text
stringlengths 263
344k
| id
stringlengths 47
47
| dump
stringclasses 23
values | url
stringlengths 16
862
| file_path
stringlengths 125
155
| language
stringclasses 1
value | language_score
float64 0.65
1
| token_count
int64 57
81.9k
| score
float64 2.52
4.78
| int_score
int64 3
5
|
---|---|---|---|---|---|---|---|---|---|
When differentiating between the needs of beginners and experts, it is useful to discuss command vectors and working sets. A working set is a “subset of commands and features” that a perpetual intermediate would memorize (Cooper et al., 2007, p. 552). Command vectors “are distinct techniques” through which users “issue instructions to the program” (2007, p. 551). Some examples are drop-down menus, toolbar controls, and pop-up menus. Good programs provide “multiple command vectors” where functions can be performed by going to any number of command vectors depending on the user’s ability (2007, p. 551). Immediate vectors allow for instant function while pedagogic vectors provide intermediate steps.
A pedagogic vector is filled with world information, and is known as a world vector. Keyboard shortcuts, on the other hand, are head vectors. Head vectors are used by intermediates and experts while world vectors are required by beginners and by more advanced users that access rarely used functions. A memorization vector is the path from a world vector to a head vector. An example of a memorization vector is the listing of shortcuts on the traditional text menu.
Two types of customization that help users are personalization and configuration. Personalization involves decorating objects while configuration involves “moving, adding or deleting” objects (2007, p. 556). Personalization is described as idiosyncratically modal, i.e. half of computer users like to use it. Therefore, designers must provide for both idioms: personalization and no-personalization. Additionally, designers should provide a gallery of templates for users to select and use so users do not feel overwhelmed with the process.
Localization and globalization plays a role in immediate and pedagogic vectors. Because immediate vectors can be used across cultures, they are fall within globalization. However, pedagogic vectors can involve text which falls within localization. Pedagogic vectors must change for different parts of the world.
The final teaching point from this chapter was the idea of the help menu. The help menu should not be for beginners. Rather, it should be “focused on people who are already successfully using the product, but who want to expand their horizons: the perpetual intermediates” (2007, p. 561).
This chapter’s teaching points suggest that whenever comparing beginners and experts in computer systems, researchers should analyze their use of command vectors and working sets. Experts will have a much bigger working set and use head vectors while beginners will rely on a few functions in their working set and will use a pedagogic vector. I plan on using these findings to construct a psychometric measure for describing beginners and experts that could be used as moderator variables in future studies.
Cooper, A., Reimann, R., & Cronin, D. (2007). About face 3: The essentials of interaction design. Indianapolis, IN: Wiley Publishing, Inc.
|
<urn:uuid:43e44d29-11e6-4b7b-989b-cd732d7e5e16>
|
CC-MAIN-2017-30
|
http://michael.mrook.com/2009/12/distinguishing-between-beginners-experts/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549425766.58/warc/CC-MAIN-20170726042247-20170726062247-00435.warc.gz
|
en
| 0.917032 | 614 | 3.828125 | 4 |
THE FUKUSHIMA NUCLEAR POWER DISASTER CONTINUES TO THREATEN ALL LAND AND LIFE. THIS PAGE IS DEVOTED TO HELPING US UNDERSTAND ITS WORLDWIDE RAMIFICATIONS.
Last Update February 8, 2017
August 14, 20154:FUKUSHIMA – SELLING OUT THE NEXT GENERATION
August 11, 2015 / Japan has restarted its first nuclear reactor to generate power since 2013.
And that’s really bad news.
Remember what happened in 2011? Why Japan closed all of its reactors abruptly and why we’re still tracing the spread of radioactive material across our Pacific Coast and into the atmosphere?
First there was an earthquake that did significant damage to that island country – and then a tsunami quickly followed.
And what happened next was the largest nuclear meltdown in the history of the world and the evacuation of 160,000 locals who lived in the area of the Fukushima power plant.
We know now that TEPCO – the owner of the Fukushima plant – had been warned years earlier about the dangers of an earthquake and a tsunami hitting the plant.
No one did anything about it then – but even if they had – do we have any reason to believe it would have been enough?
Read complete article here.
HOW RADIOACTIVE IS OUR OCEAN?
The release of radioactive contaminants from Fukushima remains an unprecedented event for the people of Japan and the Pacific Ocean. Help scientists at the Woods Hole Oceanographic Institution reveal the ongoing spread of radiation across the Pacific and its evolving impacts on the ocean. See more here (note: site is slow to open).
VIDEO: Timothy A. Mousseau: "Fukushima Catastrophe and its Effects on Wildlife.”
Watch video here.
VIDEO: Contamination of the environment: This film provides explanations on the consequences of the accident at Fukushima Daiichi on the environment. It addresses the radioactive releases and their consequences on the terrestrial environment in Japan and on the marine environment of the Pacific Ocean. Watch video here.
Fukushima - No End in Sight
PLEASE CONTACT US WITH YOUR SUGGESTED LINKS.
|
<urn:uuid:ada92d01-3570-4836-9db2-122ba69fc0f5>
|
CC-MAIN-2017-47
|
http://www.lightningpath.net/RATTLER/styled-12/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934807650.44/warc/CC-MAIN-20171124104142-20171124124142-00786.warc.gz
|
en
| 0.912797 | 452 | 3.28125 | 3 |
Last Thursday, I registered my 11-year-old son Zachary for a free three-hour trial in computer coding. This trial class was held at KidoCode at Mont Kiara, Kuala Lumpur. This preview class was not just for the child but also for the parents, so that both parents and child would have a general idea of how coding was taught at KidoCode and about the center’s general philosophy on learning, teaching, and social work.
Alas, at the end of the three hours, I came away disappointed. What I experienced instead strengthened my suspicion and skepticism that our children are being taught the wrong way about coding.
The late Steve Jobs said over twenty years ago that “Everyone should learn how to program a computer, because it teaches you how to think.” Since then, many others have advocated that our kids must be taught coding, especially in today’s world of ubiquitous technology.
Increasingly more countries today are incorporating coding or computer science into their national school curriculum. Britain, for example, was the first G7 country to do such that for their 5 to 16 year old children. Even Malaysia is cognizant of this importance. As far back as 1988, the then Education Minister, Anwar Ibrahim, announced that coding was to be a part of the national curriculum by 1990. But Malaysia being Malaysia, flip-flop education policies are the norm: Anwar’s national coding policy never materialized. Since then, other similar national coding policies have been reintroduced, only to fail, wane or be quietly abandoned, such as the 2012 1BestariNet project, due to many reasons such as financial and logistics constraints.
Today our national ICT custodian is the Malaysian Digital Economy Corporation (MDEC), and at the risk of failing to learn from history, MDEC too announced in 2016 that it had plans to make coding part of the pedagogy of teaching at national schools, particular for science and math subjects by 2017. The year 2017 came and went, and it appeared that MDEC’s policy too have quietly been abandoned, now replaced by a less ambitious plan to create a Digital Innovators School instead by 2019.
So, yes, we are increasingly being told that our children, the younger the better, should learn coding. Coding schools and online self-learning portals (such as code.org and Codeacademy) are becoming increasingly popular with parents looking to enroll their kids for coding lessons. Even most schools today have at least some coding extracurricular activities to promote coding among students.
My problem is not whether children should learn coding; I firmly believed they should. But my problem is about the way our kids are being taught coding. Coding taught at online self-learning portals and coding schools are like ‘pop computing’ – a term coined by Dr. Idit Hazel, CEO of Globaloria, an organization for computer science education. Pop computing refers to a coding culture where coding is taught only to be quick, comfortable, and entertaining but suffers from being superficial, that kids do not have the necessary background or training to develop a deep and independent way of computational thinking.
A popular software to teach kids coding, for example, is Scratch, where kids learn programming by dragging-and-dropping blocks of code in a visual and colorful manner. Fun to use and even more fun to play the game kids develop, but it fails to deliver a multi-dimensional thinking required to apply computer science principles in other contexts.
My own son once took a Scratch class for seven months, and he immensely enjoyed his classes. He was willing to spend even up to six hours at his then coding school. But even up to today, he still fails to understand, let alone use, fundamental computer coding concepts like logical comparisons, conditional statements, and loops.
In other words, our kids are not taught the fundamentals. Coding learning software such as Scratch and Turtle Logo may make programming fun, but they teach software and computer science concepts in a very superficial manner. The fundamentals are made implicit rather than explicit. Without having a strong grasp of the fundamentals, I fear kids can only build apps they have been “guided” by their schools. MIT researchers Marvin Minsky and Alan Kay remarked that computer literacy is akin to music literacy. Musicians become proficient by listening, improvising and composing, not just playing (or duplicating) other people’s composition. Pop computing risks our kids having a poor foundation in coding. Pop computing, I feel, is a more of a marketing rather than educational tool and more catered to hyperactive children or those with short attention spans to keep them focused long enough at the computer (or mobile) screens to learn … something, anything.
Consequently, I fear coding schools teach is a case of “a little of this and that” but each topic in a very superficial, inadequate manner.
Furthermore, coding schools may boast of having several hundreds, even thousands, of enrolled students, but nothing is made known to the public about how many of their enrolled students actually follow through to the end of the course or about the quality of their “graduated” students. These schools are also neither accredited nor the quality of their teaching or lesson materials independently accessed.
My son Zachary never has a problem with his attention span, and he would actually want to understand what he is doing rather than just “duplicating” or making small adjustments to the provided coding guide or lesson. So, I see the usual, albeit more fun, route of pop computing is not for him. I have actually started to teach him coding, starting with Python programming.
For instance, for his first lesson, I taught my son the following classic example:
My son actually sees more meaning in this single line of code than his trial coding lesson at KidoCode such as follows:
tom = Turtle() tom.shape('turtle') tom.speed(100) tom.color('green') for c in [1,2,3,4]: tom.forward(100) tom.right(90)
where the concept of object-orientation is actually taught but in an implicit manner. Furthermore, would kids actually understand what
[1,2,3,4] or even
Turtle() mean? Sure, the above seven lines code help to make a cute animated turtle move and make a square on the screen — but I suspect most kids would secretly wonder about
[1,2,3,4] — what sorcery is this?
Herein lies part of the problem: the lack of fundamentals being taught.
There is actually a difference between computer science and coding. Coding is really just our written instructions to the computer so that the computer does exactly what we want it to do. Computer science, on the other hand, is not just about coding but also a way of thinking that involves problem solving through a logical and methodological manner. Yevgeniy Brikman, who is a software engineer and writer on technology matters, went even as far to say that learning about coding or technology is less important than learning how to think. Sure, technology is ubiquitous, Brikman remarked, but that does not mean we must study about technology in schools.
“For example, we all fly in airplanes,” Brikman further explained, “but getting a pilot license is not part of the K-12 [school] curriculum …. but the tools you need to understand how to think about flying should be part of the curriculum.”
In other words, learning the fundamentals is crucial. Learning how to fly a plane should not be compulsory for everyone, but we all should learn the fundamentals related to flying. We should learn physics and math because they teach us about gravity, forces, pressure, velocity, friction, and lift. We should also learn biology because it teaches us about the effects of high altitudes on our human bodies, and we all should also learn history because it helps to explain about the invention of airplanes and their effect and role in societies.
The crux then for my son – and your children – is to understand the fundamentals, not just learn to duplicate or ‘modify’ guided code (or just build some apps because everyone seems to be doing it now). Once my son has nailed down his fundamentals, then I might consider sending him to coding schools to learn other topics and even build apps. Yes, the school’s lessons would probably be more fun and flashier than his dad’s, but at least my son would actually understand and appreciate what he is doing whilst having great fun.
Updated: 29 June 2018
- “American schools are teaching our kids how to code all wrong” by Idit Hazel, May 15, 2016, Quartz
- “Don’t Just Learn to Code, Learn How to Think Like a Computer Scientist” by Melanie Pinola, March 7, 2014, Lifehacker
- “Don’t learn to code. Learn to think” by Yevgeniy Brikman, May 19, 2014
- “Should kids learn to code?” by Gaby Hinsliff, The Guardian, Dec 3, 2015
|
<urn:uuid:1d8f34c5-5807-4566-8774-d428dc4380ae>
|
CC-MAIN-2020-29
|
http://www.christopherteh.com/blog/2018/04/children-coding/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657170639.97/warc/CC-MAIN-20200715164155-20200715194155-00209.warc.gz
|
en
| 0.962689 | 1,906 | 3.109375 | 3 |
BY DR.Khaled Helmy Chest Specialist Al Mahmora Chest Hospital Ministry of Health - Egypt COPD SCOPE ON
Facts About COPD Cigarette smoking is the primary Cause of COPD. The WHO estimates 1.1 billion smoker worldwide, increasing to 1.6 billion by 2025 in low&middle-income countries. In 2000,the WHO estimated 2.74 million deaths worldwide from COPD. In 1990,COPD was ranked 12 th as burden of disease,by 2020 it is projected to rank 5th
Burden Of COPD Most epidemiological studies have found that COPD prevalence,morbidity and mortality increase over time and are greater in men than in women. COPD prevalence is directly related to prevalence of smoking. Very few studies have quantified the economic and social burden of COPD and its quality of life. Directed costs of COPD are substantial in developed countries while indirect cost are important in developing countries.
GOLD Definition: COPD i s a disease state characterized by airflow limitation that is not fully reversible. The airflow limitation is usually both progressive and associated with an abnormal inflammatory response of the lungs to noxious particles or gases Chronic Obstructive Pulmonary Disease ( COPD ) This definition does not use the terms chronic bronchitis and emphysema and excludes asthma (reversible airflow limitation). and associated with systemic manifestations.
Chronic Obstructive Pulmonary Disease ( COPD ) Chronic bronchitis Defined as the presence of cough and sputum production for at least 3 months in each of 2 consecutive years, is not necessarily associated with airflow limitation. Emphysema Defined as destruction of the alveoli, is a pathological term that is sometimes (incorrectly) used clinically.
Indicators for Considering a COPD Diagnosis Chronic cough Present intermittently or every day. Often present throughout the day; seldom only nocturnal. Chronic sputum production Any pattern of chronic sputum production may indicate COPD. Acute bronchitisRepeated episodes. Dyspnea that is Progressive (worsens over time). Persistent (present every day). Worse on exercise. Worse during respiratory infections. History of exposure to risk factors Tobacco smoke …. (including popular local preparations). Occupational dusts and chemicals. Smoke from home cooking and heating fuel. Diagnosis Of COPD The diagnosis should be confirmed by Spirometry
N FEV1/FVC FVC FEV1 PFT Quick interpretation N NN NN =N = = = TLV + Obst Rest Mix
When performing spirometry, measure: Forced Vital Capacity (FVC) and Forced Expiratory Volume in one second (FEV1). Calculate the FEV1/FVC ratio. Patients with COPD typically show : a decrease in both FEV1 and FEV1/FVC With limited reversibility after bronchodilators Diagnosis Of COPD, cont The diagnosis should be confirmed by Spirometry However, both symptoms and spirometry should be considered when developing an individualized management strategy for each patient.
Role of Inflammation in COPD Small airway disease Parenchymal destruction Airflow Limitation Inflammation
Asthma Onset in mid-life. Symptoms slowly progressive. Long smoking history. Dyspnea during exercise. Largely irreversible airflow limitation. Onset early in life (often childhood)..Symptoms vary from day to day..Symptoms at night/early morning..Allergy, rhinitis, and/or eczema also present..Family history of asthma..Largely reversible airflow limitation. COPD ASTHMA & COPD COPD Asthma
Stage III Severe COPD FEV1 /FVC < 70% FEV1 < 30% predicted or FEV1 <50% predicted +presence of respiratory failure or clinical signs of right heart failure. At this stage, quality of life is very impaired and exacerbations may be life-threatening. GOLD Classification of COPD Stage 0 At Risk normal spirometry Chronic symptoms (cough and sputum production) Stage I Mild COPD FEV1 / FVC < 70% but FEV1 > or equal to 80 % predicted With or without chronic symptoms cough and sputum production. Stage II Moderate COPD :FEV1/FVC<70% 30% < or equal FEV1<80% predicted (IIA:50% < or equal FEV1<80% ) (IIB:30% < or equal FEV1<50% ) With or without chronic symptoms (cough, sputum production and dyspnea)
Prevent disease progression. Relieve symptoms. Improve exercise tolerance. Improve health status. Prevent and treat complications. Prevent and treat exacerbations. Reduce mortality. Prevent or minimize side effects from treatment. Goals of COPD management
1. Assess and Monitor Disease 2. Reduce Risk Factors 3. Manage Stable COPD 4. Manage Acute Exacerbations COPD FOUR COMPONENT MANAGEMENT PROGRAM
A detailed medical history. Spirometry. Bronchodilator reversibility testing. Inhaled glucocorticosteroid trial (6 weeks to 3 months). Chest X-ray. Arterial blood gas measurement. Alpha-1 antitrypsin deficiency screening. Assess and Monitor Disease
Smoking cessation is the single most effective And cost-effective - intervention to reduce the risk of developing COPD and slow its progression. Smoking Prevention Avoid occupational Exposures Reduce Risk Factors
Home Management Bronchodilators : Increase dose and/or frequency of existing bronchodilator therapy. If not already used, add anticholinergics until symptoms improve. Glucocorticosteroids : If baseline FEV1 < 50% predicted, add 40 mg oral prednisolone per day for 10 days to the bronchodilator regimen. Antibiotics : When symptoms of breathlessness and cough are increased and sputum is purulent and increased in volume, provide antibiotic coverage of the major bacterial pathogens involved in exacerbations, taking into account local patterns of antibiotic sensitivity. Management Of Acute Exacerbation
. Marked increase in intensity of symptoms, such as sudden development of resting dyspnea Newly occuring arrhythmias. Diagnostic uncertainty. Older age Insufficient home support Failure of exacerbation to respond to initial medical management Indications for Hospital Admission for Acute Exacerbations Onset of new physical signs (e.g.,cyanosis, peripheral edema) Severe background COPD
. Survival figures for COPD are worse, COPD patients are often stranded at home with little support &suffered from depression. In contrast lung cancer sufferers have access to a wide network of support such as palliative care services, and have lower depression Importance of Quality Of Life In Patients With COPD 50 patients with inoperable lung cancer Vs 50 with severe COPD All >60y, were questioned about their quality of life. 80%of COPD patients were housebound, with 36% largely confined to a chair. In comparison 36% of lung cancer patients were housebound, only 10% chair-bound
One study in UK examined whether COPD patients were relatively disadvantaged in terms of medical and social care compared with a group with inoperable lung cancer. Conclusion: This study suggests that : patients with end stage COPD have significantly impaired quality of life and emotional well being which may not be as well met as those of patients with lung cancer,. COPD patients palliative care needs remain unaddressed Importance of Quality Of Life In Patients With COPD
|
<urn:uuid:31a65646-6483-4990-a0ec-30fa0b84c8a7>
|
CC-MAIN-2020-29
|
http://slideplayer.com/slide/1708966/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655899209.48/warc/CC-MAIN-20200709065456-20200709095456-00197.warc.gz
|
en
| 0.90404 | 1,572 | 2.96875 | 3 |
Out of 170 countries in the world, only 12 harbour between 60% and 70% of the total biodiversity of the planet – earning them the title of megadiverse
Mexico is one of them, with the wild and mountainous region of Sierra Gorda being considered the most ecologically rich and diverse protected area of the country.
In 1987, a local woman named Martha ‘Pati’ Isabel Ruiz Corzo decided she must act to save Sierra Gorda bioregion from destruction by unregulated development.
Pati founded a grassroots conservation organisation, Grupo Ecológico Sierra Gorda (GESG), along with her husband and local people who work together to manage the area as a protected nature reserve.
Now the Sierra Gorda Biosphere Reserve spans one million acres and is home to a wealth of wildlife; noisy Military Macaws can be spotted circling the reserve’s sinkhole canyons, the flowering agave plants attract vibrant feasting hummingbirds, while six cat species roam the forests – including top predators the jaguar and puma.
Despite providing a greater safe haven for these wild animals, most of the land within the reserve is privately owned and still at risk from development – the forests suffer from unregulated logging and illegal hunting is a threat to wildlife. The conservationists working for GESG are constantly looking for funds to buy and protect greater areas of threatened habitat, while working with local people to develop sustainable livelihoods.
They are creating opportunities for rural, low-income communities in the areas of ecotourism, reforestation, soil restoration and ecological livestock management. Demonstrating how forests can be managed sustainably, while continuing to provide an income for local people is key to the success of any conservation project – but it’s far from easy.
|
<urn:uuid:3e99ea29-957e-4c32-9e62-85a8eb4764be>
|
CC-MAIN-2017-47
|
http://www.wildlandscreative.com/blog/2016/02/defending-a-biodiversity-hotspot-in-mexico/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806353.62/warc/CC-MAIN-20171121113222-20171121133222-00008.warc.gz
|
en
| 0.922849 | 367 | 3.25 | 3 |
Putting the youth in ” Youth Action Day”
As we continue to observe major social and political issues take front center, we will need more young people to play a role in changing the world that we see and know. Mahatma Gandhi once said, ” It’s the action, not the fruit of action, that’s important. You have to do the right thing. It may not be in your power, may not be in your time, that there’ll be any fruit. But that doesn’t mean you stop doing the right thing. You may never know what results come from your action. But if you do nothing, there will be no result.” This quote attests to the continuous hard work our fellows do when they show up and show out. We recognize that during past times such as the 1960’s Civil Rights Movement that young people played significant roles in protesting and marching about inequality, justice, racism, LGBTQ rights, and more. It was young people then that were the catalyst for change and it is young people now that are continuing the work and proudly carrying the torch.
Recognizing that young people play a major role in social change, we’ve developed our ” Youth Days of Action.” Youth Days of Action is a space where our fellows can learn, express, and develop ways to combat different social issues. We’ve all heard the saying ” Young people are the leaders of the future or the next generation of leaders.” We are taking that saying a step further by training and allowing fellows to do just that. Youth Days of Action consist of three-track sectors: Education, Justice, Health, and the intersection of them in our world. The Gem Project has been fortunate to continue working with amazing community organizations that pour into our fellows. Organizations such as City of Newark, Newark Summer Youth Employment Fund, Victoria Foundation, Community Foundation of New Jersey, Planned Parenthood, United Ways of Greater Newark, and Newark Thrives Grant. The youth are more than young people with our Youth Days of Action, they are youth organizers. Some of the project tasks fellows do include developing their call-to-action policy recommendations, conducting research, analyzing data, and presenting recommendations on tackling various social injustice issues.
The goal of ” Youth Action Days” is to allow fellows the opportunity to demand a seat at the table as a young person on the verge of making social change. At its core, it is about youth representation and showcasing that young people have a place to shed light on important social issues while devising ways to change them. Fellows with the help of their peers and coaches continue to break barriers within social injustice issues ranging from sexism, racism, police brutality, incrassation, LGBTQ rights, education system, sexual education, and more. Fellows also showcase their artistic talents and expression on some of these issues through the process of artivism. Their art pieces reflect activism in their unique ways of addressing these issues through their virtual reality art museums such as their ” Reimagining Black Liberation through Afrofuturism.” One of the fellows, Shaniah Taylor mentions “ This whole Gem Project experience opened up my ways of thinking when it comes to Social Justice because it’s steps to take before actually taking action. When it comes to building up a community we need to make sure everyone is on board and committed to the work they are putting in. We want to make sure that everyone is putting effort into their work and what they are trying to voice. This program has surrounded the idea of bringing youth into voicing their opinion and ideas when it comes to changing the justice system.”
We admire our fellows and all of their continuous contributions to the Gem Project. Since its inception in 2006, The Gem Project continues to provide high- quality programming enforcing leadership and community service among young high school and college leaders. It is about giving young people a chance at presenting why they need a seat at the table but also how they plan to do so. With the partnership of community organizations, fellows are able to 1. develop a social change orientation, 2. examine systemic issues and policies , 3. create their own policy recommendations for change, and 4. strengthen youth voice and responsibility.
“We champion on time graduation through peer mentoring, youth organizing, employment, and service-learning initiatives, with a social justice approach.”
Sierra Cole is a communications and public relations professional. In 2021 she joined The Gem Project as an inaugural Story Corps Fellow, capturing the stories and work of our youth organizers.⠀
|
<urn:uuid:d6b4e1fd-55a1-4c11-94a4-762ca16838df>
|
CC-MAIN-2023-50
|
https://thegemproject.org/2021/09/putting-the-youth-in-youth-action-day/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100529.8/warc/CC-MAIN-20231204115419-20231204145419-00744.warc.gz
|
en
| 0.958058 | 944 | 2.5625 | 3 |
Why CRISPR Gene Editing Gives Its Creator Nightmares
Has CRISPR co-creator Jennifer Doudna invented the Pandora's Box of genetic engineering, or can CRISPR be used for the forces of good?
Jennifer A. Doudna, Ph.D., Professor of Molecular and Cell Biology and Chemistry at the University of California, Berkeley, has devoted her scientific career to revealing the secret life of RNA. Using structural biology and biochemistry, Doudna's work deciphering the molecular structure of RNA enzymes (ribozymes) and other functional RNAs has shown how these seemingly simple molecules can carry out the complex functions of proteins.
Doudna is a pioneer of the revolutionary CRISPR/Cas9 gene-editing technology. Working with microbiologist Emmanuelle Charpentier, postdoctoral researcher Martin Jinek and graduate student Krysztof Chylinski, the team published their findings in Science in August 2012. Their paper immediately and dramatically transformed the field of molecular biology and genetics. Since then, Doudna and other scientists have shown that the CRISPR/Cas9 technique works in human cells, a finding with enormous implications for preventing and treating many intractable diseases, including viral illnesses, such as HIV, and genetic conditions, such as Down syndrome and sickle cell anemia.
Jennifer Doudna is the author of A Crack in Creation: Gene-Editing and the Unthinkable Power to Control Evolution.
JENNIFER DOUDNA: Well, CRISPR is an acronym that actually represents a sequence of DNA letters in the genomes themselves. It is found in bacteria and it was interesting to scientists originally because it's a bacterial immune system, a way that bacteria can fight viral infection. But the CRISPR acronym has now become widespread in the media as an indication of a new technology for gene editing. And the story of how an adaptive immune system and bacteria was harnessed as a technology for gene editing is really part of what A Crack in Creation is about.
So the CRISPR gene editing technology is a tool that scientists can use to change the letters of DNA in cells in precise ways. So I like to use the analogy of a word processor on our computer. So we have a document, you can think about the DNA in a cell like the text of a document that has the instructions to tell the cell how to grow and divide and become a brain cell or a liver cell or develop into an entire organism. And just like in a document the CRISPR technology gives scientists a way to go in and edit the letters of DNA just like we might cut and paste text in our document or replace whole sentences even whole paragraphs or chapters. We can now do that using the CRISPR technology in the DNA of cells.
So, we think about a technology that allows precise changes to DNA to be made, for scientists this is sort of really a gift that allows research to proceed very quickly in terms of understanding the genetics of cells and organisms, but also provides a very practical way to solve problems. There's many that we could discuss, but I'll mention a couple that I think are particularly exciting.
So in clinical medicine, the opportunity to make changes to blood cells that would cure diseases like Sickle Cell Anemia disease, where we've understood the genetic cause or for a long time but until now there hasn't been a way to actually think about treating patients. And now with this technology it's possible, in principle, to remove stem cells that give rise to blood cells in a person's body, make edits to those cells that would correct the mutation causing Sickle cell disease and then replace those cells to essentially give a patient a new set of cells that don't have the defect. So I think that's very exciting, and there are multiple research groups right now working on doing just that. So I think that's a future probably sometime in the next two to five years we will see clinical trials in that area, and we hope a real progress toward curing that disease.
But another example that I think is also potentially very impactful clinically—but it has a very different kind of strategy—is the idea of making edits to pigs to create animals that are going to be better organ donors for humans. And so pigs are already of interest for organ donation, but imagine that we could make edits to the DNA of pigs to make their organs more human like and also to remove any viruses from pig cells that might otherwise infect a patient and those are both things that are actively underway using the CRISPR technology.
And then a third area that I think is interesting to think about from the perspective of global impact in disease is thinking about using gene editing not to change the DNA in people, per se, but actually to effect the kinds of insects that transmit disease to people. And the idea here is that one could use a gene editor to create mosquitoes that would be unable to transmit viruses like a dengue virus or Zika virus by using a technique called gene drive that allows traits to be spread very quickly through a population using an efficient way of gene editing such as the CRISPR tool. And I think that's an opportunity that could have a very big impact in terms of global health but also requires obviously some very thorough vetting and discussion about potential environmental impact.
I think one of the aspects of this technology that's been very interesting to me personally is my own kind of personal growth through the last few years.
I think when I started this research project, which actually began now almost ten years ago in the lab, we were certainly not thinking about technology that would allow alteration of human evolution or anything of that nature. And over the last few years as this technology has begun to be deployed globally for different applications I found that I've gone from thinking about it initially just with sort of almost wide-eyed excitement thinking about all the opportunities that this offers to realizing that there was real risk and that we really needed—“we” meaning the scientific community and really frankly the human community—needed to be aware of this and discussing it.
And one of the things that sort of brought that to the forefront of my mind was a dream that I had fairly early on in which I walked into a room and a colleague of mine said to me, "Jennifer I'd like you to explain the CRISPR technology to a friend."
And he brought me into a room, and a person was sitting with their back to me and as they turned around I realized it was sort of a horror that it was Hitler, and it was actually Hitler with sort of a pig nose and it almost looked like a chimeric pig human sort of creature.
And it sounds funny in a way to relate that image, but in the dream it was a terrifying thing, and I really felt real just stone-cold fear in the dream and sort of woke up from that dream with a start and realized this initial feeling of “what have I done?!”
And that was really one of the things that motivated me to get out of the lab and start talking to people more broadly about the technology, about its capabilities, about the great things about it but also about things that really required really deep thought and careful consideration and regulation.
Jennifer Doudna was a pioneer of CRISPR, which is a gene-editing technology that is being increasingly studied and used across the world. Jennifer relates the genesis of CRISPR to us and explains the pros and cons of giving birth to such a potentially world changing process. On the positive side, she tells us how scientists are already combining her technology with stem cell research to potentially rid the world of sickle cell anemia. On the negative side, she describes a vivid nightmare she had early on in the process wherein she meets Hitler with a pig nose—a David Lynch-ian vision that represents the negative possibilities of what could happen if CRISPR falls into the wrong hands. While the Pig Hitler scenario is a lot less likely to actually happen, Jennifer understands the duality of her role in CRISPR's creation.
Jennifer Doudna's most recent book is A Crack in Creation Gene Editing and the Unthinkable Power to Control Evolution.
When it comes to foreign intervention, we often overlook the practices that creep into life back home.
- Methods used in foreign intervention often resurface domestically, whether that's in the form of skills or technology.
- University of Tampa professor Abigail Blanco calls this the boomerang effect. It's a consequence not often thought about when we discuss foreign intervention.
- The three channels to consider when examining the boomerang effect include human capital in the form of skills, administrative dynamics, and physical capital in the form of tools and technology.
Or, how I learned to stop worrying and love my tsundoku.
- Many readers buy books with every intention of reading them only to let them linger on the shelf.
- Statistician Nassim Nicholas Taleb believes surrounding ourselves with unread books enriches our lives as they remind us of all we don't know.
- The Japanese call this practice tsundoku, and it may provide lasting benefits.
Scientists used CT scanning and 3D-printing technology to recreate the voice of Nesyamun, an ancient Egyptian priest.
- Scientists printed a 3D replica of the vocal tract of Nesyamun, an Egyptian priest whose mummified corpse has been on display in the UK for two centuries.
- With the help of an electronic device, the reproduced voice is able to "speak" a vowel noise.
- The team behind the "Voices of the Past" project suggest reproducing ancient voices could make museum experiences more dynamic.
|
<urn:uuid:14b7a163-db67-4cd5-a153-4b47382dd591>
|
CC-MAIN-2020-05
|
https://bigthink.com/videos/jennifer-doudna
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251687958.71/warc/CC-MAIN-20200126074227-20200126104227-00344.warc.gz
|
en
| 0.961024 | 1,986 | 3.4375 | 3 |
February 19, 2013
LMU researchers led by Christian Weber have, for the first time, elucidated how cells that promote the development of atherosclerosis find their way to the blood vessel wall, where they stimulate the formation of obstructive deposits.
Atherosclerosis is one of the commonest causes of death in modern societies. The condition is characterized by the build-up of fatty deposits called atherosclerotic plaques on the inner surfaces of arteries, which restrict, and may eventually cut off, blood flow. The deposits can also be dislodged from their site of origin and may then block major vessels in the heart or the brain, leading to life-threatening myocardial infarction or stroke.Monocytes, an important class of white blood cells, are known to contribute significantly to the development of atherosclerosis. They are actively recruited to atherosclerotic lesions, and promote plaque development by sustaining a chronic inflammatory reaction.
Inhibition of monocyte recruitment therefore offers a way of interrupting the build-up of plaques. However, one first needs to know how the monocytes are actually localized to the vessel wall. Professor Christian Weber and Dr. Maik Drechsler of the Institute for Prophylaxis and Epidemiology of Cardiovascular Disease at LMU, in collaboration with Oliver Söhnlein of LMU and a team at the Academic Medical Center in Amsterdam, have now shown that the receptor molecules CCR1 and CCR5 are crucially involved in the process by which monocytes are recruited to the vessel wall. This process is made up of a sequence of distinct steps, including adhesion of the endothelial cells that form the arterial wall, and their subsequent transmigration into the bloodstream by infiltration between neighboring endothelial cells, following activation of the receptors by binding of their respective ligands.
The new findings correct a commonly held view of the precise function of the CCR2 receptor in the recruitment of monocytes. “In contrast to what has been assumed so far, this receptor does not mediate the infiltration of monocytes into the vessel wall; instead, like another chemokine receptor, CXCR2, it controls their mobilization from the bone marrow into the bloodstream,” says Oliver Söhnlein.
The receptor molecules CCR1 and CCR5 therefore present promising targets for the development of novel approaches to the treatment of atherosclerosis, using agents that inhibit their interaction with their respective binding partners, either directly or indirectly.
On the Net:
|
<urn:uuid:cdf36652-d6ae-43b9-b589-621bdb69ee1b>
|
CC-MAIN-2017-47
|
http://www.redorbit.com/news/science/1112787059/monocyte-migrations/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806771.56/warc/CC-MAIN-20171123104442-20171123124442-00299.warc.gz
|
en
| 0.943824 | 516 | 2.65625 | 3 |
"The message here is that we don't have anything against coal, but we have to reduce pollution that comes from coal to our air, to our water and on our land," EPA Administrator Lisa P. Jackson told reporters during a conference call Thursday morning.
TVA finalized its moves with approval Thursday of a 10-year plan developed over the last two years with input from various experts, along with political leaders, business and consumer groups and environmental organizations.
TVA is an independent, corporate agency of the United States, created as part of the Tennessee Valley Authority Act of 1933. The law was passed to provide navigation, flood control, electrical generation and economic development to a region that was particularly hard hit by the Great Depression.
Units slated for being phased out by the TVA account for 2,700 megawatts of TVA's 17,000 megawatts of coal-fired generating capacity. By comparison, none of the 18 units are as large as American Electric Power's relatively small Kanawha River Plant at Glasgow, and the total of 2,700 megawatts is just slightly smaller than the generating capacity of AEP's John Amos Power Plant in Putnam County.
But together, the three plants involved in the phase-out bought about 8.2 million tons of coal in 2010, roughly equal to the combined production of West Virginia's two largest mountaintop removal mines.
Last year, TVA plants bought 1.2 million tons of coal from West Virginia, according to data from the U.S. Department of Energy. One of the plants affected, the John Sevier Fossil Plant near Rogersville, Tenn., got about one-quarter of its coal from West Virginia.
TVA officials said the plants affected are smaller and older, making it difficult and uneconomical to install more modern and effective pollution controls on them. Other utilities, including AEP, have suggested they may move to idle plants of similar size and age, especially as more and tougher air pollution rules kick in.
"TVA -- we need to look at what they're doing here," EPA's Jackson said. "They are business leaders who made a business decision to modernize their fleet."
Reach Ken Ward Jr. at kw...@wvgazette.com or 304-348-1702.
|
<urn:uuid:aca7f574-d1e5-489b-986a-67d2a9e36f76>
|
CC-MAIN-2013-48
|
http://www.wvgazette.com/News/MiningtheMountains/201104140959?page=2&build=cache
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163037167/warc/CC-MAIN-20131204131717-00009-ip-10-33-133-15.ec2.internal.warc.gz
|
en
| 0.966447 | 469 | 2.65625 | 3 |
Our style of parenting has a lot to do with our story of how we were or were not parented. How we were parented created an “attachment style” in us. These attachment styles were first developed by John Bowlby almost a century ago. His work is a guiding principle in my work as a therapist and how I engage others in their story.
How we relate and attach to others (namely our kids) has a lot to do with our attachment style, of which there are four. They are: Secure; Avoidant; Anxious; and Anxious-Avoidant (Disorganized).
Avoidant. They have a high drive for independence. They are often self-referencing (the need to have space apart from others to find and know what they think and feel). There is little trust in others, and they don’t have a strong need to be close to others. Their relationships generally provide the stress, not the comfort. “It’s not ok, and I’m only ok on my own.” Fears relational consumption.
Anxious. There is a high degree of dependency on others. They have a difficulty being on their own a part from important relationships (or, sometimes, any relationship). They are others referencing and trusting, with very little trust in self, high need for others. They themselves generally provide the stress, and they need their relationship to feel comforted. “It’s not ok, and I’m only ok when I’m with you/others.” Fears relational abandonment.
Anxious-Avoidant. This is the style that often feels chaotic to the self, and to others. It’s marked by a “disorganized self” that fluctuates often. They have a difficulty connecting with others for long periods of time. “I’m not ok, we’re not ok, and I don’t really know what is ok.” Fears relational consumption and abandonment.
Secure. These people are interdependent. They understand at an emotional level that they need others, but that they also are ok if others are not available. They have a high degree of autonomy. The “self” is defined and organized regardless if they are alone or with others. “It’s not ok, and I’m ok.” Fears abandoning or consuming others.
Most of us primarily fall into the first two categories and because we’re not static human beings, we often have a mixture of all of these styles. Some relationships will trigger a different style in us, which can sometimes feel really confusing. These are fantastic categories to help you understand yourself better, but also very helpful to know what’s behind the curtain in terms of how you interact with your children. The more we understand ourselves, the less we will need our kids to take care of us.
The styles of parenting draw a parallel line to the attachment styles I wrote about above. The four parenting styles are: Withdrawn; Hyperactive; Confused; and Comfortable.
- High on shame, low on fear.
- Keep kids at arms length. Fear getting close to them, or them getting close to you.
- Often parents our of a “hit and run” style.
- Emotionally distance themselves children to keep from feeling consumed.
- Intimacy requires togetherness which comes at a loss of independence. Prefers to be independent than together.
- Kids often feel alone with withdrawn parents, and cannot depend on them. Emotionally unavailable for
- Communicates with logic more often sounding like a professor than a caregiver.
- Flatter range of emotions. Difficulty knowing what they feel.
- Often stuffs emotions, then explodes in reaction to something small.
- Rises to the occasion in stress, chaotic situations. Cool under pressure.
- Detached and aloof.
- High on fear, low on shame.
- Often referred to as the “Helicopter Parent”. Can be controlling and the dominant figure in the home.
- Emotionally consume children to keep from being abandoned.
- Communicates with raw emotion and tends towards bigger expressions
- Wide range of emotions.
- Insecure in parenting approach. Need kids approval and comfort to feel better. Preoccupied with needs of self.
- Communicates with dominance, lacks collaboration in problem solving.
- Does not do well with quiet. Activity is better than sitting around.
- Inconsistent and anxious.
- High shame and fear.
- Trauma from own childhood creates instability in relationship with own children.
- Chaotic emotional involvement with children.
- Often blows up with the kids for no apparent reason.
- Moody. Able to swing from one extreme to the next without warning.
- Lack compassion or empathy for children. Blame children as reasons for own sufferings/pain.
- Can be personality disordered (Narcissistic, Borderline) that results from unresolved trauma.
- Appropriate shame and fear.
- Able to connect with children around their needs
- Willing and able to ask for help and rely on partner or others to meet children’s needs.
- Communicates effectively, adjusting strength and tenderness based on each child’s unique makeup.
- Ok with kids being kids. Does not need them to be the grown up.
- Manages self and emotions well, does not rely on others to “rescue” them, especially the children.
- Seeks forgiveness, and has a willingness to repair hurts.
Like I mentioned earlier, we all have components from all four styles, but we tend to act out of a single style. You might have different answer to this question than your spouse. That’s ok, discuss and learn what they see differently than you do.
Based on these descriptions, what parenting style best fits you? What parenting style best fits your spouse?
Dad’s primary style: ________________________
Dad’s secondary style: ________________________
Mom’s primary style: ________________________
Mom’s secondary style: ________________________
Take 5 minutes and discuss these styles, what’s coming up for you about this, and where you’d like to improve.
On Monday in the series, I will share an assessment tool for your kids to help you uniquely parent each one of them individually. Most of parenting is learning how to get out of your own way, this will be a tool that will help you do this.
Want to learn more about your parenting style and get some personalized help for how you’re parenting your kids? Consider setting up some parenting coaching sessions.
|
<urn:uuid:1871084e-1c16-43c7-a7ac-9b2b55d472ab>
|
CC-MAIN-2023-14
|
https://samuelrainey.com/tag/attachment/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945472.93/warc/CC-MAIN-20230326111045-20230326141045-00528.warc.gz
|
en
| 0.944224 | 1,451 | 2.5625 | 3 |
Mississippi Homeowners Handbook to Prepare for Natural Hazards
Alabama Homeowners Handbook to Prepare for Natural Hazards
The National Oceanic and Atmospheric Associationís Coastal Storms Program (CSP) is a nationwide effort to help coastal residents reduce the impacts storms have on their families, communities, property and environment.
The program will provide tools and services, such as observations, forecast models, decision support tools and outreach/extension activities and enhance community resilience.
For information regarding the Coastal Storms Programs Small Grants Program, go here.
To view Sea Level Rise Research and Community Projects, go here.Target Audience
The Gulf of Mexico CSP pilot will serve Alabama, Mississippi and eastern Louisiana. The primary outreach audience includes:
- Emergency and floodplain managers
- Natural resource managers
- State and local planners
- Land- and estuarine-use managers
- Local elected officials (e.g., mayors)
The secondary audiences include:
- Chambers of Commerce
- Port authorities
- Academic research communities
- Community organizations
Other CSP programs (in Florida, the Pacific Northwest and southern California) have developed the following tools and products:
- New estuarine circulation models to improve storm planning, response and maritime safety.
- Enhanced oceanographic and meteorological observations and new models to improve forecasting.
- Risk and vulnerability assessments to identify potential hazards.
- Flood evacuation models.
- Ecological assessments to determine and mitigate threats to the environment.
All regional CSPs have identified a need for an outreach and education component. The Gulf of Mexico CSP will ensure that:
- Products are developed based on locally identified needs and that appropriate user groups know about the availability of products.
- Users are trained on the use of the tools.
- Mississippi-Alabama Sea Grant Consortium (MASGC) will collect feedback from CSP partners and user groups on product effectiveness and will gather recommendations for improvements.
The short-term success of the Gulf of Mexico CSP will depend on new coastal storm partnerships. For example, the CSP is expected to provide direct benefits to the Gulf of Mexico Alliance (GOMA) Coastal Resiliency Working Groups. Long-term success will depend on demonstrating the value of the program to potential funding partners.Priority Areas
The Gulf of Mexico CSP aims to provide better communication, awareness and understanding of issues surrounding land-use and development. The program also focuses on how planning decisions affect impact from storms. Priority topics include:
- Ecological impacts of coastal storms on aquatic ecosystems
- Hazard mitigations, evacuation, storm surge
- Community best practices in mitigating hazards impacts and related problems (evacuation, runoff)
Preliminary coastal storm research priorities include:
- Assessing storm-related water-quality issues for aquatic ecosystems and promoting the best management practices
- Determining the economic benefits of estuarine wetlands and hazard buffers
- Participating in the National Ocean Serviceís Gulf of Mexico Storm Surge Partnership Project, which aims to help coastal communities mitigate damages and reduce loss of life, property and ecosystems
- Developing resiliency/human dimension tools
- Creating land-use and land-cover change maps, floodplain elevation maps and bathometry maps
- Determining pre-storm damage estimates
- Developing safer storm harbor models
- Investigating availability of self-insurance
- Determining hazard impacts
- Determining hazard mitigation
To help safeguard coastal areas and residents from storms, the CSP in the Gulf of Mexico will focus on the following objectives and targeted completion dates:
- Design a coastal storms outreach and education program that will introduce people to storms tools, information and partnerships. (End of 2007)
- Deliver the CSP outreach and education program to more than 200,000 constituents. (2010)
- Complete an inventory of land-use models, risk and vulnerability tools, storm-related workshops and training and partners, and produce a Coastal Storm Resource Directory. (Second quarter of 2008)
- Implement a grants program for local and regional partners. The grants will lead to the development of three new tools, products and services and build capacity of 10 coastal storms partners. (2009)
- Conduct evaluations of coastal storms program products and services. (2010)
- Continue the Gulf of Mexico CSP beyond the pilot period.
- An advisory council will be established to assist help in identifying and prioritizing needs, reviewing review research projects and expanding expand partnerships.
- A network of outreach educators will be used to multiply the efforts of the Gulf of Mexico CSP Outreach and Education Coordinator.
- People will download information (resource directory, tools, fact sheets, etc.) from the Gulf of Mexico Coastal Storms Program Web site.
- People will have the opportunity to read or listen to coastal storms information provided through newsletters, newspaper articles or radio/television public service announcements.
- There will be training meetings on the use of CSP tools and products.
- The Gulf of Mexico CSP outreach coordinator will make presentations to at conferences.
- At least three coastal storm research projects will be funded.
- Build regional and state coastal storm partnerships through a development grant program.
Funding for this project will provide one full-time coastal storms extension/outreach specialist over a three-year period and $500,000 for the competitive coastal storms research and program development grant program.Documents
|
<urn:uuid:13951f7c-b1ed-4887-9fdc-189ffaec1855>
|
CC-MAIN-2013-20
|
http://www.masgc.org/page.asp?id=25
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368710313659/warc/CC-MAIN-20130516131833-00067-ip-10-60-113-184.ec2.internal.warc.gz
|
en
| 0.87496 | 1,109 | 2.5625 | 3 |
Tinnitus is usually caused by an underlying condition, such as age-related hearing loss, an ear injury, or a circulatory system problem. For many people, tinnitus improves with treatment for the underlying cause or with other treatments that reduce or mask noise, making tinnitus less noticeable. Just as the sound of a bell can sound a warning, ringing in your ears can be a signal to pay attention to your body. Ear damage and exposure to loud noise are common causes of tinnitus.
Lesser known causes include medications and thyroid disease. The doctor can't always identify the cause, but there are several treatments available. Musculoskeletal factors such as clenching your jaw, grinding your teeth, a previous injury, or muscle tension in the neck sometimes make tinnitus more noticeable, so your doctor may ask you to contract your muscles or move your jaw or neck in certain ways to see if the sound changes. While there is no cure for chronic tinnitus, it often becomes less noticeable and more manageable over time.
Tinnitus can occur anywhere in the auditory pathway, from the outer ear, through the middle ear and inner ear to the auditory cortex of the brain, where it is thought to be encoded (in a sense, printed). The goal is to get the hearing system used to the signs of tinnitus, making them less noticeable or less annoying. However, for many people, tinnitus appears on its own and is not accompanied by other symptoms or problems. Allergies can contribute to the development of tinnitus by causing dysfunction of the tubes that connect the ears to the throat.
Not all insurance companies cover tinnitus treatments the same way, so be sure to check your coverage. People who have high blood pressure (hypertension) are more likely to develop pulsating tinnitus than people who have normal blood pressure. Your general health can affect the severity and impact of tinnitus, so it's also a good time to take stock of your diet, physical activity, sleep, and stress level and take steps to improve them. One of the most common causes of tinnitus is damage to the hair cells in the cochlea (see Ear Pathways and Tinnitus).
Tinnitus is a common problem that may be a sign of an underlying medical condition, including hearing loss. Tinnitus retraining therapy is a promising form of tinnitus treatment that includes counseling and sound therapy to help reduce symptoms. Tinnitus, along with difficulty walking, speaking, or maintaining balance, may be a sign that you have a neurological condition. You can also reduce the impact of tinnitus by treating depression, anxiety, insomnia, and pain with medications or psychotherapy.
For about 12 million Americans, tinnitus is a constant, noisy companion that affects their daily lives. Many people worry that tinnitus is a sign that they are going deaf or that they have another serious medical problem, but it rarely is.
|
<urn:uuid:e513de96-120c-444b-924e-6310cbc068e3>
|
CC-MAIN-2023-23
|
https://www.tinnitus-knowledge.com/why-tinnitus-happens
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648209.30/warc/CC-MAIN-20230601211701-20230602001701-00109.warc.gz
|
en
| 0.954625 | 614 | 3.515625 | 4 |
There are different second language system being used today and it includes Russian, Greek, Japanese, Thai, Korean, Chinese, Arabic that offers different alphabets. If you learned their alphabet, you will find it easy to write and read their language. However, if you are new in learning different languages, you will find it difficult wherein its process becomes complicated and new writing system should be on top of it. There are lots of challenges you will find once you try to master new alphabetic system.
Understand the phonetics. Learning other languages will provide you a big difference to their sounds. Most of the alphabets you will encounter will totally provide you different sounds as compared to English. Because of this, you will be challenged to understand and sound every letter right but don’t be frustrated about it because you will just find it difficult when you first grasp it. You will just need more time to perfectly sound it right and master the accent and intonation you wanted to build.
Understand the logic. The English alphabet is known as Roman alphabet that focuses more on its sounds rather than symbols but in other language systems, the letters of their alphabets are symbols stands for something from their own. The phonetic building of alphabet can miss the logic of other languages wherein they use symbols for them to build meaning. Therefore, you need to learn their logic for you to understand the language.
Identify the fonts. You need to identify the different styles and fonts of writing. Handwriting is different from printed text and there are variations of printed text as well. So think about the cursive writing, different fonts, and capitalization so that English reader can easily read and identify it. However, some other languages will offer you some challenge and has different writing system. Therefore, the best way to learn different writing fonts and styles is by exposing yourself in different styles of writing.
Learn to write. Reading is important and so as writing. However, there are people who remember their phase when they are learning how to write the alphabet. Now, the phase of learning how to write them is another painful process. Different languages have specific ways to write their varieties of character and their letter as well. So learn the pen-strokes and direction of correct handwriting that is readable and legible.
Provide a good attitude. There are people who fail in learning other languages because they give up easily. It is not the language that is hard and impossible to understand, it depends in yourself. Everyone has the capability to learn anything as long as they know they are dedicated on what they do. So you need to get through the slow phase of awkwardness and think that in learning how to read and write, you need to focus on small triumphs. You can start it by recognizing word written that are in different fonts or reading whole sentence out loud having no pause. Then, you can celebrate if you keep working on it and reach the milestone you wanted to attain.
|
<urn:uuid:1854c73a-c2a9-403c-b415-656b04327e6a>
|
CC-MAIN-2017-34
|
https://www.essaymafia.com/main-pitfalls-of-learning-a-second-language-writing-system/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886104612.83/warc/CC-MAIN-20170818063421-20170818083421-00506.warc.gz
|
en
| 0.971712 | 604 | 3.265625 | 3 |
October is a month when sugar and carbs like to come out to play - whether we’re preparing for Halloween craziness or looking to buy warm fall drinks, sugar seems to be present in all of our favorite holiday treats. Not to worry! The U-M Pediatric Diabetes team has some tips and tricks to help you stay in range.
Tricks for Treats
So you want to go trick-or-treating - but your friends say, “Don’t you have diabetes?” Forgive them; they don’t understand that you can eat just as much candy as them (if not more!), but you need to balance it with Insulin.
So how can we make trick-or-treating about fun and friends and not all about going high? Easy! Check out this ‘fun-sized’ candy Halloween guide from JDRF so that you know just how much sugar is in your goodie bag. We advise that you try to enjoy these tasty treats in moderation, and it never hurts to stockpile some free goodies for treating lows! If you'd prefer to trade in your sweets for toys or prizes, check your local area or with your dentist for an eligible Candy Buyback program.
Don’t go trick-or-treating on an empty stomach. Be sure to have a healthy, balanced meal with high-fiber carbohydrates, vegetables, and healthy protein before heading out. Trick-or-treating involves a lot of walking around and extra playing, and a balanced dinner will prevent low blood sugar.
Halloween is also a great night to make sure you are wearing your medical ID bracelet to be safe. ID bracelets can be purchased in a a variety of styles online.
Some of our diabetes patients may also have celiac disease, which adds an extra layer of complexity when trick-or-treating. Not to worry! Here is a list of celiac-approved candy to help you through the night.
Did You Know?
If you see a house with a teal pumpkin, they are raising awareness of allergies and may be offering non-food treats such as glow sticks or small toys. Learn more about the Teal Pumpkin Project here.
And don't forget, Halloween is more than just candy! There are many other fun activities to enjoy including costume contests, carving pumpkins, haunted houses, and making healthy, Halloween-themed snacks.
Fall = Pumpkin Spice!
If fall for you means warm, delicious drinks to keep toasty, do your research on those amazing pumpkin spice lattes, hot cocoa, apple cider, and peppermint mochas. These drinks are super sweet and delicious, but they also contain loads of sugar and can make your blood sugars jump if you're not careful. Make sure you ask about the nutritional information when ordering a sweet drink (like at Starbucks) and keep your meter or CGM close by. You can also enjoy these sweet beverages to treat a low, or share them with a friend!
Did You Know?
A ‘short’ pumpkin spice latte at Starbucks (with whipped cream) is exactly 27g of carbs. Most customers are not aware of the ‘short’ (8oz) size, but it is an option which can be nice if you're looking for a smaller amount of sugar. Be sure you know your options when you order food or drinks!
During the fall as the weather gets colder, it can be tempting to hunker down indoors and enjoy sweet treats and high-carb comfort foods. It is important during this time to stay active and on top of your diabetes management in order to stay in range. Take a look at our other tips below to make the most of your autumn.
Always check yourself or keep your meter or CGM handy. With high-sugar drinks, desserts, and fatty meals (with tons of carbs), it helps to keep close track of your numbers so that you can correct for highs and avoid lows.
Exercising helps when you are high - if you just can’t seem to get down from a high blood sugar, try going for a brisk fall walk or running through a pile of leaves!
When in doubt, ask for nutritional facts (when out) or ask if a lot of sugar went into a homemade dish.
Don’t forget to wear your medical ID bracelet when enjoying festive activities.
Don’t be too hard on yourself, with so many wonderfully sugary sweets, we are bound to be high now and again. Take each number as it comes -- you got this!
|
<urn:uuid:0d550766-4f39-427b-96dc-ea81cdea6851>
|
CC-MAIN-2023-40
|
https://www.umpedsdiabetes.com/fall-treats
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511106.1/warc/CC-MAIN-20231003124522-20231003154522-00809.warc.gz
|
en
| 0.942985 | 962 | 2.65625 | 3 |
HISTORY AND DEMOGRAPHY
The first record of Jews living in the city of Luxembourg, the capital of the country, dates back to 1276. They were followed by small numbers of Jewish immigrants from the adjacent area of Trier, who founded settlements in Luxembourg in the early 14th century. During the Black Death of 1349, Jews were massacred or expelled from the country and by 1515 only 15 Jewish families lived in Luxembourg, Echternach and Arlon. They were again expelled in 1530 and with the exception of a few Marranos, did not reappear in Luxembourg until the Napoleonic era.
In 1808, seventy five Jews resided in Luxembourg. The country gained its independence in 1815 and the first synagogue was built in Luxembourg City in 1823. The country’s first Chief Rabbi, Samuel Hirsch, served between 1843 -1866 and is known as the father of radical Reform Judaism. By 1880, there were approximately 450 Jews in the country, leading to the creation of two more synagogues.
By the 1930’s, the Jewish population swelled from 1,500 to 4,000 as a result of the arrival of refugees from Germany. Evacuations to France and other countries enabled approximately 1,560 of Luxembourg’s Jews to survive World War II. The Nazis murdered 1,945 of Luxembourg’s Jews, a third of who died in camps after being deported, and the rest in the country itself or in the occupied countries to which they fled.
Only 36 Luxembourg Jews survived Nazi concentration camps. After the Holocaust, approximately 1,500 Jews returned to Luxembourg, most of who were merchants who rebuilt their pre-war businesses.
Today, there are roughly 1,200 Jews in Luxembourg and Jews form one of the largest and most important ethnic minorities in the Grand Duchy. About 80% of Luxembourg’s Jews live in Luxembourg City, while there is a smaller community in the nearby town of Esch-sur-Alzette.
Recent Jewish immigrants, mainly from France, have also made their home in the country.
The Consistoire Israelite, established after the Napoleonic conquest, is constitutionally recognised as the community’s representative to the government and is the organ through which the chief rabbi and one communal functionary are appointed. Both are financed by the government. The community’s main synagogue is situated close to the town center. Modern Orthodox services are conducted in French and Hebrew. Luxembourg has one kosher grocery store, but kosher food is not locally produced and families who observe Kashrut obtain meat and other foodstuffs from Brussels and Metz.
Full diplomatic ties were established between Israel and Luxembourg in 1949. Due to Luxembourg’s small size, Israel’s Embassy is located in Brussels and Luxembourg is represented politically by the Dutch Embassy and economically by the Belgian Embassy. Since 1948, 84 Luxembourg Jews have emigrated to Israel.
Sites of Jewish interest include the Great Synagogue of Luxembourg (Luxembourg City), the Canal Synagogue (Esch-sur-Alzette), and the Old Cemetery (Rue Jule Wilhelm, Passage de Treves).
|
<urn:uuid:f915f197-6dba-40da-b969-d7216dc48adc>
|
CC-MAIN-2020-29
|
https://eurojewcong.org/communities/luxembourg/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655879532.0/warc/CC-MAIN-20200702142549-20200702172549-00556.warc.gz
|
en
| 0.962907 | 655 | 3.546875 | 4 |
Bruxism in children is characterized by teeth grinding, gnashing, jaw tightness, and jaw clenching. It can be a serious dental issue if the clenching and gnashing wear away at the tooth enamel and causes continuous pain in the teeth or face. Additionally, it can refer to mastication (chewing) while sleeping. A recent study indicates that bruxism in children lasts around four seconds and occurs up to six times per hour.
Believe it or not, bruxism is relatively frequent among children. Continue reading to discover more about bruxism and how you may help your child.
Oral health professionals frequently attribute bruxism to excessive stress and specific personality types. Bruxism is frequently associated with those who are experiencing nerve tension, such as rage, pain, or irritation. Additionally, it affects aggressive, rushed, or those who are considered to be too competitive. Stress, for example, due to anxiety over a test or a change in habit. Even a dispute with parents or siblings might generate enough tension to produce teeth grinding or jaw clenching.
Bruxism is most frequently associated with headaches, earaches, face discomfort, and jaw difficulties. If you do not intervene promptly, your child's teeth may chip or break. It is critical to determine whether your kid has the condition, even if their baby teeth are still around.
The wear and tear on teeth' enamel caused by grinding can also result in unpleasant eating and increased sensitivity to heat and cold. Suppose grinding is caused by a child's medicine or another medical condition. In that case, their physician may need to adjust or add prescriptions. If bruxism is not treated it can have long-term consequences for children. If a child continues to clench and grind their teeth for a lengthy period of time, significant damage happens to the teeth. Not only will the enamel deteriorate, but the teeth may chip, flatten or fracture.
Many children who grind their teeth are unaware they do so. Often, it is siblings or parents who first detect the problem.
Some warning indicators to look for include grinding noises as your kid sleeps, they complain of a hurting jaw or face upon awakening in the morning, and difficulty chewing. If you think your child grinds their teeth, make a dental appointment. They will look for chipped enamel, atypical wear, and sensitivity.
Helps kids relax before night by taking a warm bath or shower, listening to relaxing music, or reading a book.
For stress-induced bruxism, find out what's bothering your child. Basic stress relievers don't always stop bruxism. If your child is having trouble sleeping or acting out, talk to your dentist or doctor about how you can assist. The good news is that most children outgrow tooth grinding. However, it doesn't harm to go to the dentist first to assess the issue and treat it properly.
*Neither this nor any other content in this media is meant to prescribe, recommend, or prevent any treatment or procedure. We highly recommend that you get the advice of a qualified dentist or other medical practitioners regarding your specific dental condition.
Get Updates And Learn From The Best
|
<urn:uuid:ebb02dbf-3275-41f7-91f6-0d56937224e2>
|
CC-MAIN-2023-40
|
https://happykidsdental.org/blog/understanding-bruxism-in-children
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511364.23/warc/CC-MAIN-20231004084230-20231004114230-00254.warc.gz
|
en
| 0.950028 | 654 | 3.15625 | 3 |
A giant cloud of mostly hydrogen gas with enough material to make over a million suns is heading towards our Milky Way at a speed of 45 miles per second. Called the Smith Cloud (after Gail Bieger-Smith who discovered it in 1963), this 9,800 × 3,300 ly high velocity cloud (HVC) is about 40,000 ly distant and is expected to slam into our Milky Way galaxy in about 27 million years, causing the birth of many new stars a quarter-way round the galaxy from us.
The Smith Cloud is located in the constellation Aquila, and has an apparent diameter around 11° across its long axis. It is only visible using radio telescopes (spin-flip transition of neutral atomic hydrogen), or by detecting hydrogen absorption lines Doppler shifted and superimposed upon the spectra of more distant stars that are shining through the cloud.
The origin of the Smith Cloud is unknown. It may have originated within the Milky Way galaxy itself, or it may be extragalactic. The upcoming collision may not be the first time the Smith Cloud has encountered the disc of the Milky Way. It may be embedded in a large halo of dark matter which would have kept the cloud from being completely disrupted during any past encounters.
The Smith Cloud is a great example of an object that would never have been discovered were it not for radio astronomy. Felix J. Lockman, who has published extensively on the Smith Cloud, has created Radio Astronomy: Observing the Invisible Universe for The Great Courses. Dr. Lockman’s engaging lecture style, his clear explanations, and thorough knowledge of the subject matter makes this the perfect introduction to the subject. Highly recommended!
Incidentally, Jay Lockman discovered a region in Ursa Major that is relatively free of neutral hydrogen gas and dust, thus affording a clearer view into the distant universe. It is named, appropriately, the Lockman Hole.
Alig, C. et al. “Simulating the Impact of the Smith Cloud.” The Astrophysical Journal 869 (2018): 1-6.
Hu, Y. et al. “Magnetic field morphology in interstellar clouds with the velocity gradient technique.” Nature Astronomy (2019): 1-7.
Lockman, F.. “Accretion Onto the Milky Way: The Smith Cloud.” Proceedings of the International Astronomical Union 11 (2015): 9 – 12.
|
<urn:uuid:a1b4b98e-59fc-4faa-be1a-56545222d74d>
|
CC-MAIN-2023-14
|
https://cosmicreflections.skythisweek.info/2021/05/25/were-on-a-collision-course-with-a-gas-cloud/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948900.50/warc/CC-MAIN-20230328232645-20230329022645-00668.warc.gz
|
en
| 0.914663 | 556 | 3.578125 | 4 |
There are over thirty types of clay, but in pottery these types are divided into the three main classes of earthenware clay bodies, mid-fire stoneware clay bodies and high-fire stoneware clay bodies. These three classes are sometimes described as earthenware, stoneware and porcelain, respectively, after the type of pottery these clays make.Clays fired at higher temperatures tend to be less permeable.Continue Reading
These categories of clay are based on how long and at what temperature the clay must be fired in order to reach maturation, or its optimal hardness. Each category includes clays with different colors and degrees of workability. Clay colors are caused by impurities. For instance, red clay generally contains a high level of iron relative to other clays, and black clay contains manganese. Clay workability refers to how plastic the clay is. Higher levels of kaolin make clays less plastic, but also less porous.
Porcelain clays have the highest firing temperature. They are made of fine-grained white clays with high levels of kaolin. Stoneware clays fire at a medium temperature and are exceptionally durable and non-porous. Stoneware clays are often buff, brown or gray due to low levels of impurities. Earthenware clays have the lowest firing temperatures, but they are often more porous and less durable. Because of the low firing temperature achievable in a simple pit fire, earthenware was the first form of fired ceramic invented by humans. Earthenware is often called terra cotta or simply pottery.Learn more about Soil
|
<urn:uuid:c53da1fc-ea7b-472e-b968-54faf1a74b6c>
|
CC-MAIN-2017-30
|
https://www.reference.com/science/different-types-clay-3dcfba559ae1aefb
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424247.30/warc/CC-MAIN-20170723042657-20170723062657-00616.warc.gz
|
en
| 0.956431 | 343 | 3.796875 | 4 |
Why Bullying is One of the Greatest Challenges 8th Graders Have to Deal With
There are many challenges 8th graders have to deal with. But bullying is one of the greatest challenges. Bullying is also a problem in all of middle school and high school, not just for 8th graders. In middle school, there can actually be even more bullying. From a bullying statistics website (bullyingstatistics.org), they state, "The NCES report reveals that: There is noticeably more bullying in middle school (grades 6, 7, and 8) than in senior high school." This proves that bullying in 8th grade can happen even more than in high school.
Many people are bullied every year. I believe that most bullying occurs in middle and high school. In an article from an organization devoted to stop bullying (dosomething.org) , they state, "Over 3.2 million students are victims of bullying each year." This just proves how many students are bullied every year. The same organization also states, "Approximately 160,000 teens skip school every day because of bullying." That is a lot of teens skipping school all because of bullying. Nothing good comes out of bullying. It affects so many students, and is a huge challenge for any middle school or high school student.
Bullying also has many negative affects, which is another reason why it is the greatest challenge for all middle school and high school students. From a different bullying statistics website (heraldextra.com), it states, "Both the bully and the bullied are at greater risk of loneliness, lack of success in school and becoming involved in drugs, alcohol and tobacco. -- National Institute of Child Health". That means that out of the millions of students bullied, both the bullied and bully have a higher chance of being lonely, getting involved with drugs, alcohol, and tobacco, and being unsuccessful in school.
There are so many reasons why bullying is the greatest challenge for 8th graders and also middle school and high school students. It is bad for the victim, it happens all the time, kids skip school because of it, it causes loneliness, being unsuccessful in school, becoming involved in drugs, alcohol, and tobacco, etc. That is why it is the biggest challenge for 8th graders.
"School Bullying - Bullying Statistics." 2009. 11 May. 2015 <http://www.bullyingstatistics.org/content/school-bullying.html
"11 Facts About Bullying | DoSomething.org | America's ..." 2014. 12 May. 2015 <https://www.dosomething.org/facts/11-facts-about-bullying>
"Scared in School: Bullying statistics - Daily Herald." 2013. 13 May. 2015 <http://www.heraldextra.com/news/local/education/precollegiate/scared-in-school-bullying-statistics/article_74844177-1669-5ef5-9609-2c7234e92987.html>
|
<urn:uuid:ed41cfc1-4666-4a63-8f02-ee4838d9273b>
|
CC-MAIN-2017-30
|
https://tackk.com/3qd8cd
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549428325.70/warc/CC-MAIN-20170727162531-20170727182531-00713.warc.gz
|
en
| 0.958335 | 627 | 3.078125 | 3 |
Location of Sermersooq within Greenland
|Coordinates (Sermersooq Commune): Coordinates:|
|State||Kingdom of Denmark|
|Established||1 January 2009|
|• Mayor||Asii Chemnitz Narup (Inuit Ataqatigiit)|
|• Total||531,900 km2 (205,400 sq mi)|
|• Density||0.041/km2 (0.11/sq mi)|
|Time zone||UTC-03, UTC-01|
|ISO 3166 code||GL-SM|
Sermersooq (Greenlandic: [seʁmeʁsoːq̚], place of much ice, Danish: sted med meget is) is the most populous municipality of Greenland. Its capital and largest city is Nuuk, also the capital and largest city of Greenland. It was created on 1 January 2009 and is made of five municipalities.
Geography[change | change source]
Sermersooq borders the Labrador Sea to the west and the Denmark Strait to the east. It borders the municipalities of Kujalleq, Qeqqata, Qeqertalik and Avanaata. To the north is Northeast Greenland National Park.
References[change | change source]
- Sermersooq Municipality: Administration Archived 2011-07-21 at the Wayback Machine
- "Welcome to Kommuneqarfik Sermersooq". Sermersooq Municipality, Official Website. Archived from the original on 18 February 2011. Retrieved 16 July 2010.
- Greenland in Figures 2013 (PDF). Statistics Greenland. ISBN 978-87-986787-7-9. ISSN 1602-5709. Retrieved 2 September 2013.
|Wikimedia Commons has media related to Sermersooq.|
|
<urn:uuid:2b09d314-c232-429b-9449-37722d5fb9cf>
|
CC-MAIN-2020-10
|
https://simple.wikipedia.org/wiki/Sermersooq
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875143079.30/warc/CC-MAIN-20200217175826-20200217205826-00217.warc.gz
|
en
| 0.681959 | 391 | 2.578125 | 3 |
The Chinese Tea Ceremony
The art of drinking and serving tea plays a major cultural role in China. It inspires poetry and songs. Mutual love of tea cements lifelong friendships. For centuries, the ritual of preparing and serving tea has held a special place in the hearts and minds of Chinese aristocracy, court officials, intellectuals and poets.
The Chinese tea ceremony emphasizes the tea, rather than the ceremony — what the tea tastes like, smells like, and how one tea tastes compared to the previous tea, or in successive rounds of drinking. Ceremony doesn’t mean that each server will perform the ritual the same way; it is not related to religion. Each step is meant to be a sensory exploration and appreciation.
Most teas used in the Chinese tea ceremony are grown in the mountains of Taiwan at around 4,000 feet. These teas are particularly refined, such as oolong teas which are lightly fermented and red teas that can be moderately to heavily fermented.
This style of tea-drinking uses small cups to match the small, unglazed clay teapots; each cup is just large enough to hold about two small swallows of tea. These tiny cups are particularly popular in Fujian and Chiujao, in southern coastal China above Canton. In Shanghai and Beijing they use large cups.
To Brew Tea Chinese-style
After heating water to boiling, the teapot first is rinsed with hot water. Using chopsticks or a bamboo tea scoop, fill teapot approximately 1/3 full with tea leaves and then pour boiling water into the pot. Hold the teapot over a large bowl, letting the overflow run into the bowl. Give the tea leaves a rinse by filling the pot half full with hot water, then draining the water out immediately, leaving only the soaked tea leaves. Now fill the pot to the top with more hot water, cover and pour additional water over the teapot resting in the tea bowl. Do not allow bubbles to form in the pot. When mixed with the tea, bubbles form a foam that is not aesthetically pleasing. Be sure to not let the tea steep too long; the first infusion should be steeped for only 30 seconds. In less than a minute, pour the tea into the cups by moving the teapot around in a continual motion over the cups so that they are filled together. Each cup should taste exactly the same.
After steeping, the tea can be poured into a second teapot or tea pitcher to be served at leisure. More water can be added to the teapot, and up to five infusions typically can be made from the same tea leaves. Be sure to add 10 more seconds for the second brewing and 15 additional seconds thereafter.
Each pot of tea serves three to four rounds and up to five or six, depending on the tea and the server. The goal is that each round taste the same as the first. Creating consistent flavor is where the mastery of the server is seen.
Importance of Water
The water used in the tea ceremony is as important as the tea itself. Chlorine and fluoride in tap water should be filtered out as they harm the flavor of the tea. Distilled water makes flat tea and should be avoided. High mineral content in the water brings out the richness and sweetness of green tea. Black teas taste better when made with water containing less Volvic. Ideal tea water should have an alkaline pH around 7.9.
Green teas are ruined by boiling water; the temperature is best around 170-185 degrees F. Oolongs made with underboiled water are more fragrant, which enhances the tea-drinking experience.
|
<urn:uuid:eea20515-dd53-494d-a035-ab2d70543e23>
|
CC-MAIN-2023-40
|
https://www.holymtn.com/culture/china/chinese-tea-ceremony/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506559.11/warc/CC-MAIN-20230924023050-20230924053050-00139.warc.gz
|
en
| 0.939141 | 756 | 2.734375 | 3 |
Top 7 Brooklyn Bridge Facts
An Early Chronology of Brooklyn Bridge Facts
Possessing a history both sordid and bizarre, the Brooklyn Bridge is a fascinating landmark that has been facilitating transportation and skyline views since 1883. We recently named it the best bridge in New York, and for good reason. This bridge is more than just a land connector. It’s a living, breathing link to the past. Our timeline explores the origin, tragedies, and ingenuity that shaped one of the United States’ most iconic structures.
The Origins of New York’s Most Famous Bridge Relied on Corruption
The Brooklyn Bridge was planned by veteran bridge engineer John Roebling, an immigrant from Prussia. Enthusiasm for the idea was not shared by all in the city government, and so Roebling enlisted Tammany Hall kingpin William “Boss” Tweed to help secure funds. Documents showed that Tweed paid out over $60,000 in bribes to secure a $1.5 million bond for the bridge’s construction. After many delays and redesigns the project was ready to launch in 1869.
John Roebling Wouldn’t Live to See The Opening
Once the contract was granted, Roebling got to work. In June of 1869 he was conducting preliminary surveys when a ferry crushed his foot against a piling. His toes were swiftly amputated, and as a result, developed tetanus. He died on July 22nd, just 28 days after the injury and 14 years before the completion of the bridge.
1869 – 1883
A Bridge With a Body Count
The construction of the bridge featured scenes that would have fit in any Final Destination movie. Workers were maimed, crushed, bludgeoned, and succumbed to falls from over 200 feet. If that weren’t bad enough, countless others suffered from “the bends“, a phenomena where rapid pressure change causes nitrogen in the blood to bubble. This resulted in three deaths and the permanent impairment of Roebling’s son (who took over the project).
It Was An Engineering Marvel
At the time of its opening on May 24th, 1883 the Brooklyn Bridge was the first Steel Wire Suspension Bridge in the world. It featured a span of over 6,000 ft and included 19 strands comprised of 5,434 steel wires. These wires took over two years to construct due to the tediousness of assembly. It was deemed safe by the city, although that reputation wouldn’t last long.
A Memorial Day Stampede Claimed Twelve Lives
Just one week after its inauguration, the bridge hosted 20,000 people for a Memorial Day celebration that quickly turned tragic. Chaos ensued when a woman fell down a staircase, resulting in twelve casualties and dozens of injured bridge-goers. The city was shook, and so too was the reputation of their new bridge.
The Greatest Show on Earth (on a Bridge)
It Was More Expensive to Cross the Bridge in 1884 Than It Is Today
The very first day saw the prices as follows:
|Bridge Transportation||Toll Price|
|Horse-Drawn Wagon||10 cent|
In 1891 public pressure ended the foot traffic toll, and 20 years later all tolls were removed from all New York bridges (including the Williamsburg Bridge). This has given New Yorkers and tourists from all over the world free access to one of New York’s most enduring landmarks for over one hundred years.
A Timeline of our Brooklyn Bridge Facts
A Bridge is Born
With the help of New York kingpin William “Boss” Tweedy, John Roebling’s innovative design is approved by city legislators.
John Roebling contracts tetanus after crushing his feet in an on-site accident. He died three weeks later.
The Death Toll Rises
Many workers died during the Brooklyn Bridge’s 14 year construction. Estimates range from 20-50 casualties.
The Brooklyn Bridge becomes the world’s first steel-wire suspension bridge
Just one week after the opening 12 people are killed in a Memorial Day stampede caused by overcrowding.
Barnum & Brooklyn
Circus tycoon PT Barnum puts the strength of the bridge on display with a parade of elephants.
For Whom the Bridge Tolls
Today, the Brooklyn Bridge is one of the few free attractions in NYC. But for the first 8 years of existence this wasn’t the case. You could pay as much as 10 cents to cross the bridge.
Brooklyn Bridge Brooklyn Bridge Construction Brooklyn Bridge Designer Brooklyn Bridge Facts Brooklyn Bridge History Brooklyn Bridge Stampede Brooklyn Bridge Timeline Brooklyn Bridge Tolls john roebling
|
<urn:uuid:791a11c5-c23d-4ba2-bdea-c8fe6a608fd2>
|
CC-MAIN-2023-23
|
https://www.madeinles.org/7-brooklyn-bridge-facts-new-yorkers-dont-even-know/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648850.88/warc/CC-MAIN-20230602172755-20230602202755-00497.warc.gz
|
en
| 0.942124 | 1,044 | 3.171875 | 3 |
If you look carefully, you might see candles in coconut shells on the Grand Union Canal. Rahul Verma explains why.
If you take a stroll by the Grand Union Canal around Southall, West London, you might see coconuts bobbing in the water alongside narrowboats, swans and ducks.
The peculiar pairing of coconuts and canals is a familiar scene in Britain, particularly where the waterways meander through localities with a sizeable Hindu population, such as around the Walsall and Coventry canals.
One of Hinduism’s most revered and sacred gods is Maa Ganga (Mother Ganga), the 1569-mile River Ganges, which begins in the home of the gods in the Himalayas and winds its way across North India where it enters the Bay of Bengal.
So the coconuts in our canals, are in actual fact offerings to Maa Ganga who symbolises Mother Earth. "Hinduism respects nature and especially anything that supports human life," explains Hindu Scholar and Londoner Swami Rama Chaitanya.
"Hindus worship India’s great rivers, and especially Maa Ganga, because they are the elixir of life; water is where all life begins. When Hindus are cremated the ashes should be scattered in the Ganges, it returns you to earth and represents the circle of life."
Hindus also believe bathing in the Ganges can wash away lifetimes of sins, meaning you can reach nirvana rather than being endlessly reincarnated. That's why around 100m Hindus gather to bathe in the Ganges at the Kumbh Mela – the largest coming together of people in the world.
Although Hindus are offering coconuts to canals, there is no suggestion Hindus are scattering ashes of loved ones, nor bathing in canals. Why is it coconuts that are offered and not, for example, bananas or pears?
"Coconuts are the fruit of the Gods – it’s a pure fruit with remarkable qualities, it takes in salt water and produces sweet fruit and it’s neatly packaged too. Also it’s a symbol of fertility, it reflects the womb, and has human qualities – it has two eyes, a mouth and hair," explains Swami Chaitanya.
Which is why, if you’re strolling on a canal towpath you might encounter a Hindu family, with eyes shut, heads covered and bowed, reciting a short prayer before carefully placing a coconut in the care of Mother Nature.
In the past there have been problems with offerings, such as tea-lights, coins and cloth to wrap coconuts, adding to the detritus littering canals and jamming locks. However work by the Canal & River Trust and local authorities in explaining how these damage wildlife, has seen Hindus adapt and limit offerings to biodegradable coconuts.
Swami Chaitanya is hopeful Hindus in India can be similarly respectful and sensitive in their interactions with the River Ganges. "We have a paradox where our holiest river is also our dirtiest river, and until we clean it up and treat it with respect in our day-today lives, we’re harming Mother Earth. We also need to find this balance."
You're reading Waterfront, the online home of our supporters magazine. If you want to be the first to find out about out latest news and features then become a Friend of the Trust. We'll send you regular emails telling you all about our colourful canals and rivers and much more.See more blogs from this author
|
<urn:uuid:cc201dc7-85a2-4379-a0fe-dcd6b8cdce59>
|
CC-MAIN-2020-29
|
https://canalrivertrust.org.uk/news-and-views/blogs/waterfront/sacred-canals
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655879532.0/warc/CC-MAIN-20200702142549-20200702172549-00499.warc.gz
|
en
| 0.937096 | 746 | 2.84375 | 3 |
Information About Hearing Loss
Learning about what causes hearing loss is the first step in both prevention and treatment. Mass Audiology offers hearing screenings to help you stay on the right path with your hearing ability. Our experienced hearing care professionals will sit with you to figure out the cause of your hearing loss and to also develop the best treatment plan for your specific hearing loss.
Hearing loss can lead to people often feeling alone, frustrated, and excluded in most social settings. It is our job to prevent you from ever feeling this way through our hearing loss treatment options. Below are a few hearing loss statistics to help keep you informed.
Untreated Hearing Loss Linked to Depression, Anxiety, Social Isolation in Seniors WASHINGTON, D.C.
Untreated hearing loss has serious emotional and social consequences for older persons, according to a study released today by The National Council on the Aging (NCOA). 5/99
“This study debunks the myth that hearing loss in older persons is a harmless condition,” said James Firman, Ed.D., president and CEO of The National Council on the Aging. The survey of 2,300 hearing impaired adults age 50 and older found that those with untreated hearing loss were more likely to report depression, anxiety, and paranoia and were less likely to participate in organized social activities, compared to those who wear hearing instruments. The study was conducted by Seniors Research Group, an alliance between NCOA and Market Strategies Inc.
The survey found that significantly more of the seniors with untreated hearing loss (those who do not wear hearing devices) reported feelings of sadness or depression that lasted two or more weeks during the previous year. Among respondents with more severe hearing loss, 22 percent of hearing-aid users reported these sad feelings, compared to 30 percent of non-users. Non-users were also more likely to agree with the statement that “people get angry with me usually for no reason” (14 percent of users vs. 23 percent of non-users). Among those with more severe hearing loss, the difference was even greater — 14 percent for users vs. 36 percent for non-users.
Also, people who don’t use hearing instruments were considerably less likely to participate in social activities (20 percent less among those with milder loss, and 24 percent less likely among those with more severe loss).
Firman said the survey was “groundbreaking” not only in the large size of the sample but also in the inclusion 2,090 close family members or friends of the hearing-impaired respondents who were asked a parallel set of questions.
Benefits of Treatment
Hearing aid users reported benefits in many areas of their lives, ranging from their relationships at home and sense of independence to their social life and their sex life. The families of hearing aid users noticed the improvements, but were even more likely than the users to report the improvements in every dimension the survey measured.
You might have hearing loss if you . . .
- Require frequent repetition.
- Have difficulty following conversations involving more than 2 people.
- Think that other people sound muffled or like they’re mumbling.
- Have difficulty hearing in noisy situations, like conferences, restaurants, malls, or crowded meeting rooms.
- Have trouble hearing children and women.
- Have your TV or radio turned up to a high volume.
- Answer or respond inappropriately in conversations.
- Have ringing in your ears.
- Read lips or more intently watch people’s faces when they speak with you
- Feel stressed out from straining to hear what others are saying.
- Feel annoyed at other people because you can’t hear or understand them.
- Feel embarrassed to meet new people or from misunderstanding what others are saying.
- Feel nervous about trying to hear and understand.
- Withdraw from social situations that you once enjoyed because of difficulty hearing.
- Have a family history of hearing loss.
- Take medications that can harm the hearing system (ototoxic drugs).
- Have diabetes, heart, circulation or thyroid problems.
- Have been exposed to very loud sounds over a long period or single exposure to explosive noise.
- Source: Better Hearing Institute
SOLUTIONS – PROOF THAT HEARING INSTRUMENTS REALLY WORK
People with hearing loss delay a decision to get hearing help because they are unaware of the fact that receiving early treatment for hearing loss has the potential to literally transform their lives. Research by the National Council on the Aging on more than 2,000 people with hearing loss as well as their significant others demonstrated that hearing instruments clearly are associated with impressive improvements in the social, emotional, psychological, and physical well-being of people with hearing loss in all hearing loss categories from mild to severe. Specifically, hearing device usage is positively related to the following quality of life issues.
Hearing loss treatment was shown to improve:
- Earning power
- Communication in relationships
- Intimacy and warmth in family relationships
- Ease in communication
- Emotional stability
- Sense of control over life events
- Perception of mental functioning
- Physical health
- Group social participation
And just as importantly hearing loss treatment was shown to reduce:
- Discrimination toward the person with the hearing loss
- Hearing loss compensation behaviors (i.e. pretending you hear)
- Anger and frustration in relationships
- Depression and depressive symptoms
- Feelings of paranoia
- Social phobias
- Physical health
If you are one of those people with a mild, moderate or severe hearing loss, who is sitting on the fence, consider all the benefits of hearing instruments described above. Hearing instruments hold such great potential to positively change so many lives.
- Source: Better Hearing Institute
To learn more about the causes and symptoms of hearing loss Contact Mass Audiology and find out more about our hearing aid instruments. We are the leading hearing aid dispenser with locations throughout Massachusetts, Maine, Connecticut, New Hampshire, and Rhode Island. Do not spend another moment struggling to be a part of the world around you, let Mass Audiology bring you back into the world of better hearing!
|
<urn:uuid:69be31e0-4701-46e5-82c2-3e49e7e3fadd>
|
CC-MAIN-2017-30
|
http://massaudiology.com/hearing-loss-resources/hearing-loss/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549428300.23/warc/CC-MAIN-20170727142514-20170727162514-00430.warc.gz
|
en
| 0.955112 | 1,265 | 3.078125 | 3 |
A heavy metal analysis can be a useful tool for evaluating soil contamination. It determines the amount of elements in a sample, which indicates the dispersion and level of contamination. Fortunately, there are several methods available for environmental analysis. In this article, we will discuss some of them.
Inductively Coupled Plasma Mass Spectroscopy (ICP-MS)
ICP-MS is a method for quantitative analysis of heavy elements. It uses a laser ablation system to analyze solid samples, requiring minimal sample preparation. The method has a single side-effect, minor depletion of the sample material. However, this side-effect is acceptable for most applications.
ICP-MS is a highly sensitive method for heavy metal analysis, and it is widely used for determining concentrations of elements. The method works by introducing a fine aerosol of the sample to a plasma containing 6000-10,000 K. The plasma causes the atoms of the analyte to be ionized at the same time. The ions are then sorted and quantified.
The ICP-MS is capable of detecting the smallest particles, and it is also able to detect elements with very low ppt (parts-per-trillion) levels. Although the method does not have the accuracy of ICP-OES, it is able to detect elements with a much lower ppt (parts-per trillion).
ICP-MS is a fast and reliable technique for elemental analysis. It is particularly useful for measuring the isotopic ratios of elements with multiple isotopes. Click here to learn more about isotopes. Its high speed and low detection limits make it a highly versatile analytical tool. Because of these characteristics, ICP-MS is considered a mature technique that requires strict quality control.
ICP-MS is used in both primary and secondary tissue analysis. It can also be used to analyze inorganic nanoparticles. The technique has shown promising results for simultaneous determination of the concentration and size of inorganic nanoparticles in environmental and food samples.
Single-particle ICP-MS is also capable of detecting single-element elements in a single sample. It has a high degree of sensitivity, and it can also distinguish between particulate and ionic forms of analyte.
ICP-MS has numerous applications, and is one of the fastest growing trace element techniques. It was first commercialized in 1983, and today, over 16,000 systems are installed worldwide. This technology is used for industrial, pharmaceutical, environmental, and nuclear applications.
ICP-MS is the fastest elemental analysis technique available today. It can detect almost every element in the periodic table in parts per billion concentrations. This technology works by passing small amounts of material into plasma, which operates at approximately 8000 degrees Celsius. The plasma is then cooled and a mass spectrometer separates the sample ions according to their mass/charge ratio.
Atomic absorption spectroscopy
Atomic absorption spectroscopy (AAS) is another analytical technique used in this field. The technique is suitable for identifying and determining the concentrations of several metals. Table 3 provides examples of samples that are analyzed using AAS. Lead and cadmium are among the metals that have been determined in this way.
Atomic absorption spectroscopy is a technique that uses light to determine the concentration of specific metal atoms in a liquid or solid. The light is excited by a specific wavelength and the atoms in the sample absorb energy. The amount of energy absorbed is proportional to the number of atoms in the sample. The sample is then compared to a standard solution to determine the concentration of the element.
The advantages of AAS over classical gravimetric methods include increased sensitivity and selectivity. This technique has many applications in mining, oceanographic studies, drinking water, and soil analysis. There are also various types of spectroscopy used in the pharmaceutical industry. An AAS is used to determine the concentration of contaminants in soils and other materials.
Atomic absorption spectroscopy is also used in clinical samples. This technique can determine the concentrations of various materials in human muscle, liver, hair, and brain tissue. It can also help determine the levels of mercury in fish. Mercury is an extremely toxic element that can build up in the environment and pose a risk to the food chain.
Methods to analyze heavy metals
Determining the level of metals in the environment is essential in creating an action plan to help mitigate their presence. Methods of heavy metal analysis are a major part of environmental pollution control. They can help ensure that toxic metals are not present in drinking water and are a reliable indicator for pollution prevention. Methods to analyze metals are widely used for monitoring the presence of heavy metals in a wide range of samples, from soil to solid waste.
The first step is to identify the metals that are present in a particular sample. This will determine their concentration. Using inter-element analysis, these metals are compared with the levels in waste water. If the correlations are high, the source of the heavy metals is likely to be anthropogenic.
|
<urn:uuid:fd859de2-95f6-4a38-b368-0bbd384e8452>
|
CC-MAIN-2023-50
|
https://www.bioenergyconsult.com/tag/soil-contamination/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100677.45/warc/CC-MAIN-20231207153748-20231207183748-00841.warc.gz
|
en
| 0.929027 | 1,021 | 3.375 | 3 |
ANDREWS MCMEEL ALMANAC
Today is the 248th day of 2017 and the 78th day of summer.
TODAY'S HISTORY: In 1774, the First Continental Congress convened in Philadelphia.
In 1836, Sam Houston was elected the first president of the Republic of Texas.
In 1882, the first U.S. Labor Day celebration was held in New York City.
In 1975, President Gerald Ford survived an attempt on his life when Secret Service agents tackled would-be assassin Lynette Fromme.
In 1986, Pan Am Flight 73 was hijacked at the Jinnah International Airport in Karachi, Pakistan.
TODAY'S BIRTHDAYS: Jesse James (1847-1882), legendary outlaw; Arthur Nielsen (1897-1980), market researcher; Darryl Zanuck (1902-1979), film producer; John Cage (1912-1992), composer; Bob Newhart (1929- ), comedian/actor; Raquel Welch (1940- ), actress/model; Werner Herzog (1942- ), filmmaker; Freddie Mercury (1946-1991), singer-songwriter; Cathy Guisewite (1950- ), cartoonist; Michael Keaton (1951- ), actor; Rose McGowan (1973- ), actress.
TODAY'S FACT: In 1957, Jack Kerouac's "On the Road," a defining novel of the postwar generation, was published by Viking Press.
TODAY'S SPORTS: In 1960, boxer Muhammad Ali (then known as Cassius Clay) won the gold medal in light heavyweight boxing at the Olympic Games in Rome.
TODAY'S QUOTE: "I am so used to plunging into the unknown that any other surroundings and form of existence strike me as exotic and unsuitable for human beings." – Werner Herzog
TODAY'S NUMBER: 12 -- colonies represented at the First Continental Congress in 1774. Georgia declined to send delegates.
TODAY'S MOON: Between first quarter moon (Aug. 29) and full moon (Sept. 6).
|
<urn:uuid:695f46e6-4e87-478f-b10d-b9a150fe46cd>
|
CC-MAIN-2023-40
|
https://www.uexpress.com/oddities/andrews-mcmeel-almanac/2017/09/05
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511021.4/warc/CC-MAIN-20231002200740-20231002230740-00071.warc.gz
|
en
| 0.877481 | 441 | 2.515625 | 3 |
A new computer program detected a slow-motion decline, and subsequent revival, of forests in the Pacific Northwest in recent years. But what was behind this mysterious pattern?
"It was, as it turns out, bugs," said Robert Kennedy, a remote sensing specialist at Boston University who designed the computer program, in a NASA statement.
Kennedy's program, called LandTrendr, can detect minute changes in the health of forests by analyzing wavelengths of light given off by the landscape and recorded in satellite images. Different types of vegetation reflect different wavelengths of light, often in ways that the naked eye can't detect.
In the case of the declining forests, Kennedy consulted with the U.S. Forest Service to confirm that the pattern of decline and rebirth detected by LandTrendr, and seen in several areas through the Northwest, was caused by mountain pine beetles. His program also detected a similar pattern of damage caused by the western spruce budworm.
Outbreaks of pine beetles have occurred in several areas, according to the release, including near Mount Hood in the 1980s, an outbreak that peaked in 1992 when the forest began to grow back. Another outbreak near Mount Rainier lasted 10 years, from its onset in 1994 until the insects killed all the trees and moved on in 2004. Pine beetles still pose a huge threat to forests throughout the West.
Kennedy's program also recognized a subtler decline of forests near these two mountains. Hiking to an area that seemed be in poor health based upon the program's analysis, Kennedy recently found an infestation of western spruce budworms. These insects eat the needles off of spruce trees. This won't kill trees immediately, but will if the insects return in following years, NASA reported.
LandTrendr is still in development, but has already changed the way the U.S. Forest Service monitors ecosystems in the Pacific Northwest, according to the NASA statement. Next, researchers aim to analyze the data in real-time, according to the release, so that, for example, they could contain an insect outbreak before it causes too much damage.
- Earth Pictures From Space: Landsat Satellite Legacy
- Top 10 Game-Changing Earth Photos From Landsat Satellites
- What a View: Amazing Astronaut Images of Earth
Copyright 2013 OurAmazingPlanet, a TechMediaNetwork company. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.
|
<urn:uuid:697ae1c2-94aa-423d-b9d5-639db09a8b0a>
|
CC-MAIN-2017-39
|
https://www.yahoo.com/news/satellites-spy-beetle-attacks-forests-223732473.html?ref=gs
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818688926.38/warc/CC-MAIN-20170922074554-20170922094554-00667.warc.gz
|
en
| 0.956494 | 493 | 3.5625 | 4 |
Reproducibility Crisis in Psychology, and Other Science Woes
Here’s more evidence that human pride, greed and ambition can get in the way of the ideals of science.
The Open Science Collaboration tried to reproduce 100 psychology results published in leading journals. Their results, published in Science Magazine, show that only about a third yielded significant results in support of the conclusions, even when the original authors certified the methods used.
“Many psychology papers fail the replication test,” John Bohannon reported in the same issue of Science Magazine. By any measure, a two-thirds failure rate is statistically significant. The researchers understand this does not bode well for science’s reputation. “Reproducibility is a defining feature of science, but the extent to which it characterizes current research is unknown,” they begin their paper. “Scientific claims should not gain credence because of the status or authority of their originator but by the replicability of their supporting evidence.” Live Science followed up with this headline: “Only One-Third of Psychology Findings May Be Reliable – Now What?”
Elizabeth Gilbert, one of the members of the Open Science Collaboration, wrote the following recommendations in The Conversation:
- We must stop treating single studies as unassailable authorities of the truth. Until a discovery has been thoroughly vetted and repeatedly observed, we should treat it with the measure of skepticism that scientific thinking requires. After all, the truly scientific mindset is critical, not credulous….
- Of course, adopting a skeptical attitude will take us only so far. We also need to provide incentives for reproducible science by rewarding those who conduct replications and who conduct replicable work….
- Better research practices are also likely to ensure higher replication rates. There is already evidence that taking certain concrete steps – such as making hypotheses clear prior to data analysis, openly sharing materials and data, and following transparent reporting standards – decreases false positive rates in published studies. Some funding organizations are already demanding hypothesis registration and data sharing.
- Although perfect replicability in published papers is an unrealistic goal, current replication rates are unacceptably low. The first step, as they say, is admitting you have a problem. What scientists and the public now choose to do with this information remains to be seen, but our collective response will guide the course of future scientific progress.
It sounds like many researchers should form another collaboration. They could call it Scientists Anonymous.
PLoS Biology published a paper titled, “The Question of Data Integrity in Article-Level Metrics.” The article describes various anti-fraud measures the Public Library of Science (PLoS) is taking to prevent and detect fraud. “The efforts summarized above aim to mitigate some of the concerns about data integrity, but more work needs to be done,” the authors say before issuing their Call to Action. It should be obvious, though, that data are morally neutral. Any integrity in data requires moral action from human beings.
Fake Peer Review
On another front, Nature reported that faked peer review led to 64 retractions. “The cull comes after similar discoveries of ‘fake peer review’ by several other major publishers,” reporter Ewen Calloway says. Some publishers are setting up safeguards in light of the scandal, but “It is important publishers take rapid but careful action,” a spokesperson for the Committee on Publication Ethics (COPE) says.
“The particular problem of fake review comes about when authors are allowed to suggest possible peer reviewers,” says Wager. “The system sounds good. The trouble is when people game the system and use it as a loophole.”
The involvement of third-party companies in bogus peer review is “more worrying”, Wager adds, because it could mean that the practice is more systemic and extends beyond a handful of rogue authors.
Another worry is robotic publishing. Software can be designed to generate fake journal papers that might get published. It seems intuitive that robots can only have the ethics that are programmed into them by humans. If future dishonest robots vanquish the honest robots, the robots will not be morally accountable; it will only reflect the talent of the respective programmers.
You can’t have science without honesty. Where does honesty come from? Can it evolve? See our next entry.
|
<urn:uuid:ed934e83-e55b-4359-aa23-f828a74ec68e>
|
CC-MAIN-2020-34
|
https://crev.info/2015/09/reproducibility-crisis-psychology/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738964.20/warc/CC-MAIN-20200813073451-20200813103451-00083.warc.gz
|
en
| 0.93669 | 903 | 2.8125 | 3 |
A Brief History of Media & Communication
Humans are social beings who want and need to communicate with each other. According to the pioneering research of Dr. Kathryn Barnand, founder of the Center for Infant Mental Health and Development at the University of Washington, even infants try to communicate with their caregivers using non-verbal cues. Like babies, early humans only needed to communicate with people within a small circle so sounds and gestures were enough. Humans eventually learned to speak, although scientists have not yet agreed on a theory on how exactly this happened.
Humans started writing at around 3,200 BCE (Before Common Era) in Mesopotamia and boo BCE in Mesoamerica. It arose from the need to indicate quantity or numbers for recordkeeping. Words for “finger” are found in several ancient languages for numbers which suggest that humans first counted and communicated quantity with their fingers. This then evolved into cutting notches on tree barks or stones to represent numbers. To record other things and concepts, early humans began drawing on caves and animal skin. The earliest form of writing like the Egyptian hieroglyphs are simplified drawings. Pictographic writing systems, like those used by the Chinese, still exist today.
As human settlements got bigger and bigger, the need to communicate to a greater number of people grew. Horns, drums, fire, and smoke signals were used to send a message quickly and over a vast distance (e.g. “Invaders!”). Messengers were also used to physically disseminate information more precisely. Archaeological accounts corroborate Biblical passages about the Persians using messengers on horses to reach more people over great distances faster. This ancient “pony express” may be the predecessor of the postal service, but like so many ancient forms of spreading information to a large group of people, it required resources that were practically exclusive to the ruling class.
During the pre-industrial age, information was mostly passed on orally. Important documents like laws and edicts had to be tediously copied by hand and posted in public places, or town criers travel from place to place to read them out loud. The process was difficult, slow, and unreliable. Information also flowed in only one direction, from the ruler who issued the edict to his subjects. The whole process must be repeated in reverse if and when the receiver decides to respond. But when the source of information is an authority, as is usually the case, the strict hierarchy in society discourages—even forbids—any response from the recipients.
It wasn’t until the 17th century, hundreds of years after the invention of printing technology lowered the cost of books and reading materials, that the modern newspaper was invented in Europe. Before that, printed news sheets appeared in the Ming Dynasty Court in Beijing in 1582 and block-printed handbills commemorating events were sold in 17th century Japanese cities. Modern magazines were invented in the 18th century. It took an awfully long time for all these developments in communication to happen.
A Quick History of the Internet
When we entered the period of industrialization then the age of electricity over 200 years ago, the pace of communication greatly improved. Various innovations came about, revolutionizing the way people communicated. Some of them were film (189os), radio (1895), and television (1927).
The idea for the Internet began with the invention of computers in the 1960s. Scientists were looking for ways to link computers in the US and Europe so information can be quickly shared for defense and scientific purposes. In the 198os, British computer scientist Tim Berners-Lee conducted a research at CERN (Switzerland) which later resulted in the invention of the World Wide Web. And since the mid-199os, the Internet has become a fixture of any modern society. In the summer of 2016, the United Nations Human Rights Council released a non-binding document condemning the intentional disruption of Internet access by governments. This followed the 2011 report by Frank LaRue, the UN Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression, that Internet access is a fundamental human right.
The Internet has increased the power and reach of mass media. We have now entered the Information Age. Information is abundant and is spread instantaneously and inexpensively throughout the world. Its growth hasn’t stopped—in fact, it is exponentially growing and changing, quickening the ways we communicate, bringing new challenges to how media shapes society.
From Traditional Media to New Media
The historical perspective cautions us from labeling something “traditional” and another “new,” especially now that exponential growth in computing power can easily make a new technology suddenly obsolete. For example, the reliable post mail suddenly got called “snail mail” when emails and instant messaging apps took over as our primary means of sending messages over long distances. The “one-hour photo developing” of pictures in the late 9os was considered fast before smartphones and Instagram were born. It is not an exaggeration to say that most of what we consider cutting-edge communication technology or “new media” will soon be outmoded. But for purposes of analyzing the changing forms of media and how it impacts us, we shall use the terms traditional media and new media.
In distinguishing between traditional and new media, we can initially compare the technology that they use to spread information. New media is digital and Internet media is a big part of this (websites, blogs, wikis, online newspapers, and social media). It also includes information delivered through digital devices like video games, augmented reality, virtual reality, DVDs, and CD-ROMs. Traditional media are those that transmit information without the use of the Internet or any digital platform (i.e. analog technology like airwaves). Traditional media are what used to be collectively known as mass media for their ability to simultaneously disseminate information to a very large group of people (TV, radio, film, and print media).
By definition, new media can also be considered as a form of mass media. At the same time, traditional media companies have since adopted digital technology to spread content. Is there any difference, then, between traditional media and new media when their contents converge? What is the difference between reading an article from a newspaper and reading the exact same story from that newspaper’s website? Think about the differences in your experience when watching your favorite program on TV and when accessing it through a computer.
The most essential difference is that new media are on-demand and interactive. For centuries, the greatest innovations in communication focused on improving how quickly a message can be sent, how far it can be sent, the number of people it can be sent to, and how accurate the message can be conveyed. Traditional media seem to have adequately solved those problems and yet the technology simply did not allow for a true multi-directional flow of information. Always, the information goes from the sender to the receiver. Sure, traditional media have incorporated some means of feedback to create a semblance of a conversation, but it is new media that truly allows for conversation.
Traditional media also control when information can be accessed with their program grids and schedules. Twenty-four-hour news channels and daily newspapers never really felt very limiting until new .media allowed people to access information when they want, where they want. And when new media—specifically social media—allowed us to instantly react, comment, and share with the click of a button on devices we can bring practically anywhere, we have transformed from mere consumers or receivers of information to producers of information. Information no longer just flows in one direction; it is now like a web that goes to multiple directions, and we, too, can send out information to our own friends/ followers on social media. Before, we were just studying media and how they affect us. Now, there is an added layer that pushes us to examine ourselves in order to become responsible deliverers of information.
Because of the on-demand and interactive qualities of new media, some suggest that the more apt term for new media is “open media.” This openness makes the exchange of information extremely fast. But does speed come at the expense of accuracy? Consider the proliferation of fake news—from the occasional celebrity death hoax to the inability of major Philippine broadsheets to change their headlines when Mary Jane Veloso received a last-minute stay on her execution, or that fake news were allegedly produced to influence the 2016 US Presidential Elections. Large news organizations are especially threatened by the ability of just about anyone to tweet a video or a photo of a newsworthy event even before they can report it. There is also the essential question of the value of truthful and insightful journalism in this age where information travels so quickly. Another issue is regulation. Unlike traditional media companies which operate within clear geo-political borders, the Internet is a worldwide web. Regulators grapple with how and who should regulate its various activities, while some argue that with its global reach, it is far better and safer that it remains outside the control of government.
In democratic societies where freedom of speech and of the press are valued and protected, traditional media function within the concept of self-regulation rather than direct government control. Now that we’ve learned that new media has transformed us into media content producers, how do you think we can apply the principle of self-regulation in new media?
|
<urn:uuid:ca38540b-30d1-4dfa-97d5-615522bbb9a3>
|
CC-MAIN-2023-14
|
https://www.elcomblus.com/how-has-media-evolved-through-time/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949506.62/warc/CC-MAIN-20230330225648-20230331015648-00346.warc.gz
|
en
| 0.954165 | 1,926 | 4.1875 | 4 |
Many children have lost a parent or have parent living with HIV or AIDS. These children experience greater psychological and social challenges than other children their own age. While there are various programs and interventions that try to improve the psychosocial well-being of these children, no studies were found that rigorously assessed the effectiveness of such interventions.
Interventions for improving the psychosocial well-being of children affected by HIV and AIDS
July 8, 2009
More like this
- Home-based care for reducing morbidity and mortality in people infected with HIV/AIDS
- Massage therapy for people with HIV/AIDS
- Setting and organization of care for persons living with HIV/AIDS
- Patient support and education for promoting adherence to highly active antiretroviral therapy for HIV/AIDS
- There is no compelling evidence to support the use of the herbal medicines identified in this review for treatment of HIV infection and AIDS.
|
<urn:uuid:4157ca69-e36f-41fe-aee3-38edf2fbb9cf>
|
CC-MAIN-2013-48
|
http://summaries.cochrane.org/CD006733/interventions-for-improving-the-psychosocial-well-being-of-children-affected-by-hiv-and-aids
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163949658/warc/CC-MAIN-20131204133229-00098-ip-10-33-133-15.ec2.internal.warc.gz
|
en
| 0.951103 | 187 | 3.4375 | 3 |
Avid gardeners know that compost can add vital nutrients to soil used in gardens, container plants and lawns. The fact that compost is so versatile and nutrient-dense may not even be its most admirable quality. Made from items used in and around the house, compost costs just about nothing to produce.
The raw materials that make up compost come from organic waste. These can be disposables from the garden and kitchen, as well as other areas around the house. According to the United States Environmental Protection Agency, yard trimmings and food scraps add up to 20 to 30 percent of the municipal solid waste in the United States. Turning waste into compost not only helps the landscape, but also the planet.
Compost is relatively easy to make, and there are scores of materials that can be put into compost. But it is just as essential to know which ingredients cannot be used in compost.
Okay for compost
Most organic materials, or items that were once living, can be used in compost. Plant-based items used in cooking, such as potato peelings, carrot skins, banana peels, cocoa hulls, coffee grounds and filters, corn cobs, apple cores, egg shells, fruit peels, kelp, and nut shells, can be added to compost.
Other items from around the house, like unused kitty litter, hair, shredded newspapers and cardboard, leaves, flowers, paper, pine needles, ashes, and sawdust, can be successfully added to compost. Stick to items that are not treated heavily with chemicals.
Should not be used in compost
Inorganic and non-biodegradable materials cannot go into compost. These are items like plastic, glass, aluminum foil, and metal. Pressure-treated lumber, although a natural material, is treated with preservatives and often pesticides that can be harmful if they leech into the garden.
The small-gardening resource Balcony Garden Web indicates coated or glossy printed papers, such as those from catalogs, magazines, wrapping paper, marketing materials, and business cards, should not be added to compost piles because of the chemicals and inks used in these pages.
Planet Natural Research Center says to avoid pet droppings from dogs and cats. Animal products like bones, butter, milk, fish skins, and meat, may decompose and start to smell foul. Maggots, parasites, pathogens, and other microorganisms can form in the compost. These materials also may attract flies and scavenger animals. Plus, they decompose very slowly.
Any personal hygiene products should be avoided because they are tainted by human fluids and that can pose a health risk.
While weeds are not harmful in compost piles, there is the risk that seeds can germinate and then infiltrate garden beds when the compost is used. The same can be said for tomato plants and some other hardy fruits and vegetables.
Compost is a winner in the garden and around the landscape. Learning which ingredients can and can't be added to compost piles is useful for any gardener.
|
<urn:uuid:a0fae9e9-07a9-4037-bb7a-269775b3e046>
|
CC-MAIN-2020-34
|
http://thetwincitynews.qrsite.com/article.php?sect=295&cat=861&art=6245&224
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439740343.48/warc/CC-MAIN-20200814215931-20200815005931-00094.warc.gz
|
en
| 0.944025 | 619 | 3.578125 | 4 |
Almost all western societies hold in reverence two “anonymous” figures: the worker and “the unknown soldier.” Ernst Jünger would have us venerate a third figure: The Forest Rebel. The Forest Rebel has been present in nearly every society and is a symbol of resistance to tyranny.
Poetry: The Rebellion of Wat Tyler and Jack Straw (c.1612)
Unlike that other medieval hero and man of the people, Robin Hood, Wat Tyler does not enjoy an extensive ballad “afterlife.”
This song, first published in The Garland of Delight (1612), is perhaps the first proper ballad which features the famous rebel. It was subsequently published by Thomas Evans in “Old Ballads, Historical and Narrative” (1777) during the “age of ballad scholarship.” Presented here is a transcription of the song.
Poking Fun at Rebels | Stephen Basdeo
In 1714 George I of Hanover ascended to the throne of the United Kingdom. Many were unhappy with their new German king and the Earl of Mar, in 1715, raised the standard of the royal house of Stuart to win back the throne for the “true” king in exile, the son of James II. A leading journalist decided to mock the rebels.
How Victorians Fell in Love with American Rebels
The British people and the American people did not always like each other. The Americans had broken away from the empire in 1783 and relations remained frosty for over a century. But in the late Victorian era, British writers’ feelings about Americans began to change.
Robin Hood the Angry Letter Writer
If Twitter was around in 1819, this angry letter writer named Robin Hood–who railed against corrupt and tyrannical MPs–would probably have had an account.
The Flemish Revolt: Pierce Egan’s “Quintin Matsys” (1838)
Pierce Egan’s “Quintin Matsys” is like the Belgian “Les Miserables”; the people of Antwerp rise up and take to the barricades to overthrow the evil aristocrats who oppress them.
Sedition | Stephen Basdeo
“The distance is never great between contempt of the laws and open resistance to them.” – Justice Fitzgerald.
Mike Leigh’s “Peterloo” (2018)
Mike Leigh has produced a visually impressive movie, but the characters are a bit flat.
“Lenin Lives!” (2017) by Philip Cunliffe
Philip Cunliffe has written a fascinating book which gives an account of how history might have turned out had the goals of early twentieth-century socialists been realised.
The Last Dying Speech and Confession of Jack Straw
“We would have killed the king and driven out of the land all possessioners, bishops, monks, canons, and rectors of churches. We would have created kings, Walter Tyler in Kent and one each in other counties, and appointed them and we would have set fire to four parts of the city and burnt it down and divided all the precious goods found there amongst ourselves.”
Martina Chapanay (1800-1887): An Argentinian Female Robin Hood
Martina Chapanay, a woman who led a gang of bandits in Argentina for upwards of 20 years.
Oleksa Dovbush (1700-1745): Robin Hood of the Ukraine
Oleksa Dovbush was an outlaw/freedom fighter who robbed from the rich to give to the poor.
My Forthcoming Book: “The Mob Reformer: The Life and Legend of Wat Tyler” (2018)
I have recently been contracted by a commercial publisher to write a popular history book entitled “The Mob Reformer: The Life and Legend of Wat Tyler” which is due for publication in 2018.
The Chartist Robin Hood: Thomas Miller’s “Royston Gower, or, The Days of King John” (1838)
In Thomas Miller’s novel ‘Royston Gower’ (1838), Robin Hood is portrayed as a medieval Chartist activist.
Historic Yorkshire Criminals: William Knipe’s “Criminal Chronology” (1867)
In 1867 William Knipe authored “The Criminal Chronology of York Castle” – the most comprehensive survey of crime in Yorkshire from the medieval period to the Victorian era.
Wat Tyler: 18th- & 19th-Century Literary Afterlives
A brief look at Georgian and Victorian representations of Wat Tyler, the leader of the Peasants’ Revolt of 1381.
|
<urn:uuid:a7ccce3c-c380-456b-8af6-6efa256f259d>
|
CC-MAIN-2023-23
|
https://reynolds-news.com/category/rebels/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224643663.27/warc/CC-MAIN-20230528083025-20230528113025-00161.warc.gz
|
en
| 0.933727 | 994 | 3.109375 | 3 |
Cơ sở nhiệt đồng vonfram also called tungsten copper heat sink. Cơ sở nhiệt đồng vonfram is a heat base which is made of tungsten copper alloy. A heat base is a term for a component or assembly that transfers heat generated within a solid material to a fluid medium, such as air or a liquid. Examples of heat bases are the heat exchangers used in refrigeration and air conditioning systems and the radiator (also a heat exchanger) in a car. Heat bases also help to cool electronic and optoelectronic devices, such as higher-power lasers and light emitting diodes (LEDs).
A heat base is physically designed to increase the surface area in contact with the cooling fluid surrounding it, such as the air. Approach air velocity, choice of material, fin (or other protrusion) design and surface treatment are some of the design factors which influence the thermal resistance, i.e. thermal performance, of a heat base. One engineering application of heat bases is in the thermal management of electronics, often computer central processing unit (CPU) or graphics processors. For these, heat base attachment methods and thermal interface materials also influence the eventual junction or die temperature of the processor(s). Thermal adhesive (also known as thermal grease) is added to the base of the heat base to help its thermal performance. Theoretical, experimental and numerical methods can be used to determine a heat base's thermal performance.
Cơ sở nhiệt đồng vonfram material is a composite of tungsten and copper. W-Cu material with both tungsten low expansion characteristics, but also has copper of high thermal conductivity properties, and the tungsten and copper in the thermal expansion coefficient and thermal conductivity can adjust the W-Cu composition and to design (with professional terms, tungsten and copper in the performance can be cut, and thus the application to the tungsten and copper brought great convenience.
|
<urn:uuid:c5b22a8f-9bc2-40a2-badf-c2948e658b26>
|
CC-MAIN-2023-40
|
http://tungsten-copper-heat-base.com/vietnam/index.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506339.10/warc/CC-MAIN-20230922070214-20230922100214-00180.warc.gz
|
en
| 0.911846 | 438 | 3.265625 | 3 |
The Ambrosini Sagittario 1 was an Italian aerodynamic research aircraft based on the manufacturer’s S.7.
New swept wings and tail surfaces of wooden construction were fitted to the S.7 fuselage.
The wing leading edge was swept at 45 degrees.
At first, the S.7’s piston engine was retained and the aircraft was known as the Ambrosini S.7 Freccia.
After several test flights in this configuration, the piston engine was removed and replaced with a Turbomeca Marboré turbojet of 3.7 kN (840 lbf) thrust, and the aircraft renamed the Sagittario.
The engine air inlet was in the extreme nose, and the exhaust was routed out the bottom of the fuselage, under the cockpit.
The tail wheel undercarriage was retained, so special shielding was added to protect the tail wheel from the engine exhaust.
A small all-metal aircraft, the Sagittario 2 had its jet engine mounted in the nose, with the exhaust underneath the mid fuselage.
The wing and tail surfaces were highly-swept.
The cockpit was moved forward of its position on the Sagittario’s predecessors, and equipped with a bubble canopy.
A tricycle undercarriage was fitted, with the nose gear retracting under the engine.
The Ariete was a prototype fighter aircraft built in Italy in 1958.
It was a refined derivative of the Aerfer Sagittario 2, and was an attempt to bring that aircraft up to a standard where it could be mass-produced as a viable combat aircraft.
Retaining most of the Sagittario 2’s layout with a nose intake and ventral exhaust for the main Derwent engine, the Ariete added a Rolls-Royce Soar RS.2 auxiliary turbojet engine to provide additional power for climbing and sprinting.
This used a dorsal, retractable intake with its exhaust at the tail.
No production ensued, a proposed version with an auxiliary rocket engine instead of the auxiliary turbojet, the Aerfer Leone, was abandoned before a prototype could be built.
Aerodynamic research aircraft
Aerfer Sagittario II
Prototype all metal single seat lightweight fighter aircraft
Prototype fighter aircraft
9.50 m (31 ft 2 in)
7.50 m (24 ft 7 in)
2.02 m (6 ft 8 in)
14.73 m2 (158.6 sq ft)
Laminar symmetric 8.5% thick,
Laminar symmetric 9.30% thick
2,300 kg (5,071 lb)
3,293 kg (7,260 lb)
1,200 l (320 US gal; 260 imp gal) in 4 fuselage tanks
|
<urn:uuid:04654396-6072-4b50-badd-ba3ce8958367>
|
CC-MAIN-2023-23
|
https://www.colettiscombataircraft.com/item/ambrosini-sagittario-i-ii-aerfer-ariete/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224657144.94/warc/CC-MAIN-20230610062920-20230610092920-00213.warc.gz
|
en
| 0.938292 | 673 | 3.1875 | 3 |
A Cyclical View of LifeGrendel is a cyclical novel. It takes place in twelve chapters, respectively representing the twelve months of the year or the twelve signs of the zodiac. Seasons pass in the novel, and return the same time the following year. Even at the outset, Grendel notices that his “twelve year war” against Hrothgar is the same this year as it was the last. The imagery of the novel is likewise cyclical: the ram at the beginning of the novel appears again at the end. Finally, Grendel’s own quest for identity runs full circle as he begins the novel thinking himself the sole denizen of a self-created universe, and ends the novel forced to create the very reality (a wall) that does him harm.
The Importance of ArtArt plays a major role in Grendel. The Shaper's art creates a false history for Hrothgar, but leads to the very real creation of Hrothgar's city-state and the founding of the mead hall Herot. The priests carve their own gods from wood and stone, offering a religion to the Scyldings that they themselves do not believe. However, these same graven images allow Grendel to pose as one of their gods and inspire the old priest Ork into true devotion and a renewed commitment to monotheism. Ultimately, art trumps philosophy when the stranger (Beowulf) forces Grendel to create a poem that will bring the monster’s virtual wall into reality.
The Conflict between Traditional Heroic Ideals and Existentialist PhilosophyUnferth represents the heroic ideals of the Scyldings (and humanity in general). He believes in a higher good and the triumph of honor over evil and treachery. His ideals are tested by Grendel, whom he cannot harm and who refuses to attack the warrior in turn. Unferth is driven to the brink of suicide by Grendel's rejection of the heroic ideals and the monster's assertion of his own meaning for reality: Grendel takes Unferth's unconscious body back to Herot unharmed, leaving the Scyldings to make their own meaning in this action.
Grendel is a novel driven by the main character's sense of isolation. Grendel cannot relate to his mother, whom he considers little more than a brute beast, nor can he make himself understood by the humans he encounters, even though he understands their speech. Grendel is a perpetual outsider, looking for a place to belong. His high-handed search for philosophical meaning is ultimately one more attempt to know who he is and where he belongs.
Hrothgar, too, is isolated by his own power. He marries a woman too young for him and finds a potential threat among his own household. While his warriors sing and drink, Hrothgar broods. His own quest for identity has led him to a place as lonely as Grendel's forced exile from humanity.
Self-knowledge and Self-deceptionGrendel's quest is to know who and what he is. His ever-changing answer to these questions suggests that he will never be satisfied with an end to his quest. Even when he is told his position in the cosmos by beings far wiser than he is (such as the dragon), Grendel attempts to alter this position in favor of something different. Ironically, his very attempts to reject his ordained place in the universe lead him to fulfill the role of Hrothgar's (and humanity's) helpful nemesis more completely than he desires.
Nature vs. NurtureWhat makes Grendel a monster? The novel suggests that Grendel partakes of the nature of his brutish and grotesque mother through the accident of birth. However, Grendel has a keen mind and is capable of making his own choices; it is only when the bull, and later Hrothgar and the other warriors, take advantage of his immobility that Grendel is forced to retaliate with violence. Does Grendel kill because that is what he was born to do, or because his abusers have taught him the ways of violence? The novel intertwines this psychological question with the greater philosophical themes of identity, the nature of existence, and the lack of confirmation of reality.
Fate vs. Free Will
The dragon denies that there is such a thing as destiny, yet at the same time states that it knows Grendel's role in the universe. The dragon circumvents this seeming contradiction by claiming to see past, present, and future simultaneously: knowledge is not cause, nor is it evidence of some higher purpose. Grendel attempts to thwart the dragon's prophesied role for himself, but only ends up doing exactly what the dragon said he would. This would seem to place the novel firmly in the "fate" camp.
However, when Grendel attacks the Scyldings and targets Wealtheow, he chooses not to kill her. He claims that to kill her would be his "ultimate act of nihilism," a self-destructive decision that would at least end Grendel's boredom, but he refuses to end the tedious cycle, leaving the reader to ponder whether Grendel freely chose to spare the queen, or if he cannot help but perpetuate the cycle of violence and despair.
Grendel Essays and Related Content
- Grendel: Major Themes
- Grendel: Essays
- Grendel: Questions
- Grendel: Purchase the Novel and Related Material
- John Gardner: Biography
- Grendel Summary
- About Grendel
- Character List
- Glossary of Terms
- Major Themes
- Quotes and Analysis
- Summary and Analysis of Chapters 1 and 2
- Summary and Analysis of Chapters 3 and 4
- Summary and Analysis of Chapters 5 and 6
- Summary and Analysis of Chapters 7 and 8
- Summary and Analysis of Chapters 9 and 10
- Summary and Analysis of Chapters 11 and 12
- Astrology in Grendel
- Related Links on Grendel
- Suggested Essay Questions
- Test Yourself! - Quiz 1
- Test Yourself! - Quiz 2
- Test Yourself! - Quiz 3
- Test Yourself! - Quiz 4
- Author of ClassicNote and Sources
|
<urn:uuid:99d90e35-6042-4fa6-ac39-2fa2e1cc9423>
|
CC-MAIN-2013-48
|
http://www.gradesaver.com/grendel/study-guide/major-themes/
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164038538/warc/CC-MAIN-20131204133358-00084-ip-10-33-133-15.ec2.internal.warc.gz
|
en
| 0.963343 | 1,310 | 2.59375 | 3 |
Y Udaya Chandar
The previous National Education Policy was framed in 1986 and modified in 1992. In the three decades since then, significant changes have taken place in our country and elsewhere. The education sector had to adapt to suit the 21st century, and a new education policy was necessary. The current government initiated the process of formulating the policy through consultation for an inclusive, participatory and holistic approach. A Committee for drawing up the draft National Education Policy was instituted with Dr. K Kasturirangan (former chairman, ISRO) as the chairman. The Committee submitted a draft of 484 pages to the Ministry of Education in May 2019. The Draft National Education Policy 2019 (DNEP 2019) was uploaded on the MoE website and also on MyGov Innovate portal to elicit the views/suggestions/comments of all stakeholders, including the common man. Several meetings were held at various levels to finalize the draft. A meeting on Draft NEP 2019 of the Parliamentary Standing Committee on Education was conducted on 07.11.2019. Strangely, there was no debate in the parliament on this draft. The new National Education Policy 2020 was launched formally in 2021. The final NEP 2020 has 63 pages.
Education in India is a state-run system; it falls under the government’s domain at three levels: federal, state, and local. Up until 1976, education policies and implementation were determined by each state separately. The 42nd amendment to the constitution in 1976 made education a ‘concurrent subject.’ From this point on, the central and state governments shared formal responsibility for funding and administration.
In the 2011 census, about 73% of the population was literate– 81% men and 65% women. The National Statistical Commission surveyed literacy to be 77.7% in 2017-18–84.7% men and 70.3% women. In 1981 the figures were 41%, 53% and 29% respectively. In 1951, they were 18%, 27% and 9%. As per the Annual Status of Education Report (ASER) 2012, 96.5% of all rural children in the age group 6 to 14 were enrolled in school.
While quantitatively, India is inching closer to universal education, the quality of its education has been questioned, particularly in government-run schools. While more than 95 % children attend primary school, just 40 % Indian adolescents go to secondary school (Grades 9-12). In January 2019, India had over 900 universities and 40,000 colleges.
It seems as if the Indian education system is galloping quantitatively. But for all practical purposes, it is dead and lifeless.
Industry leaders, especially from IT, have often said that only 5% of the country’s engineering graduates are fit for employment and only 7% of the MBA graduates. If we must describe higher education in present-day India, one sentence is sufficient: ‘It is in shambles.’
The Indian education system is stuck in a peculiar situation. Students want certificates and jobs without studying or learning. Teachers want salary, increments and promotion without teaching. Many do not even know the subject they teach. The IT stream is slightly better as the students are interested in learning as most of them want to migrate to the US after their degree.
According to NEP 2020, there are 1,08,017 schools with only one teacher in this country. There will be a similar number of one-room schools. Instead of suggesting solutions for such gigantic problems, NEP 2020 indulges in day-dreaming, “We will have the highest quality teachers, ” “We will create excellent infrastructure for the schools conducive to good learning,” “We will provide nutritious breakfast and mid-day meal to the pupils,” and so on. For the most part, the NEP document is unrealistic.
In addition to the 40 CSIR laboratories and a few premier research institutions, like the Indian Institute of Science (IISc), Bengaluru; TIFR, Mumbai, 16 IITs and 5 Indian Institutes of Science Education and Research (IISER), there are more than 900 universities in India. The number of Higher Education Institutes (HEI) is increasing each day, mainly because of political pressure. There are not enough suitable candidates in the country to fill the faculty positions in these institutes. Thus, they remain highly sub-standard and the students who pass out from them remain worthless.
The most horrifying fact is that our nation, home to more than 1.3 billion people, has had no Nobel laureate in science since CV Raman was honored in 1930. Three other Indian-born scientists have won the Nobel – biochemist Har Gobind Khorana (in 1968), astrophysicist Subrahmanyan Chandrasekhar (in 1983), and molecular biologist Venkatraman Ramakrishnan (in 2009) – but all of them were honoured for work done entirely outside India.
India’s spending rates on education are low and insufficient, and private firms do as poorly as the government. In terms of corporate expenditures on research and development, India is ranked 43, compared to China’s 13. Currently, science research in India is full of red tape and corruption.
An overemphasis on academic qualifications by the University Grants Commission (UGC) has resulted in a number of university teachers registering for Ph.D. programs, but it is not the passion for research, but the passion for climbing the career ladder that motivates them. As a result, the quality of most Ph.D. research is sub-standard.
Roughly 60 to 70% of India’s population is rural. The foundations of learning are laid here, but today, their educational systems are acutely poor. As a whole, our nation is lagging far behind developed countries. Though some learning centers, such as the IITs and the IIMs, continue to deliver high-quality education, several flaws and gaps mar the system. Standards are falling in these institutions too due to the indiscriminate opening of new IITs and IIMs in response to political pressure.
Many choose to teach only when they cannot secure a highly paid corporate job or a decent government job. As a result, teaching has become a ‘last resort’ career. Further, if one earns a Master’s degree in the humanities, the only venue for him is teaching at the college or high school level. There are no other openings available. The same is true for students who earn an MSc in science. Where does an MSc Biology candidate go? At best, he might seek a junior lecturer’s job at a junior college teaching biology to a disinterested lot. There are very few research jobs in India and certainly not enough to employ all the MScs the universities are churning out.
Students seldom study and apply technology at the primary and secondary levels. Technology-based education is an absolute need for the country. The Industrial Revolution, a prosperous and exciting event that spread throughout Europe and the US in the 18th and 19th centuries, left India behind only because we were poor in the subject of technology. Even today we do not produce anything associated with modern technology that is visible to the average consumer. Instead, we produce items that advanced countries have already used and thrown away.
Teaching may be noble, but it does not pay! This has led to a dearth of quality teachers. This shortage of qualified, trained and experienced teachers has led to the predictable state of low quality students emerging from new-generation institutions and these students will become tomorrow’s teachers. Teaching requires knowledge, communication skills and patience, and the current crop of teachers lack one or all of these qualities.
Even when a person wants to join the teaching profession, because he/she is passionate about teaching, it is not easy to gain entry. There is a 50% caste-based reservation for all government-employed teachers, including those at the university level. The other 50% positions are, in effect, ‘reserved’ for the relatives of politicians and people in influential positions. It is also possible to buy a teaching position, even if you have no knowledge of the subject or talent for teaching. The truth of the matter is that new teachers often enter the profession through dubious routes. One bad person employed in this work has the potential to produce an untold number of ill-equipped graduates over the course of a career.
People play politics to become Dean, academic counsellor, chairman of a board of studies, member of a management council or be named vice chancellor. The policy makers truly have nothing to do with academics. They devise and implement policies that make the pursuit of academics increasingly a joke.
An engaging submission to the Supreme Court has revealed that a whopping 2,556 current MLAs and MPs from 22 states are accused in criminal cases. It is these lawmakers that formulate how the country has to be educated.
Many university vice-chancellors are appointed based on caste equations and political connections rather than on academic attainment or administrative capability.
We still have school without classrooms. Science students do not know whether they have laboratories or not. The focus is on promoting students to the next class. People with close contact to local political leaders run most of the private schools in the country, and their aim is not to strengthen the quality of education but to make money.
Copying in the examination hall by the examinees is another menace the system has acquired. Sometimes this is done with the knowledge of the invigilators. Institutes allow ‘mass copying’ to get good results, so that more admissions take place the next year.
Both teachers and students use their institutions as stepping stones to a career in politics. Teachers indulge in ‘office politics’ in the hope of climbing up the organizational ladder. They form groups to pass time and decry the work of other teachers. In some universities, this has reached dangerous proportions. Selfish teachers invite students to join their politics. Students’ political lives also ripen in hostels, where they have nothing much to do. Most Indian political parties have ‘youth wings’ that attract these students.
In many colleges and universities, teachers bunk classes just like their students. They skip classes until December, since the examinations are not until March. The students are also happy with this. In January, the teachers realize that a lot of syllabus remains to be covered, so they rush through. They leave the remaining portion for the students to read and learn on their own. In many institutions, there is barely a system of ‘assignments’ and where it exists, the teachers hardly look into the submitted work.
Many institutions require their students to attend a minimum number of classes per year to sit for their final exams. In reality, this does not happen. Some teachers do not record students’ attendance at all. The students too are happy. A standard provision exists that allows students to submit a ‘medical certificate’ to excuse absences. The students produce these certificates obtained from phony medical practitioners.
Another aspect of our higher education system is the fraud surrounding Ph.D. dissertations. The dissertations are copied time and again. Even the dissertations submitted by Ph.D. scholars lack originality. The clever ‘scholars’ get hold of a dissertation submitted a decade or more ago, copy it, and submit. If the student is on good terms with the ‘guide’, the latter will call a friend to serve as the ‘external examiner’, and the candidate is assured of receiving the doctorate. These professors perform this ‘service’ on a reciprocal basis.
Many scholars are weak in data analysis using modern statistical techniques. They are good at working the percentiles only. In such cases, scholars persuade statistics students to do the work. The examiners also do not pose data analysis questions as they too are poor in the area. In any case, hardly anyone collects data from the field; they fabricate it sitting at home.
Regarding research, the NEP 2020 committee is satisfied with just recommending a ‘National Research Foundation’. They have allotted very little space for this vital arm of education. India spends 0.69% of its GDP on research while USA spends 2.8%, Israel 4.3% and South Korea 4.2%.
In most universities, there is a stipulation that associate professors must publish one or two papers on worthy topics in reputed journals before being promoted as professors. Some associate professors approach ‘writers’ to handle this task for a good price. Post-graduate students are also required to submit a thesis for their degree. These students are notorious for submitting papers written by someone else a few years prior. In any case, no one reads these, including the concerned professors.
Technology is seldom applied in our education system. India does a paltry job of providing technology and technology-based education. Some admitted to B Tech courses drop out, often due to their inability to absorb the technical material taught.
It is not known what exactly can be done to make India ‘technology-friendly’. The NEP 2020 Committee should have dwelled into this aspect, but they have not. The world, and especially the developed world, is becoming more and more technology-oriented, and the distance between us and the developed world is increasing in this area. To narrow this gap, we should lay emphasis on technology over perfecting English in our good private schools, at the very minimum. If we put greater focus on technology in government-run schools, there is nothing like it.
It is time for educationists and leaders to strengthen our industry–institution collaboration. Today, the interactions between industry and India’s educational institutions are minimal, whereas the developed nations have thrown open their universities and research facilities to industry and vice versa. In our case, the industry has no faith in the students’ technological capabilities or the teachers guiding them. Neither party trusts the other, and both think that, at best, their interactions are a waste of time.
Most public and private universities around the world depend on their alumni, both financially and for input regarding the changing requirements of their curricula. This is totally absent in the Indian context. In most of our institutions, including the IITs, there is a 15–25% shortfall in faculty hiring. The freeze on new full-time appointments, combined with the increasing number of part-time and ‘casual’ teachers, has left the academic circuit demoralized.
So worthy academics should sit down and analyze what is to be done to lift Indian higher education to the desired standard, or better yet to a ‘world-class’ standard. Otherwise, it will keep declining until we reach the point where nothing will help.
The author is a retired Colonel from the Indian Army. A passionate student of Sociology with a PhD in the subject. An Author of many books. He can be reached at firstname.lastname@example.org
|
<urn:uuid:a6980618-e55d-4cf0-a58d-76c344fdd946>
|
CC-MAIN-2023-23
|
https://www.teacherplus.org/can-the-national-education-policy-2020-change-indias-educational-landscape/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224654871.97/warc/CC-MAIN-20230608103815-20230608133815-00795.warc.gz
|
en
| 0.963506 | 3,101 | 2.796875 | 3 |
|Central coordinates||55o 22.00' East 4o 39.00' South|
|IBA criteria||A1, A2|
|Altitude||0 - 135m|
|Year of IBA assessment||2001|
Site description Conception is a small island located less than 2 km west of the north-western coast of Mahé. Surrounded by a rocky coastline with cliffs, its steep slopes are entirely covered by dense woodland and thickets, growing over large boulders and crevasses. Until the mid-1970s it was exploited as a coconut plantation, but has since remained abandoned and uninhabited. There is no beach on which to land, no permanent surface fresh water and no paths, making it very inhospitable. Vegetation is dominated by the introduced species Cinnamomum verum, Anacardium occidentale, Cocos nucifera and Tabebuia pallida, but the endemics Phoenicophorium borsigianum and Allophylus sechellensis and the indigenous Canthium bibracteatum and Premna obtusifolia are well-represented in the undergrowth.
|Species||Season||Period||Population estimate||Quality of estimate||IBA Criteria||IUCN Category|
|Seychelles Kestrel Falco araeus||resident||1999||present||-||A1, A2||Vulnerable|
|Seychelles Blue-pigeon Alectroenas pulcherrimus||resident||1999||present||-||A2||Least Concern|
|Seychelles White-eye Zosterops modestus||resident||2005||244-366 individuals||unknown||A1, A2||Endangered|
|Land-use||Extent (% of site)|
Other biodiversity Not well known. Mabuya sechellensis and Phelsuma astriata are abundant. Phelsuma longinsulae and Ailuronyx sechellensis have also been recorded. Marine life around the island appears very rich and includes the hawksbill turtle Eretmochelys imbricata (CR).
References Cheke (1984), Rocamora (1997a, b), Rocamora and François (2000).
Contribute Please click here to help BirdLife conserve the world's birds - your data for this IBA and others are vital for helping protect the environment.
Recommended citation BirdLife International (2014) Important Bird Areas factsheet: Conception island. Downloaded from http://www.birdlife.org on 21/08/2014
To provide new information to update this factsheet or to correct any errors, please email BirdLife
|
<urn:uuid:31bac4bb-af58-4f2d-a21e-c6c8787ad1ba>
|
CC-MAIN-2014-35
|
http://www.birdlife.org/datazone/sitefactsheet.php?id=6790
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500813241.26/warc/CC-MAIN-20140820021333-00114-ip-10-180-136-8.ec2.internal.warc.gz
|
en
| 0.777511 | 574 | 2.984375 | 3 |
This page is designed to help those who plan to build their own wind turbine. I hope you find it useful.
Some of it is getting a bit dated - especially the stuff about brakedrums.
I am teaching workshop courses in wind generator construction, here in Scotland and also in the USA and Wales.
See my courses pages for many stories and pictures of homebrew windpower.
Details of how to buy my books on home built wind turbines
I am going to use some rough scans of a few tables from my
Workshop chapter 1, which will help you with the overall
design of your wind machine. I am using scans because the
files went in the sea with my computer back in '97.
The first table tells you how much power
you can expect from a wind machine, when you know how big it is,
and how strong the wind is.
Readers in the USA should note that one metre diameter is about 3 feet, and 3 metres is ten feet.
Clearly, size matters, but windspeed matters even more.
And above all do not forget SAFETY, which must be a paramount concern.
There is a whole chapter on the subject in the book.
Wind turbines are usually designed to work best in the range 3 - 12m/s, but windspeeds as high as 12m/s are not common (everyday) occurrences, so don't expect to get such high power outputs often enough to be relied on. It is usually a good idea to avoid very high power (high wind) operation altogether, unless you plan to use the machine for heating purposes on rare occasions. To avoid damage in high winds, you will need a good control system which reliably protects the machine from the wind's fury.
In terms of what you can run from the wind system, the average power is more useful information. From this average you can then work out how many Amphours of battery charge per average day you might get.
4.5m/s or ten mph is a typical average windspeed, for an open site
A 2 metre diameter machine would probably give about 50 watts average output
(although it might produce 200 watts or more at times).
An average output of 50 watts may not sound much, but over a 24 hour period you can expect
50W/12V x 24h = 100 Amp-hours of charge (on average) into a 12 volt battery.
This is sufficient to run five 'energy efficient' lamps, each using 2 amps, for ten hours.
In reality, some of the energy will be lost in the process of charging and discharging the battery,
but you get the general idea, I hope.
Once you have chosen the size of wind turbine, you need to design the blades and find or build a generator or alternator to match them.
Your main decision will be choosing the tip speed ratio of
The 'tip speed ratio' is how much faster, than the windspeed, the blade tips travel.
High tip speed ratio means more speed, low tip speed ratio needs more blades.
On the whole, high tip speed ratio is better, but not to the point where the machine becomes noisy and highly stressed. This next diagram show four rotors, designed to run at different tip speed ratios.
The tip speed ratio will determine how fast your wind turbine will want to turn, and so it has implications for the alternator you can use.
Here are some on-line guides to the detail of how I make blades:
Following through our example of the 2 metre (six foot is 1.8m) diameter machine, and choosing a tip speed ratio around 6 we find that the machine will run at about 600rpm. This leads to the biggest problem in home-built windpower. You will not find an alternator or generator which will give your required power (250 watts) while running at that speed. So you will either have to use gearing to change the speed, or build or adapt a special machine. The second option is the better of the two.
Check at Windmission where you may be able to buy a purpose built permanent magnet alternator (PMG).
Or again you can use a permanent-magnet "servo" motor from a surplus store in the USA
or a 'Smart drive' washing machine motor from new zealand (see ecoinn)
or try a czech alternator at http://mgplast.web.worldonline.cz/
try Windstuffnow for an alternator recipe
A book "the homebuilt dynamo" by New
author Alfred T. Forbes is available from Graham Chiu
It explains in great detail how to build your own permanent magnet alternator. This is one fat glossy book.
Help with finding magnets for building your own alternator here.
Finally, (last but not least!) here is a link to a free
public domain on-line alternator construction manual in pdf format
I developed this design as an aid project for Intermediate Technology Development Group (ITDG) with funding from the UK government.
Windpower workshop does not go into the details of
quite so deeply for any single machine, but it covers a lot of ground,
including towers and how to erect them.
- back to my home page..
|
<urn:uuid:b3196770-0d41-461c-acd3-3893f274fd0c>
|
CC-MAIN-2023-14
|
http://scoraigwind.com/books/index.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945473.69/warc/CC-MAIN-20230326142035-20230326172035-00007.warc.gz
|
en
| 0.915208 | 1,143 | 2.828125 | 3 |
Australians use a lot of antibiotics and this increases the chance for bacteria to develop resistance to antibiotics. Monitoring antibiotic use in Australia allows us to make informed decisions about where to reduce unnecessary antibiotic use.
Antimicrobial resistance (AMR) is one of the biggest threats to both human and animal health today. AMR can affect anyone, of any age, and in any country. It can lead to longer hospital stays, higher medical costs and possibly death.
AMR occurs when germs that can cause infections, such as bad bacteria, become resistant to medicines, such as antibiotics, used to kill them.
The information contained in this section relates mainly to bacteria becoming resistant to antibiotics.
|
<urn:uuid:e7d63e04-3b88-4683-9bbc-0e9927669ef8>
|
CC-MAIN-2020-34
|
https://www.amr.gov.au/about-amr
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738674.42/warc/CC-MAIN-20200810102345-20200810132345-00258.warc.gz
|
en
| 0.944395 | 139 | 3.5625 | 4 |
Table of Contents
The policy, goals and objectives coordinating the protection, use and development of plant resources on state forest lands are translated into guidelines through the "Flora Resources Section" of the State Forest Resource Management Plan.
Forests are complex ecosystems composed of animal and plant communities integrated with the physical environment. Trees are but a small number of the plant species found in the forest. A myriad of shrubs, herbs, ferns, fungi, mosses and lichens compose the forest under story and blanket the forest floor.
Ferns, herbs, shrubs, vines and trees are known as vascular plants. The current number of native vascular plant species in Pennsylvania is 2151. Fungi, bryophytes and lichens are often grouped together and termed "lower plants". Combined the number of "lower plants" total approximately 8,270 species. The majority of these species are fungi (7,447). Bryophytes comprise 469 species and lichen the remaining 351 species. Activities associated with these plant species are controlled by the Department of Conservation and Natural Resources through the provisions of the Wild Resource Conservation Act, P.L. 597, No. 170.
The Act states, " The Department of Conservation and Natural Resources shall with cooperation from taxonomists, biologists, botanists, and other interested persons conduct investigations on wild plants in order to ascertain information relating to population, distribution, habitat needs, limiting factors, and other biological and ecological data to classify plants and to determine management measures necessary for their continued ability to sustain themselves successfully." This provision creates a program that requires extensive research and management that will be supervised and conducted by the Bureau of Forestry.
A native species is one that occurred within the state before settlement by Europeans. Of the 2151 native species, 682 are classified as endangered, threatened, rare or undetermined in Title 17, Chapter 45, Conservation of Pennsylvania Native Wild Plants. (Plant List http://www.dcnr.state.pa.us/forestry/pndi/fullplants.asp) An additional three species (Goldenseal, Ginseng and Yellow-Lady's Slipper) are identified as vulnerable due to collection pressures. Reasons for classification are a decline in the number of populations in the state, due to habitat destruction and competition from invasive plant species. Over collecting certain species known for their medicinal or edible properties may also contribute to the decline of native plant populations. It is illegal to possess any plant or plant parts classified as Endangered or Threatened without a Wild Plant Management permit issued by the Bureau. State Forest Rules and Regulations (Title 17, Chapter 21) state that permission is needed from the district Forester to cut, pick, dig, damage or remove living or dead plant and plant part. One may gather edible wild plant or plant parts without authorization if used for personal or family consumption.
The Wild Resource Conservation Act also provides that the department may protect wild plant species that are in jeopardy of population decline by acquiring or designating areas previously acquired as public wild plant sanctuaries (Adobe PDF - 25 Kb). Any area of publicly owned land that supports a viable population of native plant species of special concern, or contains suitable habitat for viable growth of native plant species of special concern and is known to have historically supported such species, or the areas contains suitable habitat for viable growth and reproduction of native plant species of special concern which may be transplanted or the area supports an exemplary Pennsylvania native wild plant community may be nominated as a public wild plant sanctuary. To date 30 Public Wild Plant Sanctuaries have been nominated and will be designated on completion of the Resource Plan.
Invasive plant species have been identified as the second most serious threat to native plant populations. An "invasive species" is defined as a species that is 1) non-native (or alien) to the ecosystem under consideration and 2) whose introduction causes or is likely to cause economic or environmental harm or harm to human health. Executive Order 13112 February 3, 1999.
In 1998 the Bureau initiated the process of identifying the most serious invasive plant species that affect native plant communities. The Bureau met with Pennsylvania Department of Agriculture and Pennsylvania Landscape & Nursery Association to evaluate the species. The result is a list of 58 species published in 2000 in a brochure. Twenty-five species, including the Pennsylvania Department of Agriculture's Noxious Weeds, are identified as the worst offenders. Twenty-one additional species are listed as invaders of native plant communities and an additional 12 species are considered invasive species in southeastern Pennsylvania or invasive in particular situations. What is an Invasive Plant? (Adobe PDF - 25 Kb) State forests will exemplify conservation and education of native plant populations through inventory and management of floral resources as outlined in this section.
The Department of Conservation and Natural Resources currently has responsibilities for the management and protection of Pennsylvania native wild plants. This authority was given to the Department in 1982 with the passage of public law # 157 cited as the Wild Resource Conservation Act (P.L. 597, No. 170) (32 P.S. 5301-5314). The Bureau of Forestry has administered the plant program according to provisions of the Act since 1983. Regulations titled, Conservation Of Pennsylvania Native Wild Plants (Title 17, Chapter 45) establish various programs to inventory, monitor, and manage plant species that occur naturally in the commonwealth. The regulations were updated in 1993.
To date inventory efforts have focused on vascular plants. The Pennsylvania Natural Diversity Inventory (PNDI) maintains locational and biological information on vascular plant species listed as Pennsylvania Extirpated, Pennsylvania Endangered, Pennsylvania Threatened, Pennsylvania Rare, and Tentatively Undetermined. www.dcnr.state.pa.us/forestry/pndi/pndiweb.htm
The Pennsylvania Flora Project at the Morris Arboretum, University of Pennsylvania has prepared dot maps from herbarium specimens of the vascular flora the database can be searched geographically or taxonomically. This information contains confirmed and historic locational information. www.upenn.edu/paflora
The Bureau's Resource Inventory and Analysis Section has recorded vascular plant species on the inventory plots. Species lists exist for all forest districts. Species lists and locational information from all of these inventories has been combined to provide species lists on State Forest lands that can be specialized for either Districts or Ecoregions.
An inventory is never complete. Much information has been collected and compiled by these inventories however much more needs to be done. Specific groups such as lichens and mosses have been overlooked in the above inventories, for various reasons. Very little information exists on these groups of plants. Inventories for plants classified as Pennsylvania Vulnerable (Ginseng, Panax quinquefolius, Golden-Seal, Hydrastis canadensis, and Yellow Lady's Slipper, Cypripedium pubescens) need to be conducted in order to identify populations that can be managed for sustainable harvest.
County Natural Area Inventories:
Inventories of counties to identify and map locations of special concern resources. Conducted by professionals. Locations distributed to county & some information included in PNDI database. One time. See below for status of inventories and source of material.
Pennsylvania County Natural Area Inventories Completed to End of 2001
Adams: 1996. A Natural Areas Inventory
of Adams County, Pennsylvania. The Nature Conservancy Pennsylvania
Science Office, Middletown, for Adams County Office of Planning and Development,
Gettysburg, PA. 109 pp.
Allegheny: 1994. Allegheny County Natural Heritage Inventory. Western Pennsylvania Conservancy, Pittsburgh, for Allegheny County Board of Commissioners, Pittsburgh. 229 pp.
Beaver:. 1993. Beaver County Natural Heritage Inventory. Western Pennsylvania Conservancy, Pittsburgh. 189 pp.
Bedford: 1998. Bedford County Natural Heritage Inventory. Western Pennsylvania Conservancy, Pittsburgh, for Bedford County Planning Commission, Bedford, PA. 242 pp.
Berks: 1991. A Natural Areas Inventory
of Berks County, Pennsylvania. The Nature Conservancy Pennsylvania
Science Office, Middletown, for Berks County Planning Commission, Reading,
PA. 127 pp.
Bradford: A Natural Areas Inventory of Bradford County, Pennsylvania. The Nature Conservancy Pennsylvania Science Office, Middletown. The inventory for this county has not been completed.
Bucks: Rhoads, A. F. and T. A. Block. 1999. Natural Areas Inventory of Bucks County, Pennsylvania. Morris Arboretum, University of Pennsylvania, Philadelphia, for Commissioners of Bucks County, Doylestown, PA. 122 pp.
Butler: 1991. Butler County Natural Heritage Inventory. Western Pennsylvania Conservancy, Pittsburgh. 152 pp.
Carbon: The inventory for this county has not been conducted.
Centre: Centre County Natural Heritage Inventory. Western Pennsylvania Conservancy, Pittsburgh. 215 pp.
Chester: 1994. A Natural Areas Inventory
of Chester County, Pennsylvania. The Nature Conservancy Pennsylvania
Science Office, Middletown, for Chester County Planning Commission, West
Chester, PA. 175 pp.
Clinton: 1993. Clinton County Natural Heritage Inventory. Western Pennsylvania Conservancy, Pittsburgh. 212 pp.
Columbia: A Natural Areas Inventory of Columbia County, Pennsylvania. The Nature Conservancy Pennsylvania Science Office, Middletown. The inventory for this county has not been completed.
Cumberland, Dauphin, Perry: 2000. A Natural Areas Inventory of Cumberland, Dauphin, and Perry Counties, Pennsylvania. The Nature Conservancy Pennsylvania Science Office, Middletown, for Tri-County Regional Planning Commission, Harrisburg, PA. 278 pp.
Dauphin (see Cumberland)
Delaware: 1992. A Natural Areas
Inventory of Delaware County, Pennsylvania. The Nature Conservancy
Pennsylvania Science Office, Middletown, for The County of Delaware and
Redevelopment Authority of the County of Delaware, Media, PA. 110 pp.
Erie: 1993. Erie County Natural Heritage Inventory. Western Pennsylvania Conservancy, Pittsburgh, for Erie County Department of Planning, Erie, PA. 312 pp.
Fayette: 2000. Fayette County Natural Heritage Inventory. Western Pennsylvania Conservancy, Pittsburgh, for Fayette County Office of Community and Economic Development, Uniontown, PA. 244 pp.
Franklin: The inventory for this county is currently being conducted by The Nature Conservancy. The inventory is expected to be completed in late 2003.
Juniata: The inventory for this county has not been conducted.
Lackawanna:.1997. A Natural Areas Inventory of Lackawanna County, Pennsylvania. The Nature Conservancy Pennsylvania Science Office, Middletown, for Lackawanna Heritage Valley Authority, Mayfield, PA. 128 pp. [text available on web site ]
Lancaster: 1990. A Natural Areas
Inventory of Lancaster County, Pennsylvania. The Nature Conservancy
Pennsylvania Science Office, Middletown, for Lancaster County Planning
Commission, Lancaster, PA. 83 pp.
Lebanon: The inventory for this county is currently being conducted by The Nature Conservancy. The inventory is expected to be completed in late 2003 or 2004.
Lehigh: 1999. A Natural Areas Inventory of Lehigh and Northampton Counties, Pennsylvania. The Nature Conservancy Pennsylvania Science Office, Middletown, for Lehigh Valley Planning Commission, Allentown, PA. 177 pp.
Luzerne: 2001. A Natural Areas Inventory of Luzerne County, Pennsylvania. The Nature Conservancy Pennsylvania Science Office, Middletown, for Luzerne County Board of Commissioners Wilkes-Barre, PA. 197 pp.
Lycoming: 1993. A Natural Areas
Inventory of Lycoming County, Pennsylvania. The Nature Conservancy
Pennsylvania Science Office, Middletown, for Lycoming County Planning
Commission, Williamsport, PA. 164 pp.
Mifflin: The inventory for this county has not been conducted.
Monroe: 1991. A Natural Areas Inventory
of Monroe County, Pennsylvania. Pennsylvania Science Office, The Nature
Conservancy, Middletown, for Monroe County Planning Commission, Stroudsburg,
PA. 145 pp.
Montgomery: 1995. A Natural Areas
Inventory of Montgomery County, Pennsylvania. The Nature Conservancy
Pennsylvania Science Office, Middletown, for Montgomery County Planning
Commission, Norristown, PA. 126 pp.
Montour: The inventory for this county has not been conducted.
Northampton: (see Lehigh)
Perry: (see Cumberland)
Philadelphia: The inventory for this county has not been conducted.
Pike: 1990. A Natural Areas Inventory of Pike County, Pennsylvania. The Nature Conservancy Pennsylvania Science Office, Middletown. 121 pp.
Snyder: The inventory for this county has not been conducted.
Schuylkill: The inventory for this county is currently being conducted by The Nature Conservancy. The inventory is expected to be completed in late 2003 or 2004.
Sullivan: 1995. A Natural Areas
Inventory of Sullivan County, Pennsylvania . The Nature Conservancy
Pennsylvania Science Office, Middletown, for Sullivan County Office of
Planning and Development, Laporte, PA. 112 pp.
Susquehanna: A Natural Areas Inventory of Susquehanna County, Pennsylvania .The Nature Conservancy, Middletown. The inventory for this county has not been completed.
Tioga: A Natural Areas Inventory of Tioga County, Pennsylvania .The Nature Conservancy, Middletown. The inventory for this county has not been completed.
Union: 1993. A Natural Areas Inventory
of Union County, Pennsylvania. The Nature Conservancy Pennsylvania
Science Office, Middletown, for Union County Planning Commission, Lewisburg,
PA. 100 pp.
Washington: 1994. Washington County Natural Heritage Inventor. Western Pennsylvania Conservancy, Pittsburgh, for Board of Washington County Commissioners, Washington, PA. 217 pp.
Wayne: 1991. A Natural Areas Inventory of Wayne County, Pennsylvania. The Nature Conservancy Pennsylvania Science Office, Middletown, for Wayne County Department of Planning, Honesdale, PA. 138 pp.
Westmoreland: 1998. Westmoreland County Natural Heritage Inventory. Western Pennsylvania Conservancy, Pittsburgh, for Westmoreland County Department of Planning and Development, Greensburg, PA. 250 pp.
Wyoming: 1995. A Natural Areas Inventory
of Wyoming County, Pennsylvania. The Nature Conservancy Pennsylvania
Science Office, Middletown, for Wyoming County Planning Commission, Tunkhannock,
PA. 102 pp.
York: 1996. A Natural Areas Inventory
of York County, Pennsylvania. The Nature Conservancy Pennsylvania
Science Office, Middletown, for York County Planning Commission, York,
PA. 163 pp.
State forest lands serve as examples in promoting the conservation of native wild flora and are managed to provide habitats that support a diversity of native plant communities and species.
Public Wild Plant Sanctuaries
The Wild Resource Conservation Act (P.L. 597, No. 170) establishes the authority for the conservation of native wild plants within the Commonwealth. The responsibility for implementing and enforcing that portion of the Act has been assigned to the (DCNR) Bureau of Forestry.
Section 10 of the Act allows the Department to acquire or designate public wild plant sanctuaries "when deemed necessary to protect wild plant species afforded consideration under this act..." Use of these areas for scientific or educational purposes is encouraged.
The Department proposes to designate suitable sites on lands for which it has management authority, namely State Forest and State Park lands. Other public land management agencies at all levels are strongly encouraged to utilize the sanctuary designation procedure for appropriate lands under their jurisdiction.
Any area of publicly owned land may be nominated by the responsible management authority for designation as a public wild plant sanctuary under the Department's program. If the Department then finds that the area meets one or more of the following criteria, a sanctuary will be officially designated provided the necessary requirements and procedures listed below are followed.
Requirements and Procedures for Nominating and Designating DCNR Lands
Management Plan Guidelines
The plan must include, but is not limited to, the following:
Invasive Plant Species
"Invasive plant" is really another name for an introduced species that has become an environmental weed pest, that is, a plant that grows aggressively, spreads, and displaces other plants. Invasive plants tend to appear on disturbed ground, and the most aggressive can actually invade existing ecosystems. Invasive plants, like weeds, are generally undesirable because they are difficult to control, can escape from cultivation, and can dominate whole areas. In short, invasive plant infestations can be extremely expensive to control, as well as environmentally destructive.
A small number of invasives are "native," meaning they occurred in Pennsylvania before settlement by Europeans but became aggressive after the landscape was altered. Most invasive plants, however, are brought in from other continents, and are called variously "exotic," "alien," "introduced," or "non-native" invasives. An aggressive plant, freed from its environmental, pest, and disease limits can become an invader of other ecosystems. However, not all exotic, non-native, or introduced species are invasive. This brochure lists the most troublesome invasive plants that occur in Pennsylvania and impact native plant communities. A more complete list of invasive plants is available from the Ecological Services Section, (DCNR)-Bureau of Forestry (BOF).
Characteristics of invasive plants
Invasive plants are noted for their ability to grow and spread aggressively. Invasive plants can be trees, shrubs, vines, grasses, or flowers and they can reproduce rapidly by roots, seeds, shoots, or all three. Invasive plants tend to:
Impact of invasive plants
The biggest reason to not plant or seed invasives is because they are degrading our native environments. In fact, they are a major cause of the extinction and loss of native plants. Plants like Kudzu, Purple Loosestrife, and Garlic Mustard are displacing native plants and degrading habitat for native insects, birds, and animals. Endangered, rare, and threatened native species of plants and animals are especially at risk because they often occur in such small populations that make them particularly vulnerable.
Another reason to avoid invasives is that invasive plants, even when grown in a cultivated yard, can spread, escape, and cause landscape maintenance weeding problems for years to come. In urban and suburban areas there is a good chance that the worse weeds on your property are escaped plants, like Japanese Honeysuckle, Multiflora Rose, Japanese Knotweed, and Oriental Bittersweet. In yards, gardens, fields, and parks these plants are very expensive to control.
For more information
"Invasive Plants, Weeds of the Global Garden." 1996. Brooklyn Botanic Garden, 1000 Washington Avenue, Brooklyn, NY 11225. ISSN #0362-5850
Brown, Lauren. 1979. Grasses, and Identification Guide. Boston: Houghton Mifflin. ISBN# 0-395-27624-1
Hoffman, Randy and Kearns, Kelly, eds. 1977. Wisconsin Manual of Control Recommendations for Ecologically Invasive Plants. WIDNR, PO Box 921, Madison, WI 53707.
"Landscaping With Native Plants." 1998. Brochure available from PA Dept. of Conservation and Natural Resources, Bureau of Forestry, PO Box 8552, Harrisburg, PA 17105-8552.
Marinelli, Janet. 1998. Stalking the Wild Amaranth, Gardening in the Age of Extinction. New York: Henry Holt. ISBN# 0-8050-4415-9
Natural Areas Journal. Natural Areas Association (NAA), 320 South Third Street, Rockford, IL 61104-2063. ISSN# 0885-8608 See Internet site.
Newcomb, Lawrence. 1977. Newcomb's Wildflower Guide. Boston: Little, Brown, and Co. ISBN# 0-316-60441-0
Petrides, G.A. 1988. A Field Guide to Eastern Trees. Boston: Houghton Mifflin; Peterson Field Guide Series, No. 11. ISBN# 0-395-46732-2
Rhoads, A.F. and Klein, W.M. 1993. The Vascular Flora of Pennsylvania. American Philosophical Soc. 104 S. Fifth Street, Philadelphia, PA 19106. ISBN# 0-87169- 207-4
Stein, Sara. 1997. Planting Noah's Garden, Further Adventures in Backyard Ecology. Boston: Houghton Mifflin. ISBN# 0-395-70960-1
Tennessee Exotic Pest Plant Council. 1997. Tennessee Exotic Plant Management Manual. From: Friends of Warner Parks, 50 Vaughn Road, Nashville, TN 37221. Tel (615) 370-8051 Text on Internet site.
Virginia Department of Conservation and Recreation. Invasive Alien Plant Species. Dept. of Conservation and Recreation, Div. of Natural Heritage, 1500 E. Main Street, Suite 312, Richmond, VA 23219. Tel (804) 786-7951 Text on Internet site.
Westbrooks, R.G. 1998. Invasive Plants: Changing the Landscape of America, Factbook. Federal Interagency Committee for the Management of Noxious and Exotic Weeds (FICMNEW); Washington, D.C. 109pp., US Government Printing Office, Washington D.C. 20402. See Internet site.
Brooklyn Botanic Garden, Invasive Plants, www.bbg.org
Morris Arboretum PA Flora Project, www.upenn.edu/paflora
Natural Areas Association, www.naturalarea.org
Pennsylvania DCNR, Bureau of Forestry, www.dcnr.state.pa.us/forestry/pndi/pndiweb.htm
VA Dept. of Conservation and Recreation list of invasive plants, www.state.va.us/~dcr/dnh/invproj.htm
Species of Special Concern
The Pennsylvania Natural Diversity Inventory (PNDI) is Pennsylvania's natural heritage program. PNDI's primary purpose is to monitor the status and map the location of plants and animals in Pennsylvania that are threatened or endangered, on the decline, or little understood. PNDI also identifies the best examples of natural communities in the state, and provides information on outstanding geologic features. Natural communities include a diverse array of habitats, such as grasslands, wetlands, shrub lands, forests, and aquatic systems. Outstanding geologic features include a variety of unique examples of Pennsylvania geology. The collection and management of this information is accomplished through a partnership between the Department of Conservation and Natural Resources, The Nature Conservancy, and the Western Pennsylvania Conservancy.
Protection of the Commonwealth's State Forests can be accomplished in harmony with the sustainable use of our natural resources. Since 1984, PNDI data has been a component of environmental assessments on State Forest land. These evaluations help to prevent damage to valuable ecological areas and can save planning and development costs by identifying potential land use conflicts in the early stages of proposed projects. The Bureau of Forestry conducts environmental reviews for species of special concern for projects (e.g. timber sales or hiking trials) that are initiated on lands managed by the Bureau of Forestry. The PNDI Internet Database, which may be found through the IntraForestry Website, is accessible to Bureau of Forestry employees and other approved agency staff. Searches are conducted by logging into the database and entering the project type, acreage of project, and either the latitude/longitude or inches up and over on a given USGS Topographical Quadrangle map. The system, using the database, creates a receipt/results page that may be printed out and used for reference. The PNDI Internet Database Search Results page tells the person conducting the search the next step that they may have to take. First, the search may result in no conflict with the project area. If this result is received then no further action is required. Second, the search may result in potential conflict or conflicts with the project site. In the case of a potential conflict a listing of agencies or persons will be provided for one to contact for consultation.
Any project that results in a potential conflict to a plant species falls into the jurisdiction of the Department of Conservation and Natural Resources and, therefore, should be faxed to the environmental review specialist of the Ecological Services Section in the Bureau of Forestry. A GIS program will be used to determine the extent, if any, of the anticipated impact to the listed species. If no impact is anticipated then a response stating: "No Impact On Plants or Natural Communities Anticipated" is sent. If a project is found to have potential impact to a species or ecological feature, then it is sent for further review. The environmental review botanist will initiate a more detailed review that may require phone and e-mail conversation to understand the logistics of the project. The botanist may conduct a plant survey, help with land mitigation to avoid impact, or clear the project. No further work will commence until consultation with the Ecological Services Section is complete.
Native Wild Plant Species
Link to Landscaping with Native Plants brochure
Link to EMAC genetics policy
|
<urn:uuid:97022fea-9cf5-4848-908c-c887e39c60fc>
|
CC-MAIN-2014-23
|
http://www.apps.dcnr.state.pa.us/forestry/sfrmp/flora.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510267865.20/warc/CC-MAIN-20140728011747-00343-ip-10-146-231-18.ec2.internal.warc.gz
|
en
| 0.87204 | 5,313 | 3.453125 | 3 |
What Is Skinny Fat?
To describe someone as skinny fat seems like a paradox. How can someone be two very different things? The term is often used jokingly; someone who is a normal healthy weight might say they are a fat person on the inside because of their love of food or for having what they consider to be a big appetite. However, that’s not really what skinny fat refers to.
What Does Skinny Fat Really Mean?
In a nutshell, skinny fat means that someone has too little muscle and too much body fat. There is a medical term for this type of body – metabolically obese normal weight (MONW). Many people think that having a normal weight means that they are healthy and fit but the idea of skinny fat turns this notions on its head. It is possible for someone who is overweight to be fitter and healthier than someone who is skinny fat.
What Does Skinny Fat Look Like?
Skinny fat is more common amongst women than men. This likely has a lot to do with the fact that women’s bodies tend to carry more fat in general and men are more likely to practice exercises that build muscle mass. Women often prefer dieting and restricting certain foods in an attempt to reach their weight goals, neglecting the need to exercise regularly. In general, a person will become skinny fat when they focus too much on their size, shape and weight rather than their overall body fat, muscle mass and health. We’ve all seen someone who is skinny fat though we may not have recognized that they are skinny fat at the time. Here are some tell-tale signs:
- Skinny fat women tend to have more cellulite than women who have a healthy balance of muscle and fat
- Uneven fat distribution. Fat will often accumulate around the belly, creating the familiar potbelly look
- Fat may also gather around the butt. Skinny fat men may end up with a “womanly” look to their butt and hips. Women, on the other hand, will have saggy or drooping butt cheeks.
- Chipmunk cheeks and double or triple chins! Fat will also gather on the face, jawline and neck of skinny fat people
- Man boobs! Skinny fat men are at risk of developing the dreaded man boobs due to too much fat gathering around the chest and breast area
- Cankles or undefined legs are a common skinny fat trait. Skinny fat people may have thin legs which lack definition meaning their calves and ankles blend in to one piece of leg
- Arms lacking definition with wobbly upper arms
How Do People Become Skinny Fat?
Three key ways of becoming skinny fat have been identified:
- A restrictive diet which severely reduces a person’s calorie intake
- Doing only cardio or an excessive amount of cardio exercise
- An exercise regimen that contains little or no resistance training
Why Is It So Bad To Be Skinny Fat?
Being skinny fat may seem harmless but it can actually disguise a multitude of serious health concerns. As we mentioned, just because someone is a normal weight, it does not mean that they are a picture of health. Skinny fat people often do not exercise enough which is crucial for maintaining good health. Side effects of being skinny fat include:
- High blood pressure
- High blood sugar levels
- High cholesterol
- Insulin resistance
- Early onset heart disease
- Chronic inflammation
How to Combat Skinny Fat
There are ways to prevent yourself from becoming skinny fat or to reverse the physical effects of being skinny fat.
- Limit the amount of cardio you do. Cardio exercises burn fat but they can also cause muscle loss when done to excess
- Change your diet. Cut out high-sugar fruits and refined carbs like white bread and pasta. Replace these foods with leafy vegetables, lean meat, fish, legumes, eggs and whole grain foods
- Cut back on your soda and alcohol consumption. These liquids contain many hidden sugars and carbs which will lead to fat gain, especially around the belly area
- Take up strength training exercises like squats, arm curls and lifting weights
- Make sure you get enough sleep and rest. A lack of sleep has been linked to weight gain so make sure to get plenty of shut eye if you want to avoid becoming skinny fat!
Feeling better about your health or fitness shouldn’t be a chore. If you ever need some extra support, come by BEFIT to speak with one of our trainers or simply fill out a Free Consultation Request by clicking the link and a fitness professional will reach out to you within 24 hours.
|
<urn:uuid:6f7f3ee8-70e3-4c19-8d75-a03e028ab110>
|
CC-MAIN-2023-40
|
https://befitkilleen.com/blogs/1154/1154/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510300.41/warc/CC-MAIN-20230927135227-20230927165227-00460.warc.gz
|
en
| 0.957534 | 957 | 2.734375 | 3 |
Today consumers can find outdoor furniture made from all kinds of materials. However, while traditional wood and metal materials are still used, many companies and manufacturers are moving towards more sustainable, cost-effective, and environmentally friendly options. One such material that is gaining in popularity is recycled HDPE.
HDPE, which stands for high-density polyethylene, is a type of plastic material that is used in a variety of products today. Most people are used to seeing it labeled as plastic #2 on things like milk jugs, water and juice bottles, shampoo bottles, and food storage containers, but it can also be used for sturdier products like outdoor furniture.
High-density polyethylene is capable of maintaining both rigid and soft forms, which is what makes it such a versatile material. It is also much easier to make and work with than other traditional materials. Furthermore, it has many additional benefits for both companies and consumers, the most important being that it is environmentally friendly. HDPE has extremely strong molecular bonds and it can be recycled numerous times without adversely affecting its characteristics.
Here are Five Reasons to Choose HDPE Furniture
1. HDPE Furniture is Environmentally Friendly
Plastic waste is a significant issue that contributes to pollution and overflowing landfills. Despite what many believe, not all plastics are recyclable. And even the ones that are still often end up getting dumped in landfills or natural environments. HDPE, however, is one of the most environmentally friendly plastics because it is recyclable and reusable. It also takes much less energy to recycle HDPE than to make other materials, which helps cut back on the use of fossil fuels.
2. Weather Resistant
One of the second-best reasons to choose recycled HDPE outdoor furniture is because it is weather resistant. Other materials like wood or metal react to the elements and can easily fade, crack, rust, and wear down over time. Wood is also susceptible to rotting, mold and mildew. HDPE, however, is a highly durable material that holds up much longer in extreme weather conditions. Furniture made from recycled HDPE can be used for decades outdoors and doesn’t require storage off-season.
In addition to being weather resistant, HDPE furniture is also strong and resistant to chemicals and fire. Again, other materials like wood, metal and concrete can break down over time when they come into contact with chemicals from cleaners, salt sprays from the ocean, and foods and liquids that are absorbed into the material. In contrast, recycled HDPE is non-porous and will not rust or degrade when exposed to these things and will maintain its structural integrity for years. It’s also fire retardant, meaning it will not easily catch fire and does not add fuel to the flames.
4. Easy to Maintain
As HDPE is highly durable and resistant to many substances, it is also very easy to clean and maintain. Other types of outdoor furniture materials may require yearly or seasonal maintenance, like stripping and repainting, sealing or staining. But HDPE products typically maintain their new look throughout their lifetime. For cleaning, all you need is a cloth or soft brush and a little soap and water to keep it looking brand new.
Another reason recycled HDPE furniture is an excellent choice is that it can be easily customized with plaques or engraving to advertise your company or honor someone special. And many products have 7 board colors and 3 frame colors, all nature-based, so you can get a product in a color scheme that fully represents you and your space.
The Polly Products Difference in HDPE Furniture
At Polly Products, we maintain the highest standards for ecological conservation in both our business practices and our product development. Our products are made of 100% recycled plastic and come in a variety of styles and colors. Furthermore, our products use zero formaldehyde, which can be found in other recycled plastic products, and we offer a 20-year warranty for both commercial and residential use that beats out most competitors.
Located in rural Michigan, we proudly supply environmentally responsible outdoor furniture, 100% made and assembled in the USA. Check out our website for more information about our line of products and how Polly Products is making a difference.
|
<urn:uuid:ba9e64ec-f6d3-4666-8156-a0d92a886b60>
|
CC-MAIN-2023-40
|
https://pollyproducts.com/five-reasons-to-choose-hdpe-furniture/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511106.1/warc/CC-MAIN-20231003124522-20231003154522-00274.warc.gz
|
en
| 0.961446 | 878 | 2.734375 | 3 |
German satellite expected to hit Earth on weekend
BERLIN (AP) — German scientists still don't know exactly when or where pieces of a defunct satellite hurtling toward the atmosphere will hit the Earth this weekend.
Andreas Schuetz, a spokesman for the German Aerospace Center, said Saturday the best estimate is that the ROSAT scientific research satellite will crash into the Earth sometime between late Saturday and Sunday up to 1200 GMT (8 a.m. EDT). An update is expected later Saturday.
Parts of the minivan-sized satellite will burn up during re-entry but up to 30 fragments weighing 1.87 tons (1.7 metric tons) could crash at speeds up to 280 mph (450 kph).
The satellite orbits every 90 minutes and it could hit Earth anywhere along its path — a vast swath that includes much of the planet outside the poles.
|
<urn:uuid:24bde231-53b7-403e-b544-8bd0aec256bb>
|
CC-MAIN-2014-41
|
http://cnsnews.com/news/article/german-satellite-expected-hit-earth-weekend
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657132646.40/warc/CC-MAIN-20140914011212-00030-ip-10-196-40-205.us-west-1.compute.internal.warc.gz
|
en
| 0.939098 | 176 | 2.53125 | 3 |
“The question is whether we humans are simply aÂÂÂÂn extrapolation of evolutionary trends, or if there is something truly new about our ÂÂspecies, Homo sapiens,” said Ian Tattersall, curator at the American Museum of Natural History, last Wednesday. Brought to campus by the Oakley Center, Tattersall delivered the Richmond Lecture titled “Becoming Human: Patterns of Innovation in Human Evolution.”
Tattersall is an expert in physical anthropology, specializing in the human fossil record, origins of human cognition, the study of ecology and the systematics of lemurs. Tattersall is the author of Human Origins: What Bones and Genomes Tell Us About Ourselves, The Monkey in the Mirror and Extinct Humans, among other books.
Throughout the lecture, Tattersall continually emphasized that hominid history, like that of all other successful primate history, has been one of diversity rather than a “linear grind to perfection.” As Tattersall explained, several different types of hominids have tended to coexist at any point in time, and the single species of Homo sapiens today is the “exception rather than the rule.”
Tattersall began the lecture by showcasing a number of paintings, starting with a “rather attractive” piece by the chimpanzee, Congo, followed by another painting by the elephant Ruby.
Tattersall next exhibited a work by the abstract expressionist Willem de Kooning, quipping that “humans haven’t come such an awfully long way in the last five or six million years.” Nonetheless, Tattersall remarked that the creative spark was the “distinguishing” element between Homo sapiens and other species, highlighting one theme of the lecture.
Walking down the evolutionary trail, Tattersall explained that fragmentary fossil records of the earliest creatures who were exclusively human ancestors and not those of both humans and apes date from seven to four million years ago. Found in Africa, these early human ancestors shared a common upright posture and bipedalism.
The first well-documented species, however, was Australopithecus afarensis, dating from 3.9 to 2.9 million years ago. Despite the bipedalism of Australopithecus afarensis, Tattersall remarked that there was “very little to indicate that early hominids were functionally human in any respect,” pointing to the ape-like proportions of their skulls and cognitive abilities comparable to those of today’s apes. In contrast, modern humans have smaller faces tucked under brain cases.
Continuing to the first recognizable member of the genus homo, Homo habilis, Tattersall discussed the crude stone tools possibly used by this “handy man.” In addition, Homo habilis had a slight enlargement of the brain relative to early bipedal species, although the brain size of Homo habilis still did not differ significantly from that of modern apes with comparable body sizes.
This led to Tattersall’s crucial point that behavioral innovations “do not tend to be associated with new kinds of hominid,” comparing new hominid behaviors to contemporary technological inventions created by individuals differing little physically from their parents.
Still, Tattersall acknowledged the “considerable insight” required to strike one cobble against another in order to detach a particularly-shaped flake.
At around 1.9 million years ago, a new species arose with body build and size comparable to that of modern humans, Homo ergaster.
While early bipedal apes were only three to four feet high, the Turkana boy skeleton discovered in northern Kenya had modern body proportions enabling him to top over six feet. Homo ergaster were long-limbed and slender, built for life far from the early forest habitats to live in the open savannas. Nonetheless, stone tools used by Homo ergaster differed little from those of Homo habilis.
From here, Tattersall discussed several other examples of early human species, including Homo erectus, Homo heidelbergensis and Homo neanderthalensis.
Finally, anatomically modern Homo sapiens arose in the Levant region 200,000 years ago. Within 10,000 years, modern Homo sapiens in the form of Cro-Magnon man had entirely replaced Neanderthals.
This, as Tattersall recalled, was the greatest shift in human cognitive history. “These people were us, possessed of sensibility totally unprecedented in hominid history, an entity with a restless appetite for change and complex symbolic activity,” he said. “What this shows is that Homo sapiens are not an extrapolation of earlier trends. We’re not a better version but something qualitatively different.”
In closing his talk, Tattersall briefly discussed the legacy of Charles Darwin and Alfred Russel Wallace. Darwin argued that the human brain was the product of a long accretionary evolutionary process. Wallace, on the other hand, favored chance acquisition. In fact, both were right in some way,
Tattersall concluded – our immediate ancestor must have possessed a brain that had evolved to the point where a single change or group of changes, such as the advent of language, could elicit radically new potential.
While the brains of the earliest humans looked exactly like modern humans for upwards of 50,000 years, the “potential lay fallow until discovered by a cultural stimulus,” Tattersall said.
|
<urn:uuid:eb185b71-3efe-4946-835e-6e5723b7dfce>
|
CC-MAIN-2017-43
|
http://williamsrecord.com/2009/01/20/curator-tattersall-explores-evolutionary-models-in/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824226.31/warc/CC-MAIN-20171020154441-20171020174441-00579.warc.gz
|
en
| 0.935117 | 1,165 | 3.09375 | 3 |
With the glitz and glam of the presidential election heating up for the final push to November, it is easy to forget that there will be more than one question to answer in the voting booth.
In addition to casting a vote for the next president, voters will need to elect representatives to Congress, and some will elect governors as well.
It’s easy to get distracted by the idea of the United States President, the head of state, the commander in chief and so many other roles. This person will receive much media attention and will be held personally accountable for much of the country’s actions for the next 4 years.
But if measurable change is the goal, voters should cast their attention away from the shining lights. The Senate and House are an important part of government that doesn’t receive as much attention during presidential election years.
Currently, both the Senate and the House are controlled by the Republican party. The Senate election poses the bigger threat to Republican control. 34 seats are up for re-election in the senate. To gain control, Democrats would need only to keep their ten seats that are up and gain five more.
Predicting the outcome of the House elections is a little more complicated, though. Republicans hold their largest majority in the House since 1928, according to ballotpedia.org. Democrats would need to gain 30 seats to take control.
It seems unlikely that this could happen, though, for a number of reasons. Primarily, incumbents tend to get re-elected to office and only 39 out of 435 incumbents are not seeking re-election.
Or at least that’s what traditional knowledge would tell us. While in previous years, the question of whether a large number of seats would move to another party could be easily answered, Americans’ attitudes toward Congress have changed in recent years.
For the longest time Gallup polls showed that Americans did not approve of Congress but did approve of their own Congressmen. In a 2015 Gallup poll, however, nearly half of respondents said their own representative was out of touch. Nearly a third said their own member was corrupt in the same poll.
Both of these were new records.
Perhaps this means that incumbents will have a harder time getting re-elected in November and that Democrats could have a better chance at taking over both the Senate and the House.
Either way, knowing the options one will be given in the voting booth in relation to all elections is important. House, Senate, and gubernatorial elections are difficult for mass media outlets to cover because of their specificity to each region. Voters must take active steps to educate themselves on these elections.
One resource available to those interested in seeing what and who will be on their ballot on Election Day is Ballotpedia’s Sample Ballot Lookup. This tool uses your home address to provide you with an interactive guide to your ballot, making researching candidates much easier.
Though they lack the Hollywood-esque attention and drama of the presidential election, it is crucial that voters pay attention to congressional elections. Changes in control of the House and Senate deeply affect how our country is run, and knowing who is on the ballot for these smaller elections gives voters another way to influence the future.
|
<urn:uuid:0198fbdd-99ef-4a32-afc3-5065c38c04e6>
|
CC-MAIN-2017-39
|
http://easttennessean.com/2016/09/15/house-and-senate-elections-are-an-important-way-for-voters-to-effect-change/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818690318.83/warc/CC-MAIN-20170925040422-20170925060422-00177.warc.gz
|
en
| 0.977629 | 656 | 2.65625 | 3 |
Changes in the Sun's brightness over the past millennium have had only a small effect on Earth's climate, according to a review of existing results and new calculations performed by researchers in the United States, Switzerland, and Germany.
In this image from an active solar period in March 2001, colors are shifted to highlight the contrast between sunspots (black and dark red) and the faculae that surround them (bright yellow). During the peak of the 11-year solar cycle, the expansion of faculae outweighs the darkening from increased sunspot activity. The result is a net increase in solar brightness. (Image courtesy of NASA)
The review, led by Peter Foukal (Heliophysics, Inc.), appears in the September 14 issue of Nature. Among the coauthors is Tom Wigley of the National Center for Atmospheric Research. NCAR's primary sponsor is the National Science Foundation.
"Our results imply that, over the past century, climate change due to human influences must far outweigh the effects of changes in the Sun's brightness," says Wigley.
Not that facts matter, but it does put the nit in nitwit.
|
<urn:uuid:4faa0168-e129-4275-8dd5-9c4202a793e5>
|
CC-MAIN-2017-39
|
http://www.crazyontap.com/topic.php?TopicId=10637&Posts=11
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818687333.74/warc/CC-MAIN-20170920161029-20170920181029-00255.warc.gz
|
en
| 0.943097 | 237 | 3.890625 | 4 |
Why doesn‘t my pH Sensor read pH 7 in distilled or deionized water?
About this FAQ
Created Apr 30, 2004
Updated Dec 28, 2012
Support by Product
pH electrodes will NOT give accurate pH values in distilled or deionized water. This is because distilled and deionized water do not have enough ions present for the electrode to function properly. The readings will drift and be essentially meaningless. pH buffers are the best solutions in which to test your pH electrodes. Tap water usually has enough ions present to allow a pH electrode to function properly. Because of this, tap water is a good short term (~24 hours) solution for storage.
Also, keep in mind that water (distilled, deionized, or tap) is NOT "pure" (i.e., pH equal to 7). The moment it comes in contact with air, CO2 gas begins dissolving into it, forming carbonic acid. The actual pH, therefore, will often be slightly less than 7.
If you need to accurately measure the pH of a very pure sample of water, the ionic strength of the water can be adjusted without changing the pH of the water. These pH Ionic Strength Adjusters (pHISA), can be purchased from Thermo Scientific, www.thermo.com.
|
<urn:uuid:65b19da8-cc19-4e20-b380-c906efa166b9>
|
CC-MAIN-2014-41
|
http://www.vernier.com/til/1286/
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657137145.1/warc/CC-MAIN-20140914011217-00178-ip-10-234-18-248.ec2.internal.warc.gz
|
en
| 0.918099 | 270 | 2.625 | 3 |
Lane Departure Warning Systems
- Basic Description
Lane departure warning systems monitor the position of the vehicle and warn the driver when the vehicle starts to drift out of its lane, unless the directional signal is in use or the vehicle speed is below a certain threshold. Unintentional lane departure can be caused by driver distraction, inattention, drowsiness, or even adverse weather conditions and can result in serious head-on collisions. According to the National Highway Traffic Safety Administration (NHTSA), 40-60% of all traffic accidents in the U.S. with determined causes are a direct or partial result of running off the road or inadvertently leaving the lane.
These systems generally employ a video sensor positioned above the rear view mirror that detects lane markings. The camera takes an image of the road ahead of the car during the day or within the headlight beams at night. This visual image is sent to an electronic control unit, where it is analyzed. The lane markings are identified and subsequent changes are recorded. If the vehicle is threatening to stray outside the limits of the lane, the system alerts the driver with an audible alarm and by vibrating the steering wheel or seat cushion. The system takes the vehicle's speed into account, providing a warning earlier when the vehicle is traveling at higher speeds, so the driver has adequate time to correct the steering before the lane markings are crossed.
Lane departure warning systems monitor the turn signal’s status and issue lane
departure warnings only when the driver does not use the vehicle’s turn signal in the
direction of the lane change. In the most advanced systems, if no action is taken by the driver
after the warning is given, a counter steering torque is applied to the steering wheel either by way of the electronic steering system or by applying braking force to a steerable road wheel of the vehicle causing the car to return to a safe position. These systems are sometimes referred to as Lane Keeping Assistance systems.
These systems can be found on a growing number of new cars, particularly high-end luxury models. There are also systems available that can be added to older cars, by means of an existing rear-facing camera, or by a unit that mounts to the dash or windshield. Applications for some smart phones allow them to be used as lane departure warning systems when the phone is placed in a dash-mounted holder. The phone uses its camera and software to determine if the car is drifting from a lane and issues an audible warning.
- Vehicle speed sensor, optical or infrared image sensor, turn signal sensor
- Audible warning alarm, visual indicator, steering wheel vibrator, electronic power steering, brakes
- Data Communications
- Communication with ECM: CAN bus
- Image sensor communication: AV IN*4
- Control Panel (LCD) communication: NTSC/I2C
- Aisin, Bendix, Bosch, Continental, Delphi, Denso, Hella, Mobileye, Takata, TRW, Valeo, Wabco
- For More Information
- Lane Departure Warning System, Wikipedia.
- Lane Departure Warning Systems (LDWS), FMCSA website, US Dept. of Transportation, July 2005.
- AutoVue, Lane Departure Warning System, Philip Reed, Edmunds.com, May 5, 2009.
- 2010 Prius Lane Assist Feature, YouTube, July 9, 2009
- Lane Detection on the iPhone, The University of Auckland, 2009.
- IIHS: Avoidance Systems Could Cut Fatal Crashes By One-Third, The Car Connection, May 25, 2010.
- Lane Departure Warning System, Mazda Australia website.
- Computer Vision System Toolbox: Lane Departure Warning System, MathWorks Inc.
- Lane Departure Warning Systems Go Mainstream: $14.3 Billion Market by 2016, ABI Research, Feb. 22, 2011.
- Volvo - Lane Departure Warning, YouTube, Sep. 21, 2012.
|
<urn:uuid:62ba447f-406b-4729-8edd-a912297c5ea6>
|
CC-MAIN-2013-48
|
http://www.cvel.clemson.edu/auto/systems/lane-departure-warning.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164010865/warc/CC-MAIN-20131204133330-00054-ip-10-33-133-15.ec2.internal.warc.gz
|
en
| 0.884792 | 834 | 2.546875 | 3 |
USE/CARE OF HANDTOOLS & MEASURING TOOLS - OD1621 - LESSON 2/TASK 1
USING A STRAP PIPE WRENCH.
jaw when looped around the pipe, gripping the pipe on the entire outer
circumference. It is used for rough pipework on very large diameter pipes.
(8) Torque Wrench. A torque wrench enables you to set up a nut or
bolt when the force applied to the handle reaches the specified limit.
Manufacturers' instructions specify these limits of turning force. Cylinder
head nuts and bolts, rod bearing cups, and other places on automotive and
airplane engines usually require torque wrench limits. Select a proper size
socket wrench and attach it to the torque wrench square drive. Place the
socket wrench on the work and pull the torque wrench handle in the desired
direction to tighten the work. The tightening torque will be indicated on
the dial or scale, depending on the type of torque wrench used.
(9) Spanner Wrenches. When using a pin-face spanner wrench (figure
29 on the following page), insert the pins or lugs into the pin holes of the
part. Keep the pin face of the wrench flush with the part surface and turn
the wrench. Exert enough force against the wrench so that the pins do not
jump out of the holes. Hose coupling spanner wrenches are shaped so that
they fit around the coupling with the pin or lug at right angles to the
Insert the pin in the hose coupling pin hole.
Pull or push the
handle in the direction opposite the hook of the spanner wrench.
certain the pin fits the hole and that the force is
|
<urn:uuid:5a2f00f2-8c63-4223-bf65-3bdc33f175c9>
|
CC-MAIN-2023-40
|
https://armyordnance.tpub.com/Od16218/Od162180051.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510100.47/warc/CC-MAIN-20230925215547-20230926005547-00464.warc.gz
|
en
| 0.825194 | 379 | 3.515625 | 4 |
The Apollo Missions for Kids
In 1961, President Kennedy issued a challenge: before the end of the decade, the United States would land a person on the moon and return him safely to Earth—a bold proclamation at the time given that only one US astronaut had ever been to space, for just 15 minutes. To answer President Kennedy’s call, NASA embarked on the Apollo missions: a complicated, dangerous, and expensive adventure involving 400,000 people. Before the missions were over, NASA astronauts had made eleven Apollo flights, six of which landed on the moon, and eight astronauts had lost their lives. The Apollo Missions for Kids tells the story of this pivotal era in space exploration from the perspective of those who lived it—the astronauts and their families, the controllers and engineers, and the technicians and politicians who made the impossible possible. The book includes a time line, resources for further study, and places to visit to see Apollo mission artifacts, along with 21 hands-on activities to better understand the missions and the science behind them. Kids will:•Determine what they would weigh on the moon•Learn to identify the moon’s features•Demonstrate orbital mechanics with a marble and a shallow bowl•Calculate how far away the moon is using sports equipment•Recreate the shape and size of the command module•Eat like an astronaut and make “space food”•Design a mission patch•And much more!
Published by: Chicago Review Press
Sorry, no posts matched your criteria.
|
<urn:uuid:470ef7ad-f741-4b56-810d-32b0bc1a35e7>
|
CC-MAIN-2023-14
|
https://www.cbcbooks.org/cbc_book/the-apollo-missions-for-kids/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296944996.49/warc/CC-MAIN-20230323034459-20230323064459-00027.warc.gz
|
en
| 0.939931 | 332 | 4.03125 | 4 |
Both dyslexia and dyspraxia are learning difficulties that can cause children and adults to struggle at school—so what’s the difference between them? In general, a key indicator of dyslexia is to do with literacy skills such as reading, writing and spelling. On the other hand, dyspraxia veers more toward movement and planning difficulties.
However, as both are terms used to describe a collection of symptoms that can vary greatly between individuals, perhaps a more important question is what do these two learning difficulties have in common.
For example, did you know that co-morbidity occurs for about half the people who are dyslexic (i.e. 53% of dyslexics are also dyspraxic (Stothard, Snowling, Bishop, Chipchase, & Kaplan 1998))? But let’s start with a proper definition of each, and then take a look at where they overlap.
What is dyspraxia?
The Dyspraxia Foundation defines dyspraxia as ‘ a form of developmental coordination disorder (DCD).’
Older readers may recognise the unfashionable term “clumsy child syndrome”.
Now it’s more appropriate to call it either Developmental Co-ordination Disorder or Dyspraxia. Dyspraxia impacts on motor coordination skills and can cause children and adults to perform movements poorly and out of order.
It is neurological and affects everything from preparing to organising and performing movements, sometimes extending into speech and memory ability. Dyspraxia can upset articulation of spoken language as well as thought process and perception.
Symptoms in young children may present as developmental delays, feeding and sleeping difficulties, high sensitivity to noise and a lack of interest in construction toys, including building blocks and Legos. Adults can lack hand-eye coordination, have poor balance and struggle to grasp small objects or perform daily grooming routines.
Compromised coordination greatly affects everyday activities for individuals with dyspraxia, causing difficulties in school activities like reading and writing, as well as recreational activities like riding a bike and driving a car.
Unfortunately, it often goes undiagnosed, upsetting an individual’s academic performance and career opportunities later in life. Learn more about how to help dyspraxic children in the classroom.
What is dyslexia?
There is some controversy about a definition of dyslexia, but in 2007 The British Dyslexia Association Management Board accepted the following: “a specific learning difficulty that mainly affects the development of literacy and language related skills.
It is likely to be present at birth and to be life-long in its effects. … It tends to be resistant to conventional teaching methods, but its effect can be mitigated by appropriately specific intervention, including the application of information technology and supportive counselling.” (BDA Management Board, 2007)”
Individuals with dyslexia struggle to process phonemes or sounds and can sometimes take longer to perform routine language tasks such as decoding in reading and spelling in writing. It can also impact on working memory.
Dyslexia is the most common of the Specific Learning Difficulties, affecting up to 10% of the population – 4% severely so. Other Specific Learning Difficulties include dyscalculia, slow processing speed, attention deficit disorder, attention deficit hyperactivity disorder and specific language impairment, all of which are usually hereditary.
What do dyslexia and dyspraxia have in common?
Dyslexic and dyspraxic children and adults tend to be holistic problem solvers and intuitive, creative thinkers. It’s important to note that neither affects intelligence. Nonetheless, they both impact on learning style, as organisation and memory are involved to varying degrees.
People who are dyslexic and dyspraxic thus find that learning often takes longer and is more tiring than for others without Specific Learning Difficulties.
Individual learners will benefit greatly from identifying their own relevant learning strategies. A unique learning style means that they may struggle to learn by traditional methods. This has resulted in some teaching practices and materials now being helpfully labelled “dyslexia friendly”.
A “dyslexia friendly” approach includes multi-sensory learning delivered in small incremental steps, at the learner’s own pace and with plenty of opportunities to repeat and to receive positive reinforcement. Everyone can learn from an approach that is “dyslexia friendly,” including children and adults with dyspraxia.
Particularly where dyslexia and dyspraxia have not been identified, frustration and failure in school are common and likely to affect self-esteem. Early recognition and appropriate interventions help learners to reach their potential in these cases.
Short-term memory is sometimes involved, hence the need for repetition – it may be that the student needs to “overlearn” to be successful.
Individuals with dyslexia and dyspraxia can have good days and bad days and both children and adults often show a discrepancy between their oral ability and their written work. This can lead to them being unfairly labelled as not trying or lazy or uncooperative where a specific learning difficulty has not been recognised.
Written work may also be poorly presented. They may have difficulty copying from the board. Students who struggle to write things down may always struggle with writing.
Learning to touch-type so that writing becomes automatic, and applying this skill to note taking and preparing assignments by computer, can be extremely helpful. Did you know that high school students with specific learning difficulties who can type faster than they write may be permitted to use laptops in GCSE exams?
Helpful interventions for improved literacy and writing
The dyslexia and dyspraxia-friendly Touch-type Read and Spell course helps students develop and improve literacy skills and self-esteem by teaching touch-typing in a unique way, so that their writing can become automatic.
A study conducted by Nottingham Dyslexia Association, which involved both dyslexic and dyspraxic students, found the following: “Observing the fidgety somewhat clumsy, often impulsive learners who tumble into the programme crashing about on the keyboard and jumping up to take breaks (the kinaesthetic learners) is interesting.
They are the fiddlers in the classroom whose legs tap the chair or who doodle on books. Once they understand the programme and ‘feel’ their way through the first three weeks, calm descends. These tactile learners show impressive touch-typing skills and increased concentration.
Of all the students these reap the most rewards both parental admiration and self-esteem. Perhaps sitting still, paying attention, concentrating and achieving are new experiences.” --Initial observations on TTRS, Vanessa Charter for Nottinghamshire Dyslexia Association Trustees
TTRS is appropriate for users of all ages.
Do you have anything to add? Leave us a comment and join the discussion!
Stothard, S., Snowling, M., Bishop, D., Chipchase, B., & Kaplan, C. (1998). Language impaired preschoolers: A follow-up into adolescence. Journal of Speech, Language and Hearing Research, 41(2), 407-418.
|
<urn:uuid:872297b1-a6b1-462f-b69c-ec9388e218ea>
|
CC-MAIN-2020-16
|
https://www.readandspell.com/difference-between-dyslexia-and-dyspraxia
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370505730.14/warc/CC-MAIN-20200401100029-20200401130029-00236.warc.gz
|
en
| 0.953449 | 1,507 | 3.484375 | 3 |
In class each day, Skye learned about Mother Katharine, courtesy of Sister Marie Celine Enright, an Irish-born Sister of the Blessed Sacrament. Sister Marie Celine had regaled her Native American students with stories about the Philadelphia heiress and how she had devoted her life and her multimillion-dollar fortune to educating and seeking justice for Indians and African-Americans.
Sister Marie Celine told her teenagers about the woman in the “black robe” who had befriended Sioux Chief Red Cloud, about the slight but energetic nun who had overcome the hostility and indifference of society and the Church to establish an amazing network of schools, churches and missions specifically for blacks and Native Americans, about the zealous visionary who was almost a century before her time in demanding civil rights for all.
“I knew all about her through Sister Celine,” says Skye, who in 1957 became the first Native American graduate of Xavier University in New Orleans, there on a special scholarship secured by Sister Marie Celine. Xavier University is the only Catholic institution of higher learning established exclusively for African-Americans in the Western Hemisphere and the crowning jewel of Saint Katharine’s educational system. “Sister Marie Celine told us she was a millionairess, the daughter of an investment banker named Francis Drexel. I was very impressed because she was somebody who could do anything or be anything, and she gave it all up to work with minorities.”
Sister Marie Celine, now 80 and doing community work at Saint Agatha Parish in Los Angeles, says she had hoped to motivate her students by telling them inspirational stories about Mother Katharine.
“I knew if they went back to the reservation that would be the end of it,” Sister Marie Celine says. “I would tell them that Mother Katharine knew they could do the work and that they should be proud of themselves. The blacks and Native American people were her pride and joy, but they had never had a chance.”
And now, the woman who many believe started the Catholic Church in America on the road toward racial integration belongs to the world. On October 1, Pope John Paul II will canonize Blessed Katharine in St. Peter’s Square, making her only the second American-born saint. (Saint Elizabeth Ann Seton was the first in 1975.)
Katharine Drexel, whose cause for sainthood began in 1964 and who was declared blessed by Pope John Paul II in 1988, cleared the final hurdle to sainthood last January when the pope decreed that two-year-old Amy Wall had been miraculously healed of nerve deafness in both ears through Katharine’s intercession in 1994. It was the second miracle credited to her intercession. In 1988, the Vatican had concluded that Robert Gutherman was miraculously cured of deafness in 1974 after his family prayed for her intercession.
Skye, one among the hundreds of thousands of lives touched by Katharine and her sisters, floods with emotion when asked what her canonization means to him. “It just overwhelms me,” Skye says, pausing to find the right words. “I get full inside when I think about it. I can’t even talk about it.”
An Immense Fortune
Katharine Drexel’s story is rich, overflowing and, quite frankly, mind- boggling. Her story goes far beyond the millions of dollars she invested in establishing and supporting 65 schools, churches and centers in 21 states through her religious order, the Sisters of the Blessed Sacrament. But in an age in which Americans obsess over million-dollar game shows, Powerball lotteries and the stock market, the money Katharine Drexel gave away is a powerful and countercultural sign that, indeed, she was someone on a very different, spiritual mission.
Consider this: When her father, Francis Drexel, died in 1885, the high-powered banker left behind a $15.5 million estate that was divided among his three daughters—Elizabeth, Catherine (Katharine’s birth name) and Louise. About $1.5 million went to several charities, leaving the girls to share in the income produced by $14 million—about $1,000 a day for each woman. In current dollars, the estate would be worth about $250 million.
Over the course of 60 years—up to her death in 1955 at age 96—Mother Katharine spent about $20 million in support of her work, building schools and churches and paying the salaries of teachers in rural schools for blacks and Indians. Louise Drexel Morell, her younger sister, contributed millions more to similar causes. Elizabeth, the eldest sister, died in 1890 in premature childbirth, one year before Catherine formed the Sisters of the Blessed Sacrament for Indians and Negroes, in Bensalem, Pennsylvania, just outside Philadelphia.
Francis Drexel crafted his will carefully. His daughters controlled the income from the estate, and upon their deaths, the Drexel inheritance would flow to their children. Drexel did this to prevent his unmarried daughters from falling prey to “fortune hunters.” Neither Elizabeth nor Louise, however, had children, and the will stipulated that if that were to happen, upon his daughters’ deaths, the money would be distributed to several religious orders and charities—the Society of Jesus, the Christian Brothers, the Religious of the Sacred Heart, a Lutheran hospital and others.
Drexel, of course, had no way of knowing that his “Kate” would enter religious life in 1889 and two years later found her order. Thus, after 1955, the Sisters of the Blessed Sacrament no longer had the Drexel fortune available to support their ministries. Dr. Norman Francis, president of Xavier University in New Orleans, considers Mother Katharine’s longevity, especially in light of a serious heart attack she suffered in 1935, to be another miracle.
“There were any number of miracles that the Lord provided through her, and we’ve always called Xavier a miracle,” says Francis, whose university sends more African-American graduates to medical school than any other university in the country. “Xavier is a miracle not just for all that it has done but for the mere fact that it has survived and thrived. Under normal circumstances, that shouldn’t have been the case. If she had died at the normal age of 70, which at the time would have been a big age, Xavier would have struggled. [But] God allowed her to live until she was 96, and we had that interest available for many more years. It’s still a struggle every day, but people know we have a meaning.”
‘Why Not Be a Missionary Yourself?’
Many believe Kate’s stepmother, Emma Bouvier, planted the seeds for her religious vocation. Drexel married Bouvier a few years after the death of his first wife, Hannah, who had died after giving birth to Kate in 1858. Twice a week, the Drexels distributed food, clothing and rent assistance from their family home at 1503 Walnut Street in Philadelphia. When widows or lonely single women were too proud to come to the Drexels for assistance, the family sought them out, but always quietly. As Emma Drexel taught her daughters, “Kindness may be unkind if it leaves a sting behind.”
Kate made her social debut in Philadelphia in 1879, but her stepmother contracted cancer a short time later. Kate nursed her for the final three years of her life and came to realize that not even the Drexels’ immense fortune could do anything to prevent Emma’s death. Kate began to consider a religious vocation.
Her family’s wealth also allowed Kate a firsthand opportunity to travel and see the disgraceful treatment of Native Americans. In 1868 a federal treaty had promised the Indians one teacher and one classroom for every 30 children of school age. Like so many other treaties, it was a hollow promise. In a trip with her father to the U.S. northwest territories in 1884, Kate saw Indians living in squalor and despair. After her father’s death in 1885, she and her sisters contributed money to help the St. Francis Mission on South Dakota’s Rosebud Reservation.
For many years Kate took spiritual direction from a longtime family friend, Father James O’Connor, a Philadelphia priest who later was appointed vicar apostolic of Nebraska. When Kate wrote him of her desire to join a contemplative order, Bishop O’Connor suggested, “Wait a while longer. Wait and pray.”
Kate still was reeling from the death of her father when she and her sisters went to Europe in 1886, with the hope of her regaining some physical vigor. The vacation climaxed in Rome in January 1887 when Pope Leo XIII received the Drexel sisters in a private audience. Kate told the pope about her inward pull toward the contemplative life, but she also described the plight of the Indians in North America.
“It has seemed to me more than once, Your Holiness, that I ought to aid them by my personal work among them as well, and if I enter an enclosed congregation, I might be abandoning those whom God wants me to help,” she told the pope. “Perhaps Your Holiness will designate a congregation that would give all its time and effort to the Indian missions.”
Pope Leo XIII replied with a question: “But why not be a missionary yourself, my child?”
Reaching the anteroom after the meeting, Kate broke down in tears, knowing she no longer had to wait. Bishop O’Connor counseled her to start her own order to work among Native Americans and African-Americans because if she were to join an existing order, she “may be assigned to other work, and that must not happen.”
Kate’s uncle, Anthony Drexel, tried to dissuade her from entering religious life, pleading with her to “stay with us who love you.” But she had made up her mind. She arrived at the Sisters of Mercy Convent in Pittsburgh in May 1889 to begin her six-month postulancy.
Decision Shocks Philadelphia
Her decision rocked Philadelphia social circles.The Philadelphia Public Ledger carried a banner headline: “Miss Drexel Enters a Catholic Convent—Gives Up Seven Million.”
A reporter seeking an interview showed up at the Mercy convent the day after she entered. Word was sent downstairs—there really was no news to report.
In November 1889, Kate took the religious name Sister Mary Katharine upon the suggestion of the superior general of Mercy Sisters. She professed her vows to Philadelphia Archbishop Patrick Ryan, who had become another important spiritual adviser. In addition to the vows of poverty, chastity and obedience, she added a fourth: “To be the mother and servant of the Indian and Negro races.”
In his homily, Archbishop Ryan asked if Sister Katharine’s desire for religious life required ambition. “Yes, in a way,” Ryan said, answering his own question. “Ambition to work among the poor and neglected, to work in obscurity. An even truer answer is that God calls some souls to a higher life than others. How beautiful the mission of this child who comes to devote her life, her heart, her future, to the suffering races, as when Jesus said to the rich young man, ‘Sell all thou hast and give it to the poor, and follow me.’”
Fighting Vicious Racial Prejudice
Sister Katharine pronounced final vows on February 12, 1891, and a few months later, Archbishop Ryan blessed the cornerstone of the new motherhouse under construction in Bensalem. In the first of many incidents that indicated her convictions for social justice were not shared by others, a stick of dynamite was discovered near the site.
The Sisters of the Blessed Sacrament were founded 28 years after the Emancipation Proclamation which freed the slaves, but the reality of a good life for blacks in the South was bleak. The country was still 70 years away from any widespread notion of civil rights. In 1913, the Georgia Legislature, hoping to stop the Blessed Sacrament Sisters from teaching at a Macon school, tried to pass a law that would have prohibited white teachers from teaching black students. In 1915, when Mother Katharine purchased an abandoned university building to open Xavier Preparatory School in New Orleans, vandals smashed every window.
In 1922 in Beaumont, Texas, a sign was posted by local Klansmen on the door of a church where the Sisters of the Blessed Sacrament had opened a school. “We want an end of services here,” the note read. “We will not stand by while white priests consort with nigger wenches in the face of our families. Suppress it in one week or flogging with tar and feathers will follow.” A few days later, a violent thunderstorm ripped through Beaumont, destroying a building that served as the Klan’s headquarters.
In the late 1920s, when Mother Katharine found property in New Orleans for expanding Xavier University, she used a third party as a purchasing agent to keep the transaction from falling through. When the handsome campus was dedicated in October 1932, a priest gazed upon the expensive Indiana limestone buildings and remarked in Latin: “What a waste!”
Blessed Katharine never heard the remark. The woman who had spent $656,000 for the land and new buildings watched the dedication ceremony from a third-floor window, far away from the dignitaries’ platform.
“She was so selfless and so sacrificing and so considerate,” says Sister of the Blessed Sacrament Ruth Catherine Spain, who helped document her cause for canonization. “Way back in 1891, she was a pioneer for the most downtrodden and the poorest of the poor. She didn’t have a prejudiced molecule in her body, never mind a bone. She believed that everyone was a child of God.”
In Charlotte, North Carolina, Blessed Katharine contributed $4,000 to finish construction of two churches with the stipulation that several rows of pews be set aside for use by black parishioners. In Wilmington, she funded construction of a new St. Mary Church, which was to replace an old church and be used by both blacks and whites. But when a priest, a transplant from Blessed Katharine’s home state of Pennsylvania, objected to the plan, African-Americans got the old church and whites the new one.
“It’s just painful to see things like that and to see a priest so involved,” says Benedictine Father Paschal Baumann, archivist at Belmont Abbey in North Carolina. “We do Katharine Drexel a disservice if we view her only in terms of her money. She had a real social policy to go with it. She was working for the advancement of integration, and she made that so clearly a mission of the Church, not just a social policy. When Rome is determining who should be recognized as a saint, it looks not only at sanctity but at heroic sanctity. It’s going that extra mile, and that is certainly evident in her life. It’s just magnificent to have her recognized by the Church. It’s such a tribute to all progressive thinkers in issues of social justice.
“I wonder sometimes what America and what the Catholic Church might have been in respect to minorities had she not come along,” added Francis, who hopes to build a $6.3 million Saint Katharine Drexel Religious Center at Xavier in her honor. “She saved the Church from embarrassment in terms of social justice.”
Frugal and Savvy
Even though she was raised in opulence, Blessed Katharine took seriously her vow of poverty. She used pencils until they were nubs, wrote return correspondence on the blank side of the letters she received and opened up the flaps of envelopes for notepaper. When her shoelaces snapped, she sewed them back together rather than buy a new pair. She frequently encountered the ire of train conductors on her many visits to her schools and missions because she spent as much time as possible in the day coach, which was a cheaper fare, before retiring for a few hours in the sleeper car. The savings were used to increase her tips to the black porters.
After surviving a heart attack in 1935, Blessed Katharine refused to purchase a wheelchair. Instead, she was reluctantly persuaded to allow workers to affix wheels on a wooden chair from the motherhouse’s auditorium.
Her charitable ways so impressed Congress in the 1920s that she successfully lobbied for an amendment to the federal tax code that would allow an organization that gave at least 90 percent of its income to charity an exemption from income taxes. In 1923 alone, she had trust income of $217,426.98 and was forced to pay $74,390.32 in taxes, a 34-percent bite. The law became known as “The Philadelphia Nun Loophole.”
Forty-five years later, Senator Russell B. Long (D-La.), the powerful chairman of the Senate Finance Committee, bemoaned the amendment because it allowed big corporations to shield income with creative accounting methods. “I can tell you one thing,” Long said. “If this Philadelphia nun knew all the trouble she’s caused us, I’m sure she’d be sorry.”
Her Legacy Lives On
Whatever headaches she may have caused lawmakers, Blessed Katharine changed lives, one at a time. Knowing that rural schools for blacks in south Louisiana needed qualified teachers to survive, she trained men and women at Xavier for education degrees and then convinced their parents to allow them to leave home to teach. Bertha Thomas Antonio, one of the first graduates to respond to the call for teachers, told Sister of the Blessed Sacrament Patricia Lynch that her mother said, “If we won’t help our own people, who will?” Mrs. Thomas sent three daughters to teach in the rural schools.
Katharine Drexel’s legacy lives through the children whose lives she has touched directly and through her sisters.
Her order, the Sisters of the Blessed Sacrament, today has 245 members who are pursuing their original apostolate of working with African-Americans and Native Americans in 21 states and Haiti, the poorest country in the Western Hemisphere.
“It humbles you to hear how many professional men and women say, ‘I am where I am today because of what the Sisters of the Blessed Sacrament did for me,’” says Sister Beatrice Jeffries, vice president of the congregation. “There is a wonderful statement in the motherhouse chapel: ‘I look up and wonder at all of God’s wonderful ways and I think to myself, What would happen to a desire that God implants on the heart if we listen and act on that desire?’ That colors everything we do.
“She’s beyond us now,” Sister Beatrice adds. “She belongs to the Church. We can’t hold on to her. She belongs to all of us.”
Her legacy lives through Joseph Skye, the “immature kid” who remembers walking across the Xavier campus “and looking at the beautiful buildings and saying to myself, ‘I’m going to make it, I’m going to make it.’
“I wanted to get away from a government-subsidized existence,” Skye says. “I wanted to be in a free market where you could go as far as you can based on competition. Like my real-estate logo says today, ‘The Skye’s the limit.’” In a loving tribute to his former teacher, Sister Marie Celine, Skye is helping to pay her way to Rome for the canonization.
Katharine’s legacy lives through once-deaf Amy Wall, now seven, who just made her First Communion and heard the priest say, “The Body of Christ.”
Sister Ruth Catherine says, “Amy’s mother asked her one night, ‘Why do you think God healed you?’ And Amy said, ‘Because God loves me and I love him.’ What more could you ask for? Love is the be-all and end-all of life. If everybody loved, how different the world would be.”
Peter Finney Jr., is the editor and general manager of the Clarion Herald, the Catholic newspaper of the Archdiocese of New Orleans.
|
<urn:uuid:3d658d49-0109-4936-a139-6836c4f155a4>
|
CC-MAIN-2020-16
|
https://www.franciscanmedia.org/the-legacy-of-saint-katherine-drexel/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370515113.54/warc/CC-MAIN-20200403154746-20200403184746-00209.warc.gz
|
en
| 0.974077 | 4,383 | 2.65625 | 3 |
Green technology accelerates global warming
It seems like an environmental no-brainer. As populations increase, cities grow, and water supplies grow ever scarcer in the world's drier regions, more and more municipalities are tending to recycle wastewater after treatment in sewage works to irrigate parks and other green urban space. What could be wrong with that? Well, quite a lot, actually, according to a new study, which concludes it could increase global warming.
The research, published in the current issue of the Journal of Environmental Quality concludes that the practice emits three times as much nitrous oxide – a greenhouse gas about 300 times more potent than carbon dioxide – as treating the sewage-laden water and discharging it to a river or the sea in the usual way. What is more – the scientists from the Universities of Cincinnati and California, Irvine, calculated the practice is so common in the region around Los Angeles that it emits at least a thousand times as much of the gas in the area than agriculture, the usual source of the pollution.
Yet Prof Amy Townsend-Small, who led the research, still supports the practice – sometimes dubbed “showers to flowers” because of its importance in eking out water supplies in Southern California. She also points out that drinking water has to be brought long distances to the area, which requires energy and thus gives rise to emissions of carbon dioxide.
Add the fact that climate change is likely to reduce rainfall in the area and thus make water in even shorter supply – thus increasing the need for recycling – and it becomes clear just how complicated an apparently straightforward environmental issue can be.
Success in saving the ozone layer deluded negotiators on global warming
September 12th, 2014 12:46
Is giving up meat one day a week the way to save the world?
September 9th, 2014 12:05
Can we stomach the unpalatable truth about organised crime tampering with our food?
September 8th, 2014 9:01
Will the tide ever come in at Britain's depressed seaside resorts?
August 17th, 2014 12:33
Both extreme hot and extreme cold weather is likely to be caused by global warming, say scientists
August 14th, 2014 9:41
|
<urn:uuid:6e883bda-10a0-4c94-a34d-5001275aebde>
|
CC-MAIN-2014-41
|
http://blogs.telegraph.co.uk/news/geoffreylean/100102704/green-technology-accelerates-global-warming/
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657132495.49/warc/CC-MAIN-20140914011212-00303-ip-10-196-40-205.us-west-1.compute.internal.warc.gz
|
en
| 0.942805 | 450 | 3.171875 | 3 |
|Category||beryl mineral variety|
|Color||transparent (or can be translucent if included), greenish blue to blue green, typically light in tone|
|Cleavage||very difficult in one direction, almost never seen|
|Mohs Scale hardness||7.5-8|
|Luster||vitreous to resinous|
|Refractive index||1.577 - 1.583 (+/- .017)|
|Optical Properties||Double refractive, uniaxial negative|
|Birefringence||.005 - .009|
|Pleochroism||weak to moderate, blue and greenish blue; or different tones of blue with lighter tones associated with the optic axis direction|
|Specific gravity||2.72 (+.18, -.05)|
Aquamarine (Lat. aqua marina, "water of the sea") is a gemstone-quality transparent variety of beryl, having a delicate blue or turquoise color, suggestive of the tint of seawater. It is closely related to the emerald. Colors vary—yellow beryl, called heliodor; rose pink beryl, known as morganite; and white beryl, called goshenite, are known.
This mineral occurs at most localities that yield ordinary beryl, some of the finest coming from Russia. The gem-gravel placer deposits of Sri Lanka contain aquamarine. Clear yellow beryl, such as occurs in Brazil, is sometimes called aquamarine chrysolite. When corundum presents the bluish tint of typical aquamarine, it is often called "oriental aquamarine."
In Brazil, there are mines in the states of Minas Gerais, Espírito Santo, and Bahia. Attractive aquamarine stones are also produced by Zambia, Madagascar, Malawi, Tanzania, and Kenya.
The biggest aquamarine ever mined was found at the city of Marambaia, Minas Gerais, Brazil, in 1910. It weighed over 110 kg, and its dimensions were 48.5 cm long and 42 cm in diameter.
Aquamarine is a type of beryl with a hexagonal crystal structure and a chemical formula of Be3Al2Si6O18, a beryllium aluminum silicate mineral. It has a specific gravity of 2.68 to 2.74 and a Mohs hardness from 7.5 to 8. Aquamarine, typically, is on the low end of the specific gravity range, normally at less than 2.7. The pink variety exhibits a high specific gravity of around 2.8. Refractive indices ranging around 1.57 to 1.58.
Much of today's aquamarine is heated to give it a better color blue. The deeper the blue color, the more valuable the gem is considered.
Cultural and historical/mythical usage
- Aquamarine is the birthstone associated with March. It is also the gemstone for the 19th Anniversary.
- Ancient sailors traveled with aquamarine crystals, believing that it would ensure a safe passage, and often slept with the stones under their pillow to ensure sound sleep. They believed the siren’s (mermaid) fish-like lower body was made of aquamarine.
Aquamarine is also the name for a color, which is a shade between green and blue.
- Farndon, John. 2006. The Practical Encyclopedia of Rocks & Minerals: How to Find, Identify, Collect and Maintain the World's best Specimens. Lorenz Books. ISBN 0754815412
- Hurlbut, Cornelius S. and Klein, Cornelis. 1985. Manual of Mineralogy, 20th ed. New York: John Wiley and Sons. ISBN 0-471-80580-7
- Pellant, Chris. 2002. Smithsonian Handbooks: Rocks and Minerals. New York: DK Adult. ISBN 0789491060
- Shaffer, Paul R., Herbert S. Zim, and Raymond Perlman. 2001. Rocks, Gems and Minerals. St. Martin's Press, Golden Guide. ISBN 1582381321
- Weinstein, Michael. 1967. The World of Jewel Stones. New York: Sheridan House.
All links retrieved October 25, 2012.
- Aquamarine "Gem by Gem" series. International Colored Gemstone Association.
- "Flawless Aquamarine: March Birthstone" Diamond Bug.
New World Encyclopedia writers and editors rewrote and completed the Wikipedia article in accordance with New World Encyclopedia standards. This article abides by terms of the Creative Commons CC-by-sa 3.0 License (CC-by-sa), which may be used and disseminated with proper attribution. Credit is due under the terms of this license that can reference both the New World Encyclopedia contributors and the selfless volunteer contributors of the Wikimedia Foundation. To cite this article click here for a list of acceptable citing formats.The history of earlier contributions by wikipedians is accessible to researchers here:
Note: Some restrictions may apply to use of individual images which are separately licensed.
|
<urn:uuid:2d1bcab6-4afc-4f5e-b4a2-e90b09e5238a>
|
CC-MAIN-2014-23
|
http://www.newworldencyclopedia.org/entry/Aquamarine
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510273012.22/warc/CC-MAIN-20140728011753-00283-ip-10-146-231-18.ec2.internal.warc.gz
|
en
| 0.82769 | 1,082 | 2.90625 | 3 |
Reaching the Summit: Mountains and Nonfiction Text Features (Right Side)
Lesson 6 of 11
Objective: SWBAT identify nonfiction text features as well as explain how the features help them understand nonfiction texts.
Base Camp: Content Review
When students enter the room, we have a quick review game with white boards and dry erase markers. My students love this game and it's provides a nice formative assessment to see what they remember from the day before.
I call this "Whiteboard Review". I call out a question from the question sheet (included in the resource section). Students write their answer and no one shows their answer until I call for it. A quick scan around the room and I can see who knows what.
After 10 minutes or so, I tell students that today they are going to complete their right side activity- a flip book.
I pass out the necessary pages for the flip book. At this time, I also show my Interactive Notebook under the Elmo for modeling. Students will need to cut the first page in half and trim the last page down to the same size (half page). They will need to entirely glue down the last page and only glue the tops of the other two pages so that they flip and the last page stays glued in book.
I allow students to work together to complete their flip book using their social studies text. As in the Left Side Activity, any text will do. After students complete their flip books, we get ready to share.
This is an excellent time to work with a small group of students who showed through the whiteboard review that they need some extra support. Sit with those students while they complete their flip book to provide support and answer question.
After students have finished or are close to finishing, we clean up and begin to share. Relying on the random name generator, I choose one student for each nonfiction text feature. I instruct all other students to turn to the page and give a thumbs up if the student is correct or a thumbs down if they were incorrect. We also discuss how each nonfiction text feature helps us understand that page.
|
<urn:uuid:13d00a6c-7e8a-4e8d-9cdd-6e8a164f181a>
|
CC-MAIN-2017-47
|
https://betterlesson.com/lesson/resource/2379306/white-board-review-pdf
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934804518.38/warc/CC-MAIN-20171118021803-20171118041803-00143.warc.gz
|
en
| 0.949111 | 436 | 3.765625 | 4 |
What is Tribomechanical activation
Tribomechanical activation or (T.M.A.) was first realised in Russia almost 60 years ago and was further researched, refined and patented in 1998 by Tihomir Lelas in Geneva.
The process was specifically designed with the purpose of dynamically fine milling and micronizing materials into very small particles, both organic (whey protein concentrates, “W.P.C.”) and inorganic (zeolites).
T.M.A. is carried out by using two opposing rotors with specially designed blades, blasting particles against each other under atmospheric conditions. These blades rotate at speeds varying from 10,000 to 22,000 rpm. The particles collide with each other at intervals less than 0.001s thus breaking them down into ever smaller particles ranging from 1 to 25 μm and even within the sphere of nano dimensions. This increases the active surface of the particles significantly whilst maintaining the atomic structure.
Download: TMA Study
|
<urn:uuid:70d379ae-0dd9-489d-9448-f19d7e327bdf>
|
CC-MAIN-2020-16
|
http://www.vmwa.com.au/technology/t-m-a/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370497042.33/warc/CC-MAIN-20200330120036-20200330150036-00513.warc.gz
|
en
| 0.942158 | 209 | 2.765625 | 3 |
Here's something you never want to find in a bag of potato crisps - a Zebra chip - identifiable by its striped appearance when cooked and unsavoury flavour.
Just one 15-minute session at the Tasmania Institute of Agriculture Scienc (TIA) Showcase today will have you up to speed with the latest research into the bacteria that causes the undesirable Zebra effect, and what is being done to keep its host, the tomato potato psyllid, from infiltrating local crops.
This emerging threat to the Tasmanian potato industry is the topic chosen by TIA Research Fellow Dr Robert Tegg to present at the Science Showcase, taking place on Tuesday, August 14, at the Tramsheds, Inveresk, in Launceston.
There are another 14 interesting topics, from improving the quality of pinot noir to assessing the capacity of farmers to adapt to climate change, that will be publicly presented as a sample of the wide range of research, industry development, extension and education that TIA is undertaking.
More than 100 people attended this event last year, and once again a large turnout, including producers, agronomists, industry representatives and university staff and students, is expected.
Dr Tegg said that he'll be talking about the danger posed by importing potatoes from NZ and what New Zealand's control measures are; about the importance of maintaining tight quarantine measures in Australia; and whether there's any chance our native psyllids are capable of carrying the Zebra chip bacteria.
"We have a monitoring project on Australia's East Coast, which is basically yellow sticky traps on a stick in various potato fields, that are designed to catch tomato potato psyllid if they blow in on winds from New Zealand so that we know when it arrives," Dr Tegg said.
"We are trying to make sure that the pest, which has caused crop losses of 10 to 40 per cent in New Zealand, stays away for as long as possible, giving TIA the best possible chance to develop ways to combat it and protect our potato industry."
The TIA Science Showcase is part of National Science Week (August 11-19) activities which includes visiting guest speakers, science shows, workshops and tours.
For more information on the TIA Science Showcase
Contact TIA Communications and Marketing Manager Liam Gash on +61 3 6226 6339, or email Liam.Gash@utas.edu.au
Download the programs
Authorised by the Executive Director, Student Centre
14 August, 2012
|
<urn:uuid:ea5ae9c4-baed-45c6-93de-bf59af4cf2cd>
|
CC-MAIN-2014-15
|
http://www.utas.edu.au/students/news/student-news/science-showcase-talks-wine,-milk-and-zebra-chips
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223207046.13/warc/CC-MAIN-20140423032007-00288-ip-10-147-4-33.ec2.internal.warc.gz
|
en
| 0.941497 | 518 | 2.796875 | 3 |
Qlip laboratory in the Netherlands that deals with quality assurance of dairy products, has developed a new grazing indicator. This indicator uses big data to determine whether milk was produced by cows that graze on pasture.
The grazing indicator weights the probability that milk was produced by cows that grazed fresh grass on pasture. "The composition of milk is affected by what a cow eats, making it possible to see whether they were fed fresh grazed grass or other feed such as grass or corn silage. The grazing indicator provides a new method for monitoring and safeguarding sufficient grazing", as stated on the website of Food Valley NL in the Netherlands.
The spectra and computational models underlying this indicator are also being used to develop other valuable indicators. Based on big milk data, Qlip is developing models and indicators to determine animal health and welfare, as well as sustainability.
These indicators could detect a range of characteristics at herd or individual cow level including metabolic disorders like ketosis and ruminal acidosis in dairy cattle, and measure important environmental factors like methane emissions. These data can be used to support dairy farmers in the management of their businesses, dairy herd improvement programs in the breeding of better cows, and the dairy industry in the improvement and assurance of product quality.
To comment, register here
Or register to be able to comment.
|
<urn:uuid:95969c70-3d10-4caf-8529-b671362de149>
|
CC-MAIN-2020-16
|
https://www.dairyglobal.net/Articles/General/2016/3/Grazing-indicator-launched-2780636W/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370506673.7/warc/CC-MAIN-20200402045741-20200402075741-00486.warc.gz
|
en
| 0.963061 | 266 | 3.140625 | 3 |
The easiest way to take the sum of a filtered range in Excel is to use the following syntax:
Note that the value 109 is a shortcut for taking the sum of a filtered range of rows.
The following example shows how to use this function in practice.
Example: Sum Filtered Rows in Excel
Suppose we have the following dataset that contains information about various basketball teams:
Next, let’s filter the data to only show the players on the Mavs or the Warriors.
To do so, highlight the cell range A1:B10. Then click the Data tab along the top ribbon and click the Filter button.
Then click the dropdown arrow next to Team and then uncheck the box next to Celtics, then click OK:
The data will automatically be filtered to remove rows with “Celtics” as the team:
If we attempt to use the SUM() function to sum the points column of the filtered rows, it will actually return the sum of all of the original values:
Instead, we can use the SUBTOTAL() function:
This function takes the sum of only the visible rows.
We can manually verify this by taking the sum of the visible rows:
Sum of Points in Visible Rows: 99 + 94 + 93 + 104 + 109 + 84 = 583.
The following tutorials explain how to perform other common operations in Excel:
How to Delete Filtered Rows in Excel
How to Count Filtered Rows in Excel
How to Calculate the Sum by Group in Excel
How to Count by Group in Excel
|
<urn:uuid:213d20d1-a0a7-4ee5-8182-4207643f9c0b>
|
CC-MAIN-2023-23
|
https://www.statology.org/excel-sum-filtered-row/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647459.8/warc/CC-MAIN-20230531214247-20230601004247-00131.warc.gz
|
en
| 0.844067 | 347 | 2.96875 | 3 |
In a previous entry, How many watts do you need?, I discussed how transmitter power affects the received signal, and touched on the concept of the SNR, Signal to Noise Ratio. Seeing numbers expressed in dB is one thing, but actually hearing the difference between a station with an SNR of 10 dB and one of 20 dB is far more enlightening.
I created some simulated Signal to Noise Radio recordings. They were produced by mixing a relatively constant noise signal (actual static RF from a Software Defined Radio connected to an antenna) with a software generated AM modulated signal. One difference between these recordings and an actual station is that there is no fading, so real world conditions are likely to be somewhat worse, depending on the amount of fading the station is experiencing.
I’ve produced five recordings, with SNR’s of 0, 6, 10, 20 and 40 dB. A SNR of 0 dB means that the signal and noise levels are exactly the same. This is essentially the weakest signal that you could possibly receive. On the other hand, an SNR of 40 dB represents excellent reception conditions, say that of a local high powered MW station. The others obviously fall in between.
Remember that every 6 dB (voltage) of SNR is equivalent to 6 dB more signal (with the noise level held constant), in other words, doubling the transmitter power. Conversely, a drop of 6 dB is the same as cutting the transmitter power in half.
Let’s make up a crude example. A very strong pirate signal may have an SNR of 30 dB, somewhat weaker than a local station. Going from 30 dB to 10 dB, or 20 dB, is a change in transmitter power of a factor of 10 times. Going, for example, from 200 watt transmitter to a 20 watt transmitter. A 10 watt transmitter, half the power, would be 6 dB lower, or around 4 dB. It would be slightly weaker than the 6 dB simulated recording below.
Listen to the simulated recordings below to see the effects of various Signal to Noise Ratios:
|
<urn:uuid:0e68c31e-ca09-4fd8-90d0-d395a9710db9>
|
CC-MAIN-2013-20
|
http://www.radiohobbyist.org/blog/?p=121
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368702957608/warc/CC-MAIN-20130516111557-00035-ip-10-60-113-184.ec2.internal.warc.gz
|
en
| 0.958844 | 424 | 3.15625 | 3 |
Your web site is under attack.
I don’t mean that it is sometimes under attack, or that it is under attack from time to time – I mean that your website is almost always being attacked by hackers, viruses and an assortment of bots all designed to compromise the security of your site and gain access to your files.
I’ve personally been in this business for over twelve years, and I can tell you from (sometimes painful) experience that if it can be hacked – it will be hacked.
Hackers look for any vulnerability or weak point which they can exploit in order to gain entrance. More often than not, the weak point of any given web site’s security is a poorly crafted or easy to guess password.
That’s why it’s CRUCIAL to craft a good password for your web site.
A good password will consist of a random mix of letters (upper case and lower case), numbers, and symbols.
Never use your name, your children’s names, etc. – way too easy to guess.
And NEVER use a word from the dictionary. Hackers use programs which systematically try out every word in the dictionary as your password.
a bad password will look like this: baseball
A good password will look something like this: 3Dhc5%&vHH9
|
<urn:uuid:ddf641db-4d88-495a-ac8f-a9c74774379a>
|
CC-MAIN-2020-29
|
http://a1webserver.com/the-importance-of-a-good-password/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655896932.38/warc/CC-MAIN-20200708093606-20200708123606-00015.warc.gz
|
en
| 0.92085 | 278 | 2.609375 | 3 |
Raise your hand if you’re a fan of Indian cuisine! If you are, then you’re probably very well acquainted with one of the main spices used in Indian dishes – turmeric. It’s present in every Indian kitchen, ready to add flavor and color to an array of savory dishes. But alas, we’re not here to talk about food right now (though you can check our keto recipes here). Instead, we’re going to examine curcumin, one of the main components of turmeric. We’re also going to discuss how Meriva curcumin, a nano-delivery system, helps improve curcumin absorption rates in the body.
What is curcumin and where does it come from?
Curcumin is a natural chemical that comes from turmeric (Curcuma longa), a flowering plant that’s abundant in tropical regions like India and Southeast Asia. To the untrained eye, turmeric may look quite similar to ginger. That’s because they come from the same family, Zingiberacaeae, so they’re actually related. Turmeric, however, is a more intense golden yellow color than ginger.
Turmeric is mainly harvested for its rhizomes (the root-like horizontal stems that grow underground). The rhizome is widely used in cooking and in treating various ailments. It can be used fresh, or ground into paste or powder form to extend its shelf life and use. That said, the turmeric leaf is no slouch when it comes to cooking. Add a leaf or two to your favorite dish (try it on rice!) and you’ll have food that smells like heaven itself!
When was curcumin discovered?
Turmeric’s use as a culinary spice was first documented in the Vedic age in India (c. 1500 – c. 500 BCE), but it wasn’t until 1815 when a “yellow coloring matter” was isolated from turmeric rhizomes by Harvard scientists Vogel and Pelletier (1). The duo named the substance ‘curcumin’ presumably from turmeric’s scientific name, Curcuma longa.
What’s the difference between curcumin and curcuminoids?
Curcumin is part of a family of active compounds called curcuminoids. In addition to curcumin, curcuminoids include demethoxycurcumin and bisdemethoxycurcumin.
A turmeric rhizome has approximately 2.5 to 6% curcuminoid content, of which 77% is curcumin, 17% is demethoxycurcumin, and 3% is bisdemethoxycurcumin (2).
Turmeric has more than 100 components in it (1), but you know what’s the active component that actually gives it that nice golden yellow color and its medicinal properties?
If you guessed curcumin, you’re right!
According to a study published in the Nutrition and Cancer Journal, curcumin averages a mere 3.14% by pure turmeric powder weight. This means that, on average, a 100g of turmeric powder will only contain 3.14g of curcumin (3).
It may not seem like there’s a significant amount of curcumin in a rhizome, however, it’s enough to get turmeric recognized in Ayurvedic medicine as a powerful antioxidant, antibacterial, antiseptic, and anti-inflammatory (1). This spice is potent that it made to our list of top 15 anti-inflammatory foods.
Can’t I just eat turmeric and get my curcumin naturally?
Adding turmeric to your diet is certainly a natural way of getting curcumin and all the other important nutrients found in this so-called “Indian saffron”. This is, after all, how our ancestors have been consuming curcumin for thousands of years!
However, as mentioned earlier, curcumin is only around 3% of powdered turmeric weight. This means you can eat a lot of turmeric and still only get a fraction of curcumin compared to what you’ll get in a supplement. If you want to take advantage of all the curcumin benefits, then supplements are the way to go.
What the best curcumin supplement out there?
Oh, there are lots to choose from. Amazon will give you hundreds, if not thousands, of curcumin supplements if you do a search there. But most of these supplements only use ‘ordinary’ or ‘unenhanced’ curcumin which have low curcuminoid content and are infamous for their low absorption rates (4).
A Meriva curcumin supplement, on the other hand, is standardized to contain 18-22% of total curcuminoids (5). That’s 2-3x the curcuminoid content of most ordinary curcumin supplements!
Let’s do a quick comparison between turmeric powder, a couple of ‘ordinary’ curcumin supplements, and Meriva curcumin. For ease of calculation of curcuminoid content, we will be using the following:
- Turmeric powder – rhizomes contain approximately 2.5% to 6% curcuminoids, but we will use 6% for this illustration
- Ordinary curcumin #1 – curcuminoid content is taken from their product label
- Ordinary curcumin #2 – curcuminoid content is taken from their product label
- Intelligent Labs Meriva curcumin – Meriva is standardized to contain 18% to 22% curcuminoids, we will use the average 20% for this illustration
|Product||Turmeric Blend Per Capsule||Curcuminoid Content|
|Turmeric powder||100mg||6mg (6%)|
|Ordinary curcumin #1||500mg||47.5mg (9.5%)|
|Ordinary curcumin #2||665mg||630mg (95%)|
|Intelligent Labs Meriva curcumin||500mg||100mg (20%)|
Which one do you think is the winner?
Well, turmeric powder and ordinary curcumin #1 are vastly inferior compared to ordinary curcumin #2 and Meriva curcumin, so they’re off the list.
Now, if you’re looking at the numbers alone, then you’re probably thinking ordinary curcumin #2 is the clear winner. However, there’s a BIG problem with ordinary curcumin supplements (you’ll know more about it in the next section). But here’s a hint – very little of that 630mg of curcuminoid content will actually make it into your bloodstream.
With Meriva curcumin, on the other hand, you’re getting 100mg of curcuminoids. Since Meriva is engineered for optimum absorption (it’s 2900% better absorbed than ordinary curcumin), you’re actually getting more of the good stuff (5)!
So, to answer the question, Meriva curcumin is the best curcumin supplement as it will help you get the most amount of curcumin in your body.
So, what is the big problem with ordinary curcumin supplements?
Curcumin may be the most potent ingredient in turmeric, but when extracted and taken orally as a dietary supplement, it’s a different story altogether. Ordinary or unenhanced curcumin’s big problem is its poor bioavailability or low absorption rates (4, 6).
When taken orally, the curcumin will travel from the mouth all the way to the gut and intestines. Now, this is where the problem lies – curcumin is a fat-soluble nutrient and the body, specifically the digestive system, is mainly a watery environment. Because curcumin does not dissolve in water, it ends up mostly excreted via urine and stool (7).
A small amount does get absorbed (especially if curcumin is taken with fatty food), however, it’s all rapidly broken down or metabolized by the body. This results in curcumin’s poor bioavailability (4).
One study gave escalating doses of curcumin to 24 healthy volunteers. They were given doses from 500mg to 12,000mg. The curcumin was so poorly absorbed that no trace of the substance was found in the volunteers’ serum when given doses up to 8,000mg! When they got to 10,000mg and 12,000mg, only then did low levels of curcumin present in 2 (out of 24) subjects (8).
You can buy a supplement with 95% curcuminoids, but if only a very low percentage is actually used by the body, then it doesn’t make much sense buying that product, right? Stop spending money on ordinary curcumin supplements since these won’t do you any good.
Does Meriva Curcumin really offer better bioavailability than ordinary curcumin supplements?
This is the million-dollar question. So, first of all, Meriva is a natural, food-grade delivery form of curcumin developed by Indena, a biotech company in Milan, Italy. Meriva uses patented phytosome technology to improve and optimize the body’s absorption of curcumin.
So, here’s how Meriva Curcumin works:
The curcuminoids are bound with phosphatidylcholine, a substance that makes up a major part of cell membranes in the body. Since phosphatidylcholine is naturally present in the body, it makes our body more receptive to absorbing it, which in turn leads to the curcumin being more easily absorbed as well.
If you find that explanation complicated, here’s an analogy:
Think of Meriva as a vehicle that delivers curcumin to the body. But instead of using metal (like real cars), it uses a substance that’s the same material as our cell membranes (phosphatidylcholine). The body recognizes the material and lets the car in by absorbing it. Once it’s absorbed, the curcuminoids inside the car are then released and put to good use.
This delivery system is so effective, in fact, that according to scientific studies, curcuminoids are 29 times better absorbed by the body as compared to ordinary, unenhanced curcumin (6). These numbers help eliminate the problem of curcumin’s poor bioavailability and helps Meriva curcumin users take advantage of the amazing benefits of curcumin!
Why take Meriva curcumin as a dietary supplement? What is it good for?
According to a ConsumerLab survey of 9,782 vitamin and supplement users, curcumin/turmeric is 2019’s 7th most popular dietary supplement (out of 169 different types of supplements).
34.8% or more than a third of respondents say they’ve purchased a curcumin/turmeric supplement in the past year. This means a significant number of people are aware of the health benefits of this powerful compound.
With that being said, here’s why you should also consider taking Meriva curcumin as a dietary supplement:
Benefit #1: It fights chronic inflammatory diseases such as osteoarthritis
In a study published in the Panminerva Medica journal (9), 1g of Meriva (or 200mg of curcumin) was given to 50 patients suffering from osteoarthritis. By the end of the 3 months, the patients were evaluated by their WOMAC scores. The WOMAC index is used to evaluate the conditions of patients suffering from hip and knee osteoarthritis.
These were the results:
*Global WOMAC score – decreased by 58% which means the patients experienced significant reduction in their osteoarthritis symptoms (less pain and stiffness).
*Walking distance on treadmill – on average, patients were able to increase their walking distance from 76m to 332m (up by 336%) which is excellent.
*C-reactive protein (CRP) levels – decreased from 168 +/- 18 to 11.3 +/-. 4.1 mg/L. CRP is an inflammation marker, so this means that Meriva curcumin was able to reduce inflammation in the body.
Other observations obtained during the study include a significant decrease in the following:
- use of painkillers,
- gastrointestinal complications,
- use of other drugs,
- management costs,
- distal edema,
- hospital admissions, and
- other costs associated with treating osteoarthritis.
The same group of researchers followed up with a second study to test the long-term safety and efficacy of Meriva. The study lasted 8 months and the number of patients doubled from 50 to 100. Their findings mirrored the results from the first study. The researchers concluded that Meriva is a safe and effective treatment option for the management of osteoarthritis, leading to an overall improvement in the patients’ quality of life (10).
Benefit #2: It acts as an analgesic and helps with pain relief
A 2016 systematic review published in the Pain Medicine journal reported that curcuminoids helped to significantly reduce pain in 606 patients across 8 randomized controlled trials. None of the patients experienced adverse effects and the curcuminoids were well tolerated (11).
Another study compared Meriva curcumin against two pain relievers – acetaminophen and nimesulide. Researchers found that 2g daily of Meriva (about 400mg of curcumin) brought pain relief to patients. This dose was comparable to 1g of acetaminophen, but lower than a nimesulide dose (100mg). Lower doses of Meriva weren’t as effective and took longer to take effect. The good thing is that Meriva curcumin is well tolerated by the stomach just like acetaminophen, which is something that can’t be said about nimesulide (12).
Benefit #3: Curcumin is a potent antioxidant
A meta-analysis conducted on 7 randomized controlled trials (RCT) showed that curcumin supplementation was responsible for an increase in antioxidant activity. Superoxide dismutase (SOD), catalase and glutathione levels in blood plasma increased significantly when supplementation ran for more than 6 weeks (13).
No significant antioxidant activity was detected when curcumin supplementation was done for less than 6 weeks. Because of this increase in antioxidant activity, there was a corresponding decrease in free radical activity via reduction of serum lipid peroxides (13).
A 2011 study compared the antioxidant effects of 2 doses of curcumin. The first group was given 500mg/day of curcumin, and the second group 6g/day of curcumin. After 7 days, the researchers found that the first group’s plasma antioxidant rose from 13% to 24% (a significant increase), while the second group increased from 19% to 20% (not significant at all) (14).
The first group also experienced reduced cholesterol and triglyceride levels. Because of these findings, the researchers recommend curcumin supplementation be done by people who want to reduce cholesterol or triglyceride levels, and only at 500mg per day (14).
Benefit #4: It helps improve mood and brain function
A 2017 study done on 123 patients showed that the 2 groups given curcumin (250mg vs 500mg) for 12 weeks experienced a reduction in depression and anxiety symptoms. There were also no significant differences in the symptoms between the different doses of curcumin, so even the low dose (250mg) is enough to alleviate depressive symptoms (15).
As for brain function, a 2019 systematic review of 4 RCTs with a total of 139 participants found that curcumin supplementation led to a significant improvement in serum BDNF (brain-derived neurotrophic factor) levels. The dose varied from 200mg to 1,820mg per day and study duration lasted between 8 to 12 weeks (16). This is a promising study since low BDNF levels is associated with conditions like major depressive disorder, Alzheimer’s disease and dementia (17).
Benefit #5: Helps with obesity, diabetes, and heart disease
A 6-month study by Chuengsamarn et al. on 240 type 2 diabetics showed exciting results (18):
- Significant reduction in pulse wave velocity, which indicates lower risk of arteriosclerosis
- Better overall metabolic profile – reduced insulin resistance, lower triglycerides, visceral fat, total body fat, and waist circumference
- Increase in adiponectin levels and corresponding decrease in leptin levels, which reduces the risk of heart attack
Each patient was given 6 capsules daily, with each capsule containing 250mg of curcuminoids.
Benefit #6: Helps prevent and treat various forms of cancer
Studies done on mice show that curcumin can slow down the growth of cancer cells as well as prevent the growth of tumors (19). When used with other chemo drugs, curcumin has been shown to not only prevent cancer relapse, but it also works to reduce tumor mass and slow down cancer progression (20). A number of ongoing clinical trials on curcumin are examining the use of this substance in preventing and treating various forms of cancer (20).
How much turmeric or curcumin is safe to take each day?
According to the US Food and Drug Administration, curcumin is ‘generally recognized as safe’ (21). With regards to dosage, a dose-escalating study done by Lao et al. showed that curcumin is safe to take even at high doses of 12g/day. A third of the volunteers experienced minor toxicity, but the researchers said these did not appear to be related to the curcumin dosage (8).
Is Meriva curcumin safe to take long-term?
Yes, it’s safe to take long-term. We recommend taking up to 1-2g of Meriva daily to help manage various health conditions. The 8-month study done by Belcaro et al. on Meriva showed that this is a safe supplement with very low oral toxicity (10).
What are the side effects of taking curcumin supplements?
While curcumin is a relatively safe compound, some side effects may occur especially when taken in high doses. 7 out of 24 subjects in the Lao study (8) reportedly experienced headaches, rashes, yellow stool, and diarrhea. In another study, a few volunteers receiving 450mg to 3.6g daily for up to 4 months experienced nausea and diarrhea (22).
Who shouldn’t be taking curcumin?
People who are allergic to turmeric probably shouldn’t be taking curcumin supplements. A study published in a Dermatology journal reported that while curcumin has many valuable properties, it can cause contact dermatitis (23).
Also, if you are pregnant or breastfeeding, please consult with your primary care physician if supplementing with curcumin is okay and what the right dosage for you is.
When’s the best time of day to take turmeric?
You can take turmeric supplements any time of day, but it’s best taken with food to help improve absorption rates. The same thing goes with Meriva curcumin. The phosphatidylcholine that binds with the curcumin is best absorbed when taken with fatty food. We don’t advise taking turmeric on an empty stomach.
How much turmeric per day for pain?
It really depends on the kind of pain you’re experiencing. But 500mg per day of Meriva curcumin is a good start. If you’re not seeing results, then you can slowly increase the dosage up to 1g-2g daily.
For osteoarthritis pain, 1g daily dose of Meriva may work well for you. In the Belcaro study (10), 1g of Meriva daily for 8 months resulted in a 63% reduction in painkiller use, 59% reduction in pain and stiffness, 67% reduction in digestive problems, and 346% improvement in maximum walking distance.
Can curcumin cure arthritis such as gout?
Recent studies (2019) on mouse models show that curcumin can significantly reduce uric acid levels with minimum toxicities (24, 25). This is very promising, but ultimately, we will need to wait for clinical trials before we can definitely say that curcumin can cure gout.
Can turmeric cause diarrhea?
If you’re not used to eating turmeric, then you may experience a bout of diarrhea. Fortunately, when it comes to curcumin supplements, it’s relatively safe as attested to by multiple studies (8, 9, 10). Normally, curcumin side effects only occur when taken at higher doses.
Does turmeric thin the blood?
Yes, turmeric – specifically curcumin – is a natural anticoagulant or blood thinner (26). Turmeric helps lower the risk of blood clots, which in turns, reduces the probability of heart attacks and strokes.
Turmeric isn’t just some fabled wonder spice with a long list of health benefits. Modern science is actually backing up many of those health claims. Thanks to an efficient delivery system like Meriva, curcumin’s bioavailability is improved. Experience the amazing benefits of curcumin by adding our Intelligent Labs Meriva Curcumin Phytosome supplement to your daily healthcare routine.
(1) Prasad S, Aggarwal BB. Turmeric, the Golden Spice: From Traditional Medicine to Modern Medicine. In: Benzie IFF, Wachtel-Galor S, editors. Herbal Medicine: Biomolecular and Clinical Aspects. 2nd edition. Boca Raton (FL): CRC Press/Taylor & Francis; 2011. Chapter 13. Available from: https://www.ncbi.nlm.nih.gov/books/NBK92752/
(2) Lee W-H, Loo C-Y, Bebawy M, et al. Curcumin and its derivatives: their application in neuropharmacology and neuroscience in the 21st century. Current neuropharmacology. 2013;11(4):338-78.
(3) Tayyem, Reema F et al. “Curcumin content of turmeric and curry powders.” Nutrition and cancer vol. 55,2 (2006): 126-31. doi:10.1207/s15327914nc5502_2
(4) Anand, Preetha et al. “Bioavailability of curcumin: problems and promises.” Molecular pharmaceutics vol. 4,6 (2007): 807-18. doi:10.1021/mp700113r
(5) Belcaro, G et al. “Product-evaluation registry of Meriva®, a curcumin-phosphatidylcholine complex, for the complementary management of osteoarthritis.” Panminerva medica vol. 52,2 Suppl 1 (2010): 55-62.
(6) Cuomo, John et al. “Comparative absorption of a standardized curcuminoid mixture and its lecithin formulation.” Journal of natural products vol. 74,4 (2011): 664-9. doi:10.1021/np1007262
(7) Metzler, Manfred et al. “Curcumin uptake and metabolism.” BioFactors (Oxford, England) vol. 39,1 (2013): 14-20. doi:10.1002/biof.1042
(8) Lao, Christopher D et al. “Dose escalation of a curcuminoid formulation.” BMC complementary and alternative medicine vol. 6 10. 17 Mar. 2006, doi:10.1186/1472-6882-6-10
(9) Belcaro, G et al. “Product-evaluation registry of Meriva®, a curcumin-phosphatidylcholine complex, for the complementary management of osteoarthritis.” Panminerva medica vol. 52,2 Suppl 1 (2010): 55-62.
(10) Belcaro, Gianni et al. “Efficacy and safety of Meriva®, a curcumin-phosphatidylcholine complex, during extended administration in osteoarthritis patients.” Alternative medicine review : a journal of clinical therapeutic vol. 15,4 (2010): 337-44.
(11) Sahebkar, Amirhossein, and Yves Henrotin. “Analgesic Efficacy and Safety of Curcuminoids in Clinical Practice: A Systematic Review and Meta-Analysis of Randomized Controlled Trials.” Pain medicine (Malden, Mass.) vol. 17,6 (2016): 1192-202. doi:10.1093/pm/pnv024
(12) Di Pierro, Francesco et al. “Comparative evaluation of the pain-relieving properties of a lecithinized formulation of curcumin (Meriva(®)), nimesulide, and acetaminophen.” Journal of pain research vol. 6 (2013): 201-5. doi:10.2147/JPR.S42184
(13) Sahebkar A., Serbanc M.C., Ursoniuc S., Banach M. Effect of curcuminoids on oxidative stress: A systematic review and meta-analysis of randomized controlled trials. J. Funct. Foods. 2015;18:898–909. doi: 10.1016/j.jff.2015.01.005.
(14) Pungcharoenkul, Kanit, and Phensri Thongnopnua. “Effect of different curcuminoid supplement dosages on total in vivo antioxidant capacity and cholesterol levels of healthy human subjects.” Phytotherapy research : PTR vol. 25,11 (2011): 1721-6. doi:10.1002/ptr.3608
(15) Lopresti, Adrian L, and Peter D Drummond. “Efficacy of curcumin, and a saffron/curcumin combination for the treatment of major depression: A randomised, double-blind, placebo-controlled study.” Journal of affective disorders vol. 207 (2017): 188-196. doi:10.1016/j.jad.2016.09.047
(16) Sarraf, Payam et al. “Short-term curcumin supplementation enhances serum brain-derived neurotrophic factor in adult men and women: a systematic review and dose-response meta-analysis of randomized controlled trials.” Nutrition research (New York, N.Y.) vol. 69 (2019): 1-8. doi:10.1016/j.nutres.2019.05.001
(17) Ng, Ted Kheng Siang et al. “Decreased Serum Brain-Derived Neurotrophic Factor (BDNF) Levels in Patients with Alzheimer’s Disease (AD): A Systematic Review and Meta-Analysis.” International journal of molecular sciences vol. 20,2 257. 10 Jan. 2019, doi:10.3390/ijms20020257
(18) Chuengsamarn, Somlak et al. “Reduction of atherogenic risk in patients with type 2 diabetes by curcuminoid extract: a randomized controlled trial.” The Journal of nutritional biochemistry vol. 25,2 (2014): 144-50. doi:10.1016/j.jnutbio.2013.09.013
(19) Kawamori, T et al. “Chemopreventive effect of curcumin, a naturally occurring anti-inflammatory agent, during the promotion/progression stages of colon cancer.” Cancer research vol. 59,3 (1999): 597-601.
(20) Panda, Abir Kumar et al. “New insights into therapeutic activity and anticancer properties of curcumin.” Journal of experimental pharmacology vol. 9 31-45. 31 Mar. 2017, doi:10.2147/JEP.S70568
(21) U.S Food and Drug Administration. CFR‐Code of Federal Regulations Title 21.
(22) Sharma, Ricky A et al. “Phase I clinical trial of oral curcumin: biomarkers of systemic activity and compliance.” Clinical cancer research : an official journal of the American Association for Cancer Research vol. 10,20 (2004): 6847-54. doi:10.1158/1078-0432.CCR-04-0744
(23) Chaudhari, Soham P et al. “Curcumin: A Contact Allergen.” The Journal of clinical and aesthetic dermatology vol. 8,11 (2015): 43-8.
(24) Kiyani, Mubin Mustafa et al. “Evaluation of Turmeric Nanoparticles as Anti-Gout Agent: Modernization of a Traditional Drug.” Medicina (Kaunas, Lithuania) vol. 55,1 10. 11 Jan. 2019, doi:10.3390/medicina55010010
(25) Chen, B., Li, H., Ou, G. et al. Curcumin attenuates MSU crystal-induced inflammation by inhibiting the degradation of IκBα and blocking mitochondrial damage. Arthritis Res Ther 21, 193 (2019). https://doi.org/10.1186/s13075-019-1974-z
(26) Kim, Dong-Chan et al. “Anticoagulant activities of curcumin and its derivative.” BMB reports vol. 45,4 (2012): 221-6. doi:10.5483/bmbrep.2012.45.4.221
|
<urn:uuid:0d2231c0-f25c-4def-a950-c11d3d82ab30>
|
CC-MAIN-2023-14
|
https://www.intelligentlabs.org/meriva-curcumin/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948684.19/warc/CC-MAIN-20230327185741-20230327215741-00799.warc.gz
|
en
| 0.882172 | 6,407 | 3.140625 | 3 |
Gilman, Illinois facts for kids
Amtrak Station in Gilman
Iroquois County's location in Illinois
|• Total||2.25 sq mi (5.8 km2)|
|• Land||2.23 sq mi (5.8 km2)|
|• Water||0.02 sq mi (0.1 km2)|
|Elevation||650 ft (198 m)|
815, 779815 Exchange: 265
|GNIS feature ID||0409026|
Gilman is located in the western part of the county at the intersection of three major highways: Interstate 57, U.S. Route 24, and U.S. Route 45. As a result, it has been named "The City of the Crossroads". Amtrak, the national passenger rail service, provides service at the Gilman Amtrak station.
According to the 2010 census, Gilman has a total area of 2.25 square miles (5.83 km2), of which 2.23 square miles (5.78 km2) (or 99.11%) is land and 0.02 square miles (0.05 km2) (or 0.89%) is water.
Founding of Gilman
Gilman Illinois was laid out in the fall of 1857 on land belonging to E.D. Hundley, Judge John Chamberlain (24 October 1803 – 16 December 1866), and three Methodist ministers: Walter C. Palmer, Joseph Hartwell, and John Dempster. Hundley, who was from Virginia, left Illinois for the South at the outbreak of the Civil War. The three ministers, who had been given their land by Mr. Cassady of Danville, played no further role in the development of the town. Judge Chamberlain was the man most responsible for the early growth of Gilman. He was born in Charleston, New Hampshire, the son of a lawyer. Chamberlain had served in the New York Legislature and had moved to Iroquois County in 1853. He was elected judge, was active in county politics, and lived in Watseka, Illinois. Chamberlain took as a partner Joseph Thomas ( ? -1858) from nearby Onarga. The town of Gilman was founded at the point where the Peoria and Oquawka Railroad would soon cross the Illinois Central Railroad. The Peoria and Oquawka became the Toledo, Peoria and Western Railway. In return for establishing a station at Gilman Octave Chanute, the Chief Engineer of the Peoria and Oquawka Railroad, asked for and was given one half of all the lots in the original town of Gilman. This was standard practice for the railroad and was done at El Paso, Fairbury and probably other new towns established along the route of the railroad. Town founders were aware that the lots were not personally for Chanute, but for the railroad company; Today Octave Chanute is best known for his publications on aviation and for his assistance to the Wright brothers. Chanute was involved in the foundation of many towns along the railroad, usually in association with local individuals. Railroad companies in Illinois were forbidden to found towns themselves. Iroquois Democrats had wanted to name the town Douglas, after the Illinois senator, but Cruger Secor and Company given the right to name the town and they decided to honor Samuel Gilman, a director of that company.
Original design of Gilman
The design of Gilman in general followed the standard plan used by the Peoria and Oquawka Railroad. This was based on a Depot Ground, a wider area of railroad owned land where the tracks pass through a town. In the original town of Gilman, east-west streets were given numbers, 6th to 2nd with Front Street where 1st Street would have been expected. The east-west streets, often given standard tree names in other Peoria and Oquawka towns, were here assigned distinctive local names including Chamberlain, Thomas and Douglas. Except for a slight bend in Central and Chamberlain Streets, the plan is generally similar to that of Chatsworth, Fairbury, Gridley and Watseka (platted as South Middleport). The Gilman plat was exceptionally large with 73 blocks, most having sixteen lots. Unlike most towns of the era, Gilman never developed a single commercial focus. This was evident early in its history when Beckwith remarked, "The town is the most diffusely settled, probably, of any of like population in the state. It would be very difficult to tell which is the center of the town."
The first new inhabitant of the area was W. P. Gardner from Pennsylvania, who at first lived in a shanty maintained by the railroad for its workers. When the survey of Gilman was done in September 1857, Gardner built the first house in Gilman. That same fall James Wright built a house in Gilman. This was soon followed by a much more expensive structure, a three story hotel costing $4,000 with a third-floor assembly area. The first recorded event in Gilman's history was a ball held on 22 February 1858 at the hotel to celebrate George Washington’s birthday. Some of the less respectable young men of the neighborhood objected to the ladies being inside the hotel while they were left out on the frigid street. They began calling for the ladies to come outside and join them. One of those invited guests was the builder of the hotel, a man named Lawrence. Wise in the ways of frontier towns, Lawrence had taken the precaution of bringing a stout stick to the dance. Rushing downstairs he burst out the door swinging his shillelagh and quickly dispersing the rowdies. The ball went on. D. Harwood was the first merchant to open a store in Gilman which maintained a full stock of goods. The first train through Gilman arrived on 21 September 1857 and was to take local people to the State Fair in Peoria. It was three hours late, but its arrival did signal the start of a period of rapid growth for the new town. The Illinois Central did not begin to run trains until 1858. In 1860 the first school was built; by 1865, the town had thirty-one buildings. Gilman was officially organized as a town in 1867.
By the late 1860s, Gilman had two railroads. The eastern branch of the Illinois Central linked St. Louis and Chicago, while the Toledo Peoria and Western, ran east and west across the state, from the Mississippi River to Indiana. Gilman prospered as the place where people and goods were transferred from one railroad to the other. In 1870 newspaper, the Gilman Star, began publication. The 1870 Federal Census found Gilman had 761 people. In September 1871, a third railroad, originally called the Gilman, Clinton and Springfield Railroad, opened for business. It was largely funded by local bonds and never enjoyed the success of the earlier railroads. On 5 July 1883 a severe fire damaged much of the town. An electric power plant was built in 1898. Unlike many local towns, Gilman continued to grow in the twentieth century. In 1920, there were 1,443 people. In 1923 and 1924, the state of Illinois began building a new "hard road" paralleling the Toledo Peoria and Western Railroad, which was at first called the Corn Belt Trail, but soon became U.S. Route 24. A second new road, paralleling the Illinois Central Railroad through Iroquois County, initially known as the Egyptian Trail, evolved into Interstate 57 in the 1970s. In the last decade, a second water tower was built along interstate 57 on the western side of Gilman.
As of the census of 2000, there were 1,793 people, 739 households, and 472 families residing in the city. The population density was 848.0 people per square mile (328.1/km²). There were 816 housing units at an average density of 385.9 per square mile (149.3/km²). The racial makeup of the city was 93.08% White, 0.22% African American, 0.06% Native American, 0.33% Asian, 5.30% from other races, and 1.00% from two or more races. Hispanic or Latino of any race were 9.04% of the population.
There were 739 households out of which 27.7% had children under the age of 18 living with them, 49.7% were married couples living together, 10.0% had a female householder with no husband present, and 36.1% were non-families. 32.7% of all households were made up of individuals and 17.7% had someone living alone who was 65 years of age or older. The average household size was 2.35 and the average family size was 2.98.
In the city, the population was spread out with 23.0% under the age of 18, 8.1% from 18 to 24, 25.1% from 25 to 44, 23.4% from 45 to 64, and 20.4% who were 65 years of age or older. The median age was 40 years. For every 100 females there were 91.2 males. For every 100 females age 18 and over, there were 86.7 males.
The median income for a household in the city was $36,450, and the median income for a family was $46,016. Males had a median income of $32,188 versus $18,875 for females. The per capita income for the city was $17,396. 9.9% of the population and 7.3% of families were below the poverty line. Out of the total people living in poverty, 12.7% are under the age of 18 and 8.5% are 65 or older.
Gilman, Illinois Facts for Kids. Kiddle Encyclopedia.
|
<urn:uuid:1d25a943-24a8-44e9-9b8c-58f701e5ee43>
|
CC-MAIN-2020-29
|
https://kids.kiddle.co/Gilman,_Illinois
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655897844.44/warc/CC-MAIN-20200709002952-20200709032952-00387.warc.gz
|
en
| 0.978183 | 2,041 | 2.53125 | 3 |
Since its inception in 1973, the International Nomenclature Cosmetic Ingredient (INCI) system has been instrumental in shaping the cosmetics industry. Its consistent efforts in creating standardized nomenclature for cosmetics ingredients have made it a trusted source for consumers, scientists and regulators. This year, INCI celebrates its 50th anniversary. This milestone recognizes PCPC’s long history and reaffirms its commitment to help ensure safety, transparency and scientific integrity in the cosmetics and personal care products industry for years to come. #INCIturns50
What is INCI?
INCI names (International Nomenclature Cosmetic Ingredient) are systematic names internationally recognized to identify cosmetic ingredients. They are developed by the International Nomenclature Committee (INC) and published by the Personal Care Products Council (PCPC) in the International Cosmetic Ingredient Dictionary and Handbook, available electronically as wINCI.
Oversight for the INCI program is provided by PCPC as part of its mission to support the identification of the composition of personal care products, and publication of this information in a worldwide science-based Dictionary. PCPC is committed to ensuring that the Dictionary provides the world community with accurate, transparent, and harmonized nomenclature. By working closely with its international sister trade associations, and with other organizations around the world, PCPC strives to develop INCI names that accommodate differing labeling approaches described in national laws and regulations.
There are many benefits to a uniform system of labeling names for cosmetic ingredients. Dermatologists and others in the medical community are ensured an orderly dissemination of scientific information, which helps to identify agents responsible for adverse reactions. Scientists are ensured that information from scientific and other technical publications will be referenced by a uniform name; and that multiple names for the same material will not lead to confusion, misidentification, or the loss of essential information. It also enables the cosmetic industry to track the safety and the regulatory status of ingredients efficiently on a global basis, enhancing its ability to market safe products in compliance with various national regulations. And finally, transparency is provided to consumers as ingredients are identified by a single labeling name regardless of the national origin of the product.
What INCI is not.
The designation of an INCI name for a cosmetic ingredient is an essential part of ingredient identification; however, just because an ingredient has an INCI name does not mean that the ingredient has been approved for cosmetics. The assignment of an INCI name to an ingredient also does not imply that the ingredient is safe, or that its use in a cosmetic product complies with the laws and regulations of the United States or other global regions. The safety and fitness of use for an ingredient, along with regulatory considerations, is carefully evaluated by the manufacturer as part of the development process before the product is marketed.
|
<urn:uuid:da9af124-3c1e-4bef-a553-b4caf9154a07>
|
CC-MAIN-2023-50
|
https://www.personalcarecouncil.org/resources/inci/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100568.68/warc/CC-MAIN-20231205204654-20231205234654-00854.warc.gz
|
en
| 0.933607 | 570 | 2.71875 | 3 |
Bergen has been much reduced from its original limits. It now comprises a small
strip of land 7½ m. long, and from 1 to 3 broad. It is bounded N. by North Bergen, E. by New York bay, S.
by the Kill Van Kuhi, and W. by Newark bay and Hackensack river. The soil is fertile, and it is inhabited by a
thriving agricultural population.
Bergen is supposed to be the oldest European settlement in New Jersey. The village of Bergen is presumed to have
been founded about 1616, by the Dutch colonists to New Netherlands, and to have received its name from Bergen in
Norway. For several years it was probably merely a trading post, to which the Indians resorted for the sale of
their game and fur. On the 30th Jan., 1658-9, the Indians sold to "the Noble Lord Director-general, Pieter
Stuyvesant, and Councill of New Netherlandt," a tract lying on the west side of North river, "beginning
from the great C!ip,* above Wiehachan, and from there right through the land above the Islandt Sikakes, and therefrom
thence to the Kill Van Coil, and so along to the Constables Hoeek, and from the Constables Hocek again to the aforesaid
Clip above Wiehachan." In consideration for this tract, which included all the lands between the Hackensack
and North rivers, and the Kills, the indians received 80 fitt.homs of wampum, 20 fathoms of cloth, 12 brass kettles,
6 guns, 2 blankets, 1 double brass kettle, and one half-barrel of strong beer, and agreed to remove the first opportunity.
On the 22d Sept., 1668, a charter was granted by Coy. Carteret and his council, "to the Towne and the Freeholders
of Bergen, and to the Village and Plantations thereunto belonging;" and the boundaries fixed in the deed then
given, remained unchanged until the recent act of the legislature constituting the new county of Hudson, when Jersey
City was set off The township, in the deed, was estimated to embrace 11,520 acres, (perhaps not more than half
the actual quantity) and it was about 16 miles long, by 4 in width, including "the said towne of Bergen, Communipaw,
Ahassimus, Minkacque, and Pembrepock," bounded on the E., S., and W. by New York and Newark bays, and Hackensack
river. The conditions of this charter were admirable. By it, "the Freeholders within the said Jurisdiction,"
were bound "to pay the Lords Proprietors and their successors, on every 25th day of March, £15,"
as a quit-rent forever. They had power "to chuse their owne magistrates to be assistants to the President
or Judge of the Court, and for the ordering of all Public Affaires within the said Jurisdiction." They were
also enjoined to provide for religious worship, "to chuse a minister for the preaching of the Word of God,
and the administering his Holy Sacraments,"-" to lay out such a proportion of Land for him, and the keeping
of a Free School for the Education of Youth, as they shall think fit; which Land is to remaine and to continue
forever without Tax or Rent." No person was to be molested for religious opinions, provided they did not "extend
to Licentiousness," &c., &c.
The first settlement was doubtless at the village of Bergen, 2 miles west of Jersey City, on the summit of Bergen
ridge, which now contains about 30 dwellings and a Reformed Dutch church. "The names of some of the early
settlers in this region were, Pinhome, Eickbe, Berrie, Kiersted, Van Horne, Van Winkle, Edsall, Van Guellin, Van
Vorst, &c.; and their descendants have continued to occupy the country to the present day, retaining much of
their primitive habits, their language, industry, cleanliness, and general economy."
The following is a description of this country in 1680, taken from Smith's history of New Jersey :- Near the mouth
of the bay, upon the side of Overprook creek, adjacent to Hackensack river, several of the rich valleys were then
(1680) settled by the Dutch; and near Snake hill was a fine plantation, owned by Pinhorne and Eickbe, for half
of which, Pinhorne is said to have paid £500. There were other settlements upon Hackensack river, and on.
a creek near it, Sarah Kicrsted, of New York, had a tract given her by an old Indian sachem, for services in interpreting
between the Indians and Dutch and on which several families were settled; John Berrie had a large plantation, 2
or 3 miles above, where ho then lived, and had considerable improvements; as had also near him, his son-in-law,
Smith, and one Baker, from Barbadocs. On the west side of the creek, opposite to Berrie were other plantations;
but none more northerly. There was a considerable settlement upon Bergen Point, then called Constable Rook, and
first improved by Edsall, in Nicoll's time. ( Other small plantations were improved along Bergen neck, to the east,
between the point and a large village of 20 families, (Communipan.) Further along lived 16 or 18 families, and
opposite New York about 40 families were seated. Southward from this, a few families settled together, at a place
called Duke's Farm; and further up the country was a place called Hoebuck, formerly owned by a Dutch merchant,
who, in the Indian wars with the Dutch, had his wife, children, and servants murdered by the Indians, and his house
and stock destroyed by them; but it was now settled again, and a mill erected there. Along the river-side to the
N. were lands settled by William Lawrence, Samuel Edsall, and Capt. Beinfield; and at Haversham, near the Highlands,
Gov. Carteret had taken up two large tracts; one for himself, the other for Andrew Campyne and Co., which were
now but little improved. The plantations on both sides of the neck, to its utmost extent, as also those at Hackensack,
were under the jurisdiction of Bergentown, situate about the middle of the neck; where was a court held by- selectmen
or overseers, consisting of 4 or more in number, as the people thought best, chose annually to try small causes,
as had been the practice in all the rest of the towns at first; 2 courts of sessions were held here yearly, from
which, if the cause exceeded £20, the party might appeal to the governor, council, and court of deputies
Bergen, a compact town which had been fortified against the Indians, contained about 70 families; its inhabitants
were chiefly Dutch, some of whom had been settled there upwards of 40 years.
The following interesting facts, relating to the ecclesiastical history of the village, are from a manuscript historical
discourse by the Rev. B. C. Taylor, D. D., Bergen:In 1663, the inhabitants agreed to be taxed for a place of worship,
and in 1664, the church records commenced, and have been regularly kept ever since. About that period the church
was constituted, being the first church of any denomination in the state, and one of the first Dutch Reformed churches
in the Union. Until 1680, public worship was held in a rude structure, probably of logs, which, tradition says,
stood on the hill within what is now known as the old graveyard. That year, the first regular church ediface was
erected. It. was built of stone, octagonal in form ; with pews around the wall, solely occupied by the males, while
the remainder of the floor was covered with chairs for the females. A belfry rose from the roof, and when ringing,
the sexton stood in the centre of the church. In 1773, this church was taken down, and a new one (shown in the
annexed view) was erected, which stood until 1841, when the present splendid church edifice, standing 15 or 20
rods south of the old one, was built. On it is the appropriate inscription-" The Lord our God be with us,
as he was with our fathers: let him not leave us or forsake us." The territory over which the congregation
was originally scattered, comprised the whole of the ancient township of Bergen, in which, for 162 years, it was
the only organized church. On the hallowed spot where the late house of worship stood, there was, at least for
140 years, the only house of worship. There, for over 160 years, successive generations worshipped the living God.
There are now, (1843,) in the same limits, 15 temples in which public worship is held, 4 of which are in this township,
viz: 1 Reformed Dutch and 2 Methodist churches at Bergen neck, and 1 Reformed Dutch at Bergen.
The congregation, from its organization, was supplied with preaching from the Reform. ed Dutch church at Now York.
In 1750, a call was made by the cousistories of Staten Island and Bergen, on one Petrus De Wint. He commenced as
a candidate, and endeavored to procure his ordination as a minister, and installation as a pastor, of these churches,
from the party known as the Coetus. The call, however, was referred to the Chassis of Amsterdam for approval, from
which body a letter was subsequently received, declaring Do Wint to be an impostor; upon which he was discharged
by the congregations. In 1752, the two churches unitedly called Wm. Jackson, a young theological student, whom
they sent to Holland to complete his education.
In 1737 he returned as an ordained minister, with a commission appointing three clergymen of the Dutch church in
this country to install him pastor over these churches; which took place Sept. 10, 1757. He was an able and devoted
minister. On the 10th of December, 1789, the Classis of Hackcnsack recommended to him the propriety of returning
his call, by reason of sore mental affliction. The church then secured to him, through life, the parsonage and
adjacent lands; and administered to his wants until his death, July 25, 1813, at the age of 82, and nearly 24 years
after his release from the church. On the 28th of November, 1792, this church united with that of English Neighborhood
in a call on the Rev. John Cornelison, which he accepted, and continued in the double charge until December 1,
1806; from which time until his death, March, 1828, he was pastor of this church alone. On the 1st of July, 1828,
the present pastor, the Rev. Benjamin C. Taylor, D. D., entered upon his labors. It is a fact worthy of notice,
that there arc now in this congregation 35 pew-holders with the prefix of Van to their names ; of these there arc
22 of the name of Van Vreeland. Other very numerous names are the Van Winkles, Van Horns, Van Reypen, Van Boskircks,
Newkirks, and Cadmuses. Previous to the settlement of Cornelison, and during part of his ministry, the services
were in the Dutch language; and the church records, until 1809, were in Dutch.
In the war of the revolution Bergen village was frequently Successively occupied by American and British troops
on the same day; and there was much skirmishing between them. A fort was erected by the Americans, about 200 yards
E. of the centre of the village, on land belonging to Garret G. Newkirk; and one by the British, on Van Vorst's
hill, about a mile SE. They were simply earthen breastworks covered with sod, with trenches in front. The accompanying
extract from an ancient newspaper, relates to the murder of Stephen Ball by the refugees, Feb. 15th, 1781. According
to tradition, he was hung on a small persimmon-tree, near the tide-mill on Bergen Point. After be was dead the
refugees cut the rope, and his corpse fell into a grave dug by them. He was subsequently reburied at Newark.
This unfortunate man was deluded by a declaration made by the commanding officer on Staten Island, that all persons
who would bring provisions should have liberty to sell the same, and return unmolested; in consequence of which
declaration Ball carried over four quarters of beef, with a full assurance of being well treated, and expected
to return undiscovered by his countrymen; but soon after his arrival on that island, he was seized by Cornelius
Hetficid, who commanded a party of six or seven men, and was carried before Gen. Patterson, who refused to call
a court-martial to try him. From thence he was carried before Gen. Skinner, in order for trial; but he also refused,
pretending to shudder at the thought of trying and executing a person who came to bring them relief. Nevertheless,
the said Hetfield and his party, being lost to every sense of humanity, after robbing their prisoner of what property
he had with him, carried him across to Bergen Point, and without even the form of a trial, immediately informed
him that he had but ten minutes to live, and accordingly put their horrid design into execution, notwithstanding
the prisoner strenuously urged that he came with provision, agreeably to the above mentioned declaration. And when
he found they were determined to take his life, be begged for a few minutes longer, but was answered that his request
could not be granted; but if he had a desire any person should pray with him, one of their party should officiate.
When he was near expiring, James Hetfield, one of the banditti, put a knife in his hand, and swore that he should
not go into another world unarmed. The persons who perpetrated this cruel act were Cornelius Hetfield, Job Haetfield,
James Hetfield, sen., James Hetfield, jr., Elias Man, and Samuel Man-all late inhabitants of Elizabethtown; and
Job Smith, late an inhabitant of Bergen. When Ball's father became acquainted with the tragical death of his son,
he solicited a flag, which he obtained, for the purpose of bringing over the corpse; but the enemy, with savage
brutal ity, would not suffer them to land.
At the close of the revolution, Cornelius Hetfield, the principal in this murder, fled to Nova Scotia. in 1807
he returned to this state, and was arrested for the crime. After his incarceration in the Newark jail, he was shortly
brought before Judge Pennington, on a writ of habeas corpus. He was finally discharged by the judge, who was of
opinion, by the spirit of the treaty of 1783, that he was not answerable for the transaction.
Communipaw is a small settlement, consisting of 12 or 15 houses, facing the sea, on the shore, about 2 miles below
Jersey city; and inhabited principally by fishermen. It was very early settled by the Dutch; and its inhabitants
have long been noted tbr their tenacity to the customs of their ancestors. Washington Irving, in his history of
New York, humorously describes this place.
|
<urn:uuid:c78e3f7a-688b-4d1b-a4ab-999b64428b1e>
|
CC-MAIN-2014-10
|
http://history.rays-place.com/nj/bergen-tship.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999674642/warc/CC-MAIN-20140305060754-00072-ip-10-183-142-35.ec2.internal.warc.gz
|
en
| 0.981945 | 3,396 | 2.953125 | 3 |
Australia, we are in a waste crisis!
- Australia's waste is growing at TWICE the rate of its population
- Every MINUTE we produce 1 TONNE of plastic waste
- Every HOUR we throw out 36,000kg of clothes
- By 2050 there will be MORE PLASTIC in the ocean THAN FISH
Australia needs a waste system that is...
- The best possible system for all waste, for all Australians
- A clear system we have confidence in
Easy to use
- A system that makes it simple for all Australians to do the right thing
The things we throw out are not just waste, they came from somewhere and can be re-used to make something else. Plastics, batteries and textiles can all be re-made into new and useful things, but 91% of plastics, 97% of batteries and 96% of textiles end up in landfill.
Every Australian’s landfill bin is up to 40% food waste. In landfill, food waste rots and releases methane. Methane is a dangerous greenhouse gas – 28 times more potent than carbon dioxide. Per person, Australia is the worst emitter of greenhouse gases in the world – and our waste is one of the causes.
Every minute one garbage truck worth of plastic is dumped in the ocean. By 2050, there will be more plastic than fish in the ocean. We’ve all seen the heartbreaking trauma that happens when larger animals eat this waste, but the plastics also break down into more toxic micro-plastics that are easier for the fish we eat to ingest.
Scientists recently found plastics in human poo! Also, our e-waste like mobile phones end up in Southeast Asia, where people use fire or acid baths to get to the precious metals inside. These methods release toxins into the air and the water which kills off crops and makes people sick.
This is a big problem that needs big solutions. Individual actions just aren’t enough.
A lot of was happens before the products hit the shelves.
Did you know…
Craig Reucassel, on the ABC TV show War on Waste, showed us just how horrifying it is for farmers who have to watch perfectly good food get trashed because they don’t fit produce standards produced by the two big supermarket chains.
We often don’t have low waste options available...
How frustrating is it to need corn or zucchini, and find that they’ve been wrapped in plastic? Or to get a delivery of food and find in addition to your straw and take away cup you have a plastic bag, a bigger plastic bag, and a large paper bag to top it off?
There are a lot of things that could be repaired or recycled, but we don't have the services in Australia…
Hands up if you’ve thrown away a perfectly good mobile? We’re a can-do culture, but how many of us have thrown away a phone or TV when it stopped working as well as we wanted? Repair shops are shutting down as people find it easier and cheaper to just go get a new version.
Only 9% of soft plastics are recycled worldwide
Our recycling system is confusing, and even when we figure it out things don’t necessarily get recycled. And how much work is it? We have to clean them out, remember to pop them in the car, go to special places, and then not be sure that they’re ever going to end up as something useful, or whether they’ll just end up in landfill. (source)https://www.nationalgeographic.com/news/2017/07/plastic-produced-recycling-waste-ocean-trash-debris-environment/)
Reducing your waste in our current system can be HARD, and not available to everyone…
Sometimes it’s just not possible to be responsible for our waste. People living in apartments don’t have access to gardens for their food waste. People with disabilities need plastic straws. For many people, major supermarket chains are their only option for food shopping, which means they are buying a lot of plastic around their food.
Waste is much, much bigger than what we do as individuals
People often feel that waste is something they should feel guilty about, that we don’t do enough or could be better.
There is no way to solve this problem by fixing individual habits- change needs to come from the government and companies.
They need to carry the burden of sorting out our waste crisis. It’s important that we as a society figure out ways to really make use of the things we are done with, and also that we limit the amount of stuff (i.e. single use plastics) that enter the market in the first place.
We should be worried about Waste to Energy
Waste to Energy is seen as the solution to our waste crisis by both sides of politics, but there are reasons to be concerned. Craig Reucassel, from War on Waste, did a whole special on it for Foreign Correspondent.
This is not clean energy, and there are major health concerns- especially about burning plastic and other toxic substances. The Australian New Zealand Journal of Public Health said in 2019 that “community groups have legitimate cause for concern” about health impacts, which can include cancer, plastics in the bloodstream and birth defects.
It also looks like it will block better solutions. Waste to Energy plants need a lot of stuff to burn, and they contract with us for a long time (25 years is normal). We can get in trouble if we don’t give them what they’ve contracted for: local governments in the United States have been sued for not providing enough stuff.
Why would a local government work towards better solutions when they need that food and plastic waste to go towards their waste to energy contracts? Our society relies on use of single use packaging and very low levels of recycling. Waste to Energy gives us the impression we can keep on with business as usual, but in fact we need to make massive changes in how we make, consume and re-use resources.
If you want to get involved in this fight, Zero Waste Victoria is working closely with local governments and groups directly opposing projects. Contact Kirsty at [email protected].
The fight against plastic is the new fight against fossil fuels
Plastic is a huge problem. It smothers our oceans and poisons communities, and breaks down into tiny micro plastics that are now even in our poop. But it’s also almost invisible as a product- it’s in so many things, and seen as a necessary evil. We can try to be responsible with it, but even when we recycle it, only 9% of it ends up getting re-used.
We are flooded with plastics that can’t be recycled and have no where to go- so they end up in landfill, in our environment, or burnt.
So we have a big problem – there’s way too much plastic being produced. But why? It’s important to look at where it comes from – plastic is a by-product of the fossil fuel industry. It’s a way for them to use chemicals that aren’t needed for oil. And now, as the fossil fuel industry is slowly recognising that the tide of public opinion is against them, they are turning to plastics to save their industry. Indeed, they are expanding production – a 33% increase of plastic’s chemical ingredients by 2025. They are intending to put more plastics into a world that already is trying to manage too much.
Governments seem overwhelmed by the plastics problem. The most recent report from the Victorian government barely mentions it, and seems to have no plan for managing it. The federal government is more concerned with packaging, and making sure it is re-usable, recyclable & compostable, but there’s no mention of limiting how much we’re using.
We know that people care a lot about the damage that plastics do. And we know that people care about the damage that fossil fuel industry does. Now the opportunity is here- the fight against plastics is the fight against the fossil fuel industry. The Story of Plastic is a fantastic resource, and explains in a straightforward way the links between fossil fuel companies and plastics, and the impacts they’re having all over the world. It also offers you a way to get involved yourself, via Break Free from Plastic.
|
<urn:uuid:1befcc05-503d-4327-b6c7-91dce25fe44d>
|
CC-MAIN-2023-40
|
https://www.melbournefoe.org.au/waste
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511002.91/warc/CC-MAIN-20231002164819-20231002194819-00553.warc.gz
|
en
| 0.953916 | 1,781 | 2.984375 | 3 |
4.8 Examples, 94. 4.8.1 An inventory system, 94. 4.8.2 Round-robin queue, 97. Problems, 101. Computer assignments ...
30 Aug 2013 ... Assignment Front Sheet – HND Division - IDM Nations Campus. Learner name ... suggest a Computer System for Electricity board. T1.1 ... on 1.1 and give examples for vendors with a.
Edexcel BTEC Level 5 HND Diploma in Computing and Systems ... Progression opportunities and examples of qualifications within each level .... Project Design, Implementation and Evaluation. 5 ... Computer Games Design and Development.
Course #66614: Computer Operating Systems, Assignment 2. Due: part 1 ... The static data (for example n or m) are placed in page 3, each occupying .... Those are assignments that assign the value of the right hand side to the left hand side.
JAVA. ➢ Know the Operation of Computer systems ..... Demonstrat e using relevant examples concept of interrupt and masking. PC and. OHP ... Assessment : Give details of assignments to be used:.
Why do you need to understand computer systems if you do all of your programming in high level ... concepts on simple examples helps make the ideas more concrete. ... If you hand in an assignment.
spent k of your grace days. For example, if an assignment is due at 11:59pm on Thursday and you hand it in at noon on ...
the Australian school system, those returning to study after a break from formal education, .... Taking notes directly on computer is becoming increasingly popular. ... their assignments, they should read sample assignments and study the way ...
On the other hand Wallace Marshal states that "Artificial stupidity (AS) may be ... An expert system is a computer program that attempts to mimic human ... For example, the computer recognizes and.
Sample solutions to the assignment 3. ... A respected software engineer has said that no computer can ever be made ... other hand, system administrators need to know some of the information to build ...
IT and computer systems . ..... are always on hand. We expect our students .... assessment arrangements and deadlines for assignments and will .... private study – for example posting via social media –.
the assignment, for example: “All subjects were given a Banks Item Test (see Appendix 1).” – or – “All ... Do NOT justify the right-hand margin. ..... …and “ including data in computer systems, created.
Structure of Computer Systems – Laboratory No. 6. 1. 6. SEQUENTIAL ... This name is also useful for simulation, for example, to set a ... hand side of any signal assignment statement within the process);.
Install and manage a Computer system. ..... Assessment: Give details of assignments to be used: Coursework/ Assignments 20 %; Course ..... Understand the definition and scope of linear programming.
12 Feb 2013 ... Parallel Computer Systems (5DV011/VT13) ... On the other hand, such pictures are not very ... For example, the following PPM file specifies an image of size 1200 × 800 (i.e., 1200 ...
Give overview of the components of computer system. •. Explicate ... Assignment: It will need 2 Hrs for completing an assignment. 5. .... For example, insurance companies use mainframe computers.
9 Describe the role of each element in an information system .... shown in Figure 1-2, for example, computers process ..... management, note taking, project management, .... enough to hold in your hand.
This assignment will enable you to: ... system that can be used in conjunction with a PC to download MP3 files and record them to ... enormous amount of MP3 music and samples available free. The first ...
Lab & Homework Assignments ... For example, a byte is composed of 8 consecutive bits. 6. .... Hardware – the physical components that constitute the computer system, ..... On the other hand, many users find that they work more effectively with.
Department of Computer Science,. University ... gramming course consists of the programming assignments, typically in the form of ... and can be unreliable if attempted “by hand”. .... Many systems have, for example, two or more C compilers.
|
<urn:uuid:fee36bba-766d-4d81-aa54-dd529a331115>
|
CC-MAIN-2013-48
|
http://www.mybookezzz.org/hnd-computer-system-example-assignment/
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163816314/warc/CC-MAIN-20131204133016-00025-ip-10-33-133-15.ec2.internal.warc.gz
|
en
| 0.883753 | 886 | 2.734375 | 3 |
The Memorial Monument to the Centenary of Church Establishment in Eastern Taiwan is located in the Shiyusan Recreation Area in Chenggong Township, Taitung County. The monument mainly tells the story of the introduction of the Presbyterian Church to eastern Taiwan. At the end of the Qing period, Zhang Yuanchun, a follower from Aligang in Pingtung County, moved to Shiyusan and used holy water to heal Shiyusan chief’s asthma. He then established the Xun-Guang-Ao Church that was later known as the Shiyusan (Stone Umbrella) Church, and opened up the missionary history in eastern Taiwan.
At the end of the Japanese occupation, the Government-General in Taiwan vigorously promoted the imperialism movement, and so church services became secret gatherings. Later, the Xingang Church was established and took on the followers of the Shiyusan Church, and a monument was established in 1997 to commemorate it.
- - / -
- - - -
- - -/-
|
<urn:uuid:0dee4dec-ff7c-4d48-8fc7-844ae598c043>
|
CC-MAIN-2023-40
|
https://trail.tacp.gov.tw/en/ExploringHistoricTrails/antongtraversinghistorictrail/Attractions/176
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510462.75/warc/CC-MAIN-20230928230810-20230929020810-00840.warc.gz
|
en
| 0.965902 | 221 | 2.953125 | 3 |
Facelis retusa (Lam.) Sch. Bip. - Annual Trampweed
Family - Asteraceae
Flowering - March - June.
Habitat - Waste places, disturbed sites, roadsides, fields, lawns.
Origin - Native to South America.
Other information - This weedy little species can be found in scattered counties throughout Alabama. The plant is easy to identify becasue of its decumbent to ascending stems (which are floccose), and its revolute, mucronate leaves. The sessile flower heads are tucked amongst the leaves.
Photographs taken off Lee Rd 27, Auburn, AL., 5-27-05.
|
<urn:uuid:507f1450-8276-408e-ab8e-6583e41d9b22>
|
CC-MAIN-2017-30
|
http://alabamaplants.com/Greenalt/Facelis_retusa_page.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424079.84/warc/CC-MAIN-20170722142728-20170722162728-00400.warc.gz
|
en
| 0.864103 | 143 | 2.71875 | 3 |
Bouncing a Stream: The Kaye Effect
March 13, 2018
What's Going On Here?
Have you ever been in the shower, squirting some body wash or shampoo onto your hand, and noticed a "jet" shoot out of the blob? You're witnessing the Kaye effect, a bizarre bit of fluid dynamics that happens thanks to the soap's slippery nature and shear-thinning properties.
If you're a home science enthusiast, you're probably familiar with "shear-thickening" fluids like oobleck, the famous corn starch mixture that flows like a liquid until it's hit with a lot of force, when it firms up. Shear-thickening fluids are called "non-Newtonian" fluids, which means that properties like how easily they flow can change depending on the circumsmtances. Shear-thickening isn't the only kind of non-Newtonian fluid, however; there's also "shear-thinning".
If shear-thickening fluids get more solid when force is applied to them, you can probably guess what defines a shear-thinning fluid: Ordinarily, they flow slowly, with a lot of viscosity—but applying a force, we can thin them out. Ketchup is one of the most common examples of a shear-thinning fluid, which is why it's so hard to get out of a glass bottle. However, a lot of liquids have this property, including most liquid soaps. Blood is also a shear-thinning fluid, which is handy; when the heart contracts to pump blood through your body, the blood drops in viscosity, reducing the amount of stress this puts on your veins and arteries.
When the soap hits a surface from a great enough height, the force of the impact thins out the bottom layer, creating a thin coating that prevents the rest of the stream from coming in proper contact with the surface. If the surface is angled, this layer can dimple and create a "ramp" that redirects the fluid's momentum and turns a drizzling stream into a fountain-like jet! Part of the reason this works is because the attractive forces between the molecules in the liquid stream are stronger than the forces trying to stick the stream to the surface.
With a little patience, this phenomenon can be reproduced at home. The experts recommend pouring from a height of about eight inches onto an inclined surface, with a very thin stream—about half a millimeter—so a squeeze bottle will come in handy. Get messy and try it for yourself!
|
<urn:uuid:7bc146ab-0f3e-4a44-8cbf-91ca1beb3252>
|
CC-MAIN-2020-05
|
https://www.physicscentral.com/explore/pictures/kaye-effect.cfm
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250619323.41/warc/CC-MAIN-20200124100832-20200124125832-00369.warc.gz
|
en
| 0.941542 | 535 | 3.1875 | 3 |
What is Naturopathic Medicine?
Naturopathic medicine is primary care medicine. Receiving the same amount of training in the biomedical sciences as medical doctors,
a licensed naturopathic doctor is qualified to diagnose and treat medical conditions.
Naturopathic medicine is holistic medicine. Using natural therapies to improve health and address the root causes of disease, naturopathic doctors look at the whole person, not just the parts.
Naturopathic medicine is evidence-based and innovative. Naturopathic doctors draw from many spheres of knowledge, including clinical research and empirical evidence, as well as time-honored traditional healing practices.
Principles of Naturopathic Medicine
1. First Do No Harm:
Primum non nocere
The essential principle of medicine is to avoid harm, by taking into consideration both the short and long-term consequences of diagnostic methods and treatments, and by recognizing when harm could occur from lack of action.
2. The Healing Power of Nature:
Vis medicatrix naturae
Naturopathic medicine recognizes that the body is its own healer and has an ordered and intelligent self-healing process. Our role is to facilitate and invigorate that process by removing obstacles to healing and recovery and to promote self-healing by stimulating one’s innate vital force.
3. Discover and Treat the Cause:
The symptom is not the disease, but rather the harbinger of a system struggling to compensate from imbalances. Our goal is to uncover the deeper factors that are contributing to symptoms and to treat these underlying causes so that lasting improvements can occur.
4. Treat the Whole Person:
The patient is viewed as a whole, a physical being existing in mental, emotional, spiritual, social and ecological environments. Treating the whole also means being sensitive to the environment, recognizing that personal and planetary health are deeply intertwined.
5. The Physician is a Teacher:
The original meaning for the word ‘doctor’ is teacher. Ultimately it is our goal to educate our patients with knowledge and tools for self-care, health maintenance, and disease prevention.
6. Prevention is the best “cure”:
Preventative medicine is more than just screening exams and prophylactic medications. It is about understanding the many factors that are determining one’s health and thus contributing to either harmony or imbalance. Our goal is uncover and resolve imbalances before they become disease states, helping patients maintain and optimize their health in the process.
Enjoy high quality care without making trips to the office
If we were to hook you up to an electro-cardiograph machine and take a reading, that would make perfect sense to you, right?
What is actually happening during that procedure? Electrical energy from the heart is running over the wires. This electrical energy makes the electrocardiograph record the energy pattern in the form of a graph or chart. We could then study this graph and tell you what it all means.
In Nutrition Response Testing, instead of connecting electrodes to the specific points being tested, the practitioner contacts these points with his/her own hand. With the other hand, he/she will test the muscle of your extended arm. If the reflex being contacted is "active", the nervous system will respond by reducing energy to the extended arm and the arm will weaken and drop. This drop signifies underlying stress or dysfunction, which may be affecting your health.
So, What Can You Expect?
Tele-health appointments are incredibly flexible and effective. These “home visits” focus on delivering effective medical and counseling treatments via virtual, video and/or phone appointments. These platforms allow us to minimize the time and stress that a traditional office visit create on a busy person’s schedule. Enjoy being in the comfort of your own home while consulting with your naturopathic doctor on video chat. Don’t let a busy life prevent you from getting the care you need.
Dr. Scott speaks with patients all over the country on a daily basis. After reviewing your initial paperwork or reviewing your most recent nutritional protocol, Dr. Scott will discuss with you the issues that are of greatest concern and make appropriate recommendations based on your own unique health-related goals. He may recommend additional testing or other therapies such as massage, acupuncture or chiropractic care but will discuss that with you during your call.
If you or someone you know may benefit from establishing a telemedicine based healthcare, please contact us to schedule a complimentary 15 minute consultation.
We’ll have an in-depth discussion of your goals, health concerns and symptom history.
I’ll perform any relevant physical exam. We’ll discuss options for any diagnostic or functional medicine testing that may help in assessing your health.
GENERATING A PLAN:
We’ll create a written list of initial treatment recommendations
We’ll check in about how you are incorporating the treatment recommendations (ideally within 4 weeks of your initial visit.)
We’ll review any lab results in depth so you know what they mean.
We’ll adjust the plan based on any new information and add additional layers of treatment support.
30 to 60 minutes
We’ll make sure the treatment recommendations are working for you and that you’re on the path to improving your health. Visits can be monthly, quarterly, or at whatever interval you feel would be of most benefit to you.
DEEPENING & FINE-TUNING:
We’ll explore more facets of your health and adjust treatments as your healing progresses. If you encounter stumbling blocks, we’ll problem-solve it.
Who Can Benefit From A Telemedicine Appointment?
1. New and existing patients
|
<urn:uuid:1b5584cd-803e-4ebc-b8e1-69e598c6dcca>
|
CC-MAIN-2023-23
|
https://www.seacoastnhic.com/copy-of-nutrition-response-testing-1
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655027.51/warc/CC-MAIN-20230608135911-20230608165911-00341.warc.gz
|
en
| 0.926919 | 1,277 | 3.375 | 3 |
Lasers, Cameras and Particle Detectors: Mars Rover’s Super High-Tech Science Gear
- 11:55 AM
- Categories: Space
Assuming it safely passes through its terrifying and complex descent sequence, NASA’s newest rover, Curiosity, should get its wheels on the Martian surface in just two short days, at 10:32 p.m. Pacific on Aug. 5. The size of a small SUV, Curiosity is packed with 10 state-of-the-art instruments that will allow it to answer questions about Mars’ wet history, current atmosphere and climate, and the possibility of ancient or contemporary life.
Curiosity represents a scientific and engineering leap over the previous rovers, Spirit and Opportunity, and its nuclear-powered battery will allow it to rove day and night. Over the course of its two-year initial mission, the probe will climb up a 3-mile-high mountain in the middle of Gale Crater, poking, prodding, and drilling into the soil and rocks.
Here we take a closer look at the individual instruments that will help Curiosity make the next breakthrough discoveries about the Red Planet.
From the moment the rover hits the Martian atmosphere it will start taking data. Studded in 14 locations around the probe’s heat shield are devices known as the Mars Science Laboratory Entry Descent and Landing Instrument (MEDLI). This equipment will provide information about Mars’ atmosphere and the dynamics of the rover’s descent, analyzing Curiosity’s trip to the surface and providing information helpful in designing future Mars missions.
Additionally, a special camera, the Mars Descent Imager (MARDI) will be watching the view as the ground rushes up at Curiosity. By taking high-resolution color video during the probe’s landing sequence, MARDI will provide an overview of the landscape during descent and allow geologists back on Earth to determine exactly where Curiosity lands.
Possibly the coolest Curiosity instrument is the ChemCam, which uses a laser beam to shoot rocks (and maybe a Martian or two) in order to vaporize a small sample. A spectrograph will then analyze the vapor, determining the composition and chemistry of the rocks. Situated on Curiosity’s head, ChemCam can shoot up to 23 feet and should provide unprecedented detail about minerals on the Martian surface.
The Chemistry and Mineralogy (CheMin) instrument will look at various minerals on the Martian surface. Specific minerals form in the presence or in the absence of water, revealing the history of an area and helping scientists to understand whether or not liquid existed there. Curiosity will drill into rocks to obtain samples for CheMin, pulverizing the material and transporting it into the instrument’s chamber. CheMin will then bombard the sample with X-rays to determine its composition.
The Rover Environmental Monitoring Station (REMS) will be Curiosity’s weatherman, providing data about daily atmospheric pressure, wind speed, humidity, ultraviolet radiation, and air temperature. REMS will sit on Curiosity’s neck and also help assess long-term seasonal variation in Mars’ climate.
The Alpha Particle X-Ray Spectrometer (APXS) sits the end of Curiosity’s arm, allowing the rover to place it right up against rocks and soil. It will then shoot X-rays and alpha particles (essentially Helium nuclei) at the materials to identify how they formed.
The Sample Analysis at Mars (SAM) is one of the most important instruments and the reason that Curiosity can be called a mobile laboratory. Taking up more than half of the rover’s body, SAM contains equipment found in top-notch labs on Earth: a mass spectrometer to separate materials and identify elements, a gas chromatograph to vaporize soil and rocks and analyze them, and a laser spectrometer to measure the abundances of certain light elements such as carbon, oxygen, and nitrogen – chemicals typically associated with life. SAM will also look for organic compounds and methane, which may indicate life past or present on Mars.
The other experiment important in Curiosity’s search for Martian habitability is the Dynamic Albedo of Neutrons (DAN) instrument, which will look for water in or under the Martian surface. Water, both liquid and frozen, absorbs neutrons differently than other materials. DAN will be able to detect layers of water up to six feet below the surface and be sensitive to water content as low as one-tenth of a percent in Martian minerals.
Curiosity has plenty of eyes to take in the view on the ground. Perched atop its head is the MastCam, two cameras capable of taking color images and video, as well as stitching pictures together into larger panoramas. One of these two cameras has a high-resolution lens, allowing Curiosity to study the distant landscape in detail.
The Mars Hand Lens Images (MAHLI) instrument will provide close-up views of rocks and soil samples near the rover. MAHLI sits at the end of Curiosity’s long, flexible arm, and can image details down to about 12.5 micrometers, roughly half the diameter of a human hair. The instrument will also be able to see in ultraviolet light, which will come in handy during night exploration and funky psychedelic parties.
Rounding out Curiosity’s cameras are the hazard-avoidance Hazcams and navigation Navcams. The Hazcams will watch underneath the rover to prevent it from crashing into any large objects while the Navcams will be mounted on the rover’s mast to help it steer. Both camera sets will be capable of taking stereoscopic 3D images.
Future Mars missions may rely on data from the Radiation Assessment Detector (RAD). The first instrument that Curiosity fires up when it lands on Mars, RAD will measure radiation at the Martian surface, determining how plausible it is that microbes exist there. One of RAD’s main selling points is its ability to assess how safe or dangerous the Martian surface would be to future human explorers, calculating the radiation dose future astronauts may receive.
Images: 1) & 2) NASA/JPL-Caltech. 3) NASA/JPL-Caltech/LANL/J.-L. Lacour, CEA.
|
<urn:uuid:44c2e37f-ffab-4ecb-b105-1bb03c243fcd>
|
CC-MAIN-2013-20
|
http://www.wired.com/wiredscience/2012/08/instruments-mars-rover/
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368702448584/warc/CC-MAIN-20130516110728-00028-ip-10-60-113-184.ec2.internal.warc.gz
|
en
| 0.896796 | 1,295 | 3.640625 | 4 |
Want to bring more nature into your art?
Crayon, colored pencil, and marker holders are easy to make from reclaimed fallen branches. They organize your art supplies, make them visible while you work, and, if you’re creating with kids, display a manageable (and easy to clean up!) number of utensils that the kiddos can access independently. Here’s how to make one for yourself:
1. Saw up a fallen tree branch. Look for a wide branch to display a number of utensils, or a narrow one to hold just one or two special graphite pencils. To make your future wooden holder even roomier, consider cutting the wood slice at an angle, or even lengthwise down the branch.
Three to four inches is a good thickness for a wood slice–this will allow you to drill a hole a couple of inches deep without being afraid that you’ll drill through the bottom of your slice!
2. Find the correct drill bit. Measure the width of the crayon, colored pencil, or marker that you’d like to use with your holder, and choose a drill bit that is 1/16″ wider than that utensil.
3. Drill pilot holes. If you’d like a special pattern to your drilled holes, mark them in pencil. Then, clamp the wood slice firmly to your work surface, insert a narrow bit into your drill or Dremel and drill a pilot hole at each mark.
The drill bit that you’ll be using to drill the correctly-sized utensil holes will be pretty fat, and pilot holes will guide that drill bit so that it stays on course, keep the wood around the hole from cracking as you drill, and just generally make an easier job out of drilling through wood with that fat, unwieldy drill bit. It’s a step that you should NOT skip.
4. Drill your holes. Take a lot of care to hold the drill perfectly perpendicular to the wood slice, without letting the drill shift. If you accidentally make your holes wider at the top, then your utensils won’t stand up straight.
Drill down about 1″; the depth of each hole doesn’t have to be absolutely identical, because your colored pencils and crayons, at least, won’t take long to be worn down to different lengths, anyway, but you can always mark off one utensil as a depth guide, if you wish. Periodically insert the utensil into the hole until the line that you’ve marked on it for the correct depth is flush with the top of the wood slice.
5. Sand and seal. These holders work well as-is, but to make them especially nice, sand the top and bottom surfaces, then seal them with some homemade wood polish.
You’ll see in my photos that my kiddos are making their own crayon holders while I’m working, but this really isn’t the perfect project for a kid–the holes need to be placed and drilled very carefully, and drilling with a wide drill bit into wood can take some muscles. But if your kiddos are eager to participate (and who wouldn’t be, with power tools involved?!?), there’s a lot to be said for an assortment of tools and a generous supply of scrap wood.
5 CommentsLeave a Reply
5 Pings & Trackbacks
Pingback:Reclaimed Wood Craft Ideas | Care2 Healthy Living
Pingback:14 Beautiful Tree Branch Crafts | Care2 Healthy Living
Pingback:14 Wonderful DIY Crayon Holder Ideas - Easy Crafts for Kids - DIY & Crafts
Pingback:Awesome DIY Crayon Holder Projects for Kids - DIYCraftsGuru
Pingback:35+ Amazing DIY Wood Log Decoration Ideas For Your Home
|
<urn:uuid:4f74ca49-dc52-44b3-af77-18a02aa59914>
|
CC-MAIN-2023-23
|
https://craftingagreenworld.com/articles/how-to-diy-wooden-crayon-holder-or-marker-holder-or-colored-pencil-holder-from-a-fallen-tree-branch/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646652.16/warc/CC-MAIN-20230610233020-20230611023020-00621.warc.gz
|
en
| 0.904169 | 808 | 2.625 | 3 |
Those who read history or, for that matter, novels set in pre-Victorian times, know what highwaymen are. For others, let this definition found on the Internet suffice:
The idea of robbing people while they travel along roads is a very old one. In the Middle Ages there were plenty of outlaws ready to rob travellers. However the ‘golden age’ of highwaymen was the 17th century and 18th century. At that time trade and commerce were increasing and there were many well-to-do travellers. However Britain was still a pre-industrial country. The population was small and there were vast areas of forest and other countryside where highwaymen could lie in wait. The invention of the flintlock pistol early in the 17th century also made life easy for highwaymen. Furthermore Britain did not have a professional police force, which made it harder to catch them. The most dangerous roads where those around London.
In other words, a place where one was likely to be attacked by highwaymen was a heavily wooded stretch of road where no one could witness the crime, where police were scarce, and where the attackers could hide quickly before and after.
Such as the American Tobacco Trail in Durham, where the 14th reported attack of the year just took place (read the “Related News” articles as well). Greenways in general attract crime for reasons that seem to escape city planners but were evident to 17th century criminals as well as their 21st century counterparts.
|
<urn:uuid:1c4079ae-b80e-4e6a-b882-4dfb881e7785>
|
CC-MAIN-2014-15
|
http://lockerroom.johnlocke.org/2012/12/17/highwaymen/
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609537754.12/warc/CC-MAIN-20140416005217-00623-ip-10-147-4-33.ec2.internal.warc.gz
|
en
| 0.989803 | 306 | 3.21875 | 3 |
The Routledge Handbook of the History of the Middle East Mandates provides an overview of the social, political, economic, and cultural histories of the Middle East in the decades between the end of the First World War and the late 1940s, when Britain and France abandoned their Mandates. It also situates the history of the Mandates in their wider imperial, international and global contexts, incorporating them into broader narratives of the interwar decades. In 27 thematically organised chapters, the volume looks at various aspects of the Mandates such as:
- The impact of the First World War and the development of a new state system
- The impact of the League of Nations and international governance
- Differing historical perspectives on the impact of the Mandates system
- Techniques and practices of government
- The political, social, economic and cultural experiences of the people living in and connected to the Mandates.
This book provides the reader with a guide to both the history of the Middle East Mandates and their complex relation with the broader structures of imperial and international life. It will be a valuable resource for all scholars of this period of Middle Eastern and world history.
TABLE OF CONTENTS
part |127 pages
The Mandate states in the world
part |116 pages
part |139 pages
Mandate state-society interactions and societal action
|
<urn:uuid:9aa20c0b-ea5a-42c1-9def-a9c5eda0a23b>
|
CC-MAIN-2023-40
|
https://www.taylorfrancis.com/books/edit/10.4324/9781315713120/routledge-handbook-history-middle-east-mandates-andrew-arsan-cyrus-schayegh
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510238.65/warc/CC-MAIN-20230927003313-20230927033313-00217.warc.gz
|
en
| 0.870224 | 280 | 2.890625 | 3 |
|Home ▸ Catalog ▸ |Themes & Provenance| ▸ |Personifications| ▸ |Democracy||View Options: | | | |
Democracy (Demos - The People)
The image of Demos, the personification of the People, was used on ancient coinage as early as the 5th century BC. In Roman times, many towns under Roman domination struck pseudo-autonomous coinage depicting either the bust or head of Demos, or showed him standing with the emperor, Boule, or the Demos of another city. Here we will also include coins that depict personifications of the Senate, citizens councilman (boule), and elders (gerousia), and any coin that depicts voting.
|
<urn:uuid:c8f806bd-d44a-411e-9c78-624f29c91e7d>
|
CC-MAIN-2020-10
|
https://www.forumancientcoins.com/catalog/roman-and-greek-coins.asp?vpar=1996
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145500.90/warc/CC-MAIN-20200221080411-20200221110411-00457.warc.gz
|
en
| 0.94505 | 154 | 2.875 | 3 |
Technological Challenges andOpportunities of Three Generations of Distance Education Pedagogies Terry Anderson, PhD and Professor
Overview• Technological Determinism in Education and Training• Generations and Technologies of Distance Training Pedagogy• Type of Knowledge appropriate to each generation• Your Comments and Questions!
Values• We can (and must) continuously improve the quality, effectiveness, appeal, cost and time efficiency of the learning experience.• Student control and freedom is integral to 21st Century life-long education and learning.• Continuous Education opportunity is a basic human right
Learning as Dance (Anderson, 2008) • Technology sets the beat and the timing. • Pedagogy defines the moves.
Traditional TechnologyGenerations of Distance Education
Social Construction of TechnologyNetworked Education is, by definition, technologically mediated and thus is influenced by technological determinism.BUT….• Interpretative Flexibility – each technological artifact has different meanings and interpretations• Relevant Social Groups – many subgroups of users with different applications• Design Flexibility – A design is only a single point in the large field of technical possibilities• Problems and Conflicts – Different interpretations often give rise to conflicts between criteria that are hard to resolve technologically • (Wikipedia, Sept, 2009)Bijker, W. (1999). Of Bicycles, Bakelites and Bulbs: Towardsa Theory of Sociotechnical Change.
Three Generations of Distance Education Pedagogy1. Behaviourist/Cognitive – Self Paced, Individual Study2. Constructivist – Groups3. Connectivist – Networks and Collectives
1. Behavioural/Cognitive Pedagogies• “tell ‘em what you’re gonna tell ‘em,• tell ‘em• then tell ‘em what you told ‘em”Direct Instruction
Gagne’s Events of Instruction (1965)1. Gain learners attention2. Inform learner of objectives3. Stimulate recall of previous information4. Present stimulus material5. Provide learner guidance6. Elicit performance7. Provide Feedback8. Assess performance9. Enhance transfer opportunities Basis of Instructional Systems Design (ISD)
Enhanced by the “cognitive revolution”• Chunking• Cognitive Load• Working Memory• Multiple Representations• Split-attention effect• Variability Effect• Multi-media effect – (Sorden, 2005) “learning as acquiring and using conceptual and cognitive structures” Greeno, Collins and Resnick, 1996
Behaviourist/Cognitive Knowledge Is:• Logically coherent, existing independent of perspective• Largely context free• Capable of being transmitted• Assumes closed systems with discoverable relationships between inputs and outputs• Readily defined through learning objectives
LMS as primary B/C Teaching Tool• Secure – hackers, vandals• Robust• Custom designed for teaching• Simple, consistent and adopted• Supported and Integrated with other institutional systems• Tracking and recoding• Sophisticated (branching, printing, permissions)
New Developments in Behavioural/Cognitive Systems• Reflection Amplifiers• Social Indicators – Global feedback – Digital footprints – Archives – Competition and games• Multiple Representations• Student modeling and adaptation - analytics
Adaptivity in ubiquitous learning Extensive modelling of learner’s actions, interactions, “mood”, trends of preferences, skill & knowledge levels, implicit and explicit changes in skill & knowledge levels Real-time monitoring of learner’s location, technology use, and change of situational aspectsSlide 16
Open Student Models• “the learner model now plays a new role – not only can the learner contribute information to help increase the accuracy and therefore the utility of their learner model for adaptation purposes, but the model can also become a learning resource for the student in its own right. “ Susan Bull et al. 2007• removing the blindness that has to date prevented educators from viewing and learning directly from learner behaviours
1st International Conference on Learning Analytics and Knowledge 2011 Learning Analytics• Unlike traditional adaptive hypermedia and intelligent tutoring systems that work on a known closed corpus of material,• Learning analytics is used across multiple, unknown activities and interactions across the net, mining information about patterns of behaviour in order to extract useful information about learning which can then be applied to improve the experience.
Open Open Content and Open Educational ResourcesBecause it saves time and money!!!
Are you More than Your Content?• lack of motivation for distance education content developers to use OERs ??• Many DE developers and Faculty define themselves by the production of quality content – not by the consumption and customization of content created by others.
Technology in use to Create C/B contenDyck and Carey ID Model: specialized expertise team work division of labour
CB teams demand• Effective Project Management• Synchronous and asynchronous distributed communications• Archiving, and version control• Interoperability• Reuse• Distributed
Many ways that technologiesenhance production and learning of 1st generationCognitive/behaviourist pedagogy.
Constructivist Learning Pedagogy• New knowledge is built upon the foundation of previous learning• The importance of context• Errors and contradictions are useful• Learning as an active rather than passive process,• The importance of language and other social tools in constructing knowledge• Focus on negotiation, meta-cognition and evaluation as a means to develop learners’ capacity to assess their own learning• The importance of multiple perspectives - groups• Need for knowledge to be subject to validation and application in real world contexts – (from Honebein, 1996; Jonassen, 1991; Kanuka& Anderson, 1999)
Constructivist Knowledge is:• Learning is located in contexts and relationships rather than merely in the minds of individuals. Greenhow, Robelia & Hughes (2009), Kathy Sierra http://www.speedofcreativity.org/
Constructivist learning is Group Learning Providing -• Motivation• Feedback• Alternate and conflicting viewpoints
Why Groups?• “Students who learn in small groups generally demonstrate greater academic achievement, express more favorable attitudes toward learning, and persist …• small-group learning may have particularly large effects on the academic achievement of members of underrepresented groups and the learning-related attitudes of women…” • Springer; Stanne, & Donovan, (1999) P.42
Impact (Mean effect size) ofCooperative versus Individualistic Learning contexts Dependent Variable Achievement .64 -88 Interpersonal Attraction .67-82 Social Support .62-.83 Self-esteem .58- .67 Time on task .76 Attitudes towards task .57 Quality of reasoning .93 Perspective taking .61From Johnson and Johnson (1989).Cooperation and competition. Theory and research
Advances in Constructivist Learning Tools• Collaborative tools – Document creation, management, versioning – Time lines, calendars, – Strong notifications• Security, trust – hosting on institutional space? – Behind firewalls, away from search engines• Decision making and project management tools• Synchronous and asynchronous conversations/meetings
User Model & Adaptation for Groups:TRAC system “extract patterns and other information from the group logs and present it together with desired patterns to the people involved, so that they can interpret it, making use of their own knowledge of the group tasks and activities” (Perera, 2009).
Problems with Groups• Restrictions in time, space, pace, & relationship - NOT OPEN• Often overly confined by leader expectation and institutional curriculum control• Usually Isolated from the authentic world of practice• “low tolerance of internal difference, sexist and ethicized regulation, high demand for obedience to its norms and exclusionary practices.” Cousin & Deepwell 2005• “Pathological politeness” and fear of debate• Group think (Baron, 2005)• Poor preparation for Lifelong Learning beyond the course
Constructivist learning in Groups is necessary,but not sufficient for advanced forms oflearning.
3rd Generation - Networked Learning using Connectivist Pedagogy• Learning is building networks of information, contacts and resources that are applied to real problems.
Connectivist Learning Principles George Siemens, 2004• Learning is a process of connecting specialized nodes or information sources.• Learning may reside in non-human appliances.• Capacity to know is more critical than what is currently known.• Nurturing and maintaining connections is needed to facilitate continual learning.• Ability to see connections between fields, ideas, and concepts is a core skill.• Currency (accurate, up-to-date knowledge)is the intent of all connectivist learning activities.
Networks add diversity to learning“People who live in the intersection of social worlds are at higher risk of having good ideas” Burt, 2005, p. 90
Connectivist Learning is Emergent• the very uncertainty and lack of predictability of learning outcomes will be the key factor that adds value to a learning community• emergent systems will provide the necessary triggers to enhance knowledge and understanding• emergent learning will be one of the critical triggers to unleash individual creativity (Kays& Sims, 2006,p. 411)
Connectivist Learning designs Connection forming Selection FilteringAwareness and Contribution and Receptivity Involvement Reflection and Metacognition Pettenati, M. (2007).
Special Issue of IRRODL onConnectivism coming Feb. 2011Free Subscriptions at www.irrodl.org
Networks Communities of Practice• Distributed• Share common interest• Mostly self organizing• Open – Learning beyond the course• No expectation of meeting or even knowing all members of the Network• Little expectation of direct reciprocity• Contribute for social capital building, altruism and a sense of improving the world/practice through contribution.• Increases exposure to the adjacent possible (Brown and Duguid, 2001)
Transparency, Persistence• “shared awareness allows otherwise uncoordinated groups to begin to work together more quickly and more effectively (forming networks)” Clay Shirky 2008 p. 162• “adjacent possibilities” Stuart Kaufman – ideas sufficiently close geographically or conceptually to propel adoption
How do we Build Networks of Practice ?• Motivation – learning plans, self and net efficacy, net-presence, modeling and exposure• Structural support – Exposure and training – Transparent systems – Wireless access, mobile computing• Cognitive skills – content + procedural, disclosure control• Social connections, reciprocity – Creating and sustaining a spiral of social capital building • Nahapiet&Ghoshal (1998)
What does the Research literature have to say about Networked Learning? • Most reports by early adopters and innovators with potential bias • As always in education, too few studies and especially too few focusing on learning outcomes. • Tremendous variation in learning context • “The question on whether the use of wikis can improve learners outcome such as writing ability is unresolved” Hew & Cheung, 2009
Challenges of Connectivist Learning Models• Privacy• Control• Dealing with disruptive change• Institutional Support• Sustaining motivation and commitment
Connectivism Connects Formal and Informal• Selwyn, 2009 examined the log activity of over 900 UK undergraduates to identify their use of Facebook appears to – a space where the role conflict that students experience in their relationships with university work, teaching staff, academic conventions and expectations can be worked through in a relatively closed backstage area. – So rather than enhancing directly participation in formal learning, the social networking services to help learners develop, reflect upon and share their identify grow and conflicts.• “positive relationships between intensity of Facebook use and students life satisfaction, social trust, civic engagement, and political participation” Ellison Steinfield&Lampe 2007.
2010 Survey of 125 US learning and training leaders - CARA
Recommendations for teachers• Be as fearless as your students.• Seek out or create opportunities to collaborate with and learn from your peers.• Develop your own personal learning system• Explore, experiment and have fun
Conclusion• Behavioural/Cognitive models are useful for memory and conceptual knowledge acquisition.• Constructivist models develop group skills and trust.• Connectivist models introduce networked learning and are foundational for lifelong learning in complex contexts• 21 Century Literacys and skills demand effective use of all three pedagogiesAnderson & Dron (in press) 3 generations of DE Pedagogy. InternationalReview of Research in Distance and Open Learning (IRRODL)
Slides available at http://www.slideshare.net/terrya/iodl-icem-2010Your comments and questions most welcomed! Terry Anderson firstname.lastname@example.org Blog: terrya.edublogs.org
Wiki Research• Shifts in the students’ perspectives regarding learning processes from more traditional individualism to collective knowledge construction and ownership. – Lund, 2008 – high school• Turget (2009) – 1) improvement in the students’ writing skills; – 2) improvement in the students’ sharing of ideas, critical feedback, and confidence; and – 3) greater motivation to participate in the activities.
• Greenhow,(2008) University of Minnesota College of Education survey study.• "Students using networking systems are: – developing a positive attitude towards using technology systems, – editing and customizing content and thinking about online design and layout. – sharing creative original work like poetry and film and – practicing safe and responsible use of information and technology. – ……the Web sites offer tremendous educational potential.”
Social Networking benefits outside of the classroom• Qualitative study of low income US students• “Our findings reveal that SNSs – facilitated emotional support, relational maintenance and – provided a platform for self-presentation where students could “be more relaxed” , “mess around,” and perform on their own terms with the social, cultural, and technical tools at their disposal. – Students used their online social network to fulfill essential social learning functions, meeting a range of interpersonal needs, including validation and appreciation of creative endeavors, peer support from current and former classmates, and targeted help with school-related tasks. Greenhow, & Robelia (2009) Old Communication, New Literacies: Social Network Sites as Social Learning Resources. Journal of Computer-Mediated Communication 14(4)
Should you ‘Friend’ your Students on• “Any teacher who links to a student on MySpace or Facebook is an ABSOLUTE FOOL!!!!!” see discussion at Doug Johnson’s blog”• “This is how students communicate today and if were not Tweeting, texting, emailing, commenting, then were not communicating with our students” Principal Chris Lehman• “The School Principal just Friended me” blog by 11 year old Ador Svitak
Importance of this issue• Educational challenges are not met through evangelism, threats or technologies alone.• Change happens when teachers, administrators and learners make it happen – Perceived benefits – Personal – Readiness - Organizational – Pressure – Inter-organizational • Chwelos; Benbasat; Dexter, 2001)• Each of us is an agent of change
"He who asks a question is a fool for five minutes; he who does not ask a question remains a fool forever.” Chinese ProverbYour comments and questions most welcomed! Terry Anderson email@example.com Blog: terrya.edublogs.org
|
<urn:uuid:4d258fe8-d497-4b4f-9075-46f6801e2ea1>
|
CC-MAIN-2017-43
|
https://www.slideshare.net/terrya/hub-de-summit-sydney
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824819.92/warc/CC-MAIN-20171021133807-20171021153807-00475.warc.gz
|
en
| 0.870767 | 3,196 | 3.140625 | 3 |
Repeat an event or an appointment.
You must first select the item to be repeated by moving inside the appointment
panel. Then invoke the repeat command, and you will be asked you to select a
simple or advanced repetition. A simple repetition will lead you to a set of
three questions with which you specify the basic repetition characteristics:
o type: choose between a daily, weekly, monthly or yearly base period
o frequency: choose the interval between base periods. '1' means every day
(week, month or year), '2' means every other day (week, ...).
For example, if you want to remember an anniversary, choose a
yearly type with a frequency of 1, which means it will be
repeated every year. Another example: if you go to a restaurant
every second day, choose a daily type with a frequency of 2.
o until date: specifies a day after which the repetitions do not occur. To
indicate an endless repetition, enter 0 (zero) or RETURN, and
the item will be repeated forever.
For an advanced repetition you may, in addition to the basic characteristics,
specify three lists of either days of the week, months of the year or days of
the month. The three lists modify the simple repetition in some way by either
limiting or expanding the basic pattern.
o Weekdays: abbriviated names of days of the week (as they appear above
the calendar). For monthly or yearly repetitions the name may
have a numerical prefix (1, 2, ... or -1, -2, ...) to specify
a particular weekday of the month or year, counted from either
the start or the end of the month or year.
o Months: the numerical name of a month (1, 2,..., 12).
o Monthdays: the numerical name of a day of the month (1, 2,..., 31) or the
opposites (-1, -2,..., -31) which count from the end of the
For each list you may enter one or several values separated by spaces. The
prompt for the list gives a hint as to the format. If you enter '?' only, you
get very terse, context dependent information as to the effect on the
repetition. Note that both format and effect depend on the basic type. The
combined effect on the basic type of the listed days and months is derived
from the iCalendar specification (RFC5545).
Briefly, a weekday or monthday limits the repetitions of type daily, but
expands those of type weekly, monthly and yearly. For example, with 'Weekdays'
set to 'Sat Sun' a daily type (with frequency one) is only repeated on
Saturdays and Sundays (two instead of seven repetitions per week), while a
weekly type is also repeated on the extra day (two instead of one repetition
Similarly, a month limits the repetitions of type daily, weekly and monthly,
but expands those of type yearly. For example, with 'Months' set to '3 10', a
weekly type is only repeated in March and October, while a yearly type is also
repeated in the extra month (two instead of one yearly repetition).
Mnemonic. If the list type (day or month) is shorter than the basic type (day,
week, month, year), it expands the repetitions of the basic type, if not, it
There are a some important exceptions, though, for 'Weekdays':
o For a monthly type, the expanded repetitions are special: a weekday with a
prefix expands to that particular weekday of the month ('3Mon' = third
Monday), while a weekday without prefix expands to all weekdays of the
month ('Wed' = all Wednesdays). Furthermore, repetitions are limited if
'Monthdays' is also set (for example, if 'Weekdays' is set to 'Fri' with
'Monthdays' set to '13', the monthly repetition occurs only on Friday 13th).
o For a yearly type, the expanded repetitions are special and depend also on
the setting of 'Months'. A weekday with a prefix expands to that particular
weekday of the year ('-1Sun' = last Sunday of the year), or, if 'Months' is
also set, to that weekday of the listed months. A weekday without prefix
expands to all weekdays ('Thu' = all Thurdays in either the year or listed
months). Furthermore, repetitions are limited if 'Monthdays' is also set
as for monthly type.
When you are finished setting up the repeating item, you may test it
interactively with the 'next' command, a subcommand of the generic command
(default ': n'). Invoked with a repeating item selected in the appointments
panel, it will go to the next repetition. By doing this repeatedly, you may
step through the repetitions one by one.
If you edit an item that is already repeating, you will be led through all six
characteristics and can modify any of them.
Here are some typical examples. It is assumed that you have invoked the repeat
command on what will become the first repetition and have selected an advanced
repetition, that your date input format is dd/mm/yyyy, and that your language
o an event that occurs every Tuesday and Thursday forever
weekdays: Tue Thu
monthdays: (not possible)
o an event that occurs on workdays except in July forever (holidays are not
taken into account)
weekdays: Mon Tue Wed Thu Fri
months: 1 2 3 4 5 6 8 9 10 11 12
o an appointment that occurs on the first and last Monday of the month forever
weekdays: 1Mon -1Mon
o an appointment that occurs on all Wednesdays in June and July until the
end of June 2022
months: 6 7
o an event that occurs when Daylight Saving Time begins in the EU (last
Sunday in March)
o an event that occurs on the penultimate day of February forever
For an example that is not possible to specify consider an event that occurs
on the last workday of each month.
|
<urn:uuid:2c7a07e5-e43a-4a6c-a333-5cd4dd6d120c>
|
CC-MAIN-2020-34
|
http://git.calcurse.org/calcurse.git/tree/doc/repeat.txt?id=bd238bfd7c443fd974f5b7edd6c1abc0349bfa78
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439735812.88/warc/CC-MAIN-20200803140840-20200803170840-00204.warc.gz
|
en
| 0.875376 | 1,319 | 2.640625 | 3 |
Useful gardening infomation
Spinach requires a soil pH of 6.0 - 6.5 and will not grow well if pH is below 6.0. Indications of possible soil pH problems include poor seed germination, yellowing and browning of the margins and tips of seedling leaves, browning of roots, and generally slow growth or death of the plants. If soil pH is too high, leaves may show a generalized yellowing or chlorosis.
Spinach is adapted to a range of soil types, from light and sandy to silty clay loams. In heavier soils, spinach should be grown on raised beds to improve drainage for the shallow-rooted plants. Seedling damping off can be reduced by use of raised beds. After seeding, the soil should be kept uniformly moist. When irrigating the garden, apply water in the morning so that the foliage is dry before dark. Apply sufficient water to moisten the soil to a depth of six inches. A uniform supply of soil moisture is required to produce high quality, tender spinach.
Spinach growth starts slowly and then accelerates during the
final 21 days before harvest. If a soil test has not been
taken, broadcast 5-10-10 fertilizer at 30 pounds per 1,000
square feet before planting. Spinach should be side-dressed
once during the growing season with ammonium nitrate at 1 pound
per 100 feet of row or calcium nitrate at 2 pounds per 100 feet
of row. A total of approximately 150 lb/A of actual N is
recommended, usually applied 1/2 preplant and 1/2 as a
broadcast application 3-4 weeks after seeding. Spinach requires
fairly high boron (B). Most soils in Nebraska supply adequate
boron for spinach. Spinach plants can become stunted with dark
roots and small, flattened, yellow leaves when boron is
deficient. An application of 1 pound of boron (10 lb/A of
borax) broadcast before seeding should eliminate the problem in
subsequent years. NEVER use boron unless needed and then only
in the recommended amounts. Boron is highly toxic to many other
garden plants including snap beans, cucumbers, peas and
Emergence rate varies depending upon soil temperature; time from planting to harvest also is highly temperature dependent. Generally, most varieties can be harvested 45 to 50 days after planting. Spinach can be harvested from the time the plants have five to six leaves until just before seedstalk formation.
Informative articles found on the web:
Health Benefits of Spinach
3310 Whale |
Smooth dark green elongated leaf, short upright habit, uniform baby type, ( harvest young for baby leaf, mature for regular spinach ) summer harvest, 53 days.
$2.95 per 2.5g pack ( about 250 seeds )
3429 Razzle Dazzle Hybrid
3405 Unipack 151
3316 Oriental Giant
F1, Fast grower, giant smooth arrowhead shape leaf, twice as big as others, huge yield, rich mild flavor, crunchy, resists mildew, 50 days.
This item is currently out of stock, if you would like to be notified by E-mail when it becomes available again, simply enter your E-mail address in the field below and hit "Submit".
1A014 New Zealand Spinach ( Spinach Substitute )
Note: The price of this item has been slashed to Ninety Five cents per pack! To order this and fifty other vegetable seed selections for only 95 cents per pack, please visit our GoodCentsVegetables Seed List. )
|
<urn:uuid:431853ed-5896-4938-b5eb-5ed59f11bc94>
|
CC-MAIN-2013-48
|
http://www.seedman.com/spinach.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164036653/warc/CC-MAIN-20131204133356-00036-ip-10-33-133-15.ec2.internal.warc.gz
|
en
| 0.887209 | 769 | 3.1875 | 3 |
I was very skeptical when I first heard of supposed dark chocolate health benefits.
Claims ran from cutting the risk of cardiovascular disease by 50%, reducing the risk of stroke , Alzheimer’s and Diabetes and my favorite: Improving the cognitive abilities in mentally impaired elderly people as well as improving their verbal fluency. It all seemed far-fetched and just wishful thinking.
Yet each one of these claims (and more!) are backed by scientific papers.
How It All Works
In one 2012 review of 20 different studies, it was shown that daily consumption of dark chocolate lowered peoples blood pressure by 2 to 3 points. This could help explain how it improves vascular function.
The reason could be that the microbes in your intestines ferment the chocolate into small anti-inflammatories that can be absorbed into the bloodstream. These anti-inflammatory compounds act much like aspirin in that they reduce ‘clumping’ of blood platelets. An abnormal blood clot can be fatal if it blocks a blood vessel, causing heart attack or stroke. Eating dark chocolate can reduce this risk it seems.
The above conclusion was based on recent research presented at the 247th National Meeting and Exposition of the American Chemical Society (ACS). The researchers tested their theory in a lab built intestine. They approximated the upper human digestive tract quite effectively, using human fecal matter! The feces contained dark chocolate eaten by the volunteers the night before.
The microbes in the experiment feasted on what was left of the cocoa after its passage through the mock digestive tract. They then fermented the compounds ( flavonols that include the substance catechin and epicatechin ) into smaller anti-inflammatories that could be absorbed by the bloodstream. These became the aspirin-like compounds.
These anti-inflammatory compounds act much like aspirin in that they reduce ‘clumping’ of blood platelets.
An abnormal blood clot can be fatal if it blocks a blood vessel, causing heart attack or stroke. Eating dark chocolate can reduce this risk it seems.
REDUCES BLOOD PRESSURE
Further, the flavonols in dark chocolate could stimulate the lining of the arteries to produce Nitric Oxide (NO). One of the functions of NO is to relax the arteries which, in turn, reduces blood pressure.
But even if a small decrease in blood pressure is caused, it is beneficial.
Another controlled study showed a significant decrease in oxidized LDL cholesterol in men.”Oxidized” LDL cholesterol means that it’s very reactive and capable of damaging other tissues such as the lining of your arteries.
Because cocoa has lots of powerful anti-oxidants, it follows that it’s able to protect against oxidative damage. It does this by increasing HDL (good cholesterol).
IMPROVES BLOOD FLOW
Telmo Perreira of the Department of Cardiopneumology at Superior College of Health Technology in Portugal has found that dark chocolate gives a very obvious improvement in blood flow even in young, healthy adults.In his study, a group of healthy 20 year olds were given around 8 grams (1 small square) of 70% cocoa chocolate each day for a month. The group saw their respective arterial flows increase from an average of 14% to 23% ( LINK ).
DIABETESAND INSULIN RESISTANCE
Cocoa has also been shown to improve insulin sensitivity – again from the anti-oxidants produced by intestinal microbes.
Recently published research in ‘Endocrine Abstracts’ showed that polyphenols in chocolate improved insulin sensitivity even in people who did not have diabetes!
The researchers say the results they got imply health benefits of dark chocolate might delay or even prevent the onset of diabetes or pre-diabetes.
This is not to suggest, though, that chocolate is a substitute for prescribed medication.
GOOD FOR THE GUT
It appears that cocoa might be good for the gut itself, actually stimulating the production of healthier microbes in the colon.
PROTECTS YOUR TEETH!
Who would have thought that a candy could protect your teeth? But 70% dark chocolate contains a substance called Theobromine. This has been shown to harden tooth enamel, which means that unlike other sweet, dark chocolate actually lowers the risk of getting cavities – as long as you brush your teeth regularly.
Flavonols in dark chocolate can actually protect your skin against sun damage and improve blood flow to the surface giving you a healthy glow.
It can also increase the thickness and density of your skin as well as the moisture. [LINK]
One study of healthy people showed that 5 days of eating high flavonol cocoa improved blood flow to the brain .
The substance phenylethylamine (PEA), the same chemical your brain releases when you’re in love, is found in dark chocolate. PEA stimulates your brain to release endorphins (feel good hormones). So it follows that eating dark chocolate can increase your sense of well being and happiness.
ADVICE ON CHOOSING CHOCOLATE
You want to choose chocolate very high in cocoa – 70% or more.It’s usually stated clearly on the label that it contains 70% cocoa. This type of chocolate is quite bitter, but can quite easily become an acquired taste.Just be aware that the above experiments and studies were based on the consumption of 70% or more dark chocolate.
Milk chocolate or Mars Bars will NOT give these benefits! The flavonols are stripped out of them to make way for the sweeter taste.
Dark chocolates do contain calories so it’s best not to over-indulge. The above study subjects were given small amounts – a square or 2 per day. So it’s not necessary to eat more that this.
If you’ve never had dark chocolate before, you’re probably in for a wonderful taste surprise! You may not like it straight away, especially if you’re a fan of the milkier, sweeter varieties, but do persist. In time you might find that it’s the taste you prefer!
|
<urn:uuid:4af5030e-4282-4247-aa40-feb2abb04047>
|
CC-MAIN-2017-43
|
http://noacidity.com/dark-chocolate-health-benefits-theyre-really-not-too-good-to-be-true/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823360.1/warc/CC-MAIN-20171019175016-20171019195016-00559.warc.gz
|
en
| 0.939198 | 1,265 | 2.671875 | 3 |
In this topic series on media skills for scholars, we have focused on using digital media to communicate your research and measure your online impact. But what about researching digital media itself?
Digital scholarship has quickly become a major area of study in the social sciences. Studying such an interactive, dynamic and ever-changing field can be challenging, but fortunately for researchers, there is often a record. As with most social science research, digital research usually falls into either the quantitative or qualitative camp. Endless debates have pitted the two approaches against each other but, as with the great peanut butter – chocolate debate, they can go great together!
Ethnographic content analysis is a hybrid methodology that draws from both of these approaches and is very adaptable to the digital field. Ethnographic content analysis, or ECA for short, was developed by media scholar David Altheide in the late 1980s to study television news coverage of the Iran hostage crisis from 1979-1981. He argued that while conventional quantitative-focused content analysis is useful for revealing patterns and big-picture information, it leaves out room for more the nuanced interpretations that qualitative methods elicit.
Typically, content analysis is a linear, step-wise projection from data collection to analysis to interpretation, while an ethnographic approach is reflexive and circular. Aiming to meet in the middle, ECA is “systematic and analytic, but not rigid” (Altheide 1987). As with conventional content analysis, information is organized by categories and sub-categories, but with an ethnographic approach, other categories are “allowed and expected to emerge throughout the study.” As any qualitative researcher will tell you, the most interesting findings are often the unexpected ones.
For example, in reviewing TV news coverage, Altheide noticed that while the hostages’ families were a part of the story from the beginning, they became more prominent over time. This had to do, in part, with media access. Families were often willing to be extensively interviewed on camera, and a group of families formed a quasi-organization with articulate spokespeople. Had he not been analyzing data qualitatively as well as quantitatively, he likely would have missed these contextual factors that shaped and influenced TV coverage, or there may not have been a place for this interpretation to “fit” in a conventional content analysis.
The digital field offers so much data, both quantitative and qualitative, and ECA is a highly effective approach for handling both of these. For example, I studied personal blogs written by women with Multiple Sclerosis. Gathering quantitative data, such as the number, frequency and length of posts; images and multimedia; and examining blog architecture demonstrated patterns of activity, topical themes, and design choices, and gave me an overall sense of my sample. I then selected a subset of posts to analyze in more depth, paying closer attention to not just what bloggers wrote about but how they wrote about: Was their blog more information-focused or personal? What was the “tone” of their writing (humorous? serious? what did they complain about?)? Did they write about everyday life or significant events?
Looking at the focus of their blogs revealed that the bloggers saw themselves as having different “roles.” For example, some considered themselves as translators of complex medical information for a general audience. They felt a responsibility to make sure the information was reliable and were diligent about citing sources and providing links.
Looking at the tone of their writing (the how), and not just the content (the what) demonstrated that there were different narratives, some that conformed to social expectations about how a personal with serious illness should act (i.e. putting on a sunny face) and some that challenged these expectations and took an activist stance.
I also reexamined and interpreted images and graphics. Some bloggers posted pictures of themselves, their families, and their pets, and provided ways to contact them, while others were not as forthcoming in these ways, indicating varying levels of comfort with a public identity.
The ECA I conducted was the first phase of a three-part mixed method study, which also included a survey and online discussion forum. The information I gathered helped me craft the subsequent survey and discussion questions and guide the rest of the study. The results served as a foundation to which I returned again and again during data analysis. As I found, ECA is a well-rounded and adaptable research method for the digital field, which can be used both on its own and in tandem with other methods.
Peanut Butter – Chocolate; Chocolate – Peanut Butter. Either way, they work well together.
This post was written by Collette Sosnowy (@SOsnowyNYC). She has a Ph.D. in psychology from the CUNY Graduate Center and is the Project Manger for JustPublics@365. She likes both chocolate AND peanut butter.
|
<urn:uuid:7e7fe34b-f84f-4642-abe7-0a10e40c326a>
|
CC-MAIN-2017-39
|
https://justpublics365.commons.gc.cuny.edu/07/2014/using-hybrid-methods-study-digital-media/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818695113.88/warc/CC-MAIN-20170926070351-20170926090351-00105.warc.gz
|
en
| 0.967289 | 1,002 | 2.734375 | 3 |
Are you a cat lover? Have you ever had the pleasure of hearing a Siamese cat meow? If not, get ready to be amazed. Siamese cats are known for their distinctive vocalizations that distinguish them from other felines. They are often referred to as “the talking cats” because they love communicating with their human companions. But have you ever wondered if Siamese cats meow differently than other cats? Well, wonder no more because the answer is a resounding yes.
Siamese cats are famous for being particularly talkative. Their loud, insistent meows are almost reminiscent of a crying baby’s wail. These chatty felines even seem to have their own language at times, using chirps, trills, and yowls to convey their messages.
But what makes Siamese cats’ meows so different from those of other breeds? The answer lies in their genetics. Siamese cats possess a genetic mutation that affects the temperature-sensitive pigmentation in their coats. This same mutation also impacts the neurons in their vocal cords, resulting in their unique meows and vocalizations.
If you’re curious about learning more about these fascinating creatures and their extraordinary meows, keep reading. We’ll delve deeper into how they communicate and why they’re so special.
- 1 How Do Siamese Cats Vocalize?
- 2 The History of the Siamese Breed
- 3 Personality Traits that Contribute to Siamese Vocalizations
- 4 Why Do Siamese Cats Meow Differently Than Other Breeds?
- 5 Are Siamese Cats Talkative?
- 6 What Does it Mean When a Siamese Cat Meows?
- 7 Tips for Understanding Your Siamese Cat’s Meows
- 8 Adopting a Siamese Cat – Considerations and Advice
- 9 Conclusion
How Do Siamese Cats Vocalize?
Siamese cats are renowned for their talkative nature, and their unique vocalization sets them apart from other breeds. These feline friends produce a range of sounds, including meows, yowls, chirps, and trills.
Perhaps the most distinguishable feature of a Siamese cat’s vocalization is their loud and demanding meow. Their strong voice carries over long distances and serves as an effective means of communication with their owners. Siamese cats meow more frequently and with greater intensity than other breeds.
When unhappy or dissatisfied with something, Siamese cats will use their piercing yowl as a form of protest or annoyance. This vocalization can be quite alarming and may leave you scrambling to figure out what is causing your furry friend distress.
In contrast, when content and relaxed, Siamese cats produce chirping sounds accompanied by purring. These chirps are a sign that your cat is happy and excited about something.
Additionally, Siamese cats can trill in a high-pitched noise similar to a bird’s chirp. This unique sound is often associated with happiness and affection, indicating that your cat is enjoying your company.
Siamese cats’ distinctive way of vocalizing can be traced back to their breeding history in Thailand, where they were highly valued for their vocal abilities. Early breeders selectively bred cats with particularly loud and distinctive meows, which helped establish the breed’s signature voice. Moreover, their personality plays an essential role in their vocalization as they are highly social and demand attention from their owners.
The History of the Siamese Breed
The Siamese breed is a true feline icon, with a fascinating history that spans centuries and continents. From its origins in Thailand to its introduction to the Western world, the Siamese cat has played an important role in both Thai culture and modern society.
The Siamese breed is believed to have originated in Thailand, where it was considered a sacred animal and was kept exclusively by royalty and Buddhist monks. The first recorded evidence of the Siamese breed dates back to the 14th century, when a manuscript called “Tamra Maew” (Cat Poems) was written. This manuscript describes the physical characteristics and behavior of the Siamese cat, as well as its importance in Thai culture.
In the late 19th century, British Consul-General Owen Gould brought a pair of Siamese cats named Pho and Mia to England as a gift for his sister. These cats quickly became popular among British aristocracy and were eventually brought to America, where they gained even more popularity and became one of the most sought-after cat breeds.
Over time, the Siamese breed has undergone several changes in appearance and personality. In the early 20th century, the Siamese had a more rounded head and body. However, in the 1950s and 60s, breeders began selectively breeding for a more slender body and wedge-shaped head. This resulted in the modern Siamese cat that we know today – with its distinctive pointed coat, bright blue eyes, and vocal personality.
But while the Siamese breed may have changed over time, its importance has remained constant. In Thailand, Siamese cats were believed to bring good luck and were often given as gifts to visiting dignitaries. Today, they remain one of the most beloved cat breeds in the world, known for their striking appearance, talkative nature, and affectionate personalities.
Personality Traits that Contribute to Siamese Vocalizations
These feline companions are known for their loud, demanding, and even musical meows. But what exactly causes Siamese cats to meow differently than other cat breeds? As an expert on this topic, I can tell you that personality traits play a significant role in these vocalizations.
Firstly, Siamese cats are highly social and attention-seeking. They crave interaction with their owners and will often meow to get their attention. Their intelligence and curiosity also contribute to their vocalizations, as they are constantly exploring their environment and trying to communicate with those around them.
In addition to these traits, Siamese cats possess a strong sense of assertiveness. They are confident and will not hesitate to express their wants and needs through their vocalizations. When a Siamese cat wants something, they will make sure their voice is heard loud and clear.
But what truly sets Siamese cats apart is their unique vocal structure. Their vocal cords are shorter and more flexible compared to other cat breeds, allowing them to produce a wider range of sounds. From chirps to yowls, Siamese cats can create an array of different sounds that are sure to catch your attention.
Overall, if you’re considering adopting a Siamese cat, be prepared for a talkative and interactive companion. Their social nature, intelligence, assertiveness, and vocal structure all contribute to their distinctive meows and yowls. Here’s a breakdown of each personality trait that contributes:
- Highly social and attention-seeking
- Intelligent and curious
- Unique vocal structure with shorter, more flexible vocal cords
Why Do Siamese Cats Meow Differently Than Other Breeds?
You might be curious about what sets this breed apart from others. As an expert on the subject, let me tell you all about why Siamese cats meow differently.
Firstly, these felines have a genetic mutation that affects the size and shape of their larynx. This organ is responsible for producing sound in mammals, and in Siamese cats, it’s smaller and more pointed than in other breeds. As a result, their meows are higher-pitched and more intense, making them impossible to ignore.
But genetics isn’t the only factor at play here. Siamese cats are also known for their outgoing nature, love of attention and affectionate personalities which result in frequent communication with their owners via their vocalization style. Their intelligence and natural curiosity also make them more likely to vocalize their thoughts and feelings.
Moreover, environmental factors can also influence a Siamese cat’s meowing style. If they grow up in a household with lots of people talking and interacting or noisy surroundings, they may develop a louder and more demanding meow to ensure they’re heard over the noise.
Are Siamese Cats Talkative?
If you’re looking for a feline companion that’s talkative and expressive, look no further than the Siamese cat. Renowned for their unique and loud meows, Siamese cats are not only talkative but also have a wide range of vocalizations to communicate with their owners.
One of the reasons why Siamese cats are so vocal is due to a genetic mutation that affects their vocal cords, resulting in a more high-pitched and intense meow compared to other breeds. But it’s not just their meows that make them stand out – Siamese cats are also outgoing and social creatures that love attention and human interaction.
Their meows serve as a means of communication, whether they want food, playtime, or simply some company. However, it’s not all about being demanding or attention-seeking. Siamese cats use different tones and pitches to convey their emotions, whether they’re happy, sad, frustrated, or content.
It’s worth noting that not all Siamese cats are equally talkative, and some may be more reserved than others. But as a breed, Siamese cats are known for their vocal nature and their ability to communicate effectively with their owners.
What Does it Mean When a Siamese Cat Meows?
Known for their vocalizations, Siamese cats are one of the most talkative breeds out there, using their meows to express a range of needs and desires.
Firstly, it’s important to note that Siamese cats are highly social animals and crave attention from their owners. Meowing is a way for them to communicate with us, whether it be for food, playtime, or cuddles. Therefore, when our Siamese cat meows at us, it’s usually because they want something from us.
However, not all meows are created equal. Each Siamese cat has its own unique voice and way of communicating. Some may have a more high-pitched or nasal meow, while others may have a deeper, throatier meow. Additionally, they may use different tones and inflections in their meows to convey different messages.
For example, a soft, melodic meow may indicate contentment or affection, while a loud, insistent meow may signal hunger or frustration. It’s up to us as owners to learn to interpret our cat’s various meows and respond accordingly.
By paying attention to our Siamese cat’s vocalizations and responding appropriately, we can strengthen the bond between ourselves and our furry friend. After all, communication is key in any relationship.
Tips for Understanding Your Siamese Cat’s Meows
Firstly, pay attention to the tone of your Siamese cat’s meow. Siamese cats have a unique tone that can convey different emotions. A high-pitched meow could mean they are happy or excited, while a low-pitched meow could indicate discomfort or pain. By paying attention to their tone, you can better understand what your Siamese cat is trying to communicate.
Secondly, observe your cat’s body language. Your Siamese cat’s body language can provide valuable clues about what they are trying to communicate. If your cat is meowing with an arched back and puffed fur, it may be feeling threatened or scared. On the other hand, if your cat is relaxed and purring while meowing, it may be expressing contentment.
Thirdly, learn the different types of meows that Siamese cats use to communicate. Siamese cats have a range of meows that can indicate different things. A short, sharp meow could mean they want attention or food, while a long, drawn-out meow could mean they are feeling lonely. By learning these different types of meows, you can better understand what your Siamese cat is trying to tell you.
Fourthly, respond appropriately to your Siamese cat’s meows. Once you understand what your cat is trying to communicate, respond accordingly. If they are meowing for attention, give them some love and affection. If they are hungry, make sure to feed them. Meeting their needs will strengthen the bond between you and your furry friend.
Lastly, spend time interacting with your Siamese cat and observing their behavior. With patience and time, you will learn to decode the meaning behind their vocalizations. Understanding your Siamese cat’s meows is crucial for maintaining a strong bond with your pet. By paying attention to their vocalizations and body language, you can better understand their needs and wants.
Adopting a Siamese Cat – Considerations and Advice
If you’re considering adopting a Siamese cat, you’re in for a unique and rewarding experience. These feline companions are known for their unique personalities and vocalizations, making them a favorite among cat lovers. However, before bringing one home, it’s important to consider certain factors to ensure that you can provide them with the care and attention they require.
First and foremost, Siamese cats are highly social and intelligent animals that thrive on interaction with their human companions. They require daily playtime and mental stimulation, as well as regular grooming to keep their coats healthy and shiny. This means that if you’re looking for a low-maintenance pet, a Siamese cat may not be the best fit for you.
It’s also important to consider if a Siamese cat is the right fit for your household. They are known for their loud meows, which can be heard from quite a distance. While some people find this charming, others may prefer a quieter environment. Additionally, Siamese cats are very vocal and demanding of attention, which can make them unsuitable for households with young children or other pets if they become jealous or anxious.
Choosing where to adopt from is also important. It’s crucial to go with a reputable breeder or rescue organization that can provide you with a healthy and well-socialized animal. Take the time to learn about the breed’s unique characteristics and needs in order to provide the best possible care for your new companion.
In summary, adopting a Siamese cat can be an incredibly rewarding experience for the right person or family. Just be sure to carefully consider all of the factors involved before making your decision. With proper care and attention, your new feline friend will undoubtedly bring years of joy and companionship into your life. Here are some key points to keep in mind:
In conclusion, Siamese cats are a breed that stands out from the crowd with their unique vocalizations. These felines have a reputation for being “the talking cats” due to their loud and insistent meows, chirps, trills, and yowls. The reason behind this distinctiveness lies in a genetic mutation that affects the temperature-sensitive pigmentation in their coats and impacts the neurons in their vocal cords.
Moreover, personality traits such as social nature, intelligence, curiosity, assertiveness, and a unique vocal structure with shorter and more flexible vocal cords all contribute to their distinctive meows. Understanding your Siamese cat’s meows is crucial to building a strong bond with them. By paying attention to their vocalizations and body language, you can better understand their needs and wants.
Adopting a Siamese cat requires careful consideration of various factors such as daily playtime and mental stimulation requirements, grooming needs, household suitability, and choosing a reputable breeder or rescue organization. Therefore it is essential to do thorough research before bringing one home.
Overall, adopting a Siamese cat can be an incredibly rewarding experience for those who can provide them with the care and attention they require. With proper care and attention, your new feline friend will undoubtedly bring years of joy and companionship into your life.
|
<urn:uuid:de540c1d-231c-4a25-bea6-7b4629c609fe>
|
CC-MAIN-2023-40
|
https://www.21cats.org/do-siamese-cats-meow-different/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506480.7/warc/CC-MAIN-20230923094750-20230923124750-00395.warc.gz
|
en
| 0.961376 | 3,400 | 3.03125 | 3 |
GuatemalaMap Page 1136
Area 67,661 square mi (108,890 square km)
Capital Guatemala City
Highest Point 13,815 ft (4,211 m)
Lowest Point 0 m
GDP per capita $3,900
Primary Natural Resources petroleum, nickel, rare woods.
THE REPUBLIC OF GUATEMALA is located in Central America and is bordered by the Pacific Ocean, the Gulf of Honduras, otherwise known as the Caribbean Sea, and four countries (El Salvador, Honduras, Belize, Mexico). The total length of the borders is about 1,296 mi (2,087 km), and the landscape is largely mountainous, with a limestone plateau. The two coastal areas are very narrow. Latino and Amerindian are the two major ethnic groups in Guatemala.
The mountainous areas of Guatemala are home to over 30 volcanoes. Many volcanoes are still active and this area experiences occasional earthquakes and volcanic eruptions. The Caribbean coastline is very narrow and beaches are nonexistent, while the Pacific coastline is characterized by black-sand beaches. Guatemala is intensely cultivated and agriculture employs 50 percent of the workforce; some people work on sugarcane and banana plantations. Guatemala also features the Peten RAINFOREST, which is an archaeological treasure where many dinosaur bones can be found in the soil. However, the existence of the Peten rainforest, located within the interior of Guatemala, is being threatened as trees are being cut down. Soil erosion and water pollution also pose a great concern for the environment. Guatemala has a tropical climate that varies with elevation. The country’s coastal regions are generally hot throughout the year, with usual temperatures reaching up to 100 degrees F (38 degrees C). The summer seasons are hot and humid, while winters are warm and dry. These regions are susceptible to hurricanes and other tropical storms. The highlands are generally wet and cloudy during the summer, and the temperatures are not as hot as in the coastal regions because of the higher elevation. The climate in the Petén rainforest is mostly wet year-round. Summers are hot while winters are warm. There is a brief dry season from February to April. The rainforest is home to a variety of wildlife, which is in danger because of deforestation. The quetzal, the national bird, is almost extinct. Pumas, jaguars, ocelots, deer, tapir, and margay are among many of the animals living there.
|
<urn:uuid:249fb377-cb3e-473f-86b0-2b57f6adb30c>
|
CC-MAIN-2014-35
|
http://world-geography.org/north-america/282-guatemala.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500820886.32/warc/CC-MAIN-20140820021340-00255-ip-10-180-136-8.ec2.internal.warc.gz
|
en
| 0.947522 | 507 | 3.390625 | 3 |
Lathes are often called “the original powertool” of the world, with origins stemming back thousands of years to Ancient Egyptian times. These lathes were operated by two people, with one person turning the axis of the lathe, and the other using a sharp tool to carve into the workpiece on the lathe. The two-person lathe eventually became popular in Ancient Greece as well. These lathes were revolutionary for the time, but inherently flawed. After all, it would be pretty exhausting for a person to turn the axis of the lathe, even for a short period of time.
Around 1500 A.D., foot pedals powered by a treadle and flywheel allowed for a single person to operate the lathe by pressing down on the foot pedals while using two hands to chisel and sculpt. This allowed operators to work more efficiently, and have total control over the spinning speed of the lathe. The foot-pedal lathes took on many forms and sizes, and were a catalyst for increased manufacturing during the Industrial Revolution.
Today, lathes are almost exclusively motorized, with a number of speed and control settings, and are used for a variety of objects like pottery, blown glass, and hand-crafted jewelry. These lathes can be automated for mass manufacturing, and sometimes incorporate large blades and lasers more powerful and precise results.
|
<urn:uuid:011d2222-67c2-4475-b7d6-776e3872a3b4>
|
CC-MAIN-2023-23
|
https://www.davesrailings.com/blog/lathes-and-their-role-in-railing-systems
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646350.59/warc/CC-MAIN-20230610200654-20230610230654-00267.warc.gz
|
en
| 0.97051 | 278 | 3.59375 | 4 |
Friday, September 26, 2008
NASA images @ Internet Archive
I am sure most web users are familiar with the Internet Archive website...the huge repository of of books, music, films, and old websites. Now the Internet Archive has joined NASA to archive thousands of NASA photographs.
Here is the press release from NASA:
David E. Steitz
Headquarters, Washington July 24, 2008
NASA AND INTERNET ARCHIVE LAUNCH CENTRALIZED RESOURCE FOR IMAGES
WASHINGTON -- NASA and Internet Archive, a non-profit digital library based in San Francisco, made available the most comprehensive compilation ever of NASA's vast collection of photographs, historic film and video Thursday. Located at http://www.nasaimages.org, the Internet site combines for the first time 21 major NASA imagery collections into a single, searchable online resource. A link to the Web site will appear on the http://www.nasa.gov home page.
The Web site launch is the first step in a five-year partnership that will add millions of images and thousands of hours of video and audio content, with enhanced search and viewing capabilities, and new user features on a continuing basis. Over time, integration of http://www.nasaimages.org with http://www.nasa.gov will become more seamless and comprehensive.
"This partnership with Internet Archive enables NASA to provide the American public with access to its vast collection of imagery from one searchable source, unlocking a new treasure trove of discoveries for students, historians, enthusiasts and researchers," said NASA Deputy Administrator Shana Dale. "This new resource also will enable the agency to digitize and preserve historical content now not available on the Internet for future generations."
Through a competitive process, NASA selected Internet Archive to manage the NASA Images Web site under a non-exclusive Space Act agreement, signed in July 2007. The five-year project is at no cost to the taxpayer and the images are free to the public.
"NASA's media is an incredibly important and valuable national asset. It is a tremendous honor for the Internet Archive to be NASA's partner in this project," says Brewster Kahle, founder of Internet Archive. "We are excited to mark this first step in a long-term collaboration to create a rich and growing public resource."
The content of the Web site covers all the diverse activities of America's space program, including imagery from the Apollo moon missions, Hubble Space Telescope views of the universe and experimental aircraft past and present. Keyword searching is available with easy-to-use resources for teachers and students.
Internet Archive is developing the NASA Images project using software donated by Luna Imaging Inc. of Los Angeles and with the generous support of the Kahle-Austin Foundation of San Francisco.
For more information about NASA and agency programs, visit:
For more information about Internet Archive, visit:
The image repository
|
<urn:uuid:3cfab08c-a612-4124-a42f-3e8188362837>
|
CC-MAIN-2017-39
|
http://philosophyofscienceportal.blogspot.co.nz/2008/09/nasa-images-internet-archive.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818687324.6/warc/CC-MAIN-20170920142244-20170920162244-00313.warc.gz
|
en
| 0.841007 | 586 | 2.953125 | 3 |
- About Hunger
- How to End Hunger
- Our Impact
- Get Involved
The federal budget is statement of who we are as a nation. It is more than a financial document. It is a moral one. “For where your treasure is, there your heart will be also” (Matthew 6:21). This applies to nations as well as people.
While the federal government’s budget may sound boring or overwhelming with its unfathomable numbers, it’s too important to ignore when it comes to ending hunger.
The federal budget provides Congress and the president with the single greatest opportunity to shape our country’s priorities. The choices made about how the nation generates revenues and spends its shared resources should promote hope, opportunity, and economic security for all people, especially those struggling to put food on the table. As Christians, we believe that a moral measure of our federal budget is how it treats those whom Jesus called “the least of these” (Matthew 25:45).
Our government spends about 11 percent of its budget on domestic programs that assist low-income individuals (excluding health care and Social Security). Less than one percent of the federal budget goes toward international poverty-focused development assistance.
These policies and programs have produced tremendous gains in terms of nutrition, infant mortality, and children’s health care. Internationally, hunger has decreased over the last two decades. The number of people receiving anti-retroviral medicines to treat HIV/AIDS in developing countries increased tenfold to almost 3 million people in the last six years. Since 1990, more than 1 billion people gained access to clean water. When targeted and given the proper resources, these programs can work.
During budget negotiations, Congress too often looks to some of our most effective anti-hunger programs for places to cut. But it’s in the federal budget where many priorities are sharply put into focus. This is where Bread annually focuses its advocacy.
Hunger and food insecurity add at least $160 billion a year to U.S. healthcare costs.
By Jordan Teague
Because the world has made so much progress against hunger in recent decades, those who face hunger, malnutrition, and extreme poverty are increasingly likely to live in areas currently experiencing or recovering from crises. They are the hardest to reach and the most...
Improving nutrition not only alleviates human suffering, but also improves the conditions that create poverty in the first place. For every $1 invested in...
A brief examination of the biblical approach to health as a hunger issue.
Includes an introduction to the issue, a Scriptural reflection, practical actions you can take, and a prayer.
In this issue: Another Great Year for Bread; Catholics Begin Observance of Holy Year of Mercy; Serving on ‘God’s Wave Length’ for 39 Years; and more.
A wide array of the nation’s faith leaders have come together on the eve of Pope Francis’ arrival in the United States to commit ourselves to encourage our communities to work for the end of hunger by 2030 and, toward that end, for a shift in U.S. national priorities.
We are deeply pleased...
A set of how-to sheets for carrying out advocacy and fact sheets on the current issues Bread for the World is working on.
For new and current Bread grassroots hunger activists.
Ideal as a starter toolkit for new Bread activists or as a set of updates for current activists.
Learn more about the principles that Bread for the World supports regarding health reform.
Estados Unidos es una nación de inmigrantes. A través de su historia gente de todas partes del mundo se han trasladado aquí y han contribuido en sus comunidades y a nuestra vida nacional. Hoy, al igual que en el pasado, los inmigrantes continúan creando prosperidad y enriquecimiento para esta...
|
<urn:uuid:3fea1a77-3a8f-4895-af58-6403c1046d5f>
|
CC-MAIN-2017-39
|
http://www.bread.org/us-federal-budget
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689775.56/warc/CC-MAIN-20170923175524-20170923195524-00091.warc.gz
|
en
| 0.892714 | 833 | 3.046875 | 3 |
Anguished Scientists Eavesdrop on the Death Throes of 41 Giants Who Lost Their Way
Save the whales" has become a trendy enough slogan for cartoonist Garry Trudeau to make cruel fun of it in his Doonesbury strip. But conservationists' efforts have finally paid off. Earlier this month the International Whaling Commission voted to bar factory ships (those that process whales onboard) from harvesting all but the small minke whale in 1980. But commercial whalers, who this year will kill the leviathans at the rate of one every 34 minutes—for cosmetics, cat food and transmission oil—are not the animals' only enemy. Last week 170 pilot whales swam ashore at Grand Bank, Newfoundland and died. Not long before, on the Florence, Oreg. beach pictured here, 41 stranded sperm whales met a similar fate.
It took an agonizing two days for them to die. A team of scientists, who had flown in (most at their own expense) from as far away as Florida, could only watch—and listen to the sounds of death. Some of the scientists thought the 12-to-25-ton whales were trying to communicate with one another. "We couldn't get them back into the water," said Bruce Mate, assistant professor of oceanography at Oregon State and coordinator of the team, "and we couldn't figure out a humane way to put them out of their suffering. It would have taken gallons of chemical poisons, which we did not have."
The incident did afford a rare chance to gather data on the imperiled sperm whale. It is one of nine giant species, several of which have been dangerously depleted. An estimated 2.5 million whales once roved the oceans; half now remain.
The stranding, said Mate, was "the first time that scientists had arrived in time to study the animals while they were still alive—or dead but not decayed." The researchers worked up to 22 hours a day, using special whalers' knives to speed the dissection—and collect evidence for an inquiry into what led the creatures onto the beach.
"It was horrible," Mate said.
"People tend to think of scientists as coldhearted, but everybody there was struck by what was happening. We were totally helpless."
On Newsstands Now
- Matthew McConaughey: The Time of My Life!
- 45 Pages of Oscar!
- The Pistorius Trial: Why Did He Kill Her?
Pick up your copy on newsstands
Click here for instant access to the Digital Magazine
|
<urn:uuid:f1d51f69-5a79-4573-a9bf-ae668b5499cf>
|
CC-MAIN-2014-10
|
http://www.people.com/people/article/0,,20074219,00.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394021724521/warc/CC-MAIN-20140305121524-00052-ip-10-183-142-35.ec2.internal.warc.gz
|
en
| 0.972727 | 524 | 2.71875 | 3 |
Individual differences |
Methods | Statistics | Clinical | Educational | Industrial | Professional items | World psychology |
History of the study of attentionEdit
Prior to the founding of psychology as a scientific discipline, attention was studied in the field of philosophy. Due to this, many of the discoveries in the field of Attention were made by philosophers. Psychologist John Watson cites Juan Luis Vives as the Father of Modern Psychology due to his book De Anima et Vita in which Vives was the first to recognize the importance of empirical investigation. In his work on memory, Vives found that the more closely one attends to stimuli, the better they will be retained.
Psychologist Daniel E. Berlyne credits the first extended treatment of attention to philosopher Nicolas Malebranche in his work "The Search After Truth". "Malebranche held that we have access to ideas, or mental representations of the external world, but not direct access to the world itself." Thus in order to keep these ideas organized, attention is necessary. Otherwise we will confuse these ideas. Malebranche writes in "The Search After Truth", "because it often happens that the understanding has only confused and imperfect perceptions of things, it is truly a cause of our errors.... It is therefore necessary to look for means to keep our perceptions from being confused and imperfect. And, because, as everyone knows, there is nothing that makes them clearer and more distinct than attentiveness, we must try to find the means to become more attentive than we are". According to Malebranche, attention is crucial to understanding and keeping thoughts organized.
Philosopher Gottfried Wilhelm Leibniz introduced the concept of apperception to this philosophical approach to attention. Apperception refers to "the process by which new experience is assimilated to and transformed by the residuum of past experience of an individual to form a new whole." Apperception is required for a perceived event to become a conscious event. Leibniz emphasized a reflexive involuntary view of attention known as exogenous orienting. However there is also endogenous orienting which is voluntary and directed attention. Philosopher Johann Friedrich Herbart agreed with Leibniz's view of apperception however he expounded on it in by saying that new experiences had to be tied to ones already existing in the mind. Herbart was also the first person to stress the importance of applying mathematical modeling to the study of psychology.
It was previously thought in the beginning of the 19th century that people were not able to attend to more than one stimulus at a time. However with research contributions by Sir William Hamilton, 9th Baronet this view was changed. Hamilton proposed a view of attention that likened its capacity to holding marbles. You can only hold a certain amount of marbles at a time before it starts to spill over. His view states that we can attend to more than one stimulus at once. William Stanley Jevons later expanded this view and stated that we can attend to up to four items at a time .
During this period of attention, various philosophers made significant contributions to the field. They began the research on the extent of attention and how attention is directed.
This period of attention research took the focus from conceptual findings to experimental testing. It also involved psychophysical methods that allowed measurement of the relation between physical stimulus properties and the psychological perceptions of them. This period covers the development of attentional research from the founding of psychology to 1909.
Wilhelm Wundt introduced the study of attention to the field of psychology. Wundt measured mental processing speed by likening it to differences in stargazing measurements. Astronomer's in this time would measure the time it took for stars to travel. Among these measurements when astronomers recorded the times, there were personal differences in calculation. These different readings resulted in different reports from each astronomer. To correct for this, a personal equation was developed. Wundt applied this to mental processing speed. Wundt realized that the time it takes to see the stimulus of the star and write down the time was being called an "observation error" but actually was the time it takes to switch voluntarily one's attention from one stimulus to another. Wundt called his school of psychology voluntarism. It was his belief that psychological processes can only be understood in terms of goals and consequences.
Franciscus Donders used mental chronometry to study attention and it was considered a major field of intellectual inquiry by authors such as Sigmund Freud. Donders and his students conducted the first detailed investigations of the speed of mental processes. Donders measured the time required to identify a stimulus and to select a motor response. This was the time difference between stimulus discrimination and response initiation. Donders also formalized the subtractive method which states that the time for a particular process can be estimated by adding that process to a task and taking the difference in reaction time between the two tasks. He also differentiated between three types of reactions: simple reaction, choice reaction, and go/no-go reaction.
Hermann von Helmholtz also contributed to the field of attention relating to the extent of attention. Von Helmholtz stated that it is possible to focus on one stimulus and still perceive or ignore others. An example of this is being able to focus on the letter u in the word house and still perceiving the letters h, o, s, and e.
One major debate in this period was whether it was possible to attend to two things at once (split attention). Walter Benjamin described this experience as "reception in a state of distraction." This disagreement could only be resolved through experimentation.
|“||Everyone knows what attention is. It is the taking possession by the mind, in clear and vivid form, of one out of what seem several simultaneously possible objects or trains of thought. Focalization, concentration, of consciousness are of its essence. It implies withdrawal from some things in order to deal effectively with others, and is a condition which has a real opposite in the confused, dazed, scatterbrained state which in French is called distraction, and Zerstreutheit in German.||”|
James differentiated between sensorial attention and intellectual attention. Sensorial attention is when attention is directed to objects of sense, stimuli that are physically present. Intellectual attention is attention directed to ideal or represented objects; stimuli that are not physically present. James also distinguished between immediate or derived attention: attention to the present versus to something not physically present. According to James, attention has five major effects. Attention works to make us perceive, conceive, distinguish, remember, and shorten reactions time.
During the period from 1910-1949, research in attention waned and interest in behaviorism flourished. It is often stated that there was no research during this period. Ulric Neisser stated that in this period, "There was no research on attention". This is simply not true. In 1927 Jersild published very important work on "Mental Set and Shift". He stated, "The fact of mental set is primary in all conscious activity. The same stimulus may evoke any one of a large number of responses depending upon the contextual setting in which it is placed". This research found that the time to complete a list was longer for mixed lists than for pure lists. For example, if a list was names of animals versus a list with names of animals, books, makes and models of cars, and types of fruits, it takes longer to process. This is task switching.
In 1931, Telford discovered the psychological refractory period. The stimulation of neurons is followed by a refractory phase during which neurons are less sensitive to stimulation. In 1935 John Ridley Stroop developed the Stroop Task which elicited the Stroop Effect. Stroop's task showed that irrelevant stimulus information can have a major impact on performance. In this task, subjects were to look at a list of colors. This list of colors had each color typed in a color different from the actual text. For example the word Blue would be typed in Orange, Pink in Black, etc.
Example: Blue Purple Red Green Purple Green
Subjects were then instructed to say the name of the ink color and ignore the text. It took 110 seconds to complete a list of this type compared to 63 seconds to name the colors when presented in the form of solid squares. The naming time nearly doubled in the presence of conflicting color words, an effect known as the Stroop Effect.
In the 1950s, research psychologists renewed their interest in attention when the dominant epistemology shifted from positivism (i.e., behaviorism) to realism during what has come to be known as the "cognitive revolution". The cognitive revolution admitted unobservable cognitive processes like attention as legitimate objects of scientific study.
Modern research on attention began with the analysis of the "cocktail party problem" by Colin Cherry in 1953. At a cocktail party how do people select the conversation that they are listening to and ignore the rest? This problem is at times called "focused attention", as opposed to "divided attention". Cherry performed a number of experiments which became known as dichotic listening and were extended by Donald Broadbent and others. In a typical experiment, subjects would use a set of headphones to listen to two streams of words in different ears and selectively attend to one stream. After the task, the experimenter would question the subjects about the content of the unattended stream.
Broadbent's Filter Model of Attention states that information is held in a pre-attentive temporary store, and only sensory events that have some physical feature in common are selected to pass into the limited capacity processing system. This implies that the meaning of unattended messages is not identified. Also, a significant amount of time is required to shift the filter from one channel to another. Experiments by Gray and Wedderburn and later Anne Treisman pointed out various problems in Broadbent's early model and eventually led to the Deutsch-Norman model in 1968. In this model, no signal is filtered out, but all are processed to the point of activating their stored representations in memory. The point at which attention becomes "selective" is when one of the memory representations is selected for further processing. At any time, only one can be selected, resulting in the attentional bottleneck.
This debate became known as the early-selection vs late-selection models. In the early selection models (first proposed by Donald Broadbent), attention shuts down (in Broadbent's model) or attenuates (in Triesman's refinement) processing in the unattended ear before the mind can analyze its semantic content. In the late selection models (first proposed by J. Anthony Deutsch and Diana Deutsch), the content in both ears is analyzed semantically, but the words in the unattended ear cannot access consciousness. This debate has still not been resolved.
In the 1960s, Robert Wurtz at the National Institutes of Health began recording electrical signals from the brains of macaques who were trained to perform attentional tasks. These experiments showed for the first time that there was a direct neural correlate of a mental process (namely, enhanced firing in the superior colliculus).Template:Nonspecific
In the mid-1970s, multiple resource models were put forth. These studies showed that it is easier to perform two tasks together when the tasks use different stimulus or response modalities than when they use the same modalities. Michael Posner did research on space-based versus object-based approaches to attention in the 1980s. For space-based attention, attention is likened to that of a spotlight. Attention is directed to everything in the spotlight's field.
Anne Treisman developed the highly influential feature integration theory. According to this model, attention binds different features of an object (e.g., color and shape) into consciously experienced wholes. Although this model has received much criticism, it is still widely cited and spawned similar theories with modification, such as Jeremy Wolfe's Guided Search Theory.
In the 1990s, psychologists began using PET and later fMRI to image the brain in attentive tasks. Because of the highly expensive equipment that was generally only available in hospitals, psychologists sought for cooperation with neurologists. Pioneers of brain imaging studies of selective attention are psychologist Michael I. Posner (then already renowned for his seminal work on visual selective attention) and neurologist Marcus Raichle. Their results soon sparked interest from the entire neuroscience community in these psychological studies, which had until then focused on monkey brains. With the development of these technological innovations neuroscientists became interested in this type of research that combines sophisticated experimental paradigms from cognitive psychology with these new brain imaging techniques. Although the older technique of EEG had long been used to study the brain activity underlying selective attention by cognitive psychophysiologists, the ability of the newer techniques to actually measure precisely localized activity inside the brain generated renewed interest by a wider community of researchers. The results of these experiments have shown a broad agreement with the psychological, psychophysiological and the experiments performed on monkeys.
- ↑ 1.0 1.1 1.2 1.3 Johnson, Addie (2004). Attention: Theory and Practice, 1–24, United States of America: SAGE Publications.
- ↑ Malebranche, Nicolas (1674). The Search After Truth, 411–412.
- ↑ Runes, Dagobert D. (ed.), Dictionary of Philosophy, Littlefield, Adams, and Company, Totowa, NJ, 1972.
- ↑ James, W. (1890). The Principles of Psychology. New York: Henry Holt, Vol. 1, pp. 403-404.
- ↑ Jersild A.T. (1927). Mental set and shift. Archives of Psychology(Whole No. 89, pp.5–82)
- ↑ Harré, Rom. Cognitive science: A philosophical introduction. London: SAGE Publications, 2002. ISBN 0-7619-4746-9.
- ↑ Understanding cognition by Peter J. Hampson, Peter Edwin Morris 1996 ISBN 0-631-15751-4 page 112
- ↑ Understanding cognition by Peter J. Hampson, Peter Edwin Morris 1996 ISBN 0-631-15751-4 pages 115–116
- ↑ (1963). Attention: some theoretical considerations. Psychological Review 70: 80–90.
- ↑ (1972). The primate superior colliculus and the shift of visual attention.. Invest. Ophthalmol. 11: 441–450.
- ↑ (1980). A feature-integration theory of attention. Cognitive Psychology 12 (1): 97–136.
- ↑ (1994). Guided search 2.0: a revised model of visual search. Psychonomic Bulletin Review 1 (2): 202–238.
|This page uses Creative Commons Licensed content from Wikipedia (view authors).|
|
<urn:uuid:647ceb39-72a4-4ed1-9c1a-0205fa20f8c5>
|
CC-MAIN-2014-23
|
http://psychology.wikia.com/wiki/History_of_attention_research
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510274581.53/warc/CC-MAIN-20140728011754-00451-ip-10-146-231-18.ec2.internal.warc.gz
|
en
| 0.953919 | 3,043 | 3.59375 | 4 |
The first pluripotent human embryonic stem cells (hESCs) have been generated from somatic cell nuclear transfer, according to a study published today (October 5) in Nature. The findings validate this controversial method, and may one day allow therapeutic stem cells to be created from a patient’s own genetic material.
“The advance here is the proof that somatic cell nuclear transfer can work [in human cells] and can fully reset the donor cell genome to a pluripotent state,” said Harvard Medical School’s George Daley, who was not affiliated with the study.
Somatic cell nuclear transfer typically involves the transfer of genomic information from a somatic cell into an unfertilized egg cell whose nucleus has been removed. The fusion ultimately gives rise to a microscopic embryo, from which embryonic stem cells can theoretically be derived. In contrast, currently existing hESC lines were derived from leftover embryos created for...
Somatic cell nuclear transfer has shown limited success in animal studies, which have successfully isolated pluripotent cells. Like Dolly the sheep, these microscopic embryos can also be implanted into a host uterus, where they develop into a fetus and grow into adult animals after birth.
In humans, somatic transfer has been less fruitful—the egg cell quits dividing and often dies after nuclear transfer. In the best case, an early embryo consisting of a few cells may form, but these are not capable of giving rise to human life, nor hESCs for therapeutic purposes.
“A couple of studies show some success in generating early microscopic embryos, but this [study] is the first successful pluripotent stem cell line,” said Daley.
To achieve this success, Scott Noggle at the New York Stem Cell Foundation Laboratory took a unique approach to the process. Instead of removing the egg genome prior to nuclear transfer, he and his colleagues added the somatic cell nucleus directly to the intact egg. In the end, the egg cell contained three sets of chromosomes—two from the diploid somatic cell, and one from the haploid egg. The resulting clone developed into a microscopic embryo, which survived long enough for pluripotent stem cell lines to be derived.
The technique provides the first opportunity to make hESCs that carry the same genetic material as the patients. Such cells may help lower the risk of the body rejecting such cells when applied therapeutically. “This could allow us to create cells that are useful for transplantation for a variety of diseases without the problem of immunological rejection,” said Noggle in a press briefing.
Before the technique will ever make it to the clinic, however, researchers must find a way to remove genomic material from the egg cell. “The triploid cells aren’t suitable for therapeutic purposes, and future efforts will be focused on trying to eliminate the [egg cell] genome,” said Daley, who wrote an accompanying News & Views in Nature.
Noggle said the findings may also pave the way for better induced pluripotent stem cells (iPSCs), which form when somatic cells are regressed to a pluripotent state through the use of genetic factors. While iPSCs avoid the ethical issues surrounding embryonic stem cells, the methods used to derive them sometimes induce mutations in cancer causing genes, making them unsuitable for therapeutic purposes.
“Understanding human [eggs’] ability to reprogram could shed light on improved methods for reprograming,” said Noggle. For the first time researchers can now compare iPSC differentiation to the same process an egg goes through after the transfer of a somatic cell genome. This could help researchers identify abnormalities in iPSC differentiation, correct them, and develop pluripotent stem cells that don’t harbor tumorigenic qualities and do not require the use of human embryos.
As part of the study, Noggle and his colleagues developed new protocols that allow women to choose between giving their eggs to research or in vitro fertilization programs. While women have always been paid for donating their eggs for in vitro fertilization, ethical guidelines have prevented researchers from paying women for their eggs. As most women will not donate altruistically, this has left researchers working with the poor-quality eggs rejected from in vitro fertilization. According to the researcher’s new protocols, women are paid to donate, but only later choose whether their eggs should go to research or in vitro fertilization. This gave Noggle better access to high quality eggs, and paved the way for the new discovery.
“This group succeeded because they were highly skillful and had access to a plentiful supply of good quality eggs,” said Daley.
Noggle’s new protocols are among the first based on 2007 guidelines published by the American Society for Reproductive Medicine and the International Society for Stem Cell Research.
S. Noggle et al., “Human oocytes reprogram somatic cells to a pluripotent state,” Nature, 478:70–75, 2011.
|
<urn:uuid:4ba3c1b9-578e-4c62-be48-50648f437e6c>
|
CC-MAIN-2023-23
|
https://www.the-scientist.com/news-opinion/new-way-to-make-embryonic-stem-cells-41801
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646937.1/warc/CC-MAIN-20230531150014-20230531180014-00455.warc.gz
|
en
| 0.933796 | 1,047 | 3.328125 | 3 |
Toshiba announced Wednesday it has produced its last major run of incandescent lightbulbs.
The Japanese electronics manufacturer said the phaseout is part of a strategy to ultimately concentrate on LED (light-emitting diode) lighting products, though it will continue to produce certain specialty incandescent bulbs.
Incandescent lighting has been dwindling in use over the last five years in large part to citizen and government phase-out campaigns that include laws for an eventual ban on the sale of the electricity-guzzling light source. Many countries have already passed laws with deadlines looming.
Australia was the first country to ban the sale of incandescent lightbulbs, which took effect in 2010. In December 2007,
Many companies have responded to the changes by reducing production in favor of new lighting technology like LEDs and. Even newer technologies like and are also on the horizon.
"Toshiba estimates that switching 60 percent of the world's incandescent lights with LED lights would reduce greenhouse gas emissions by 125.5 million tons in 2025, compared to 2000," the company said in a statement.
It marks the end of a technology era. Since 1890, Toshiba--that is the company that eventually became part of Toshiba--has been manufacturing incandescent lighting.
Hakunetsu-sha & Company was Japan's first electric incandescent lighting factory and produced its first bulbs in 1890 at a rate of 10 bulbs per day. The company was renamed the Tokyo Electric Company in 1899, and in 1939 merged with Shibaura Engineering Works to become what is today known as Toshiba.
|
<urn:uuid:e5c049f9-5535-4e39-b829-9c7084232424>
|
CC-MAIN-2017-34
|
https://www.cnet.com/news/toshiba-says-good-bye-to-incandescent-era/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886105341.69/warc/CC-MAIN-20170819105009-20170819125009-00023.warc.gz
|
en
| 0.96621 | 326 | 2.90625 | 3 |
What does Bonsai, the Japanese art form of carefully shaping miniature trees have to do with scientific research? For Gonçalo Lopes, a graduate student at the Champalimaud Centre for the Unknown, Bonsai perfectly captures the essence of his doctoral thesis – “just like the art form, the main aesthetics and challenge of our work involve being able to recreate all the complexities of a living landscape in a very confined space.”
How a side project became a powerful open-source tool.
The living landscape Gonçalo is referring to is a complex naturalistic setting, where animals experience a rich environment and face novel challenges. “In my project”, he recalls, “I sought out to discover how the brain uses prior knowledge about the way the world works, acquired in a stimulating and diverse surrounding, to solve new problems.”
Figure 1. On the top examples of processing pipelines for tracking the activity of two colored objects in a video stream using Bonsai. IN the featured image you can see the Japanese art of recreating complex landscapes in a compact and elegant form.
In other words, “we wanted to know how the brain understands the world. When we look at objects like a cup, or a ball, we find it natural that we know what to do with them. We can imagine how the object would feel like if we picked it up, or sound like if we threw it around, and we use this information to guide our decisions and overcome obstacles. In order to learn more about how brains can actually build and use this knowledge, we decided to observe animals interacting with rich environments where they have to figure out how to tackle new situations using their past experience.”
“In addition to carefully monitoring behavior, we also wanted to take control over these environments in order to define their rules of operation – the physics and statistics that the animal would have to learn about.” – Adam Kampff, principal investigator at the Champalimaud Centre for the Unknown.
When trying to tackle such a complex problem, it is crucial to record extensive measures of the animal’s behavior with high-temporal and high-spatial resolution, often from multiple sensors in parallel. Adam Kampff, one of Gonçalo’s thesis advisors, together with Joe Paton explains, “in addition to carefully monitoring behavior, we also wanted to take control over these environments in order to define their rules of operation – the physics and statistics that the animal would have to learn about. These two problems of measurement and control require a lot of experimentation with many different state-of-the-art hardware and software solutions. You don’t know a priori which one will work, so you have to try many of them.”
video 1 This movie shows Bonsai being used to move metal rods connected to motors, according to the proximity of an object (in this case a hand-held rod).
While approaching his research question, Gonçalo found that the optimal way of testing it was difficult to pin down. “I set up multiple different environments, in the search for the most suitable one, a process that was very time consuming. As I was transitioning between different setups I realized that I needed better tools that would allow me to test many different ideas more quickly.” That is how Gonçalo came up with Bonsai, a programming language that enables the user to efficiently measure and control multiple variables within an experimental setup.
“Just like the art form, the main aesthetics and challenge of our work involve being able to recreate all the complexities of a living landscape in a very confined space.” – Gonçalo Lopes, graduate student at the Champalimaud Centre for the Unknown.
“Bonsai provides the user with many powerful building blocks and the means to combine them into complex designs using very compact specifications. Instead of going through the regular process of spending many hours and days writing code to try out all different hardware and software solutions, while not knowing which one will actually work, I ended up developing Bonsai – a tool where I could quickly play around with all the different solutions without committing myself too deeply to any one of them”.
Video 2. In this video Bonsai is controlling the physics of digital balls that are being projected on a white-board. Bonsai analyses the lines drawn on the board and guides the path and movement of the balls to follow the lines.
As it turned out, Gonçalo still had to spend many days and nights programming in order to create Bonsai. However, “in the end, not only did I get to try out all the different solutions I had in mind, but the tool itself kept on expanding and growing and giving us new ideas of things to try. Like a good playground, a good tool also primes your imagination for what is possible, and that was a very satisfying consequence of developing Bonsai.”
As many projects developed at the Champalimaud Neuroscience Programme (CNP), the full scope of Bonsai is the result of a collaborative effort with other CNP members. As Gonçalo recalls, “In the beginning, I started developing Bonsai for myself, mostly to support the research project I was working on. However, early on I started showing it to people around the CNP. Niccolò Bonacchi was the first to get involved and together we brainstormed the design of many aspects of the user interface that would make Bonsai accessible to even more people. Nico has a keen eye for how user interfaces will be used and provided many valuable insights into making the graphical environment as consistent as possible.”
Figure 2. From the left: Gonçalo Lopes, Niccolò Bonacchi and João Frazão. Photo by Gabriela Martins.
Later on, João Frazão joined the team. Before joining the CNP, Gonçalo and João worked together for four years at YDreams, designing a framework for rapid prototyping of augmented reality applications and a lot of the expertise acquired during that period has been applied to the development of Bonsai. “João is an amazingly creative software engineer”, says Gonçalo, “he helped polishing many of the conceptual edges of the language to make sure it would be as general and powerful as possible.”
“One of my favourite applications of Bonsai was the development of a crowd version of the “Pong” videogame… It was quite a spectacular sight.” – Gonçalo Lopes.
Indeed, once created, Bonsai was quickly picked up by many users at the CNP. “The amazing part of working on a shared tool is that your users, especially the early adopters, end up thinking about the problem together with you. A lot of time was spent debating aspects of the language with power-users like Bassam Atallah, that were already experienced in using many other neuroscience tools, and as such, knew a lot about what did and did not work and about what features would be the most useful.”
“From these particular constraints and requirements I was trying to extract the set of features that would be the most general. Solving not only specific scenarios, but enabling the expression of a large variety of experimental designs. All the authors in the Bonsai paper (1) helped to push the boundaries of what could be done in Bonsai by developing state-of-the-art neuroscience experiments that are now used to demonstrate all the different things you can do with the language. I am still impressed by how much could be achieved in such a short period of time!”
Currently, Bonsai is being used not only by CNP members, but also by scientists in other institutions. “Researchers at the CNP have been amazing early adopters of the technology, with 12 out of the 17 labs using it actively, for a total of more than 50 users.” Outside the CNP, and following the public release of Bonsai, it is now being used at several neuroscience institutes, including labs at University College London, Harvard University, Brown University, Cold-Spring Harbor Laboratories, Donders Institute for Brain, Cognition and Behavior and many others. “It is now also being taught at experimental neuroscience courses such as the Transylvanian Experimental Neuroscience Summer School and the CAJAL Advanced Neuroscience Training Programme” adds Gonçalo.
Figure 3. Bonsai being used to play an interactive game of Pong by an audience of 400 people during the Ar|Respire Connosco event on Emergence. On the top, Gonçalo Lopes (left) and Adam Kampff. On the bottom, audience members participating in the game. Photos by Wieland Brendel.
The uses of Bonsai, however, are not restricted to the lab. “One of my favorite applications of Bonsai was the development of a crowd version of the “Pong” videogame”, Gonçalo recalls. “In this variation, we were able to get an entire auditorium of 400 people to play the game.” The game was played between two teams – the right side of the audience was controlling the right Pong paddle and vice-versa. Each person was holding a card that had two sides, a red one and a blue one. As the ball was moving towards the right, each member had to hold up the red side of the card facing the stage if they wanted the paddle to go up, or the blue if they wanted the paddle to go down.
“We used Bonsai to capture images with a color camera and process them online with a color segmentation filter in order to measure the amount of blue and red in the image as the audience raised the cards in the air. We then used the ratio between blue and red to determine how high the paddle was on the screen. Then we simply added a second camera and we were able to have two teams in the auditorium playing Pong against each other. It was quite a spectacular sight.”
“I’m happiest when someone who does not have a formal programming background is actually able to create a piece of state-of-the-art reactive software using Bonsai that would blow the mind of many professional programmers.” – Gonçalo Lopes.
Recently, the team has been focusing on making Bonsai even more accessible and easy to use. “As more and more users were interested in using it for their own research, the need to make the interface much more intuitive and self-explanatory became a central concern, and a lot of effort was spent in trying to make every command explicit and in providing better ways to guide new users. We also created a wiki, tutorials and a forum for users to allow the community to share their own experience and feedback of using the language. Our ultimate goal is that anyone will be able to use it and we are trying to provide the means to make the initial learning curve as smooth as possible.”
Gonçalo describes his main goal as empowering users to be able to tell their computers to do progressively more complicated things with ease. “A direct consequence of this, I believe, will be mind-blowing science, creative digital art and new ways of interacting and playing with one of the most amazing tools ever created by humanity, the digital computer. I’m happiest when someone who does not have a formal programming background is actually able to create a piece of state-of-the-art reactive software using Bonsai that would blow the mind of many professional programmers.”
“Finally, I really need to thank my supervisors Adam Kampff and Joe Paton for being so supportive and encouraging of this project from the beginning. The specific goal of my PhD was not to develop Bonsai but it was very encouraging to have them realize the potential of the project and let it grow to fruition. Adam now even uses it extensively for teaching, has become one of its most proficient users and is a main driver for the adoption of Bonsai outside the CNP.”
FOR THE ORIGINAL STUDY SEE: Lopes G, et al.(2015) Bonsai: An event-based framework for processing and controlling data streams. Neuroinform. 9 (7).
Liad Hollender works at the Science Communication office at the Champalimaud Neuroscience Programme.
Edited by: Ivo Marcelo (section editor), Clara Howcroft Ferreira (editor-in-chief)
|
<urn:uuid:b551ed33-0bbb-47a8-a6b7-27a5632e3bbf>
|
CC-MAIN-2020-05
|
http://magazine.ar.fchampalimaud.org/bonsai-the-art-of-creating-new-worlds/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251689924.62/warc/CC-MAIN-20200126135207-20200126165207-00191.warc.gz
|
en
| 0.966055 | 2,616 | 2.953125 | 3 |
by Staff Writers
Vienna, Austria (SPX) Dec 26, 2012
It is well known that many mammals are able to adjust the ratio of male and female young depending on the surrounding conditions at the time of conception but how precisely this is accomplished remains a matter for debate.
A recent study in the group of Christine Aurich at the University of Veterinary Medicine, Vienna has provided important information on how the survival of female embryos may be enhanced under conditions that would otherwise tend to favour the birth of males. The work is published in the journal "Theriogenology".
Because of the process involved in the formation of sperm cells, there should be an equal chance that a mammalian egg will be fertilized by "male" sperm, carrying a Y chromosome, as by a "female" sperm, carrying an X chromosome.
The symmetry of the system ensures that roughly the same number of males and females are born, which is clearly helpful for the species' long-term survival. Surprisingly, though, many mammals do not produce equal numbers of male and female offspring.
The discrepancy could theoretically be explained by differential fertilization efficiencies of male and female sperm (Y chromosomes are smaller than X chromosomes so perhaps male sperm can swim faster?) or by different rates of survival of male and female foetuses in the uterus.
Indeed, it does seem as though male embryos are better able to survive under conditions of high energy intake. But how does this work?
Jana Beckelmann in Christine Aurich's laboratory at the University of Veterinary Medicine, Vienna now presents provocative evidence that a particular protein, insulin-like growth factor-1 or IGF1, might somehow be involved.
From an examination of about 30 embryos, Beckelmann noticed that during early pregnancy (between eight and twelve days after fertilization) the level of messenger RNA encoding IGF1 was approximately twice as high in female embryos as in male embryos.
The difference could relate to the fact that female embryos have two X chromosomes, which might produce more of a factor required for the expression of the IGF1 gene (which is not encoded on the X chromosome) than the single X chromosome in males is able to generate.
Beckelmann was also able to confirm that the IGF1 protein was present in the embryos, confirming that the messenger RNA is actually translated to protein.
IGF1 is known to have important functions in growth and to inhibit apoptosis, or programmed cell death. As IGF1 treatment of cattle embryos produced in vivo improves their survival, it is likely that the factor has positive effects on the development of the early embryo in the horse. So why should female embryos contain more of the factor than males?
Losses in early pregnancy are unusually high in the horse and it is believed that female embryos are especially prone to spontaneous abortion. Male embryos are known to be better able to survive under high glucose concentrations, so well-nourished mares preferentially give birth to male foals.
As Beckelmann says, "We think the higher IGF1 concentrations in female embryos might represent a mechanism to ensure the survival of the embryos under conditions that would otherwise strongly favour males."
If this is so, the ratio of the sexes in horses is the result of a subtle interplay between environmental and internal factors, including insulin-like growth factor-1.
The paper "Sex-dependent insulin like growth factor-1 expression in preattachment equine embryos" by Jana Beckelmann, Sven Budik, Magdalena Helmreich, Franziska Palm, Ingrid Walter and Christine Aurich in the journal "Theriogenology" is available online and will appear in print in the issue of January 1, 2013 (Volume 79, Issue 1, 1 January 2013, pp. 193-199)."
University of Veterinary Medicine, Vienna
Darwin Today At TerraDaily.com
|The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement|
|
<urn:uuid:a08d4dad-4628-4608-99d7-c69d73ac01c1>
|
CC-MAIN-2017-30
|
http://www.terradaily.com/reports/Survival_of_the_females_999.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424296.90/warc/CC-MAIN-20170723082652-20170723102652-00696.warc.gz
|
en
| 0.936382 | 910 | 3.640625 | 4 |
State agencies recommend precautions
• Be observant for deer when driving near dawn and dusk.
• If you see one deer and miss it, others likely will be nearby.
• Drive slower near wooded areas, green spaces, such as parks and golf courses, and streams or ponds.
• Don’t swerve to avoid a deer. Stay in your lane. The most serious crashes happen when motorists take evasive action.
• Use bright lights and slow down when you spot a deer.
• Pull over onto the shoulder if you hit one, turn on emergency flashers and watch for traffic.
l To report a crash on a Kansas highway dial 47 or 582 on the Kansas Turnpike. If it’s an emergency, dial 911.
About this time every year, Ron King’s staff at his local American Family Insurance agency gets calls from customers who have hit a deer with their vehicles.
“It does seem like there’s been an unusual amount,” King said. “They happen every fall, but it seems like there’s even more than normal.”
Lately, the calls have come in at a rate of about one every other day.
And state transportation, law enforcement, insurance and wildlife officials have begun warning drivers, particularly those in northeast Kansas, about the dangers of deer near highways and roads in November.
Kansas Department of Wildlife and Parks biologist Lloyd Fox said deer-mating season, known as the “rut” occurs in the fall and peaks in mid-November. It causes the deer to travel more, and deer are more active this time of year because trees and shrubs become more bare.
This causes issues during shorter days because they tend to move during peak travel times in the morning and evening, Fox said.
According to the Kansas Department of Transportation, 9,628 deer-vehicle collisions occurred in the state in 2009. Douglas County had 212, and 11 people were injured in those wrecks. The average vehicle-deer accident causes $3,000 in damage, according to AAA.
|
<urn:uuid:979bf498-dd7a-4435-bddd-1b3e248915dc>
|
CC-MAIN-2013-20
|
http://www2.ljworld.com/news/2010/nov/08/deer-mating-season-poses-road-hazards/
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706009988/warc/CC-MAIN-20130516120649-00087-ip-10-60-113-184.ec2.internal.warc.gz
|
en
| 0.958079 | 435 | 2.578125 | 3 |
- Generators Installation search results
Important Generator Installation Terms
When power is needed in a home or other location, sometimes it is necessary to have a generator installed. Whether is it a permanent or portable unit, having a gas powered generator on standby can provide electricity when there is otherwise none to be found. Here are some important generator installation terms.
Diesel - This is an option of fuel used to power the generator. During a blackout or other emergency, it may become necessary to use diesel fuel to power the generator and provide electricity.
Extension Cord - The location of the generator can have an impact on how electricity is brought to certain appliances. Having multiple extension cords to bring power to different areas allow for more flexibility during the power outage.
Regulator - The voltage regulator on a generator can monitor the amount of output from the generator. This information can help when powering different devices since some will be more able to accept more wattage and voltage than others.
Circuit Breaker - This can be located in a home. A contractor who installs the generator may use the circuit breaker as a reference point when doing the install. Accessibility can be a factor when placing either item in case one needs to hook-up power.
Vent - When using a gas powered generator it is important to have a well ventilated area. Industrial, commercial, and residential zoning laws can help monitor this. Repairing an area to accommodate proper ventilation can be required in order to improve air flow near the generator.
Having portable or permanent generators on standby can be very handy when power is lost. Switching from a power grid to a generator can be an easy transfer if properly prepared. Whether it is a DIY hook-up or a contractor job, one does not want to spend hours without power.
Generators are devices that are commonly used as a power source in major commercial buildings and residential homes. These emergency apparatuses are typically installed by professional contractors. The use of a standby power source such as a home generator goes back many decades. Many people even use portable gas and electric generators on camping excursions these days. Some of them run on diesel fuel, while others hook up to a power source via an extension cord.
There are many generator installation services available. While some of these contractors deal with circuit breakers, transfer switches, and small units in residential homes, other professionals work more with a commercial or industrial market to improve or repair electric and gas units. The key is to have a generator in place in case of a blackout or power outage. Depending on what you need to power, a certain number of watts are necessary. You can often determine how many hours the backup generator will supply electricity or power during a blackout. There is additionally the DIY option of installing a standby power generator. However, it is first important to understand the installation process and what tools are involved.
Use the internet to learn more about portable generators and backup emergency units for your home. There is a lot of data provided on this subject, and you can acquire a better understanding of diesel fuels, gas versus electric, transfer switches, and home generator hook-up. It is important to improve your knowledge on this subject and understand what is at your disposal.
|
<urn:uuid:22b86649-2689-48f6-a078-2ade5d75a073>
|
CC-MAIN-2017-39
|
http://www.magicyellow.com/category/generators_installation/-state_md.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818690211.67/warc/CC-MAIN-20170924205308-20170924225308-00251.warc.gz
|
en
| 0.922075 | 651 | 2.671875 | 3 |
Concept: Concept: Mutorotation and Optical Activity9m
Now I want to dive deeper into the process by which an alpha anomer can become a beta anomer and so forth. So, guys pyranose and furanose rings are constantly hydrolyzing back and forth between their cyclic and straight chain forms. Now, you guys know what that mechanism looks like, you know what the Rings look like, and I'm here to tell you that it's in constant equilibrium, it's not just like one ring is formed then it stays like that, it's a constant equilibrium of hydrolysis, cyclization decyclization, etc. okay? Well, the specific process by which an anomeric position would convert between the alpha and beta forms is called mutorotation, it's basically the backwards reaction of cyclization but it's so that you can achieve the other anomer, okay? Now, here in this example what I've done is I'm showing you how, let's say you start off with a beta d-glucopyranose and you expose it to either acid or to base, just a little bit of acid or just a little bit of base, this ring is going to start, is going to begin to hydrolyze and it's going to turn to the straight chain and then it's going to eventually mutorotate forming the other anomer. Now, what I did in this drawing is I didn't draw just the Alpha anomer, I actually drew this squiggly line, what does that squiggly line mean? it means that you lose the Alpha and Beta anomer information, because you're going to get some mixture of both. Now, it's important to note, this is not going to be a racemate, remember what racemate means? it means that you're going to get 50 of 50 of each, I'm not saying that, that's not what the squiggly line means here, it just means you're going to get a combination. So, here instead of putting beta d-glucopyranose I just put d-glucopyranose because you're going to get a mixture of the two, mutarotation is going to make it so that you're just going to have some kind of mixture of the two. So, guys it turns out that in your textbook the explanation of mutarotation is very, very closely tied with this idea of optical activity. So, what I want to do is instead of having you read that and be confused I just want to explain it. So, you can understand why they've always talked about optical activity when they talk about mutorotation and what is that optical activity provided the proof for mutorotation, which I'm going to show you now. So, first of all it's important to note that anomers are always going to differ in optical activity, okay? You're always, like an alpha anomer is always going to rotate light different than a beta anomer, okay? for example, the Alpha anomer of a D-glucopyranose rotates light at a positive 112 rotation in a polarimeter, okay? Whereas a beta D-glucopyranose rotates light at positive around positive 19, okay? Guys these are super random numbers that you do not need to memorize, okay? But this just shows you the completely different optical activity of the Alpha versus the beta. Now, if you weren't paying attention and maybe you just kind of like thought very quickly you might think, you might wonder why are they not just opposite rotations, because remember that back when we talk to optical activity back a long time ago, we talked about how if one enantiomer shows the positive rotation, the opposite enantiomer should then show the negative rotation of that same rotation of plane polarized light, in this case they're both positive and they're very different for each other, why is that?
Well, guys remember, that enantiomers are not enantiomers of each other, right? They're not enantiomers, like a bunch of the chiral centers stays the same, what they actually are is remember they're diastereomers, okay? So, that's why they have unrelated activities you can't predict that one is going to be positive and one is going to be negative, they just have random numbers, here I've given you the random numbers for glucopyranose but other types of rings you would need to actually use a polarimeter to get that number, okay? So, it's not something that you're to memorize. Now, why is this important? Well, because back in the day, when they were first discovering kind of this relationship between optical activity and chirality it was noticed that, it was observed that D-glucopyranose always equilibrated to a positive 52.5 rotation, which is weird, because that's not the rotation of either one of these, right? 112 is one, the other one is 18.7 and somehow it would always rest, if you let it sit around long enough, no matter which one you started, this whether you started with 100% of the A or whether you started off with 100% of the B, they would always end up at positive 52.5. Now this is strange because this is not even the middle point, this is not even the halfway point of rotation between the two optical activities. So, what I actually did is I made a little graph for you guys can really understand this, so notice that the beta had a rotation of positive 18, right? And the Alpha had a rotation of positive 112, right? So, that means at the very beginning, let's say that we started off with 100% of the beta anomer? Well, that would give us 18.7 optical activity, but what was noticed is that after several days of it be sitting in an aqueous solution, the optical activity would get more and more and more positive until it reached this magical number of 52.5. Now why, why is that? and then the same thing happened with this guy, with the Alpha, the outflow would get lower and lower and until it got to 52.5? Well, guys the reason is because we learned. Remember, that we learned that specifically for a beta glucopyranose the beta prevails at a 64% equilibrium and the Alpha prevails at a 36% equilibrium, meaning that if you were just start with one of them and allow it to mutorotate you're eventually going to reach an equilibrium or 64% of the pyranose is in the beta form and 36% is in the alpha form and that is why at the end the rotation that you end up getting is 52.5 because that happens to be right at the 64% mark of the difference between the two, what this shows is that 64% of it is the beta and only 36% of it is the Alpha, if it had been 50/50, let's say it equilibrated exactly 50/50 then we would expect a rotation right in the middle of these two, which is positive 65, but we don't see positive 65, what we see is that it's a little bit more than 60, it's a little bit less than 65, what it must mean that the one that's on that side is the majority because it's the one with the lower optical activity and when you actually do the numbers it shows that 64% is equal to the beta, okay? So, anyway, this is proof that needle rotation was occurring, you know, chemists back in the day, they realized, oh, this must mean that if I have an alpha somehow it's going to equilibrate and become a beta. So, then they started figuring out. Well, what is a potential mechanism for this to take place, how could an alpha potentially become a beta? Well, that's going to be the next video, so hopefully this makes sense so far in terms of optical activity proving that mutarotation exists and in the next video I want to go into the mechanism.
Concept: Concept: Mechanism4m
Alright guys. So, while mutorotation is possible in both acid and base I'm only going to show you the active catalyzed mechanism and that's because it turns out that the base catalyzed mechanism has a bunch of cross reactions that are possible that complicate products. So, usually, this is just shown in acid, okay? So, let's go ahead and get started, the very first step is protonation as with any acid catalyzed mechanism. So, I'm just going to redraw my hydronium so that I can have one accessible proton and the protonated O will be the O in the ring because remember, we need to break this ring somehow, okay? So, what this is going to do is it's going to give me a positively charged O and at this point I can use the electrons from my anomeric oxygen, remember, that's the one we're trying to flip up and down to make a double bond, okay? So, two electrons from my O can come down and make a double bond and then I can break this bond in the ring to form an alcohol. So, at this point what's going to happen is that the chirality of this carbon is now lost because it turned into a double bond, which means it's trigonal planar.
Now, it could, it's right in between, it could be up or it could be down, okay? Also this O is going to have a positive charge because it still has an H, cool? Awesome. So, now guys, we're just going to start doing the reverse and get rid of that double bond. So, this O can now reform the ring kicking electrons back up, so this is going to do is it's going to give me once again a positive O and now I'm going to get the other OH. Now, we're going to show that now it;s shifted to the up instead of down and that's because this OH could attack from either the top or the bottom, so it could make the OH go up or it can make it go down, in this case since you started from the down position, I'm trying to rotate it mutorotate it to the up position. So, that's why I throw it up here and then finally guys all we have to do is deprotonate. So, then deprotonates we can regenerate that catalytic acid and we're going to go ahead and achieve a final product, which is now a beta D-glucopyranase, okay? And I'm sorry, pyranose, and this is the process that turns, this is the mutorotation process that turns in output to a beta and this is what's constantly taking place and eventually they would reach an equilibrium based on the stabilities of each, we know that for glucose it happens to be 64% of the beta but if this was any other sugar the number would be different and the anomer might even be different, maybe the alpha would be favored with another sugar, okay? Awesome guys, great job, let's move on.
Draw the full arrow-pushing mechanism for the following transformation.
Consider the two sugars below. On the left is ß-(D)-glucose. What is the best description of the sugar on the right?
Mutarotation (inversion of the anomeric center) is a process that happens spontaneously when a sugar is put into aqueous solution. Which of these reactions is mutarotation?
Which compound will not be able to undergo mutarotation?
|
<urn:uuid:60c0fa34-071d-48cc-8e78-76aea7e38390>
|
CC-MAIN-2017-43
|
https://www.clutchprep.com/organic-chemistry/monosaccharides-mutorotation
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187827662.87/warc/CC-MAIN-20171023235958-20171024015958-00877.warc.gz
|
en
| 0.975944 | 2,424 | 2.890625 | 3 |
“Anarchy doesn’t mean out of control; it means out of their control.” ~ Jim Dodge
In 1793 William Godwin wrote Inquiry Concerning Political Justice, implicitly establishing the philosophical foundations of anarchism; laying down the foundation of anarchy, as it would be understood by those brave anarchists who would follow.
In his own words: “Government by its very nature counteracts the improvement of original mind.” The following five anarchists were the heavy-hitters who refused to have their original minds counteracted by existing governments.
1) Henry David Thoreau
“The mass of men serve the state thus, not as men mainly, but as machines, with their bodies. They are the standing army, and the militia, jailers, constables, etc. In most cases there is no free exercise whatever of the judgement or of the moral sense; but they put themselves on a level with wood and earth and stones; and wooden men can perhaps be manufactured that will serve the purpose as well. Such command no more respect than men of straw or a lump of dirt. They have the same sort of worth only as horses and dogs. Yet such as these even are commonly esteemed good citizens.” ~ Thoreau
If Godwin is the grandfather of anarchy, then Thoreau is arguably the father. Best known for his book about simple living, Walden, he also wrote the blueprint on civil disobedience in 1849 in his greatly influential treatise, Resistance to Civil Government, which was a radical philosophical discourse that later influenced the political thoughts and actions of such notable figures as Leo Tolstoy, Mahatma Gandhi, and Martin Luther King, Jr.
He doubled down on the motto “That government is best which governs least” with the addendum, “That government is best which governs not at all.” Thus opening the door to anarchy. He taught us that life is too short not to seize it; that life is too precious not to make it something of our own.
He challenged the status quo, saying, “Disobedience is the true foundation of liberty. The obedient must be slaves.” He slammed the proverbial gauntlet at the feet of anyone claiming to be a forceful authority. “I was not designed to be forced,” he said. “I will breathe after my own fashion. Let us see who is the strongest.”
2) Emma Goldman
“Anarchism stands for the liberation of the human mind from the dominion of religion; the liberation of the human body from the dominion of property; and the liberation from the shackles and restraint of government. It stands for a social order based on the free grouping of individuals.” ~ Emma Goldman
Emma Goldman was an anarchist par excellence. She resisted the oppression of both American and Russian authorities for most of her life, hounded by the state and constantly under surveillance.
She went to jail multiple times for her cause. She was anti-state, anti-war, anti-prison, and anti-voting, saying, “If voting changed anything, they’d make it illegal.” She was even considered “the most dangerous woman in America” according to historian Paul Avrich.
She was an early advocate of free speech, birth control, women’s equality and independence, and union organization. Though she didn’t self-identify as a feminist, she put Anarcha-feminism on the map and didn’t look back.
She was thoroughly devoted to anarchism, calling it a “beautiful ideal,” and “the right to self-expression, everybody’s right to beautiful, radiant things. Anarchism means that to me, and I will live it in spite of the whole world — prisons, persecution, everything. Yes, even in spite of the condemnation of my own closest comrades I would live my beautiful ideal.”
When told by a fellow anarchist (at a dance, mind you) that her “dancing with such reckless abandon was undignified for one who was on the way to become a force in the anarchist movement, and that her frivolity would only hurt the cause,” Goldman was reported as saying, “If I can’t dance, I don’t want to be part of your revolution.”
3) Mohandas Gandhi
“The ideal nonviolent state would be an ordered anarchy.” ~ Gandhi
Gandhi was a self-described philosophical anarchist and believed in Swaraj: self-rule. It was his idea that self-rule in a nation meant that every person rules himself and that there is no tyrannical state which enforces laws upon the people, and how, through nonviolent conflict mediation over time, power could be siphoned from the state’s hierarchical system and expiated among the people.
He is best known for his philosophy of direct nonviolence (ahimsa), for his theory of Satyagraha, and for leading the Salt March against the British tax on salt. Satyagraha is a form of proactive nonviolence that seeks to eliminate violence without becoming violent in return, thus arming the individual with moral power rather than mere physical power.
The Salt March was an act of Satyagraha, as it opposed the violence of the state (British rule) through the nonviolent act of sidestepping the state and directly making salt instead.
In his own words: “Satyagraha does not mean meek submission to the will of the evil-doer. It means the pitting of one’s whole soul against the will of the tyrant. Working under this law of our being, it is possible for a single individual to defy the whole might of an unjust empire to save his honor, his spirituality, his soul and lay the foundation for that empire’s fall.” This theory had a huge influence on Nelson Mandela and Martin Luther King Jr.
4) Howard Zinn
“They’ll say we’re disturbing the peace, but there is no peace. What really bothers them is that we are disturbing the war.” ~ Howard Zinn
Howard Zinn is famous for his best-selling historical book, A People’s History of the United States. He was an essential facilitator of anarchy, motivating the youth in ways not seen since Martin Luther King Jr. As he states in his memoir, You Can’t Be Neutral on a Moving Train, “The power of a bold idea uttered publicly in defiance of dominant opinion cannot be easily measured. Those special people who speak out in such a way as to shake up not only the self-assurance of their enemies, but the complacency of their friends, are precious catalysts for change.”
He was a catalyst’s catalyst, a leader who led through courageous articulation. He had his finger on the pulse of the nation and its history. The pulse he felt was gluttonous with excessive greed and power on one side of the vein and oppressive with structural violence and unnecessary poverty on the other.
In his own words: “The state and its police were not neutral referees in a society of contending interests. They were on the side of the rich and powerful. Free speech? Try it and the police will be there with their horses, their clubs, and their guns, to stop you. From that moment on, I was no longer a liberal, a believer in the self-correcting character of American democracy. I was a radical, believing that something fundamental was wrong in this country.”
5) Noam Chomsky
“About 70 percent of the population, at the lower end of the wealth/income scale, has no influence on policy. Moving up the scale, influence slowly increases. At the very top are those who pretty much determine policy, by means that aren’t obscure. The resulting system is not democracy but plutocracy.” ~ Noam Chomsky
Noam Chomsky is a Jack of all Trades, with interests in fields as diverse as metalanguage, cognitive psychology, philosophy of the mind, politics, ethics, and activism. Ideologically, he’s an anarcho-syndicalist. Politically, he’s known for being an outspoken opponent of U.S. involvement in the Vietnam and Gulf Wars, which he sees as acts of American imperialism. He even earned a place on President Nixon’s “Enemies List” in 1967.
His influential political essay, The Responsibility of Intellectuals (1967), about the US involvement in Vietnam, put him on the anarchist map, but his most important work was arguably Manufacturing Consent: The Political Economy of the Mass Media (1988), which was eventually adapted into a film.
In this book, he shreds the veil between the propagandized mainstream media model and the censorship between content and viewer. In his own words: “The mass media serve as a system for communicating messages and symbols to the general populace. It is their function to amuse, entertain, and inform, and to inculcate individuals with the values, beliefs, and codes of behavior that will integrate them into the institutional structures of the larger society. In a world of concentrated wealth and major conflicts of class interest, to fulfill this role requires systematic propaganda.”
If, as Martin Luther King Jr. said, “Capitalism fails to realize that life is social. Communism fails to realize that life is personal,” then maybe anarchy is socially aware enough to realize the inherent truths of both individualism and collectivism.
The five heavy-hitting anarchists discussed in this article show through supreme living example how anarchy can be both an intellectual and an actual reality. They give us permission to disregard the laws of the corporate/consumerist State, and help us to see how we too are morally obligated to strike down the plutocracy that threatens our democracy.
Indeed, as these fellow anarchists would probably agree, democracy through anarchy trumps capitalism through plutocracy. In the end, maybe anarchy can lead us back to a more rational assessment of what is moral by working against tradition and inviting us to recalibrate our habits with the natural order of things.
|
<urn:uuid:33509ea2-8b75-4f78-b1ff-abc5b5589c0b>
|
CC-MAIN-2023-40
|
https://fractalenlightenment.com/36637/life/5-anarchists-and-their-contribution-to-human-progress
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510516.56/warc/CC-MAIN-20230929122500-20230929152500-00802.warc.gz
|
en
| 0.971166 | 2,129 | 2.578125 | 3 |
12 CLINICAL PHARMACOLOGY
12.1 Mechanism of Action
Thyroid hormones exert their physiologic actions through control of DNA transcription and protein synthesis. Triiodothyronine (T3) and L-thyroxine (T4) diffuse into the cell nucleus and bind to thyroid receptor proteins attached to DNA. This hormone nuclear receptor complex activates gene transcription and synthesis of messenger RNA and cytoplasmic proteins.
The physiological actions of thyroid hormones are produced predominantly by T3, the majority of which (approximately 80%) is derived from T4 by deiodination in peripheral tissues.
Oral levothyroxine sodium is a synthetic T4 hormone that exerts the same physiologic effect as endogenous T4, thereby maintaining normal T4 levels when a deficiency is present.
Absorption of orally administered T4 from the gastrointestinal tract ranges from 40% to 80%. The majority of the levothyroxine dose is absorbed from the jejunum and upper ileum. The relative bioavailability of LEVOXYL tablets, compared to an equal nominal dose of oral levothyroxine sodium solution, is approximately 95% to 98%. T4 absorption is increased by fasting, and decreased in malabsorption syndromes and by certain foods such as soybeans. Dietary fiber decreases bioavailability of T4. Absorption may also decrease with age. In addition, many drugs and foods affect T4 absorption [see Drug Interactions (7)].
Circulating thyroid hormones are greater than 99% bound to plasma proteins, including thyroxine-binding globulin (TBG), thyroxine-binding prealbumin (TBPA), and thyroxine-binding albumin (TBA), whose capacities and affinities vary for each hormone. The higher affinity of both TBG and TBPA for T4 partially explains the higher serum levels, slower metabolic clearance, and longer half-life of T4 compared to T3. Protein-bound thyroid hormones exist in reverse equilibrium with small amounts of free hormone. Only unbound hormone is metabolically active. Many drugs and physiologic conditions affect the binding of thyroid hormones to serum proteins [see Drug Interactions (7)]. Thyroid hormones do not readily cross the placental barrier [see Use in Specific Populations (8.1)].
T4 is slowly eliminated (Table 7). The major pathway of thyroid hormone metabolism is through sequential deiodination. Approximately 80 % of circulating T3 is derived from peripheral T4 by monodeiodination. The liver is the major site of degradation for both T4 and T3, with T4 deiodination also occurring at a number of additional sites, including the kidney and other tissues. Approximately 80% of the daily dose of T4 is deiodinated to yield equal amounts of T3 and reverse T3 (rT3). T3 and rT3 are further deiodinated to diiodothyronine. Thyroid hormones are also metabolized via conjugation with glucuronides and sulfates and excreted directly into the bile and gut where they undergo enterohepatic recirculation.
Thyroid hormones are primarily eliminated by the kidneys. A portion of the conjugated hormone reaches the colon unchanged and is eliminated in the feces. Approximately 20% of T4 is eliminated in the stool. Urinary excretion of T4 decreases with age.
|Hormone||Ratio in Thyroglobulin||Biologic Potency||t½|
|
<urn:uuid:b2e541da-33c4-425e-ae50-6ecffd6008b3>
|
CC-MAIN-2023-23
|
https://www.pfizermedicalinformation.com/en-us/levoxyl/clinical-pharmacology
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648858.14/warc/CC-MAIN-20230602204755-20230602234755-00495.warc.gz
|
en
| 0.893928 | 813 | 2.9375 | 3 |
A new management plan for Stonehenge
This lesson idea has been a long time in the planning. The concept is simple; students are given an informative Google Earth file that allows them to view an Ordnance Survey map extract, pictures and video clips. These resources form the background of a simple decision making exercise, suitable for most ages and abilities. More able students will appreciate that the issues surrounding the management of Stonehenge are both complex and contentious. The recently published Action Plan for Geography KS3 support materials found on the Geography Teaching Today web site include a scheme of work called Fantastic Places. The scheme includes a lesson entitled Stonehenge - Seventh Wonder or National Disgrace? and this activity has been written as a kind of extension activity.
Stonehenge is a prehistoric monument of worldwide importance. The standing stones were erected some 2000 years ago, though the accompanying earthworks were begun over 1000 years earlier. There is evidence for human activity on the site dating back 8000 years. The original purpose of the site remains open to speculation.
It is widely agreed that the current visitor facilities require urgent improvement. In 1993 Stonehenge, which is owned by the nation, was criticised by Parliament's House of Commons Public Accounts Committee as 'a national disgrace'. The visitor experience is marred by several problems. The site itself is located between two busy roads that easily become congested, and the visitor centre, while designed to be low profile, is unattractive and dated.
The stones themselves are fenced off to prevent unauthorized access.
A management plan for Stonehenge is urgently needed in order to restore some of the tranquility of the unique setting and to conserve the surrounding landscape and archeology while meeting the needs of the many thousands of annual visitors.
Two management plans have been proposed in recent years...
The Stonehenge Project(web site)
Eight years of consultation and planning culminated in the World Heritage Site Management Plan. Jointly developed by English Heritage, the National Trust and the Highways Agency, together with local and national government bodies. The Plan called for the building of a £67 million visitor centre at Countess Roundabout to replace the existing facilities adjacent to the Stones. Crucial to the plan was the closure of the A344 and a road scheme for the A303 that called for the construction of a bored tunnel to hide the part of the road that is visible from the Stones. The scheme also comprised roundabout improvements at Countess East and Longbarrow crossroads and a bypass for the village of Winterbourne Stoke. The A303 itself was to be upgraded to a dual carriageway. Visitors would park at Countess East and travel part way to the stones on a land train.
map source (used by permission)
An alternative plan suggested by the pressure group Heritage Action makes the case for a simpler management strategy. The plan involves closing and grassing over the A344 road from its junction with the A303 up to the far end of the visitors’ car park, de-commissioning the pedestrian tunnel and moving the nearest fences much further away from the stones. The question of the relocation of the visitor centre is treated as a separate issue.
Planning permission for the new visitor centre that is part of the Stonehenge Project plan was granted in March 2007. However the government subsequently refused to sanction the A303 road scheme which effectively means that the Stonehenge Project cannot proceed. English Heritage are very disappointed with the decision and intend to look at alternative ways to improve the setting of the stones (source) Heritage Action on the other hand are delighted, claiming that the Stonehenge Project "... aimed to improve the immediate setting of the stones but at the cost of vast collateral damage to the wider surrounding landscape and was consequently strongly opposed by most archaeological and heritage bodies."(source)
Both parties agree on the urgent need to improve the current situation. Given the combined failure of government, landowners and pressure groups to agree on a workable solution, the time has arrived for young people to have their say!
Update: 21/5/09 BBC News report (Thanks to Alan Parkinson)
The activity is best undertaken in small groups each with access to a PC with access to Google Earth and Flickr. If the students have not used Google Earth before they would benefit from a pre-learning activity that teaches some basic concepts including how to create a placemark, how to use and organize the Layers and My Places panels, the use of the transparency slider tool and how to create polygons and paths. Google have a comprehensive user guide here.
Briefing paper (link to Geography Teaching Today site)
Begin the lesson by showing the starter video. The video is best shown from within the Google Earth file.
Students then read the briefing paper found on the GTT site.
The next stage is to introduce students to the Google Earth file. They should use the file to learn more about the Stonehenge site and the management issues. The OS map overlay can be used to identify the key locations mentioned by the Stonehenge Project. There are a variety of visitor opinions expressed in the videos. Some students might be persuaded by them - for example should visitors be able to touch the stones? Should it be free to enter the site? Is the road noise intrusive? At this point the teacher should be encouraging students to ask as many questions as possible.
Groups are then given free reign to design their own management plan using the tools in the free version of Google Earth. They can also use any of the photos from my Flickr set. The outcome will be a Google Earth KML file that may include some or any of the following:
Paths to indicate any planned changes to roads / paths
Polygons to indicate the locations of new visitor facilities
Annotated placemarks to describe their decisions
The key Google Earth functions for this task.
From L to R: new placemark, new polygon, new path
The various lines shapes and placemarks created during the task need to kept in a folder within the My Places panel. This means that students can easily save their work to a shared folder, and the work of a whole class can be viewed on a large screen. Simply right click on the folder and choose "save as"
Here is an example of a very basic exemplar outcome. The screenshot is from Google Earth 4.3.
Google Earth exemplar file
The best work will demonstrate that all the resources, including the Ordnance Survey map have been used to inform the outcome. The decisions will be carefully justified, realistic and achievable. It would be absolutely fine for students to base their decision on one of the existing plans, providing they explain their reasons. I recommend that teachers devise an assessment mark scheme with class involvement so that students understand what a good piece of work will look like.
The lesson may be concluded with some form of role-play as groups present their ideas to each other.
Some students may go further with Google tools and use Sketchup to make a 3D model of an alternative visitor centre.
Students interested in exercising their "pupil voice" may like to write to English Heritage or the Minister of State for the Environment with their ideas.
Teachers are welcome to send me examples of their student's work.
Thanks to English Heritage for permission to access the site and take photographs and videos
The Ordnance Survey kindly donated the map extract for the Google Earth file. Special thanks to Roger Jeans!
Jon Wolton at the RGS produced the briefing paper
The RGS for permission to use the map on this page
Laura Jenkins assisted with fieldwork
This lesson is for Chris Durbin - get well soon!
|
<urn:uuid:a4b47343-5579-4af9-b8b6-8cfb2e30d7b0>
|
CC-MAIN-2013-48
|
http://www.juicygeography.co.uk/stonehenge.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163052338/warc/CC-MAIN-20131204131732-00074-ip-10-33-133-15.ec2.internal.warc.gz
|
en
| 0.943771 | 1,572 | 3.578125 | 4 |
Linux is a multi-tasking operating system for businesses, education, and individual programming. Linux is the name of the operating system kernel. Despite the fact that the kernel has a monolithic architecture and is not considered progressive, it supports most of the modern technologies and is multi-user and multi-tasking. Linux operating systems can be found everywhere – starting from the simplest smartphone and ending with the virtual backbone of the world of the Internet or the largest and most powerful computer. Linux belongs to the family of UNIX-like operating systems. It can run on Intel 80386, 80486, and Pentium computers. It is the flexible implementation of OS UNIX freely distributable under the general license GNU. People install Linux in the network of machines and use the operating system for data processing in finance, medicine, distributed processing, and telecommunications. This operating system is the third most popular. Nowadays, Linux is a good competitor to operating systems developed by giant corporations and it is still gaining popularity around the world.
It is rightly believed that Linux has two progenitors. It is the UNIX operating system and the project GNU. In the book A Practical Guide to Fedora and Red Hat Enterprise Linux, it is mentioned that “The Linux operating system grew out of the UNIX heritage to become a popular alternative to traditional systems”. The first UNIX system was developed in 1969 in Bell Labs division of AT & T. At that time, AT & T company was prohibited from engaging in the computer business. In such a way, the UNIX operating system was distributed free of charge and its source code were open. This fact contributed to the spread of the system in the university environment and its rapid development. Students and professors added improvements to it and created utilities. Commercial companies developed clones of UNIX. The system rapidly gained popularity.
In 1983, the protocol stack of TCP/IP was implemented. It significantly expanded its networking capabilities. As a result, in the 80s, the intensity of the struggle between the manufacturers of UNIX reached a maximum. In 1983, the ban on the engagement in the computer business was canceled from AT & T. The company was engaged in the commercialization of its development. It closed source code of the system. Moreover, companies using these codes were subjected to the patent harassment. After several years, the development of UNIX virtually stopped. UNIX computers gave way to competing systems, such as MS-DOS and Apple Macintosh.
The second progenitor of Linux is the GNU Project by Richard Stallman. It originated in 1983. Its goal was to create a completely free operating system. The circumstances arising in 1982 were the impetus for the birth of the project. At that time, Richard Stallman worked in the Artificial Intelligence Laboratory at the Massachusetts Institute of Technology. The laboratory bought the commercial operating system. The terms of the licensing of the system applied restrictions on the distribution of the program source code. It significantly impeded the process of software development and required re-design of existing components.
Being a very talented programmer, Richard Stallman decided to begin the development of the GNU project. The author Christopher Negus mentions that “In 1985, Richard M. Stallman started the GNU project recursively named by the phrase GNU is Not UNIX”. Its goal was to create a Unix-compatible operating system, which would have kernel and all related utilities. There was also the possibility of free obtaining the source code of the project. All interested people were invited to participate in the project. The first program developed under the project was the text editor Emacs. In the book Red Hat Linux – Study Guide, the author states that “To organize the work on the GNU project, Stallman and other people created an organization, Free Software Foundation”. It was a charitable foundation for the development of free software. The next important step was the creation of the General Public License. The program could be run for any purpose. Anyone could redistribute the program having the opportunity to help others. It was possible to copy, modify, and transmit software released under this license.
By 1990, within the framework of the GNU project, there were most of the components required for the functioning of a free operating system. In addition to the text editor Emacs, Stallman created a compiler gcc and the debugger gdb. A library of C language and a shell BASH have been also developed. However, there was no kernel. At the same time, the Finnish student Linus Torvalds developed the kernel of Linux. It appeared at the right time. Nowadays, the symbiosis of these two developments is called GNU/Linux.
In his youth, Linus Benedict Torvalds had a personal computer based on the Intel 80386 processor with 4 MB of RAM and a clock speed of 33 megahertz. Impressed by Andrew S. Tanenbaum’s book – a developer of educational operating system Minix, Linus installed the operating system Minix on his computer. However, the young student was not satisfied with the system. Linus Torvalds did not like the work of the terminal, with which it was connected to a University computer and to the Internet. Linus began writing his terminal. After the terminal was ready, there was a problem with the downloading and uploading files. Thus, Linus had to write drivers for the floppy drive and then the file system, since there were problems with multitasking at the Minix file system. In such a way, there was a draft of the future operating system.
Linus Torvalds became interested in an idea of creating his operating system. On August 25, 1991, Torvalds wrote the e-mail in the mailing list of Minix members. He reported that he was developing the operating system and requested to specify the comments and suggestions from Minix users. This day is considered the birthday of Linux. On 5 October, Linus released the kernel of the version 0.2 and put the source code on the Internet. Many people were interested in this system. In 1992, the version 0.12 was released under license GPL. Linux became the property of the whole world. The version 0.96 was released in April 1992. Only two years later, there was the first stable release – the version 1.0. By this time, there were already thousands of people in the ranks of the developers. The system was developing dynamically. Industrial and small companies started to develop, sell, and add their versions of the open OS in their devices. There were Linux distribution disks.
Distribution disks of Linux is a set of software packages including the basic components of the operating system with the kernel Linux, some set of software applications and installation program that allows installing of the computer operating system GNU/Linux and a suite of applications required for a particular system application. In such a way, it is a complete, full-featured system that is already adapted for the usage by the end users. The first Linux distributions appeared soon after Linus Torvalds released the developed kernel under the GPL license. Some programmers have started to develop program installations and other applications, the user interface, and package management. They also released their distributions.
After the release of the version 1.0, the kernel continued its development in two branches. The first branch was stable recommended for wide use. The second was experimental. It was a test version, which included new features. The development of Linux gathered pace all the time. If the version 0.1 had only 8400 lines of code, the version 1.0 had already 170 000. In June 1996, the system supported multiple architectures and multiprocessing technology. Further development was mainly aimed at improving the performance and support of new technologies and hardware. At this time, Torvalds almost withdrew from the direct kernel development. His main responsibility was the management of the development process. In 1996, a symbol of the system appeared. It became a penguin Tux, the distinguishing feature of which – yellow legs and a beak.
Wide dissemination of the Linux operating system began with the appearance of a stable kernel version 2.2 in January 1999. It drew the attention of the producers of server applications, databases, Web-servers, and applications for all kinds of PC security. It largely happened due to the wide dissemination of the web server Apache. To date, about 65% of web-servers are running on operating system Linux. The infrastructure of the most popular search engine Google.com and a site wikipedia.org is built on the basis of multiple servers with Linux. It is clear that this system has a great future. In many countries worldwide, there is a process of implementation of Linux and free software at schools and public institutions.
What was conceived as a program for the connection to the university computer has turned into the most ambitious project of the world of free software. A model of the participatory development of open source software has proven its viability. An open source significantly reduces the cost of developing of closed systems for GNU/Linux and allows reducing the price of the solution for the user. My opinion is that it is a reason why the GNU/Linux has become a platform often recommended for many products. Linux operating system is the most popular project of the UNIX system. Today, the pace of the market development of this system is the most intense in comparison with other well-known operating systems. My opinion is that Linux has many advantages compared to other operating systems. These advantages include free distributions and programs, flexibility, modern design, and the presence of interesting things that distinguish it from other systems. It gives a user new experience. It is easy to use, has low system requirements, functional, and reliable.
Linux is a common name of the UNIX-like operating system based on the eponymous kernel, collected libraries, and system software. Linux has two progenitors – the UNIX operating system and the project GNU. GNU/Linux is not a product of a single company. It makes the operating system completely free. This fact gives many advantages to this operating system. This operating system has a great future.
|
<urn:uuid:fce26422-dc57-4ba9-a247-15fb8e4a7c7e>
|
CC-MAIN-2020-16
|
https://essays-lab.com/essays/Exploratory/history-of-linux.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371807538.83/warc/CC-MAIN-20200408010207-20200408040707-00161.warc.gz
|
en
| 0.966019 | 2,064 | 3.296875 | 3 |
Journey and Arrival
“Transfer the savage-born infant to the surroundings of civilization and he will grow to possess a civilized language and habit.”
-Richard H. Pratt
Pratt’s Experiment in Education
Military officer Richard Henry Pratt devised an approach to Indian assimilation while overseeing Indian prisoners at Fort Marion in St. Augustine, Florida. The prisoners’ hair was cut and they were dressed in military uniforms. Pratt established classrooms where the prisoners learned English. Prisoners were sent to work for local individuals and businesses in the community in a practice called the Outing Program, which was used later in the Indian schools.
In 1878 Pratt took 17 of the youngest released prisoners to Hampton Normal and Agricultural Institute in Virginia, a historically black university. He lobbied to set up his own school for Indian students and found a location at the abandoned military barracks at Carlisle, Pennsylvania, now the site of the U.S. Army War College. Carlisle Indian Industrial School was in operation from 1879 to 1918.
“A great general has said that the only good Indian is a dead one, that high sanction of his destruction has been an enormous factor in promoting Indian massacres. In a sense, I agree with the sentiment, but only in this: that all the Indian there is in the race should be dead. Kill the Indian in him and save the man.”
-Richard H. Pratt, 1892
In some ways Pratt was progressive for his time, believing that all individuals could advance to the same level of learning, given the proper environment and education. The prevalent racist view of the late 1800s was that people of color were inferior in intellectual and physical abilities.
-Angel De Cora, student at Hampton (1883-1888) and went on to teach at Carlisle Indian School (1906-1915)
The Trauma of Separation
“I still picture my folks to this day, just standing there crying, and I was missing them. I got on the train and I don’t even know who was in the train because my mind was so full of unhappiness and sadness…”
-Juanita Cruz Blue Spruce, Ohkay Owingeh Pueblo, attended Santa Fe Indian School, 1915
“I remember it was in October they came to get me. My mother started to cry, ‘Her? She’s just a little girl! You can’t take her.’ My mother put her best shawl on me.”
-Juanita Cruz Blue Spruce, Ohkay Owingeh Pueblo, Santa Fe Indian School student, 1915
“In my decision to go [East to Carlisle], I gave up many things dear to the heart of a little Indian boy, and one of the things over which my child mind grieved was the thought of saying goodbye to my pony. I rode him as far as I could on the journey, which was to the Missouri River, where we took the boat. There we parted from our parents, and it was a heart-breaking scene, women and children weeping. Some of the children changed their minds and were unable to go on the boat, but for many who did go it was a final parting.”
-Luther Standing Bear (Oglala Lakota) reflecting on his journey to Carlisle Indian Industrial School, Pennsylvania, in his memoir Land of the Spotted Eagle, 1879
“I was recruited as a teenager. . .I was the first one in my family to go. I was kind of a black sheep. My mother really objected to my going to school; she did not want to release any of her children for school. My uncle and other relatives tried to persuade her. . .The day that the recruiting police came to Round Rock, she gave in and let me go. My brothers and sisters did not come; I was the only one.
-Frank Mitchell, Navajo, sent to the U.S. Government School in Fort Defiance, c. 1895
The Process of Civilizing. “Erase and Replace.”
“The next day the torture began. The first thing they did was cut our hair … while we were bathing our breechclouts were taken, and we were ordered to put on trousers. We’d lost our hair and we’d lost our clothes; with the two we’d lost our identity as Indians.”
-Asa Daklugie (Chiricahua Apache), 1886, taken from Fort Marion to Carlisle Industrial Indian School
Very shortly after children arrived at the boarding schools, the process of stripping away their Native identity began. Students endured haircuts, delousing (whether needed or not) and bathing in lye soap. Home clothing and moccasins were removed and discarded, replaced by military uniforms and Victorian dresses and lace-up shoes.
“When you first started attending school, they looked at you, guessed how old you were, set your birthday, and gave you an age. Then they’d assign you a Christian name. Mine turned out to be Fred.”
-Fred Kabotie (Hopi), attended Santa Fe Indian School 1915-1920
Students were given a number and an “American” name. Student records documented their height, weight and lung capacity—a screening for tuberculosis. Administrators were reluctant to accept sick children. Deaths of students tarnished the school’s reputation. New students were forbidden to speak their Native language, and they struggled to communicate without being punished.
Children’s spiritual lives were interrupted by their removal from their tribal surroundings. At the boarding schools they did not experience puberty ceremonies which marked a young girl’s transition to womanhood, or a young boy’s passage into being a man. Instead puberty was treated as something one did not discuss or celebrate, a direct contradiction to many tribal ceremonies.
“When they first took us in school, they gave us government lace-up shoes, and they gave us maybe a couple pair of black stockings, and long underwear, about a couple of them, and… slips and dress. Then they gave us a number. My number was always twenty-three.”
–Lilly Quoetone, Nahwooksy, Fort Sill Indian School Experience, 1981 (publication date)
“Before and After”
Eskimo group before and after they entered Carlisle Indian Industrial School, 1897. J.N. Choate, photographer. Cumberland County Historical Society, Carlisle, Pennsylvania.
Portrait of Annie Dawson, Carrie Anderson and Sarah Walker, upon their arrival and 14 months after at Hampton Normal and Agricultural Institute, 1878. Hampton University Archives, Hampton, Virginia. RC125(7)220.127.116.11
Portrait of Zie-wie Davis (Sioux, Crow Creek Agency), 1878, one of the first to arrive at Hampton Normal and Agricultural Institute, and 4 months later. William Larrabee, photographer. Hampton University Archives, Hampton, Virginia. RC125(7)18.104.22.168 and RC125(7)22.214.171.124
In 1894, the Hopi people resisted the U.S. government on several counts. They refused to send their children to the government boarding school in Keams Canyon. The school was in dismal condition—overcrowded and inadequately furnished—and Hopi leaders opposed the assimilation program. U.S. cavalry troops arrived in the Hopi village of Oraibi and arrested 19 leaders for refusing to send their children to school. They were taken to Fort Defiance, put on a train and shipped to Alcatraz, in San Francisco Bay. They were incarcerated for nine months, missing important ceremonies at home such as the planting and harvesting seasons.
This was one of the more overt acts of resistance to the schools, but families took many measures to keep their children at home.
|
<urn:uuid:5593b6fb-b8db-4e98-bb10-63c51d689e20>
|
CC-MAIN-2023-40
|
https://boardingschool.heard.org/journey-and-arrival/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510387.77/warc/CC-MAIN-20230928095004-20230928125004-00878.warc.gz
|
en
| 0.977481 | 1,668 | 3.546875 | 4 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.