 ng/mL| |= 41+ Years||< 8.5 mIU/mL||= 0.5 ng/mL| Pregnancy Chances and AMH Levels Many patients come to CHR after being told by other fertility specialists that their chance of pregnancy is less than 1% because of their low AMH levels. This dismal prognosis may not hold true with proper treatment designed to address low AMH/DOR. A recent analysis of CHR’s IVF outcomes for women with very low AMH found that even above age 41, as long as the patient’s ovaries still produce more than two transferrable embryos, pregnancy rates were in the 6-7% range. This means that it’s particularly important to seek out fertility treatments from an IVF center with a specialized expertise in treating women with low AMH/DOR. Last Updated: April 10, 2017
<urn:uuid:a22f10fb-046b-48b0-99d9-56b4fa596e42>
CC-MAIN-2017-39
https://www.centerforhumanreprod.com/infertilityedu/causes/anti-m%C3%BCllerian-hormone/fsh/
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818694719.89/warc/CC-MAIN-20170926032806-20170926052806-00367.warc.gz
en
0.936439
653
2.90625
3
1911 Encyclopædia Britannica/Akkad AKKAD (Gr. versions ἀρχαδ and ἀχαδ), a Hebrew name, mentioned only once in the Old Testament (Gen. x. 10), for one of the four chief cities, Akkad, Babel, Erech and Calneh, which constituted the nucleus of the kingdom of Nimrod in the land of Shinar or Babylonia. This Biblical city, Akkad, was most probably identical with the northern Babylonian city known to us as Agade (not Agane, as formerly read), which was the principal seat of the early Babylonian king Sargon I. (Šargani-Šarāli), whose date is given by Nabonidus, the last Semitic king of Babylonia (555–537 B.C.), as 3800 B.C., which is perhaps too old by 700 or 1000 years. The probably non-Semitic name Agade occurs in a number of inscriptions and is now well attested as having been the name of an important ancient capital. The later Assyro-Babylonian Semitic form Akkadu (“of or belonging to Akkad”) is, in all likelihood, a Semitic loan form from the non-Semitic name Agade, and seems to be an additional demonstration of the identity of Agade and Akkad. The usual signs denoting Akkadu in the Semitic narrative inscriptions were read in the non-Semitic idiom uri-ki or ur-ki, “land of the city,” which simply meant that Akkadu was the land of the city par excellence, i.e. of the city of Agade of Sargon I., which remained for a long period the leading city of Babylonia. It is quite probable that the non-Semitic name Agade may mean “crown (aga) of fire (de)” in allusion to Ištar, “the brilliant goddess,” the tutelar deity of the morning and evening star and the goddess of war and love, whose cult was observed in very early times in Agade. This fact is again attested by Nabonidus, whose record mentions that the Istar worship of Agade was later superseded by that of the goddess Anunit, another personification of the Istar idea, whose shrine was at Sippar. It is significant in this connexion that there were two cities named Sippar, one under the protection of Shamash, the sun-god, and one under this Anunit, a fact which points strongly to the probable proximity of Sippar and Agade. In fact, it has been thought that Agade-Akkad was situated opposite Sippar on the left bank of the Euphrates, and was probably the oldest part of the city of Sippar. In the Assyro-Babylonian literature the name Akkadu appears as part of the royal title in connexion with Sumer; viz. non-Semitic: lugal Kengi (ki) Uru (ki) = sar mat Sumeri u Akkadi, “king of Sumer and Akkad,” which appears to have meant simply “king of Babylonia.” It is not likely, as many scholars have thought, that Akkad was ever used geographically as a distinctive appellation for northern Babylonia, or that the name Sumer (q.v.) denoted the southern part of the land, because kings who ruled only over Southern Babylonia used the double title “king of Sumer and Akkad,” which was also employed by northern rulers who never established their sway farther south than Nippur, notably the great Assyrian conqueror Tiglath-pileser III. (745–727 B.C.). Professor McCurdy has very reasonably suggested that the title “king of Sumer and Akkad” indicated merely a claim to the ancient territory and city of Akkad together with certain additional territory, but not necessarily all Babylonia, as was formerly believed. A discussion of the interesting question relating to the non-Semitic so-called Sumero-Akkadian language and race will be found in the article Sumer. Literature.—Schrader, Zur Frage n. d. Ursprung d. altbab. Kultur (1883); Keilinschriften und Geschichtsforschung, pp. 533 f.; Fried. Delitzsch, Wo lag das Paradies? (1881), p. 198; Paul Haupt, Akkadische und Sumerische Keilschrifttexte (1881), pp. 133 ff.; Die Sumerische Akkadische Sprache, Verh. 5-ten Orient. Cong. ii. pp. 249-287; Die sumerischen Familiengesetze (1879); Zimmern, Babylonische Busspsalmen (1885), pp. 71 f.; Hommel, Gesch. Bab. Assyr. (1885), pp. 240 ff.; Tiele, Bab. Assyr. Gesch. (1888), p. 68; W. H. Ward, Hebraica (1886), pp. 79-86; McCurdy, Presb. and Ref. Review, Jan. 1891, pp. 58-81; History, Prophecy and the Monuments (1894), §§ 79-85, 94-110; Hugo Winckler, Untersuchungen zur altorientallischen Geschichte (1886), pp. 65 ff. In Rabbinical literature, Louis Ginzberg, in Monatschrift, xliii. 486; and Jewish Encyclopaedia, i. p. 149. (J. D. Pr.) - Prince, Nabonidus, p. v. - In the Sargon inscriptions; Bab. Exped. of the Univ. of Penn. i. pl. 1, nr. 1 line 6; pl. 2, nr. 2 line 5; pl. 3 nr. 3, line 3b; also xi. pl. 49, nr. 119 and in Nebuchadnezzar, col. ii. line 50 (Hilprecht, Freibrief Neb.); Cun. Texts from Bab. Tablets, pl. 1, nr. 91146, line 3. - Rogers, History of Babylonia and Assyria, i. pp. 365, 373-374. - Prince, “Materials for a Sumerian Lexicon,” pp. 23, 73, Journal of Biblical Literature, 1906. - I. Rawl. 69, col. ii. 48 and iii. 28. - History, Prophecy and the Monuments, i. § 110.
<urn:uuid:d734212c-2a8e-4b23-b7b1-3ed7f3995c58>
CC-MAIN-2020-24
https://en.m.wikisource.org/wiki/1911_Encyclop%C3%A6dia_Britannica/Akkad
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347390758.21/warc/CC-MAIN-20200526112939-20200526142939-00063.warc.gz
en
0.878988
1,479
3.671875
4
the way the explanation is written suggests you are talking about more than one pronoun – not just ‘me-moi’. Are there others? i.e. 2- THEY are placed after the verb……… Yes, there are other pronouns, the following lesson will explore them - But in the example, "Donne-moi ça!" ( Give that to me !) it could be Donne-lui = Give him Donne-nous = Give us Donne-leur = Give them Hope this helps! Sign in to submit your answer Don't have an account yet? Join today Test your French to the CEFR standard
<urn:uuid:7c9e013c-e8cd-4841-bf26-5dcd61848418>
CC-MAIN-2020-05
https://kwiziq.learnfrenchwithalexa.com/questions/view/in-the-green-grammar-box-above
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250626449.79/warc/CC-MAIN-20200124221147-20200125010147-00123.warc.gz
en
0.854953
145
2.609375
3
Create virtual environment using venv | Python Virtual environment is a tool that helps to keep dependencies required by different projects separate by creating isolated python virtual environments for them. This is one of the most important tools that most of Python developers use. Need of virtual environment Imagine a scenario where a web app is hosted on a cloud hosting service provider with a python development environment. The configuration for the web app comes with an option for installing the newest version of the Flask web framework. Suppose, the web app is created on the local system with an older version of the framework and as soon as it is uploaded on the site, there will be a version conflict as some of the modules used are depreciated in the latest versions of Flask. Use of virtual environment The above scenario can be solved using virtual environment. Python development environments can be separated by making use of some virtual environment. A virtual environment, here, is an isolated Python installation that allows to manage dependencies and work on separate Python projects without affecting other projects. When a virtual environment is created, it creates a separate folder from the global Python or other virtual environments and copies Python into it along with a site-packages folder among a couple of others. For older versions of Python, virtual machines require installing a third-party tool called virtualenv. It’s been integrated into newer versions of Python3 under the module venv. To know more about virtualenv click here. First, check whether the pip has the same version of the interpreter as that on the system and where the Python environment currently resides: To check where the python currently resides type the below command in the terminal. where python where pip If you’re using Linux, then the “where” command is “which”. It will give you the same information as “where” on Windows. which python which pip To create a virtualenv use the following command: python -m venv ./venv After running this command, a directory named venv will be created. This is the directory which contains all the necessary executables to use the packages that a Python project would need. This is where Python packages will be installed. To list the files in the folder type below command in the terminal: The pip command still points to the global environment. We need to explicitly activate the created virtual environment to configure the current shell session to use pip commands from the virtualenv folder and don’t end up installing packages in the global environment: To activate venv first change the directory to venv\Scripts. After changing the directory type the below command. $ Source venv_name\Scripts> activate Once the virtual environment is activated, the name of your virtual environment will appear on left side of terminal. This will let you know that the virtual environment is currently active. In the image below, venv named virtual environment is active. (Note: try “./activate” instead of “activate” if using powershell terminal) The Python interpreter as well would run the version from the virtual environment and not the global one. We can verify where the Python environment currently resides by below command: The virtual environment is an almost clean Python environment. Run pip list to see a list with packages installed: Now you can install dependencies related to the project in this virtual environment. For example if you are using Django 1.9 for a project, you can install it like you install other packages. (venv_name)$ pip install Django==1.9 Once you are done with the work, you can deactivate the virtual environment by the following command: Now you will be back to system’s default Python installation. Please Login to comment...
<urn:uuid:506e30bf-ac70-4414-b580-50942dcc189e>
CC-MAIN-2023-23
https://www.geeksforgeeks.org/create-virtual-environment-using-venv-python/
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644817.32/warc/CC-MAIN-20230529074001-20230529104001-00648.warc.gz
en
0.834046
907
3.09375
3
Competence and Capability Having thought about this idea of phronesis for a while it didn’t come as a surprise to learn that the three ‘R’s’ – usually taken to mean reading, writing and ‘rithmatic – were originally conceived as Reading and writing Reckoning and figuring Wrighting and wroughting … where the third ‘R’ refers to the knowledge of action, of making and undertaking, of phronetic knowledge. … and brings to mind, again, the distinction between competence and capability, a foundation of skills and competencies which are not ends in themselves but the testbed and toolbox for an occupation – and a life – which is creative, sustainable, meaningful, valuable. Better to have a ‘skilled’ workforce or a ‘capable’ one? My hon. Friends on the Select Committee will have heard me say this before. The narrow concept of the three Rs has no historic justification, even in this country. It was a mistake by an illiterate Member of Parliament in the early nineteenth century. In the seventeenth and eighteenth centuries the original three Rs were, first, reading and writing—literacy—secondly, reckoning and figuring—numeracy—and, thirdly, wrighting and wroughting. The concept of education was that one-third of the time should be spent on creativity in schools. The only point of the literacy and numeracy was to move to the flowering of the individual’s personality in creating things. Mr.Andrew Faulds (Warley, East), Hansard, United Kingdom, 22 February 1982
<urn:uuid:a4442756-26a8-47d4-9d9a-cd531352f1e8>
CC-MAIN-2017-26
http://michaeldoneman.com/competence-and-capability/
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323807.79/warc/CC-MAIN-20170628222452-20170629002452-00535.warc.gz
en
0.96721
345
2.546875
3
The autumn season is here and like every other season; our pets can get into a little seasonal danger during autumn too. To prevent them from getting into trouble, let’s see a few of the dangers dogs can face during this season. 1) Toxic Mushrooms This is the season when the mushrooms bloom to their fullest due to the chilly weather. While 99% of mushrooms are not toxic, the other 1% is highly toxic if consumed. Since we can’t distinguish toxic mushrooms from non-toxic ones, it is generally advisable to keep your dog away from all the mushrooms. If you see your dog eating a mushroom or showing abnormal signs after eating, take them to the vet immediately. Also Read: 9 Most Dog Friendly National Parks 2) Rodent poison This time of year is when we use rodent/ rat poison often. This is because the weather gets chilly and rodents seek shelter at nearby homes. Pet owners must be really careful while using these rodenticides, as they are extremely harmful and if ingested could be fatal. Be very careful in case you use rodenticides at home or wherever your pets are. The best solution would be to use alternate and safer options instead of rodenticides. Conkers are the seeds from horse chestnut trees. During this season, mainly the pet owners must be very careful of conkers. They are highly poisonous if chewed or eaten and if the pets swallow the seed, it can cause a serious blockage problem. The owners must be careful of other malignant plants like daffodils and tulips. Antifreeze smells and tastes sweet. Pets love to lick it but it is one of the most commonly found poisonings among our pets. It is extremely dangerous. As little as a teaspoon or two can be fatal for dogs, depending on the size. Symptoms of this poisoning include acting drunk or uncoordinated, excessive thirst, and lethargy. Mothballs contain chemicals such as paradichlorobenzene or naphthalene. If consumed by pets, it can cause vomiting, abdominal pain, tremors, kidney and liver failure, and weakness. In case you use mothballs at home, make sure it is away from your pets to reach. 6) Compost bins or piles Decomposing and decaying organic matter and molding food products in your compost backyard piles have the potential to contain tremorgenic mycotoxins. These toxins produced by molds cause tremors or seizures even when ingested in small amounts. The tremors can last anywhere from 30 minutes to several hours. Make sure your pet is safe and away from the compost bins and piles and in case of emergency immediately take them to the vet. 1. Protect their paws Cold weather is ultimately near. Remember to take care of your fur friend’s toe beans. It can cause cracks, dryness, swelling and pain. Use paw booties to keep them warm and convenient to walk around. 2. Feed joint supplements Cold weather can sometimes become a roller coaster, especially if your fur buddy is a senior pooch. One of the common issue bothers in aged pets are osteoarthritis. Inflammation in joints wreak havoc their quality life. Ask your vet about joint supplements and add them to your pet’s diet. Relatable Blog: Must-have supplements for senior dogs These are some of the dangers your pets can face throughout the autumn. Take the necessary precautions to keep your dog safe and Happy Autumn, everyone!
<urn:uuid:a321c41b-25bf-48c4-8c1e-d5b2ad6e2009>
CC-MAIN-2023-40
https://blog.mywaggle.com/6-fall-dog-protection-tips/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506029.42/warc/CC-MAIN-20230921174008-20230921204008-00802.warc.gz
en
0.939093
741
2.546875
3
Furious at the Tea Party, the king punished Boston. He approved the Boston Port Act, March 7, 1774, effectively closing their harbor to all commerce and ruining their economy. Surrounding towns rallied by sending food. William Prescott, who later commanded at Bunker Hill, wrote: “If we submit to these regulations, all is gone. . . Our forefathers passed the vast Atlantic, spent their blood and treasure, that they might enjoy their liberties, both civil and religious, and transmit them to their posterity. . . Now if we should give them up, can our children rise up and call us blessed?” Upon hearing of the Boston Port Act, Thomas Jefferson drafted a day of fasting and prayer resolution, to be observed the same day the blockade was to commence. It was introduced in the Virginia House of Burgesses by Robert Carter Nicholas, May 24, 1774. Supported by Patrick Henry, Richard Henry Lee and George Mason, it passed unanimously: “This House, being deeply impressed with apprehension … from the hostile invasion of the city of Boston in our Sister Colony of Massachusetts Bay, whose commerce and harbor are, on the first day of June next, to be stopped by an armed force, deem it highly necessary that the said first day of June be set apart, by the members of this House, as a Day of Fasting, Humiliation and Prayer, devoutly to implore the Divine interposition, for averting the heavy calamity which threatens destruction to our civil rights. . . Ordered, therefore that the Members of this House do attend. . . with the Speaker, and the mace, to the Church in this City, for the purposes aforesaid; and that the Reverend Mr. Price be appointed to read prayers, and the Reverend Mr. Gwatkin, to preach a sermon.” On the appointed day of fasting, June 1, 1774, George Washington wrote in his diary: “Went to church, fasted all day.” The king’s appointed royal governor, Lord Dunmore, was so upset by this day of fasting and prayer resolution that two days later he dissolved Virginia’s House of Burgesses. Virginia’s colonial leaders went down the street and gathered in Raleigh Tavern, where they decided to form a Continental Congress which met in Philadelphia a little over three months later. The next spring, the battle of Lexington and Concord took place on April 19, 1775. Many colonies passed resolves against the king. On May 31, 1775, citizens of Charlotte Town, North Carolina, passed the Mecklenburg Resolves, which stated: “Whereas by an Address presented to his Majesty by both Houses of Parliament in February last, the American Colonies are declared to be in a State of actual Rebellion, we conceive that all Laws. . . derived from the Authority of the King or Parliament, are annulled and vacated. . . All Commissions, civil and military, heretofore granted by the Crown, to be exercised in these Colonies, are null and void. . . That whatever Person shall hereafter receive a Commission from the Crown, or attempt to exercise any such Commission heretofore received, shall be deemed an Enemy to his Country. . . That these Resolves be in full Force and Virtue, until Instructions from the General Congress of this Province. . . shall provide otherwise, or the legislative Body of Great-Britain resign its unjust and arbitrary Pretentions with Respect to America. . . That the several Militia Companies in this county do provide themselves with proper Arms and Accoutrements, and hold themselves in Readiness to execute the commands and Directions of the Provincial Congress.” The next year, the Continental Congress voted for independence from the king. Written by Bill Federer.
<urn:uuid:4b1e775c-d9dd-4f78-8759-5961409a3997>
CC-MAIN-2023-40
http://christianpoliticalparty.com/a-day-of-fasting-humiliation-and-prayer-june-1-1774/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510942.97/warc/CC-MAIN-20231002001302-20231002031302-00162.warc.gz
en
0.962125
782
3.09375
3
Earwigs often invade a home for protection and moisture. They can easily be controlled and pose little threat to humans. Finding earwigs in the house does not mean they are breeding in your home. Similar to cockroaches Earwigs come indoors to hide from daylight. They are attracted at night to lights and moist areas inside the house. Moist areas around the foundation of a home, near water spigots, and moist areas inside the home such as in unventilated crawl spaces attract earwigs. Repeatedly finding earwigs inside often means there are cracks and other access points through which the insects are entering. Other than being a nuisance, earwigs pose little threat to a house. Earwigs can however spread bacteria and other micro-organisms which can be a health risk to residents. Earwigs can be controlled by pesticides and trapping, and also by good sanitation practices. Old tuna fish cans filled with fish or vegetable oil can be placed near problem spots such as debris or mulch piles. Once trapped, earwigs can be killed with soapy water. Dusts and residual sprays can be used indoors to control earwigs. These should be sprayed on baseboards, under cabinets, and behind shelves and appliances. Other places to inspect and treat include under sinks, behind dishwashers and behind bathtubs—anywhere moisture can build up. Prevent earwigs from coming inside the house by eliminating moist spots near the structure. This can include clearing up debris or ensuring your property is drained properly, keeping water away from the foundation. Make a 12-18” gravel border between your home and any landscaping. Seal up entry points such as windows and pipe entrances.
<urn:uuid:b83f6e8e-a4bc-4f15-8f60-4b24b433e82a>
CC-MAIN-2014-41
http://www.pestnet.com/earwig/earwigs-in-house/
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1412037663007.13/warc/CC-MAIN-20140930004103-00408-ip-10-234-18-248.ec2.internal.warc.gz
en
0.955261
351
3.078125
3
This article examines how the Ukrainian state has used, and continues to use, history to forge collective identities in Ukraine. It assesses how history textbooks are utilised by the state as ‘tools’ to introduce schoolchildren to key historical episodes around which a modern Ukrainian national identity can be shaped. Attempts to ‘historicise’ Ukrainian national identity must answer fundamental questions such as: Who are we? Where have we come from? Where are we going? Who are we not? The final question is vital in understanding ‘who we are’ in comparison to the ‘other’. Thus, emphasis is placed on how the Ukrainian state is attempting to form an all-encompassing Ukrainian identity by distancing itself from Russia. The article argues that while a ‘national’ history is being espoused, a ‘regional politics of the textbook’ is subtly being allowed by the state to develop. This stands at odds with state attempts to create one universal, all-encompassing Ukrainian history. |Number of pages||16| |Journal||Studies in ethnicity of nationalism| |Publication status||Published - Sept 2006| - collective identities - history textbooks - modern Ukrainian national identity - Ukrainian state
<urn:uuid:a42fc895-3708-47a1-bac4-593495f276e9>
CC-MAIN-2023-23
https://research.aston.ac.uk/en/publications/reinventing-the-past-the-politics-of-national-history-in-the-ukra
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646144.69/warc/CC-MAIN-20230530194919-20230530224919-00227.warc.gz
en
0.891802
313
2.703125
3
Definition of plot: the general course of a story including significant events that determine its course or significant patterns of events; an area or land used for building on or planting on , etc); to trace out (a graph or diagram) "they had plotted a robbery."
<urn:uuid:97926465-ed20-4198-b97f-4567aa0ca028>
CC-MAIN-2020-10
http://thesaurasize.com/plot/length
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875143455.25/warc/CC-MAIN-20200217235417-20200218025417-00367.warc.gz
en
0.919477
57
2.90625
3
Most hateful, as dearest foe. The word dear, meaning “beloved,” is the Saxon deor (dear, rare); but dear, “hateful,” is the Anglo-Saxon derian (to hurt), Scotch dere (to Would I had met my dearest foe in heaven, Or ever I had seen that day, Horatio. Shakespeare: Hamlet, i.2. Source: Dictionary of Phrase and Fable, E. Cobham Brewer, 1894 More on Dearest from Infoplease: - Mommie Dearest - Starring Faye Dunaway, Diana Scarwid, Steve Forrest, Howard Da Silva, Mara Hobel - Dearest - Dearest Most hateful, as dearest foe. The word dear, meaning “beloved,” is the Saxon ... - Mary My Dearest (Maria de mi corazon) - Starring María Rojo, Héctor Bonilla, Salvador Sánchez, Tomás Mojarro, Martha Navarro - dear: meaning and definitions - dear: Definition and Pronunciation - O May, Thy Morn - Poems and Songs of Robert Burnsby Robert Burns A Grace After Dinner, Extempore Ae Fond Kiss, And ... 24 X 7 ||24 x 7 Tutor Availability ||Unlimited Online Tutoring
<urn:uuid:e5f215c0-e7ee-4b06-b8e1-6364bd4a53de>
CC-MAIN-2014-41
http://www.infoplease.com/dictionary/brewers/dearest.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657136494.66/warc/CC-MAIN-20140914011216-00301-ip-10-234-18-248.ec2.internal.warc.gz
en
0.735847
295
2.71875
3
How to Draw Drapery In this basic drawing guide, the team of Drawingforall.net will show you how to draw a drape, that is, a fabric. This skill is basic along with the ability to depict simple geometric shapes such as cubes or pyramids. In the process of drawing various subjects, artists are often faced with the fact that they need to draw fabric. And just like in any other case, fabric drawing has its own principles and important points. In this article, the team of Drawingforall.net will try to tell and show all the important aspects in drawing draperies. In our example, we decided to depict a piece of fabric hanging on the wall. To begin with, de[pict the contours of this very fabric with very light lines. Here we need to mark the boundaries and location of the object in the composition. With smooth, long lines, begin to depict the folds. First of all, you should depict the largest folds, then move on to smaller ones. Create folds accurately and smoothly, taking into account the shape and volume of the depicted object. Try to convey the smoothness of the contours of the folds, as is done in the image from the artists of Drawingforall.net. The main contours and folds are drawn, and it’s time to start adding shadows to give the drapery drawing volume. Traditionally, start creating shadows from the darkest areas. The hatching should be very smooth and even. When creating hatching, it is necessary to take into account the volume and rotations of the fabric. Continue adding shadows with hatching. You can darken the shadows by adding additional layers of strokes. Try to depict all shadows, highlights, and cast shadows as correctly as possible. This is described in more detail in our article on light and shadow. As you can see, the process of adding shadows should be smooth and very even. The artists of Drawingforall.net darken the fabric in the darkest areas, constantly comparing different areas, revealing the correct ratios of light and shadow. Make the parts closest to us more contrasting, and the farthest parts less contrasting. This will give your drapery drawing more volume. In addition, gradually remove unnecessary construction lines that may have been sketched at the very beginning of the work. Do not forget about the cast shadow, which will make your drapery drawing more voluminous and material. Make the necessary finishing touches to complete the drawing. Do not forget that the drawing should be constantly corrected and improved from the very first to the last step. So, the tutorial on how to draw a drapery is complete. Be sure to compare your result with that drawn by the artists of Drawingforall.net. If you find any mistakes in your artwork, then either correct the necessary area or try to draw everything from the very beginning. Continuous training like this will allow you to hone your art skills and raise them to very great heights. If your drapery drawing is perfect, try depicting the fabric at a different angle or with different lighting. Take any piece of fabric, lay it down, or hang it like in our example, light it with a lamp and start creating. In addition, do not forget to look at other articles from the Basic Drawing Tutorials section on our website. There you will find many useful and truly important tips for any artist.
<urn:uuid:26251584-a1b3-40de-80e1-bc4ca1f6dc3a>
CC-MAIN-2023-14
https://www.drawingforall.net/how-to-draw-drapery/
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949678.39/warc/CC-MAIN-20230331175950-20230331205950-00581.warc.gz
en
0.93666
722
3.125
3
In Goncharova’s famous painting, The Cyclist, the figure is willfully heading in the opposite direction to that indicated by the pointing authoritarian finger. It suitably sums up Goncharova’s spirit. A leading figure of the new avant-garde art scene in Russia, she defied convention at every turn. |The Cyclist (1912-13), with its Futurist devices of depicting time and speed with multiple outlines, challenged the Italian Futurists obsession with machines by choosing a more peaceful mode of transport, a bicycle.| Born in 1881, the same year as Picasso, Natalia Goncharova was a generation older than Lee Krasner, with origins very different to that of Krasner’s Jewish parentage. From a family of impoverished aristocrats, Goncharova learned about the lives and traditions of the peasants who lived on the family estate, which was to become a great influence on her work. The first modern artist to have a retrospective exhibition in Russia, Goncharova had previously been charged with obscenity and had her paintings confiscated for daring to paint the female nude so explicitly. The breadth of her work is astonishing. Painter, printmaker, fashion and set designer, she also embraced and initiated art forms such as Rayonism. To indicate the diverse range of her work, life-long partner, Mikhail Larionov coined the term ‘everythingism’. She was one of the first Russian artists to perceive and value the high artistic merits of Russian national creativity, and some wonderful samples are shown in the exhibition. In Round Dance, 1910, for example, the artist imitates peasant woodcuts in paint. She portrays the peasants with faces like in icons, which has the effect of a attributing to them a saintly status. She explained that ‘the need to go back to these naive forms of art, is necessary to find new forms’. Folk art is not refined. But it is sincere, revealing the instinct of the tribe/community, the people unconsciously preserving the treasure of these primal concerns. Goncharova recognised this. She also recognized the power of folk tales and mythology, and her ground-breaking sets and costumes for Nikolai Rimsky-Korsakov’s opera The Golden Cockerel (1914), produced by Diaghilev as a part of the famous Saisons Russes in Paris, are based on the Old Believer lubki’s subjects and colour palette as well. I got the sense that Lee Krasner (1908-84) was just as determined, radical and brave. She also refused to develop a ‘signature image’; being restless like Goncharova, she continued to experiment with different styles and forms throughout her life. It was most important to her that her paintings emerged authentically from within. “I like a canvas to breathe and be alive. Be alive is the point.” The show at the Barbican gives a rich overview of her life and career from early self-portraits and life drawing, showing a progression into the abstract expressionist works for which she is known. I was particularly interested in the ‘hieroglyphic’ images and her abstract alphabets, what she called her “mysterious writings”. They reminded me of Mark Tobey’s ‘white writing’ paintings: dense, rhythmic nets of black paint over multicolor backgrounds or meticulously over-written in white like sacred scripts. It was after her husband died and she was able to work in the barn space that she really found her artistic identity. Here she could work on an unprecedented scale, tacking lengths of canvas directly to the wall. She then produced her ‘Night Journeys’ series of paintings, made during chronic insomnia using organic, umber tones because she didn’t like using colour in artificial light. Vibrant colours returned some years later in a shift from soft, biomorphic shapes to more hard-edged abstract forms. Palingenesis, titled after the Greek word for re-birth was something Krasner considered fundamental for her practice. “Evolution, growth and change go on. Change is life.” In another act of metamorphosis, she tore up work she wasn’t happy with and created astonishing collages from the fragments. Burning Candles, Desert Moon, and Bald Eagle collages by Lee Krasner. “Painting is a revelation, an act of love…as a painter I can’t experience it any other way.”
<urn:uuid:5fff8d04-55d0-478f-a752-66c18a53c5c3>
CC-MAIN-2020-29
https://sarahjfeatherstone.com/2019/09/04/palingenesis-and-the-art-of-everythingism/
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657142589.93/warc/CC-MAIN-20200713033803-20200713063803-00143.warc.gz
en
0.966495
967
2.5625
3
Today’s number brought to you by Funeral Directors of New Zealand. Kidney Attack (aka Acute Kidney Injury) is responsible for at least 1300 deaths a year in New Zealand. It used to be said that people died with Acute Kidney Injury rather than of Acute Kidney Injury. The paradigm has shifted in the last few years. Now it is recognised that an acute attack on the kidneys is a killer all by itself. Of course, the attack is still most often precipitated by another event – heart attack, serious infection, cardiac surgery etc etc etc. How did I come up with 1300? A comprehensive study of nearly 20,000 hospital admissions showed that there was a 4.1 times increase in risk of death in hospital for those with Kidney Attack compared to those without. The Ministry of Health in New Zealand do not report hospital mortality data, but a very helpful MOH information analyst, Chris Lewis (thanks Chris), dug out some numbers for me. There were 7582 patients out of 548,965 discharges from public hospitals in 2011/12 who were “Discharged Dead”, Died in the emergency department, or Discharged for organ donation. This does not necessarily capture all deaths (eg Private Hospitals are not included). However, it gives me enough to go on using the proportion who died overall, the increased odds of death with Kidney Attack (4.1), the estimated number of Kidney Attack patients (30,000), and a little bit of math. The result is at least 1300 Kidney Attack deaths.
<urn:uuid:30f563ed-4461-468d-baa6-edee29fb3344>
CC-MAIN-2014-35
http://sciblogs.co.nz/kidney-punch/2013/02/20/1300/
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500835699.86/warc/CC-MAIN-20140820021355-00368-ip-10-180-136-8.ec2.internal.warc.gz
en
0.96925
323
2.515625
3
Amīr Khosrow was the son of a Turkish officer in the service of Iltutmish, sultan of Delhi, and for his entire life he enjoyed the patronage of the Muslim rulers of Delhi, especially Sultan Ghīyās-ud-Dīn Balban and his son Muḥammad Khān of Multān. During his youth he became a dedicated follower of the saint of Delhi, Muḥammad Niẓām-ud-Dīn Awliyā, of the Chishtī dervish order; eventually he was buried next to the saint’s tomb. Sometimes known as “the parrot of India,” Amīr Khosrow wrote numerous works, among them five divans, which were compiled at different periods in his life, and his Khamsah (“Pentalogy”), a group of five long idylls in emulation of the Khamseh of the celebrated Persian poet Neẓāmī (c. 1141–1209). Amīr Khosrow’s pentalogy deals with general themes famous in Islāmic literature. In addition to his poetry, he is known for a number of prose works, including the Khazāʾin al-futūḥ (“The Treasure-Chambers of the Victories”), also known by the title Tārīkh-e ʿAlāʾī (“The History of Ala”). Two historical poems for which he is well known are Nuh Sipihr (“The Nine Heavens”) and the Tughluq-nāmah (“The Book of Tughluq”).
<urn:uuid:ae4f78db-0fe7-418f-a6fa-4add3f2e42ab>
CC-MAIN-2014-10
http://www.britannica.com/print/topic/20788
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394678704694/warc/CC-MAIN-20140313024504-00016-ip-10-183-142-35.ec2.internal.warc.gz
en
0.978618
372
3.140625
3
FAO calls for better coordination between the two sectors towards sustainable farming systems and forest management 18 July 2016, Rome – While agriculture remains the most significant driver of global deforestation, there is an urgent need to promote more positive interactions between agriculture and forestry to build sustainable agricultural systems and improve food security. This is the key message of the FAO’s flagship publication The State of the World’s Forests (SOFO), presented today at the opening of the 23d Session of the FAO Committee on Forestry (COFO). Forests play a major role in sustainable agricultural development through a host of channels, including the water cycle, soil conservation, carbon sequestration, natural pest control, influencing local climates and providing habitat protection for pollinators and other species. “The 2030 Agenda for Sustainable Development, as well as the Paris Agreement on climate change, recognizes that we can no longer look at food security and the management of natural resources separately,” said FAO Director-General José Graziano da Silva in his opening remarks to the Committee on Forestry.” Both agreements call for a coherent and integrated approach to sustainability across all agricultural sectors and food systems. Forests and forestry have key roles to play in this regard”. “The key message from SOFO is clear: it is not necessary to cut down forests to produce more food,” he added. Agriculture accounts for the lion’s share of the conversion of forests. According to today’s report, in the tropics and subtropics large-scale commercial agriculture and local subsistence agriculture are responsible for about 40 percent and 33 percent of forest conversion, respectively, and the remaining 27 percent of deforestation happens due to urban growth, infrastructure expansion and mining. On the flip side of the coin, the report stresses that forests serve many vital ecological functions that benefit agriculture and boost food production. “Food security can be achieved through agricultural intensification and other measures such as social protection, rather than through expansion of agricultural areas at the expense of forests,” said Eva Müller, Director of FAO’s Forestry Policy and Resources Division. “What we need is better cross-sectoral coordination of policies on agriculture, forestry, food and land use, better land use planning, effective legal frameworks, and stronger involvement of local communities and smallholders.” She added: “Governments should provide local communities not only with secure land tenure but also with secure forest tenure rights. A farmer knows best how to manage his or her own resources but often lacks legal instruments to do so.” Improving food security while halting deforestation Well-managed forests have tremendous potential to promote food security. Besides their vital ecological contributions, forests contribute to rural livelihoods and poverty alleviation through income generated by engaging in the production of forest goods and environmental services. About 2.4 billion people rely on wood fuel for cooking and water sterilization. And forest foods provide protein, minerals and vitamins to rural diets and can also serve as safety nets in periods of food scarcity. According to SOFO, since 1990, over 20 countries succeeded in improving national levels of food security while at the same time maintaining or increasing forest cover – demonstrating that it is not necessary to cut down forests to produce more food. Twelve of these countries increased forest cover by over 10 percent: Algeria, Chile, China, the Dominican Republic, the Gambia, Islamic Republic of Iran, Morocco, Thailand, Tunisia, Turkey, Uruguay, Viet Nam. Their successes all relied on a similar set of tools: effective legal frameworks, secure land tenure, measures to regulate land-use change, policy incentives for sustainable agriculture and forestry, adequate funding, and clear definition of roles and responsibilities of governments and local communities. Successful case studies The report cites case studies from seven countries – Chile, Costa Rica, The Gambia, Georgia, Ghana, Tunisia and Viet Nam – that illustrate the opportunities for improving food security while increasing or maintaining forest cover. Six of these countries achieved positive change in the period 1990-2015 in two food-security indicators – the prevalence of undernourishment and the number of undernourished people – as well as increases in forest area. The Gambia, the only low-income country among the seven, succeeded in achieving the first goal of halving the proportion of hungry people within the same period. Viet Nam, for example, has implemented a successful land reform to provide secure land tenure as a way of encouraging long-term investment. This process was accompanied by a shift from state forestry to multi-stakeholder forestry with the active participation of local communities including a forest land allocation programme and forest protection contracts with local households. The land reform was also coupled with policy instruments to increase agricultural productivity, including land tax exemptions, soft loans, export promotion, price guarantees, support for mechanization and reductions in postharvest losses. In Costa Rica, deforestation reached its peak in the 1980s, mainly due to the conversion of forest cover to pastures. The country has since reversed this trend largely due to the forest law, which now prohibits changes in land use from natural forest, and its system of Payments for Environmental Services (PES), which provides farmers with incentives to plant trees, and supports forest conservation. As a result, forest cover has increased to nearly 54 percent of the country’s land area in 2015. In Tunisia national development plans recognize the beneficial role of forests in protecting land against erosion and desertification. Agricultural production has increased through intensification that makes better use of existing agricultural land through irrigation, fertilizers, mechanization, improved seeds and better farming practice. Incentives for establishing forest plantations in the country include free seedlings and compensation for the loss of agricultural income.
<urn:uuid:a89c218f-6134-4c80-b133-6fe4a79eeacb>
CC-MAIN-2023-40
http://agroinform.asia/en/2016/07/19/bridging-the-gap-between-forestry-and-agriculture-to-improve-food-security/
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511075.63/warc/CC-MAIN-20231003092549-20231003122549-00402.warc.gz
en
0.93023
1,182
2.796875
3
$$ - An introduction to Microsoft Windows Vista Microsofts Windows Vista operating system was released in January 2007, the fruits of a development cycle whose commencement predated the release of Windows XP. With such a long time in development, readers may be led to assume that Vista must be a significant and impressive piece of software. But is it? To help you weigh up whether Vista is a sensible purchase for your own home or practice, lets look at the features likely to effect performance, productivity and usability. Improved memory management Vista has made minor changes to the way that applications are handled in memory. If you look at your Task Manager in Vista, youll find that you have very, very little physical memory free. Compare the exact same hardware configuration, with the same applications running in XP, and youll have significantly more memory free. The reason for this is that Vista uses a technology called SuperFetch to predict what you are going to do by preloading parts of commonly used applications into memory. This is an evolved version of the Prefetching technology used in Windows XP, except that it is far more aggressive and sophisticated in Vista. Built-in file protection At some point in every PC users life, they will be confronted with the accidental deletion of an important file. Vista tries to lessen the chances of this problem impacting people adversely by backing up their files automatically. In the event that the user overwrites a file, or permanently deletes it, they will have the opportunity to retrieve a backed up version of the file. Although most modern productivity applications already have similar recovery methods, this new safety net should decrease the chance of lost data. The promise of increased security is one of the main Vista features touted by Microsoft to organisations looking to upgrade operating systems. Unfortunately, the main method they have employed in upgrading security in Vista is through a feature called User Account Control (UAC). The practical result of UAC is that whenever an application tries to perform system level functions, the user will be forced to authorise the action. The effect of this on the user is that during typical (and at times fairly benign), computer use, you are confronted with an endless stream of dialogue boxes prompting you to enter your administrative username and password credentials. One of the risks with this approach to security is that many users are likely to simply disable UAC, thereby nullifying the feature entirely. Most people agree that the Vista user interface looks nice, and for many, this appears to be one of the major selling points for the operating system. It should, however, be noted that the Vista interface can easily be replicated in Windows XP by using a simple application like WindowBlinds, which completely alters the user interface. The obvious benefit of Vista is that the operating system has the theme applied by default, whereas to get the same effect in another operating system requires the installation of a third-party application. Improved search functionality The process of finding files in Vista is quite simple. The Start Menu has a search field embedded that gives you the option to look for files in one click. Vista indexes all the files on your computer, so that you can find files not just by looking for file names, but also by other attributes, or words contained within documents. This approach has been available in third-party software products such as Google Desktop for a few years now, and is comparable to Apples MacOS X Spotlight functionality. Again, the main advantage here is that with this feature being installed in Vista by default, you do not need to recruit third‑party applications for what are considered fairly key features of a modern computing environment. A drawback of the system is that the file index consumes space on your hard disk, and will slow down your system functionally whilst indexing is taking place. Built-in DVD burning support One of the frustrating shortcomings of Windows XP is that third-party software like Ahead Nero is required to burn DVDs. Conveniently, Vista supports DVD within the operating system natively. Hard disk level encryption Vista has a hard drive encryption tool called BitLocker. This is another security feature which Microsoft has touted, however the feature is only included in the pricey Vista Ultimate edition. Additionally, volume encryption can be performed by freeware tools like TrueCrypt, so although it is a very powerful tool, it doesnt fare as a particularly strong selling point for Vista. Despite the aforementioned improvements, Vista has been derided for its shortcomings, some of which are detailed below: Many customers who have bought Vista pre-installed on laptop computers have complained passionately about how slow their systems run. The reason for this is simple: Vista has higher system hardware requirements than any other operating system. Many benchmarks have been conducted, the results usually demonstrate that on computers with higher specifications, Vista and XP perform fairly similarly in common tasks such as starting up the computer and opening applications. On computers with lower specifications however, Vista runs much slower than the operating system it has been designed to replace. There are a large number of features that Vista provides, but a large number of these features are never touched by an everyday PC user. Across the entire software spectrum, many vendors have been working hard to release updated versions of their applications that are compatible with Vista. Despite their efforts, there are still many that have not yet completed this process. Vista comes in several flavours, the Business Edition being positioned as the equivalent of XP Professional. However, the prices are vastly disparate. Vista Business is priced at $AU565, whereas Windows XP Professional can be had for $AU190. When evaluating the costs and benefits, many would agree that Vista Business is not three times the product Windows XP Professional is! The high price of Vista and competitive pressure from the Apple platform has been flagged as reasons several major computer hardware manufacturers have started to offer the free Linux operating system as a bundled alternative to Vista. Laptop battery life Vista uses a feature called Aero to improve the visual style of the user interface. However, this feature is quite resource intensive, causing many internal computer components (CPU, graphics card etc) to draw significantly more power than an identical laptop running Windows XP. It is possible to switch Aero off, but having to disable functionality to achieve acceptable performance is not an attractive proposition. Vistas biggest strength is that it brings together a large number of incremental improvements and tools attractive to the everyday user and bundles them under a refined interface. From a cost-benefit perspective however, it is hard to justify the purchase of a Vista licence unbundled from new computer hardware, as many of the touted improvements present in Vista are available to Windows XP users via free and low cost third-party add-ons. As tends to be the case with new operating systems however, the choice to upgrade is usually not if, but when. With most PC hardware manufacturers having made Vista the default shipping operating system over a year ago, and Windows XP becoming increasingly difficult to find, the number of computer users switching to Vista is going to steadily increase in the coming months. While currently, this does not necessarily mean that existing Windows XP licences cant be installed on newly purchased hardware, there is no guarantee that Windows XP will be compatible with hardware released in the months and years to come. With this in mind, Microsoft Windows users are advised to ensure that all the important software applications that they use in their organisation are (or will soon be) available in versions that are Vista compatible. Posted in Australian eHealth
<urn:uuid:f7008c09-0fd7-47ac-a648-a06b94ce0aa4>
CC-MAIN-2017-47
https://www.pulseitmagazine.com.au/news/australian-ehealth/334-an-introduction-to-microsoft-windows-vista
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934808260.61/warc/CC-MAIN-20171124161303-20171124181303-00480.warc.gz
en
0.952007
1,518
2.609375
3
Look up workforce in Wiktionary, the free dictionary. The workforce is the labour pool in employment. It is generally used to describe those working for a single company or industry, but can also apply to a geographic region like a city, state, country, etc. The term generally excludes the employers or management, and can imply those involved in manual labour. It may also mean all those that are available for work.
<urn:uuid:c2ba9849-4696-4054-9b50-c07c70eb6822>
CC-MAIN-2014-35
http://en.wikipedia.org/wiki/Workforce
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535917463.1/warc/CC-MAIN-20140901014517-00405-ip-10-180-136-8.ec2.internal.warc.gz
en
0.952863
85
2.84375
3
Safety Tips for Any Picnic! Preparing For Your Picnic - Always wash your hands before preparing food - Keep all meat products cold with ice or ice packs inside of a cooler. - Keep the cooler in the shade, keep the lid closed and avoid opening it as much as possible. - Use a separate cooler for drinks to avoid opening the one containing the perishable food too often. - When cooking meats - make sure to cook them thoroughly. - Make sure to bring plenty of drinks to stay well hydrated because there may not be any safe drinking water where you are having your picnic. - Bring spray, cleaners, soap, and water (or hand sanitizer), paper towels, cloths and napkins. Wash tables or use fresh tablecloths. Clean the grill before cooking! - Kids - make sure you use the utensils that your parents provided for serving food instead of your fork or spoon. When your picnic is finished - Place all food back in the cooler and keep cold with ice or ice packs. - Throw any dirty paper or plastic ware in a trash can. - When you return home make sure to wash your cooler!
<urn:uuid:68c67e3f-16e3-4048-b149-ac6965c7c3af>
CC-MAIN-2013-48
http://www.kunzler.com/picnic_safety.asp
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163052727/warc/CC-MAIN-20131204131732-00070-ip-10-33-133-15.ec2.internal.warc.gz
en
0.907507
249
2.625
3
Canadian Thanksgiving - a History Monday, October 5, 2015 Although Thanksgiving is celebrated in both Canada and the United States, the holidays have different roots. The origin of Canadian Thanksgiving In Canada, Thanksgiving can be traced back to the English voyageur Martin Frobisher who was searching for the Northwest Passage in 1578 (some 40 years before the Pilgrims celebrated the bounty of harvest). The ships of Frobisher's fleet became separated in the severe weather that plagued them. When they finally met up again in what is now Frobisher Bay, they were so thankful for surviving the ordeal that they observed communion and celebrated with a huge feast. The first Thanksgiving celebration was born. The tradition carried forward in a haphazard fashion, being invoked for any number of reasons to give thanks over the years. By 1879, it became an annual event, usually celebrated in late October or early November, but it wasn't until 1957, that it became a national holiday. The celebration has taken on a more secular meaning today, where people of all creeds celebrate the blessings in their lives by feasting with family and friends. While Canadian Thanksgiving is traditionally celebrated on the second Monday in October, the United States celebrates on the 4th Thursday of November (usually making a 4 day week-end). Aside from the date, though, both Canadians and Americans enjoy the same menus, parades, festivals, traditions, and family gatherings that make the holdiday special. The Western Direct family would like to wish you and yours a very happy and abundant Thanksgiving. View more articles like this.
<urn:uuid:f0e59661-2bf6-4c28-9dd3-336a50d6b8ce>
CC-MAIN-2017-43
http://westerndirect.ca/learning-centre/insurance-news-and-advice/view/921-canadian-thanksgiving-a-history
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823282.42/warc/CC-MAIN-20171019103222-20171019123222-00273.warc.gz
en
0.967168
323
3.390625
3
Learning Network Briefs (LN Briefs) are written by the Learning Network Team or other invited authors on topics featured in our website. The overarching goal of the Briefs is to translate knowledge on emerging and significant issues so that it will be accessible by a wide range of stakeholders and partners who are working to support survivors and to prevent violence against women and children. Accordingly, the LN Briefs are short and are written in straight forward language. The focus of most LN Briefs is - to discuss emerging, controversial, and/or complex issues; - to summarize recent research findings in peer-reviewed publications Femicide of Older Women Learning Network Brief 31 This learning brief examines femicide of women who are older. Dr. Myrna Dawson and Danielle Sutton at the University of Guelph examined the killing of 452 older women (55 yrs. & older) in Ontario over a 38-year period (1974 to 2012). The data were collected from a number of official and unofficial sources including death records kept by the Office of the Chief Coroner of Ontario, Crown Attorney files, court documents, and media coverage. Learning Network Brief 30 This learning brief defines and discusses examples of sexual femicide, including sexual femicide that takes place in armed conflict, that is committed by strangers, and that occurs in the context of hate crime or domestic violence. Sexual violence myths are discussed and dispelled, and recommendations for addressing the root causes of sexual femicide are provided. Forms of Femicide Learning Network Brief 29 This learning brief defines femicide and its various manifestations, including: intimate femicide, non-intimate femicide, murder of women and girls in the same of "honor", murder of women and girls because of their sexual orientation or gender identity, murder of Aboriginal women and girls because of their gender, female infanticide and gender-based sex-selective foeticide, genital mutilation related femicide, dowry-related femicide, organized crime related femicide, and the targeted killing of women in armed conflict. Learning Network Brief 28 This learning brief examines cyber misogyny, or the various forms of gendered hatred, harassment, and abusive behaviour targeted at women and girls via the Internet. Manifestations and consequences of cyber misogyny are provided along with a discussion of the new opportunities to engage in harassment and abuse presented by the Internet and Canadian legal responses. Sexual Harassment and Public Space Learning Network Brief 27 This Brief explores how patterns of sexual harassment often reflect the cultural norms connected with the spaces or environments (school, work, public spaces) in which it occurs. The analysis provides examples of how sexual harassment can work to define or re-assert gender, race, age or class hierarchies within spaces in harmful ways. Barriers to Reporting Sexual Harassment Learning Network Brief 26 This Brief discusses some of the barriers that make reporting sexual harassment difficult and for some, lead to more complex consequences. Training Social Work Students in Domestic/Sexual Violence Work: Key findings from the literature. Learning Network Brief 25 Several research studies have been conducted recently evaluating students' preparedness for working with victims and survivors of domestic violence, particularly in the field of social work. Some key findings from these studies are summarized. This review includes publications from 2009 to 2015. There were no Canadian studies identified for inclusion in this review. View PDF Version Engaging men in gender-based violence prevention: Review paper synopsis Learning Network Brief 24 This Learning Brief offers a brief synopsis of a review conducted by the White Ribbon Campaign to assess the evaluation practices of prevention initiatives focusing on engaging men to end gender-based violence. Theoretical frameworks and challenges to evaluation are identified. Domestic Violence Training for Physicians: Current Promising Practices Learning Network Brief 23 This Learning Network brief offers a synopsis of findings reported in a recent review of randomized control trials that evaluated domestic violence training programs for physicians. Implications for future professional development for physicians on domestic violence are offered. Learning From Women with Lived Experience Learning Network Brief 22 This Learning Brief discusses the different contexts that impact a survivor’s experience of sexual violation and how listening to women with lived experience can help us learn how each woman who experiences sexual violence can be impacted differently including what supports or comforts helped them to survive. Sexual Violence Prevention: Are we increasing safety or reinforcing rape culture? Learning Network Brief 21 As the title suggests, this Brief questions whether some of our sexual violence prevention increases safety or reinforces rape culture. The first section describes “rape culture”, its harmful consequences, and its differential impact on various groups of women. The second section discusses how well-intended messages telling women what they can do to prevent being sexually assaulted inadvertently reinforces rape culture. The final section raises the question of how to promote safety for girls and women while working towards transforming our culture to ensure women have the right to sexual integrity, equality and justice. Drug Facilitated Sexual Assault Learning Network Brief 20 This Learning Brief defines and describes Drug Facilitated Sexual Assault (DFSA). Specifically, the brief highlights the two types of DFSA (i.e., proactive and opportunistic); what is known about victims/survivors of DFSA; what drugs are used and the signs or symptoms of DFSA; and how to respond and support victims/survivors. Doing the Work: Surfacing the Social Context of Sexual Violence in Therapeutic Settings Learning Network Brief 19 This Learning Network Brief addresses the challenge of integrating a systemic understanding of sexual violence in counselling/therapy with women. The Brief includes statistics on this gendered crime and discusses what it means to define the social context of sexual violence and how a counsellor or therapist can talk about this social context with survivors within a counselling setting. Nicole Pietsch, the author, is the Coordinator for the Ontario Coalition of Rape Crisis Centres. Examples of Evaluated Social Marketing Campaigns addressing Woman Abuse: References and Brief Descriptions Learning Brief 18 This Learning Brief summarizes a literature review identifying social marketing campaigns addressing woman abuse and any corresponding reports that outline the implementation, monitoring and/or evaluation of these campaigns. A total of 13 campaigns from Australia, New Zealand, Great Britain, and the United States were identified. This Learning Brief provides descriptions of each campaign including any formative research, monitoring processes, and evaluations. Click to view PlainText Version. Research, Monitoring, and Evaluating VAW Social Marketing Campaigns Learning Brief 17 This Learning Brief outlines the different phases of researching, monitoring, and evaluating a VAW social marketing campaign. The brief describes in detail the five basic questions that need to be considered: What will be researched, monitored, and evaluated? Why the particular measurement is important? How the measurements will be conducted? When during the campaign will the measurements be conducted? and How much will the measurements cost? This brief was adapted from Lee & Kotler (2011). Click to view PlainText version. Basic Steps for Developing a VAW Social Marketing Campaign Learning Brief 16 This Learning Network Brief details steps to developing and implementing a social marketing campaign. The steps are based on the work of Lee & Kotler (2008; 2011) and Castelino, Colla, & Boulet (2013). Click to view PlainText Version. Keeping Children & Mothers Safe and Engaging Men who use Abusive Behaviours: VAW and CAS Perspectives Learning Brief 15 On September 19, 2013, the Learning Network hosted a forum Keeping Children and Mothers Safe and Engaging Men who use Abusive Behaviours: VAW and CAS Collaboration which brought together 144 professionals from nine regions across the province who represented the VAW, CAS, and government sectors. The overall objectives of the forum were to understand VAW and CAS collaboration with a gender-based analysis, identify principles and practice strategies for engaging men who use abusive behaviours, identify risk factors and potential assessment tools for evaluating child risk in the context of domestic violence, and identifying promising practices in VAW and CAS collaboration. The Learning Network team developed a survey for forum participants to gain an understanding of their perspectives on the status of VAW and CAS collaboration in their communities. This Learning Network Brief provides an overview and detailed description of the survey results. Click to view PlainText Version. The Neurobiology of Sexual Assault Learning Network Brief 14 This Learning Brief describes the neurobiological response to sexual assault and the implications for frontline responders supporting victims/survivors. Click to view PlainText Version. Allostasis and Allostatic Load: Woman Abuse and Chronic Illness Learning Network Brief 13 This Learning Brief describes the role that stress can play on long-term health, otherwise known as allostasis. Allostasis is the adaptive response to stressful situations. Stress hormones are released in our body to help us cope – a reaction typically referred to as the fight-or-flight response. The inability to minimize or stop this bodily response to stress is referred to as allostatic load and can cause severe long-term health consequences. A detailed description of allostasis and allostatic load are provided in the context of woman abuse. Click to view PlainText Version. Violence Against Women with DisAbilities and Deaf Women: An Overview Learning Network Brief 12 Fran Odette & Doris Rajan (2013). This paper discusses violence against women with disAbilities and Deaf women. Topics include the myths and realities of violence against women with Disabilities and Deaf women; who perpetrates abuse and violence; types of violence experienced; barriers to reporting and accessing resources; and considerations for helping women with disAbilities who are experiencing violence. Click for Plain Text version. Abelism -- A Form of Violence Against Women. Critical Reflections by Fran Odette Learning Network Brief 11 Fran Odette (2013). This Learning Brief names ableism as a form of violence against self-identified women with disAbilities and aims to increase awareness and understanding of its existence and impacts. Click for PlainText Version. Status of Women Canada – Engaging Young People to Prevent Violence against Women on Post-Secondary Campuses: The Ontario Projects Learning Network Brief 10 In 2012, Status of Women Canada provided 21 Canadian organizations with 2-year funding to promote equality and reduce gender-based violence on college and university campuses. All projects build partnerships and collaboration between campus and community stakeholders, identify factors associated with violence on campus, and develop responses to gender-based violence within their campus community. This brief describes the seven Ontario-based projects. Bystander Sexual Violence Education programs for high school, college and university students Learning Network Brief 9 This Learning Brief describes the bystander approach for preventing sexual violence including its effectiveness and promising strategies for future bystander education programs. The brief also highlights three promising programs and campaigns. Engaging Men & Boys to End Violence Against Women: An Annotated Bibliography of Online Resources Learning Network Brief 8 This Annotated Bibliography provides descriptions of more than 100 online resources related to the topic Engaging Men and Boys to end violence against women. Resource areas include background papers and technical reports; surveys; public policy and advocacy; intervention/prevention resources; evaluations of interventions; education and training resources; public education and social marketing campaigns; social media and other links. Information Communication Technologies and Trafficking in Persons Learning Network Brief 7 (March 2013) Marcie Campbell & Linda Baker. Understanding Technology-Related Violence Against Women: Categories and Examples Learning Network Brief 6 March 2013. Linda Baker, Marcie Campbell & Elsa Barreto. Do Not Harm: A Human Rights Approach to Anti-Trafficking Policies and Interventions in Canada Learning Network Brief 5 Annalee Lepp (March 2013) As a founding member and current director of the Global Alliance Against Trafficking in Women (GAATW) Canada, established in 1996, Dr. Lepp has devoted the last sixteen years to researching and monitoring continuities and shifts in Canadian anti-trafficking policies, practices, and interventions. Her presentation will explore the implications of applying the principle of “do no harm” and of centering human rights when developing responses to human trafficking. She will draw on both GAATW’s international work and GAATW Canada’s research on this question, including a major recent study on the anti-trafficking measures and initiatives implemented prior to and during the 2010 Vancouver Winter Olympic Games. NGOs and Human Trafficking: Tensions, Blind-Spots and Power Learning Network Brief 4 Sue Wilson (March 2013) This Learning Network Brief was written by Sue Wilson, Director of the Office for Systemic Justice for the Federation of the Sisters of St. Joseph of Canada. In this Brief, Sue Wilson reflects on the importance of holding onto three key tensions in her work on issues of human trafficking: prosecution and protection, collaboration and mission, and, outreach and advocacy. She also explores blind spots created by stereotypes, assumptions, statistics, and labels and categories. Sue Wilson concludes her commentary with reflections on power and control. Children in Danger of Domestic Homicide Learning Network Brief 3 Peter Jaffe and Marcie Campbell (2013). Based on current research, the authors comment on harm to children connected to domestic homicide and their safety. Exposure to Domestic Violence and it's Effect on Children's Brain Development and Functioning Learning Network Brief 2 Marcie Campbell and Linda Baker (2013). A brief description of research studies suggesting that children's exposure to domestic violence can suppress a child's IQ, lead to premature aging, and influence the functioning of the brain's emotional systems. It shouldn't be this hard. Learning Network Brief 1 Commentary by Pamela Cross for Luke's Place Support and Resource Centre for Women and Children (December 2012). Based on the extensive research report titled "It Shouldn't be this Hard: A gender based analysis of family law, family court and violence against women", Pamela Cross has prepared a 4 page commentary on the challenges women leaving abusive partners face when turning to the family law and family court.
<urn:uuid:9ae4ad9f-14e2-43eb-859b-833ebd777891>
CC-MAIN-2017-30
http://vawlearningnetwork.ca/learning-network-resources/briefs
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424088.27/warc/CC-MAIN-20170722162708-20170722182708-00457.warc.gz
en
0.899585
2,899
2.734375
3
|Forums Members Calendar Chat||Like Us! View New Forum Content Forum Search| SCI Health Issues Quadriplegia and Tetraplegia The term Quadraplegic is derived from two different words from two different languages, Latin and Greek. The word “Quadra”, when translated from latin means “four”, this relates to the number of limbs. “Plegic”, is derived from the Greek word “Plegia”, which when translated, means "paralysis". When the two words are combined together, you have “Quadraplegia”. “Tetra” is derived from the Greek word for “Four”. “Para” is derived from the Greek word for "two" Hence: Tetraplegic and Paraplegic. In Europe, the terminology for 4 limb paralysis has always been tetraplegia. The Europeans would never dream of combining a Latin and Greek root in one word. Quadriplegic and Quadriplegia are the terms used mainly in America to describe paralysis of all four limbs. In 1991, when the American Spinal Cord Injury Classification system was being revised, the difference in names was discussed. The British are more aware of Greek versus Latin names. Since Plegia is a greek word and quadri is Latin, the term quadriplegia mixes language sources. Upon review of the literature, it was recommended that the term tetraplegia be used by the American Spinal Cord Association so that there are not two different words in English referring to the same thing. Quadriplegia or Tetraplegia is when a person has a spinal cord injury above the first thoracic vertebra (T1), paralysis usually affects the cervical spinal nerves, C1 to C8 resulting in paralysis of all four limbs. This may result in partial or complete paralysis of the arms as well as complete paralysis of the legs. There are 7 cervical vertebrae in the neck, but 8 spinal nerves as the spinal nerves exit the spinal cord above the vertebrae. In addition to the arms and legs being paralyzed, the abdominal and chest muscles will also be affected resulting in weakened breathing and the inability to properly cough and clear the chest. Breathing will be dependant on the diaphragm, or in severe cases, a ventilator. People with this type of paralysis are referred to as Quadriplegic or Tetraplegic. The level of injury, otherwise known as a lesion, is the exact point in the spinal cord at which damage has occurred. Damage may take the form of scar tissue, or the cord may be compressed due to a damaged vertebrae or inter vertebral disc. The levels of spinal nerves are determined by counting the nerves from the top of the spine downwards, and these nerves are grouped into four different areas. These are the Cervical, Thoracic, Lumbar and Sacral parts of the spinal cord. These areas are important, as damage to the spinal cord at these points directly determines how groups of muscles, organs and sensations will be affected. Determining how the spinal cord has been damage is also a consideration when evaluating a spinal cord injury. There are two types of lesion, these are a complete injury and an incomplete injury. Someone with a complete injury will have a complete loss of muscle control and sensation below their level of lesion. An incomplete injury is where maybe only the muscles have been paralyzed, or where there is impaired sensation. The functionality of a persons body following a spinal cord injury, will depend on the level of injury, and whether the injury was complete of incomplete. In order to show what functionality will be possible following a complete spinal cord injury, we have put together the most common abilities for varying degree's of paralysis. The age and weight of a person will also have a negative factor on the person's abilities. Click the spinal levels below for a comparison of injury levels and abilities. Support : Types of Paralysis : Vertebral Column : Spinal Cord : Myotomes & Dermatomes : Autonomic Dysreflexia : Spasticity & Spasms : Temperature Regulation : Respiratory System : Pressure Sores : Spinal Cord Injury Research
<urn:uuid:7bcc35b4-5b08-4adb-aa7c-f3cefc892096>
CC-MAIN-2014-15
http://www.apparelyzed.com/quadriplegia.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609537804.4/warc/CC-MAIN-20140416005217-00466-ip-10-147-4-33.ec2.internal.warc.gz
en
0.926815
909
3.390625
3
The Practical Use of Six Thinking Hats Mind Map – Making Team Decisions When a team is discussing a complex project, there might be several solutions which are provided by different members. Among them, how to reach a consensus and make the most suitable determination is not an easy task. After trying several approaches to deal with this problem, one thinking model called Six Thinking Hats appear to the eyesight. It is effective in improving the productivity of making a team decision. This article will illustrate the best form of Six Thinking Hats model – mind mapping and instruct you how Six Thinking Hats mind maps could be used in solving team’s dilemma. Download this excellent mind mapping software and view lots of built-in mind mapping templates. What are Six Thinking Hats? Six Thinking Hats model is created by Maltese author Edward de Bono in 1985. In order to know how to make a team decision by Six Thinking Hats mind map, you ought to have a basic understanding of what are Six Thinking Hats and how each hat works. - White Hat – White represents pure and it is the representation of neutral and objective. With a white thinking hat, every member of a team needs to obtain high-quality information with available data. - Green Hat - Green symbolizes vitality. Green thinking hat represents creativity with new ideas and new eyesight. Under this thinking approach, we cannot ask for any results but only require an effort to pay. - Red Hat – Red is the color of emotion. The red thinking hat represents emotional feelings, intuition, and premonition. The use of Red Hat thinking need to correctly understand and use intuition and emotion, does not prove or explain their feelings, just to express, to avoid an argument. - Black Hat – Black is gloomy, negative. Black hat thinking is to consider the negative factors of things, it is the negative factors of things to make a logical judgment and assessment. People can use negative and questioning opinions, make negative comments and find logical mistakes. - Yellow Hat – Yellow represents sunlight and optimism. The idea that the yellow hat contains hope and positive thought, and actively explore the merits of things, the benefits and advantages here must be logical. - Blue Hat – Blue is calm, but also the color of the sky. Blue hat thinking represents the control and organization of the thinking process, which can control other thinking. Blue hats are often used at the beginning, middle, and final stages of thinking. The Practical Uses of Six Thinking Hats in Making Team Decisions 1. Use White hats to provide some decision options when discussing. 2. Green hats help you offer several solving plans and solutions for the team discussion. 3. Yellow hats instruct your team in evaluating the advantages of this plan. 4. Black hats list disadvantages blocks for analyzing different sides of each plan. 5. After having a deep exploration of each solution, you need to use red hats for judging with intuition. 6. Conclude the statements with blue hats for reach a reasonable team consensus. To sum up, the Six Thinking Hats mind map could be widely used for making a team decision in an effective and productive approach. Try to build your own Six Thinking Hats mind map with a powerful and trusted mind mapping tool to make your discussing process intensively.
<urn:uuid:1811ed76-359d-48b3-8d6e-01c678d15841>
CC-MAIN-2020-16
https://www.edrawsoft.com/mindmaster/six-thinking-hats-mindmap.html
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370510352.43/warc/CC-MAIN-20200403061648-20200403091648-00157.warc.gz
en
0.904404
667
3.15625
3
A business plan is a formal statement of a set of business goals, the reasons why they are believed attainable, and the plan for reaching those goals. It may also contain background information about the organization or team attempting to reach those goals. The business goals may be defined for for-profit or for non-profit organizations. For-profit business plans typically focus on financial goals, such as profit or creation of wealth. Non-profit and government agency business plans tend to focus on organizational mission which is the basis for their governmental status or their non-profit, tax-exempt status, respectively—although non-profits may also focus on optimizing revenue. In non-profit organizations, creative tensions may develop in the effort to balance mission with "margin" (or revenue). Business plans may also target changes in perception and branding by the customer, client, tax-payer, or larger community. A business plan having changes in perception and branding as its primary goals is called a marketing plan. Business plans may be internally or externally focused. Externally focused plans target goals that are important to external stakeholders, particularly financial stakeholders. They typically have detailed information about the organization or team attempting to reach the goals. With for-profit entities, external stakeholders include investors and customers. External stake-holders of non-profits include donors and the clients of the non-profit's services. For government agencies, external stakeholders include tax-payers, higher-level government agencies, and international lending bodies such as the IMF, the World Bank, various economic agencies of the UN, and development banks. Internally focused business plans target intermediate goals required to reach the external goals. They may cover the development of a new product, a new service, a new IT system, a restructuring of finance, the refurbishing of a factory or a restructuring of the organization. An internal business plan is often developed in conjunction with a balanced scorecard or a list of critical success factors. This allows success of the plan to be measured using non-financial measures. Business plans that identify and target internal goals, but provide only general guidance on how they will be met are called strategic plans. Operational plans describe the goals of an internal organization, working group or department. Project plans, sometimes known as project frameworks, describe the goals of a particular project. They may also address the project's place within the organization's larger strategic goals. Business plans are decision-making tools. There is no fixed content for a business plan. Rather the content and format of the business plan is determined by the goals and audience. A business plan should contain whatever information is needed to decide whether or not to pursue a goal. For example, a business plan for a non-profit might discuss the fit between the business plan and the organization’s mission. Banks are quite concerned about defaults, so a business plan for a bank loan will build a convincing case for the organization’s ability to repay the loan. Venture capitalists are primarily concerned about initial investment, feasibility, and exit valuation. A business plan for a project requiring equity financing will need to explain why current resources, upcoming growth opportunities, and sustainable competitive advantage will lead to a high exit valuation. Preparing a business plan draws on a wide range of knowledge from many different business disciplines: finance, human resource management, intellectual property management, supply chain management, operations management, and marketing, among others. It can be helpful to view the business plan as a collection of sub-plans, one for each of the main business disciplines. "... a good business plan can help to make a good business credible, understandable, and attractive to someone who is unfamiliar with the business. Writing a good business plan can’t guarantee success, but it can go a long way toward reducing the odds of failure." The format of a business plan depends on its presentation context. It is not uncommon for businesses, especially start-ups to have three or four formats for the same business plan: - an "elevator pitch" - a three minute summary of the business plan's executive summary. This is often used as a teaser to awaken the interest of potential funders, customers, or strategic partners. - an oral presentation - a hopefully entertaining slide show and oral narrative that is meant to trigger discussion and interest potential investors in reading the written presentation. The content of the presentation is usually limited to the executive summary and a few key graphs showing financial trends and key decision making benchmarks. If a new product is being proposed and time permits, a demonstration of the product may also be included. - a written presentation for external stakeholders - a detailed, well written, and pleasingly formatted plan targeted at external stakeholders. - an internal operational plan - a detailed plan describing planning details that are needed by management but may not be of interest to external stakeholders. Such plans have a somewhat higher degree of candor and informality than the version targeted at external stakeholders. Typical structure for a business plan for a start up venture - cover page and table of contents - executive summary - business description - business environment analysis - industry background - competitive analysis - market analysis - marketing plan - operations plan - management summary - financial plan - attachments and milestones Cost overruns and revenue shortfalls Cost and revenue estimates are central to any business plan for deciding the viability of the planned venture. But costs are often underestimated and revenues overestimated resulting in later cost overruns, revenue shortfalls, and possibly non-viability. During the dot-com bubble 1997-2001 this was a problem for many technology start-ups. However, the problem is not limited to technology or the private sector; public works projects also routinely suffer from cost overruns and/or revenue shortfalls. The main causes of cost overruns and revenue shortfalls are optimism bias and strategic misrepresentation. Reference class forecasting has been developed to reduce the risks of cost overruns and revenue shortfalls. An externally targeted business plan should list all legal concerns and financial liabilities that might negatively affect investors. Depending on the amount of funds being raised and the audience to whom the plan is presented, failure to do this may have severe legal consequences. Limitations on content and audience Non disclosure agreements (NDAs) with third parties, non-compete agreements, conflicts of interest, privacy concerns, and the protection of one's trade secrets may severely limit the audience to which one might show the business plan. Alternatively, they may require each party receiving the business plan to sign a contract accepting special clauses and conditions. This situation is complicated by the fact that many venture capitalists will refuse to sign an NDA before looking at a business plan, lest it put them in the untenable position of looking at two independently developed look-alike business plans, both claiming originality. In such situations one may need to develop two versions of the business plan: a stripped down plan that can be used to develop a relationship and a detail plan that is only shown when investors have sufficient interest and trust to sign an NDA. Open business plans Traditionally business plans have been highly confidential and quite limited in audience. The business plan itself is generally regarded as secret. However the emergence of free software and open source has opened the model and made the notion of an open business plan possible. An open business plan is a business plan with unlimited audience. The business plan is typically web published and made available to all. In the free software and open source business model, trade secrets, copyright and patents can no longer be used as effective locking mechanisms to provide sustainable advantages to a particular business and therefore a secret business plan is less relevant in those models. While the origin of the open business plan model is in the free software and Libre services arena, the concept is likely applicable to other domains. - Business plan contests - provides a way for venture capitals to find promising projects - Venture capital assessment of business plans - focus on qualitative factors such as team. - In a public offering, potential investors can evaluate perspectives of issuing company Fundraising is the primary purpose for many business plans, since they are related to the inherent probable success/failure of the company risk. Total quality management Total quality management (TQM) is a business management strategy aimed at embedding awareness of quality in all organizational processes. TQM has been widely used in manufacturing, education, call centers, government, and service industries, as well as NASA space and science programs. Management by objective Management by objectives (MBO) is a process of agreeing upon objectives within an organization so that management and employees agree to the objectives and understand what they are in the organization. Strategic planning is an organization's process of defining its strategy, or direction, and making decisions on allocating its resources to pursue this strategy, including its capital and people. Various business analysis techniques can be used in strategic planning, including SWOT analysis (Strengths, Weaknesses, Opportunities, and Threats ) and PEST analysis (Political, Economic, Social, and Technological analysis) or STEER analysis involving Socio-cultural, Technological, Economic, Ecological, and Regulatory factors and EPISTELS (Environment, Political, Informative, Social, Technological, Economic, Legal and Spiritual) Business plans are used in some primary and secondary programs to teach economic principles. Wikiversity has a Lunar Boom Town project where students of all ages can collaborate with designing and revising business models and practice evaluating them to learn practical business planning techniques and methodology. The business plan is the subject of many satires. Satires are used both to express cynicism about business plans and as an educational tool to improve the quality of business plans. For example, - Five Criteria for a successful business plan in biotech uses Dilbert comic strips to remind people of what not to do when researching and writing a business plan for a biotech start-up. Scott Adams, the author of Dilbert, is an MBA graduate (U.C. Berkeley) who sees humor as a critical tool that can improve the behavior of businesses and their managers. He has written numerous critiques of business practices, including business planning. The website Dilbert.com - Games has a mission statement generator that satirizes the wording often found in mission statements. His book The Dilbert Principle – A Cubicle’s Eye View of Bosses, Meetings, Management Fads & Other Workplace Afflictions discusses the foibles of management and their plans as depicted in the Dilbert comic strips by Scott Adams. - In the article "South Park's" Investing Lesson, the The Motley Fool columnist "Fool on the Hill" uses the Underpants Gnomes to illustrate the fallacy of focusing on goals without a clear implementation strategy. The Underpants Gnomes episode satirizes the business plans of the Dot-com era. - Business Case - Corporate Finance - Cost overrun - Cost-benefit analysis - Marketing plan - Optimism bias - Parkinson's Law of Triviality - Reference class forecasting - Revenue shortfall - Strategic plan - Business Motivation Model - ^ Small Business Notes business plan outline for small business start-up - ^ Center for Non-profit Excellence non-profit business plan - ^ State of Louisiana, USA government agency operational plan - ^ Visitask project framework - ^ Tasmanian government project management knowledge base government project plan - ^ Boston College, Carroll School of Management, Business Plan Project The business school advises students that "To create a robust business plan, teams must take a comprehensive view of the enterprise and incorporate management-practice knowledge from every first-semester course." It is increasingly common for business schools to use business plan projects to provide an opportunity for students to integrate knowledge learned through their courses. - ^ a b Eric S. Siegel, Brian R. Ford, Jay M. Bornstein (1993), 'The Ernst & Young Business Plan Guide' (New York: John Wiley and Sons) ISBN 0471578266 - ^ Harvard Business School Press-Pocket Mentor, " Creating a Business Plan" - ^ Bent Flyvbjerg, Mette K. Skamris Holm, and Søren L. Buhl (2002),"Underestimating Costs in Public Works Projects: Error or Lie?" Journal of the American Planning Association, vol. 68, no. 3, 279-295. - ^ Bent Flyvbjerg, Mette K. Skamris Holm, and Søren L. Buhl (2005), "How (In)accurate Are Demand Forecasts in Public Works Projects?" Journal of the American Planning Associationsidoo kale ayaa waxaa, vol. 71, no. 2, 131-146. - ^ Pennsylvania Business Plan Competition - competition intended to teach economic principles to K-12 students - ^ Tricia Bisoux, "Funny Business", BizEd, November/December, 2002
<urn:uuid:c59a23eb-fbe6-4e89-9eb6-f1bdffb0d8d6>
CC-MAIN-2017-34
http://allstar4comunication.blogspot.com/2010/05/business-plan-is-formal-statement-of.html
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886126017.3/warc/CC-MAIN-20170824004740-20170824024740-00429.warc.gz
en
0.924092
2,655
2.828125
3
|ASIS&T 2006||START Conference Manager| Wayfinding and Sign System Spatial movement called navigation consists of both cognitive and motor components. Cognitive part of navigation is called wayfinding and it is defined as “the cognitive process of defining a path through an environment, using and acquiring spatial knowledge, aided by both natural and artificial cues”. One possible way to support navigation is to add perceptual cues, that is, to enhance perceptual affordance of an existing environment. Previous research shows that a compass in combination with a map is very effective wayfinding tool to a trained navigator such as a pilot, but most users are not familiar with using a compass as a directional cue. In real-world situation, a sign, instead of a compass, are most extensively used to provide spatial knowledge and direction. The study therefore attempts to examine whether the degrees of presence are enhanced by wayfinding affordances supported by a sign system. 1.What are the effects of wayfinding affordances enhanced by a sign system on the sense of presence? 2.What is the relationship between the sense of presence and wayfinding task performance 3.What are the users’ personal properties that determine the sense of presence? Methodology Forty participants from (under)graduate students at the University of Texas at Austin will partticipate in the study. In order to collect empirical data, a controlled experiment will be conducted, in which participants will perform comparable tasks in two different conditions: control (C) condition and experimental (E) condition. In the control condition, participants will be given a virtual city application without a support of signs whereas in the experimental condition, participants will be given a version with a support of signs. Participants will receive total 10 tasks on a condition. Once the 10 tasks are completed, participants will start the second session after 5 minutes break time. When participants complete the tasks, they will be asked to complete a post-test questionnaire on the sense of presence on 1-to-7 Likert type scales. The task performance will be measured with navigation duration, task completion and accuracy, and users’ personal properties will be recorded from the pre-questionnaires asking gender, computer literacy, previous experience with VEs and age. For the experiment, two virtual cities will be constructed with an ActiveWorlds. Data Analysis ANOVA repeated measure will be used to identify if there is difference between the control and the experimental conditions in terms of 1) the sense of presence and 2) task performance. Correlation analysis will be also conducted to examine the relationship between users’ personal property and the sense of presence. |START Conference Manager (V2.52.6)|
<urn:uuid:a4933546-6565-4a26-94f3-d6e2fd4d3c74>
CC-MAIN-2014-23
http://www.asis.org/Conferences/AM06/papers/258.html
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510270577.0/warc/CC-MAIN-20140728011750-00093-ip-10-146-231-18.ec2.internal.warc.gz
en
0.910958
546
3.265625
3