text
stringlengths 263
344k
| id
stringlengths 47
47
| dump
stringclasses 23
values | url
stringlengths 16
862
| file_path
stringlengths 125
155
| language
stringclasses 1
value | language_score
float64 0.65
1
| token_count
int64 57
81.9k
| score
float64 2.52
4.78
| int_score
int64 3
5
|
---|---|---|---|---|---|---|---|---|---|
The main objective of this session is to make sure you know the provisions of the Family Educational Rights and Privacy Act (FERPA) and what is required of you to comply. By the time the session is over, you will understand why FERPA is important, basic terminology and concepts associated with the law, the rights of parents and eligible students and how to uphold those rights, what information schools can and cannot disclose, and recordkeeping requirements.
Why “FERPA: How to Protect Student Privacy in Higher Education” Matters:
- Protect students’ privacy to avoid discrimination, identity theft, or malicious and damaging acts.
- Understand who has the right to access or modify a student’s education records.
- Learn to carefully balance privacy and safety.
- FERPA safeguards the privacy of personally identifiable information (PII) by making it illegal to improperly disclose data from student education records.
- The law applies to all educational agencies and institutions that receive funds under any program administered by the U.S. Department of Education.
- FERPA affords eligible students certain rights in regard to their education records.
- Schools are responsible for understanding and enforcing the provisions of the law.
|
<urn:uuid:68275544-9a3e-43c3-954d-a42916cc63db>
|
CC-MAIN-2017-39
|
http://trainingtoday.blr.com/course/ferpa-how-to-protect-student-privacy-in-higher-education/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818695726.80/warc/CC-MAIN-20170926122822-20170926142822-00566.warc.gz
|
en
| 0.917606 | 247 | 3.3125 | 3 |
Hierarchical gene sharing between humans and other
groups of creatures
from other Primates, including the Great Apes (Chimps,
Gorillas, and Organutans) by <1% of
their genes. Humans share an additional 22% with
other vertebrates species, and an aggregate of 49%
invertebrate species as well. A third of all genes are
common to all eukaryotes.
|
<urn:uuid:aa5e3fe9-1f4e-4731-8619-d93451af2e85>
|
CC-MAIN-2014-23
|
http://www.mun.ca/biology/scarr/IG1_19_Fig04.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510261771.50/warc/CC-MAIN-20140728011741-00382-ip-10-146-231-18.ec2.internal.warc.gz
|
en
| 0.886212 | 92 | 2.8125 | 3 |
- Objectives of Farm Mechanisation.
- Machine Capacities, power requirements, rates of work and efficiency.
- Planning and organisation of labour and equipment for optimum output.
- Selection of tractors and machines. Alternative machinery sources.
- Replacement policies. Depreciation.
- Financing machinery acquisitions.
To achieve credit for this module, students must be able to:
- Determine appropriate machinery sizes and match equipment for optimum performance.
- Determine machinery ownership costs and be able to make decisions relating to cost effective acquisition of machinery services.
- Understand the role of machinery planning, selection and management and the impact on the farm business.
- Develop a spread-sheet for calculating outputs and running costs
|Coursework||1 x practical exercise - Development of spread sheet for machinery costs||25%|
|Coursework||1 x synthesis paper - Project on cropping and machinery selection and replacement||75%|
Students should be familiar with the content of at least one of the following:
- Landers, A.J. (2000). Farm Machinery: Selection, Investment and Management. Farming Press.
- Witney, B. (1995). Choosing and Using Farm Machines. (Revised edition). Land Technology.
|
<urn:uuid:bf954db1-652b-489a-b4b4-39c05c59d1d2>
|
CC-MAIN-2020-24
|
https://www.rau.ac.uk/about/organisation/public-information/academic-information/modules/2130-machinery-management
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347441088.63/warc/CC-MAIN-20200604125947-20200604155947-00594.warc.gz
|
en
| 0.78344 | 258 | 3.140625 | 3 |
Battery Recycling Process Overview
This process illustrates the preliminary processing steps for battery recycling through TCRW via EasyPak™ or our Bulk Pickups undergo. The process consists of:
Battery recycling receipt and inspection
Sorting of conforming batteries
(non-conforming batteries are returned to generator)
Separation of final product
(Ni, Fe, Cr, Mn, & Zn-O)
Sizing and Alloying Details
Material sizing is applied to the battery feedstock in order to equalize the heat transfer rate of the material. In order to heat the material evenly, all feedstocks placed into the furnace must be of equal size, or relative with respect to each other. For example, AAA and AA sizes heat evenly and so do C and D size units.
But a large change in the heat transfer rate between AAA and C or D size units exist, so mechanical sizing practices are applied in order to maintain optimum furnace performance (melt- rate). Lantern types require an additional process step for the same reasons already described.
The alloying operation is made up of a molten metal bath of nickel alloy. The battery types and sizes described above are fed into the molten bath at a temperature of approximately 2,800F. During this process step, a metal separation occurs which is actually the recycling step itself. During the amalgamation of the alkaline battery metals (low-temperature metals), with the existing molten metal bath (high-temperature metals), the separation of metals occurs.
Due to the large differences in the metals melting temperatures, the low-temperature metals cannot amalgamate with the high temperature molten metal bath (2800F); therefore, they must enter into a different phase – gaseous. In the gaseous phase, the low-temperature metals oxidize and separate, where they are collected as metal-oxides.
- High-Temperature Metal Alloy (Ni, Fe, Cr, Mn)
- Recovery of the Low-Temperature Metal, Zn-O (Zinc-Oxide).
|
<urn:uuid:f5eee52f-c24b-4d9c-88f8-09e555fe5a14>
|
CC-MAIN-2023-14
|
https://tcrwusa.com/pages/how-your-batteries-are-recycled
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949701.56/warc/CC-MAIN-20230401063607-20230401093607-00513.warc.gz
|
en
| 0.858019 | 447 | 2.5625 | 3 |
1) Why are they called “flying squirrels” if they don’t actually fly?
a) They do fly.
b) They glide, which gives the appearance of flying. <—
c) The jumping action they perform looks like flying.
d) They have wings that are non-functional.
2) What are the advantages presented by “flying?”
a) Flying is cooler than running/climbing.
b) Flying allows for another niche to be explored towards the canopy.
c) Their shelters can be an abandoned bird nest.
d) Their shelters can be an abandoned wood pecker cavity.
e) All of the above! <–
3) Why is the flying squirrel a representation of forest ecosystems?
a) The flying squirrel impacts the forest in a negative way.
b) Higher squirrel populations represents a healthy forest. <–
c) Because where there is a Rocky, there is a Bullwinkle!
d) None of the above
4) How does the flying squirrel affect its surroundings?
a) The feces produced by the squirrels serves as an important food source.
b) The truffles eaten by the squirrels are dispersed to maintain a healthy forest.
c) Some predators depend directly upon the population of squirrels.
d) a &c
e) b&c <–
5) How does the human impact affect the flying squirrel?
a) Reducing canopy cover in dry forest restorations limits squirrel populations.<–
b) The hunting of the spotted owl makes squirrel populations boom.
c) Pollution is responsible for toxins that kill off squirrel populations.
d) All of the above
|
<urn:uuid:3d517791-8012-43a6-ba42-a61740953e9a>
|
CC-MAIN-2014-10
|
http://2013zoologyvodcasts.wordpress.com/
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999679512/warc/CC-MAIN-20140305060759-00010-ip-10-183-142-35.ec2.internal.warc.gz
|
en
| 0.867071 | 356 | 3.75 | 4 |
Sweat It All Out!
Benefits of the Sauna
There is a valid reason why human beings have used sweat baths for hygienic and health purposes since the Stone Age. It's because sweating has proven its effectiveness in flushing out toxins and disease and maintaining optimal physical as well as mental health.
Most cultures around the world have their own versions of the sweat bath, whether it's the ancient Romans and their "Thermae" or the traditional Japanese "Onsen". The Russians call it the "Banya" and the for native North American Indians it's "Inipi", without omitting the notorious Turkish bath or "Hamam". However, the most prominent and popular one of all is the Finnish Sauna.
The skin is the largest organ in the body and through the pores it plays a major role in the detoxifying process alongside the lungs, kidneys, bowels, liver and the lymphatic and immune systems. The skin produces cool sweat to regulate the body's elevated temperature. It also has the ability to transform toxins from lipid-soluble or oil-based, into -easier to eliminate- water-soluble forms. Sweat carries toxins out of the body and flushes them through the pores.
Sweating is the body's safe and natural way to heal. Scientists and doctors are finally acknowledging what our ancestors instinctively knew, that regular sweating restores good health through the elimination of toxins.
Benefits of the SaunaOur modern lifestyle makes most people's skin inactive. Many of us don't sweat, especially during the winter months. Modern synthetic fibres or tight clothing that doesn't allow the skin to breathe, can damage the skin and our natural ability for elimination, as does excessive prolonged sun exposure. A sedentary lifestyle also disactivates the skin.
Our skin is exposed to hundreds of chemicals during the course of our life, and is affected by them. From innocent bath products such as shampoos, shower gels, lotions and soaps to deodorants. Household cleaning solvents, detergent residues on clothes and chemicals from the bath or shower water also affect the skin.
Regular use of the sauna gradually restores the skin's elimination ability. Sweating removes toxic chemicals and metals faster than other detox method. It is a good habit that pays many health dividends.
The sauna's benefits are numerous. It's main one being the fact that it promotes sweating, helping the body to rid itself of toxins. It is also believed that exposure of the skin to heat stimulates the production of white blood cells and strengthens the immune system.
Other benefits of the sauna include:
- Improved blood circulation: The sauna increases and improves the rate of blood circulation and breathing.
- Weight loss: Sauna is similar to mild exercise, it burns about 300 calories per average session. Regular sauna treatments combined with a healthy diet and moderate exercise will help you lose weight and stay fit and healthy.
- Skin cleansing: A profuse sauna-induced sweat followed by a shower cleanses your skin far more thoroughly than just taking a shower. It makes it soft and healthy with immediately noticeable effects.
- Body relaxation: Stress build-up creates tension in the body manifesting in various aches and pains. The heat and humidity of the sauna diffuses the pain and relaxes tired muscles. A sauna in the evening will leave tense muscles and sore limbs totally relaxed. Sauna also temporarily relieves arthritic pain.
- Mind relaxation: The sauna is essentially a place to relax. Regular sauna adepts all agree that it effectively helps relieve physical and mental fatigue and stress.
The sauna enhances circulation and oxygenates the cells, tissues and organs. It increases the body's ability to produce energy, which promotes healing. Heating the tissues also speeds up the metabolism. Your cells are gradually capable of eliminating toxins much more effectively.
Isn't time to indulge?
PS: Accumulated toxins age the body because they prevent cells from regenerating efficiently. Louis Kuhne, an early pioneer of hydrotherapy (19th century), particularly recommends combining the sauna experience with the Detox Bath for a highly effective daily detox.History of bathing
Stress, anxiety, anger and all negative emotions release toxins in the body. More
"A great life is born in the soul, grown in the mind and lived from the heart."
|
<urn:uuid:3330dd20-9a18-43a0-ab24-70770bfa8ee0>
|
CC-MAIN-2017-26
|
http://www.pureinsideout.com/benefits-of-sauna.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320077.32/warc/CC-MAIN-20170623170148-20170623190148-00510.warc.gz
|
en
| 0.939918 | 901 | 2.515625 | 3 |
When a person lies there are a number of tells that a trained professional can use to spot them. The accuracy of detecting a lie is around 65% for an expert interrogator. But that job may soon fall to a machine rather than a person.
Research being carried out at the University of Buffalo Center for Unified Biometrics and Sensors (CUBS) has created a new automated eye tracking machine. Testing has shown it can achieve a lie detection rate of 82.5% — well beyond what any human can achieve, even those fully trained and with lots of experience.
Our eyes usually give us away when we lie due to their movement. Regular eye movement under questioning usually means we are being truthful, but if that movement changes suddenly and drastically then it’s probably going to be due to a lie being told. This is what the CUBS system looks for when monitoring a person’s eyes, and the 82.5% success rate was garnered from 40 conversations the machine viewed.
In the past CUBS researchers have experimented with monitoring heat changes in the body or facial movement, but neither are as reliable for detecting lies as eye movement. However, with eye analysis now working well, the system can be expanded to monitor other areas too, with the next stage being body movement.
People who are good at lying know how to control their movements when telling a lie. However, it’s much more difficult to keep your eye, facial, and body movement in check, as well as maintaining a body temperature, suggesting that eventually a machine will become the ultimate lie detector no one can beat.
|
<urn:uuid:adf2b22b-0c10-4b0e-85d3-1303989a70cc>
|
CC-MAIN-2014-15
|
https://www.geek.com/geek-cetera/eye-tracking-machine-is-better-lie-detector-than-expert-interrogators-1478575/
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609538787.31/warc/CC-MAIN-20140416005218-00434-ip-10-147-4-33.ec2.internal.warc.gz
|
en
| 0.967557 | 326 | 2.96875 | 3 |
This paper examines the use of an idea referred to as expectancy as a predictor of teen alcohol use. Expectancies are concepts that a society reinforces which go on to influence a person's behavior. Current clinical and field studies show that alcohol expectancies are reasonably accurate tools in estimating future drinking patterns. This paper sets out to determine the practical applications of this knowledge in the real classroom.
Prior to the early 1960s, virtually no clinical studies were available on the topic of teen drinking
, as literature mostly focused on negative social and moral implications
of the activity (Maddox and McCall, 1964). Contrary to somewhat popular notion, however, adolescent drinking is not unique on to the last few decades. In fact, the best indicators show that "drinking among youth has been a longstanding phenomenon" that has shown no significant change over the course of the last 120 years (Barnes, 1982). In the sixties, the issue grew in prominence probably due to the rise of the counterculture and an increase in teen drinking and driving accidents. A number of pioneering social scientists set out to determine basic information about the commonalty and frequency of alcohol use
in this age group. Though specific data varied from study to study due to methodology and demographics, a striking picture emerged that "alcohol use is very prevalent among teenagers and young adults." In fact, Barnes (1982) co
Once research findings established the basic foundations, further questions soon arose on the psychological reasons behind the increase in consumption. Though the answers are still not definitive by any means, a few commonly accepted theories arose. Teens almost consistently report one of three reasons for drinking: partying, self-expression, and anxiety (Maddox and McCall, 1964). None of this information, however, is of particular alarm. Regardless of the reason, most adolescent drinkers consume only occasionally and generally responsibly (Barnes, 1982; Finn, 1979). In fact, a few authors contend that teenage drinking can be a fairly normal step in the process of identity development (Finn, 1979). "Drinking," claims Maddox and McCall (1964), "is important for validating their self-conceptions as adults or their claims to adult status." A great deal of controversy exists on whether time spent with peers in reckless activities such as drinking is a positive aspect of the socialization process as well.
In the late 1970s and into the 1980s researchers begun to realize that they had not designed their studies to examine this much more destructive phenomenon of problem drinking. Differing definitions of problem drinking exist, but virtually all contemporary authors agree that it involves drinking often, and to the point of extreme intoxication. A very complex web of answers began to unfold which included, peer pressure, parental permissiveness, boredom, parental substance abuse and emotional problems (Finn, 1979). Further, it became clear that psychological perceptions of drinking influenced these adolescents' behaviors as much as the physical effects of alcohol (Christiansen et al., 1989).
Researchers began a continuing effort piece together a single explanation for problem drinking. Given the vast set of variables involved, this goal proved to be a formidable task. They shifted focus to the emerging theory of expectancies as a method of prediction. Goldman et al. (1987) defined alcohol expectancy as referring,
to the anticipation of a systematic relationship between events or objects in some upcoming situation. The relationship is understood to be of an if-then variety: If a certain event or object is registered then a certain event is expected to followÉ
Expectation can be inferred to have causal status in that an individual with his/her own actions, may produce a certain consequence upon noting that an if condition is fulfilled.
More simply stated, drinkers learn certain behavior about drinking from their society. When exposed to alcohol, or alcohol-related cues, they accept and act upon these understandings. Aas (1995) believes, "children learn what to expect of alcohol and those expectations are reinforced throughout our societies." These expectancies develop early in life, perhaps as early as the fourth grade (Miller et al., 1990).
A number of surveys can detect expectancies. The one most commonly used for adolescents is the Alcohol Expectancy Questionnaire- Adolescent Form, (AEQ-A). Other significant surveys include both the Alcohol Effects Scale (AES), and the Effects of Drinking Alcohol (EDA). These questionnaires involve extensive self-reporting that target expectancy in normal populations of adolescents (Aas et al., 1995). The results of these surveys can detect both the transition from non-drinker to drinker and problem drinking when analyzed using two detection constructs, or models.
Baker (1987) outlines the two basic constructs that psychologists know as the Conditioned Withdrawal Model (CWM), and the Conditioned Appetitive-Motivational Model (CAMM). The CWM can detect problem drinking based on the notion that certain expectancies are conditioned responses to avoid or escape signs of withdrawal (Baker et al., 1987). It uses craving and negative affect as indicators of an intention to drink. Users who fit into the CWM model often perceive alcohol as an "antidepressant and a euphoriant (Johnson and Fromme, 1994)." The CAMM, on the other hand, uses positive cues as its main indicator. It "proposes that positive mood states characterize the pursuit of alcohol (Johnson and Fromme, 1994)." This model associates exposure to alcohol or alcohol cues is with positive outcomes, eliciting a response to drink. "Positive alcohol outcome experiences are reliably associated with drinking practices, with heavy drinkers holding stronger expectancies than light drinkers (Johnson and Fromme, 1994).
However, several problems have developed in the process of using these constructs as predictive models both in clinical studies and in individual cases. A person develops expectancies in childhood and early adolescence, but they may not influence actual drinking until much later (Christiansen, et al., 1989). In other words, teenagers may have developed a set of expectancies long before, but having never been directly exposed to alcohol or alcohol-cues, they have yet to act upon them. Those unfamiliar with expectancies can think of this effect as a time bomb that the socialization process can trigger any given time. Studies have overcome this barrier by setting up a period between taking the batteries of expectancy surveys and self-reporting studies on actual use. Because of the 'time bomb' effect and study limitations, such long-term tracking can be difficult as an immediate predictor of alcohol use in the individual. Additionally, it has been difficult to find a point at which to discriminate the resp
Current research on expectancies is focusing on combining personal and social statistics with current knowledge on the topic as a better indicator. For both expectancy models, high-risk youngsters clearly hold higher than average expectancies (Christiansen et al., 1989.) A number of studies in recent years have focused on differentially equating individual factors and alcohol expectancies to come up with a better model. In essence, these studies are focusing on integrating expectancy theory into the classic model of risk-detection. Initial studies on certain fronts have shown to provide marginally better constructs at predicting both frequency and quantity of alcohol use. However, "a major controversy exists in the literature concerning whether personal and social expectancies predict different types of outcomes (Reese, 1994)."
Though the literature and research to date have been very effective at showing the accuracy of adolescent alcohol expectancies, I feel it is quite inadequate as to its practical use in the classroom. A few authors make vague and general references to practical utility, but never discuss the topic. I believe, based on the research findings, however, that the potential for incorporating expectancy theory into prediction method in public school is still great. In no way, would it replace the classic model of risk detection, but would serve as a highly effective tool to enhance it. Furthermore, as new findings accumulate we may determine that classic risk detection and expectancies are not so different in their conclusions.
If schools administered expectancy surveys over the span of an adolescent's academic career, then a much clearer picture of potential problem drinking would develop. Tracking over a long period would overcome the methodological problems encountered in some of the clinical research. If schools track expectancies, known drinkers who may be consuming responsibly and in moderation would be less likely to be mislabeled as problem drinkers. Similarly, the system could more clearly identify the child with the resources to effectively cover up his drinking problems. Since research has shown that most expectancies develop even before adolescence begins, perhaps if the child begins taking these surveys early in development, effective intervention into their perceptions of alcohol might be possible.
A number of problems could also arise if schools were to adopt this theory. For example, surveys or constructs provide no definite answers. If the educational system relies to heavily on this theory alone, it dooms the idea to be no better than traditional detection methods. Additionally, the educational system would have to address the issue of confidentiality. Clinical research relies on a high degree of anonymity to elicit accurate responses (Christiansen, 1989). If children complete expectancy surveys, a guarantee does not exist that they will respond honestly. This effect, however, is likely minimal for two reasons. First, the student is less apt to lie, as expectancy surveys deal with attitudes and perceptions rather then reporting actual drinking behavior. Second, as with similar issues, counselors should maintain a high level of confidentially.
The final complication of long term tracking would not be so simple to solve; few in the educational profession are likely to lack training in expectancy theory. It would be a costly effort to attempt to train counseling staffs to understand and interpret survey results within either the CWM or CAMM constructs, or any new highly specific models that are emerging.
Further study must begin to explore specifically the practical applications of expectancies in the educational system such as I discuss. Prior research studies have certainly laid the groundwork to show that expectancies can provide a reasonably accurate prediction and detection tool. Now, both the research and educational communities need to come together to make their use a reality. Additionally, current research on differentially equating specific personal and social factors with expectancy constructs must continue; the more accurate and precise that construct models become, the easier it becomes to use them. Finally, scientists must work to better understand "how children's backgrounds, through the socialization process, can influence their drinking patterns (Aas et al., 1995)." In other words, applying expectancy to the real world beckons a better understand of what events in an adolescent's socialization process are likely to set off the "time bomb" expectancies.
No research has been conducted on the practical applications of what we know about alcohol expectancies. This observation neither nor denies my thesis, but instead merits further investigation. On the basis of on the accumulated knowledge of 30 years of classic model prediction and nearly a decade devoted to expectancy research, I believe that expectancy models do have an appropriate place in today's school systems. Their use may be problematic but the long term benefits of saving the problem drinking adolescents far outweigh the potential negative consequences. More extensive professional investigation is definitely warranted.
|
<urn:uuid:070c9333-1b80-492a-91cb-51f9554a6974>
|
CC-MAIN-2013-48
|
http://www.123helpme.com/view.asp?id=64990
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163049455/warc/CC-MAIN-20131204131729-00009-ip-10-33-133-15.ec2.internal.warc.gz
|
en
| 0.946571 | 2,260 | 3.0625 | 3 |
Local History Room
Narromine Local History Room, located in the Narromine Library provides a plethora of historical information on the communities of Narromine, Trangie and Tomingley including the early settlements of Dandaloo, Timbrebongie, McPhail, Wyanga, and Gin Gin.
Records available at the Narromine Local History Group include:
- Rate books – Narromine Municipal Council 1899-1902, 1920+
- Rate books – Timbrebongie Shire Council 1906 - 1980
- Parish maps – available for all parts of the Shire
- Schools - in the early years the Shire had 28 small country schools, information on these schools has been obtained from the State Archives. A history of Narromine Public School, Tomingley Public School and St. Augustine’s Catholic School, Narromine have been written.
- Cemeteries - records of headstones and unmarked graves are available for areas all over the shire, including some on properties. Photos are available of all headstones in the Narromine cemetery.
- Newspapers - from Narromine exist from 1899-1905, 1925+; from Trangie exist from 1902-1907; Dubbo Liberal 1894-1924
- Obituaries, marriages & births - notices have been extracted from many of the local papers
- Photo collection - many “old” photos of the Shire and its people, many more copies have been donated since 1999. Many photos are held on computer.
- Aboriginal history – local book “Aboriginal History of Central West NSW”; Joyce Payne, the author, has accumulated a large collection of written Aboriginal history of the Wiradjuri people of the Shire from the early years, including many photographs.
- Local history books - approximately 20 local history books have been written on areas within the Narromine Shire, and one is expected on the history of Dandaloo within a short time. Many family history books are also available.
- Thematic & heritage - thematic history of the Shire and histories of 200 sites within the Shire was completed in 2004.
Location: Narromine Library, 31-33 Dandaloo Street, Narromine
Opening Hours: Monday, Wednesday, Friday 10.30am to 4.30pm
Phone: (02)6889 1088
|
<urn:uuid:70e58be5-8043-482e-8dde-b3703e13a3f5>
|
CC-MAIN-2020-05
|
https://www.narromine.nsw.gov.au/community/local-history-room
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251694908.82/warc/CC-MAIN-20200127051112-20200127081112-00309.warc.gz
|
en
| 0.931124 | 501 | 2.71875 | 3 |
Young archaeologists dig up a mysteryJuly 5, 2007 in Other Sciences / Archaeology & Fossils
A group of teenagers taking part in a Cambridge University archaeological dig have unexpectedly unearthed the mysterious remains of a woman who could be more than 1,000 years old.
Pupils from Sir John Leman High School in Beccles and Kirkley Community High School in Lowestoft uncovered the ancient skull during a Higher Education Field Academy dig in the village of Chediston, near Halesworth. The dig was organised by Cambridge University archaeologist Carenza Lewis – well-known to television viewers from Channel 4's Time Team.
Cambridge University experts believe that the body, the rest of which is likely to continue the east beyond the excavated area, belonged to an adult woman who lived in the village either in medieval or Anglo-Saxon times. But the site of the burial is mystifying, leading to questions about who she actually was.
In particular, the woman was buried outside the churchyard – although tantalisingly close to it. The burial spot is just a stone's throw from the graveyard of St Mary's Church (itself an ancient site) and there have been no other human remains found so far in the immediate area.
“At the moment we don't know why this woman was buried outside the graveyard. She may have committed some awful crime, or been thought not to be Christian”, Carenza said.
From the medieval period onwards it was firmly believed that burial in unconsecrated ground condemned the soul to limbo, with no chance of ever going to heaven. People who could not be buried on consecrated ground included suicides, criminals, un-baptised babies, and non-Christians, although the Church usually tried to apply such rules as charitably as possible, denying as few people as possible the awful fate of perpetual limbo.
The woman was, however, buried east to west, the standard form of Christian burial, suggesting that those who buried her must have considered her to be a Christian. With this in mind, the other possibility experts are considering is that the burial of this woman actually occurred longer ago, before the graveyard occupied its present position.
“The skull was found in an area of the village that in the past has turned up pottery and other remains that are late Anglo-Saxon in date, including a timber building,” Carenza added. “It may be that a church much older than the present building stood near here before the Norman Conquest, and that the body we found was buried in its graveyard, which was in a different place to the one we know today. Discoveries of this sort are very rare, and so this is very important. If this theory is correct, it is likely there will be other bodies buried nearby.”
The dig in Chediston was part of an ongoing series of Higher Education Field Academies run by Access Cambridge Archaeology. The scheme, based at the University of Cambridge, aims to bring together school pupils, rural residents, local history societies and the University in an ongoing archaeological investigation into the development of villages and hamlets across the country.
Young people have the chance to run their own mini-excavations over two days and the hope is that this will give them the chance to develop skills, confidence and enthusiasm for attending university in the future. Previous Field Academies have generated a 60% increase in numbers wanting to go on to higher education.
At the same time, the project is revealing important new information about the development of different communities dotted around the English countryside and their past.
“Archaeology is quite a unique subject in that, with the right expert support, you can get involved and actually make important new discoveries without any previous experience,” Carenza, who directs Access Cambridge Archaeology, added.
“This kind of find is part of the beauty of these field academies. We don't know what's out there and what the results are going to be – we send these children to live excavation sites, and the evidence they uncover can be quite spectacular.”
Source: University of Cambridge
"Young archaeologists dig up a mystery" July 5, 2007 https://phys.org/news/2007-07-young-archaeologists-mystery.html
|
<urn:uuid:98cb7d7e-5763-4cda-8167-fa7797b39424>
|
CC-MAIN-2017-26
|
https://phys.org/print102866330.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323808.56/warc/CC-MAIN-20170629000723-20170629020723-00100.warc.gz
|
en
| 0.964765 | 885 | 2.78125 | 3 |
From Science Daily:
High protein diets lead to lower blood pressure, study finds
Adults who consume a high-protein diet may be at a lower risk for developing high blood pressure, concludes a study that found participants consuming the highest amount of protein -- an average of 100 g protein/day -- had a 40 percent lower risk of having high blood pressure compared to the lowest intake level.
One of three U.S. adults has hypertension and 78.6 million are clinically obese, a risk factor for the development of hypertension. Because of the strain that it puts on blood vessel walls, HBP is one of the most common risk factors of stroke and an accelerator of multiple forms of heart disease, especially when paired with excess body weight.
The researchers analyzed protein intakes of healthy participants from the Framingham Offspring Study and followed them for development of high blood pressure over an 11-year period. They found that adults who consumed more protein, whether from animal or plant sources, had statistically significantly lower systolic blood pressure and diastolic blood pressure levels after four years of follow-up. In general, these beneficial effects were evident for both overweight (BMI ≥25 kg/m2) and normal weight (BMI <25 kg/m2) individuals. They also found that consuming more dietary protein also was associated with lower long-term risks for HBP. When the diet also was characterized by higher intakes of fiber, higher protein intakes led to 40-60 percent reductions in risk of HBP.
|
<urn:uuid:a14471cf-aaad-4e40-896e-02b8b670bf46>
|
CC-MAIN-2023-14
|
https://lactobacto.com/2014/09/12/high-protein-diets-linked-to-lower-blood-pressure/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296946535.82/warc/CC-MAIN-20230326204136-20230326234136-00074.warc.gz
|
en
| 0.949977 | 306 | 3.359375 | 3 |
Be in the Know When on the Go in Winter
If you live in an area where winter brings snow, slush and ice, the best advice about driving in these conditions is not to drive in such conditions. But if you must venture out, be prepared.
Many newer vehicles have added safety features that can take some of the hazard out of winter driving. But it is important to know how to use optional equipment such as an anti-lock brake system (ABS).
Give yourself a brake
In slippery conditions, using the proper emergency braking technique can mean the difference between a close call and a serious collision:
On slick or snow-covered roads, drive slower and maintain a greater distance between your car and the vehicle ahead of you.
Be familiar with your car's brakes.
The ABS prevents skidding and wheel lock-up. ABS works with your regular braking systems by automatically pumping them. With ABS, a sensor located in each wheel detects when the wheel is about to stop rotating, lose traction and skid. The ABS then slightly releases braking pressure so the wheel can continue to rotate. This helps maintain steering during hard or panic braking.
According to the National Highway Traffic Safety Administration (NHTSA), unlike traditional brakes, anti-lock brakes should never be pumped.
To maximize the effectiveness of your anti-lock brakes, this is what you should do:
Keep your foot firmly planted on the brake pedal while the ABS brakes for you and you can concentrate on steering to safety.
Maintain pressure and let the ABS adjust brake pressure automatically. Do not remove your foot from the brake.
If your car does not have anti-lock brakes, follow these tips:
Manually pump the brakes to prevent wheel lock up.
Quickly and gently release the brakes. If you remove your heel from the floor, the weight of your entire leg could apply too much pressure and cause the wheel to lockup.
If the wheels lock, quickly release brake pressure, then immediately reapply it using less force.
Prep your vehicle for winter
Before bad weather arrives, the NHTSA and the Centers for Disease Control recommend that you:
Have your vehicle thoroughly inspected by a certified technician. The motor oil, radiator, tires, battery, and ignition system all must be in top condition to perform well year-round.
Prepare a winter survival kit that includes a flashlight, battery-operated radio with extra batteries, blankets, medical kit, tool kit, booster cables, warning device (flares or reflective triangle), bag of sand or cat litter for traction, cloth or paper towels, snow brush, tire pump, flat fixer, washer fluid, compass and maps, plastic bags for sanitation, and small shovel.
Keep gas tank full to avoid ice in the tank and fuel lines.
Hitting the road
Follow these rules when you do drive:
Decrease your speed.
Increase stopping distances.
Safety experts say the first two recommendations are essential because it is impossible to know what's beneath a layer of snow until you apply your brakes. Also, "black ice"--that thin, transparent coating--sometimes appears as if it is merely a wet surface.
Proper visibility means more than just "peephole vision" driving, or clearing just the driver's side of your windshield. Clear snow, ice, and slush from all surfaces of your car, including the windshield, windows, mirrors, and body before driving. Sheets of snow on your hood or roof can peel off while driving and obscure your vision or that of the driver behind you. A film of dried slush on your headlights can dim them. So, for your safety and that of other drivers and pedestrians, clean all areas of your car before you drive it.
|
<urn:uuid:888d74ae-f6fd-4f20-96d7-f7ac53235fd1>
|
CC-MAIN-2020-24
|
https://www.production.consumerportal.baycare.org/health-library/be-in-the-know-when-on-the-go-in-winter
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590348502097.77/warc/CC-MAIN-20200605143036-20200605173036-00286.warc.gz
|
en
| 0.927281 | 767 | 2.53125 | 3 |
Many people have never heard of it, and even those practicing it often have trouble defining it! So what exactly is Permaculture?
The easiest way to think of it is as ‘ecological gardening’, but such a brief description doesn’t really capture the essence of it, so here’s a more formal definition:
Permaculture is a holistic design system that emulates systems that exist in Nature to create sustainable human settlements and food production systems which integrate harmoniously with the natural environment.
It was co-founded by Australian ecologists Bill Mollison and David Holmgren, in the 1970s.
The word "Permaculture" is a contraction of "permanent agriculture" or "permanent culture."
Permaculture is a movement concerned with sustainable, environmentally sound land use and the building of stable communities, through the harmonious interrelationship of humans, plants, animals and the Earth.
The focus of Permaculture design is on the relationship between all the individual elements and their placement in the landscape, to form stable, productive communities that replicate the synergy and efficiency of natural ecosystems, rather than the individual elements themselves.
Permaculture design is applicable to both urban and rural environments, and encompasses all ranges of scale, from an apartment balcony to a large scale farm or village.
Being a design framework, Permaculture is concerned with much more than just the design of ecologically harmonious landscapes that produce food. As a system of design, it can encompass many different disciplines, which provide the techniques and methods to achieve the design goals.
…Permaculture can incorporate the techniques of organic gardening, biodynamic gardening, no-dig gardening, composting and a myriad of other sustainable gardening practices.
Therefore, Permaculture can incorporate the techniques of organic gardening, biodynamic gardening, no-dig gardening, composting and a myriad of other sustainable gardening practices. It can also use techniques of energy-efficient building design, water harvesting, waste water treatment and recycling for example.
Permaculture is a growing and evolving design system and has expanded to include economic and social systems that support stable communities, such as credit co-ops, Local Exchange Trading Systems (LETS) and eco-villages.
Two terms which come close to defining Permaculture, as suggested by ATTRA (The US National Sustainable Agriculture Information Service) are "ecological engineering" or “cultivated ecology".
So, in a nutshell, that’s what Permaculture is!
|
<urn:uuid:e057fa4b-21b9-4660-871a-b1d93c2b7e6e>
|
CC-MAIN-2017-34
|
https://deepgreenpermaculture.com/permaculture/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886105451.99/warc/CC-MAIN-20170819124333-20170819144333-00410.warc.gz
|
en
| 0.935431 | 518 | 3.171875 | 3 |
A population of values has a normal distribution with
Find the probability that a sample of size
Write your answers as numbers accurate to 4 decimal places.
Skilled2020-10-26Added 94 answers
From the provided information,
Let X be a random variable which represents the value score.
The required probability that a sample of size
Hence, the required probability is 0.9029.
|
<urn:uuid:1f4d33b0-c68c-478f-8783-fec3d3fc5e32>
|
CC-MAIN-2023-14
|
https://plainmath.net/college-statistics/6196-population-values-has-normal-distribution-with-equal-239-and-sigma-equal
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296946535.82/warc/CC-MAIN-20230326204136-20230326234136-00191.warc.gz
|
en
| 0.834297 | 107 | 2.75 | 3 |
Every investment carries with it a certain amount of risk, and when making a decision on where to invest it is important to not only understand the potential returns (profit on your investment), but also the risk involved. Depending on how you look at it, risk can either mean the uncertainty of return or losing the money you invested. It is the price we pay for the potential for growth.
Typically the greater the risk of an investment, the greater the potential for high returns, and vice versa. Examples of the different levels of risk include the following types of investments:
Low risk, low return: Money Market
Medium risk, medium return: Property
High risk, high return: Stock Market
When you’re investing, you need to decide what level of risk you are comfortable with, because you don’t want to lie awake at night worrying about your investments. For this reason it is important to understand and accept the risk involved.
There are various types of risk, these include the following:
Capital risk: potential loss of the money you invested
Market risk: potentially selling an investment at a low price
Inflation risk: the rate of return on your investment is lower than the inflation rate
Interest risk: a drop in the interest rate of your investment
Liquidity risk: limits on your access to funds in the investment over a certain period of time.
Legislative risk: changes in laws and legislation regarding investments that may make certain investments less attractive.
Default risk: When the institution where your investment is held goes belly-up and fails.
In many cases risk can be described as the chance that your investment does not achieve the returns you need to meet the financial goals you intended it for. It is for this reason that the different kinds of investments and their associated risk needs to be understood when choosing an investment product that will meet your goals. Some investment products offer various levels of risk that can be applied at different times in the investment’s lifecycle – for instance when saving for your retirement you might want to choose to invest aggressively with high risk, and lowering the risk when you near your retirement age.
One thing is is very important when it comes to investing is time – the longer a risky investment is held, the lower the probability of losses. In general riskier investments are held for more than five years, and the higher the risk of the investment, the longer the period that it’s usually held.
Investing your hard-earned money can be a very stressful experience due to the risk involved with investing. The best way to approach it is to your homework, familiarise yourself with the different levels of risk, decide on your goal for the investment and the level of risk you’re comfortable with, then invest mindfully.
This article was part of a content marketing campaign for a major financial services provider.
|
<urn:uuid:6ed69fc3-b989-4b6b-9a53-0632b78676d0>
|
CC-MAIN-2017-43
|
http://oneantler.com/portfolio/the-relationship-between-risk-and-return/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187825812.89/warc/CC-MAIN-20171023073607-20171023093607-00865.warc.gz
|
en
| 0.953589 | 582 | 2.796875 | 3 |
New Documentary on Colonial Consciousness and Indian cultureDate posted: January 8, 2013 | Short URL: http://samvada.org/?p=14608 | Share:
January 08 2013: Educators’ Society for the Heritage of India (ESHI) and Hindu Students Council (HSC) are releasing ‘Beware of God’: an educational documentary series concerning Indian culture. Based on the work of the acclaimed thinker Professor S.N. Balagangadhara (Ghent University, Belgium), this documentary series is available online at http://www.youtube.com/ESHIFilms. The educational film will be released on Friday January 11, 2013.
The misrepresentation of Indian culture in school textbooks and the media has attracted the attention of critical minds in the West and India. The struggle to correct such misrepresentations resulted in some changes, but these are largely cosmetic and the underlying problems still remain. In this series, Prof. Balagangadhara explains how the basic problem lies in the way the Western culture has viewed other cultures like that of India. Western thinking about ‘religion’ was structured by a Christian framework.
Presupposing the truth of a series of beliefs about humanity and religion, European scholars described the Indian traditions as the ‘religions’ of the East. It is they who invented religions like ‘Hinduism’, ‘Jainism’, and ‘Buddhism’… and thus transformed the traditions of India into variants of Christianity. It is they who told us, the Indian people, that these are the religions we practice and believe in! And, under colonialism, we just accepted this as the truth about India. The result is colonial consciousness. When Indians discuss ‘Hinduism’, we talk in terms of ‘God’, ‘worship’, ‘religion’ and look for the ‘religious beliefs’, ‘sacred books’ and ‘ten commandments’ of Hinduism, without even knowing what these English terms mean.
As a consequence, we have lost access to our traditions. We know neither Western culture nor its religion, and yet attempt to mold our traditions to make them look like a proper ‘religion’. As this series shows, the time is ripe to rediscover the Indian traditions and see that they are far richer and deeper than the descriptions we have inherited from Western scholarship.
After having lived in Europe for more than 35 years and doing research into Western culture and Indian culture, Prof. Balagangadhara made these discoveries. His work inspired Mayank Shekhar to take the initiative to make this series of documentary films. He was concerned about the effect the Western story about Indian culture and Hinduism was having on Indian youth living in the USA and Europe. Therefore, he envisioned a documentary film that would explain to them where this story comes from and how it is not the truth about India. He found support from two organizations based in the U.S., the Educators’ Society for the Heritage of India (ESHI) and Hindu Students Council (HSC). The film was produced by Suyojan Multitech Services (India) Pvt. Ltd
|
<urn:uuid:88ea77d9-27cb-4270-a9e1-c95cf6c9d268>
|
CC-MAIN-2014-23
|
http://samvada.org/2013/news-digest/new-documentary-on-colonial-cconsciousness-and-indian-culture/
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997889379.27/warc/CC-MAIN-20140722025809-00158-ip-10-33-131-23.ec2.internal.warc.gz
|
en
| 0.954561 | 671 | 2.53125 | 3 |
The impeccable beauty and the grandeur of Taj Mahal in Agra, India have intrigued many architects and even commoners to know in depth about the architecture of the Taj Mahal. The architectural techniques and styles that have been applied in the making of the Taj Mahal have rendered it one of the Seven Wonders of the World. It is truly amazing to know that Taj Mahal's Architectural Techniques and Styles have been inspired by as varied as Persian, Indian and Turkish designs.
The intricate and refined Architectural techniques and styles of Taj Mahal have drawn the attention of many of the esteemed architects, engineers, historians and common man alike across the globe. Of the various elements of the Taj Mahal the one that catches the immediate attention of the onlookers is the imposing spherical dome. The architectural features of the dome reflect the genius of Ismail Khan, the man behind its design. The dome of Taj Mahal has earned several sobriquets of which onion dome or guava dome are few.
Another brilliant example of the Taj Mahal's Architectural Techniques and Styles is the lotus design that can be seen at the top of the dome. The lotus-design atop the dome complements its height to the perfection. Besides, on a closer look at the dome, you will get to notice that the architectural patterns that are followed in the making of the dome are similar to that of Hindu and Persian designs. Also, adding to the beauty of the Dome is a bronze spire which was made originally of solid gold but after the decline of the Mughal Empire in the 19th century it was looted. The spire also comprises the mix of Persian and Hindu architectural styles. You can easily make out this looking at the finial of the spire which contains a crescent-shaped moon. This crescent moon resembles the Hindu deity Lord Shiva’s symbol.
These apart, if you consider the Taj Mahal’s Architectural techniques and styles as a whole then you will see that at the base of the Taj Mahal there are four elegant minarets placed at four corners. Each minaret rises up to 40 meters in sky. These minarets are symbolic of Muslim architectural patterns. But as per the architectural technique is to be considered, these minarets have been designed as a shield to the entire structure. The minarets are tilted slightly towards the outer edge of the structure to save it from the damaging effects of the earthquake.
Tajmahal-tours.com offers interesting and detailed information on Taj Mahal's Architectural Techniques and Styles and Taj Mahal Tours, India.
|
<urn:uuid:1ce8c4e9-27a0-4588-8092-ab046f6c1573>
|
CC-MAIN-2014-15
|
http://www.tajmahal-tours.com/taj-mahal-architecture/taj-mahals-architectural-techniques-styles.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609539493.17/warc/CC-MAIN-20140416005219-00148-ip-10-147-4-33.ec2.internal.warc.gz
|
en
| 0.941648 | 535 | 2.921875 | 3 |
Studies regarding reading skills have been carried out for a long time. However, the bond between linguistics and foreign language teaching, especially reading skills, has been frequently overlooked. Thus, this study which aims to emphasize the importance and need of linguistics offers an alternative way of dealing with reading texts. In this context, after reviewing the literature about some major fields of macro-linguistics such as, pragmatics, neurolinguistics, psycholinguistics and sociolinguistics briefly, a relationship is established between the interdisciplinary areas listed above and foreign language teaching, mainly reading skills. The study is intended to help foreign language teachers to enrich their teaching reading experiences via keeping the core fields of macro-linguistics in mind. Thus, as an implication, an integrated lesson plan is developed in the study to demonstrate the efficacy of macro-linguistics in developing reading skills. Based upon the observations conducted, aforementioned plan highlights that the students are kept aware and motivated, reflect their experiences, have ideas about the register and intralingual and interlingual vernaculars of the language displayed in the text. The data is collected through student observations, performances and samples of their works. The results of the study indicated that foreign language students' comprehension levels of a reading text could be increased with the realization of macro-linguistics. (C) 2010 Published by Elsevier Ltd.
|
<urn:uuid:3c8845c3-605b-4cd2-97e1-c288d6ea800b>
|
CC-MAIN-2023-50
|
https://avesis.gazi.edu.tr/yayin/bc42843c-5a0a-421e-8332-5aef9cc1ea89/the-efficacy-of-macro-linguistics-in-developing-reading-skills-an-integrated-lesson-plan
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679518883.99/warc/CC-MAIN-20231211210408-20231212000408-00176.warc.gz
|
en
| 0.944377 | 282 | 3.234375 | 3 |
Auditory processing refers to “how well the ear talks to the brain and how well the brain understands what the ear tells it” (Musiek).
Children with Auditory Processing difficulties may seem to have a hearing problem or “selective hearing.”
In its very broadest sense, Auditory Processing refers to how the central nervous system (CNS) uses auditory information. Auditory processing refers to the ability to identify, interpret and attach meaning to sound that is heard. This can be in the absence of a physical hearing loss.
Children with auditory processing difficulties are often easily distracted because they find it difficult to filter out the meaningless background noise and pay attention to the meaningful information.
Auditory Processing difficulties may cause a delay in development of receptive and expressive communication skills. The disorder may be evident in a toddler or preschooler (i.e. failure to follow commands correctly, difficulty following a conversation, difficulty reciting nursery rhymes), but it will be much more evident when the child begins more formal education (Grade 1- Foundation Phase). Reading and writing difficulties are likely to emerge due to the child’s confusion regarding speech sounds.
Phonological processing is an auditory processing skill. It refers to the ability to reflect on and manipulate the sound structure of an utterance as distinct from its meaning. The terms auditory processing and phonological processing are therefore often used interchangeably.
A child with auditory processing/phonological processing difficulties may present with the following difficulties:
- Omitting a sound or sounds in spoken words
- Speaking in an inconsistent speech pattern
- Mispronouncing frequently-occurring words
- Making articulation errors in speech
- Have difficulty in producing rhyming words
Auditory perception errors:
- Misperceiving a word to be a similar-sounding word to that which was spoken.
- Difficulty paying attention to and remembering information presented orally
- Difficulty carrying out multistep directions
- Poor listening skills
- Need more time to process information
Reading and written language problems:
- Learning pre-literacy skills
- Sounding out words as they read
- Substituting words with the same initial letter when reading
- Using inventive spelling beyond the early primary grades
- Omitting vowels when spelling words
Having said all this, there is still a great deal of controversy surrounding the term Auditory Processing Disorder.
Jeremy at The Speech Guy, highlights the conundrum in his excellent post “I’ll have a sausage and people pizza.“(Unfortunately, this link is no longer available, but I am hoping that he will be able to send me the post). The one camp believes that Auditory Processing is a separate disorder and the other camp believes that it is as a result of an underlying weakness in the individual’s language skills.
Early identification and intervention is imperative irrespective of the terminology used.
|
<urn:uuid:9299c595-b7b3-4b02-a132-c7af2337cf6e>
|
CC-MAIN-2020-10
|
https://talkingtalk.co.za/what-is-auditory-processing/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145818.81/warc/CC-MAIN-20200223154628-20200223184628-00198.warc.gz
|
en
| 0.933299 | 593 | 3.96875 | 4 |
July 14, 2013 |
NEW YORK: A powerful new magnet that will allow the Large Hadron Collider (LHC), the world's biggest atom smasher, to study two to three times more proton collisions, has successfully passed its first test. The magnet will replace the existing ones and could help uncover the mysterious properties of the newly discovered particle, Higgs boson, that is thought to explain how all other particles get their mass. The new magnet is made of a superconductor called niobium...
April 16, 2013 |
WASHINGTON: For the first time, scientists, including an Indian-origin physicist, have observed concrete hints of a particle behind the elusive dark matter that is believed to hold the cosmos together but has never been directly observed. The international Super Cryogenic Dark Matter Search ( SuperCDMS ) experiment involving Texas A&M high-energy physicist Rupak Mahapatra reported a WIMP-like signal at the 3-sigma level, indicating a 99.8 per cent chance - or, in...
March 29, 2013 |
WASHINGTON: Physicists have proposed a revolutionary new laser system to produce the next generation of particle accelerators, such as the Large Hadron Collider (LHC) which aided the discovery of a Higgs Boson last year. The International Coherent Amplification Network (ICAN) proposes a new laser system composed of massive arrays of thousands of fibre lasers, for both fundamental research at laboratories such as European Organisation for Nuclear Research (CERN)
February 14, 2013 |
LONDON: Months after the landmark discovery of a potential Higgs Boson particle, CERN scientists will shut down its Large Hadron Collider (LHC) to upgrade the machine for advance experiments. The Europe's top physics lab will take a break from smashing invisible particles for a period of two years. The LHC has provided physicists with a huge quantity of data to analyse since the first physics run in 2009. Now it is time for the machine, along with CERN's other...
September 11, 2012 |
LONDON: The Large Hadron Collider that found the 'God particle' might be replaced by an even larger collider to solve new mysteries of the universe, such as how gravity interacts on a molecular level. Researchers from the European Organization for Nuclear Research (CERN) are proposing a new underground accelerator with a circumference of 80 kilometres - three times the size of the current one under Geneva, the Daily Mail reported. Any new collider is unlikely to...
|
<urn:uuid:d6c3de01-d1a6-47f5-abe7-e1f007ed3e90>
|
CC-MAIN-2014-35
|
http://articles.economictimes.indiatimes.com/keyword/large-hadron-collider
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500834494.74/warc/CC-MAIN-20140820021354-00177-ip-10-180-136-8.ec2.internal.warc.gz
|
en
| 0.895118 | 510 | 2.703125 | 3 |
First Responders Learn How To Handle Animals During Emergencies
Wednesday, February 27, 2013
Emergency responders are trained to deal with injured people in accident situations, but that training rarely extends to animals. But first responders got a taste of animal care training at the Del Mar Fairgrounds Wednesday.
As people found out during San Diego's wildfires in 2003 and 2007, animals can be difficult to handle in emergency situations. However, handling a large animal at an accident scene or wildfire can go a long way toward calming the chaos.
"There's a likelihood that there could be a trailer that could be involved in an accident. And could have a fire department that is responding to such an emergency, because when 911 is called, those are the folks that are going to respond in addition to law enforcement," said Tony Hernandez of CAL FIRE.
Many times an animal control officer is not the first on the scene. It's a firefighter, who's trying to get a scared animal into a trailer. A little bit of training can go a long way because animals already give people clues about how they want to be handled.
"His ears are just in a resting position," said John Madigan, doctor of veterinary medicine at UC Davis, as he touched a horse's neck. "His ears are not saying, if you touch me I'll kick you or bite you, so I'm going to approach at this angle that's a safe spot for the horse and make some contact with him."
First responders need to be able to read the situation and let the animal tell them the best course of action.
"Keep control of him, and off we go to the safe location," said Madigan. "So that's what we're trying to accomplish. Something easy and approachable. If he doesn't want to do this or bolts or gets away from me, now I've got a problem."
Madigan offers several strategies depending on the situation. Some involve shooing or leading the animal to safety. This training is designed for people who don't normally work with large animals. UC Davis officials hope to be able to train all first responders in California, but funding is an issue.
Please stay on topic and be as concise as possible. Leaving a comment means you agree to our Community Discussion Rules. We like civilized discourse. We don't like spam, lying, profanity, harassment or personal attacks.
|
<urn:uuid:3eeb6edc-8edc-44c6-b989-dc6956f7df15>
|
CC-MAIN-2014-23
|
http://www.kpbs.org/news/2013/feb/27/animal-training-can-help-emergency/
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510274289.5/warc/CC-MAIN-20140728011754-00013-ip-10-146-231-18.ec2.internal.warc.gz
|
en
| 0.971324 | 485 | 2.984375 | 3 |
Several types of energy conversion occur
in cells. Respiration is the process by which
raw fuel energy is converted to a form that can be used
for cellular work. Cellular work is a set of
processes that includes routine housekeeping as well
as special functions such as mitosis. All cells
respire and do work. Photosynthesis is carried
out by the cells of green plants and algae, among others.
It is the conversion that provides food energy, directly
or indirectly, for every living organism on earth.
|
<urn:uuid:2b12c9b3-7baa-439c-92f7-d4eafacdea15>
|
CC-MAIN-2014-35
|
http://ats.doit.wisc.edu/biology/cb/td/t2.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500822407.51/warc/CC-MAIN-20140820021342-00046-ip-10-180-136-8.ec2.internal.warc.gz
|
en
| 0.945299 | 109 | 3.203125 | 3 |
These days, Artificial Intelligence (AI) is the talk of the town! It is a technology which is rapidly growing. In science-fiction movies, AI is often portrayed as robots with human-like characteristics. But it is much more! Many businesses are adopting this new trend. Like every technology, it has its advantages and disadvantages. Learn about its different risks and benefits below.
Dangers of Artificial Intelligence
1. Lesser Jobs
When it comes to repetitive routine tasks, AI robots can do them better than humans. Since most businesses are opting for AI, it is inevitable that jobs will be cut down. Most companies prefer machines to increase their profits and productivity. In this way, there will be lesser positions available for the human workforce. However, it is a good idea to reinvent the different jobs and their tasks so that humans do not lose their livelihood.
2. Threat to Humanity
Since AI robots can take the place of humans, it is feared that they can become a threat to the human civilisation. As it is often portrayed in sci-fi movies, it is not impossible for AI to turn against humans if it turns erratic. Since AI is still in its infancy, the threat cannot be felt just now. However, it can be avoided if humans work together with AI in different fields. Researchers can also come up with different solutions if ever this technology goes rogue.
However, at Kitty Bingo, the human connection is essential while chat moderators, the Customer Service team and VIP managers deliver a top-notch and personalised service to players who want to enjoy bingo and other games on the site. The human touch builds more trust between the agents and players while they enjoy their favourite games at Kitty Bingo.
Wondering if AI is sustainable? Well no, because most of the AI computers, machines and robots run on rare earth elements like Lithium or Selenium. Their increased mining definitely poses a threat to the environment. Plus, they consume a lot of power to function, which adds more pressure on power plants. Artificial Intelligence is certainly risky for the environment, creating an obstacle in sustainable development.
Benefits of Artificial Intelligence
1. Work Efficiency and High Accuracy
Rest assured that despite the risks, Artificial Intelligence also comes with various benefits. AI machines are excellent when it comes to repetitive tasks. They do not commit human errors, thus guaranteeing high accuracy. Plus, they work 24/7, which means businesses which run round the clock do not need 2 sets of employees to work day and night shifts. Scientists are also constantly working at achieving a higher accuracy in AI powered machines. This makes them indispensable in some fields like surgery, where they must perform delicate operations and diagnose any serious conditions in the human body.
2. Reduced Costs for Training and Operations
Since AI machines use learning algorithms like Deep Learning and neural networks, there is no need for new codes every time they learn new things. Research is still in process to optimise their learning abilities. It reduces the cost of training robots which can learn faster than humans. Plus, they provide the same excellent results even if they perform repetitive tasks without any breaks.
3. Improved Processes
AI machines greatly improve all processes as they can gather considerable amounts of data associated with their tasks. The data can be processed in such a way that it can be further optimised. Thus, the learning capacities of AI powered machines are developing even further with time.
AI can be beneficial in various fields;however, it is not without risks. It is then essential to use it in such a way that it does not become a threat to the human workforce or humanity at large.
|
<urn:uuid:cf6a8848-a1d5-4182-8aac-36e0dfc140f1>
|
CC-MAIN-2020-10
|
https://www.theinfostride.com/2018/07/artificial-intelligence-the-risks-and-benefits/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146123.78/warc/CC-MAIN-20200225141345-20200225171345-00516.warc.gz
|
en
| 0.96161 | 738 | 3.046875 | 3 |
A potential application of optical fiber technologies in the well control domain is to detect the presence of gas and to unfold the gas dynamics inside marine risers (gas-in-riser). Detecting and monitoring gas-in-riser has become more relevant now when considering the application of managed pressure drilling operations in deep and ultradeep waters that may allow for a controlled amount of gas inside the riser. This application of distributed fiber-optic sensing (DFOS) is currently being evaluated at Louisiana State University (LSU) as part of a gas-in-riser research project granted by the National Academies of Sciences, the Gulf Research Program (GRP).
Thus, the main objective of this paper is to present and discuss the use of DFOS and downhole pressure sensors to detect and track the gas position inside a full-scale test well during experimental runs conducted at LSU. The other objectives of this work are to show experimental findings of gas migration in the closed test well and to present the adequacy of a mathematical model experimentally validated to match the data obtained in the experimental trials.
As a part of this research effort, an existing test well at the LSU Petroleum Engineering Research and Technology Transfer Laboratory (PERTT Lab) was recompleted and instrumented with fiber-optic sensors to continuously collect data along the wellbore and with four pressure and temperature downhole gauges to record those parameters at four discrete depths. A 2⅞-in. tubing string, with its lower end at a depth of 5,026 ft, and a chemical line to inject nitrogen at the bottom of the hole were also installed in the well.
Seven experimental runs were performed in this full-scale apparatus using fresh water and nitrogen to calibrate the installed pieces of equipment, to train the crew of researchers to run the tests, to check experimental repeatability, and to obtain experimental results under very controlled conditions because water and nitrogen have well-defined and constant properties. In five runs, the injected gas was circulated out of the well, whereas in two others, the gas was left inside the closed test well to migrate without circulation. This paper presents and discusses the results of four selected runs.
The experimental runs showed that fiber-optic information can be used to detect and track the gas position and consequently its velocity inside the marine riser. The fiber-optic data presented a very good agreement with those measured by the four downhole pressure gauges, particularly the gas velocity. The gas migration experiments produced very interesting results. With respect to the mathematical model based on the unsteady-state flow of a two-phase mixture, the simulated results produced a remarkable agreement with the fiber-optic, surface acquisition system and the downhole pressure sensors data gathered from the experimental runs.
|
<urn:uuid:837bcba3-0596-441c-b413-0ee648aaed7d>
|
CC-MAIN-2023-23
|
https://onepetro.org/DC/article-abstract/36/04/798/469793/Use-of-Fiber-Optic-Information-To-Detect-and?redirectedFrom=fulltext
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649293.44/warc/CC-MAIN-20230603133129-20230603163129-00486.warc.gz
|
en
| 0.953202 | 567 | 2.625 | 3 |
(By, Kevin Le)
From Star Trek to the Fantastic Four, sci-fi films and comics have almost always featured force fields at some point. In Star Trek, the tide of battle could be measured by the vulnerability of their force fields – the more power the force fields lose, the more the Enterprise suffers. Yet, for a concept so basic – a thin, invisible, and impenetrable barrier capable of deflecting any manner of weaponry – the creation of force fields is deceptively simple. Originating with Faraday’s lines of force, militaries across the world are funding research for the creation of force fields. However, much of the progress made has only created pseudo force fields – force fields which are not barriers, but instead use super capacitors to create a discharge which repels incoming firearms. On the other hand, recreating the force field of science fiction would require making a transparent, multi-layered shield, with each layer serving a different purpose.
Outer Layer: Supercharged Plasma Window
In 1995 at the Brookhaven National Laboratory in Long Island, New York, physicist Ady Herschcovitch invented the plasma window – a window which traps plasma using electric and magnetic fields – to find a way to separate a vacuum from ordinary air. Although plasma windows are typically used in space travel and industry processes which require a separation between a vacuum and ordinary air, it is important to note that plasma, the fourth state of matter of which the Sun and stars are made up of, is essentially super-heated gas. As the outer layer, a supercharged plasma window would be able to completely vaporize metals, including bullets or even cannonballs, without harming the individual.
Second Layer: High-Energy Laser Curtain
Light Amplification by Simulated Emissions of Radiation, or lasers, was invented in 1959 by several scientists. As the name implies, lasers work by amplifying and concentrating the energy of light using radiation emissions. By creating a curtain of thousands of crisscrossing high-energy laser beams, it would be possible to vaporize objects which somehow made it through the plasma window through this amplification of energy.
Third Layer: Carbon Nanotubes
Carbon nanotubes are tiny tubes one atom thick, and are made entirely of carbon atoms. Several times stronger than steel, carbon nanotubes are extremely difficult to make and the longest carbon nanotube in the world is only about 15 millimeters long. However, the technology is already out there – the only issue is finding a way to manufacture longer sheets of carbon nanotubes. Assuming that carbon nanotubes can be woven into a lattice much like regular string, a screen of enormous strength could be constructed. Yet although creating a multi-layered force field using plasma windows, high energy laser curtains, and carbon nanotubes is effective against physical entities, there is still one thing it would not be capable of stopping: laser beams. Due to the high-energy frequencies of the plasma and laser curtain, and the atomic size of the carbon nanotubes, the force field would be transparent. This means that laser beams, which are still a form of light, could pass through the force field. To resolve this, an advanced form of photochromatics – the technology used in glasses that become dark upon exposure to UV radiation – would be needed. Unfortunately, a form of photocromatics capable of stopping laser beams has not been developed yet.
Although force fields are far from being invented, many scientists and physicists believe force fields will be possible within the 21st century. The implications of a photochromatic plasma laser nanotube force field is obvious in terms of the military and security in general. Yet, creating force fields by manipulating Faraday’s lines of force would have the same effect on society now as Edison’s light bulb did so many years ago. Bridges could be constructed at the touch of a button, and whole cities could be generated using force field-based skyscrapers and buildings. At the moment, the most conceivable way of achieving this would be through magnetic levitation. But, that still brings up the question as to how to control Faraday’s lines of force to the extent where reliable infrastructure could be built instantaneously. The answer, some believe, lies in superconductivity, or the elimination of electric resistance (to learn more about this, check out the ‘How Things Work’ section).
“Given these considerations, I would classify force fields as a Class I impossibility – that is, something that is impossible by today’s technology, but possible, in modified form, within a century or so.” – Michio Kaku, renowned theoretical physicist
|
<urn:uuid:dc199f09-f626-40ba-871a-3af330cbd4a2>
|
CC-MAIN-2017-30
|
http://www.lexrobotics.com/force-fields/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549425737.60/warc/CC-MAIN-20170726002333-20170726022333-00558.warc.gz
|
en
| 0.943233 | 962 | 3.6875 | 4 |
- About the authors
- Chapter 1: What is active learning?
- What is active learning?
- Importance of active learning in library teaching
- Chapter 2: Active learning tips
- Starting and finishing the session
- In the middle
- The model literature review
- Mobile phones and other gadgets
- Web 2.0
- Chapter 3: Lesson plans
- Citation searching and impact factors
- Current awareness made easy
- Evaluating web resources
- The information cycle
- Referencing and plagiarism
- Search smarter, search faster
- Types of information resources
- What can the library do for you?
A practical work outlining the theory and practice of using active learning techniques in library settings. It explains the theory of active learning and argues for its importance in our teaching and is illustrated using a large number of examples of techniques that can be easily transferred and used in teaching library and information skills to a range of learners within all library sectors. These practical examples recognise that for most of us involved in teaching library and information skills the one off session is the norm, so we need techniques that allow us to quickly grab and hold our learners’ attention. The examples are equally useful to those new to teaching, who wish to bring active learning into their sessions for the first time, as to those more experienced who want to refresh their teaching with some new ideas and to carry on their development as librarian teachers.
- Outlines the argument for more active learning techniques in our sessions
- Explains the theory of active learning
- Includes examples that can be used in teaching
Practitioners and students of Library and Information Science
- No. of pages:
- © Chandos Publishing 2010
- 1st September 2010
- Chandos Publishing
- eBook ISBN:
- Paperback ISBN:
Andrew Walsh is a Chartered librarian at the University of Huddersfield. He chairs the information skills teaching group at the University of Huddersfield library and regularly gives talks at conferences across the UK, particularly in relation to information literacy and its teaching.
University of Huddersfield
Padma Inala is a Chartered librarian at Manchester Metropolitan University supporting the field of education. Her research interests include Information Literacy and the teaching of information skills.
Manchester Metropolitan University, UK
|
<urn:uuid:718d173a-c584-4d73-bad1-1d2f3fe42cea>
|
CC-MAIN-2017-34
|
https://www.elsevier.com/books/active-learning-techniques-for-librarians/walsh/978-1-84334-592-3
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886105195.16/warc/CC-MAIN-20170818233221-20170819013221-00665.warc.gz
|
en
| 0.904107 | 475 | 3.109375 | 3 |
Cataract surgery is a procedure to remove the lens of your eye and, in most cases, replace it with an artificial lens. Normally, the lens of your eye is clear. A cataract causes the lens to become cloudy, which eventually affects your vision.
Cataract surgery is performed by an eye doctor (ophthalmologist) on an outpatient basis, which means you don't have to stay in the hospital after the surgery. Cataract surgery can be done traditionally using ultrasound energy to remove the cloudy lens or it can be removed with laser-assisted technology. Cataract surgery is very common and is generally a safe procedure.
Feb. 25, 2017
- Cataract surgery. American Optometric Association. http://www.aoa.org/patients-and-public/eye-and-vision-problems/glossary-of-eye-and-vision-conditions/cataract/cataract-surgery?sso=y. Accessed May 22, 2016.
- Jacobs DS. Cataract in adults. http://www.uptodate.com/home. Accessed May 19, 2016.
- Facts about cataract. National Eye Institute. http://www.nei.nih.gov/health/cataract/cataract_facts.asp. Accessed May 22, 2016.
- Cataract surgery. American Academy of Ophthalmology. http://www.aao.org/eye-health/diseases/what-is-cataract-surgery. Accessed May 22, 2016.
- Cataract in the adult eye PPP. American Academy of Ophthalmology. http://www.aao.org/preferred-practice-pattern/cataract-in-adult-eye-ppp--october-2011. Accessed May 23, 2016.
- Shorstein NH, et al. Comparative effectiveness of three prophylactic strategies to prevent clinical macular edema after phacoemulsification surgery. Ophthalmology. 2015;122:2450.
|
<urn:uuid:ec171702-bda3-4991-a62b-fcf3feed66ea>
|
CC-MAIN-2017-39
|
http://www.mayoclinic.org/tests-procedures/cataract-surgery/home/ovc-20229526
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818695726.80/warc/CC-MAIN-20170926122822-20170926142822-00695.warc.gz
|
en
| 0.881955 | 437 | 3.09375 | 3 |
Many people know carrots as the most reliable source of Vitamin A and they are right! Though, there is much more to them than just vitamin A. For instance, did you know that carrots can prevent cancer and can be used as an anti-aging tool? Carrots provide many health benefits and it is quite crucial to include them as much as possible in your daily diet.
Here are some ways in which carrots can provide our body with required nutrition and help our body to heal:
Improve vision health
Are carrots really good for the eyes? Sure they are and it is because of a compound found within them known as beta-carotene. Beta Carotene is then converted to vitamin A which is eventually transformed to rhodopsin in the retina. Rhodopsin helps in improving an individual’s night vision. Beta-carotene also helps in minimizing the chances of macular degeneration.
Prevent certain cancers
Carrots can keep you from getting some types of cancer! Research shows that having carrots as part of one’s diet, reduces the risk of getting colon cancer, breast cancer and lung cancer. The anti-cancer properties in carrots are due to two compounds, falcarindiol and falcarinol.
Improve skin health
One of the benefits of vitamin A is that it has the capacity to protect our skin from sun damage. If a person lacks this vitamin, their skin will be dry and this may lead to premature wrinkles. Intake of carrots prevents all this and also ensures that the skin is acne free, smooth, healthy and is free from blemishes. Carrots therefore helps to maintain one’s skin tone and assist in improving overall skin health.
Works as an anti-aging agent
Do you want to look younger? Eat carrots! The beta-carotene compound found in carrots will act as an antioxidant and effectively regulate metabolism. While doing this, the aging process of the cells will be slowed, making you look younger for longer.
Can be used as an antiseptic
When applied externally on cuts, carrots can effectively prevent it from getting infected. For such antiseptic use, you can shred the carrot, boil it or smash it and apply on the cut area.
In addition to all this there are several other benefits to eating carrots. There are many more ways in which carrots can heal our bodies and protect us from harmful pathogens. For instance, intake of carrots can prevent heart related diseases, cleanse the body off toxins, ensure healthy teeth and gums and also prevent stroke!
For this reason, try as much as you can to include carrots in your daily diet.
|
<urn:uuid:96ca9d19-3bc2-4164-b8c2-80f3f9043a1b>
|
CC-MAIN-2020-10
|
http://www.freshandnatural.com/eating-healthy/eating-carrots-for-health-vitality
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145534.11/warc/CC-MAIN-20200221172509-20200221202509-00080.warc.gz
|
en
| 0.962267 | 540 | 3.078125 | 3 |
The Battle for Monte La Difensa was part of Operation Raincoat and took place between 3 December and 9 December 1943 in Italy. The battle ended in an Allied victory.
British Prime Minister Winston Churchill called it “the soft underbelly of Europe.” War correspondent Ernie Pyle called it that “tough old gut.” “It” was Italy. The two-year Italian campaign of World War II was heartbreakingly brutal. Fighting in rugged terrain that gave all advantage to the German defenders, Allied gains were too often measured in yards and high casualty rates—at one point the price paid was an average of one casualty for every two yards. In November 1943, the Allied advance had stalled at the formidable Winter Line located about seventy miles south of Rome. These fortifications that stretched from the Tyrrhenian Sea to the Adriatic coast included the main Gustav Line supported by the Bernhardt and Hitler lines. American Fifth Army commander Lieutenant General Mark Clark was determined to breach the German defenses and reach the Liri Valley, the “gateway to Rome,” before the onset of winter. He codenamed his plan Operation Raincoat; as it turned out, an appropriate name because it rained for days before and during the attack.
Strategically, Clark recognized that Italian topography granted him few options. He later wrote, “There was only one sector on which we could move in strength; that was on either side of Mount Camino, beyond which lay the Liri River Valley leading to the Italian capital. To reach the Liri Valley, we first had to drive the Germans off the Camino hill mass, which included Mount Lungo, Mount La Difensa, Mount La Remetanea, Mount Maggiore, and a little town called San Pietro Infine. . . . We had little choice but to blast our way through the narrow Mignano Gap adjacent to Mount Camino, and [German theater commander Field Marshal Albert] Kesselring knew it despite our feints along the coast and elsewhere.”
Operation Raincoat’s success depended on the early conquest of the German fortifications on Hill 960, Mount La Difensa. The mission to capture La Difensa went to a recently arrived unit as tough as the Italian terrain. It was one originally assigned to conduct large-scale guerrilla operations in occupied Norway. Following the cancellation of that, it participated what proved to be bloodless landings of the Aleutian island of Kiska that had been held, and then abandoned, by the Japanese. Now, and for the first time, the unit with the misleading name of the First Special Service Force was going to see combat.
First Special Service Force
Even among the special operations units formed in World War II, the First Special Service Force was unique. A bi-national unit of Canadian-Americans, its leader, Colonel Robert T. Frederick (West Point 1928), who had given the unit its innocuous name in order to disguise its purpose, requested that volunteers be “single men between ages of 21 and 35 who had completed three years or more grammar school within the occupational range of Lumberjacks, Forest Rangers, Hunters, North woodsmen, Game Wardens, Prospectors, and Explorers.” Frederick was also willing—even eager—to accept troublemakers from other units. It became a perverse point of pride for some braves, as they called themselves, to state, “I got into the Force without a criminal record!”
The Force’s training was designed to prepare the men for operations in cold weather and mountainous regions. To say that the training was physically rigorous was an understatement. An official Canadian report noted, “The programme of physical training was designed to produce a standard of general fitness and stamina capable of meeting the severest demands made upon it by fatigue of combat, unfavorable terrain or adverse weather. This physical training has been built up to such a pitch that an ordinary person would drop from sheer exhaustion in its early stages.” The braves learned how to ski, climb steep slopes, and travel long distances over rugged terrain while carrying a rucksack and weapons with a total weight of more than seventy pounds.
The “Force” as it was informally called, was classified as light infantry. It contained a total of 2,400 men composed entirely of officers and non-commissioned officers. The combat echelon included the Force Headquarters and three regiments of two battalions each. Each battalion was divided into three companies, each company into three platoons, and each platoon into two sections of twelve to sixteen men each. Officer and NCO appointments were integrated, without regard to nationality, on a proportionate basis to personnel of both countries. The only exception to this integrated arrangement was that the service echelon was composed entirely of U.S. personnel. This was because the unit would be supplied through the U.S. Army G-4 system. Thanks to the unit’s unique administrative position as part of the General Staff (which meant Frederick reported directly to Army chief of staff General George Marshall), Frederick was able to requisition for his men weapons, vehicles, and supplies that other, less well connected units, could only envy. It may have been light infantry, but it was heavily armed light infantry.
The First Special Service Force’s administrative classification placed it outside the control of Lt. General Leslie McNair’s Army Ground Force (AGF), a fact that did not sit well with McNair. Before the Force could be deployed, McNair insisted that it prove it was up to AGF standards.
On June 15, 1943, an AGF inspection team arrived to certify the Force was qualified for commitment overseas. The inspection included road marching, physical fitness, and individual tests on military subjects. Minimum passing grade was 75 percent. The braves’ scores were literally off the charts—the average score for the unit itself was 125 percent. On some tests, like those that measured strength and speed, individuals scored as high as 200 percent. Colonel Frederick had so thoroughly trained his men that tests designed to assess night operations proficiency proved to be child’s play; the braves were so skilled in the use of map and compass that they never got lost, no matter how dark the night, the unfamiliarity of the terrain, and regardless of weather conditions. In its report to AGF headquarters, the inspectors stated that the First Special Service Force “was ready for combat.” Additionally, they informed Frederick that the Force demonstrated the coordination and teamwork of a championship professional ball club.
Their extraordinary physical condition, and their many technical and combat skills, would be put to the test in the capture of La Difensa.
Battle for Monte La Difensa
La Difensa was a part of a six mile long, four mile wide complex of steep peaks and ridgelines averaging about 3,000 feet in height known as the Camino hill mass. La Difensa formed the “forward position” facing Clark’s troops, and as its name suggests, seemed designed for defense. The northeast face was particularly imposing. Near the top was a cliff 200 feet high with a seventy-degree slope, and above that was a series of six ledges, each averaging about thirty feet in height. Only after all that was overcome was the summit reached.
Defending the mountain were about 400 men including the veteran III. Bataillon/ Panzergrenadier-Regiment 104 and elements of the III. Bataillon/ Panzergranadier-Regiment 129 of the German 15. Panzer-Grenadier-Division. The Panzer-Aufklärungs-Abteilung 115 was held in reserve. The German defenses were formidable. Interlocking machine gun and mortar positions were dug into the rock, making them impervious to artillery fire. Narrow trails and natural approaches were mined and covered by well-camouflaged snipers. German forward observers could call down accurate artillery fire, and forces on one hill could count on support from other units stationed on nearby summits and ridges. The only weakness in La Difensa’s defenses was on the northeast side. Deemed impassible even by locals, this part was lightly guarded.
The First Special Service Force arrived in Naples on November 19 and was quickly transported to the staging area. Colonel Frederick was told the Force would be assigned to II Corps and attached to the 36th Division. Its mission was to take La Difensa on December 3 and then press forward and take Hill La Remetanea. Simultaneous attacks by X Corps and the 36th Division would be conducted against Mount Camino and Mount Maggiore respectively. The attacks would be preceded by combined air raids and artillery barrages.
While his men got ready for their first battle, Colonel Frederick conducted reconnaissance. He then devised an audacious plan of his own, one that called for speed, surprise, and shock to swiftly overcome the enemy. He decided to attack at night and directly up the steep northeast slope. If things went as he believed they would, his men would conquer La Difensa before the Germans realized what had happened.
The artillery and air attacks began on December 2. About nine hundred guns delivered high explosive, white phosphorous, and smoke shells in what was the largest artillery barrage at the time. During one hour alone, 22,000 rounds blanketed La Difensa. Though participants later said that it appeared as if “the whole mountain was on fire,” the results would prove mixed. Some areas suffered heavy casualties, and other, more well protected emplacements, experienced no more greater discomfort than a loss of sleep.
The task of seizing the mountain was given to the 2nd Regiment under the command of Canadian Lieutenant Colonel D.D. “Windy Willy” Williamson. Supporting it would be the 3rd Regiment commanded by the polo-playing Texan, Lt. Colonel Edwin A. Walker. The 1st Regiment, under West Pointer Lt. Colonel Alfred C. Marshall, was held in reserve. At approximately 1800, the 2d Regiment began its assault. Scaling rope ladders and groping for crevice hand and foot holds in the rain-slick rock wall and carrying a pack and weapon load that “would have forced lesser men to the ground,” the 600-man force silently made its way to the summit. By 0430, three companies had reached the summit undetected. As they were preparing an assault line, some men tripped over loose stones placed there by the Germans to provide a warning.
Suddenly the night sky was illuminated by red and green flares. As one participant later said, “All hell broke loose.” The German defenders frantically worked to reposition their emplaced weapons to address attack from the unexpected quarter. Though the braves came under heavy fire, it was uncoordinated; surprise was on the Force’s side. The braves advanced, breaking into smaller units to conduct fire and maneuver assaults against one German strongpoint after another. By 0700, the Force was in possession of the summit.
The original plan called for the Force to promptly exploit the success with an attack on La Remetanea. But exhaustion, a lack of ammunition, and the fact that it would take at least six hours to get sufficiently resupplied caused Colonel Frederick, who had accompanied the battalion, to suspend that part of the assault until December 5. The Force reorganized and consolidated its position on La Difensa in anticipation of the German response. Because the British X Corps’ 56th Division had failed to take nearby Mount Camino, and would not succeed in doing so until December 6, the braves on La Difensa were subjected to punishing mortar, long-range machine gun, nebelwerfer rocket artillery, and sniper fire from both Camino and La Rementanea. Adding to the Force’s plight was the constant rain and sleet and brutal cold.
Supplying the men on the summit became a supreme test. Because mules could not handle the steep grade or treacherous footing, everything had to be hand carried. At one point, Frederick sent down a special request for medical supplies: six cases of bourbon and six gross of condoms. When this request reached II Corps, the outraged quartermaster demanded to know what exactly the Force had discovered on the top of La Difensa that called for prophylactics and liquor. As Geoffrey Perret wrote in There’s a War to be Won, “Alas, what the braves had found wasn’t party-loving, free-spirited women but coldness so intense it froze the sweat under a man’s clothing the moment he stopped moving. A shot of bourbon would help warm him up. The condoms were for protection against the incessant sleet that the howling wind blew down rifle barrels.”
The next two days became a chaotic, seesaw battle under some of the worst weather conditions imaginable in which each side attempted to gain the advantage over the other. Finally, on December 5, the Force launched an attack on La Remetanea with two reinforced battalions. The attack was stopped at the mid-way point by a desperate German defense. But that defense proved to be a thin—though hard—crust. A follow-up attack early the next morning encountered light opposition. By noon the next day, the braves had captured Remetanea. During the next two days they conducted mopping up operations.
On Monday, December 6, in tidy, precise penmanship and punctuation, Frederick wrote a dispatch to his command post. The only hint of his exhaustion was the fact that he erroneously dated the message “November 6”: “We have passed the crest of 907 [La Remetanea]. We are receiving much machine gun and mortar fire from several directions. . . . Men are getting in bad shape. . . . I have stopped burying the dead. . . . German snipers are giving us hell and it is extremely difficult to catch them.” He concluded by writing, “I am OK, just uncomfortable and tired.”
The Fifth Army’s left flank was secure, but it was a costly victory. The Force had sustained more than thirty percent casualties, 73 killed, 9 missing, 313 wounded or injured, and 116 incapacitated from exhaustion and exposure.
The official history of the Italian campaign noted, “The mission against La Difensa was fully suited to the First Special Service Force. It took advantage of the Force’s special training in night fighting, mountain climbing, cold weather, and lightning assault. No conventional unit, without special training, could have accomplished the mission.”
Clark and the rest of the Fifth Army were in awe over the unit’s accomplishment. He and his planners estimated that the First Special Service Force would take La Difensa in three days. It was captured in two hours. In its first real battle, the First Special Service Force’s reputation as an extremely capable and hard-hitting raiding force for mountain operations was made.
General Dwight Eisenhower, who knew Frederick from their General Staff days and who was the person who ordered Frederick to organize and command the unit, paid a visit to the area shortly after the capture of Mt. Camino. In his book Crusade in Europe, he wrote, “I was taken to a spot where, in order to outflank on these mountain strong points, a small detachment had put on a remarkable exhibition of mountain climbing. With the aid of ropes, a few of them climbed steep cliffs of great height. I have never understood how, encumbered by their equipment, they were able to do it. In fact, I think that any Alpine climber would have examined the place doubtfully before attempting to scale it. Nevertheless, the detachment reached the the top and ferreted out the German Company Headquarters. They entered and seized the Captain, who ejaculated, ‘You can’t be here. It is impossible to come up those rocks.’”
Related Literature: Werner, Bret: Storming Monte La Difensa – The First Special Service Force at the Winter Line, Italy 1943. Osprey Publishing.
|
<urn:uuid:8d0ec5a5-b1f6-41a4-8184-2b2c3bbaca96>
|
CC-MAIN-2017-26
|
https://argunners.com/battle-monte-la-difensa/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321961.50/warc/CC-MAIN-20170627235941-20170628015941-00191.warc.gz
|
en
| 0.978417 | 3,391 | 3.546875 | 4 |
By Mark Ward
Technology correspondent, BBC News
By 1971 the fledgling internet had spanned the US.
It has often been said that a journey of a thousand miles begins with a single step. For the internet, that first step was more of a stumble.
At 2100, on 29 October 1969, engineers 400 miles apart at the University of California in Los Angeles (UCLA) and Stanford Research Institute (SRI) prepared to send data between the first nodes of what was then known as Arpanet.
It got the name because it was commissioned by the US Department of Defense's Advanced Research Projects Agency (Arpa).
The fledgling network was to be tested by Charley Kline attempting to remotely log in to a Scientific Data Systems computer that resided at SRI.
Kline typed an "L" and then asked his colleague Bill Duvall at SRI via a telephone headset if the letter had arrived.
Kline typed an "O". Duvall said that arrived too.
Kline typed a "G". Duvall could only report that the system had crashed.
They got it working again by 22:30 and everything went fine. After that first misstep, the network almost never put a foot wrong. The rest has made history.
Watching remotely in Washington 40 years ago was Dr Larry Roberts, the MIT scientist who worked out the fundamental technical specifications of the Arpanet. The engineers who built the hardware that made Arpanet work, did so to his design.
But, he told BBC News, the initial reaction to setting up Arpanet was anything but positive.
"They thought it was a horrible idea," he said.
The Interface Message Processors (IMPs) helped to shuttle data around the Arpanet
Bob Taylor, head of Arpa's Information Processing Techniques Office, wanted Arpanet built to end the crazy situation of every institution he funded demanding ever more computer power and duplicating research on those machines.
"At the time computers were completely incompatible and moving data was a huge chore," he said.
The resistance came about because those institutions wanted to keep control of their computer resources. But, said Dr Roberts, they soon saw that hooking up to Arpanet meant a huge increase in the potential computer power they had at their disposal.
"They quickly learned that there was a tremendous gain for them," said Dr Roberts. It also fulfilled Bob Taylor's goal of cutting spending on computers.
Back in those days, long before the utility of the net was demonstrated, Dr Roberts and his colleagues had an inkling that remarkable things would happen once such a network were built.
"We knew that if we could connect all the data we were collecting that would change the face of research and development and business," he said.
The Arpanet became the internet in the 1970s but the change was largely cosmetic. The fundamental technological idea that made it work, known as packet switching, was demonstrated on that October evening.
The motivation for developing packet switching also had a financial element. Computer networks were in used prior to the creation of Arpanet but not many people used them.
"The cost was enormous because we were doing it so inefficiently," said Dr Roberts. "We knew we needed something to share that rather than have it as a dedicated session."
The inspiration for packet switching partly came from the Post Office
Analysis by Dr Roberts showed that only one fifteenth of the capacity of a telephone line used to remotely connect to a mainframe was used.
Far better, he reasoned, was to find a way to divide up that capacity among many computers.
Dr Roberts was not alone in building a network using these principles. Packet switching got its name thanks to late British scientist Donald Davies who was creating a network that used this technique at the National Physical Laboratory (NPL).
Not only did it make it easier, and cheaper, to use telephone lines it helped speed up the passing of data.
"If you have packets arriving in little pieces you can very quickly sort them," said Roger Scantlebury, one of Dr Davies' colleagues. "But if you have a huge message you have to wait for that to finish before anything else can happen."
Rather than just theorise, Dr Davies and his colleagues put their work into action.
"When we first started we were just going to build something to show it would work, but fairly quickly Donald realised that in order for it to have any impact it needed to be a proper working system, and we actually built the network which went live at the start of 1970," he said.
He told the BBC News: "When we first put the network together at NPL, we weren't constrained by telephone wires, so we built high capacity links and everyone had 1.5 megabytes, which at the time everyone said was crazy."
From those first two nodes, Arpanet quickly grew and by December of 1969 it had four nodes. By 1972 it had 37 and then started the process of connecting up networks to each other and the internet, a network of networks, came into being.
Dr Roberts has spent his professional life involved in networks and is not done yet. He is currently driving a Darpa research project to get the net ready for the next 40 years.
The work is concentrating on ways to improve security, enshrine fairness so no-one can hog capacity and guarantee quality of connection to support exquisitely time sensitive applications such as remote surgery.
There's no doubt that the net's first step was the start of a giant leap.
|
<urn:uuid:a3033ead-c6ab-4e72-b8ab-50f987a0640b>
|
CC-MAIN-2014-15
|
http://news.bbc.co.uk/2/hi/technology/8331253.stm
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609538110.1/warc/CC-MAIN-20140416005218-00535-ip-10-147-4-33.ec2.internal.warc.gz
|
en
| 0.984259 | 1,144 | 3.046875 | 3 |
by Nadia B. Pietrzykowska, MD, FACP
When thinking about weight-loss, one often has an “ideal” body weight in mind or an ultimate weight-loss goal. It’s very common for people to think that unless they lose dozens of pounds, they will not be any healthier.
This is a misconception. Studies have shown that health benefits resulting from weight-loss are evident with a weight reduction as low as 5-10 percent. This means that an individual that weighs 200 pounds will benefit greatly from losing 10 to 20 pounds.
There’s scientific evidence that many obesity-related conditions improve with a 5-10 percent weight-loss. Let’s look at these related conditions and see how modest weight-loss may greatly improve them and your overall quality of health:
Although we have good medications that decrease our “bad” cholesterol also called LDL cholesterol, doctors and patients alike know how hard it is to increase the “good” cholesterol otherwise known as “HDL cholesterol” even by a few points.
A 5-10 percent weight-loss can result in a five point increase in HDL cholesterol. This deserves applause as raising HDL by these few points can lower the risk of an individual developing heart disease. HDL cholesterol of more than 40 mg/dl for men and more than 50 mg/dl for women is protective against heart disease.
There are other fat-like particles in the blood that are harmful in elevated amounts. They are called triglycerides. People with high triglycerides are at higher risk for heart attacks and strokes among other problems. A normal level should be below 150 mg/dl, while anything above 200 mg/dl is considered high.
Losing 5-10 percent of body weight was shown to decrease triglycerides by an average of 40 mg/dl, which is a significant drop. This level can further improve with exercise, a diet low in concentrated sugars, carbohydrates and fats as well as with reduction of excessive alcohol intake.
Excess body weight accounts for about 25-30 percent of cases of hypertension. As body weight increases, it causes hemodynamic abnormalities and other changes that result in elevated blood pressure. By losing 5-10 percent of one’s weight, blood pressure, both systolic and diastolic, decrease by 5 mmHg on average. In conjunction with a salt restricted diet, rich in vegetables, fruit and low-fat dairy, this weight-loss could be potentially even higher.
One of the laboratory markers used to screen for diabetes and to monitor its treatment is called Hemoglobin A1C. The normal level should be below 6.5. Research has shown that a 5-10 percent weight-loss can decrease this marker by half a point on average. This comes close to the effect that some anti-diabetic pills have on blood sugars.
Another condition that is seen with weight gain is a phenomenon called insulin resistance. In this disorder, the pancreas produces larger than normal amounts of a hormone called insulin. Insulin is responsible for keeping blood sugar levels normal. In this condition, high levels of insulin are needed because tissues are resistant to its effects.
When someone has insulin resistance, the resulting high levels of insulin in the blood cause an increase in fat tissue especially in the waist area, abnormal cholesterol, and sometimes a change in certain hormone levels in women that causes male pattern hair growth and infertility. Modest weight-loss was found to significantly decrease insulin levels and thus to help with reversing these conditions.
Obstructive Sleep Apnea
Obstructive sleep apnea is a sleep disorder commonly diagnosed in patients affected by excess weight that snore or gasp for air during sleep. It’s caused by pauses and gaps in breathing during sleep and results in insufficient oxygenation. This causes fatigue and sleepiness during the day. It also is responsible for making certain diseases less responsive to treatment, like hypertension for example.
When sleep apnea is significant, oxygen levels in the blood are too low during sleep and the use of a breathing machine called CPAP is necessary. It has been shown that a 5-10 percent weight-loss may improve sleep apnea and sometimes if the apnea was not very severe, one can be weaned from the CPAP breathing machine. This is a big achievement for some, as having to use a CPAP is life-saving but often perceived as cumbersome by those who need to use it.
In studies looking at the effect of excess weight on cells of the human body, it was found that fat cells and especially abdominal fat cells produce a large number of substances that result in inflammation in blood vessels. This inflammation then can result in plaques and clots and turn into strokes and heart attacks. When weight-loss achieves a level of 10 percent, the levels of inflammatory substances circulating in the blood drop significantly and therefore the risk of vascular damage is reduced as well.
All these improvements caused by weight-loss as low as 5-10 percent ultimately lead to very significant benefits including a lesser chance of having a heart attack or stroke. Now, the next question that comes to mind is since we know that a 5-10 percent weight-loss is very beneficial, how can it be achieved?
First and foremost, weight-loss starts with lifestyle changes: diet and exercise. The first step is to talk to your healthcare provider. They will help choose the diet that is most appropriate. The diet choices are usually determined by the existing medical problems among other factors and should be discussed with your healthcare provider. On this note, it is worth mentioning that scientists have recently shown that a “Mediterranean diet,” which is rich in fish, vegetables, olive oil or nuts will protect you from heart disease even more when compared to other commonly used diets.
To attain and maintain any amount of weight-loss, exercise is mandatory. Generally, an average of at least one hour, five days a week is needed. But this again should be monitored by your healthcare provider to assure safe exercise practices.
Scientists have shown over and over again that lifestyle changes that include an appropriate healthy diet and the right exercise regimen will help attain a 5-10 percent weight-loss. In addition, any legitimate weight-loss program should promote these lifestyle changes as the first step in attaining weight-loss. They are absolutely indispensable. They work on their own when the planned weight-loss is 5-10 percent of body weight and are always used in conjunction with other measures (weight-loss medications or bariatric surgery) if a more significant weight-loss is needed or when lifestyle changes by themselves did not achieve the medically required weight-loss goal.
Thus, when contemplating weight-loss, the initial goal may be set as low as 5-10 percent of body weight. As discussed in this article, this seemingly modest weight change already results in tremendous health benefits.
About the Author:
Nadia B. Pietrzykowska, MD, FACP, is a Board Certified Physician Nutrition Specialist with Residency training in Internal medicine and subspecialty training in Bariatric Medicine and Nutrition.
Eating disorders can be a concern or question for many who are along the journey to improved…View Video
Why we crave certain foods can be difficult to understand. Between the different types of food cravings…View Video
by Roger E. Adams, PhD, CISSN, ACE-CPT Spring 2023 *Disclaimer: It’s important to consult with a…Read Article
|
<urn:uuid:5e17bb73-aec1-46c6-96d9-16090afda057>
|
CC-MAIN-2023-23
|
https://www.obesityaction.org/resources/benefits-of-5-10-percent-weight-loss/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646144.69/warc/CC-MAIN-20230530194919-20230530224919-00585.warc.gz
|
en
| 0.957273 | 1,555 | 2.984375 | 3 |
Engage your students with this unique and exciting literacy and media unit based off the Canadian TV series Dragon's Den. In this unit, students work in groups to create an innovative product, and give a business pitch to the "dragons".
Students learn about:
- Oral persuasion techniques
- How to make a strong product idea
- Cultural business etiquettes
- How to create media texts
This unit takes an international perspective, requiring students to role-play being entrepreneurs in different countries. The unit works towards a culminating task in which students are each assigned a role, and must present their innovative product to the "Dragons".
This resource is complete with:
- 7 three-part lesson plans (minds-on, action and consolidation)
- Daily assessments
- Learning goals and success criteria
- Links to presentations and videos
- Tips for differentiation are provided throughout
This unit is tailored to the Ontario Grade 7 curriculum, but could interchangeably be used for grades 5 - 8.
If you enjoy this resource, please feel free to LEAVE A REVIEW. You can find my other resources such as Supply Teacher Kits, While You Were Out Sub Forms, and Critical Literacy Student Handout Freebie on my store: https://www.teacherspayteachers.com/Store/Little-Miss-L
|
<urn:uuid:e967943d-7b12-4ef2-bbd3-11d0e82469c7>
|
CC-MAIN-2017-39
|
https://www.teacherspayteachers.com/Product/Dragons-Den-Literacy-and-Media-Unit-for-Junior-Intermediate-3363830
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818688208.1/warc/CC-MAIN-20170922041015-20170922061015-00188.warc.gz
|
en
| 0.899863 | 274 | 3.515625 | 4 |
A Professor Plastics Feature ArticleSee Other Articles
I typically like to start my articles with a little humor. But there’s nothing funny about Hurricane Sandy. The “superstorm” was devastating. Many communities and homeowners up and down the East coast are still recovering.
But in its aftermath, an inspiring team of students from a college in Hoboken, NJ—just across the Hudson River from lower Manhattan—came up with an idea to help weather the next big one.
First, let’s recall how bad Sandy really was. The Stevens Institute of Technology, home of the collegiate team, provides a good synopsis:
“At nearly $70 billion, Superstorm Sandy was the second-most costly storm in U.S. history, trailing only Katrina. Some 650,000 houses were destroyed, more than 40 New York-area residents perished and at least six local hospitals were forced to shutter and relocate patients during the height of the worst weather. Coastal towns were submerged, boardwalks washed away. Homes, businesses and a five-story-tall roller coaster floated off the Jersey Shore.”
See what I mean? Absolutely nothing funny about that.
Taking a cue from the Institute’s maritime expertise and “inspired” by Sandy, the Stevens team designed and built a house for the 2015 Solar Decathlon, the U.S. Department of Energy’s contest among universities to build solar-powered houses that are “affordable, energy-efficient, and attractive.” The students leveraged proven technologies, some borrowed from boat building, to create a house designed to withstand a hurricane.
What are many boats built with that keeps water at bay? A lot of plastics and plastic composites. So is the Stevens team’s house. The walls, the roof, the storm shutters, the window frames, even the flooring and decking are made with plastics and plastic composites to create a water-resistant shell to help push back wind, debris, and seawater, allowing for faster recovery from flooding and storms.
The team members chose tough, durable plastics precisely because one of the driving motivations was the need for resiliency. They first identified the materials used in those hundreds of thousands of homes that typically did not hold up against Hurricane Sandy. And then they identified materials that should.
And they didn’t stop at resiliency. Another driving motivation was sustainability. So they chose efficient appliances and insulation products made with plastics that reduce energy use by 90 percent compared to the average New Jersey house. To provide power, including when the grid is down after a storm, they installed flexible thin-film solar cells that replace typical heavy glass layers with slim layers of plastics.
So what’s the result of this marriage of sustainable and resilient? SU+RE or the SURE HOUSE, conceived as the “coastal home of the future,” a cost-effective prototype for shore communities and a play on the New Jersey phrase: shore house.
It started with a simple question: “how can we design a home which both reduces its energy use and adapts to the realities of a changing, more extreme climate?” The answer resulted in a net-zero energy, storm-resilient coastal beach cottage with the latest renewable energy technologies, built from plastics and other materials repurposed from the boating industry. Inspired indeed.
Oh, and guess what? The Stevens Institute of Technology’s SURE HOUSE won the Solar Decathlon, placing first place in seven out of ten criteria of the contest.
“Inspired” by a superstorm. Built for sustainability and resiliency. Potentially a model for future shore homes. And the role of plastics? A big one, you can be SURE. (OK, just a little bit of humor …)
Hats off to the Vinyl Institute for sponsoring this house and helping demonstrate once again how plastics can contribute to sustainability and resilience. Check out the Vinyl Institute’s video on the SURE HOUSE.
|
<urn:uuid:b700a10d-0bf8-4517-8f6e-f5d1573a432d>
|
CC-MAIN-2023-14
|
https://www.plasticsmakeitpossible.com/plastics-at-home/inspired-by-hurricane-college-team-builds-energy-efficient-shore-house-with-plastics/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950110.72/warc/CC-MAIN-20230401160259-20230401190259-00062.warc.gz
|
en
| 0.941754 | 836 | 2.78125 | 3 |
Whether cloning is your everyday work, or you just dabble, you are bound to meet the situation where you need to remove a stretch of unwanted DNA from your vector, e.g. to remove unwanted sequences or make an insertion.
If you are lucky, two rare-cutter restriction sites will neatly flank the piece you want to remove allowing you to easily drop out without any problems. But rarely does Murphy’s Law make anything so easy.
But never fear. Should you find yourself in this situation without a unique restriction site to be seen, we have two alternatives that can break the laws and set you free on your way to your cloning goal.
This article was inspired by a question from one of our readers (thanks Derek!) who asked us to provide some tips for removal of a small piece of DNA (60 bp) in a multiple cloning site of a larger vector (8 kb) to prepare it for cloning a new gene.
The first alternative to restriction sites for removing an unwanted piece of vector is exonuclease digestion. This could work for you if you have an available restriction site on at least one side of the DNA you want to excise, and if you don’t have to be completely exact about the amout of DNA you remove.
Exonucleases chew away one end of a single-stranded piece of the dsDNA in a controlled and linear manner. So after digesting with your available restriction site, you can use an exocnuclease to chew away the unwanted stretch of DNA. There are a variety exonucleases available, so be sure to pick one that does what you need. Of course, exonucleases can chew the DNA in either 5′ or 3′ direction, so be sure to choose one that moves in the direction you need. The schematic example on the right shows the use of a 5′-3′ exonuclease.
To control the amount of DNA removed, perform a time course experiment with linear DNA and look at the change in size over time to find the amount of time that removes only 60 bp. A high percentage agarose gel should allow you to analyze small changes in size with enough accuracy to make an estimate.
This protocol does not allow for exact knowledge of how much DNA was removed, but depending on what you need, getting close to the target can be good enough.
Exonucleases are pretty useful things — they are also central to ligation independent cloning, which we covered in another article.
The second alternative is more exact. It involves performing a PCR reaction to amplify the vector using primers that are in opposite directions to each other, and which leave out the unwanted region.
This requires a high fidelity enzyme that can amplify long products (out to 8kb in Dave’s example). One example is the Phusion enzyme by Finnzymes. This enzyme can amplify up to 20 kb with double the fidelity of standard proof-reading enzymes. Another option is the Thermo Extensor enzyme blend. There are several options for long PCR with high fidelity so if you have a favorite supplier, I recommend you check them out and see what they offer.
By using PCR primers amplifying in opposite directions, you will generate products that lacks the unwanted DNA. You can use an exonuclease for ssDNA to remove any overhangs and blunt end the vector.
A second round of PCR (this time using a non-proofreading polymerase like Taq) can be used to add back “A” overhangs if you want to clone into that space another PCR product. Or, the blunt-ended DNA can be re-ligated together to circularize the plasmid so it can be transformed back into E.coli for preparing a larger batch of your new vector.
A final word on Murphy and plasmids…
Removal of DNA from vectors is one of the most routine laboratory techniques in cloning, so is ripe for the application of Murphy’s Law, and can be the problem of much frustration.
When the typical approaches don’t work, sometimes a completely different approach can help you beat Murphy’s law. Hopefully some of these ideas will can help you do so, and even inspire you to further creative ideas on to get the vector you need.
Incidentally, if you want to know a bit more about the science of Murphy’s law, take a look at Matthews, R A J (1995). “Tumbling toast, Murphy’s Law and the Fundamental Constants” a 1995 European Journal of Physics (and Ignoble prize-winning) article by Robert Matthews, which explains why toast always falls buttered side down.
If you are having problems with a particular aspect of your lab work, please feel free to send it to us using the contact form. We can’t guarantee to answer all questions, but if yours catches our eye, we’ll write our suggestions up in an article just like this one.
|
<urn:uuid:aa9005a0-9a56-4b2d-8688-224bddf1a288>
|
CC-MAIN-2017-26
|
http://bitesizebio.com/10228/removing-unwanted-dna-from-vectors-how-to-beat-murphys-law/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320570.72/warc/CC-MAIN-20170625184914-20170625204914-00045.warc.gz
|
en
| 0.925407 | 1,034 | 2.75 | 3 |
The lottery is a form of gambling that involves buying tickets for a chance to win a prize. It’s a popular pastime in many countries, and governments often run lotteries to raise money for various public projects. In the United States, people spent about $100 billion on lottery tickets in 2021. While lottery sales are a significant source of revenue for state budgets, there is debate over whether the trade-off to individuals who lose money is worth it.
Most people understand that they are unlikely to win the lottery, but some are willing to pay $2 for a tiny sliver of hope that they might be the exception. Others are committed gamblers who spend a significant amount of their income on lottery tickets. Some of these people are able to manage their gambling addiction and keep it in check, but others are not so lucky. There are several cases of lottery winners who find themselves worse off after winning the jackpot.
People have been betting on the outcome of a random drawing for thousands of years. In fact, some of the first recorded signs of a lottery are keno slips from the Chinese Han dynasty between 205 and 187 BC. The modern lottery is an established institution that is regulated and licensed by the government. People can play lotteries at their local retail outlets or online. The odds of winning the lottery are slim, but some people win big and become instant millionaires.
A lottery is a game of chance where the winning numbers are drawn at random by a computer program. The prize is a lump sum of cash or goods. A player can also purchase a ticket for a specific number or set of numbers, known as a combo.
In the United States, there are two types of lotteries: state-run and private. State-run lotteries are operated by a state’s gaming commission and are usually advertised in newspapers, on TV, and radio. Private lotteries are run by private companies or groups and are usually advertised in magazines or on the Internet.
Lotteries are a good way for the state to get money for a variety of reasons, from infrastructure improvement to paying for education. However, it is important to note that while they are a good source of revenue, they are not as transparent as a traditional tax and most consumers don’t see the percentage of their ticket price that goes towards prize payouts.
In order to make a profit, a lottery must sell enough tickets to cover its expenses and distribute a portion of the proceeds to the winners. As a result, the chances of winning decrease when you buy more tickets. However, there are strategies that can increase your chances of winning. For example, you can choose a series of numbers that are not close together, or pick numbers that have significance to you. You can also try to purchase Quick Picks, which have a higher probability of being chosen than individual numbers.
|
<urn:uuid:c3f60d37-210e-4f01-a505-6ffbe0a11684>
|
CC-MAIN-2023-40
|
https://ruedumainerestaurant.com/the-truth-about-winning-the-lottery/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506029.42/warc/CC-MAIN-20230921174008-20230921204008-00711.warc.gz
|
en
| 0.978524 | 584 | 2.6875 | 3 |
Nikah is the Islamic term for marriage and is considered a sacred and important institution in Islam. It is a contract between two individuals, typically a man and a woman, who come together to form a union based on mutual love, respect, and commitment. In Islamic law, Nikah is a legal and binding contract that requires the consent of both parties, the presence of witnesses, and the payment of a dowry (mahr) from the groom to the bride.
Nikah is considered to be a fundamental aspect of Muslim life and is seen as a way to fulfill one's religious and social obligations while also building a strong and loving family unit. The process of Nikah may vary depending on cultural and regional practices, but the core principles and requirements remain the same.
Nikah Online refers to the process of getting married through online platforms or services, typically facilitated by an Islamic organization or a certified marriage officiant. This means that the entire process of finding a partner, getting to know them, and ultimately getting married can be done through digital means. Nikah Online has become more popular in recent years due to a variety of reasons, including the increased use and accessibility of technology, the ease and convenience of online communication, and the desire for a more efficient and streamlined process of finding a partner.
Nikah Online differs from traditional Nikah in that it eliminates some of the logistical challenges that may arise when trying to find a partner through more traditional means. For example, with Nikah Online, individuals can search for potential partners who share similar values and beliefs from anywhere in the world, which expands the pool of potential candidates significantly. Additionally, online communication allows for more frequent and consistent communication, which can help to build a stronger connection between individuals before they decide to get married. However, it is important to note that Nikah Online still requires both individuals to meet the requirements for marriage under Islamic law, such as consent, witnesses, and a marriage contract.
The legality of Nikah Online in Islamic marriages is a subject of debate among scholars, and there is no consensus on its permissibility in Islamic law. However, many Muslim scholars have argued that Nikah Online can be considered valid as long as certain conditions are met. According to Islamic law, a marriage contract requires the consent of both the bride and groom, the presence of witnesses, and the agreement of a guardian for the bride if she is not able to consent for herself. These requirements must also be met for Nikah Online to be considered valid.
Additionally, there are some concerns about the authenticity and validity of Nikah Online, especially in cases where individuals may misrepresent themselves online or engage in fraudulent behavior. To address these concerns, some Islamic organizations have developed guidelines and protocols for conducting Nikah Online, such as requiring both individuals to provide proof of identity and conducting thorough background checks.
In terms of legal precedents and rulings, there have been varying stances on the legality of Nikah Online in different countries. For example, in Malaysia, the Department of Islamic Development Malaysia (JAKIM) has recognized Nikah Online as a valid way to conduct a marriage ceremony, as long as certain requirements are met. Similarly, in the United Arab Emirates, the Dubai Courts have recognized the validity of Nikah Online, provided that it is conducted by Islamic law and recognized by the relevant authorities.
However, in some countries, such as Saudi Arabia, Nikah Online is not recognized as a valid means of conducting a marriage ceremony, and couples are required to have a physical presence and conduct the ceremony in person. It is important to note that the legality of Nikah Online may vary depending on the country and the specific circumstances surrounding the marriage. As such, individuals interested in conducting Nikah Online should consult with local Islamic authorities and legal experts to ensure that they are following the appropriate guidelines and requirements.
The history of Nikah Online can be traced back to the early 2000s, with the emergence of Muslim dating sites that provided a platform for Muslims to connect and potentially find a partner for marriage. These sites were primarily used by Muslims living in Western countries, who were looking for a way to meet potential partners who shared similar cultural and religious backgrounds.
Over time, these sites evolved to include more advanced features such as personality tests, compatibility quizzes, and in-depth profiles, which made the process of finding a suitable partner more efficient and effective. As technology continued to advance, new platforms such as mobile dating apps and social media sites also emerged, providing even more opportunities for Muslims to connect online.
In recent years, there has been an increase in the number of Islamic organizations and certified marriage officiants that offer Nikah Online services. These services typically involve a process of online communication, where individuals can search for potential partners, get to know them through chat or video calls, and ultimately make a decision about whether to proceed with a marriage contract.
The COVID-19 pandemic has also contributed to the increased popularity of Nikah Online, as social distancing measures and travel restrictions have made it difficult for individuals to meet potential partners in person. As a result, many Muslims have turned to online platforms as a way to continue their search for a partner while staying safe.
While Nikah Online has its critics and remains a subject of debate among scholars, it has become a popular and widely accepted means of finding a partner for marriage among many Muslim communities around the world.
There are a variety of Nikah Online services available to individuals who wish to conduct their marriage ceremony online. Some of the most common types of services include:
These services are typically offered by Islamic organizations or certified marriage officiants and involve a process of online communication, where individuals can search for potential partners, get to know them through chat or video calls, and ultimately make a decision about whether to proceed with a marriage contract. These services may also include assistance with obtaining the necessary legal documents, such as marriage licenses and certificates.
Some marriage officiants offer virtual Nikah ceremonies, where the couple and witnesses can participate in the ceremony via video call. These ceremonies may include recitation of the Quran, exchange of vows and rings, and other traditional elements of a Nikah ceremony.
Some couples may choose to combine virtual and physical elements of a Nikah ceremony, by having the marriage officiant conduct the ceremony online while the couple and witnesses participate in person.
Here are the benefits of Nikah Online.
One of the biggest benefits of Nikah Online is convenience and accessibility. Couples who live far apart or have busy schedules can easily communicate and plan their wedding ceremony online. They can also choose to have the ceremony at a time and location that is most convenient for them, without having to worry about travel or other logistical challenges.
Nikah Online is also more time and cost-effective than traditional weddings. Couples can save money on travel, venue rental, catering, and other expenses associated with a physical wedding ceremony. They can also save time by avoiding the lengthy planning process of a traditional wedding, which can take months or even years to organize.
Planning and executing a traditional wedding can be stressful and overwhelming for many couples. Nikah Online can alleviate some of that stress by simplifying the planning process and reducing the pressure associated with a physical wedding ceremony. Couples can focus on their love and commitment to each other, rather than worrying about details like seating arrangements or floral arrangements.
Nikah Online provides couples with more privacy and control over their wedding ceremony. They can choose to have a private ceremony with only their closest family and friends in attendance, or they can invite a larger group of people to participate online. Couples can also customize their ceremony to reflect their individual preferences and traditions.
Nikah Online can be more inclusive for couples who come from different backgrounds, cultures, or religions. It allows interfaith and international couples to easily plan and execute their wedding ceremony, without having to navigate complex legal and cultural requirements. It also allows couples to blend their cultural traditions and practices into their wedding ceremony, creating a unique and meaningful experience for themselves and their loved ones.
When planning a Nikah Online, it is important to choose the right online platform and service provider. Look for a platform that is user-friendly, secure, and reliable. Read reviews and ask for recommendations from friends or family who have used similar services. Avoid providers that have a history of technical difficulties or poor customer service.
Before the Nikah Online ceremony, couples will need to prepare certain documents and requirements. These may include a marriage license, identification documents, and any necessary legal or religious certificates. The specific requirements may vary depending on the couple's location and religious background. It is important to research and understand these requirements in advance to avoid any delays or complications.
Couples will need witnesses and an officiant for their Nikah Online ceremony. The witnesses should be adults who are willing to sign the marriage certificate and attest to the couple's consent to the marriage. The officiant should be authorized to perform Nikah Online ceremonies and should be chosen based on the couple's religious or personal preferences. It is important to research and contact potential witnesses and officiants in advance to ensure their availability.
One of the advantages of Nikah Online is the ability to customize the wedding ceremony and traditions. Couples can choose to include traditional elements, such as reciting religious verses or exchanging gifts, or they can create their unique ceremony. They can also choose to involve family and friends in the ceremony, either in person or online, to make the event more meaningful and inclusive. It is important to communicate any specific preferences or traditions to the officiant and witnesses in advance to ensure a smooth and personalized ceremony.
Here are some tips for a successful Nikah Online.
Effective communication is essential for a successful Nikah Online ceremony. Couples should ensure they have clear lines of communication with their service provider and guests, and provide detailed instructions and information in advance. They should also establish a backup plan in case of any technical difficulties or communication breakdowns. It is important to test all equipment and platforms before the ceremony and to have a dedicated technical support team available during the event.
Technical considerations are crucial when planning a Nikah Online ceremony. Couples should ensure they have a reliable internet connection and test all audio and video equipment before the event. They should also have a backup plan in case of any technical difficulties, such as a secondary device or alternative platform. It is also important to have a dedicated technical support team available during the ceremony to troubleshoot any issues that may arise.
Nikah Online ceremonies may have legal and cultural considerations that couples should be aware of. They should research and follow all relevant laws and regulations, including obtaining the necessary marriage license and certificates. They should also be aware of any cultural norms or traditions that may be expected during the ceremony, such as dress codes or prayer rituals. It is important to respect and acknowledge the cultural and religious backgrounds of all participants to ensure a respectful and inclusive ceremony.
In conclusion, Nikah Online provides a convenient and accessible alternative to traditional wedding ceremonies, particularly for couples who live far apart or have busy schedules. It offers several benefits, including time and cost-effectiveness, reduced stress and pressure, more privacy and control over the wedding ceremony, and greater inclusivity for interfaith and international couples.
Planning a successful Nikah Online ceremony involves choosing the right online platform and service provider, preparing the necessary documents and requirements, finding the right witnesses and officiant, and customizing the wedding ceremony and traditions to fit the preferences of the couple.
Effective communication with the service provider and guests, technical considerations and backups, and legal and cultural considerations are also crucial for a successful Nikah Online ceremony. By following these tips and considerations, couples can enjoy a beautiful and meaningful wedding ceremony while still maintaining social distancing and following pandemic protocols.
Getting married is complicated. Courtly simplifies the process and provides everything necessary to get married online, including providing a licensed officiant who can perform a remote ceremony.get married
Getting married is complicated. Courtly simplifies the process and provides everything necessary to get married online.get married
|
<urn:uuid:31f5c2f3-434b-460f-8931-2e995a16be69>
|
CC-MAIN-2023-40
|
https://www.courtly.com/resources/nikah-online
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506632.31/warc/CC-MAIN-20230924091344-20230924121344-00818.warc.gz
|
en
| 0.950491 | 2,456 | 2.90625 | 3 |
Republic Day in the Republic of Macedonia
Republic Day in the Republic of Macedonia is held on August 2. This event in the first decade of the month August is annual. Help us
Macedonia had come under the control of the Ottoman Empire in the 14th century. On August 2nd 1903, an uprising against the Ottomans was led by the Internal Macedonian Revolutionary Organization.
Republic Day or the Day of the Republic or Ilinden is a major national holiday of North Macedonia. It is celebrated on 2 August, which is also a major religious holiday. It commemorates two major events in the establishment of the statehood of the country which took place on this date:
The Ilinden Uprising of 1903 which was organized by the Internal Macedonian Revolutionary Organization against the Ottoman Empire, and during which a short-lived Kruševo Republic was proclaimed, and
The First Assembly of the Anti-fascist Assembly for the National Liberation of Macedonia of 1944, during World War II in Yugoslav Macedonia, which laid the foundation of the SR Macedonia.
Macedonians have traditionally celebrated this day, also called Ilinden, because of its religious significance which has its roots in the Christian St. Elijah, and also in the earlier pagan traditions. It has been proclaimed a national holiday since 1944.
Similar holidays and events, festivals and interesting facts
Feast of the Mother of God on August 28 (Eastern Orthodox Church, a public holiday in the Republic of Macedonia, Serbia, and Georgia);
Macedonia Independence Day on September 8 (celebrates the independence of Macedonia from Yugoslavia in 1991);
Day of the Macedonian Revolutionary Struggle on October 23 (Republic of Macedonia);
|
<urn:uuid:e3b06921-409c-4f96-987c-52323576f44e>
|
CC-MAIN-2023-40
|
https://webplus.info/index.php?page=340&event=76294
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233508977.50/warc/CC-MAIN-20230925115505-20230925145505-00262.warc.gz
|
en
| 0.970066 | 342 | 3.34375 | 3 |
The Ojibway story of the seven grandfathers’ teachings was passed down from parent to child for many generations. The story goes…
The Creator gave the seven grandfathers, who are very wise, the responsibility to watch over the people. The grandfathers saw that the people were living a hard life. There was all kinds of sicknesses and bad things around. The Messenger was told, “Go down there, look around and find out what is happening. Bring back someone who we can tell about what life should be, with the Ojibway” He left immediately and went to all places in the North, South, West and East. He could not find anyone. On his seventh try, while he was looking, he saw a baby. The grandfathers were happy with the choice made by the helper.
He took the baby back to where the Grandfathers were sitting in a circle. He was still very small and still wrapped inside the cradleboard. One of the grandfathers looked at the baby very carefully. “This is the one. Messenger, pick up the baby. Take him all over; teach him carefully the way the Ojibway should lead their lives.” The Messenger took him; they went around the earth.
When they came back seven years later, the boy again saw the Grandfathers. He was already a young man. The Grandfathers noticed that this boy was very honest. He understood everything that was taught. One of the grandfathers took a drum and started singing. Each of the grandfathers gave the boy a teaching. “These are the ones you take with you,” he was told.
- Nibwaakaawin—Wisdom: To cherish knowledge is to know Wisdom. Wisdom is given by the Creator to be used for the good of the people. In the Anishinaabe language, this word expresses not only “wisdom,” but also means “prudence,” or “intelligence.”
- Zaagi’idiwin—Love: To know Love is to know peace. Love must be unconditional. When people are weak they need love the most. In the Anishinaabe language, this word with the reciprocal theme indicates that this form of love is mutual.
- Minaadendamowin—Respect: To honor all creation is to have Respect. All of creation should be treated with respect. You must give respect if you wish to be respected.
- Aakode’ewin—Bravery: Bravery is to face the foe with integrity. In the Anishinaabe language, this word literally means “state of having a fearless heart.” To do what is right even when the consequences are unpleasant.
- Gwayakwaadiziwin—Honesty: Honesty in facing a situation is to be brave. Always be honest in word and action. Be honest first with yourself, and you will more easily be able to be honest with others. In the Anishinaabe language, this word can also mean “righteousness.”
- Dabaadendiziwin—Humility: Humility is to know yourself as a part of Creation. In the Anishinaabe language, this word can also mean “compassion.” You are equal to others, but you are not better.
- Debwewin—Truth: Truth is to know all of these things. Speak the truth. Do not deceive yourself or others.
The boy, because of all the time spent with the Grandfathers, was now an old man. The old man gathered all the people around and told them of his journey to the seven grandfather’s lodge. He explained how to use the gifts and that it was now up to the people to try to follow the path of a good and healthy life using the seven grandfather’s teachings.
They told him each of these teachings must be with the rest, you cannot have wisdom without love, respect, bravery, honesty, humility and truth. You cannot be honest if you only use one or two of these, or if you leave out one. And to leave out one is to embrace the opposite of what that teaching is.
Fruit of the Spirit, Gal 5:20 – But the fruit of the Spirit is love, joy, peace, forbearance, kindness, goodness, faithfulness, gentleness and self-control. Against such things there is no law. These too must be used together and work together in our lives. You cabin leaders will talk with you about the camp boundaries and some other rues you need to know.
Now all I have to do is memorize it and tell it to the campers each week.
|
<urn:uuid:8be5b569-ddd7-4827-8e22-b552de753c0d>
|
CC-MAIN-2017-34
|
http://widjiitiwin.ca/seven-grandfathers-teachings/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886105970.61/warc/CC-MAIN-20170820034343-20170820054343-00330.warc.gz
|
en
| 0.976523 | 985 | 3.515625 | 4 |
CANCER (Punarvasu (4), Pushyam/Pooyam, Ashlesha/Ayilyam)
Cancer persons are generally low in vitality; one who is very timid yet loath to follow the advice of others. They are expected to do the opposite to what they are advised to do. They are also full of suspicion, and on account of lack of faith in others they are difficult to reach; but when their faith has once been established, they are most loyal and ready to cooperate.
Cancer rules diaphragm, heart veins, the mammary glands, upper lobes of the liver, thoracic duct, chymification, peristalsis, the pancreas, gastric vein, and the serum of the blood. The afflictions which may be classed under the sign of Cancer are indigestion, hiccough, flatulency, dropsy, and sclerosis. Consequently they are often afflicted with diseases which originate in wrong diet.
|
<urn:uuid:162ff224-f6da-44d3-b90c-fe7becbb0f0d>
|
CC-MAIN-2017-30
|
http://gopalakrishnasharma.blogspot.com/2011/12/karkitakam-cancer-medical.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549427429.9/warc/CC-MAIN-20170727042127-20170727062127-00708.warc.gz
|
en
| 0.968407 | 209 | 2.515625 | 3 |
TUKTOYAKTUK, Northwest Territories — The Arctic Ocean has given up tens of thousands more square miles of ice in a relentless summer of melt, with scientists watching through satellite eyes for a possible record low polar ice cap.
From the barren Arctic shore of this village in Canada's far northwest, 1,500 miles north of Seattle, veteran observer Eddie Gruben has seen the summer ice retreating more each decade as the world has warmed.
By this weekend the ice edge lay some 80 miles at sea. "Forty years ago, it was 40 miles out," said Gruben, 89, patriarch of a local contracting business.
Global average temperatures rose 1 degree in the past century, but Arctic temperatures rose twice as much or even faster, almost certainly in good part because of man-made greenhouse gases, researchers say.
In late July the mercury soared to almost 86 degrees in this settlement of 900 Inuvialuit, the name for western Arctic Eskimos.
"The water was really warm," Gruben said. "The kids were swimming in the ocean."
As of Thursday, the U.S. National Snow and Ice Data Center reported, the polar ice cap extended over 2.61 million square miles after having shrunk an average 41,000 square miles a day in July, equivalent to one Indiana or three Belgiums daily.
The rate of melt was similar to that of July 2007, the year when the ice cap dwindled to a record low minimum extent of 1.7 million square miles in September.
In July, "we saw acceleration in loss of ice," the U.S. center's Walt Meier said. In recent days the pace has slowed, making a record-breaking final minimum "less likely but still possible," he said.
|
<urn:uuid:cd922521-f59f-4162-bf9f-ba12aa5cdc48>
|
CC-MAIN-2017-34
|
http://www.tampabay.com/incoming/arctic-polar-ice-cap-approaching-record-low-thanks-to-global-warming/1026159
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886105341.69/warc/CC-MAIN-20170819105009-20170819125009-00375.warc.gz
|
en
| 0.956993 | 360 | 2.90625 | 3 |
Will Everyone Get Alzheimer’s If They Live Long Enough?
Meryl Comer: From a population perspective, 85-plus is the fastest-growing segment of the population. Now can we assume that everyone who lives long enough will get Alzheimer’s, Dr. Guarente?
Dr. Guarente: Well I don’t think we know for sure, but my guess would be that the answer is no and I base that on the fact that there is a population of people now called centenarians, who are people who live to be 100 and longer, and many of these people are in quite good health physically and mentally and have evidently escaped from all of the major diseases, including Alzheimer’s. Now, that said, I think it’s certainly true that many, many people, maybe most people would get Alzheimer’s. So from a societal point of view I think the answer is most people would be vulnerable, but from a scientific point of view I think there might be people who are just so resistant to these diseases, including Alzheimer’s that they would escape it.
Meryl Comer: Dr. Gandy, 85, 1 out of 2 gets the disease. Do you want to comment further on that?
Dr. Gandy: Well there are a handful of people who live to 120, so then they’ve been characterized neuro-psychologically near the time of death and then studied pathologically and it’s possible for some people with the right genes to live to 120 and be cognitively intact and have absolutely clean brains, have no Alzheimer’s pathology.
Meryl Comer: But let’s...
Dr. Arancio: Maybe even live to be 150.
Dr. Gandy: It’s possible if everyone lived to 150 then everyone would get Alzheimer’s disease, but 120 is not the 100%. It may even be 99%, but it’s not 100%.
Meryl Comer: Well let’s help our audience move along a progression from mild cognitive impairment and that trajectory that takes you to Alzheimer’s, which is just the most common form of dementia. Can you help us, take us down that road?
Dr. Gandy: Mild cognitive impairment is really the first sort of syndrome that neurologists will diagnose that might be related to Alzheimer’s disease. Mild cognitive impairment usually means there is a problem with memory and it may be isolated to just memory and if it’s called mild cognitive impairment or MCI, by the abbreviation, it usually implies that the person’s normal function is not impaired, so that they can compensate for it and continue to do their normal tasks in their regular lives. The prognosis of mild cognitive impairment has long been sort of a mystery because it was some people seem to live through MCI and never get Alzheimer’s disease while some actually went on from MCI to progress to dementia, which was usually Alzheimer’s disease. We now we learned just this past summer that there are spinal fluid tests that might be able to help us predict which people with MCI are on their way to Alzheimer’s disease.
Meryl Comer: But the majority of people in assisted living facilities today, 60% have MCI that put them in there in the first place. What's their trajectory onto Alzheimer’s?
Dr. Gandy: Well without this sort of spinal fluid evidence we can’t really predict. That is part of why the Food and Drug Administration hasn’t allowed us to use MCI as a diagnosis because the prognosis of MCI as a group is unknown. Some people stay unchanged. Some get worse. Some get better.
Dr. Arancio: It’s about 18% every 2 years that go from MCI to Alzheimer’s.
Meryl Comer: And what happens with your patients with Parkinson’s plus dementia? Does Alzheimer’s or dementia come at the end of the disease like Parkinson’s or frontal lobe...?
Dr. Troncoso: Well in the case of Parkinson’s disease, from a clinical perspective once that individual has had probably 8, 10 years of the disease is at high risk of having some sort of dementia, which is actually different from the Alzheimer’s disease. It’s not the same type of manifestation. It’s not so problem with memory for instance, but it’s a difficulty in getting tasks performed. Kind of they are very slow in performing tasks. Having said that the substrate, the reason why patients with Parkinson’s disease have dementia is not clear. Furthermore, because these are diseases of aging many patients that have Parkinson’s disease also have Alzheimer’s disease, and probably both disorders add their lesions to render the patient demented. That is why it would be very important perhaps to slow down the aging process. You would kill two birds with one stone. You would actually prevent both Parkinson’s and Alzheimer’s disease.
Dr. Guarente: It would be more than two because we all have vulnerabilities and resistances and if we are resistant to one thing we’re going to be sensitive to something else.
Dr. Troncoso: Exactly.
Dr. Guerente: Aging is going to cause something bad to happen.
The Brain Plaques and Tangles That Cause Alzheimer’s
Meryl Comer: The mainstream research has been focused on beta amyloid. Tau has always been there, but now there is a big controversy about where the progression comes, where does it really lie? Take that debate on Dr. Gandy.
Dr. Gandy: Well certainly people with Alzheimer’s disease have two sorts of lesions in their brains, two sorts of clumps of protein. Some of these clumps are in between nerve cells, and others are inside nerve cells. The ones that are in between the nerve cells are called amyloid plaques. The clumps that are inside the nerve cells, which are twisted, are called tangles or neurofibrillary tangles. Now for many years we didn’t sort of know what the sequence of events was, but it is very clear now that all the genes that cause Alzheimer’s disease point to the buildup of amyloid. So it appears that Alzheimer’s disease amyloid comes first and tangles come next. They may be extremely important in understanding why the nerve cell dies. Now the disease that Dr. Troncoso mentioned, frontal temporal dementia, has also helped us to understand the relationship between plaques and tangles because in that disease the mutations that cause the genetic forms are in the protein called tau that builds up and causes tangles. People with frontal temporal dementia get tangles, but they never get plaques, so in Alzheimer’s disease plagues can cause tangles, but in frontal temporal dementia tangles don’t cause plaques.
Meryl Comer: Well why is it so hard these days to get a grant from NIA around beta amyloid when you can get it for tau?
Dr. Gandy: Well so there is a specific reason for that that’s really evolved a lot in the last year. There is a study that was reported this spring that showed using an antibody, a chemical aimed at the amyloid substance... that if people with mild Alzheimer’s disease received antibody infusions, anti-amyloid infusions, for a year and a half that the amyloid buildup in their brains would go down by about 25%. They didn’t change at all clinically. They didn’t get any better in terms of their cognitive function. Why is that? Because we didn’t start early enough, because we didn’t treat long enough or because it’s actually another form of amyloid, not the plaques, but these floating clumps called oligomers?
Meryl Comer: You wanted to make a point, yes, doctor.
Dr. Troncoso: Yeah well, I think that there is a lot of debate between the amyloid and tau deposition, but I think one should not get stopped at that point of that argument because it’s perfectly possible that one of these abnormalities, let’s say amyloid may trigger the rest and there is more than amyloid and tau. We haven’t spoken, but there is a very significant inflammatory, inflammation in the brain that once you have perhaps amyloid and tau trigger that event it becomes self-sufficient. It actually may even promote more amyloid or more tau deposition, so I think that tau it may be as important as amyloid, but it may be later on in this progression of the disease. And if you could actually target each of these elements it probably would be beneficial. So I don’t see really a tremendous dichotomy, antagonism between looking at amyloid and tau. I think that both are perfectly legitimate targets of research and one more perhaps disgression in terms of the dementia that is being seen in patients who have head trauma. Most of that, the lesions that they have is of the tau type, so I think both of these targets amyloid and tau should be addressed. There is no reason to eliminate one of them.
Dr. Gandy: There is the one experiment to mention that might also explain why the shift sort of toward tau. A lot of what we’ve learned about Alzheimer’s disease is from mouse models. Mice normally never ever get Alzheimer’s disease because their amyloid is different enough that it doesn’t clump and build up. If we then put into a mouse the gene for amyloid and with a mutation that would cause it to build up and the gene for tau so that it will get tangles, then as that animal ages it will get buildup of plaques and tangles just like, similar to humans with Alzheimer’s disease. They will then lose their ability to find their way around their cage or to find their way around a swim maze. If you then treat them with a drug or substance that will decrease the levels of tau, will lower the tau down, the cognitive function comes back, so it’s possible to sort of render the amyloid inert if you can turn down the tau at least in the mouse model.
|
<urn:uuid:d23655d2-e010-41f7-a861-2a36bae7f2b2>
|
CC-MAIN-2014-23
|
http://bigthink.com/videos/will-everyone-get-alzheimers-if-they-live-long-enough-2
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510268363.15/warc/CC-MAIN-20140728011748-00393-ip-10-146-231-18.ec2.internal.warc.gz
|
en
| 0.961244 | 2,192 | 2.796875 | 3 |
HERTZVELD-HIJMANS, ESTHELLA (1837–1881), Dutch poet. Esthella Hertzveld was the eldest of six children in the family of Salomon Hartog Hertzveld (1806–1904) and Devora Halberstamm (1814–1904). She received an excellent education, focusing primarily on the study of literature, Jewish history, Hebrew, and modern languages. At the age of 15 she made her literary debut as a poet with the publication of "Elias in de Woestijn" ("Elias in the Desert") and of "Sauls Dood" ("Saul's Death"), which soon made her famous in Dutch literary circles. Because of her reputation, the baptized Portuguese Jew Abraham Capadose dedicated to her his translation of a story on conversion in 1853. In readers' letters to the Jewish press the poet and her father distanced themselves from Capadose's dedication and beliefs.
In 1863 Hertzveld married Jacobus Hijmans (1816–1896), who was her senior by 21 years. Chief Rabbi Berenstein of The Hague consecrated the marriage in Delft. A report of the event was published in the December 18 issue of the Delftse Courant.
Hertzveld was also involved in social work and became an active member of the women's Arbeid Adelt movement that was emerging under the wings of Betsy Perk and later Aletta Jacobs.
A mother of six children, Esthella Herzveld died at the age of 44 from a lung disease.
Jozef *Israels painted her portrait, which is now part of the collection in the municipal museum in The Hague.
J. Wijnberg-Stroz and M. van Lunteren-Spanjaard, Blijvers en Voortgangers. Joden in Delft 1850–1960 (1998); J. Wijnberg-Stroz, in: Misjpoge, 8 (1995) 2, 37–47; N. Mayer-Hirsch, "Esthella Hijmans-Herztveld," at: www.geocities.com/athens/oracle/9784/estel.html.
[Monika Saelemaekers (2nd ed.)]
Source: Encyclopaedia Judaica. © 2008 The Gale Group. All Rights Reserved.
|
<urn:uuid:bb63f07c-aa19-4022-82cf-d1d32a9d6d28>
|
CC-MAIN-2014-15
|
http://www.jewishvirtuallibrary.org/jsource/judaica/ejud_0002_0009_0_08850.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609533689.29/warc/CC-MAIN-20140416005213-00336-ip-10-147-4-33.ec2.internal.warc.gz
|
en
| 0.938786 | 514 | 2.71875 | 3 |
The contemporary zeal for the project of interpretation is often prompted by an open aggressiveness… The old style of interpretation was insistent, but respectful; it erected another meaning on top of the literal one. The modern style of interpretation excavates, and as it excavates, destroys….
Theory Content Essays by Jerry Fodor, First Edition
Interpretation is not as most people assume an absolute value, a gesture of mind situated in some timeless realm of capabilities. Interpretation must itself be evaluated, within a historical view of human consciousness.
In some cultural contexts, interpretation is a liberating act. It is a means of revising, of transvaluing, of escaping the dead past.
In other cultural contexts, it is reactionary, impertinent, cowardly, stifling. Interpretation is not simply the compliment that mediocrity pays to genius. It is, indeed, the modern way of understanding something, and is applied to works of every quality. Interpretation is the revenge of the intellect upon art.
Even more. It is the revenge of the intellect upon the world.
Externalism and Self-Knowledge (Stanford Encyclopedia of Philosophy)
As if there were any other. In a spectacular answer to the eternal and elusive question of what art is and what its duties are , she adds:.
- BeagleBone Media Center.
- Causal Theories of Mental Content.
- Subscriber Login!
- Engineering Quantum Mechanics.
- The Crystal Structure of Beryllium and of Beryllium Oxide.
- University of Alberta Dictionary of Cognitive Science: The Disjunction Problem.
Real art has the capacity to make us nervous. By reducing the work of art to its content and then interpreting that, one tames the work of art. Interpretation makes art manageable, conformable. Interpretation, based on the highly dubious theory that a work of art is composed of items of content, violates art. It makes art into an article for use, for arrangement into a mental scheme of categories.
What is needed, first, is more attention to form in art.
- An encyclopedia of philosophy articles written by professional philosophers.!
- Causal Theories of Mental Content (Stanford Encyclopedia of Philosophy)!
- Dijksterhuis: Archimedes;
If excessive stress on content provokes the arrogance of interpretation, more extended and more thorough descriptions of form would silence. What is needed is a vocabulary — a descriptive, rather than prescriptive, vocabulary — for forms.
Sontag points to cinema as the perfect example of a form that resists the violence of interpretation. She writes:. Perhaps the way one tells how alive a particular art form is, is by the latitude it gives for making mistakes in it, and still being good… In good films, there is always a directness that entirely frees us from the itch to interpret… The fact that films have not been overrun by interpreters is in part due simply to the newness of cinema as an art.
Interpretation takes the sensory experience of the work of art for granted, and proceeds from there… Ours is a culture based on excess, on overproduction; the result is a steady loss of sharpness in our sensory experience. In his eloquent introduction Fodor shows how the two areas are thematically united and epistemologically related, highlighting his concern in finding alternatives to holistic accounts of mental content. Fodor's philosophical essays develop an informational view of semantics that offers the possibility of atomism about meaning; his psychological essays present a modular view of cognitive architecture that offers the possibility of atomism about perception.
These ideas, he points out, are joined in epistemology in way that the books last essay begins to explore. Taken together, the essays represent Fodor's lively attempt to knock the underpinnings from the currently popular relativism to show that the arguments for semantic and psychological holism are insubstantial and that important alternatives exist to be explored. Rocco J. Search Search.
Search Advanced Search close Close. Preview Preview. Fodor This collection of new and previously published essays reflects the major research and thought of one of today's preeminent philosophers of mind. Request Permissions Exam copy.
|
<urn:uuid:0583a422-c9a7-433a-86da-c7cb4d48604f>
|
CC-MAIN-2020-29
|
https://diasynpoutice.ga/a-theory-of-content-and-other-essays.php
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655933254.67/warc/CC-MAIN-20200711130351-20200711160351-00553.warc.gz
|
en
| 0.911273 | 870 | 2.890625 | 3 |
Transmission Control Protocol and Java
The Transmission Control Protocol (TCP) is a stream-based method of network communication that is far different from any discussed previously. This chapter discusses TCP streams and how they operate under Java.
TCP provides an interface to network communications that is radically different from the User Datagram Protocol (UDP) discussed in Chapter 5. The properties of TCP make it highly attractive to network programmers, as it simplifies network communication by removing many of the obstacles of UDP, such as ordering of packets and packet loss. While UDP is concerned with the transmission of packets of data, TCP focuses instead on establishing a network connection, through which a stream of bytes may be sent and received.
In Chapter 5 we saw that packets may be sent through a network using various paths and may arrive at different times. This benefits performance and robustness, as the loss of a single packet doesn't necessarily disrupt the transmission of other packets. Nonetheless, such a system creates extra work for programmers who need to guarantee delivery of data. TCP eliminates this extra work by guaranteeing delivery and order, providing for a reliable byte communication stream between client and server that supports two-way communication. It establishes a "virtual connection" between two machines, through which streams of data may be sent (see Figure 6-1).
Figure 6-1 TCP establishes a virtual connection to transmit data.
TCP uses a lower-level communications protocol, the Internet Protocol (IP), to establish the connection between machines. This connection provides an interface that allows streams of bytes to be sent and received, and transparently converts the data into IP datagram packets. A common problem with datagrams, as we saw in Chapter 5, is that they do not guarantee that packets arrive at their destination. TCP takes care of this problem. It provides guaranteed delivery of bytes of data. Of course, it's always possible that network errors will prevent delivery, but TCP handles the implementation issues such as resending packets, and alerts the programmer only in serious cases such as if there is no route to a network host or if a connection is lost.
The virtual connection between two machines is represented by a socket. Sockets, introduced in Chapter 5, allow data to be sent and received; there are substantial differences between a UDP socket and a TCP socket, however. First, TCP sockets are connected to a single machine, whereas UDP sockets may transmit or receive data from multiple machines. Second, UDP sockets only send and receive packets of data, whereas TCP allows transmission of data through byte streams (represented as an InputStream and OutputStream). They are converted into datagram packets for transmission over the network, without requiring the programmer to intervene (as shown in Figure 6-2).
Figure 6-2 TCP deals with streams of data such as protocol commands, but converts streams into IP datagrams for transport over the network.
6.1.1 Advantages of TCP over UDP
The many advantages to using TCP over UDP are briefly summarized below.
184.108.40.206 Automatic Error Control
Data transmission over TCP streams is more dependable than transmission of packets of information via UDP. Under TCP, data packets sent through a virtual connection include a checksum to ensure that they have not been corrupted, just like UDP. However, delivery of data is guaranteed by the TCP data packets lost in transit are retransmitted.
You may be wondering just how this is achievedafter all, IP and UDP do not guarantee delivery; neither do they give any warning when datagram packets are dropped. Whenever a collection of data is sent by TCP using datagrams, a timer is started. Recall our UDP examples from Chapter 5, in which the DatagramSocket.setSoTimeout method was used to start a timer for a receive() operation. In TCP, if the recipient sends an acknowledgment, the timer is disabled. But if an acknowledgment isn't received before the time runs out, the packet is retransmitted. This means that any data written to a TCP socket will reach the other side without the need for further intervention by programmers (barring some catastrophe that causes an entire network to go down). All of the code for error control is handled by TCP.
Since the data sent between two machines participating in a TCP connection is transmitted by IP datagrams, the datagram packets will frequently arrive out of order. This would throw for a loop any program reading information from a TCP socket, as the order of the byte stream would be disrupted and frequently unreliable. Fortunately, issues such as ordering are handled by TCPeach datagram packet contains a sequence number that is used to order data. Later packets arriving before earlier packets will be held in a queue until an ordered sequence of data is available. The data will then be passed to the application through the interface of the socket.
220.127.116.11 Ease of Use
While storing information in datagram packets is certainly not beyond the reach of programmers, it doesn't lead to the most efficient way of communication between computers. There's added complexity, and it can be argued that the task of designing and creating software within a deadline provides complexity enough for programmers. Developers typically welcome anything that can reduce the complexity of software development, and the TCP does just this. TCP allows the programmer to think in a completely different way, one that is much more streamlined. Rather than being packaged into discrete units (datagram packets), the data is instead treated as a continuous stream, like the I/O streams the reader is by now familiar with. TCP sockets continue the tradition of Unix programming, in which communication is treated in the same way as file input and output. The mechanism is the same whether the developer is writing to a network socket, a communications pipe, a data structure, the user console, or a file. This also applies, of course, to reading information. This makes communicating via TCP sockets far simpler than communicating via datagram packets.
6.1.2 Communication between Applications Using Ports
It is clear that there are significant differences between TCP and UDP, but there is also an important similarity between these two protocols. Both share the concept of a communications port, which distinguishes one application from another. Many services and clients run on the same port, and it would be impossible to sort out which one was which without distributing them by port number. When a TCP socket establishes a connection to another machine, it requires two very important pieces of information to connect to the remote endthe IP address of the machine and the port number. In addition, a local IP address and port number will be bound to it, so that the remote machine can identify which application established the connection (as illustrated in Figure 63). After all, you wouldn't want your e-mail to be accessible by another user running software on the same system.
Figure 6-3 Local ports identify the application establishing a connection from other programs, allowing multiple TCP applications to run on the same machine.
Ports in TCP are just like ports in UDPthey are represented by a number in the range 165535. Ports below 1024 are restricted to use by well-known services such as HTTP, FTP, SMTP, POP3, and telnet. Table 6-1 lists a few of the well-known services and their associated port numbers.
6.1.3 Socket Operations
TCP sockets can perform a variety of operations. They can:
- Establish a connection to a remote host
- Send data to a remote host
- Receive data from a remote host
- Close a connection
In addition, there is a special type of socket that provides a service that will bind to a specific port number. This type of socket is normally used only in servers, and can perform the following operations:
- Bind to a local port
- Accept incoming connections from remote hosts
- Unbind from a local port
Table 6-1 Protocols and Their Associated Ports
Simple Mail Transfer Protocol
HyperText Transfer Protocol
Post Office Protocol 3
These two sockets are grouped into different categories, and are used by either a client or a server (since some clients may also be acting as servers, and some servers as clients). However, it is normal practice for the role of client and server to be separate.
|
<urn:uuid:247cd9e5-7e7c-4b0b-b15a-11b1b9d84009>
|
CC-MAIN-2017-30
|
http://www.informit.com/articles/article.aspx?p=27633&seqNum=2
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549429485.0/warc/CC-MAIN-20170727202516-20170727222516-00656.warc.gz
|
en
| 0.93575 | 1,678 | 4.34375 | 4 |
As discussed in my last two entries, South Asia's Infrastructure Deficit and Integrating the two South Asias, regional cooperation can be a key instrument in meeting the development needs of South Asia. In this piece, I will discuss specific areas that will bring the most region-wide benefits in my view.
The three priority areas for regional cooperation include telecoms and internet, energy, and transport. A regional telecom network and a high-bandwidth, high-speed internet-based network could help improve education, innovation, and health. A regional network would facilitate better flow of ideas, technology, investments, goods and services. It would facilitate greater interactions between knowledge workers in areas such as high-energy physics, nanotechnology, and medical research. There are untapped positive synergies at the regional level that would come from information sharing and competition in ideas among universities, non-university research and teaching entities, libraries, hospitals, and other knowledge institutions.
It also could help in the building and sharing of regional databases, and in addressing regional problems, including multi-country initiatives such as flood control, disaster management, climate change, and infectious disease control. Importantly, such an effort could help spark higher and more sustainable regional growth. Regional cooperation in telecoms and the internet could strengthen the competitiveness of South Asia in the services-export sector. India has established itself as a global player in ICT and outsourcing. Other countries in South Asia could potentially benefit from neighborhood and spillover effects. The expansion of services exports would contribute to growth, create jobs, and other sectors would benefit from improved technology and management.
The service-export sector, although less infrastructure intensive than manufacturing, needs different types of infrastructure than the traditional export sectors. For these exports, there would be a need to invest in fiber optic highways, broad band connectivity, and international gateways and uplink facilities. Investments in tertiary education, and in technical and English proficiency would need to be increased. South Asia would need to remove barriers to trade in ICT services, eliminate restrictions on the flow of intraregional FDI, and remove visa restrictions on the flow of people.
In addition, the potential gains from regional trade in energy are substantial. After decades of insignificant cross-country electricity trade and the absence of any trade in natural gas through pipelines, regional political leaders and businessmen have recently evinced a great deal of interest and enthusiasm in cross-border electricity and gas trade, not only within South Asia but also with its neighbors in the west (Central Asia and Iran) and in the east (Myanmar).
There are two regional energy clusters in South Asia. The Eastern market includes India, Bangladesh, Bhutan, Nepal, and Sri Lanka, extending to Myanmar, and the Western market includes Pakistan, Afghanistan and India, extending to Central Asia and Iran. India bridges the two clusters. While all countries would benefit from energy trade, in relative terms the gains would be especially large for Nepal, which could double its GDP if it could trade its hydro-power with India and Bangladesh.
High growth in South Asia cannot be sustained without better management of natural disasters and regional public goods. Benefits of regional cooperation in water and climate change would be immense in South Asia. From the Himalayas, where glacier melt is already changing water flows in ways that remain to be understood, to the coastal floodplains of Bangladesh and Pakistan, South Asian countries need to adapt to climate change. The melting of Himalayan glaciers leading to the disastrous prospect of reduced water availability in the South Asian rivers, the frequency of floods and cyclones, and the evidence of rising sea level have given South Asia a wake up call for collective action for managing climate change to reduce vulnerability and poverty over the longer-term. This can provide the much-needed trigger for opening a dialogue on regional water cooperation. Cross-border cooperation on water between among India, Bangladesh, and Nepal offers the only long-term solution to flood mitigation, and would benefit over 400 million people.
The benefits of cooperation are clear. For example, watershed management and storage on Ganges tributaries in Nepal could generate hydropower and irrigation benefits in Nepal and flood mitigation benefits in Nepal, India (Uttar Pradesh, Bihar) and Bangladesh; water storage in northeast India could provide hydropower and flood benefits in India and Bangladesh; and both would also provide increased and reliable dry season flows. There is an emerging and promising opportunity on the specific cooperation between India, Nepal, and Bangladesh on the Ganges. South Asia needs to strengthen regional governance institutions. This is vital for managing the provision of regional public goods, and management of common pool resources.
Regional cooperation initiatives could unlock the growth benefit of South Asia’s geography and people, consistent with improved management of regional public goods. Better regional cooperation can also contribute to reducing regional conflicts, which will remove an important long-term constraint to growth.
What other areas of cooperation do you think will be beneficial to South Asia's growth? What is holding this back?
|
<urn:uuid:40b13f65-5d59-403c-b25a-4bfe9b6e54be>
|
CC-MAIN-2017-34
|
http://blogs.worldbank.org/endpovertyinsouthasia/what-are-key-areas-regional-cooperation-south-asia?cid=EXT_WBBlogSocialShare_D_EXT
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886104634.14/warc/CC-MAIN-20170818102246-20170818122246-00023.warc.gz
|
en
| 0.949386 | 1,016 | 2.796875 | 3 |
People are commonly exposed to unknown and untested chemicals from food packaging, according to a new article by the Food Packaging Forum, co-authored by a researcher at Brunel University London.
Publishing in the journal Environmental Health Perspectives, Dr Olwenn Martin and colleagues explain how food packaging and other materials contacting food and beverages (e.g. foils, cans, pans, storage containers) continuously release mixtures of food contact substances into food at low levels.
These are then ingested daily by consumers. For many of these food contact substances, the effects on human health are essentially unknown.
The authors point out that “compliance with both European and US regulations requires exposure and toxicity data that cannot be generated for many food contact substances”.
They question whether current laws and risk assessment practices are sufficient for protecting consumers’ health.
Exposures to hazardous chemicals from food packaging can be minimised
The authors make nine suggestions for overcoming knowledge gaps and problems in the risk assessment of food contact substances, for example by avoiding known hazardous compounds in the manufacture of food contact materials (FCMs).
Further, any substance authorised for FCMs needs to be controllable, implying that data on its use are reported, and that levels of migration can be measured by chemical analysis.
Importantly, all food contact substances should be assessed for their toxicity, according to current scientific understanding. Toxicity testing needs to be mandatory for all food contact substances, to exclude carcinogenic or endocrine disrupting compounds and mixtures making their way from food packaging into our food.
Scientific challenges in the risk assessment of food contact materials by Jane Muncke, Thomas Backhaus, Birgit Geueke, Maricel V. Maffini, Olwenn Viviane Martin (Department of Life Sciences, Brunel University London), John Peterson Myers, Ana M. Soto, Leonardo Trasande, Xenia Trier, and Martin Scheringer was published in Environmental Health Perspectives on Monday 11 September 2017.
Sarah Cox, Media Relations
|
<urn:uuid:03439976-4a5f-47f0-88d0-5067afd780b5>
|
CC-MAIN-2023-23
|
https://www.brunel.ac.uk/news-and-events/news/articles/Food-packaging-regulations-are-insufficient-for-protecting-public-health
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648465.70/warc/CC-MAIN-20230602072202-20230602102202-00350.warc.gz
|
en
| 0.910047 | 434 | 2.765625 | 3 |
We use data from the National Longitudinal Study of Adolescent Health (Add Health) to examine the effects of classmate characteristics on economic and social outcomes of students. The unique structure of the Add Health allows us to estimate these effects using comparisons across cohorts within schools, and to examine a wider range of outcomes than other studies that have used this identification strategy. This strategy yields variation in cohort composition that is uncorrelated with student observables suggesting that our estimates are not biased by the selection of students into schools or grades based on classmate characteristics. We find that increases in the percent of classmates whose mother is college educated has significant, desirable effects on educational attainment and substance use. We do not find much evidence that the percent of classmates who are black or Hispanic has significant effects on individual outcomes, on average. Additional analyses suggest, however, that an increase in the percent black or Hispanic may increase dropout rates among black students and post-high school idleness among males.
Bifulco, Robert; Fletcher, Jason; and Ross, Stephen L., "The Effect of Classmate Characteristics on Individual Outcomes: Evidence from the Add Health" (2008). Economics Working Papers. Paper 200821.
|
<urn:uuid:f78241c2-ee79-454c-8eb7-b834d3bc1719>
|
CC-MAIN-2013-20
|
http://digitalcommons.uconn.edu/econ_wpapers/200821/
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368708835190/warc/CC-MAIN-20130516125355-00070-ip-10-60-113-184.ec2.internal.warc.gz
|
en
| 0.920559 | 239 | 2.625 | 3 |
Introduction: typically spiny with densely granulate or tuberculate
Cephalon: opisthoparian sutures; glabella broad, large, extending
to anterior border, lobation simple (Odontopleuroidea) to complex, with
fused lateral and glabellar lobes (Lichoidea); eyes typically present,
holochroal, usually not large; conterminant hypostome.
Thorax: variable, 8-13 segments, usually spine-tipped, sometimes
with distinctive spines (e.g., Odontopleuroidea).
Pygidium: typically isopygous to macropygous, but sometimes
short (e.g., Odontopleuroidea), often longer than wide, often with
3 pairs of furrowed pleurae, typically ending in spinose tips.
Occurrence: Ordovician (Tremadoc) to Devonian (Frasnian)
Superfamilies: Lichoidea, Odontopleuroidea, Dameselloidea
|
<urn:uuid:ff4861c9-a52e-43ed-8dc0-997c337c247d>
|
CC-MAIN-2014-35
|
http://www.trilobites.info/lichidaguide.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500814701.13/warc/CC-MAIN-20140820021334-00357-ip-10-180-136-8.ec2.internal.warc.gz
|
en
| 0.694285 | 227 | 3.171875 | 3 |
friedrich wilhelm august argelander
German astronomer who established the study of variable stars as an independent branch of astronomy and is renowned for his great catalog listing the positions and magnitudes of 324,188 stars. He studied at the University of Konigsberg, Prussia, where he was a pupil and later the successor of Friedrich Wilhelm Bessel. Argelander was appointed director of the Abo (Turku) Observatory in Finland in 1823 and of the Helsinki Observatory in 1832. In 1837 he published the first major investigation of the Sun's motion through space and in the same year was appointed director of the new observatory in Bonn. In 1844 he began studies of variable stars.
Learn more about Argelander, Friedrich Wilhelm August with a free trial on Britannica.com.
|
<urn:uuid:c51e6f12-b4d9-4c47-aec2-0cee67b84276>
|
CC-MAIN-2014-10
|
http://dictionary.reference.com/browse/friedrich+wilhelm+august+argelander?qsrc=2446
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394010925635/warc/CC-MAIN-20140305091525-00099-ip-10-183-142-35.ec2.internal.warc.gz
|
en
| 0.948314 | 165 | 3.234375 | 3 |
Career Revolution Leader Colonel Gaddafi talked to western media after his security forces killed hundreds of civil protesters in Libya with guns, artilleries, missiles and air bombing. The old colonel exclaimed he was following the great example of great communist leaders in China, who's tanks rolled over students protesting in Tian'anmen Square in 1989. Gaddafi was so excited, that he mentioned the Tian'anmen twice during the interview. He argued the Tian'anmen massacre united China, and determined to follow the suit if necessary. The Tian'anmen reference did not seem to be convincing enough, that the UN's security council passed a resolution to send officials who slaughter its own citizens to criminal investigation by the international court.
Well, actually, the Chinese government had always looking west for legal shield.
In the history of the United States, more than one time had the government used military forces against its own citizen.
1921, in response to coal mine workers' demand for union, President Harding sent in Army General Billy Mitchell, the father of the USAF. Miners were crushed by a combination of mine operator's private army and the US federal military forces. The would be recorded in the history when the federal air force planes were used against US citizens.
Years into the Greet Depression in 1932, World War I veterans, unemployed and hungry, petitioned in Washington, D.C. along their wifes and children for a principle payment of their bonus due in 1945. President Hoover sent active duty army in response. Commanded by General Douglas MacArthur and Major General George Pattern, the 12th Infantry and the 3rd Cavalry rolled over the protesters with support of six battle tanks.
And there was the Kent State University's shootings in 1970 at students protesting the unpopular war on campus. Four students killed by US National Guard.
From Air Force, Tanks, to Assault Rifles, the US went a long way of using more benign weapons upon its own citizens in a duration of 50 years. No wonder, regimes around the world had plenty to cite in covering their own brutalities against citizens.
|
<urn:uuid:abc56b51-d6a3-4a67-adc2-42cc64c50dad>
|
CC-MAIN-2017-47
|
http://seagullreference.blogspot.com/2011/03/from-tiananmen-square-to-green-square.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806316.80/warc/CC-MAIN-20171121040104-20171121060104-00267.warc.gz
|
en
| 0.968697 | 423 | 2.734375 | 3 |
Epilepsy is a group of brain disorders that cause seizures. Important things to know:
- Epilepsy can affect anyone at any age, but most people are diagnosed before age 2 or after age 65.
- Early diagnosis and treatment can control seizures and prevent potentially life-threatening complications.
- Medications can stop seizures in about 70% of patients.
What is epilepsy?
Epilepsy is a complex group of neurologic (brain and nervous system) disorders. Surges of electrical activity in the brain cause repeated seizures. These bursts of uncontrolled, unusual brain cell activity can affect your:
Epilepsy and seizures can vary from mild to severe. Episodes can range from blank stares lasting a few seconds to unconsciousness and convulsions lasting several minutes.
A person is diagnosed with epilepsy after at least two seizures that have no other identifiable cause. Someone can also be diagnosed after one seizure if factors show a high likelihood of repeat seizures.
Who gets epilepsy?
Epilepsy can affect anyone. About 3 million adults and 470,000 children in the U.S. were living with epilepsy in 2015, according to the Centers for Disease Control and Prevention. That’s roughly one in 100 people.
Key facts about epilepsy include:
- Frequency: Epilepsy is the fourth most common neurologic condition in the U.S., after migraine, stroke and Alzheimer’s disease.
- Onset: The disorder is most often diagnosed before age 20. It’s most common in children under age 2 and adults over age 65.
- Gender: Men are slightly more likely than women to develop epilepsy.
- Race and ethnicity: Epilepsy affects people of all races and ethnicities around the world. Some groups have a slightly higher or lower risk, but the differences are small.
- Heredity: Genetic defects related to epilepsy can be passed down in families. Certain types of epilepsy are more likely to have a genetic cause. Experts are still researching possible genetic causes. Learn about genetic testing at OHSU.
If you have a seizure, especially more than one, it’s important to see your doctor. Early diagnosis is the key to controlling seizures. Seizures can cause potentially life-threatening complications, such as:
- Risk of drowning
- Car accidents
- Problems during pregnancy
- Emotional disorders such as anxiety and depression
- Status epilepticus — a long seizure (five minutes or more) or a series of seizures without regaining consciousness
- Sudden unexpected death in epilepsy (SUDEP)
Learn how we diagnose epilepsy at the OHSU Comprehensive Epilepsy Center.
Symptoms of epilepsy
Symptoms vary based on the type of seizure and the part of the brain affected. Because these symptoms overlap with other conditions, it’s important to see your doctor to find the cause.
Common signs and symptoms include:
- Unusual eye movement, such as staring, repetitive blinking, or looking up or to the side
- Sudden, temporary confusion
- Loss of consciousness or alertness
- Uncontrollable movements, such as jerking or twitching
- Rigid muscles
- Difficulty talking
Before a seizure, some people with epilepsy experience warning signs, known as auras. An aura is a change in behavior, feeling, sensation or thought that can be similar with each seizure.
What causes epilepsy?
Not everyone with risk factors will develop epilepsy, and people can develop epilepsy without any risk factors. In addition, doctors can’t identify the cause in about half of cases.
When the cause is known, the most common factors are:
- Brain infections such as meningitis or viral encephalitis
- Head trauma, such as a concussion or more traumatic brain injury
- Stroke or blocked blood supply to part of the brain
- A brain tumor
Other causes and risk factors include:
- Neurologic disorders such as autism; or Alzheimer’s disease or another type of dementia
- Injury to an unborn baby, such as brain damage from lack of oxygen, poor nutrition, or an injury or infection affecting the mother
- An inherited genetic defect
- Seizures in childhood, especially long-lasting ones
Find out more about OHSU genetic testing and counseling for neurologic disorders at our Neuro Genetics Clinic.
Not everyone with epilepsy has triggers — things that can set off a seizure. For those who do, triggers can include:
- Sleep deprivation
- Alcohol or drug use
- Video games, flashing lights, or bold, contrasting patterns
- Missed medications
- Menstruation or other hormonal changes
- Illnesses or fevers
Types of epilepsy
Epilepsy includes several syndromes identified by type of seizure and symptoms. Common epilepsy syndromes include:
Some epilepsy syndromes involve focal seizures, which affect only part of the brain:
- Benign rolandic epilepsy: Thought to be inherited, this syndrome makes up about 15% of epilepsy cases in children. Seizures typically stop by age 15. Seizures can last up to two minutes, and children remain conscious.
- Panayiotopoulos syndrome: This childhood epilepsy starts between ages 3 and 10. Seizures can last 20 to 60 minutes and often occur during sleep. Seizures stop after about three years.
- Rasmussen’s syndrome: The immune system attacks brain cells and causes inflammation that can lead to brain damage. People often need surgery because medications can’t control the seizures well.
- Doose syndrome: Also known as myoclonic astatic epilepsy, this type starts in early childhood. Medications might not manage it effectively, but dietary therapy can work well.
- Juvenile absence epilepsy: JAE usually begins between ages 10 and 17. It is a lifelong condition requiring medication. JAE can cause attention, concentration and memory issues. Treatment can improve symptoms.
- Juvenile myoclonic epilepsy: JME is the most common generalized epilepsy syndrome that starts in mid- to late childhood, from ages 5 to 16. Medications usually control this inherited syndrome well.
- Infantile spasms, also known as epileptic spasms or West syndrome: This syndrome begins in infants 4 to 6 months old. It requires early treatment to avoid issues with learning, thinking, behavior and development.
- Lennox-Gastaut syndrome: This syndrome usually starts in childhood and lasts into adulthood. It is difficult to manage with medications and can result in problems with thinking and behavior.
- Frontal lobe epilepsy: This syndrome may be inherited, and its seizures can usually be controlled with medications. It can affect various body parts, depending on where in the frontal lobe the seizures start.
- Temporal lobe epilepsy: This type is the most common syndrome related to focal (partial) seizures. Because the temporal lobe controls many vital functions, seizures in this part of the brain can dramatically affect quality of life.
Types of seizures
The world’s main scientific organization dedicated to epilepsy, the International League Against Epilepsy, issued a 2017 revised classification of seizures. The classification defines seizures in three main categories.
The first category describes seizure onset, or how seizures start in the brain. Seizure onset indicates possible causes, and it guides treatment decisions.
- Focal seizures start on one side or part of the brain.
- Generalized seizures involve both sides of the brain.
- Unknown onset for seizures of unknown origin. Doctors can adjust the type if they find the onset area later.
- Focal to bilateral seizures begin on one side or part of the brain before spreading to both sides.
This category describes the person’s level of awareness during a seizure. Gauging awareness is important to keeping the person safe and determining the type of seizure.
- Focal aware seizures: The person is awake and aware, even if they are unable to speak.
- Focal impaired awareness: The person is not completely aware, even if they are conscious.
- Unknown awareness: No one else was around to determine whether the person was aware.
- Generalized seizures: The person’s awareness or consciousness is always affected.
This category describes whether seizures begin with movement. Movement during seizures helps doctors determine the type. Seizures with onsets that are focal, generalized or unknown can all have motor or non-motor symptoms.
Motor symptoms include:
- Rhythmic jerking movements
- Weakened or limp muscles
- Tense or rigid muscles
- Muscle twitching or spasms
- Repetitive movements, such as hand clapping or rubbing, lip smacking, chewing or running
Non-motor symptoms include:
- Brief twitches in the eyelids or another area of the body
- Changes in sensation, emotions or thinking
- Autonomic functions, such as gastrointestinal sensations, feelings of heat or cold, goose bumps or rapid heartbeat
- Lack of movement, known as behavior arrest
Other categories of seizure symptoms include:
- Absence: Previously known as a petit mal seizure, this generalized-onset seizure results in a short staring “spell” that may include minor eye movements. Absence seizures usually last less than 10 seconds. The person has impaired awareness during the seizure.
- Atonic: The muscles suddenly go limp, and the person’s head or body may go limp or fall. Atonic seizures can be generalized or focal onset. They have motor symptoms and involve impaired awareness.
- Atypical absence: These generalized-onset seizures differ from typical absence seizures because they involve slight facial or hand movements and can last 20 seconds or longer.
- Behavior arrest: In this focal, non-motor seizure type, the person freezes and has impaired awareness.
- Clonic: Clonic seizures have motor symptoms such as repetitive jerking movements. They can be either focal or generalized onset and can last from a few seconds up to two minutes.
- Epileptic spasms: Also known as infantile spasms or West syndrome, this type can be focal or generalized onset, and involves motor symptoms.
- Myoclonic: These seizures can be either focal or generalized onset. They involve rapid, short periods of muscle jerking or twitching. They may come with impaired awareness.
- Tonic: The person experiences sudden muscle stiffness and is usually aware. Tonic seizures can be either focal or generalized onset and usually last less than 20 seconds.
- Tonic-clonic: Previously known as a grand mal seizure, this motor seizure usually begins as a generalized-onset seizure, but it can also start as a focal to bilateral seizure. The person loses consciousness, and all the muscles stiffen before jerking movements begin.
Parking is free for patients and their visitors.
Center for Health & Healing Building 1, eighth floor
3303 S.E. Bond Ave.
Portland, OR 97239
Map and directions
Refer a patient
- Refer your patient to OHSU.
- Call 503-494-4567 to seek provider-to-provider advice.
|
<urn:uuid:8cfd9381-4620-4201-9c8b-c457d034c3ca>
|
CC-MAIN-2020-16
|
https://www.ohsu.edu/brain-institute/understanding-epilepsy
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370528224.61/warc/CC-MAIN-20200405022138-20200405052138-00446.warc.gz
|
en
| 0.900744 | 2,294 | 3.90625 | 4 |
Contaminated Water In Northern US Cities Is A Growing Concern
Clean drinking water should be the right of every person on earth. In the US, democracy has removed many of the barriers to equality, but there is still more work to be done. The recent case of contaminated drinking water in Newark is a timely reminder of how widespread the threat of contaminated water in america really is.
While a great deal of media attention has been focused on the water crisis impacting the western seaboard, industrial capitals and rural communities to the north and east are quietly facing a similar challenge of their own. Shaped by economics, race, and politics, the push for clean drinking municipal water seems to have taken a step back since 2014 and the Flint Michigan crisis.
As the citizens of Flint Michigan prepare to move forward with legal proceedings against city and state officials, yet another alarming report has emerged regarding contaminated municipal drinking water
In August 2019, it was revealed that Newark, NJ residents are being exposed to dangerous levels of lead contamination through their tap water. Newark’s predominantly black and Hispanic population, also happens to be the most populous city in New Jersey, home to Newark Liberty Airport and the NJPAC (New Jersey Performing Arts Center).
With so many people, so much traffic and commerce passing through this important New Jersey city, contaminated water can quickly become a widespread health risk. Failing infrastructure, corroded piping has leached high levels of lead into the water.
Sadly, existing filters have been ineffective at removing the lead, compelling EPA authorities to issue the warning. Signs of contamination have appeared, however, as early as 2017.
Combatting Lead Contamination In New Jersey
Thanks to efforts by current Mayor Ras J Baraka, a lead service replacement program has been launched to provide bottled water to homes affected by the crisis.
The EPA has partnered with the city to spearhead further environmental efforts. In particular, a Clean Truck Initiative hopes to reduce carbon emissions, improve air quality in a city dominated by the trucking industry .
As Mayor Baraka explained in an interview for Newark News:
“On any given day as many as 300 trucks drive through Newark’s Ironbound neighborhood alone. Far too many of the vehicles are older, dirty trucks driving through fence-line communities…By replacing them with clean-burning, newer models, the Port and its tenants will decrease particulate matter in the air while increasing worker health and modernizing their fleets”
But is it too little too late?
High levels of PFAS (polyfluoroalkyl substances) in 31 states, exceeding the recommended thresholds approved by the EPA, have recently been discovered by the EWG . Some of the most endangered cities on the list are major metropolitan centers that should have been prepared and equipped to prevent water contamination.
Boston, Pittsburgh, New York City, Cincinnati and Pennsylvania are included in a list of 43 cities confirmed by the EWG for PFAS toxic contamination. The tests, conducted by the EWG, also discovered that 34 of the cities that tested positive have not publicly reported these findings to the EPA. Why? PFAS levels are unregulated, so utilities may conduct independent testing but are not required by law to report the results to state authorities or the EPA.
Current EPA regulation only addresses 2 of the 4700 variants of PFAS, PFOA’s and PFOS’s. In fact, you can find water filtration systems with specially designed filters for removing PFOA’s and PFO’s from your tap water. This latest report, however, exposes the widespread nature of PFAS contamination and the need for broader regulatory reforms.
Water officials and environmental experts have been aware of the existence of PFAS contamination in lakes, rivers and groundwater. They can also be found in a wide array of consumer items, from clothing, food, and carpeting.
EWG’s testing of 37 rainwater samples, however, paints a troubling picture . The samples, collected primarily along the east coast from, contained a range of 36 different chemical compounds harmful to humans . PFAC concentration levels, in some cases, exceeded the proposed 2 ng/l.
The Environmental Protection Agency has established 70 ng/l as an acceptable level of risk, but critics (including officials in Wisconsin) agree that 2 ng/l is a more appropriate threshold for triggering preventative measures. Officials in North Carolina have begun taking steps to reduce high concentrations of the PFAS GenX, yet another variant of this harmful, ubiquitous compound .
Rain Water Contamination In The US Is More Common Than You Think
Dark Water, a 2019 film follows the efforts of a tenacious lawyer to uncover the source of a mysterious string of deaths in Wisconsin connected to one of the world’s most powerful corporations . Like Erin Brokavitch, the film is based on real events, exposing the brazen corruption that threatens the health of our most essential resources: air and water.
The film isn’t a rallying cry or self-congratulatory expose, but a stark and honest look at the political, economic and social forces shaping the discussion around environmental waste and corporate accountability. One of the major problems is the lack of scientific information. Experts are still unclear precisely as to how dangerous chemicals are entering our water supply, and even less clear about how to prevent them.
Flint, Michigan, and Newark, NJ are just two examples of how ignorance, incompetence and greed have needlessly exposed Americans to contaminated water. Corporations cannot be relied on to conduct impartial testing, and they are not always required to publish the results of their tests. New technologies, however, offer new methods of testing, making it possible for more independent studies to fill in the gaps.
A New Threat To Drinking Water
Contaminated rainwater poses a health risk and severely threatens public water systems across the country and beyond. As far as the Arctic and Alaskan native populations, PFAS have been discovered. Little is known about how PFAS are absorbed in rainwater, but the number of US citizens that have already been exposed has been grossly underestimated.
Experts,like Martin Shafer of the National Atmospheric Deposition Program (NADP), are concerned that “PFAS chemicals are entering rainwater through a variety of avenues, like direct industrial emissions and evaporation from PFAS-laden fire-fighting foams ”.
Is Rain Water Safe?
As the world prepares to face a potential water crisis, many countries are turning to rain water harvesting as one possible solution.
Rain water has been a source of water for thousands of years because it is so widespread and readily available. It’s been said that, when rainwater is purified, it can actually be safer than tap water.
With that said, it’s very important that you understand how to purify rainwater as untreated rain water carries considerable health risks.
Collecting runoff from your rooftop in glass jars or containers could easily expose you to harmful bacteria, chemicals and compounds.
Other potential sources of particulate and soluble contaminants found in rain water include:
- Animal fecal matter
- Atmospheric pollution
- Corroding/eroding roofing materials
- Algae, mold
- Pesticide/herbicide spray carry-over
- PAH’s (olycyclic aromatic hydrocarbons)
|
<urn:uuid:6bd9d3f0-7878-425f-8a40-ddcca2bafaed>
|
CC-MAIN-2020-29
|
https://iwaterpurification.com/contaminated-water-in-northern-us-cities-is-a-growing-concern/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655886865.30/warc/CC-MAIN-20200705023910-20200705053910-00157.warc.gz
|
en
| 0.948501 | 1,504 | 2.9375 | 3 |
BREEDING FOR BETTER WELFARE IN BROILER CHICKENS
Recognizing that breeding for high welfare now needs to be incorporated into chicken breeding programmes alongside commercially valuable production traits, the Tubney Charitable Trust and the Farm Animal Welfare Trust (FAWT) have been funding a major project at FAI (Food Animal Initiative) at Wytham, nr Oxford over the past 3 years. FACT is now helping to take this important project to its next stage of trials with commercial farmers.
The project is now into its 4th generation of broilers and already there are birds that have impressive production traits, can walk well, range outside and are very healthy. What is even more exciting is that progress has been made on the welfare of the parent birds, known as ‘breeders’. In commercial production, breeders are usually fed very restricted rations to prevent them from becoming overweight, obese and infertile, sometimes only 25-40% of the food they would eat if they could. In the current 3rd generation of breeders at FAI, there are some birds that seem to ‘cope’ with much lower feed restriction. Despite growing large, they are healthy, fertile and walk well. The very existence of these birds suggests that the project’s aim of breeder birds that have commercially valuable offspring but do not need feed restriction themselves is several steps nearer.
|
<urn:uuid:6413177f-285b-44c5-8cf8-5b759ea7ebee>
|
CC-MAIN-2013-20
|
http://www.fact.uk.com/styled-2/index.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705300740/warc/CC-MAIN-20130516115500-00050-ip-10-60-113-184.ec2.internal.warc.gz
|
en
| 0.968942 | 290 | 2.515625 | 3 |
The powerful and abundant solar energy source comes from nuclear fusion in the sun’s center. This relatively stable nuclear fusion provides long-term and reliable energy for many years. As the sun produces about 386 billion megawatts of energy every second, it is no surprise that the primary source of solar energy is the sun itself! As this form of renewable energy is free and plentiful, its widespread adoption has a great potential to significantly reduce electricity production costs and maintain positive impacts on our environment.
How does the solar system work?
The solar system is an incredible example of nature’s power and the marvels it can create given enough time. It does not just provide power to billions of homes across the globe – it is an incredible source of renewable energy and inspiration. To get on board with harnessing this natural strength, Go Solar with the #1 Solar Panel Company and make a contribution to a brighter future for your community and planet. Working together, people can use the sun’s rays to generate electricity from photovoltaic (PV) panels, or use energy from mirrors or lenses to concentrate a large area of sunlight into a small beam which can then be used as thermal energy for heat and electricity generation.
What are the advantages of solar energy?
Solar energy provides us with a renewable energy source, providing an environmentally friendly alternative to conventional sources of electricity. Solar energy is an incredibly versatile energy, suitable for residential and commercial applications. In addition to generating clean energy from the sun’s rays, solar panels can also help reduce your electricity costs in the long term. For example, by harnessing sunlight to provide power for your home or business, you save money on heating, cooling, and lighting your premises which would otherwise need to be supplied by an electricity provider. Solar energy is also more reliable than many other forms of alternative energy, as it is not affected by weather conditions or power cuts. Finally, solar panel installations require minimal maintenance over their lifetime and produce zero carbon emissions – making them an attractive option for individuals and organizations looking to reduce their environmental footprint and dependence on fossil fuels.
How can we protect solar energy?
Proactive steps must be taken to decrease its cost and make it more accessible to the general public to protect solar energy. Governments should offer tax incentives for solar installations and businesses that produce solar-powered goods. Furthermore, more research into new methods of collecting and using solar power must be conducted on a governmental level to improve efficiency. Lastly, regulations should ensure that companies dispose of renewable energy products responsibly, as they can have negative environmental effects if disposed of improperly. By taking these steps, we can work together to ensure that solar energy is safe and secure for future generations.
Is solar energy related to heat?
Solar energy is a type of renewable energy that comes from the sun. It can be harnessed in various ways, such as through solar panels and thermal collectors. However, it may not seem like it initially, but solar energy is related to heat. For instance, when sunlight shines on a photovoltaic panel or any other thermal collector, it is converted into electricity or produces hot water. In addition, the hotter the environment, the more efficient solar panels become. The heat generated by the sun’s radiation can also help warmer air rise faster, making way for wind power as another renewable energy source that relates to heat. Solar energy is closely related to heat and can be used in various ways to produce electricity or provide hot water for household use.
|
<urn:uuid:b4dd72ab-20c9-49b4-82c8-502162324ffc>
|
CC-MAIN-2023-50
|
https://marketbusinessnews.com/renewable-energy-exploring-the-benefits-and-advantages-of-solar-power/328294/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100769.54/warc/CC-MAIN-20231208180539-20231208210539-00752.warc.gz
|
en
| 0.936115 | 708 | 3.578125 | 4 |
I have a piece in the July issue of Prospect on DNA nanotechnology. This is the pre-edited version.
“It has not escaped our notice that the specific pairing we have postulated immediately suggests a possible copying mechanism for the genetic material”. The arch remark that concluded James Watson and Francis Crick’s paper in Nature on the structure of DNA, published 60 years ago, anticipated the entire basis of modern genetics. The structure they postulated is both iconic and beautiful: two strands of conjoined molecular building bocks, entwined in a double helix. The twin strands are zipped together by chemical bonds that rely on a perfect, ‘complementary’ match between their sequences of building blocks, and these sequences encode genetic information that is passed on when the molecule is replicated.
Yet although Watson and Crick were undoubtedly right to depict DNA as a kind of replicating molecular data base, the beautiful elegance of their vision of genetics – and in a sense, of the whole of biology and evolution – as the read-out of a set of digital instructions on DNA, basically using chemistry for computation, is now looking too simplistic, even misleading. It is no longer clear that DNA is the ultimate focus of all molecular processes controlling the development and evolution of organisms: it is an essential but incomplete database, more an aide-memoire than a blueprint. Watson and Crick’s picture of a molecule that can be programmed to zip up only with the right partner is finding expression in its purest and most satisfying form not in biology – which is always messier than we imagine – but in the field of nanotechnology, which is concerned with engineering matter at the scale of nanometres (millionths of a millimetre) – the dimensions of molecules.
A key motivation for nanotechnology is the miniaturization of transistors and other devices in microelectronic circuitry: they are now so small that conventional methods of carving and shaping materials are stretched to the limits of their finesse. To replace such ‘top-down’ fabrication with ‘bottom-up’, nanotechnologists need to be able to control exactly how atoms and molecules stick together, and perhaps to dictate their movements.
DNA might be the answer. Chemists have now created molecular machines from bespoke pieces of DNA that can move and walk along surfaces. They have made molecular-sized cubes and meshes, and have figured out how to persuade DNA strands to fold up into almost any shape imaginable, including Chinese characters and maps of the world smaller than a single virus. They are devising DNA computers that solve problems mechanically, not unlike an abacus, by the patching together of little ‘sticky’ tiles. They are using DNA tagging to hitch other molecules and tiny particles into unions that would otherwise be extremely difficult to arrange, enabling the chemical synthesis of new materials and devices. In short, they are finding DNA to be the ideal nanotechnological construction material, limitlessly malleable and capable of being programmed to assemble itself into structures with a precision and complexity otherwise unattainable.
Although this research places DNA in roles quite unlike those it occupies in living cells, it all comes from direct application of Watson and Crick’s insight. A single strand of DNA is composed of four types of molecule, strung together like beads on a thread. Each building block contains a unit called a base which dangles from the backbone. There are four kinds of base, whose chemical names are shortened to the labels A, T, C and G. The bases can stick to one another, but in the double helix they tolerate only one kind of partner: A pairs with T, and C with G. This means that the sequence of bases on one strand exactly complements that on the other, and the pairs of bases provide the zip that holds the strands together.
So a DNA strand will only pair up securely with another if their base sequences are complementary. If there are mismatches of bases along the double helix, the resulting bulges or distortions make the double strand prone to falling apart. This pickiness about base-pairing means that a DNA strand can find the right partner from a mixture containing many different sequences.
Chemical methods for making artificial DNA, first developed in the 1970s, have now reached the point at which strands containing millions of A, T, G and C bases can be assembled in any sequence you want. These techniques, developed for genetic engineering and biotechnology, are now used by nanotechnologists to create DNA strands designed to assemble themselves into exotic shapes.
The potential of the approach was demonstrated in the early 1990s by chemist Nadrian Seeman of New York University and his collaborators. They created DNA strands designed such that, when they are mixed together, they twist around one another not in a single helical coil but to make the struts of tiny, cube-shaped cages. No one had any particular use for a DNA cube; Seeman was demonstrating a proof of principle, showing that a molecular shape that would be extremely hard to fashion using conventional chemistry could be engineered by figuring out how to program the components to lace themselves together spontaneously.
Although regarded for some years as little more than a clever curiosity, Seeman’s work was visionary. It showed a way to tackle nanotechnology’s challenge of building very small objects from the bottom up, starting with individual atoms and molecules. If DNA is the construction fabric, the base sequence can provide the assembly instructions: unlike most molecules, DNA will do what it is told.
DNA origami could, for instance, provide scaffolding on which electronic components are arranged. One might tag the components with strands that pair up with a particular location on a DNA scaffold with the complementary sequence: in effect, an instruction saying “stick here”. Researchers have worked out how to program DNA strands to weave themselves into webs and grids, like a chicken-wire mesh, on which other molecules or objects can be precisely attached. Last February a team at Marshall University in West Virginia showed that giant molecules called carbon nanotubes – nanometre-scale tubes of carbon which conduct electricity and have been proposed as ultrasmall electronic devices – can be arranged in evenly spaced, parallel pairs along a ribbon made by DNA origami. The carbon nanotubes were wrapped with single-stranded DNA, which lashed them onto the ribbon at the designated sites.
The same approach of DNA tagging could be used to assemble complicated polymers (long chains of linked-up molecules) and other complex molecules piece by piece, much as, in living cells, DNA’s cousin RNA uses genetically encoded information to direct the formation of protein molecules, tagging and assembling the amino-acid building blocks in the right order.
The astonishing versatility of DNA origami was revealed in 2006 when Paul Rothemund at the California Institute of Technology in Pasadena unveiled a new scheme for determining the way it folds. His approach was to make single strands programmed to stick to itself in back-and-forth hairpin-like turns that create a two-dimensional shape, pinning the folds in place with ‘staples’ made from short DNA strands with appropriate complementary sequences.
Rothemund developed a computer algorithm that could work out the sequence and stapling needed to define any folding pattern, and showed experimental examples ranging from smiley faces and stars to a map of the world about a hundred nanometres across (a scale of 1:200,000,000,000,000). These complex shapes could take several days to fold up properly, allowing all kinks and mistakes to be ironed out, but researchers in Germany reported last December that each shape has an optimal folding temperature (typically around 50-60 oC) at which folding takes just a few minutes – a speed-up that could be vital for applications.
Last March, Hao Yan of the University of Arizona took the complexity of DNA origami to a new level. He showed how the design principles pioneered by Seeman and Rothemund can be tweaked to make curved shapes in two and three dimensions, such as hollow spheres just tens of nanometres wide. Meanwhile, in 2009 a Danish team saw a way to put DNA cubes to use: they made larger versions than Seeman’s, about 30 nanometres across, with lids that could be opened an closed with a ‘gene key’ – a potential way to store drug molecules until an appropriate genetic signal releases them for action.
As aficionados of Lego and Meccano know, once you have a construction kit the temptation is irresistible to give it moving parts: to add motors. Molecular-scale motors are well-known in biology: they make muscles contract and allow bacteria to swim. These biological motors are made of protein, but researchers have figured out how to produce controlled movement in artificial DNA assemblies too. One approach, championed by Bernie Yurke of Bell Laboratories in New Jersey and Andrew Turberfield at the University of Oxford, is to make a DNA ‘pincer’ that closes when ‘fueled’ with a complementary strand that sticks to the arms and pulls them together. A second ‘fuel strand’ strips away the first and opens the arms wide again. Using similar principles, Turberfield and Seeman have made two-legged ‘DNA walkers’ that stride step by step along DNA tracks, while a ‘DNA robot’ devised by Turberfield and colleagues can negotiate a particular path through a network of such tracks, directed by fuel strands that prompt a right- or left-hand turn at branching points.
They and others are working out how to implement the principles of DNA self-assembly to do computing. For example, pieces of folded-up DNA representing binary 1’s and 0’s can be programmed to stick together like arrays of tiles to encode information, and can be shuffled around to carry out calculations – a sort of mechanical, abacus-like computer at the molecular scale.
Underlying all this work is Watson and Crick’s comment about DNA replication. There is the tantalizing – some might say scary – possibility that DNA structures and machines could be programmed not only to self-assemble but to copy themselves. It’s not outrageous to imagine at least some products of DNA nanotechnology acquiring this life-like ability to reproduce, and perhaps to mutate into better forms. Right now such speculations recede rapidly into science fiction – but then, no one guessed 60 years ago where the secrets of DNA self-assembly would take us today.
|
<urn:uuid:3ce3dd35-ee04-4cd4-96cc-9c526902c19c>
|
CC-MAIN-2017-43
|
http://philipball.blogspot.com/2013/06/gene-machines.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823255.12/warc/CC-MAIN-20171019065335-20171019085335-00883.warc.gz
|
en
| 0.948961 | 2,177 | 3.140625 | 3 |
Broadsides: Caricatures and the Navy 1756-1815
- By James Davey & Richard Johns
Broadsides explores the political and cultural history of the Navy during the later eighteenth and early nineteenth centuries through contemporary caricature. This was a period of intense naval activity - encompassing the Seven Years War, the American War of Independence, the wars against revolutionary and Napoleonic France, and the War of 1812.Naval caricatures were utilized by the press to comment on events, simultaneously reminding the British public of the immediacy of war, whilst satirizing the same Navy it was meant to be supporting.The thematic narrative explores topics from politics to invasion, whilst encompassing detailed analysis of the context and content of individual prints. It explores pivotal figures within the Navy and the feelings and apprehensions of the people back home and their perception of the former. The text, like the caricatures themselves, balances humor with the more serious nature of the content. The emergence of this popular new form of graphic satire culminated in the works of James Gillray and Thomas Rowlandson, both here well represented, but a mass of other contemporary illustration makes this work a hugely important source book for those with any interest in the wars and history of this era.
Author: James Davey & Richard Johns
Title: Broadsides: Caricatures and the Navy 1756-1815
First published by: Seaforth Publishing
Date: 19 July 2012
|
<urn:uuid:1d77c410-a222-47bc-bcee-58e22407ebcd>
|
CC-MAIN-2013-20
|
http://www.historicnavalfiction.com/general/aos-naval-non-fiction/non-fiction/nflist/2720-broadsides-caricatures-and-the-navy-1756-1815
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706470197/warc/CC-MAIN-20130516121430-00064-ip-10-60-113-184.ec2.internal.warc.gz
|
en
| 0.907797 | 296 | 2.625 | 3 |
Steven Johnson Syndrome is a systemic allergic reaction that has high morbidty and can lead to death in severe cases. It is charactarized by the appearance of rash on the skin and the mucous membrane. This syndrome can affect the eye, respiratory and nasal tracts, vagina and the urethra.
Causes: Steven Johnson Syndrome can be idiopathic (no known cause) or as a result of an immunological reaction to immunologic stimuli that can be diseases, drugs or infections, among these stimuli are:
A- Infections and diseases: They may include
- Systemic Lupus Erythematosus (SLE)
- Staphylococcal Scalded Skin Syndrome
- Staphylococcus aurus
- Herpes simplex virus type 2
- mycoplasma pnemumoniae
B- Drugs:They may include
Clinical features of the disease:
Symptoms vary from one patient to another, It may affect the skin, the mucous membrane, it may affect the skin and the mucous membrane and may lead to pealing of the skin. When the disease involves the mucous membrane the mouth and eyes are affected in a severe way. it may lead to visial impairment. Common signs and symptoms include:
- skin lesions which are itchy and painful
- Skin blisters, target shaped skin lesions and/or burn like skin lesions
- Mucous membrane lesions, blisters, swelling and/or ulcers
- Mouth and throat rash and/or blisters
- Gental rash and/or blisters
- Malase, itching, cough and sore throat
- Flue like symptoms, fever and headache
- Conjuctival rash and/or blisters, vision loss
- swollen painful eyes, corneal blisters, holes and/or erosion, loss of visio
Progression of the disease:
Steven Johnson Syndrome vary from mild to severe. In the early stages of disease the patient presented with flue like symptoms including sore throat, joint pain, malaise etc. with the progress of disease, skin lesions start to develop throughout the boday and continue to progress leading to blindness in advanced cases.
This information is not intended nor implied to be a substitute for professional medical advice; it should not be used during any medical emergency or for the diagnosis or treatment of any medical condition. Call 911 for all medical emergencies.
|
<urn:uuid:ed0f433b-438b-43f7-a237-9c960fa02062>
|
CC-MAIN-2017-43
|
https://www.burn-injury-resource-center.com/2012/07/burns-and-steven-johnson-syndr.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824618.72/warc/CC-MAIN-20171021062002-20171021082002-00093.warc.gz
|
en
| 0.876114 | 499 | 2.71875 | 3 |
Coconut butter, which is also commonly referred to as Coconut oil, is a fat that consists of more than 90% saturated fat. As its name implies, this oil is obtained from coconuts and is commonly used for cosmetics, baking ingredients, and cooking oil. The world’s largest exporter of Coconut oil, which is the Philippines, receives 7% of its total export income from this product alone.
Coconut oil is rich in fatty acids and is among the more stable of all vegetable oils. Many consider it to be a healthy product, which may increase metabolism and improve the body’s ability to fight sickness by strengthening the immune system. Once an immune system becomes weakened for any reason, the body becomes susceptible to an array of illnesses. To maintain a healthy lifestyle, one’s immune system must remain strong. If it ever becomes weakened, it is essential to rebuild the immune system to protect the body against harmful sickness and/or disease. On the downside, because coconut oil is also high in saturated fat, some believe that it may increase the likelihood of cardiovascular and/or heart disease and possibly even diabetes. On the other hand, some international populations who consume large quantities of coconut oil have been shown to have lower rates of heart disease.
In addition to concerns surrounding the health benefits, both good and bad, Coconut oil has been tested as a fuel but has been faced with difficult obstacles due to its high melting point. Coconut oil is also used for hairstyling in India, while other individuals find it to be useful as a skin moisturizer. Coconut oil is believed to be both effective and safe when used in connection with skin care. And best of all, it is not believed to carry any adverse reactions to the skin. In fact, some users have actually reported improvements in specific skin conditions after using Coconut oil. Among them, is eczema, which is a very uncomfortable rash that develops in the form of small blister-like lesions. These are both painful and may result in scarring.
The information in this article is intended for informational purposes only. It should not be considered as or used in place of, medical advice or professional recommendations for any type of treatment, cure, or remedy to certain skin conditions and/or other illnesses. Before beginning any treatment regimen, including that which consists of coconut oil, individuals are urged to consult with their physician and/or dermatologist for proper diagnosis and/or treatment recommendation.
|
<urn:uuid:a0be8176-5e06-4997-95c8-75854e89bd71>
|
CC-MAIN-2023-23
|
https://samuifood.com/a-look-at-coconut-oil/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653608.76/warc/CC-MAIN-20230607042751-20230607072751-00360.warc.gz
|
en
| 0.969219 | 511 | 2.609375 | 3 |
June 30, 2001
The beginning and the end of the story of Jephtah are tragic. Born into awkward circumstances, he was cruelly forced to leave his family and community and to live the life of a brigand in the wilderness. These events shaped Jephtah’s character and hardened him into a fierce warrior and a shrewd strategist. He was the appropriate leader to save the Israelites from the hands of the Ammonite army. Yet the same qualities which brought him to his position of leadership ultimately led to his downfall.
Before going to battle with the Ammonites, Jephtah made the following vow to God: “If You surely deliver the children of Ammon into my hand, then it shall be that whatever comes out of the doors of my house to meet me when I return in peace from the children of Ammon shall be the Lord’s and I shall offer it up as a burnt offering.” (Judges 11:30-31)
This reckless vow had tragic consequences when Jephtah’s only daughter was the first to greet him upon his return from battle. The following midrash attempts to recount the events leading up to the tragic ending found in the Haftarah and to explain why Jephtah did not annul this terrible vow.
Shouldn’t Jephtah have gone to Pinchas the High Priest to annul his vow and save his daughter from the terrible fate that he had brought upon her? What happened? Jephtah said to himself: “I am the chief and leader of the Israelites so why should I go to Pinchas.” Pinchas said to himself: “I am the High Priest, the son of the High Priest, so why should I go to that boor.” Because of the arrogance of these two leaders, the poor girl perished. Both of them bear the responsibility for her loss… In time each of them was punished. (Adapted from Koheleth Rabbah 10,15)
Jephtah’s vow was a serious mistake but the arrogance that kept him from correcting it was a much more serious transgression. This shrewd negotiator and talented soldier was incapable of lowering himself to seek the assistance of another person lest his honor be diminished. His overbidding sense of self importance led to the death of his daughter and was ultimately self destructive as well.
This study piece is offered as a service of the United Synagogue Conservative Yeshiva. It is prepared by Rabbi Mordechai (Mitchell) Silverstein, senior lecturer in Talmud and Midrash at the Conservative Yeshiva. He is a graduate of the Jewish Theological Seminary of America. The United Synagogue Conservative Yeshiva in Jerusalem offers students of all backgrounds the skills for studying Jewish texts. We are a vibrant, open-minded egalitarian community of committed Jews who learn, practise and grow together. Our goal is to provide students the ability and desire to continue Jewish learning and practice throughout their lives. Rashei Yeshiva: Rabbi Joel Levy & Dr. Joshua Kulp. Rabbi Joel Roth, Rosh Yeshiva Emeritus . Sponsors – The Conservative Yeshiva would like to thank the following for their generous support of the Haftarah Commentary:
|
<urn:uuid:9f2e4729-3633-45cf-ab91-522fb7bff585>
|
CC-MAIN-2020-05
|
http://www.uscj.org.il/commentaries/hukkat-5761/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251669967.70/warc/CC-MAIN-20200125041318-20200125070318-00188.warc.gz
|
en
| 0.974034 | 686 | 2.828125 | 3 |
Florida's panthers are in serious trouble. And some scientists see unsettling
parallels between these large cats and other mammals, including humans. Already
an endangered species, Florida's panthers are plagued by low sperm counts,
abnormal sperm, undescended testicles, thyroid problems, depressed immune
function, and congenital heart defects. Only 30 to 50 of the large cats
survive. Until recently, inbreeding was blamed for their fertility problems.
But many scientists think that manmade chemicals, like pesticides, are the real
The panthers' reproductive problems are the most severe of any cat species
studied. Panthers have the lowest sperm counts, the lowest semen volume, and
the highest number of abnormal sperm on record. In fact, over 90% of their
sperm are abnormal. Most of the males also suffer from "cryptorchidism",
meaning that one or both testes remain lodged in the abdomen. These
undescended testes can contribute to sperm defects. They produce less sperm,
and more defective sperm, than testes that descend properly into the scrotum.
As a result of the defects, several of Florida's panthers are completely
sterile and are unable to impregnate a female.
These fertility problems are eerily similar to reports of undescended testicles
and plummeting sperm counts in humans. By some estimates, although the
science is controversial, human sperm counts have dropped 50% over the last
fifty years. What's more, a study in England showed an approximate doubling in
the rate of undescended testes in three-month old boys between the 1950's and
1980's. Similar increases in cryptorchidism have been reported in Scotland and
Denmark, although not in the U.S.
For Florida's panthers, inbreeding seemed like a logical source of the defects.
Panthers live in the pine forests of south central Florida, where they are
increasingly hemmed in by suburban development. In this small area, they are
forced to mate with genetic relatives. It appears that the population now
consists of only two genetic strains. As a result of inbreeding, these cats
may be passing on dangerous recessive genes to their young.
Inbreeding can indeed produce defects like cryptorchidism, which is thought to
stem from a recessive gene. Some domestic animals inbred for genetic "purity"
pass this defect from generation to generation. In Florida's male panther
cubs, cryptorchidism has increased at an astounding rate since 1975-80. At
that time, around 15% of male cubs had an undescended testicle. In 1985-90,
that number soared to 67%. Today, over 90% of the males are cryptorchid. The
increase seemed to parallel an increase in inbreeding.
But many scientists think that manmade chemicals, not inbreeding, are the real
source of the problem. They blame contaminants called "endocrine disrupters"
which can alter reproduction in a wide range of animals. These chemicals
disrupt the action of natural hormones, which are crucial for processes like
sperm formation and testicular descent. In laboratory mice and rats, some of
the chemicals can cause the same low sperm counts and undescended testes seen
in Florida's panthers. What's more, they have caused population declines and
poor reproductive success in other wildlife species. The chemical culprits
include dioxin, p,p'-DDE (a breakdown product of the pesticide DDT),
polychlorinated biphenyls (PCBs), and a host of others. Many of them are
present in south Florida.
In humans, high doses of endocrine disrupting chemicals produce similar
defects. From the 1940's to the 1970's, millions of American women took the
drug diethylstilbestrol (DES). This synthetic estrogen, intended to prevent
miscarriage, caused serious problems in infants exposed before birth. The most
highly exposed sons often have low sperm counts, abnormal sperm, and
undescended testicles. These are the same problems afflicting Florida's
And Florida's panthers show other signs of endocrine disruption. Many of the
animals appear to have been "demasculinized" or "feminized" by abnormally high
blood levels of estrogen. From 1986 to 1993, researchers collected blood from
both free-ranging and captive panthers, and found a disturbing trend. The
males had estrogen levels as high as in females--sometimes higher. While no
one is quite sure what "normal" hormone levels are for these animals, Florida's
panthers appear to have higher estrogen levels than cougars from the London
zoo. Cougars can help indicate what may be normal for the Florida panther,
since these panthers are a subspecies of cougar.
Furthermore, there is data to discredit the "inbreeding" theory. One study
showed that the level of inbreeding in Florida's panther population is not so
different from that seen in other groups of large cats who show little sign of
cryptorchidism. The study compared captive male cougars in Florida, Texas,
Colorado, Latin American, and North American zoos. It found undescended
testicles in only two of more than fifty captive animals. And regardless of
the amount of inbreeding, the defect has never been reported in any other
species of nondomestic cat.
Contaminants have a history of affecting Florida's panthers. In July 1989, a
four-year old female panther was found dead in Everglades National Park. She
was one of only three prime breeding-age females in the area, and concern over
her death prompted an investigation. Her tissues were analyzed for pesticides,
PCBs, and other manmade contaminants. Toxic levels of mercury, an endocrine
disrupter, were listed as the cause of death. Her fat also contained very high
levels of two other endocrine disrupters: p,p'-DDE (57 ppm) and PCBs (27
Raccoons are an obvious route of exposure. In the heart of Florida's citrus
belt, where panthers live, DDT and other pesticides pollute many waterways.
The aquatic food chain bioaccumulates these contaminants, which reach high
concentrations in the fish. Raccoons feed on the fish, and panthers then feed
on raccoons. Chemicals from a lifetime of meals get stored in the panthers'
body fat. The panthers that eat more raccoons, and not white-tailed deer, have
higher levels of contaminants in their bodies. During pregnancy, females pass
the contaminants on to their young, where they can damage the developing
reproductive system. Exposure after birth might also contribute to the Florida
panther's loss of fertility.
In 1995, Florida's state wildlife agency had plans to import cougars from Texas
to mate with the Florida panthers and increase their gene pool. Only time will
tell whether contaminants or inbreeding are the cause of the panthers' woes,
but many believe it is a deadly combination of both.
Facemire CF, et al. (1995). "Reproductive Impairment in the Florida Panther:
Nature or Nurture?" Environmental Health Perspectives 103(Supplement
Toppari J, et al. (1996). "Male Reproductive Health and Environmental
Xenoestrogens". Environmental Health Perspectives 104(Supplement 4):741-803.
|
<urn:uuid:a549c4c6-f465-47c0-8df5-d49fa77707dc>
|
CC-MAIN-2017-30
|
http://www.pbs.org/wgbh/pages/frontline/shows/nature/gallery/cats.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424961.59/warc/CC-MAIN-20170725042318-20170725062318-00454.warc.gz
|
en
| 0.929381 | 1,592 | 3.328125 | 3 |
There’s been a lot of commentary in the blogosphere about the “Chris Anderson plagiarizing from Wikipedia” kerfuffle. (See my previous post for a recap.) There are too many apologists for Anderson and his use (or misuse) of Wikipedia, and even some criticisms have missed the forest for the trees. Let me spell it out:
- It is simply not acceptable to quote or paraphrase from Wikipedia when writing a book or doing serious research. Wikipedia is a tertiary source, and a deeply flawed one at that. If high school students aren’t allowed to quote or paraphrase from Wikipedia or traditional encyclopedias, it is absurd to think that it’s acceptable for the author of a book to do so. It is not only intellectual laziness of the highest order, it ignores Wikipedia’s own warnings about its limitations and appropriate use. As I quoted in my previous post: “Most educators and professionals do not consider it appropriate to use tertiary sources such as encyclopedias as a sole source for any information… Wikipedia articles should be used for background information, as a reference for correct terminology and search terms, and as a starting point for further research. As with any community-built reference, there is a possibility for error in Wikipedia’s content — please check your facts against multiple sources….”
- If you insist on using Wikipedia, you must track down the original reference sources cited and verify the information. Errors (including transcription mistakes) in the original Wikipedia entries that Anderson used are reproduced in his own writing, meaning he never looked at the original cited sources, and he apparently didn’t verify or fact-check the information with additional primary or secondary sources. [Note to Chris Anderson: If you don’t have the time to do the research and check sources yourself, you can hire a freelance researcher or journalist to either do it for you or check your work before publication.]
- It is ridiculous for Anderson to claim that he removed his footnotes because he was “unable to find a good citation format for web sources.” As I mentioned in my previous post, there are many authoritative citation standards which can easily be found in style manuals and websites. Even Wikipedia itself gives you nine different citation formats (including Chicago and MLA) for each entry. Anderson says his publisher insisted on a timestamp for each URL, which Anderson found “clumsy and archaic,” so he cut out the footnotes. WRONG! And don’t even get me started on the whole “write-through” thing.
- Given Anderson’s background and his role as editor-in-chief of Wired, I find this all rather shocking, and it makes me wonder about the editorial standards of Anderson himself, his magazine, and his book publisher (Hyperion).
Yesterday Seth Simonds, in a delightfully snarky post titled “Laziness is not an excuse for plagiarism,” demonstrated (with screen shots and step-by-step instructions) what Anderson could (and should) have done to find a source listed in a Wikipedia entry. Here’s an excerpt:
Anderson took a last-minute 5th grade approach to writing. He found the Wikipedia listing for “Usury” and pasted the text into his manuscript…
5 Steps From Wikipedia To A Reliable Source…
Step 1: Find the citation link for the portion of the Wikipedia article you’d like to quote. (Don’t quote it. Not even if you’re a famous editor and you’re really busy.)
A. Click on citation link in the Wikipedia article.
B. Identify the key portions of the citation. In this case, author last name and date of publication.
Step 2: After finding the citation, launch a web search including the author name and original search term. Many bloggers would stop at the citation of Moehlman and use a “^Moehlman, 1934, page 7” attribution. As a professional editor conducting research for a print publication, I’m holding Anderson to a higher standard. Note: pasting from Wikipedia is a bad idea because you’re trusting a stranger’s transcription. Don’t be lazy…
|
<urn:uuid:285f88ee-8398-4b3b-bf0e-dd227ae835ae>
|
CC-MAIN-2017-30
|
https://lisagoldresearch.wordpress.com/2009/06/26/laziness-is-not-an-excuse-for-plagiarism/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549423992.48/warc/CC-MAIN-20170722102800-20170722122800-00192.warc.gz
|
en
| 0.922692 | 889 | 2.625 | 3 |
Sexual violence is an all-encompassing, non-legal term that refers to crimes like sexual assault, rape, and sexual abuse. Sexual assault/abuse can take many different forms, but one thing remains the same: sexual assault/abuse survivors are never, under any circumstances, responsible for anyone choosing to assault them.
1. Your attacker was an acquaintance, date, friend, spouse, partner, parent, sibling, guardian, other relative, coach, professor, or employer.
2. You have been sexually intimate with that person or others before.
3. You were drinking or using drugs.
4. You froze and did not or could not say "no," or fight back physically.
5. You were wearing clothes that others may see as seductive.
6. You said "yes" and later said "no," but were not listened to.
Rape: a commonly used term to describe a sexual assault/abuse that includes unwanted, coerced and/or forced sexual penetration. The FBI defines rape as “penetration, no matter how slight, of the vagina or anus with any body part or object, or oral penetration by a sex organ of another person, without the consent of the victim.”
Date Rape: sexual assault/abuse that occurs between people with an established relationship.
Child molestation: any sexual contact with a child. Many children who are molested are too young to know what is happening and may not fight back. Some abusers use the child’s cooperation in these cases as “evidence” that no one was harmed. Examples of child molestation might include fondling or demanding sexual favors from a child.
Incest: Incest describes sexual contact with a family member. While incestuous sexual activity may occur between consenting adults, most reported incest occurs as child abuse. Over a third of American sexual assault/abuse survivors under the age of 18 are abused by a family member, according to latest statistics. However, incest is an underreported crime, so the actual number of incest survivors may be higher.
Non-consensual sexual contact: This category includes any unwanted sexual touching, such as groping or pinching. Attempted rape can also fall into this category.
Consent is the free and active agreement, given equally by both partners, to engage in a specific sexual activity.
1. Is physically forced to comply
2. Fears the consequences of not consenting
3. Feels threatened or intimidated
4. Is incapacitated by the use of alcohol or drugs
5. Is coerced (compelled to submit through intimidation, threats, misuse of authority, manipulation, tricking, or bribing with actions and words)
6. Says no, either verbally or physically (e.g., crying kicking or pushing away)
7. Is not an active participant in the activity
8. Is below the legal age of consent (varies in different states)
9. Has a disability or mental impairment that prevent the person from making an informed choice
10. Lacks full knowledge or information of what is happening
Force doesn’t always refer to physical pressure. Perpetrators may use emotional coercion, psychological force, or manipulation to coerce a victim into non-consensual sex. Some perpetrators will use threats to force a victim to comply, such as threatening to hurt the victim or their family or other intimidation tactics.
Approximately 8 out of 10 sexual assault/abuse cases are committed by someone known to the victim, often known as acquaintance rape. Perpetrators of acquaintance rape might be a date, but they could also be a classmate, a neighbor, a friend, family member, coworker, etc. It’s important to remember that dating, instances of past intimacy, or other acts like kissing do not give someone consent for increased or continued sexual contact.In other instances, the victim may not know the perpetrator at all. This type of sexual violence is sometimes referred to as stranger rape.
Ensure your own safety: After the experience of sexual trauma, the first and most important factor should be prioritizing your safety and well-being.
Reach out for support: Once you feel more physically safe, it’s important to either contact the police, a crisis hotline and/or connect with a person you trust for support.
Consider your medical options: It is best to have the medical exam within 72 hours of the assault. It is ultimately up to you to decide what to do in accordance with your own physical, psychological and emotional needs. Consider going to the nearest hospital or clinic. A medical care provider can provide about tests for pregnancy and sexually transmitted infections/diseases, support services, and a rape kit—a sexual assault forensic exam that can be used to collect DNA, blood samples and other evidence. If you are not ready to file a police report immediately, some centers can freeze the evidence and store it for later access.
Consider your legal options: If there is even a chance that you might want to report then you must preserve all evidence. Do not shower, urinate, change clothes (including undergarments), brush teeth, bathe, douche, or straighten up the area until the medical and legal evidence has been collected.Some survivors are adamant that they want to file a police report or prosecute the assailant. For many others, they may be reluctant to report the assault immediately for various different reason. THIS IS OKAY, but we urge you to report, because you deserve justice for a trauma that can have a lifelong effect on you.
1. Confidential access to victim advocates
2. Availability of a forensic exam (rape kit) at no cost to you
3. Time limits (statute of limitations) on certain legal actions
4. Mandated reporting of the assault if you are a vulnerable person (child or elder adult)
5. Confidential communication with service providers
6. Testing or storage of evidence kitsPossible financial compensation for you as a crime victim
Shock and denial: In the immediate aftermath of an assault/abuse, most survivors experience shock, derealisation, and a sense of being overwhelmed. You might think, "Did this really happen to me?" or "Why me?", and feel unable to accept that it actually happened.
Post-traumatic Stress Disorder (PTSD): Symptoms of PTSD include repeated thoughts of the assault/abuse; memories and nightmares; avoidance of thoughts, feelings, and situations related to the assault/abuse; and increased stimulation (e.g., difficulty sleeping and concentrating, jumpiness, irritability).
Fear: It is common for survivors to fear people and be vulnerable even when going through the regular activities of life. They may be afraid to be alone, or afraid of being with lots of people. Survivors may lack safety even in their own environment, which makes them feel vulnerable and may fear that they will be assaulted again.
Silence: Survivors may be unable to talk about the assault/abuse, or to describe what it feels like to have been assaulted, out of fear of being judged or shamed. Try to SPEAK ANYWAY!
Anxiety and Nightmares: Survivors may experience shaking, anxiety, flashbacks, and nightmares after an attack. This can begin shortly after the attack and continue for a long period of time. Nightmares may replay the assault/abuse or include dreams of being chased, attacked, etc. Survivors often fear that they are “losing it” and may feel that they should be “over it by now”.
Depression: Many survivors will fall into a depressive state. It can create feelings of hopelessness or despair. It may also reduce one’s sense of self-worth. Depressive feelings may be mild and fleeting, or they can be intense and long-lasting.
Guilt, Shame, Self Blame: Most survivors feel guilty and ashamed about the assault. Survivors often question that they somehow may have “provoked” or “asked for it”, that they shouldn’t have trusted the assailant, or that they should have somehow prevented the assault/abuse. These feelings are the result of society’s myths about sexual assault/abuse, rape, and sexuality. Remember, it was NOT your fault!
Low self-esteem: Some survivors battle with self-love after such an invasion of their body. Many may lose self-confidence, feel "unworthy", "ashamed" or "dirty".
Isolation: Some sexual assault victims/survivors feel their experience sets them apart from others. Oftentimes, they feel differently or think that others can tell that they have been sexually assaulted/abused just by looking at them. Some survivors do not want to bother anyone with their troubles, so they do not talk about the incident or their feelings. Survivors may withdraw or distance themselves from family and friends. Being around others is helpful.
Mood swings: Survivors might find that their mood changes quickly from anger and rage, to tears and despair, and back again. This is all normal after sexual trauma.
Loss of trust: Survivors might find it hard to trust people in their social circle, family and/or strangers.
Anger: Survivors may have different reasons to feel angry. There is often as much anger at the events following the assault/abuse, as toward the assault/abuse itself: changing lifestyle, loss of freedom, or towards friends and family. Anger is an appropriate, healthy response to sexual assault/abuse. Survivors vary greatly in how express anger. It may be especially difficult to express anger if a survivor has been taught that being angry is never appropriate. Anger can be vented in safe and healthy ways, or can be turned in, where it may become sadness, pain, or depression.
Sexuality Issues: Survivors may experience a variety of sexual distresses after an assault/abuse. Some survivors may want no sexual contact whatsoever; others may use sex as a coping mechanism. Some people may experience some confusion about separating sex from sexual abuse. Particular sexual acts may provoke flashbacks and thus, be very difficult for the survivor to engage in.
1. Process your experience – Learn healthy coping habits can help effectively process trauma.
2. Reconnect to yourself and your life – Getting back in tune with yourself and your norms
3. Have a network of support – Connecting with other survivors
4. Be empowered by your survival – Thrive past your trauma
|
<urn:uuid:ba1f4650-5f71-4172-835f-e5445469f9b3>
|
CC-MAIN-2023-40
|
https://www.voicesbeyondassault.org/sexual-violence
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506669.30/warc/CC-MAIN-20230924191454-20230924221454-00247.warc.gz
|
en
| 0.951663 | 2,144 | 3.375 | 3 |
Who we are is complex. It incorporates many aspects of where we grew up, how we identify ourselves, how others identify us, actions we have taken in the past and who we would like to grow into. Identity can be fairly solid, it can shift fluidly, or migrate through a series of stages. I turns out that human biological sex is not binary like we were taught.
Once aspect that is a key component to how we see ourselves and how society sees us is biological sex. I was going to write a big thing about it, but then SciShow on Youtube did it for me.
This episode was written by Carly Britton and covers many aspects that are worth listening to.
In short, human biological sex is not binary, it is a spectrum, and it isn’t necesarrily a single spectrum either.
A binary division is where you attempt to divide a thing into 2 parts. Some handy examples that make sense is dividing numbers into numbers that have enlcosed sections (6,8,9,0) and open sections (1,2,3,4,5,7). However some groupings defy easy binary division based on a simple rule, such as trying to binary divide fruit into sweet and sour. While it is easy to identify some fruits that everyone agrees is sweet and some that are sour, there are a number of fruits that either defy easy identification or fit into yet another category of “it depends”.
Every aspect of what we may think of as “male” or “female” is frequently found in various subsections of human populations, but no single aspect is sufficient to describe all humans. For example if we consider chromosomes, the DNA of our sex expression, we were taught in school the simplified version that males have the XY chromosome expression and females have the XX chromosome expression. While it is possible to create a binary divide of XX is female and all others are male, it becomes very awkward when we have the so called sex chromosome be X, or Y, or XXX, or XYY and so on. Many people who appear female and identify as female have a sex chromosome that is not XX.
Additionally when we add in any other sex identifier to the mix we find that a binary division is impossible. There is not even really a spectrum from “female” to “male”.
Another aspect to consider is the difference between assigned sex and chosen sex. While all the traditional markers for categorising someone as a particular sex, the person may not identify themselves as this sex. This person may chose to make no changes in appearance, cosmetic changes, medical changes and or surgical modification to correct this misalignment. Since the definition of who actually fits into the overly simplistic physical definitions of “male” or “female” are poor, it seems odd to then require that someone who fits the physical criteria is then also required to ignore the very important criteria of “self identification”.
It is also odd to try to fix this by just creating a third category of “neither”. If we look at a simple spectrum such as the rainbow of visible light, it is made of either red, blue or “other”. Applying this third category solution means that orange and violet are considered to be the same, when clearly they are not. And where does watermelon and maroon fit?
Sex identity is complex and involved a number of features such as DNA/chromosomes, gene expression, development, hormones, cosmetic appearance, taste and self identity. To lump all of these aspects into a false binary, or stretch it into a false trinary is hurtful to people who find themselves excluded or poorly labelled for no good reason.
To minimise this hurt, it is important to accept when someone identifies other than your initial evaluation of them and if a person is dressing ambiguously, accept that they may not identify as any simplistic label. It is not offensive to ask someone if they have some prefererd pronouns, and accept if the pronouns someone prefers does not align with your assumptions or comfort.
|
<urn:uuid:a3de8a9c-c580-4ae2-b20d-6653ce92abdf>
|
CC-MAIN-2020-29
|
http://www.jomida.com/2019/11/14/identity/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655884012.26/warc/CC-MAIN-20200704042252-20200704072252-00097.warc.gz
|
en
| 0.958832 | 842 | 2.71875 | 3 |
Mississippi suffered enormously all through the Civil Conflict, however it was at Corinth the place residents and volunteers first endured the carnage of conflict amplified by a bloody conflict deep within the Tennessee wilderness. Early on, gaining possession of Corinth—an vital railroad junction in northeastern Mississippi—garnered fast consideration from each Union and Accomplice instructions. Tucked away in a swampy lowland and divided by jagged ravines and dried-up creek beds, Corinth introduced an arduous bodily problem for the large armies that converged in town. So it was within the spring of 1862 that the Civil Conflict discovered Corinth and introduced alongside the fact of an extended and bloody wrestle.
Shiloh was Corinth’s prelude to conflict. As for the inexperienced civilian-soldiers, the fact of the fight skilled there was a shock. Most combatants who survived the struggle left the battlefield wholly bewildered, unable to course of what appeared like a wholly new method of conflict. Veteran’s recollections of Shiloh and Corinth—a few of them written many years later—give us perception into the brutality of this devastating conflict.
Accomplice Captain Francis A. Shoup, Mississippi Non-public Augustus Mecklin, Ohio Captain George Rogers, and Accomplice nurse Kate Cumming skilled Shiloh and the motion round Corinth by means of completely different lenses. Shiloh was Shoup’s first brush with intense fight. So traumatic was the struggle that following the conflict the sight of budding bushes instantly transported him again to the spring of 1862. The struggle additionally scarred the younger Mecklin. A lot in order that he didn’t and wouldn’t see the conflict by means of. Others just like the ardent abolitionist Rogers and the passionate Cumming have been impressed by their experiences and have been decided to see the tip—irrespective of the associated fee.
Earlier than conflict touched these combatants, nonetheless, their fates have been dictated by selections of untried commanders unprepared to direct conflict on such a big scale. In February 1862, Accomplice Normal Albert Sidney Johnston waffled beneath such pressures. Johnston needed to cease his retreating armies and devise a plan to counter the Union offensives from western and jap Kentucky. On February 5, 1862, Normal P.G.T. Beauregard arrived in Bowling Inexperienced, Ky., to help Johnston with conjuring a stopgap for the crumbling Accomplice defensive position. However Johnston provided no sensible resolution for halting the Union thrust towards Tennessee. Beauregard rapidly prompt a focus of Accomplice forces at Fort Donelson on the Cumberland River. Johnston agreed—considerably—and despatched 15,000 troops to defend the path to Nashville. Nonetheless, the drive was inadequate, and Fort Henry on the Tennessee River and Fort Donelson on the Cumberland River fell after a number of weeks. For the “victor of Donelson,” Maj. Gen. Ulysses S. Grant, an unchecked advance down the Tennessee River into Alabama and Mississippi turned a actuality.
In a rush to determine a rallying level for his receding instructions, Johnston prompt to Beauregard the northeastern Alabama city of Stevenson. But once more, Johnston’s suggestion puzzled the Creole who countered by hinting at converging the forces at Corinth. Johnston concurred and in early March 1862, roughly 40,000 Accomplice troops from all around the south assembled at Corinth for a counteroffensive towards the Union advance down the Tennessee River.
Thus, Corinth turned the staging level for a showdown between Grant and Johnston. The sleepy city reworked right into a dusty navy hub and rapidly crammed up with excited Confederates enthralled on the thought of putting again on the captors of Fort Donelson. The enemy that many Accomplice troopers imagined as inferior fighters have been very similar to themselves, nonetheless. Grant’s Military of the Tennessee and Maj. Gen. Don Carlos Buell’s Military of the Ohio have been “Westerners”—males from Iowa, Missouri, Minnesota, Michigan, Illinois, Indiana, Kentucky, Ohio, and Wisconsin. Farmers, tradespeople, rural schoolmasters, and pious preachers made up the vast majority of each contending armies at Shiloh. Confederates from Alabama, Arkansas, Tennessee, Mississippi, Louisiana, and Texas bumped into a well-known foe at Shiloh, and although inexperienced, they too have been decided to overcome.
‘The primary leaf of spring’
Three years earlier than his loss of life in 1896, ex-Accomplice Francis Asbury Shoup sat down for an interview with the Accomplice Veteran. Within the twilight of his life, Shoup reminisced over the Vicksburg and Atlanta campaigns with outstanding element and, like many ex-Confederates, forged blame of shortcomings upon his superiors. However for Shoup, a former captain and chief of artillery for William Hardee’s Corps, he started his story on April 5, 1862. He recalled the 23-mile slog from Corinth, and using in regards to the battle traces of Hardee’s Corps in deep reflection.
The Confederates have been just a few miles from the Union encampment at Pittsburg Touchdown, Tenn. Shoup and his males bided their time listening to merry Federal camp tunes and taking within the tranquil surroundings in a uncommon reprise from the rain. “[We] had loads of time to have a look at the dogwood blooms, of which the woods have been full.” The outdated soldier recalled: “I by no means see them now that I don’t consider Shiloh.” Additional to the rear, Non-public Augustus Hervey Mecklin, Co. I, fifteenth Mississippi Infantry, didn’t have the ear of a normal or of any officer for that matter. A number of days after the Battle of Shiloh, Mecklin wrote an intense letter to type out what he noticed. However on April 5, he lay solely a pair thousand yards behind Hardee’s traces. Prophetically, he considered his comrades’ impending demise and the scores of grieving moms again house. Maybe Mecklin seemed to the sky for steerage. He famous: “The bushes have been budding into the primary leaf of spring.”
As nightfall set in on April 5, Captain Shoup trailed Hardee to a council of conflict referred to as by Johnston. Shoup was not current on the convention with Johnston’s corps commanders however waited on the outskirts of the assembly. Afterward, Hardee knowledgeable Shoup of the state of affairs. In line with Shoup, Hardee was discouraged in regards to the assault the subsequent day. As well as, most of Johnston’s corps commanders reciprocated the sensation. Shoup affirmed throughout his interview with Accomplice Veteran that Hardee confided to him afterward: “After listening for someday Gen. Johnston lower them brief by saying, ‘Gents, return to your instructions; the assault shall be made at daybreak. If the lads haven’t any rations they have to take them from the enemy.’ ”
Shoup believed till his dying day that “we [the Confederates] got here that close to turning tail, even on the final second.” However sadly for Shoup, Mecklin, and tens of 1000’s of others, no retreat was sounded. As historian Timothy B. Smith places it greatest: Johnston forged the “iron cube of battle.” There was no going again.
The morning of April 6 was “very heat,” Mecklin recalled. “The sky was clear and however for the horrible monster loss of life who now pile excessive carnival, this may need been such a Sabboth [sic] morn as would have referred to as nice recollections of Sabboth bells & non secular enjoyment.” As he and the fifteenth Mississippi waited for his or her probability for a glimpse of ‘the elephant,’ Captain Shoup, connected to the primary Accomplice assaulting drive, rode manically by means of tough underbrush and low-hanging branches searching for anybody to present him orders.
Whereas dodging monstrous splinters, Shoup recollected catching sight of the foe: “Plainly the enemy was simply sending out some scouts, at any price our skirmishers have been engaged very early.” Glancing about, Shoup rapidly realized “it was all haphazard—line towards line—patching up weak locations with troops from wherever they may very well be obtained.” He lamented “for a number of hours the [f]iring was fixed.”
From about 7 a.m. to 11 a.m., the battle progressed methodically. At first contact simply earlier than 6 a.m., Johnston’s uncooked regiments had orchestrated a disorganized lunge at a momentarily startled Union drive. However beneath the course of Brig. Gens. William T. Sherman, Stephen Hurlbut, and W.H.L. Wallace, the Federals labored an efficient delaying protection as Grant constructed a formidable defensive position close to Pittsburg Touchdown. In the meantime, inexperienced troops on each side maneuvered awkwardly by means of dense foliage.
The carnage was extreme. Artillery on each side tore limbs from man and tree. At 9:30 a.m., the Union proper started to crumble and fell again to the Tilghman Department round Jones Area. There Sherman and McClernand scrambled to regular their uncooked troops in face of a quickly regenerating Accomplice advance. It was there the place Augustus Mecklin and the fifteenth Mississippi deployed to one of many battle’s epicenters: Brig. Gen. Benjamin Prentiss’ camp alongside the Hamburg-Purdy Highway.
Mecklin recalled his callow unit’s advance: “Simply at this juncture whereas making a speedy march at double fast one in every of our Liets [lieutenants] was shot by means of the hand unintentionally by his personal pistol & simply on the similar second virtually, our adjutant, the Lieut’s Bro., was stabbed unintentionally within the thigh. With a bayonet.”
The fifteenth Mississippi continued ahead, advancing uncertainly towards disorganized however stabilizing Federal traces. Because the Mississippians bypassed booming batteries, Mecklin recorded their ugly impact: “Right here & there we noticed the our bodies of lifeless males—pals & foes mendacity collectively. Some torn to mince meat by cannon balls. Some nonetheless writhing within the agonies of loss of life. We halted for a short while close to the place a poor fellow was mendacity leaning towards a tree severely wounded.”
In awe of the terrific noise, he added, “The cannon seemed to be carrying on this contest wholly amongst themselves.” Whereas taking shelter at a tree line, Mecklin longed to flee the uncovered place: “A few of the balls reached us & whereas we have been halted one struck a tree practically a foot by means of & splitting it a sunder tore a poor fellow who was behind it right into a thousand items.”
The Mississippians, nonetheless, pressed on. Within the advance, Mecklin seemed about and recalled the picture of the idyllic environment torn by sizzling iron and lead: “The bushes have been noticed with bullet holes. Many branches & tree tops not budding into the tender leaf of spring bowed their heads, torn partly from the forest stem by the balls of each side.”
When the Mississippians reached volleying distance, Mecklin’s fears turned actuality: He caught a glimpse of the elephant. “For the primary time in my life, I heard the whistle of bullets,” he recalled. “We took shelter behind the tents & some wagons & a pile of corn & returned the fireplace of the enemy with spirit.” With exasperated prose, Mecklin continued: “The bullets whistle round my ear. I used to be close to the entrance & firing. lay right down to load quickly males have been falling on all sides.” Round him, comrades fell: “Two in Co. E simply in entrance of me fell lifeless shot by means of the mind. On my left in our personal Co., W. Wilson, W. Thompson & Ben. Stewart. Bro. Geo. & James Boskins have been wounded.”
GET HISTORY’S GREATEST TALES—RIGHT IN YOUR INBOX
Subscribe to our HistoryNet Now! publication for the perfect of the previous, delivered each Wednesday.
Mechanically, Mecklin went to work, doing his greatest to dam out the destruction. He fired so quickly, in actual fact, that his rifle gummed up: “…my gun obtained so foul that I couldn’t get my ball down. Taking a brief stick that lay close to, I drove the ball down. Once more the tube turned crammed up & not with the ability to get it off, I referred to as to one in every of Co. E. to throw me the gun of a wounded man by him. I fired this till the tube turned crammed. Throwing it down I went to the rear & selecting up my ho’ gun held on till the battle was over.”
On the epicenter of the combating, Mecklin and Shoup weren’t conscious the Accomplice excessive command was in some disarray. Johnston had died from a mortal wound; his alternative, Beauregard was battling sickness and spent, mistakenly assured the battle had already been determined—that the Federals weren’t in place for an efficient response. The fifteenth Mississippi had been combating for 12 straight hours, and as evening fell, Mecklin expressed his reduction: “Lengthy had I seemed for the sort hand of darkness to put its peaceing hand upon this savage battle.”
Mecklin would survive the subsequent day’s combating in what turned a outstanding Federal victory. He additionally survived his military’s depressing retreat to Corinth and the next 31-day siege of the town. However Shiloh tarnished his soul. He resigned from the Accomplice Military later that yr and returned to ministry, by no means absolutely coming to grips with the whirlwind he and his comrades had encountered within the Tennessee wilderness.
A conflict in Jones Area
At 5 a.m. April seventh, 1862, Maj. Gen. Lew Wallace’s wayward third Division lined up on the correct as a part of Grant’s deliberate counterattack. Wallace turn into misplaced attempting to succeed in the battlefield the day earlier than and arrived too late to determine within the combating. George Rogers, the 25-year-old captain of the twentieth Ohio’s Firm A, rode forward of his males because the assault lurched ahead. A veteran of Maj. Gen. George B. McClellan’s 1861 campaigning in western Virginia he was not fairly ready for what lay forward. Meandering to the left, the twentieth stumbled on Colonel Preston Pond’s Louisianans in Braxton Bragg’s Second Corps secluded together with Captain William Ketchum’s Alabama Battery in Jones Area. Muskets started to rattle and, whereas urging his males on, Rogers glanced on the enemy traces. He noticed an excited Accomplice officer, flag in hand, desperately rallying his wavering traces. Rogers suspected it was Beauregard himself, however it was probably Pond.
A number of days later, Rodgers wrote of his contact with Pond’s “Creole” brigade: “Our brigade got here by an exquisite and speedy motion upon a heavy battery of the enemy’s, supported by a brigade of Creoles commanded by Beauregard in individual, who—with flag in hand on the head of the brigade—was endeavoring to rally his forces for a ultimate effort to retrieve his misplaced fortunes.”
Rogers and the twentieth Ohio moved cautiously into Jones Area. The enemy forces would alternate volleys for the subsequent three hours. Ultimately, Wallace’s division picked up velocity mid-morning and rushed over Pond’s raveled brigade. The Ohioans pitched into the fleeing Confederates. As Rogers guided his traces, he was distracted by the unusual actions of 1 shaken officer, “weeping like a baby” on the sight of his mutilated mount. Mercifully, the officer unloaded six photographs into the dying animal. “That scene,” Rogers lamented, “…stays essentially the most vividly painted in my reminiscence of all these I noticed on that memorable day.”
By 4 p.m., the exhausted and severely bloodied Accomplice military started its staggered retreat to Mississippi. Making the state of affairs extra dire was an intense rainstorm that turned the roads into an almost impassible quagmire. Thankfully for the severely wounded, volunteer nurses scrambled from surrounding Accomplice states to help in any attainable method. Because the combating raged on April 7, Alabamian Kate Cumming heard of the large struggle and boarded a practice from Cell, Ala., to Okolona, Miss., and from there to Corinth. Cumming noticed trains loaded with grievously sick and wounded heading into the other way and recorded on April 8: “It’s raining in torrents. Nature Appears to have donned her most somber garb, and to be weeping in anguish for the lack of so lots of her nobelist [sic] sons.”
Nursing the Wounded
Shiloh’s aftershock rapidly expanded to cities and settlements in Tennessee and Mississippi. Corinth instantaneously felt the blow. Thankfully, Kate Cumming and plenty of civilian volunteers have been there to assist. She had arrived on April 11, towing a heavy coronary heart as a result of her two brothers—one in Ketchum’s Alabama Battery, the opposite within the twenty first Alabama Infantry—had presumably been killed throughout the battle. Whereas in transit from Okolona, Cumming wrote in her diary: “There’s a report that Captain Ketchum is killed, and all of his males are both killed or captured; the Twenty-First Alabama Regiment has been lower to items. I used to be by no means extra wretched in my life! I can see nothing earlier than me however my slaughtered brother, and the bleeding and mangled types of his dying comrades.”
With uncertainty on her thoughts, Cumming saved busy nursing the sick and wounded. On April 12, she “sat up all evening, bathing the lads’s wounds, and giving them water. Everybody attending to them appeared fully worn out.” The bothered troopers appeared crammed into each crevasse: “The lads are mendacity all around the home, on their blankets, simply as they have been introduced from the battle-field. They’re within the corridor, on the gallery, and crowded into very small rooms.”
It was the scent of conflict, nonetheless, that disturbed her most: “The foul air from this mass of human beings at first made me giddy and sick, however quickly I obtained over it.” But she remained and Corinth’s environment of struggling solely intensified with time. Per week later, desensitized considerably, Cumming wrote a few soldier understanding “he’ll die.”’
“A younger man whom I’ve been attending goes to have his arm lower off!” she recorded on April 23. “Poor fellow! I’m doing all I can to cheer him. He says he is aware of he’ll die, as all who’ve limbs amputated on this hospital have died.”
Her senses dulled by stress and the sight of human struggling, Kate Cumming concurred with the doomed boy: “It’s however too true; such is the case.”
For the 1000’s of victims of Shiloh who sought refuge behind the entrenchments of Corinth, a real problem of survival approached within the type of local weather. The month of Could introduced extreme warmth and dryness, and extreme sickness incapacitated complete items. Potable water was virtually nonexistent, and plenty of troopers lapped liquid out of stagnated puddles and swamps. The lumbering Union military lastly reached the outskirts of Corinth over the last week of April, and Corinth’s determined inhabitants once more braced for the relentless horrors of conflict.
Shoup, Mecklin, Rogers, and Cumming all converged at Corinth, however the ghosts of Shiloh adopted. Although all of them survived the conflict, vivid reminiscences of Shiloh haunted them the remainder of their lives.
After working as a concrete mason for 15 years, Hint Brusco modified profession paths and is at present a Ph.D. pupil on the College of Alabama, the place he research navy historical past. His present undertaking focuses on Corinth, Miss., and the way the Civil Conflict impacted northeastern Mississippi.
|
<urn:uuid:8e5818e9-b288-4180-ae2f-53d8a7b0f125>
|
CC-MAIN-2023-14
|
https://enochnewsdaily.com/they-saw-the-horrors-of-war-a-nurse-and-3-soldiers-describe-shiloh-and-corinth
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296944452.97/warc/CC-MAIN-20230322211955-20230323001955-00674.warc.gz
|
en
| 0.961799 | 4,433 | 3.109375 | 3 |
See the remains of a historic hospital, cemetery that were found underwater off the Florida coast
Dry Tortugas National Park sits less than 70 miles west of Key West in the Gulf of Mexico. Seven small islands make up the site that some 70,000 people visit each year. The islands are only accessible via boat or seaplane and are susceptible to extreme weather events, including hurricanes.
KEY WEST, Fla. – A team of divers exploring the Dry Tortugas National Park, off of Key West, have discovered what are believed to be a hospital and cemetery that date back to the early 1800s.
The site is submerged around what is known as Garden Key, about 70 miles west of the southernmost point.
According to the National Park Service, U.S. soldiers and civilians stationed at Fort Jefferson suffered from yellow fever and are likely among the dozens of people buried at the underwater site.
"This intriguing find highlights the potential for untold stories in Dry Tortugas National Park, both above and below the water," Josh Marano, a South Florida maritime, said in a statement. "Although much of the history of Fort Jefferson focuses on the fortification itself and some of its infamous prisoners, we are actively working to tell the stories of the enslaved people, women, children and civilian laborers."
The Dry Tortugas was used at a naval outpost during the 19th century, and due to its isolation, researchers believe infectious diseases, such as mosquito-borne yellow fever, took a heavy toll on the population.
SEE THE EXTREME WEATHER VISITORS AT NATIONAL PARKS EXPERIENCE
- Image 1 of 4
- Image 2 of 4
- Image 3 of 4
- Image 4 of 4
The makeshift hospital and cemetery used to be above the surface of the water, but rangers say due to climate change and significant storms, the land has eroded away, causing the site to sink some 20 feet below the surface.
The site in the southeastern Gulf of Mexico is the most hurricane-prone National Park location in the country, with at least 118 close brushes by tropical cyclones since data began being kept in the mid-1800s. Several of the impacts were from major storms that produced large water surges and damaging winds.
FLORIDA ‘SHARK MATERNITY WARD’ MAY HAVE BEEN FOREVER CHANGED AFTER DIRECT HIT BY HURRICANE IAN
The impressive list of storms to impact the area includes names such as Andrew, Irma, Wilma and Ian, and it is unclear if the site had remained above water, whether it would have remained as intact as it is today.
During a dive in 2022, team members spotted the headstone with the name John Greer and later found records of his employment as a laborer at the fort until his death on Nov. 5, 1861.
According to researchers, little information is available about his death, but materials used in constructing a giant slab at the cemetery are from the same resources used to build the fort.
NEARLY TWO-THIRDS OF CORAL REEF SHARKS THREATENED WITH EXTINCTION FROM OVERFISHING AS MAN CAUSE, STUDY FINDS
The cultural heritage site is protected under federal law, and the NPS said it is planning further documentation of the location.
Around 70,000 visitors make the annual trip to the U.S. National Park, which is only accessible via boat or seaplane.
|
<urn:uuid:400a190e-24ff-4abe-9edb-505837eba71b>
|
CC-MAIN-2023-23
|
https://www.foxweather.com/earth-space/national-park-dry-tortugas-hospital-cemetery
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646144.69/warc/CC-MAIN-20230530194919-20230530224919-00063.warc.gz
|
en
| 0.958655 | 717 | 2.921875 | 3 |
Users new to the world of cryptography often find themselves confused about the appropriate cryptographic key to use for various applications. It's actually a relatively straightforward selection process that depends
Remember that there are two basic types of cryptographic algorithms – symmetric (private key) and asymmetric (public key) algorithms. Symmetric key algorithms use a single key to secure communications and achieve the goals of confidentiality, integrity and (sometimes) authentication. Asymmetric algorithms provide each user with a pair of keys – a public key and a private key. Users freely distribute their public key while keeping their private key secret. These keypairs are used to achieve all four cryptographic goals: confidentiality, integrity, authentication and non-repudiation. (If you need a refresher on these goals, see the tip Encryption and electronic mail).
An easy way to keep this straight is to remember that the symmetry in a symmetric algorithm results from the fact that both parties are using the same key. Asymmetric algorithms, on the other hand, do not achieve this symmetry – each participant in a communication uses a different key for their portion of the exchange.
Now the big question – which key should you use for a particular application? If you're using a symmetric algorithm, the answer is simple – you use the only key available to you, the secret key. If you're using a public key algorithm, it depends upon the application:
- To protect the confidentiality of a message, encrypt the message with the recipient's public key.
- To read an encrypted message sent to you, decrypt the message with your private key.
- To create a digital signature for a message, encrypt the message digest with your private key.
- To verify the digital signature for a message, decrypt the digital signature with the sender's public key and compare the result to the message digest you compute.
It's as simple as that! Take a few minutes to think through the scenarios and you'll be a master of cryptographic keys in no time!
About the author
Mike Chapple, CISSP, currently serves as Chief Information Officer of the Brand Institute, a Miami-based marketing consultancy. He previously worked as an information security researcher for the U.S. National Security Agency. His publishing credits include the TICSA Training Guide from Que Publishing, the CISSP Study Guide from Sybex and the upcoming SANS GSEC Prep Guide from John Wiley. He's also the About.com Guide to Databases.
For more information, visit these resources:
- Quiz: Cryptography
- Executive Security Strategies: Cryptography basics for infosecurity managers
- Network Security Tip: Diffie-Hellman key exchange
This was first published in May 2003
|
<urn:uuid:fdfa0144-be68-4123-a8e8-b787e3813912>
|
CC-MAIN-2013-20
|
http://searchsecurity.techtarget.com/tip/Which-key-is-which
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368711005985/warc/CC-MAIN-20130516133005-00044-ip-10-60-113-184.ec2.internal.warc.gz
|
en
| 0.904996 | 555 | 3.75 | 4 |
The world’s poorest and most vulnerable communities are most in need of increased resilience to climate impacts. Few of these people have insurance cover for such risks, but insurance can be of real benefit to them if it is part of an integrated climate risk management strategy.
Two-thirds of the extreme poor work in smallholder agriculture, one of the sectors most affected by natural hazards. The benefits of climate risk insurance are protective, promotive and transformative: this insurance acts as a safety net, it enables people to boost their productivity and it can incentivize and support preparedness and risk reduction measures.
To achieve maximum impact, climate risk insurance needs to be accessible to the poorest and most vulnerable people, with sustained public funding for targeted premium support; it should be integrated with livelihood strengthening interventions to maximize resilience; it should be enabling, with donor support to build capacity and suitable regulatory frameworks within the system; and it should promote inclusive community participation.
|
<urn:uuid:b5b58dcd-d772-472c-ac83-93dc87ea8cd9>
|
CC-MAIN-2020-24
|
https://includeplatform.net/publications/weathering-a-risky-climate-the-role-of-insurance-in-reducing-vulnerability-to-extreme-weather/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347392142.20/warc/CC-MAIN-20200527075559-20200527105559-00546.warc.gz
|
en
| 0.943986 | 189 | 2.875 | 3 |
Monitoring blood pressure for 30 minutes reduces unnecessary hypertension treatment, finds studyBMJ 2017; 356 doi: https://doi.org/10.1136/bmj.j1302 (Published 16 March 2017) Cite this as: BMJ 2017;356:j1302
- Susan Mayor
Using automated blood pressure monitoring over 30 minutes reduces the number of patients requiring hypertension treatment and those needing an increased dose of existing hypertension treatment, a primary care study has shown.
Previous research has indicated that up to one third of patients found to be hypertensive in a clinical setting have white coat hypertension, with raised blood pressure that falls to within the normal range in other settings. Many of these patients are treated for hypertension so the new study investigated whether monitoring blood …
Log in using your username and password
Log in through your institution
Register for a free trial to thebmj.com to receive unlimited access to all content on thebmj.com for 14 days.
Sign up for a free trial
|
<urn:uuid:b358dab1-7865-4fd7-991f-e710a6bc7a46>
|
CC-MAIN-2017-26
|
http://static.www.bmj.com/content/356/bmj.j1302
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128321497.77/warc/CC-MAIN-20170627170831-20170627190831-00011.warc.gz
|
en
| 0.881629 | 205 | 2.8125 | 3 |
"Much of teaching is about helping students master new knowledge and skills and then helping students not to forget what they have learned."Organizing Instruction and Study to Improve Student Learning—A Practice Guide from the National Center for Educational Research at the U.S. Department of Education provides a paradigm for accomplishing this objective.
Practice guides differ from most research reports in three important ways. First is that a practice guide includes a list of actionable distinct recommendations. Second is together those recommendations are intended to be a systematic approach to a many-sided problem. Third, each recommendation is definitively categorized by the level of supporting evidence (e.g., strong, moderate and low).
The recommendations in this practice guide show a consensus on some of the most important tangible and material principles to emerge from research on learning and memory.
The seven recommendations -
- Space learning over time
- Interleave worked example solutions with problem-solving exercises
- Combine graphics with verbal descriptions
- Connect and integrate abstract and concrete representations of concepts
- Use quizzing to promote learning
- Help students allocate study time efficiently
- Help students build explanations by asking and answering deep questions
Each recommendation is accompanied by specific suggestions for implementation as well as potential roadblocks to success and possible solutions.
View or download the full practice guide in PDF format
Freitas, D., & Buckenmeyer, J. (Dec 1, 2008) Aligning Research with Classroom Practice: Internet, Student
Achievement and Cell Phones. Retrieved Dec 1, 2008, from http://www.techlearning.com/showArticle.php?articleID=196605568&page=1
|
<urn:uuid:8b273103-ba7d-412f-a34f-597d6e5db5d1>
|
CC-MAIN-2017-47
|
http://cffmv.blogspot.com/2008/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934805008.39/warc/CC-MAIN-20171118171235-20171118191235-00644.warc.gz
|
en
| 0.909614 | 338 | 3.90625 | 4 |
Topic: The 'Watt cabinet' by Anton Seuffert
Is part of topic Parade (Te Papa exhibition - 14 February 1998 to May 2001)
This writing bureau, known as ‘the Watt cabinet’, was made in Auckland by Anton Seuffert, a Bohemian cabinetmaker who lived and worked in the city from about 1860. The bureau may have been commissioned for presentation to Mr David Limond Murdoch, an Auckland banker.
Its design is based on a ‘secretaire’, a kind of writer’s work station that became popular in France in the eighteenth century during the reign of Louis XV. It combined two purposes – a desk for writing on, and a cabinet for storing papers and writing equipment.
The piece is a fine example of the cabinetmaker’s craft. It is finely made in the European classic style. Noteworthy features include the use of beautiful native timbers – kauri , rewarewa, and puriri – the carving (note the berry and fruit drawer knobs), and the use of intricate wood inlays, or marquetry.
Seuffert’s customers would have valued the cabinet for its elegant European look. But they would have also appreciated his use of local woods, and the local themes in the decoration. This combination of elements made something that was distinctively New Zealand – an important consideration for immigrant people looking for expressions of local culture.
Today, we would probably feel uncomfortable about actually using an ornate writing bureau like this. And we would find Seuffert’s choice of local imagery somewhat quaint. But up close, we can admire the intricacy of the inlays, and the skill with which the wood’s grain is used as texture in the images.
In 1989 restoration work was carried out on the ‘Hooker cabinet’, also made by Anton Seuffert. Through the skills of Detlef Klein, a German-trained furniture conservator now resident in New Zealand, this other magnificent example of Seuffert’s work has been transformed to its former glory.
Text originally published in Tai Awatea, Te Papa's onfloor multimedia database (1998).
|
<urn:uuid:60605cb9-7f5b-4388-a3e0-832176b5f87c>
|
CC-MAIN-2014-41
|
http://collections.tepapa.govt.nz/topic/927
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1412037663417.12/warc/CC-MAIN-20140930004103-00363-ip-10-234-18-248.ec2.internal.warc.gz
|
en
| 0.957852 | 452 | 2.546875 | 3 |
|Scientific Name:||Cebus flavius|
|Species Authority:||(Schreber, 1774)|
|Taxonomic Notes:||Silva Jr (2001, 2002) argued that the tufted capuchins and the untufted capuchins (sensu Hershkovitz 1949, 1955) are so distinct in their morphology that they should be considered separate genera. Cebus Erxleben, 1777 for the untufted group, and Sapajus Kerr, 1792 is the name available for the tufted capuchins.
Cebus queirozi Pontes and Malta, 2006 in Pontes, Malta and Asfora, 2006, is evidently a junior synonym, or, as argued by Oliveira and Langguth (2006), unavailable for lack of a registered type specimen.
|Red List Category & Criteria:||Critically Endangered C2a(i) ver 3.1|
|Assessor/s:||de Oliveira, M.M., Boubli, J.-P. & Kierulff, M.C.M.|
|Reviewer/s:||Mittermeier, R.A. & Rylands, A.B. (Primate Red List Authority)|
This species listed as Critically Endangered due to an extremely small population size and continuing decline. The estimated total population is 180 individuals, all of which are extremely fragmented (approximately 24 subpopulations) and averaging approximately 15 individuals.
|Range Description:||The coastal region of north-east Brazil in the states of Alagoas, Paraíba and Pernambuco (Oliveira and Langguth 2006; Pontes et al. 2006). Cebus libidinosus occurs inland (see Oliveira and Langguth 2006).|
Native:Brazil (Alagoas, Paraíba, Pernambuco)
|Range Map:||Click here to open the map viewer and explore range.|
|Population:||The remaining populations of this species are all extremely fragmented (approximately 24 subpopulations) each averaging approximately 15 total individuals. The estimated total remaining mature populations size is 180 individuals (M. M. de Oliveira, unpubl.).|
|Habitat and Ecology:||
Lowland coastal rain forest and Montrichiardia linina swamp in north-east Brazil (Pontes et al. 2006), secondary forest, semi-deciduous seasonal forest, canopy at about 20 m and emergents about 25 m. Capuchin monkeys are arboreal quadrepeds, they are typically found in the lower to mid-canopy and understorey (Freese and Oppenheimer 1981; Fragaszy et al. 2004; Jack 2007).
Capuchin monkeys are frugivores-insectivores, including a wide variety of fruits, seeds and arthropods, frogs, nestlings and even small mammals, supplemented by stems, flowers and leaves. They are extractive, manipulative foragers. Typical group size for tufted capuchins is about 18 individuals, with numbers of females exceeding the numbers of males (adult sex ratio of 0.85). Pontes et al. (2006) recorded a group of 18. Males disperse. Both sexes take up linear hierarchies, the top ranking male being dominant to the top ranking female. Subordinate males are often peripheral (Fragaszy et al. 2004).
Adult male HB 36.8 cm, TL 37.8 cm, weight 3.0 kg (Oliveira and Langguth 2006)
Adult male HB 40.0 cm, TL 41 cm, weight 2.9 kg (Pontes et al. 2006)
Adult female HB 35.1 cm, TL 38.4 cm, weight 1.8 kg (Oliveira and Langguth 2006)
Adult female HB 36.1 cm, TL 38.0 cm, weight 2.5 kg (Oliveira and Langguth 2006).
|Major Threat(s):||The major threats are hunting (for food and pets), and habitat loss and fragmentation (mainly through coastal development and sugar cane).|
The species has not been recorded from any protected areas, though several are within range, including Guaribas Biological Reserve (2,714 ha), Barra do Mamanguape EPA (14,640 ha), Manguezais da Foz do rio Mamanguape (Area of Outstanding Ecological Interest; 5,721 ha), and Engenho Gargau RPPN and Mata Estrela RPPN. Surveys over its entire range are needed to establish habitat preferences, area of occupancy, and population numbers.
It is listed on CITES Appendix II.
Fragaszy, D. M., Visalberghi, E. and Fedigan, L. 2004. The Complete Capuchin: The Biology of the Genus Cebus. Cambridge University Press, Cambridge, UK.
Freese, C. H. and Oppenheimer, J. R. 1981. The capuchin monkeys, Cebus. In: A. F. Coimbra-Filho and R. A. Mittermeier (eds), The Ecology and Behavior of Neotropical Primates, Vol. 1., pp. 331-390. Academia Brasileira de Ciências, Rio de Janeiro, Brazil.
Hershkovitz, P. 1949. Mammals of northern Colombia. Preliminary report No. 4: Monkeys (Primates) with taxonomic revisions of some forms. Proceedings of the United States National Museum 98: 323?427.
Hershkovitz, P. 1955. Notes on the American monkeys of the genus Cebus. Journal of Mammalogy 36: 449?452.
Jack, K. 2007. The cebines: toward an explanation of variable social structure. In: C. J. Campbell, A. Fuentes, K. C. Mackinnon, M. Panger and S. K. Bearder (eds), Primates in Perspective, pp. 107-123. Oxford University Press, Oxford, UK.
Oliveira, M. M. de and Langguth, A. 2006. Rediscovery of Marcgrave?s capuchin monkey and designation of a neotype for Simia flavia Schreber, 1774 (Primates, Cebidae). Boletim do Museu Nacional Botanica (Rio de Janeiro) 523: 1?16.
Pontes, A. R. M., Malta, A. and Asfora, P. H. 2006. A new species of capuchin monkey, genus Cebus Erxleben (Cebidae, Primates): found at the very brink of extinction in the Pernambuco Endemism Centre. Zootaxa 1200: 1-12.
Silva Jr., J. de S. 2001. Especiação nos macacos-prego e caiararas, gênero Cebus Erxleben, 1777 (Primates, Cebidae). Doctoral Thesis, Universidade Federal do Rio de Janeiro.
Silva Jr., J. de S. 2002. Sistemática dos macacos ?prego e caiararas, gênero Cebus Erxleben, 1777 (Primates, Cebidae). Livro de Resumos, X Congresso Brasieliero de Primatologia: Amazônia ? A Última Fronteira: 35. Bélém, Brazil.
|Citation:||de Oliveira, M.M., Boubli, J.-P. & Kierulff, M.C.M. 2008. Cebus flavius. In: IUCN 2013. IUCN Red List of Threatened Species. Version 2013.2. <www.iucnredlist.org>. Downloaded on 21 April 2014.|
|Feedback:||If you see any errors or have any questions or suggestions on what is shown on this page, please fill in the feedback form so that we can correct or extend the information provided|
|
<urn:uuid:6dd338a6-9f05-4c00-994f-334eb04882de>
|
CC-MAIN-2014-15
|
http://www.iucnredlist.org/details/full/136253/0
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609539493.17/warc/CC-MAIN-20140416005219-00559-ip-10-147-4-33.ec2.internal.warc.gz
|
en
| 0.70648 | 1,727 | 2.828125 | 3 |
Helpful Hints and Tips
Certain behaviors of computer users may unknowingly contribute to problems or the untimely demise of computer systems and other electronics. Here are some of these with tips on how to prevent problems from occuring. You may be destroying your computer and not even know it.
Smoking, Dust, and Dirt
Dirty environments are one of the biggest killers of electronics and tobacco smoke is likely the largest culprit. The fans inside your computer suck in outside air with all contaminants included. Tobacco smoke is especially bad because the tar in it acts as a glue. Dust and lint that would have normally passed through the fans and other cooling components of your computer now become cemented or glued together, forming a thick layer that can cause overheating and other failures. This is especially problematic in laptops with their tight internal spaces.
The best solution is to not smoke around your computer or other electronics but an air filter in your room near the computer might help. Also try to have your computer elevated some off the ground. Dust settles so computers sitting on the floor will suck in a lot more. It is possible to clean the insides of a computer so contact me if you feel this might be helpful in your situation.
Power Surges and Brownouts
Everyone knows that power surges are harmful to electronics but dips in voltage, commonly known as brownouts, are just as bad. Brownouts may occur from a tree brushing a live power line or a major load kicking on in your own home or a neighbor's on the same power line and are apparent when your lights dim. Voltage regulators within power supplies and other components must work extra hard to compensate for this low voltage. This shortens the life of these components and will eventually lead to their failure.
I suggest buying a battery backup Uninterruptable Power Supply (UPS) to protect against both surges and brownouts. Although this isn't as important in devices like laptops with an internal battery, it is critical for desktops. As with anything, you get what you pay for. Don't expect the cheapest UPS or surge protector to provide the same level of protection as a more costly unit. The specs are usually listed in fine print on the box or bottom/back of the unit.
Vibration and Mechanical Shock
Although computers and their components, especially laptops, are designed to withstand getting bounced around some, excessive vibration or drops will lead to failures. The most common failures are the hard drive and optical drives which are mechanical in nature. Hard drives are where all your information, programs, and operating system are stored so if they fail, your computer will no longer function.
Solid State Drives or SSDs for short have become increasingly popular and lower cost in recent years. SSDs feature no moving parts, are exceptionally forgiving to being bounced around or use in other extreme environments, use less power, generate less heat, and last but not least, are 10-20 times the speed of a traditional mechanical hard drive. Although an SSD is an upgrade for anyone, these characteristics make them an excellent choice used by people with on the go, outdoor, and critical jobs such as police, fire fighters, EMTs, utility workers, and the like.
Lack of Antivirus/Security
Viruses and malware are common on 90% or more of computers I service. These, along with people actively giving scammers access to their computers, causes most of the problems I see.
Improper DIY Repair Attempts
Do it yourself (DIY) repairs are a great way to save money and possibly learn something new by fixing problems with your home, car, or computer yourself. DIY repairs can also turn into a literal and costly nightmare if performed incorrectly. I have seen DIY repair attempts for what started out as minor problems turn into much more costly repairs or a ruined computer. I have seen more than one computer turn apart in pieces brought to me in a box. These are usually beyond economical repair. If you don't know what you are doing, leave repairs to the pros as it will save money in the long run.
Buying Cheap/Black Friday Sales
The old saying, "You get what you pay for" couldn't be more applicable to computers and electronics in general.
You may think the $250 doorbuster laptop you got on Black Friday was a "great deal". That is until you realize just how slow it is and the fact that it cannot be upgraded and the overall quality is lacking. The same goes for that discount computer you bought at the same time as that gallon of milk, package of toilet paper, and tube of toothpaste.
These discount units are among the most problematic and with good reason. Retailers pressure their vendors to sell something for as low of a price as possible and the quality suffers. They are "cheap" in the purest sense of the word. They may be the same brand and look similar to a higher priced unit elsewhere but they are not the same. They are usually made just for one retailer or sale day such as Black Friday.
That "great deal" isn't so good when the computer isn't able to do what you want and requires frequent repairs. It may end up costing you more than buying a more costly unit due to the repairs and upgrades, if they are even possible.
Leaving Laptop Power Cord Connected to Unit During Transport or Storage
With the exception of Apple, no computer manufacturer makes a laptop that is forgiving to having the power connector on the side or back abused. If you leave the power connector plugged into your laptop, this puts stress on the internal port of the unit. While power cords are a simple "plug and play" replacement, this usually results in damaging the internal connector which is not so simple or inexpensive to repair.
Uplug the power cord from your laptop when not in use. Sticking it in the carrying case with the cord still connected is a going to eventually lead to costly internal damage.
Temperature and Humidty Variations
Electronics/computers used in environments such as garages or shops are subject to temperature and humidity variations that shorten the life of various components. Keeping a constant but reasonable humidity level and temperature that prevents condensation from forming will go a long way towards extending equipment life.
If this is not possible, you might wish to consider upgrading to a Solid State Drive or SSD as they are much more forgiving to this type of environment. See the discussion on these in the section titled "Vibration and Mechanical Shock" to find out more.
|
<urn:uuid:1e36b104-c2a8-45eb-be4b-3883cf890140>
|
CC-MAIN-2020-24
|
https://cwatkin1.wixsite.com/a1techofrolla/hintstips
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347390755.1/warc/CC-MAIN-20200526081547-20200526111547-00151.warc.gz
|
en
| 0.960382 | 1,329 | 2.890625 | 3 |
Most TPMS sensors are held in using just a screw or a nut, but if not assembled or torqued properly, the results can be catastrophic. Carelessness can result in a broken sensor or even a customer being stranded with a flat tire.
The torque tools required to install TPMS sensors include:
- Torque wrench that measures torque in inch-pounds;
- Preset torque-calibrated T10 screwdriver; and
- Preset torque valve stem torque tool.
Anytime a clamp-on TPMS sensor is reused or replaced on a wheel, it is necessary to install new seals and valve stem nuts to ensure proper sealing around the sensor valve stem.
1. Wipe the area clean around the sensor/valve stem mounting hole in the wheel. Make sure the surface of the wheel is not damaged. Pieces of the old seal can cause a slow leak. Do not lubricate or use a sealant in this area. This can change the torque values and cause you to snap the stem.
2. If the valve core is removed, it must be replaced with a new valve core in order to avoid galvanic corrosion issues, which may cause the valve core to fail.
3. Insert the sensor through the wheel, keeping pressure against the rear of the metal valve stem. The potted side of the sensor is to be positioned toward the wheel. Mounting the sensor upside down can cause relearn and transmission problems. The two grommets seal the sensor and nut to the wheel.
Grommets conform to the mating surface of the wheel. The instant the nut is torqued, the seal/grommet starts to take on the shape of the surfaces it is sealing against. This memory cannot be erased. If the seal is reused, it could cause a slow leak.
Never reuse these nuts. The nut is made of a softer metal than the stem, so it can be damaged or develop hairline cracks if it is over-tightened. The material of choice is typically aluminum. The new nut may have coatings on the threads that prevent corrosion and leaks.
Before tightening the sensor nut, push downward on the sensor housing in an attempt to make it flush with the interior contour of the wheel. Some clamp-in stems have the ability to change the angle of the sensor by loosening a fastener that holds the sensor on the stem. Other sensors should assume the correct position when the nut is torqued.
4. While holding the sensor in position, tighten the sensor nut with a torque wrench. Typical torque values for the base nuts on a TPMS valve stem range from as low as 35 in.-lbs. of torque to as much as 80 in.-lbs. of torque. That’s quite a range. This does not mean that any torque value within this range is acceptable. It means that the torque specifications for the base nut on one car might require 44 in.-lbs., another might require exactly 62 in.-lbs., another might specify exactly 71 in.-lbs., and so on. Don’t guess. Look up the torque specifications for the vehicle you are servicing to make sure you use the correct torque. Over-torquing the sensor nut by as little as 12 Nm (106 in.-lbs.) may result in sensor separation from the valve stem.
Leaks cannot be eliminated by tightening the nut more. Sealing grommets are engineered to work at a specific torque. Any torque above the specified value will cause the seal to leak. Extra force may also damage the nut or valve stem or fracture the sensor body.
5. Mount the tire on the wheel following the tire changer manufacturer’s instructions, paying special attention not to damage the tire pressure sensor.
Snap-in Sensor Installation
Snap-in sensors can look like regular rubber valve stems. The difference is that the molded rubber on the snap-in valve stem does not reach the threads and there is a tapered shoulder. These valves have a longer cap than a non-TPMS valve stem.
Behind the stem is a mounting point for a self-tapping screw that holds the sensor to the stem. There are two installation methods depending on the type of snap-in valve stem you are installing. Always check the instructions or the manufacturer’s recommendation.
The first method is installing the valve stem in the rim and then attaching the sensor. The second method is to attach the sensor to the valve stem and then insert it into the wheel. Why? On some stems, the sensor could come in contact with the wheel as the stem is pulled with the sensor attached.
When attaching a new valve to the sensor body, always use a preset torque screwdriver with the correct torx head or hex nut. Most tool suppliers package two preset torque drivers in a set. The torque settings may differ by manufacturer. The screw is self-tapping and can be used only once. The same applies to the stem.
When tightening the screw, be mindful of stress on the sensor and the alignment of the sensor. Start the screw for the first couple of threads and make sure the sensor and stem are aligned. When performing the final tightening sequence, stop when the tool clicks, which indicates that the proper torque has been reached.
Before installing the valve stem, it is acceptable to lubricate the seating surfaces with an approved tire lubricant. Do not use chassis grease or a grease with petroleum distillates. These types of lubricants can degrade the stem over time and cause a leak. Lubricating the stem can help in the alignment of the sensor on the flats.
When using a tire valve stem installation tool, pull the valve stem straight through the valve hole rather than at an angle.
Some valve stems have a tab on the body of the valve that can help in the alignment of the sensor. For most applications, the rubber bulb of the valve should be resting against the rim and the sensor body should not be touching the rim.
|
<urn:uuid:33d812f3-9cf6-4a5b-b2c1-4523ce75dadc>
|
CC-MAIN-2020-10
|
https://www.brakeandfrontend.com/tire-pressure-sensor-service-installation/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146940.95/warc/CC-MAIN-20200228012313-20200228042313-00420.warc.gz
|
en
| 0.900833 | 1,224 | 2.765625 | 3 |
SPEECH TO THE YOUNG, SPEECH TO THE PROGRESS-TOWARD
by Gwendolyn Brooks
Say to them,
say to the down-keepers,
3 the sun-slappers,
6 "Even if you are not ready for day it cannot always be night."
You will be right.
For that is the hard home-run.
9 Live not for battles won.
Live not for the-end-of-the-song.
Live in the along.
ANALYSIS ON THE POEM
This poem is very interesting. Even the title is interesting. What does Progress-Toward mean? I think that the Progress-Toward are a type of people, like the Young. They are people who want to make the world a better place. To progress toward something better.
What is a down-keeper (line 2)? That's pretty simple: someone who keeps you down. When you feel happy, they make you sad. When you have a dream, they crush your hopes. We've all met at least one person like this in our lives.
What is a sun-slapper (line 3)? Most people associate the sun with happy things. Sun-slapper-type people want to take away those happy things. They are the clouds, and they want to intentionally block out the sun. This is probably because they're unhappy themselves, so they weant everybody else to be unhappy.
What is a self-soiler (line 4)? The literal meaning would be someone who didn't quite make it to the restroom in time. ;-) But, in this case, I think it is someone who has little (or no) self-respect. They degrade themselves, and put themselves down. They block out their own sun. Usually, these people want you to act like them.
What is a harmony-husher (line 5)? Most people equate harmony with peace, and hapiness. Someone who hushes harmony does away with peace and hapiness. These people have no reason to make the world unpeaceful, but they do it anyway.
The next line is: "Even if you are not ready for day it cannot always be night." This one I'm not quite sure about. It might mean that even though these people are not ready for the world to move on, it must. Even if they do not want to face the sunshine, the hapiness, they cannot stop it from coming. Then, line 8 says: "That is the hard home-run." Perhaps this means that doing what the poem says to do is hard?
In line 9: "Live not for battles won". I think this means to not dwell on the past. Dwelling on the past will get you nowhere. Line 10: "Live not for the-end-of-the-song", probably means, don't live for something in the future. Don't always be waiting for the right time, because it will never come. I think line 11: "Live in the along", means to live in the now. Do things now. Don't dwell on the past or wait for the future. The only way to predict the future, is to define it.
|
<urn:uuid:ab4e2572-ce50-4c5d-ba24-fe206e4380b3>
|
CC-MAIN-2020-16
|
https://m.everything2.com/title/Speech+to+the+Young%252C+Speech+to+the+Progress-Toward
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371799447.70/warc/CC-MAIN-20200407121105-20200407151605-00114.warc.gz
|
en
| 0.965324 | 668 | 2.96875 | 3 |
The attractive forces that hold the molecules of a liquid together are always the result of opposite charges from the opposite ends of polar molecules, although that polarity is not always inherent to the molecules involved. Even the electrons of molecules, which are not polar, are in constant motion, and in the presence of another molecule, momentary induced dipoles can be created. These are much weaker than inherent dipoles, however.Continue Reading
The strongest forces of attraction between molecules in a liquid are called hydrogen bonds, which are only possible in compounds like water with strongly polar covalent bonds between hydrogen and an electronegative element such as oxygen. Because the bond is so highly polar, the hydrogen atoms in water get a very small proportion of the shared electrons in the bond. Thus, they are able to form a partial bond with nearby oxygen atoms that are also bonded to hydrogen, which almost resembles a covalent bond but is substantially weaker. The normal attraction between polar molecules tends to be less than the extremes allowed by hydrogen.
There are other types of liquids that do not contain any molecules, however, and so they cannot be said to have attractive forces between molecules. These are molten salts, which are held together by the opposite charges of their constituent ions rather than any polarity in neutral molecules.Learn more about Atoms & Molecules
|
<urn:uuid:a794103d-6979-4dd5-9f75-d6c22ea1b23e>
|
CC-MAIN-2017-47
|
https://www.reference.com/science/attractive-molecular-forces-liquids-905859b837312291
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934804965.9/warc/CC-MAIN-20171118132741-20171118152741-00409.warc.gz
|
en
| 0.963464 | 269 | 3.8125 | 4 |
Why does it rain both fire and brimstone (gafris - 19:24) on Sodom surely one or the other was enough? Furthermore, if the whole city is 'turned upside down' (19:25) why was there a need to rain anything down at all?
Rav Moshe Shapiro in his lectures on the parsha asks a similar question. Here is the relevant extract of his analysis.
Mishna in Pirkei Avos says that the one who says "What's yours is yours, and what's mine is mine" is an ordinary person; but some say this was the opinion of the people of Sodom.
The meaning of this, is that the people of Sodom wanted to build a society where people would receive only that to which they have a direct right, for example by earning it. In other words, a society that is based on the pure middas hadin, denying rachamim the opportunity of existence.
This also explains Sodomites' law insisting on causing suffering to people who practice chessed and people to whom such chessed was done - it undermined their philosophical outlook.
Therefore, as what they did was not true din, but an inversion of true din, they get destroyed by Gavriel, the correct manifestation of middas hadin, and the instrument of realization was fire - the symbol of middas hadin.
|show 2 more comments|
The Midrash says that the reason why Sodom was punished the way they were was because Sodom was in Israel. In Israel a person is judged to a greater extent. One reason is because living in exile you get an atonement. Also we see from The Ramban that the Avos kept the mitzvot in Israel and Rachel died in order for Yakov not to violate having two sisters in Israel. Therefore Sodom was punished greater for big sins. As opposed to the same big sins outside of Israel where they are taken out through war.
|
<urn:uuid:511f2f92-df55-4a95-89a4-d90ed622e6cd>
|
CC-MAIN-2014-10
|
http://judaism.stackexchange.com/questions/27998/why-did-god-destroy-sodom-in-such-a-strange-way
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394678703748/warc/CC-MAIN-20140313024503-00055-ip-10-183-142-35.ec2.internal.warc.gz
|
en
| 0.982071 | 411 | 2.609375 | 3 |
In a bid to undermine parents everywhere who are trying to train their kids that food is for eating, and not for creating “scientific” experiments, a team of U.K. scientists have taken 1,000 underappreciated Brussels sprouts and used them to light up a Christmas tree.
The Brussels sprouts battery is on display at The Big Bang UK Young Scientists & Engineers Fair, and can power 100 LEDs. The science fair explains, in a press release:
The battery was created using five power cells, each holding 200 sprouts, producing 63 volts from the 1,000 Brussels sprouts (this comes into the extra low voltage category – like a telephone – and is safe to touch). Copper and Zinc electrodes are placed in each Brussels sprout to create a chemical reaction between the electrodes, generating a current which can be stored and used to power the LEDs on the tree.
It’s not really clear what generating current does to the Brussels sprouts themselves, but we’re kind of hoping they get reverse-roasted, so that they’re brown and caramelized on the inside and soft and tender on the outside.
|
<urn:uuid:2f02c751-3800-43dd-9ecf-60fba4414471>
|
CC-MAIN-2014-15
|
http://grist.org/list/mad-scientists-power-a-christmas-tree-with-sad-unloved-brussels-sprouts/
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609526252.40/warc/CC-MAIN-20140416005206-00386-ip-10-147-4-33.ec2.internal.warc.gz
|
en
| 0.932149 | 237 | 3.34375 | 3 |
Environmentalist to be Awarded Schweitzer Prize
The award, which includes a $15,000 honorarium, is presented annually by Johns University on behalf of the Alexander von Humboldt Foundation. Previous honorees include Jimmy Carter and former U.S. surgeon general C. Everett Koop.
Dr. Wayburn, of San Francisco, will be recognized for his "dedication to improving both the human condition and the Earth's condition," in the words of a citation to be read at a May 5 awards ceremony.
Dr. Wayburn's battle to preserve California's old-growth redwood forests began in the 1950s, when he helped establish Redwood National Park. Ultimately, more than 90,000 acres were spared, and hundreds of acres restored. Later, Dr. Wayburn was a key figure in the establishment of the Golden Gate National Recreation Area.
As president of the national Sierra Club, Dr. Wayburn testified often before Congress; he was influential in the passage of the Alaska National Interests Lands Act, which established the protection of more than 1 million acres of land.
He began his medical career in the United States Air Force in the 1940s, serving as a major and officer in charge of a mass chest X-ray service in Europe. Upon his return, he served as an internist and private practitioner in the San Francisco area; his affiliations include Pacific Presbyterian Medical Center, the San Francisco Department of Public Health and Stanford Medical School.
The Schweitzer Prize, named for medical missionary, theologian and musician Albert Schweitzer, was established to honor his service to humanity and to advance humanitarianism in the United States by recognizing similar achievements. The prize was created in 1986 by Alfred Toepfer of Hamburg, Germany. Dr. Toepfer was the founder of the Alexander von Humboldt Foundation.
The prize will be awarded at a 2:30 p.m. ceremony in Olin Hall on the university's Homewood campus.
Go to Headlines@HopkinsHome Page
|
<urn:uuid:f1266455-89cc-4722-89b1-a08ef8960534>
|
CC-MAIN-2014-10
|
http://www.jhu.edu/news_info/news/home95/may95/schweitz.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999668190/warc/CC-MAIN-20140305060748-00025-ip-10-183-142-35.ec2.internal.warc.gz
|
en
| 0.969132 | 414 | 2.65625 | 3 |
A proper tool handle is one of the basic requirements for the safety and high productivity of forest workers. Several forest tools have wooden and metallic parts. Substantial amount of work has been done throughout the world to design tool handles, which fulfill the agronomical and physical requirements of the job. In the case of wooden handles, the choice of the species depends upon its strength and other desirable characteristics. Beside strength and elasticity, other properties such as smoothness and the type of splintering that takes place during the failure of a handle are also important . Inhabitants of the area use different plants species in making agricultural implements, ploughs, tools handles, sticks, sickle, dagger, hoe, axe and knife handles. They are made from locally available hard and soft wood. Quercus leuctrichophora, Dalbergia sissoo, Morus spp. Diospyrus lotus, Acacia spp. Juglans regia, Melia azedarach and Olea ferruginea are among the commonly utilized species. The most preferred wood is that of Quercus leuctrichophora, Olea ferruginea, Morus alba, M. nigra, Melia azedarach, Psiticia integrrima, Salix tetrasperma, Populus alba, Diospyros lotus, Dalbergia sissoo and Acacia spp. (Fig. 2.5).
Was this article helpful?
Gastroesophageal reflux disease is the medical term for what we know as acid reflux. Acid reflux occurs when the stomach releases its liquid back into the esophagus, causing inflammation and damage to the esophageal lining. The regurgitated acid most often consists of a few compoundsbr acid, bile, and pepsin.
|
<urn:uuid:03cb4bdb-881e-4103-ad51-b3cfc642c85a>
|
CC-MAIN-2020-16
|
https://www.medicinalplantsarchive.us/medicinal-uses/agricultural-implements.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370496330.1/warc/CC-MAIN-20200329232328-20200330022328-00521.warc.gz
|
en
| 0.891567 | 388 | 3.46875 | 3 |
We may be slowly losing our intellectual and emotional capabilities due to the lack of evolutionary pressure.
This is according to two articles by Dr. Gerald Crabtree of Stanford University, who reasons that because intelligence was crucial for survival during the early stages of human evolution, there was great selective pressure on genes for intelligence.
But once humans achieved a certain amount of development, the agricultural revolution that led to urbanization, the selective pressures for intelligence weakened, allowing for more mutations on genes associated with intelligence to accumulate.
Dr. Crabtree estimated that all people now carry at least two mutations that could harm intellectual or emotional abilities. In addition, research found that genes involved in brain function are uniquely susceptible to mutations.
The combination of less selective pressure and the large number of easily affected genes could be eroding our intellectual capacities. The good news it that the process is quite slow and we are still smart enough to figure out how to find a solution to the problem, says Dr. Crabtree.
In time we will understand the function of the thousands of genes associated with intelligence and will be able to correct any mutations that may have occurred.
|
<urn:uuid:52745704-8c8b-4524-96e5-8c995af43eef>
|
CC-MAIN-2014-10
|
http://www.mh.co.za/health/is-the-easy-life-making-us-stupid/
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394011020120/warc/CC-MAIN-20140305091700-00064-ip-10-183-142-35.ec2.internal.warc.gz
|
en
| 0.949936 | 227 | 3.25 | 3 |
John Thompson took the reins of the U.S. Census Bureau in August 2013 with orders from Congress to dramatically lower the projected cost of the 2020 decennial census. His response was an ambitious plan to modernize procedures that would also shave $5.2 billion off a projected $17.8 billion price tag. If successful, Thompson’s plan meant that the 2020 count would come close to matching the $12.3 billion cost of the 2010 census.
Four years later, those projected cost savings appear to be in serious jeopardy. Annual budgets have fallen far short of what’s needed to fully implement Thompson’s plan, and internal costs have risen.
Hanging in the balance is the fate of the census itself, the nation’s largest civilian exercise, which is required by the U.S. Constitution. Thompson is also gone, and his 30 June departure has only added to the uncertainty at the government’s oldest and largest statistical agency.
This story, as well as companion stories to be published this week on ScienceInsider, takes an in-depth look at the myriad political, technical, and budgetary issues that are confronting the Census Bureau, which generates some of the world’s most widely used demographic data.
A re-engineered census
Why does it cost upward of $12 billion to get simple demographic information—age, gender, race/ethnicity, and household relationships—about every U.S. resident? The answer lies in how the Census Bureau carries out the mandate it was given in 1789 to conduct an “enumeration” of every person in each state for the purpose of apportioning the number of seats in the U.S. House of Representatives. Over time, the government has come to rely on data from the census and its longer annual offshoot, the American Community Survey (ACS), to allocate half-a-trillion dollars through health, welfare, housing, infrastructure, education, and other federal programs.
Close to two-thirds of the country’s population is fairly easy to count, it turns out. That large cohort—which probably includes anyone reading this story—respond promptly to the agency’s decennial query. But connecting with that final third of the population is what really drives up the cost. (The decennial census is actually a survey of the U.S. population and housing units, although that dual focus derives from tradition rather than from the original intent of Congress.)
Thompson confronted the challenge head-on by proposing to re-engineer the three major components of the census:
- the master address file that underpins everything else;
- self-response rates; and
- the massive workforce deployed to count those who don’t respond to the agency’s initial solicitation.
To pull off a complete and accurate 2020 nose count, that agency has to perfect what it calls “operations and systems.” There are some 35 of these, including internet and telephone systems for answering census questions, the traditional mail-in paper form, hand-held devices to help field workers track down those who haven’t already responded, and the use of information obtained from other government agencies or third parties—including geospatial data from satellites—to update the master file of 143 million addresses. Some systems and operations have changed little since the 1970 census, Thompson notes.
Upgrading those operations and systems for the 2020 census could save $5.2 billion, Thompson has estimated. It’s a coincidence, he adds, that the figure conforms to a congressional directive to do the 2020 count at the price of 2010’s. “I never actually promised that,” he says. “I just knew we could do things more efficiently. And I wanted a number I could stand behind, not one that we just pulled out of the air.”
His strategy assumed that Congress would provide the funding in the years leading up to Census Day on 1 April 2020 to ensure that all of the moving parts meshed. But that hasn’t happened. Since 2015, Congress has appropriated about $170 million less overall than the bureau has estimated it needs to stay on track for a modernized count. And the trend is going in the wrong direction.
For instance, the $800 million request from President Donald Trump for 2018 is $112 million below what Thompson had estimated 2 years ago would be needed for that year. And it appears likely that Congress will go along with that request, although it may not happen until well after the 1 October start of the next fiscal year.
With Census Day less than 1000 days away, Thompson says the agency is running out of time to recover from those skimpy budgets. The bureau “is moving ahead to do a complete and accurate census in 2020,” he asserts. “But Congress is, at some point, going to have to pony up the money that’s needed to do a good census.”
What that means is spelled out in the agency’s budget request to Congress for fiscal year 2017, submitted by the former President Barack Obama's administration in February 2016. The numbers may be scary to fiscal conservatives: $912 million needed in 2018, $2.05 billion in 2019, and $6.15 billion in 2020.
The good news, Thompson notes, is that those numbers are, respectively, $877 million, $1.6 billion, and $2.5 billion less than they would have been for those years absent a re-engineered census. But Congress shouldn’t be looking for additional savings, he warns: “Those numbers are not going down.”
In the meantime, its recent tight budgets have forced the Census Bureau to curtail, delay, or cancel several activities designed to test or implement improvements. In some cases, it has also meant ditching planned improvements and falling back on tried-and-true methods, including a method of first contacting millions of residents in rural and remote areas that Census officials had hoped to replace with a more efficient approach.
“As with everything else, we have to balance the risk versus our mitigation approaches,” Lisa Blumerman, associate census director and head of the 2020 Census, explained after a 11 July project management review, a quarterly update of the state of the 2020 census held at the agency’s headquarters in Suitland, Maryland. “Our focus is on procedures designed to ensure that we can conduct a complete and accurate census.
Census advocates don’t blame the bureau for taking that cautious strategy. But they say the approach is penny-wise and pound-foolish. “The Census Bureau is inadequately funded,” argued Representative José Serrano (D–NY), the top Democrat on the House spending panel that oversees the agency, at a markup last month of a 2018 spending bill. “The Trump administration has shortchanged the important planning and testing tools that are needed now to prevent higher costs in the future. Without this crucial testing now, initial response rates will drop and costs will rise.”
But his words, and those of other Democrats, fell on deaf ears. The panel’s Republican majority rejected Serrano’s amendment to add $384 million to the agency’s overall $1.5 billion request. On 13 July the full appropriations committee approved a bill that would provide only a $51 million boost in 2018 for the account that includes the 2020 census and ACS.
“I can’t do any more”
This fall the Census Bureau will issue a new estimate for overall cost of the 2020 census that will almost certainly be much higher than the earlier $12.5 billion price tag. But how much higher is anybody’s guess. And some of the increase can’t be blamed on Congress and the new administration: This spring Census officials disclosed that a new information technology system being used to manage the rest of the census’s interlocking systems will cost at least $309 million more than initially budgeted.
But Thompson won’t be around to find out the impact of those and other changes to his master plan. On 15 May he announced that he was stepping down as director and retiring from government on 30 June. (Thompson spent 27 years at the Census Bureau before joining the private sector in 2002, returning in August 2013 to lead the agency.)
He announced his departure less than a week after disclosing the IT cost overrun to congressional overseers. His boss, Secretary of Commerce Wilbur Ross, had already launched a review of all the cost estimates for the re-engineered census, saying he didn’t have confidence in numbers generated by an appointee of the Obama administration.
The implied partisanship at the government’s leading statistical agency may have been the last straw for Thompson. As director he made little headway in winning over conservative Republican legislators who have long complained that the 70-some question ACS, which in 2005 replaced the long form of the decennial census, is unduly burdensome and an invasion of privacy (see stories here, here, and here). And the agency’s recent budgets have certainly complicated his plans for 2020.
“You work and you work,” Thompson told ScienceInsider last week, “and at some point you take stock and you say, ‘I’m at the point where I’ve done all I can do and I can’t do any more.’ It’s time to go.”
Thompson says Ross never raised the option of his staying on, although a 2012 law aimed at minimizing disruptions during the 10-year census cycle would have allowed Trump to appoint Thompson to a second 5-year term. (Thompson was 4 months into a 1-year extension of his first term when he announced his departure.)
“The new person will be nominated by the current president and confirmed by the current [Republican] Senate,” Thompson says. “So he or she will have a real mandate. I’m not going to get into any finger pointing with Wilber Ross,” adds Thompson, who this week started a new job as head of the Commission of Professional Associations on Federal Statistics in Washington, D.C. “I respect him, and I know he wants to have a good census. And I’ll leave it at that.”
Ross has appointed two highly respected career Census Bureau employees—Ron Jarmin and Enrique Lamas—to lead the agency until a permanent director is in place. But they will have limited clout in dealing with Congress and the White House at a time when the agency needs a strong advocate.
One of the biggest challenges facing any director is riding herd on the wildly fluctuating budget for the decennial census. Over the current 10-year cycle, for example, it will rise from a low of $66 million in 2012 to a projected peak of $6.2 billion in 2020. At the same time, the long ramp-up gives Census officials some leeway in scheduling the iterative tests needed to ensure the seamless integration of individual systems and operations.
Census officials have been able to use that flexibility to absorb initial budget shortfalls for 2020. But they hit the wall in September 2016, when Congress failed to pass a 2017 budget on time and instead froze spending indefinitely at 2016 levels. On 18 October, Blumerman announced that she was canceling two field tests scheduled for April 2017, one in Puerto Rico and one on two Indian reservations in Washington state.
“Given the current uncertainty about FY [fiscal year] 2017 funding, the Census Bureau will not continue expending resources to prepare for the FY 2017 field tests, only to receive insufficient resources to conduct them,” her memo reads. “It is a risk we are unwilling to take.” Continued planning for the tests, she added, “would all but guarantee wasted efforts and resources.”
Her memo said that the agency still needs the information the canceled tests would have provided, and it raised the prospect of incorporating the tests into the final dress rehearsal for the 2020 census. Census officials had chosen three locations, with a combined 700,000 households, for the so-called End-to-End Census Test in April 2018. Each location offered a different set of characteristics that can be important in conducting the census. For example, Providence county in Rhode Island offered an East Coast, urban area with a varied population. Three counties in southern West Virginia represented a rural and mountainous setting. And Pierce county in southwestern Washington state featured a large military base.
Six months later, however, Census officials decided that the full dress rehearsal would take place at only one site, in Providence. The news was revealed in the president’s 2018 budget, and the unspoken but clear implication was that there wasn’t enough money in that request to conduct a three-site test. At this month’s project management review, Blumerman praised the demographics of the single remaining site and said, “We feel very comfortable that Providence county will allow us to test what needs to be tested in the End-to-End test.”
An internet option
The 2020 census will be the first one that can be completed over the internet. Previous versions consisted of paper questionnaires—some 400 million were printed in 2010—that needed to be filled out and mailed back. The paper version will still be available, although the agency plans to print only 140 million copies this time around. And paper will still be the only option for some 10% of the U.S. population living in rural and remote areas or without mailable addresses. For the first time, the public will also be able to complete the questionnaire by calling a toll-free number that will be staffed by trained operators offering assistance in several languages.
Census officials hope that most people will choose the internet option. Over the past 3 years it has run small-scale tests of the cloud-based operation in several cities that have gone relatively smoothly. But those tests can’t simulate what will happen after the census “goes live,” when officials say the website could receive as many as 2 million simultaneous hits.
The key to a high self-response rate is publicity. The Census Bureau conducts a massive communications campaign in the run-up to every census with help from thousands of local and regional governments, civic organizations, and corporate partners. But Census officials have canceled the advertising campaign that was to accompany the 2018 dress rehearsal, citing a tight budget. That decision eliminates the only scheduled large-scale test of what public service messages and other outreach efforts are most effective in raising self-response rates, as well as the opportunity to tap some of those partnerships before the buildup to 2020.
Getting good addresses
Another challenge facing the bureau is making sure it has reliable addresses. As part of preparations for the 2010 census, some 150,000 people walked more than 6.5 million kilometers to identify every housing unit in the country. For the 2020 count, Thompson has projected the agency could save almost $1 billion, and maintain its high standards, by tapping into readily available, high-resolution geospatial data. In particular, Census officials set a goal of having in-house employees verify 75% of the nation’s housing units by poring over satellite imagery and other data from commercial mapping services.
But last fall, citing a shortage of funds, Census officials canceled the second phase of that two-step in-house exercise, the part aimed at resolving discrepancies that had been identified by an initial analysis. The Census Bureau estimates it will now need to physically verify 30% of the units, a rise of five percentage points. The Government Accountability Office has estimated that the additional field workers could cost an extra $22 million, although it says the agency hasn’t tracked the current operations well enough to know how much additional canvassing will be needed in 2019.
Puerto Rico has traditionally presented a special challenge because of its nonstandard system of addresses. The agency had scheduled a field test this spring involving 123,000 housing units in the San Juan area in hopes of resolving those differences. The exercise would also have tested local attitudes toward using the internet self-response option, as well as any logistical problems related to offering Spanish versions of all three self-response options.
But the Puerto Rico test was canceled because of the budget shortfall. Also canceled were two scheduled tests this spring on two Native American reservations in Washington state, that were designed to measure the agency’s ability to use tribal enrollment data in enumerating residents as well as how the new electronic system of updating addresses works in areas without unique addresses.
Off the beaten track
Another recent change with potentially significant budgetary implications involves the agency’s interactions with some 12 million housing units in rural and remote areas. They are places without regular mail service and unique, city-style addresses, or those that are simply really hard to reach. These areas are not covered in the address canvass exercises done in advance of the actual census.
In past censuses, the first step was to have field workers update the list of housing units in their assigned blocks. Then they would knock on the door of those residences and hope that someone answers who is willing to be enumerated. If not, they would leave a note saying a census worker had been there and would be returning.
That operation was known as update/enumerate (U/E). One variation, called update/leave (U/L), involved updating the address but not knocking on any doors. Instead, the enumerator left a paper questionnaire, with a cover letter instructing the residents to mail it back.
The re-engineered census called for the elimination of U/L and the sole use of U/E in those areas. Only this time the field worker would verify or update the address electronically, presumably on a tablet, before knocking on the door. At that point, the census taker will leave information if no one is home, giving residents an option to respond through the internet or telephone, but also letting residents know that the census taker will return otherwise. The operation envisioned additional door-knocks for U/E households, unless the residents have answered the questions.
However, this month Blumerman announced the agency had decided to scrap that plan and, instead, would restore U/L for all but 500,000 of the 12 million units. The major difference, she explained, was that field workers will not be doing any enumeration after updating the address. “We will simply be leaving the package,” she said.
Blumerman said she could not comment on the cost implications of the new approach, pending release of the new life-cycle estimate, nor whether cost was a factor in the agency’s decision. But outside experts speculate that the agency may be banking on a high rate of self-response through the internet option, thereby reducing the percentage of households that would end up in the more costly nonresponse follow-up (NRFU) pool.
The proposed new U/E system was never tested in the field, notes Terri Ann Lowenthal, a census consultant and former congressional staffer based in Stamford, Connecticut, and that no such test appears in the revised schedule of remaining tests.
Another reason for its demise could be unanticipated logistical challenges. Atri Kalluri, who manages IT systems for the decennial census, told reporters this month that it isn’t possible for field workers to do both update and enumerate operations on the same mobile device because they require different software platforms that can’t run on the same device. He said census officials also don’t want to burden field workers with carrying two different devices, that is, a tablet and a smartphone. So any enumeration would have had to be done the old-fashioned way, with paper rather than electronically.
When they don’t answer
High self-response rates are the Holy Grail for census takers. But the reality is that rate has been dropping steadily, from nearly 80% in past decades to below 63.5% in 2010. And those nonrespondents are harder to find, thanks in part to economic disruptions and a growing population of immigrants.
“There is undoubtedly a lot of distrust of government among the immigrant community,” Thompson acknowledges. “So it’s going to take a real effort, especially through the partnerships, to get the word out and explain to the community why it’s important to be counted and that the census is confidential.”
There are two major components of NRFU. One is being able to weed out bogus addresses, that is, those attached to housing units that are vacant or that don’t exist at all. The second is getting the necessary information from valid addresses.
The Census’s traditional approach to that challenge was through field operations. That requires not just workers—600,000 in 2010—but also the physical infrastructure—12 regional centers and nearly 500 local offices—to manage them. The 2020 census hopes to cut those numbers in half, and save a projected $2.5 billion.
Some of the savings will come through automating procedures like recruitment, training, and payroll. But the real innovation for 2020 is the use of so-called administrative records. That refers to all the demographic information already on file with U.S. government agencies.
By and large, those records won’t obviate the need for people to answer the census because they are not sufficiently detailed to meet the bureau’s data quality standards. “Remember, they are not trying to do a census using administrative records,” Thompson says. “What they are trying to do is use administrative records where they can help the Bureau apply its resources more effectively.”
One such application is in reducing the number of viable addresses. Thompson estimates that Census may be able to eliminate up to half of the country’s vacant units—some 14 million in 2010—through the use of commercial and government records. That pruning, he says, will both reduce the number of units that enumerators must visit and improve the odds that someone will answer their knock on the door. In 2010, for example, enumerators visited a single address as many as six times in pursuit of the information.
“No time to lose”
Although he’s no longer in charge, Thompson says he has full confidence in the abilities of the current 2020 census leadership team. “They don’t need me to do a good job,” he says with a laugh.
But Thompson is deeply worried about forces beyond their control. “The FY 2019 budget will be really critical for the Census Bureau,” he says. “They have been deferring and deferring things. But nothing can be deferred in 2019. There’s simply no more time to lose.”
|
<urn:uuid:d382f75f-7700-4bac-8e59-3ff552c7e3f1>
|
CC-MAIN-2017-47
|
http://www.sciencemag.org/news/2017/07/money-politics-and-abandoned-homes-why-2020-census-might-be-jeopardy
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934805242.68/warc/CC-MAIN-20171119004302-20171119024302-00778.warc.gz
|
en
| 0.960093 | 4,729 | 2.71875 | 3 |
Atopic Eczema FAQs
Reviewed by Gary W. Cole, MD, FAAD
Take the Atopic Eczema Quiz First! Before reading this FAQ, challenge yourself and
Test your Knowledge!
Q:Eczema (also atopic eczema or atopic dermatitis) is a general term for types of skin inflammation. True or False?
A:True. The word eczema comes from the Greek word for bubbling. It is a weeping, oozing itchy eruption that has many causes, the most common being atopic eczema. Other causes include allergic contact dermatitis, irritant contact dermatitis, seborrheic dermatitis, stasis dermatitis, pompholyx (dyshidrotic eczema), and xerosis. In addition, there are a number of other diseases that can present with an eczematous appearance, including scabies and fungal infections.
Q:Atopic eczema has no known cause. True or False?
A:False. Atopic eczema is now thought to be related to defective production of skin protein called filaggrin in many cases.
Q:Is atopic eczema contagious?
A:No. Although a predisposition to atopic eczema can be inherited, it is not transmissible from person to person.
Q:What are some triggers for atopic eczema?
A:Sweat, soap and clothing. Environmental factors play an important role in triggering atopic eczema. It is not unusual for patients with atopic eczema to note that sweating during exercise, using harsh detergents, or wearing wool clothing can produce itching and trigger flares of atopic eczema.
Q:What are the first symptoms of atopic eczema?
A:Swelling, oozing, and crusting are all signs of atopic eczema. In a practical sense, swelling, oozing, crusting, and itching probably all occur simultaneously.
Q:Pruritus is the medical term for what?
A:Itching. Pruritus (proo-RYE-tuss) is the medical term for itching. Itching sensations are carried by peripheral sensory nerves called C fibers. They are the same fibers that mediate the pain sensations. Anyone who has itched knows that is almost impossible to ignore the sensation. Scratching the itch probably changes the sensation to something akin to pain, which seems easier to tolerate.
Q:In children and adults, atopic eczema usually occurs on the scalp first. True or False?
A:False. Atopic eczema usually begins in infancy or early childhood. Since many children slobber at this age, the saliva will evaporate and dry out the skin of the face, producing dermatitis on the cheeks. Children in diapers also often have eczema on their elbows and knees. Eczema typically does not affect the diaper area. In adults, the pattern is somewhat different; eczema most commonly affects the skin folds opposite the elbows and knees. In addition, the neck, wrists, and ankles often have lesions.
Q:Atopic eczema is best controlled by good skin care. True or False?
A:True. Good skin care means that the skin should be kept moist. This is particularly important in children or adults who have atopic eczema. After a shower or bath, before towel drying, a thin layer of an emollient (a greasy substance which water cannot penetrate) should be applied to the wet skin to inhibit the evaporation of skin moisture.
Q:Prescription treatments are available for severe atopic eczema. True or False?
A:True. If over-the-counter treatments fail to control atopic eczema, then it is time to see a physician. It may be necessary to prescribe topical steroids to control acute flares of dermatitis. Occasionally, other anti-inflammatory oral medications may be required for short-term control, and even ultraviolet light exposures can help manage serious persistent cases.
Q:How is atopic eczema diagnosed?
A:Currently, there is no single test to diagnose atopic dermatitis (eczema). Most of the time, a competent physician is able to diagnosis atopic eczema with great accuracy by taking a medical history and then examining the patient's skin. Rarely, it may be necessary to draw blood and even take a sample of the patient's skin for microscopic examination to rule out other causes of weeping, oozing dermatitis.
Q:Atopic eczema can mimic other skin diseases and infections. True or False?
A:True. Atopic eczema must be distinguished from a wide variety of other causes of weeping, oozing dermatitis. Many of these superficially similar conditions require very different forms of treatment.
Q:What types of things can irritate skin in people with atopic eczema?
A:Since the environment plays a very important role in skin hydration, the best answer to this question would be dry sand.
Q:The skin itches. Scratching the itch is temporarily satisfying but actually leads to more itching. This describes what?
A:The itch-scratch cycle.
Q:People who have been diagnosed with atopic eczema should avoid what kind of vaccine?
A:Patients with poorly controlled atopic eczema should avoid being vaccinated for smallpox.
Source quiz on MedicineNet
Improve your Health I.Q. on Atopic Eczemaback to top ↑
Atopic Eczema Related Slideshowsback to top ↑
|
<urn:uuid:38aac21a-b54f-48c9-a9f8-16366806022b>
|
CC-MAIN-2014-23
|
http://www.medicinenet.com/eczema_quiz/faq.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997859240.8/warc/CC-MAIN-20140722025739-00072-ip-10-33-131-23.ec2.internal.warc.gz
|
en
| 0.916356 | 1,185 | 2.859375 | 3 |
Did you know that in 2012, 54 percent of Montanans were born in Montana? Or that only 1 percent of Montanans were born in North Dakota in 1900 but in 1950 5 percent were? Or that 9 percent of Montanans in 1950 were born outside the U.S. (down from 28% in 1900 but much higher than 2012's 3 percent)? I didn't until I spent time examining an intriguing set of maps The New York Times published that showcase where most people in every state were born--in 2012, 1950, and 1900.
Looking at this map reminded me of how useful maps can be for understanding the world around us--and how amazing the internet is at connecting us to digital resources. There are many, many online map collections. I provide links to many Montana map collections in this old post from 2013.
And then there is this amazing 17 second animation that shows Indian land loss using the chronological collection of land cession maps by Sam B. Hillard, of Louisiana State University, which were published in 1972 in the Annals of the Association of American Geographers. I first saw this a few days after reading this post from History Tech about printing out a YouTube video. I tried it on this video and here's what I got.
But back to the topic that started my map quest: if you are looking for more information on immigration to Montana, the "Coming to Montana" footlocker is a great place to start. Although the footlockers are targeted to fourth graders, Coming to Montana has many lessons and primary sources that can be adapted easily to middle school, and even high school. And we've made many of the lessons and images available online, so they can be used even without ordering the footlocker.
This worksheet, created for use with chapter 15 of Montana: Stories of the Land (our textbook) features two highly revealing immigration maps as well.
Is there a map you find particularly revealing about Montana? Let me know and I'll share it.
|
<urn:uuid:516d4e51-24f3-4ad8-b663-28e0cc51b9c5>
|
CC-MAIN-2017-30
|
http://teachingmontanahistory.blogspot.com/2016/01/maps-and-immigration-but-mostly-maps.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424931.1/warc/CC-MAIN-20170724222306-20170725002306-00350.warc.gz
|
en
| 0.968537 | 409 | 2.953125 | 3 |
PCP HIV AIDS Toolkit/AIDS Handshake Game
HIV/AIDS Handshake Activity
Directions: Have all the participants sit in a large circle. Tell them that their circle represents their island, or their community. You can make it a more elaborate story - be creative. Tell them that shaking hands with another person represents having sex. Be sure to emphasize that AIDS is NOT transmitted through handshaking. Proceed with round 1.
Round 1: Tell them to get up and "have sex"/shake hands with 3 different people. Then sit down. Ask them how it was: was it good, was it nice to have sex with whoever you wanted, etc.
Round 2: While sitting in the circle have everyone close their eyes and you go around the circle and tap three people on the shoulder (the number depends on how many participants you have). Then have them open their eyes and inform them that the three people you tapped are now HIV positive members of their community. But they have no way of telling who those people are. The three people that were tapped can’t tell and they look healthy, so there is no way of knowing. Then have everyone get up and shake hands three more times. But this time the three people with HIV will subtly scratch the hands of the people they shake hands with. The scratching of the hand will symbolize transmission of HIV. After everyone has had “sex” call them back to the circle. Bring the three people you tapped to the middle of the circle and then ask who shook hands directly with those 3 to come to the middle of circle. They all have HIV. Discuss this: how do you feel, are you mad at the person, ect.
Round 3: Have everyone close their eyes again and this time you tap 3 different people. The instructions are the same. They will shake 3 hands. The people who were tapped will scratch the hands of their people. BUT this time, the people whose hands are scratched will pass it on and scratch the hands of their next people too. Bring the 3 people in the very center of the circle, then have the people they scratched make a small circle around the original 3, then have the people those people scratched make a larger circle around them. It will end up being A LOT of infected people in the community. Talk about feelings, transmission, etc.
Round 4: Repeat the same as Round 3 with different people being tapped to set it off. In the discussion after round 4 - talk again about transmission, how easily it can spread if couples don't communicate honestly, without even realizing it most of their community could become infected, etc. Then, ask if anyone chose not to have sex, not to shake hands. Talk about that - the option of abstinence. Then ask if anyone used a condom or protection. (Ex: covering their hand up with their shirt or hat or something while shaking) If anyone did think of that on their own give them some applause! Talk about how out of so many people how few chose to be safe, etc.
Round 5: Repeat. The idea this last time is that everyone will abstain or use protection & you can talk about how HIV/AIDS is preventable through education, communication and protection. Hopefully this will lead to a good discussion, with only the original 3 people in the center and everyone else still safe. Emphasize that AIDS is preventable through education and taking safety precautions. AND of course remind them again that HIV is NOT spread through shaking hands.
|
<urn:uuid:7b7bfc90-e477-4ca2-ac17-b6be3ff86a86>
|
CC-MAIN-2020-16
|
https://en.wikiversity.org/wiki/PCP_HIV_AIDS_Toolkit/AIDS_Handshake_Game
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370497309.31/warc/CC-MAIN-20200330212722-20200331002722-00228.warc.gz
|
en
| 0.972368 | 714 | 3.40625 | 3 |
By: Millie Knight
In a world that often seems fast-paced and disconnected, the value of empathy cannot be overstated. Empathy can be defined as the ability to understand and share the feelings of another person. It plays a crucial role in building meaningful connections, fostering understanding, and promoting positive change. On the other hand, apathy, defined as a lack of interest, concern, or emotion. Apathy can lead to disengagement and detachment from the world around us. In this blog, we’ll explore the importance of empathy, the dangers of apathy, and practical strategies to cultivate empathy.
The Importance of Empathy
Empathy is the bridge that connects us to others, allowing us to see the world through their eyes and understand their experiences and emotions. It helps break down barriers, foster communication, and build trust. When we empathize, we acknowledge the humanity in each individual, regardless of their background, experiences, or beliefs. This creates a foundation for compassion and cooperation, enabling us to work together.
The Dangers of Apathy
Apathy, on the other hand, can be harmful. When we become indifferent to the suffering or struggles of others, we contribute to a culture of neglect and disconnection. Apathy often arises from feelings of helplessness, but giving in to apathy perpetuates a cycle of inaction that only worsens the situation. Apathy can lead to social isolation, hurt relationships, and hinder personal growth.
Here are some practical ways to cultivate empathy:
- Active Listening: Empathy begins with actively listening to others. When someone shares their thoughts and feelings, give them your full attention without interrupting or judging. Validate their emotions by acknowledging their experiences.
- Put Yourself in Their Shoes: Try to imagine what it would be like to be in the other person’s situation. Consider their background, experiences, and emotions. This helps you gain a deeper understanding of their perspective.
- Practice Open-Mindedness: Approach interactions with an open mind. Be willing to learn from others and challenge your own preconceptions. This open-mindedness can lead to more compassionate and empathetic responses.
- Ask Questions: Asking thoughtful questions shows that you’re genuinely interested in understanding the other person’s point of view. It also encourages them to share more, allowing for a deeper connection.
- Share Your Own Feelings: Empathy is a two-way street. By sharing your own experiences and emotions, you create a space for mutual understanding and vulnerability.
- Volunteer and Engage: Getting involved in volunteering or community activities exposes you to different perspectives and challenges. This can foster empathy by putting you in direct contact with people who have diverse backgrounds and stories.
- Practice Self-Compassion: Being empathetic towards others starts with being kind to yourself. When you are able to be kind to yourself, you’ll find it easier to extend that kindness to others.
- Avoid Emotional Overload: While empathy is crucial, it’s important to avoid taking on too much emotional burden. Set healthy boundaries to protect your own well-being.
Empathy is a powerful force for positive change in the world. By understanding and sharing the feelings of others, we can build stronger relationships, bridge gaps, and contribute to a more compassionate society. Avoiding apathy requires a conscious effort to stay engaged, practice active listening, and open ourselves up to new perspectives. Let’s commit to cultivating empathy in our lives and making a meaningful difference in the lives of those around us!
|
<urn:uuid:f925e4e5-db84-4f71-909d-4ae168d98934>
|
CC-MAIN-2023-40
|
https://rebootrecovery.com/cultivating-empathy/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511170.92/warc/CC-MAIN-20231003160453-20231003190453-00302.warc.gz
|
en
| 0.916195 | 742 | 3.984375 | 4 |
Small and sweet
Baby bananas are called so because they are smaller with around 10 centimeters as
ordinary bananas. They taste much sweeter and more intense than the big ones, have
other good characteristics in common with them: bananas contain a lot of B vitamins, as well as the
Minerals potassium and magnesium. Because they contain little acid, they are suitable for
people with delicate stomach. The sweet fruits can also help with diarrhea.
The banana trees grow best in the shade of larger trees and grow along with beans or vegetables. The plant drives out always new perennials.The trees are chopped after the harvest and used as organic fertilizer. New plantations are created with seedlings. Apple-bananas ripen faster than ordinary bananas and get bruises easier. They must be handled very carefully. When the first brown patches appear on the skin, the optimum ripeness is reached. Anyhow, brown patches on the skin do not mean that the banana is not eatable any more, the contrary, usually the flesh remains in very good condition for many days.
|
<urn:uuid:6c70f73e-b594-4094-95ec-6190778b9eb7>
|
CC-MAIN-2017-26
|
https://www.biofach.de/en/ausstellerprodukte/bio17/product-9807872/apple-bananas
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320057.96/warc/CC-MAIN-20170623114917-20170623134917-00576.warc.gz
|
en
| 0.948319 | 215 | 3.046875 | 3 |
In the Israel Defense Forces Intelligence Corps base in the center of the country, every time a soldier approaches a streetlight after dark the light goes on. When the soldier moves away, the light goes off. It isn't an part of an advanced system for detecting intruders, it's an electricity-saving measure based on a movement-detection device.
Recycling and energy conservation have become bywords at today's army bases, part of the IDF's effort to prove that it is genuinely trying to come to terms with, and to change, its history as one of the country's greatest polluters and consumers of resources such as water and electricity.
For years, large quantities of nearly raw sewage flowed from IDF bases into rivers and water sources. Leaking jet-fuel pipes at the Hatzor base of the Israel Air Force caused one of the country's worst incidents of groundwater pollution. Exacerbating the situation is the fact that 40 percent of the infrastructure in the IDF's bases date from the British Mandate, which ended in 1948, and do not meet current environmental safety codes.
According to figures presented this month, by a senior official in the IDF Planning Directorate, at an IDF conference on environmental issues, problems early this month, the army imposes various restrictions on 53 percent of Israel's territory. These include barring entry to training grounds and restricting the height of buildings in more than 10 percent of the country, including in the major cities. The Defense Ministry is represented on all major planning and zoning councils.
"There are few parallels to this abroad," says geographer Dr. Amiram Oren, who co-authored "A Land in Khaki: The Geographic Dimension of Defense in Israel" (Carmel Publishing, 2008, in Hebrew). Oren recently invited experts to Jerusalem's Van Leer Institute to discuss the army's affect on land use.
The significant change seen in the IDF's approach to the environment was precipitated by a highly critical State Comptroller's report issued four years ago, which focused on pollution from army gas stations and sewage pipes.
According to IAF figures, the treatment of the jet fuel infrastructure has been improved and leaks have declined to a few isolated incidents a year. The air force is particularly pretentious when it comes to the environment. It calls its campaign "Blue goes green," a reference to its uniform colors and is planning, among other things, the construction of a large solar power station at the Nevatim base.
In response to Environmental Protection Ministry demands the IDF began with sewage runoff from bases in the Lake Kinneret catchment area. IDF officials say that matter will be dealt with through long-term planning, in accordance with budgetary restraints.
In recent years the Planning Directorate has assembled a panel of officers and noncommissioned officers with professional training in environmental issues. Some of them deal only with environmental matters, while others do so in addition to their other duties.
Sgt. 1st Class Effie Amsalem is responsible environmental quality on several bases, including the Intelligence Corps base in the center of the country. "I hate waste and decided to promote the installation of devices for saving water and electricity wherever possible," he says. Faucets are fitted with meter devices that deliver a specific amount of water, and motion detectors will soon be installed on room air-conditioners, so that they operate only when there are people in the room. Amsalem is working on replace diesel fuel with cooking gas in the water boilers. The watering system is already fitted with monitors, and Amsalem hopes to introduce both synthetic grass and solar panels for further savings in water and electricity use, respectively.
At the conference this month various IDF units presented environmentally friendly inventions developed by their officer. These include using missile storage crates to collect oil or gasoline, and using solar panels to provide electricity for fuel pumps. One senior officer presented an innovative method for breaking down obsolete explosives using bacteria, which was published in a professional journal.
Environmental Protection Ministry officials, however, say the defense establishment objects to expanding the powers of ministry inspectors to allow them to enter bases and monitor issues surrounding fuel leaks, sewage treatment and the storage of hazardous materials. "Some of the inspectors can be given a high security clearance so that they can enter even sensitive installations," Environmental Protection Minister Gilad Erdan says. "The army wants advance coordination, but then it's not really enforcement the way we do it in civilian plants, for example."
Erdan claims that currently there is an absurd situation in which his ministry prosecutes factory managers or mayors for failing to treat sewage properly, while the IDF has 150 bases with no sewage transport and treatment system. "It really is an expensive project to repair the entire infrastructure, but I don't understand this description of a long-term plan. What exactly is long-term - 100 years? - 1,000 years? This is an entity with a budget of tens of billions a year and I'm sure that they can work with the Finance Ministry to get additional funds," Erdan said.
While change is evident on certain fronts, the IDF is having much more difficulty shifting its policy governing the control of the land it needs for training and for storing equipment. In the past the IDF received public support for its control over the land, and groups such as the Society for the Protection of Nature in Israel were willing to make concessions for the sake of security needs. "In the past we agreed to the construction of an air force installation in a nature reserve in the Galilee, because the air force commander explained to us that from this installation they could see every plane that takes off from Damascus," explained Yoav Sagi, a leading SPNI official. Environmental organizations also understood that the army's presence often prevents civilian construction, turning the IDF into the protector of open spaces.
This approach changed with growing civil awareness of the need for public monitoring of planning and construction procedures, and of the great damage rendered to areas near military installations, such as at Atlit.
Environmental and legal advocacy organizations and planning experts have long demanded amendments to the article in the Planning and Construction Law that addresses the defense establishment. It grants the army broad powers to build as it sees fit and to oppose civil construction plans, and its permits are issued by a special planning committee whose proceedings are classified.
Legal scholars and experts who discussed the issue at the Van Leer Institute last year recommended expanding this committee and changing its members' security clearance to improve monitoring of military construction plans. They also proposed setting time limits on expansion projects in security installations and restricting the defense establishment's veto power over civilian projects.
In response, the army, the Interior Ministry and the attorney general recently approved the "security installation procedure," according to which if the army submits a construction plan that contradicts existing plans the committee will approve it only if it is proven that the construction is either urgent or classified and therefore ineligible for the usual planning process.
The experts also propose enabling public input on military construction plans in certain cases, for the first time, albeit for a limited period of time only. In addition, the final decisions would remain with the committee.
Military planning officials say that with the exception of secret or operational installations the proposed changes would create a procedure similar to civil planning procedures. Oren says this is not enough: "The army wants to keep all the power and therefore did not act to change the law. Effectively we are in the same situation, and the propsed amendment does not in effect change the army's involvement in civilian planning. We must make changes, via legislation. Public pressure must be applied to the defense establishment so that it will request the change on its own."
Want to enjoy 'Zen' reading - with no ads and just the article? Subscribe todaySubscribe now
|
<urn:uuid:b316a051-0784-449d-a71c-e3b9d6cc8750>
|
CC-MAIN-2017-39
|
http://www.haaretz.com/print-edition/features/the-idf-sets-its-sights-on-saving-the-planet-1.282914
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818687324.6/warc/CC-MAIN-20170920142244-20170920162244-00095.warc.gz
|
en
| 0.958732 | 1,579 | 2.578125 | 3 |
Throughout its history, Congress has acknowledged the responsibility to maintain full employment. However, they have increasingly deferred to the central bank for this role, and that is a big mistake. Full employment requires the right balance of federal spending and taxation, both of which are in the domain of Congress.
When the “Full Employment Bill of 1945” was introduced, it made the following declaration:
All Americans able to work and seeking work have the right to useful, remunerative, regular, and full-time employment, and it is the policy of the United States to assure the existence at all times of sufficient employment opportunities to enable all Americans who have finished their schooling and who do not have full-time housekeeping responsibilities to freely exercise this right.
This language did not make it to the final version of the bill that President Harry Truman signed the following year, but it was evident that Congress had the power and the ability to provide for work for any individual left out of the private sector economy. This power had been used in full effect by paying soldiers and procuring armaments for World War II.
Three decades later, Senator Hubert Humphrey contended that the employment provisions of the Employment Act of 1946 had been “conveniently ignored.” Senator Humphrey aimed to pass legislation that would make direct job creation an explicit requirement of the federal government if and when other measures were not adequately providing enough work for the population. Shortly after his death in 1978, the Humphrey–Hawkins Full Employment Act was passed, but without the provisions he advocated for, and with others that contradicted and undermined the full employment goal. Unfortunately, this pushed more responsibility to the Fed.
Congress took a wrong turn. Breaking the link between fiscal policy and full employment has a direct impact on human lives. As economist Stephanie Kelton explains, the Fed’s so-called dual mandate of full employment and price stability may be the right goal but wrong institution.
Capitalism runs on sales. A $17 trillion economy last year needs at least $17 trillion this year to keep up or the U.S. enters into a recession and people lose jobs. The government is a net contributor of sales growth whenever its spending exceeds its taxation; contrary to much political rhetoric, this is a very good thing. It helps maintain sales and employment levels when needed.
How does this work?
The effect of Congressional spending is that new currency enters the economy. Bank accounts are credited when orders are filled or income checks are deposited. Household incomes rise. Business sales and profits grow. Taxation reverses this process, removing money from the economy and reducing the spending power of businesses and households. As the currency-issuer, the federal government is the only entity that isn’t limited by its “revenues” for how much it can spend.
Given our multi-billion dollar trade deficits and the propensity of the private sector to want to save, both of which reduce sales, our government almost always has to spend more of its currency into the economy than it removes via taxes simply to keep our economy from recessions.
Can you see why this is completely normal? We have had government deficits for almost our entire history as a nation, for obvious reasons. We constantly need more currency to grow our economy and meet the growing demand for savings. Yet Congress continues to talk as though deficits are a sin, and we, the people, pay the price in sluggish economic recoveries, unnecessary unemployment and its resulting social problems, as well as underinvestment in our nation.
The federal government is the only entity that can always guarantee that those seeking a job can have one offered to them at a living wage, because it can always make payments in its own currency at the price it demands. Congress has a responsibility to manage the currency – via both tax policy and public-purpose spending – in a way that provides the economy with adequate spending capacity to fully employ those seeking work. This point was well understood for many decades, especially during and following World War II.
Yes, of course that responsibility also means not spending beyond the ability of the economy to produce, as that could be inflationary. However, the flip side is also true: Congress needs to be held accountable for starving the economy as much as overinflating it. Arguably, the former is the greater evil.
Congress must pay close attention to whether its tax policies and spending decisions are targeted for optimizing the “general welfare.”
If there is rising inequality, take a careful look at the structure of tax policy.
If there is unemployment, it is Congress, not the Fed, which must act.
Geoff Coventry is a founding member and owner of Tradewind Energy, Inc. Prior to this position, Geoff was a co-founder and vice president of NetSales, Inc. Additional postings by Geoff can be found on his blog “It’s The People’s Money.”
|
<urn:uuid:35ac234d-385c-4c5e-9161-8143b55b7f0e>
|
CC-MAIN-2017-43
|
https://patrioticmillionaires.org/2016/09/15/note-to-congress-full-employment-is-your-job-and-currency-is-your-tool/
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187822851.65/warc/CC-MAIN-20171018085500-20171018105500-00305.warc.gz
|
en
| 0.975776 | 1,010 | 3.265625 | 3 |
Diwali is a “Festival of Lights”
K M Chaudary/AP/Shutterstock
Diwali, Divali, Deepavali or Dipavali is a four to five day-long festival of lights, which is celebrated by Hindus, Jains, Sikhs and some Buddhists every autumn in the northern hemisphere. One of the most popular festivals of Hinduism, Diwali symbolises the spiritual “victory of light over darkness, good over evil and knowledge over ignorance.” Light is a metaphor for knowledge and consciousness. During the celebration, temples, homes, shops and office buildings are brightly illuminated. The preparations, and rituals, for the festival typically last five days, with the climax occurring on the third day coinciding with the darkest night of the Hindu lunisolar month Kartika. In the Gregorian calendar, the festival generally falls between mid-October and mid-November.
Diwali is India’s biggest holiday, transcending religions and cultures to celebrate the triumph of good over evil (as symbolized by lights in the darkness).
What Diwali literally means
The name “Diwali” is actually short for Dipawali (or Deepawali) which refers to the clay lamps (“deepa“) that celebrants arrange in rows (“avali“) outside their homes.
Diwali is multi-culti
Diwali began in the Hindu religion, but it’s been adopted across Indian culture (much like Christmas has been adopted across American culture). It’s also celebrated in many countries, particularly Asia, although please don’t count out the United Kingdom, whose lavish celebrations of Diwali are among the world’s most colorful (as shown in this photo taken on Diwali in Trafalgar Square).
Food is an essential part of Diwali…
“Indian sweets and desserts are called mithai and are a staple part of Diwali celebrations,” according to the Independent U.K. Many of the treats are fried foods made from sugar, chickpea flour, and condensed milk.
For more pictures and celebrations, see the following Readers Digest story:
|
<urn:uuid:d3e01d17-73f1-4422-830e-0eba87588e5f>
|
CC-MAIN-2023-23
|
https://tutoringyou.org/2019/10/diwali-sunday-october-27-2/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649348.41/warc/CC-MAIN-20230603233121-20230604023121-00703.warc.gz
|
en
| 0.920982 | 518 | 3.25 | 3 |
Every Day is Earth Day
In case you haven't heard, April is Earth Month!
This month is full of eco-focused activities and family friendly events that help to educate citizens and youth about the environments around us and ways that we can all participate in conservation and activism.
April also reminds us of some questions that often play on repeat for our staff, but are brought to light more during Earth Month. Will our next generation play in a clean ocean? Will our reefs be productive in the future? Will our streams run with clean water following heavy rains? Will we be able to stop the extinction of another endemic Hawaiian species in our lifetime? UNLESS we all work together towards a healthier planet, the answer is most likely NO. We must come together to provide opportunities to engage keiki with watershed education and begin to view restoring and protecting watersheds as a community activity and not someone else's responsibility.
At HOK, we see and interact with the broader community that actively participates in environmental programs and projects. We see the families, service organizations, students and community members coming to volunteer and participate in education to make sure we have healthy watersheds, clean beaches, productive reefs and a next generation of caretakers. We also strive to create programs and opportunities that welcome and engage the "eco-first-timer" and hopefully plant a seed in them to continue to connect with the environments around them.
So, whether you've got an itch to get dirty in the field with us or computer skills are more your style, HOK could use your help because together we can do more.
To all the volunteers and supporters of our causes, and supporters of the many amazing volunteer and environmental organization across the State, thank you for helping to protect and restore our ʻāina!
Your comment will be posted after it is approved.
Leave a Reply.
The mission of Hui o Ko`olaupoko is to protect ocean health by restoring the `aina: mauka to makai. This is done in partnership with stakeholders including interested citizens, non-governmental organizations, government, educational institutions and businesses while using and focusing on sound ecological principles, community input, and cultural heritage.
|
<urn:uuid:9d824aef-e6a2-4189-9ad9-d8151f648d9b>
|
CC-MAIN-2023-14
|
https://www.huihawaii.org/blog/every-day-is-earth-day
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943695.23/warc/CC-MAIN-20230321095704-20230321125704-00389.warc.gz
|
en
| 0.946967 | 478 | 2.609375 | 3 |
In today’s world of technology, the importance of STEM education, and its role in the future of innovation in science and technology is growing rapidly. To address the growing need for STEM education, U.S. Congressman Colin Allred created the STEM Scholars Program for rising Sophomores, Juniors, and Seniors who live in or attend high schools located within the 32nd Congressional District of Texas. The STEM Scholars program aims to connect highly motivated high school students interested in science, technology, engineering, and mathematics with four hands-on learning experiences throughout the district during the 2019 – 2020 school year. Click here to learn more about the program.
“As our economy grows and we face new challenges, it is so important that we encourage young people from all backgrounds to go into the fields of science, technology, engineering, and mathematics,” said Congressman Colin Allred. “I commend the University of Texas at Dallas for working to cultivate the next generation of leaders and problem-solvers right here in North Texas. I am committed to supporting all our students who want to pursue an education and career in STEM, and I look forward to visiting more businesses and facilities across North Texas for my STEM Scholars program.”
Approximately a dozen high school STEM students in the new program were given the opportunity to join Congressman Allred on a visit to the UT Dallas Computer Science Department, where they were able to learn more about the program as well as tour various research labs and interact with UT Dallas Computer Science faculty and students. During their tour of the school, the STEM Scholars and Congressman Allred visited Dr. B. Prabhakaran’s Multimedia Computer Systems Lab and Dr. Ovidiu Daescu’s Computational Geometry Lab for some hands-on learning experiences. The STEM Scholar students were able to test out virtual reality/augmented reality applications and see how artificial intelligence and machine learning can be applied to medical imaging specifically in various forms of healthcare and disease research. In Dr. Prabhakaran’s multimedia lab, Congressman Allred and the STEM scholars were able to again interact with various VR/AR applications, such as an interactive soccer goalie game and the NSF-funded 3D tele-rehabilitation program, which is a multi-modal immersive virtual reality environment that utilizes 3D cameras for tele-rehabilitation applications. The STEM Scholars were also able to talk with the research students about their projects, courses, and university life while studying at the UT Dallas CS Department.
The STEM scholars also attended a presentation by Department Head Gopal Gupta who talked about the excitement of studying computer science. He also gave an overview of the computer science department at UT Dallas. Provost Inga Musselman and Vice President Research Joe Pancrazio also greeted the group and shared their thoughts on UT Dallas’ vibrant and dynamic atmosphere that is conducive to promoting scholarship in STEM subjects. Faculty members Ovidiu Daescu, John Cole, and Karen Doore were also at hand to answer any questions that the STEM scholars and congressman Allred might have.
ABOUT THE UT DALLAS COMPUTER SCIENCE DEPARTMENT
The UT Dallas Computer Science program is one of the largest Computer Science departments in the United States with over 3,315 bachelors-degree students, more than 1,110 master’s students, 165 Ph.D. students, 52 tenure-track faculty members, and 44 full-time senior lecturers, as of Fall 2019. With The University of Texas at Dallas’ unique history of starting as a graduate institution first, the CS Department is built on a legacy of valuing innovative research and providing advanced training for software engineers and computer scientists.
|
<urn:uuid:ed12414b-9789-4440-b0dd-0141da653c85>
|
CC-MAIN-2020-24
|
https://cs.utdallas.edu/u-s-congressman-colin-allred-visits-the-utd-cs-department-with-stem-scholars/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347445880.79/warc/CC-MAIN-20200604161214-20200604191214-00379.warc.gz
|
en
| 0.955893 | 759 | 2.6875 | 3 |
82 - Julia Caesaris born around 82 BC, after her mother died in childbirth.
She was the daughter of Gaius Julius Caesar the dictator, by Cornelia Cinna, and his only child in marriage. She was the wife of Pompey the Great and renowned for her beauty and virtue.
59 - Married to Pompey the Great in April, with whom Caesar sought a strong political alliance in forming the First Triumvirate.
54 - Fell into premature labour, and her constitution received an irreparable shock. She died in childbed on August and her infant, a son, according to some writers, survived her only a few days. Caesar was in Britain, according to Seneca, when he received the tidings of Julia's death.
Page last updated: 3:31pm, 03rd Mar '07
|
<urn:uuid:157780ef-946f-41b2-8af8-f852833fc346>
|
CC-MAIN-2013-48
|
http://www.s9.com/Biography/Print/Julia
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163039002/warc/CC-MAIN-20131204131719-00025-ip-10-33-133-15.ec2.internal.warc.gz
|
en
| 0.986989 | 170 | 2.71875 | 3 |
According to a recent poll by Seat, over half of UK drivers admitted to not having read the Highway Code in the last five years, if at all. The Code changed quite considerably in January 2022, and although it’s not the law by itself, many of its rules are backed up by legal obligations, says the RAC.
What is the Highway Code?
Introduced in 1931, the Highway Code is a set of rules and guidelines for all road users, including pedestrians, cyclists, horse riders, drivers, and motorcyclists, and not just if you’re a learner driver. The Highway Code book was put together by the Driver and Vehicle Standards Agency (DVSA) and the Department for Transport and brings together the general rules, regulations, and guidelines road users must follow. If road users disobey the rules, this can lead to penalties, fines, or even imprisonment in some cases.
The Highway Code is constantly being updated but you can keep up with the latest amendments on the GOV.UK website. When the Code changed last year, one of the biggest changes was that it created the ‘hierarchy of road users’, where – in the simplest terms – the less vulnerable road user takes automatic liability in the event of a collision.
Little known facts about the Highway Code
Did you know that the Highway Code is full of interesting facts? There’s a lot to learn and plenty of information to get your head around, from things like speed limits, road signs and vehicle markings to stopping distances and road markings to pedestrians roads. Even motorists who have a full driving licence can struggle to remember some parts of the Highway Code.
Here are some examples of things you might not be aware of regarding the Highway Code:
When the Highway Code was first published in 1931 and it cost one penny. It did not mention mirrors, but it did carry advertisements. The first edition was only 18 pages long, according to Arnold Clark.
The Highway Code now includes seven different types of pedestrian crossing: zebra crossing, puffin crossing, pelican crossing, toucan crossing, staggered puffin crossing, staggered pelican crossing, and traffic lights. The Green Cross Code section was not added until 1978.
Rule 149 of the Highway Code advises you to “never use a hand-held microphone when driving”. This may seem obvious, but people still do it and it is still a legal requirement.
Rule 39 of the Highway Code states that “powered wheelchairs and scooters must not travel faster than 4 mph (6 km/h) on pavements or in pedestrian areas”. This is equivalent to a brisk walk, so you should be able to keep up with them.
Rule 48 of the Highway Code states that “all horse-drawn vehicles should have two red rear reflectors”. It also advises that it is safer not to drive at night, but if you do, a light showing white to the front and red to the rear must be fitted.
Why is Important to know the Highway Code?
Knowing the Highway Code is important for many reasons. For example, it helps you to stay safe on the road and avoid accidents. The Highway Code contains rules and guidance on how to deal with various road situations, such as junctions, roundabouts, crossings, overtaking, and emergencies. By following the code, you can reduce the risk of collisions, injuries, and fatalities.
It also helps you to follow the law and avoid penalties. Many rules in the Highway Code are legal requirements, and if you disobey them, you could face prosecution. This could result in fines, penalty points on your licence, disqualification, or even imprisonment in some cases, says the AA. By knowing the code, you can avoid breaking the law and getting into trouble.
Recapping the Highway Code from time to time will help you keep your skills and knowledge up to date. The Highway Code is regularly updated to reflect changes in vehicles, driving practices, and the law. By reading the code online or visiting its official website, you can stay informed of the latest developments and refresh your memory of the rules.
Is the Highway Code covered in a theory test?
The Highway Code is a fantastic tool for helping you to pass your driving theory test and become a qualified driver. The theory test is based on the Highway Code and tests your knowledge of the rules of the road. By studying the code thoroughly and taking practice tests online, you can prepare yourself for the test and increase your chances of passing. The quicker you pass this test, the quicker you can book your actual practical driving test and get on the road.
The test has two parts: a multiple-choice part and a hazard perception part. The multiple-choice part consists of 50 questions, and you need to score at least 43 out of 50 to pass. The questions are based on the Highway Code and other road safety matters, from how to spot a cycle lane to speed limit signs. The hazard perception part consists of 14 video clips, each showing one or more developing hazards. You need to score at least 44 out of 75 to pass. The hazards are related to the Highway Code and how you should respond to them.
If you don’t have the book you can also download the Highway Code app, which includes the same; the full contents, and it may also feature quizzes and other learning tools that can track your progress and test your knowledge.
Is the Highway Code discussed in a practical driving test?
When you think about it, the answer is yes, because you’ll need to show your examiner a working knowledge of the Highway Code by the way you drive. You also need to answer one ‘tell me’ question at the start of the test and one ‘show me’ question while you are driving. These questions are about vehicle safety and maintenance, and they are based on the Highway Code.
Types of questions
The ‘tell me’ question asks you to explain how you would carry out a safety task, such as checking the oil level or the tyre pressure. The ‘show me’ question asks you to demonstrate how you would use a vehicle control, such as the horn or the windscreen wipers. You can find a list of possible questions and answers on the official website of the Highway Code here.
You will get a driving fault if you answer either question incorrectly. You will not fail your test for this, but you will fail if you get 16 or more driving faults, or one serious or dangerous fault, says the AA. The best thing you can do to prepare for the practical driving test is to practise your driving skills with an approved instructor and follow the Highway Code at all times.
|
<urn:uuid:18049422-4694-4ca9-a4c8-929d1a9bfd5c>
|
CC-MAIN-2023-40
|
https://www.jamjar.com/blog/do-you-really-know-the-highway-code/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511386.54/warc/CC-MAIN-20231004152134-20231004182134-00575.warc.gz
|
en
| 0.954538 | 1,382 | 2.828125 | 3 |
Two of the biggest risk factors for prostate cancer are family history and ancestry. Men of Northern European and African descent have the highest risk of being diagnosed with cancer and aggressive prostate cancer, while a number of studies demonstrate that Asian men may have a lower risk of prostate cancer. Recent improvements in technology make assessment of a person's genome (or genetic code) more facile and affordable. One such method examines SNP (single nucleotide polymorphisms) as they vary from person-to-person and group-to-group. This is a method of "DNA fingerprinting" used by many forensic investigators. Evaluating SNP over a large population can provide data to locate changes in the genome that put a population at risk of prostate cancer. A number of studies have examined SNP in populations of European descent, African-Americans, Japanese and Latino patients.[1-7]
A recent study, in which researchers from Johns Hopkins participated, combined data from a number of these populations to find common genetic causes of prostate cancer around the world. The study combined data on over 87,000 men and found 23 new genetic variants that increase a man's risk of prostate cancer. These variants are found in "non-coding" portions of the genome – DNA regions that regulate genes rather than actually make proteins in the body. It is believed that these variants in the genome explain 33% of the familial risk of prostate cancer.
|William Isaacs, PhD and Alan Partin, MD, PhD|
Dr. Isaacs states,
the identification of prostate cancer-related SNPS could serve as a "molecular family history" to enable better screening guidelines and therapies.
The entire manuscript can be found in the March, 2014 issue of Nature Genetics.
Al Olama, A.A., et al., A meta-analysis of 87,040 individuals identifies 23 new susceptibility loci for prostate cancer. Nat Genet, 2014. advance online publication.
Quotations from this blog are from the press release, "Large Study Reveals New Genetic Variants that Raise Risk for Prostate Cancer," from Johns Hopkins Medicine and Vanessa Wasta.
Eeles, R.A. et al. Identification of 23 new prostate cancer susceptibility loci using the iCOGS custom genotyping array. Nat. Genet. 45, 385–391 (2013).
Eeles, R.A. et al. Multiple newly identified loci associated with prostate cancer susceptibility. Nat. Genet. 40, 316–321 (2008).
Gudmundsson, J. et al. Genome-wide association and replication studies identify four variants associated with prostate cancer susceptibility. Nat. Genet. 41, 1122–1126 (2009).
Schumacher, F.R. et al. Genome-wide association study identifies new prostate cancer susceptibility loci. Hum. Mol. Genet. 20, 3867–3875 (2011).
Thomas, G. et al. Multiple loci identified in a genome-wide association study of prostate cancer. Nat. Genet. 40, 310–315 (2008).
Cheng, I. et al. Evaluating genetic risk for prostate cancer among Japanese and Latinos. Cancer Epidemiol. Biomarkers Prev. 21, 2048–2058 (2012).
Haiman, C.A. et al. Characterizing genetic risk at known prostate cancer susceptibility loci in African Americans. PLoS Genet. 7, e1001387 (2011).
|
<urn:uuid:c630d379-0b2b-4b51-93dd-82eb1afbc9ec>
|
CC-MAIN-2017-43
|
http://bradyurology.blogspot.com/2014/09/hopkins-researchers-contribute-to.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824293.62/warc/CC-MAIN-20171020173404-20171020193404-00377.warc.gz
|
en
| 0.878332 | 712 | 2.640625 | 3 |
Submitted to: American Oat Workers Conference Proceedings
Publication Type: Proceedings
Publication Acceptance Date: 7/26/1998
Publication Date: N/A
Citation: N/A Interpretive Summary:
Technical Abstract: The USDA-ARS National Small Grains Collection (NSGC) is a large working collection of wheat, barley, oat, rye, triticale, and rice. The origins of these small grain collections date back to the beginning of the 20th century with the first USDA plant explorers. For the first half of the century, the collections were maintained individually by USDA Cereal Investigators. The NSGC was officially organized in 1948, bringing together the various small grain collections. The oat (Avena) collection presently consists of 20,781 accessions representing 17 species originating in 95 countries and regions of the world. Important components of the oat collection include 9,904 accessions of A. sativa and 8,264 of A. sterilis. More than 225,000 evaluation data records are available, including important disease, insect, quality, and agronomic characters. Passport and evaluation data are maintained on the Germplasm Resources Information Network (GRIN), available online at http://www.ars-grin.gov/npgs.
|
<urn:uuid:e393a421-b1c3-4ae4-832e-b4b2c62bebd6>
|
CC-MAIN-2017-43
|
https://www.ars.usda.gov/research/publications/publication/?seqNo115=92109
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187822739.16/warc/CC-MAIN-20171018032625-20171018052625-00556.warc.gz
|
en
| 0.873552 | 268 | 2.96875 | 3 |
The Vietnam Service Medal (VSM) is a decoration of the U.S. military presented to personnel of any branch of the U.S. Armed Forces who performed military service during the Vietnam War and meet specific qualifications laid out by the United States Department of Defense.
Recently, cases of cholangiocarcinoma (bile duct cancer) and hepatic pain in the United States have been described among Vietnam War veterans. The cause is Clonorchis sinensis, one of the most prevalent parasites in the world which is still transmitted in many regions of Asia. It is also known as the liver fluke worm. The fluke worm, Opisthorchis viverrini is another potential source of infection and has the same lifecycle as C. sinensis with habitat overlap, according to the Centers for Disease Control and Prevention (CDC).
Cases of liver fluke are rare in the United States as the parasite is not endemic to North America. In 2017, the Department of Veterans Affairs commissioned a study to investigate prevalence of liver fluke antibodies in 50 blood samples from Vietnam War veterans collected at a New York facility. Out of the 50 samples tested, more than 20% were positive. This study was issued after about 700 veterans with cholangiocarcinoma cases were observed by the Department of Veterans Affairs over the past 15 years.
Many claims for service-related benefits were not submitted, or if submitted, were rejected because the possible connection to Vietnam was unknown at the time. In 2016, 41 claims were submitted, and 60 claims were submitted in 2017. Although this type of cancer is rare, it is important for veterans and physicians to know the symptoms and tests available to diagnose this parasitic infection.
The parasite’s life cycle
begins when eggs are excreted by a human host into the environment. The eggs contain larvae that hatch and begin to thrive once ingested by a snail, the first intermediate host. Inside the snail, the larvae morph into a sporocyst that will eventually lead to a second larval stage. The parasite reproduces asexually, allowing for exponential multiplication of sporocysts within the snail. These larvae exit the snail body and enter freshwater where they attach to a fish. Upon attachment, they bore into fish muscle tissue and form cysts. Many species of fish and shrimp have been recorded as potential secondary intermediate hosts. The definitive, or final host, is a human. The parasite can survive in the muscle of freshwater fish and infects the human host when the fish is consumed, either raw or undercooked. While eating raw and undercooked fish was not any of the veterans’ first choice for sustenance, but when rations ran out the soldiers often had to resort to eating whatever was available, including raw fish.
The end of the larval stage occurs when the coating of the cyst is broken down by stomach acid and the larvae enter the bile duct to feed on bile. After about a month of feeding, the larvae mature to adult trematodes and begin to lay eggs.
Up to 4,000 eggs can be produced in a day; the high density of eggs and the prevalence of fish in the diets of people living in these areas are part of what makes the parasite endemic. Over time, the liver and bile duct tissues can become inflamed or obstructed, and liver cancer or cell death can occur.
C. sinensis induces an inflammatory reaction and can cause bile duct obstruction by the parasite itself or from its eggs. The liver fluke can be easily treated with praziquantel or albendazole if diagnosed early. While most infected persons do not show any symptoms, infections that last a long time can result in severe symptoms and serious illness. Untreated, infections may persist for up to 25-30 years, the lifespan of the parasite.
Over time, this parasite can cause life-threatening illness as it destroys the liver and can cause liver-related cancer. This pilot study indicates that liver fluke infection is fairly prevalent among Vietnam War era veterans and they should be encouraged them to get confirmatory ultrasounds to detect any abnormalities of the liver or other organs affected by this deadly parasite.
by Anna Klavins
|
<urn:uuid:29326b11-bdfa-44e4-a511-51622eb877d6>
|
CC-MAIN-2020-05
|
http://blog.hardydiagnostics.com/2018/05/parasites-taking-a-toll-on-unsuspecting-veterans/
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250597230.18/warc/CC-MAIN-20200120023523-20200120051523-00143.warc.gz
|
en
| 0.961944 | 866 | 3 | 3 |
Cecil County History: An Introduction
American Indians were the earliest inhabitants of what is now called Cecil County. The first white men to visit the area arrived by ship in the year 1608. The expedition was led by Captain John Smith, and through his written accounts we learn about the Indian tribes who lived along the shores of Cecil's rivers. The Toghwoghs lived by the Sassafras River. John Smith and his men found them to be friendly and of a gentle nature. The natives had never before seen white men and wanted to worship them as gods. The Minquas were located primarily in Delaware, but spread westward into Cecil. The Shawnase were a southern tribe, but they migrated north when they were being killed off in great numbers. They lived near the North East River and became basket makers and fishermen. Some remained even after white men moved to the area. Records show that a few were baptized in St. Mary Anne's Episcopal Church in North East, and one was on the payroll ledgers of Principio Iron Works. The largest tribe the explorers met was the Susquehannock Tribe with 600 people.
Captain Smith encountered the Susquehannocks while exploring the Susquehanna River. They had possession of the land between the North East and Susquehanna rivers whose waters were abundant with fish. Smith described them as the largest men he had ever seen, as if they were giants with big voices. They wore skins of bears and wolves. Heads and claws remained on the skins as they were slipped over the Indian's heads, adding to their larger than life appearance. The Indians met the white men with gifts of skins, bows, arrows, beads, and tobacco pipes. They were friendly with the white men, but could be a powerful force in war. The Susquehannocks were part of the Iroquois Nation of Indians, who considered themselves the most advanced on the east coast, and militarily strong. They frequently absorbed surrounding tribes in territorial wars.
Before leaving the region John Smith and his men explored the North East, Elk, Sassafras and Susquehanna rivers. He gave names to places he visited, many of which were changed by settlers in later years. He also documented descriptions of Indian weapons and eating utensils such as flint knife blades that were lashed to a wooden handle for cutting, and a tool that looks much like a rolling pin, used for the mashing and grinding of corn.
Though Cecil County was not established by Lord Baltimore and his colonists until 1674, a small settlement came prior to that time. In 1633, twenty five years after John Smith sailed the tributaries of the Upper Chesapeake Bay, Englishman William Clayborne opened a trading post on Palmers Island at the mouth of the Susquehanna. He traded beavers and furs with the Susquehannocks, and sold them to the French in Canada. A small settlement and a plantation surrounded the first white man's post in the area.
There are two names that will forever be linked to the establishment of Cecil County. The first is the Second Lord Baltimore, Cecilius Calvert for whom the County was named. He ruled the land called Maryland, after his father -The First Lord Baltimore died. The second name is that of Augustine Herman, one of Cecil's first land owners. Herman offered his masterful map making skills to create a map of Maryland, and in exchange received a large tract of land that spread out from the Bohemia River. Because of his skills he was considered an important man, and it was Herman who was able to convince Governor Charles Calvert to divide Cecil County out of Baltimore County. In 1674 Herman's wish was granted, and by proclamation, the boundaries for the new county of Cecil were established. The first courthouse was located on the Sassafras River.
During the century between the establishment of the County and the Revolutionary War, Cecil developed into a bustling yet rural region at the head of the Chesapeake Bay. The main exports at the time were skins, tobacco, and other agricultural products. The County consisted primarily of plantations, farms, mills, villages or towns, and water ports. At one point it is said that because farming was so important to the economy, the destructive nature of squirrels and crows became a genuine problem. Legislators put a price on the creature's heads in order to eliminate the overabundance of them. Money was scarce and not available for bounty, but citizens were allowed to pay their taxes with squirrels and crows.
By 1776 Cecil realized a need to arm local militia of the County. War with Britain was inevitable, and the Bohemia, Susquehanna, and Elk Battalions were formed. They didn't know at that time how outnumbered they'd be when the Kings troops arrived. Because of Cecil County's location, it became a very important place to the English Navy. On a hot stormy day, August 27th in the year 1777, three hundred ships with over 15,000 British soldiers, commanded by General Howe, landed on the shores of the Elk River. They marched to Elkton and made camp. There were more soldiers than citizens in the entire county. In anticipation of the enemy's arrival, people hid their horses, cattle, and valuables in the woods, so that the soldiers couldn't take them.
On August 25th, prior to the landing of the British, General George Washington traveled through pouring rain to reach Delaware and then Cecil County. He came to observe their situation, knowing that the British were sailing up the Chesapeake Bay. Washington stayed at Head of Elk in a hotel owned by Jacob Hollingsworth. On August 27th, General Howe slept in the same room and was waited on by the same servant who waited on Washington just two days prior. The British stayed in the County for a few days, planning strategy, stocking up on supplies, and waiting for the storm to pass. When they marched onward, it was to Brandywine and Philadelphia in Pennsylvania.
No battles took place on Cecil ground that August of 1777, but it was a time that Cecil Countians will never forget.
War of 1812
Less than one year after President James Madison persuaded Congress to declare War on Great Britain, British Admiral Sir George Cockburn blockaded the Chesapeake Bay and sailed up the Elk River with a large squadron of sailors. It was April 1813. American militia greeted them at Welch Point on the Elk River with musket fire, but had no cannon. They could only harass the enemy. The English sailed to Frenchtown, a traveler's port, and an important shipping point for supplies. Cockburn's men destroyed it.
They sailed on to Elkton, the County Seat, but met with resistance from Fort Defiance. They also met with quick thinking citizens who put a barrier across the water at Head of Elk. Despite repeated effort, ships could not get past it and close to the town. So they sailed back up the Elk River and charted a course for Havre de Grace where they burned 50 of the 60 homes, and plundered citizen's belongings.
Next, they sailed up the Sassafras River, capturing a small vessel carrying two Americans. They were dispatched by the British to spread a warning to Fredericktown and Georgetown, on opposite shores of the river. If the British met with no resistance, civilians and their property would be spared. They would only burn public buildings and vessels. The warning was ignored, and thus the enemy attacked with full force, burning and pillaging to their content.
They considered attacking Port Deposit, but were told by a prisoner that the town had militia that could put a bullet in an eye at a distance of 100 yards. Instead, they sailed to Principio Furnace, a primary manufacturer of cannons in the United States, located between Perryville and Charlestown. The cannons were considered highly reliable and accurate. Cockburn's men burned the plant, and destroyed finished weapons that were about to be shipped to American troops. The British navy had more soldiers and fire power than Cecil. The County suffered at the hands of British during the War of 1812, but the County Seat was protected by its citizens.
Though citizens of Cecil County did not have to endure battles on their soil, the County was touched by the Civil War. Maryland was a border state, with some supporting the Union forces, and others sympathizing with the Confederacy. Cecil County was much the same with vastly divided loyalties.
On April 19th in the year 1861, Union soldiers arrived in Baltimore, and were met by angry Confederate sympathizers. A riot ensued, with citizens attacking soldiers and tearing away pieces of train track. By the time the sun set on the tumultuous city that day, the final blows had not yet been felt. Under the cover of darkness the rail lines were burned and destroyed. Union forces seized a ferry to transport its forces to Annapolis. Vessels were dispatched from ports north to the shores of the Susquehanna River to serve as transport vessels. And as gunfire rang out to the south, Cecil County's Perryville became a critical staging area for Union soldiers and supplies. It was the furthest point south the northern army dared go by train. A camp remained at the location for sometime, thrusting the riverside town of Perryville into the history books.
In 1790 there were 3400 slaves in Cecil, which was a significant number. By 1850 that number dropped to 800. When the Civil War was over, the remaining slave owners had no choice but to free those who remained as slaves. For those landowners, the impact of the Civil War was great. For others, the divided loyalties of the region, and the losses that both sides sustained, left bitterness lingering in Cecil County for many years.
The original inventor of the steamboat was a resident of southern Cecil County. James Rumsey lived on the Bohemia River until the time of his death in 1792. He died in London while lecturing an audience about his steam boat. However, prior to his death, he had the opportunity to demonstrate his prototype for George Washington. Rumsey died before manufacturing his product, so others created and were credited with the ships that soon carried passengers.
One of the first steamboats frequenting the waters of the Chesapeake Bay was The Eagle. It was built in Philadelphia in 1813 and began serving Head of Elk (Elkton) in 1815. Travelers could board the ship in Baltimore any Tuesday, Thursday or Sunday at 4pm, bound for Cecil County. Passengers then took a stage coach from Elkton to Wilmington, Delaware, where they could board another ship that carried them on to Philadelphia.
Transportation: The C and D Canal
The year was 1824, and a project proposed by Augustine Herman in the 1600s finally began. 2,600 workers were hired to dig a ditch along a marshy strip of land between the Elk River and Delaware Bay to create a shipping canal. Laborers were paid 75 cents per day to pick, shovel, and drag mud out of the canal bed and up 90 foot summits. It took years of hard labor to complete the project. The 14 mile long, 10 foot deep, and 66 foot wide canal opened for business in 1829. Toll takers charged ships for the opportunity to save nearly 300 sailing miles. Mules pulled the ships through the canal and the mule owners made money as well - 25 cents per load.
Over the years the canal was widened and deepened, its locks were removed, and it was purchased by the Federal Government. Today, the 14 mile long canal is 35 feet deep and 450 feet wide. It's the busiest canal in the nation with the passage of 15,000 vessels per year from ports around the globe. Vessels vary from small pleasure craft to 900 foot ships, and visitors and locals alike, never miss an opportunity to watch the huge vessels slip beneath the town's majestic bridge. The C and D Canal Museum, adjacent to Chesapeake City, is housed in the old canal pump house and is open to the public, free of charge.
Transportation: The Railroad
In 1831 the New Castle and Frenchtown Railroad, linking Cecil County to Delaware was one of the first in the Country. It connected industry to canals and ports. It was initially created to protect trade routes from increased competition. At first, the engines were pulled by horses, but by 1833 steam locomotives began to chug their way along tracks, and soon Elkton got rail service. Within 30 years the entire County was covered with rail tracks heading in various directions, to carry passengers and goods to depots in far away places.
Transportation: The Automobile and other Vehicles
It was April in Elkton in the year 1900 and spring was in the air. Horses and riders enjoyed a warm spring breeze. Wagons laden with newly purchased goods lined the streets. Birds chirped. But then the air was filled with an unnerving sound. And WHAT was that SMELL?! The first to see it was a horse who took off in fright, taking his rider with him! The frightening object was the first horse-less carriage in Cecil County…an automobile, that would forever change the face of the community. Though the new invention took some getting used to, the automobile brought positive change to Cecil County. By 1901 the first vehicle was used by the Rising Sun Post Office to deliver mail to rural areas. Before that time, mail waited at the post office, often for long periods, to be picked up by the recipient. Motorized fire engines significantly cut down the response time for arriving at a fire scene. Delivery vehicles could traverse a route much more quickly, allowing more customers to be served. In 1929 Elkton purchased its first patrol car, setting the stage for a new era in law enforcement in the County. The changes brought about by the smelly, noisy contraption were exciting and endless.
Listed below are a few of the significant events of the 1900s up to the present:
1908 - FIrst hospital in the County opened it's doors under the name Union Hospital.
1910 - The worst of the ice gorges in Port Deposit's history ripped through the town. The ice slammed into structures and houses on Main Street, severely damaging many. A number of residents had to be rescued from second story windows, by brave souls on sturdy boats.
1920 - For the first time women in Cecil County and across the United States had the right to vote. In this year, 1000 Cecil County women registered.
1923 - Charlestown, on the North East River became a popular summer get-away. Vacationers came to stay in cottages along the shoreline.
1928 - Conowingo Dam began commercial operation. By harnessing the power of the Susquehanna River they produced electricity. As the last of the big gates closed to collect the water behind the dam, spectators watched as the water formed a 9000 acre lake, spreading across land and over rooftops of a village of 30 - 40 buildings called Conowingo. The village remained submerged forever.
1941 - A modern highway was built between Baltimore and Delaware, running right through Cecil County. Route 40 quickly became a popular transportation route.
1963 - President Kennedy cut the ribbon on the impressive new road called Interstate 95. It was the area's first expressway, and the area's last visit from the President. John F. Kennedy was assassinated 8 days later.
1968 - Cecil Community College was established, and opened its doors to the 107 students enrolled.
1976 - The Town of Elkton had a ribbon cutting and ground breaking ceremony at the sight of the 1st major shopping center in the County. Soon others popped up along heavily traveled roads in the county, taking business away from downtown Main Streets.
1987 - The first Bed and Breakfast Inn opened in the County, ushering in an era of increased tourism. Little by little, more attention was given to the tourism industry and its economic benefit. The Inn At The Canal, located in Chesapeake City opened its doors to weary travelers who wanted an overnight experience which differed from a stay in a motel.
1989 - Cecil County's newspaper - The Cecil Whig - became a daily. Prior to that time the closest dailies were out of Wilmington, Delaware, and Baltimore, Maryland.
1991 - Passenger train service returned to Cecil County. For years trains merely passed through, but the historic train station in Perryville re-opened, offering train service to points south.
1998 - The "Wall That Heals" visited Meadow Park in Elkton. It's a half scale replica of the Vietnam Veteran's Memorial in Washington D.C. Visitors who were touched by the War were able to come to Elkton and touch the Wall with names of 58,202 military men and women whose lives were lost in Vietnam.
1999 - An event called "The British Invasions of Cecil" took place. It celebrated the County's Revolutionary War and War of 1812 heritage.
Re-enactments, encampments, living history presentations, period vendors, and entertainment illustrated that our County's history has come full circle. As Cecil prepared to enter a new century, it celebrated momentous events from two previous centuries.
Elk Landing Foundation began. This organization was formed to promote and develop the Historic Elk Landing area. The site of the British invasion in 1813, this area is being developed as a living history museum. web site
An Englishman by descent, Smith was the first white man to explore the region that is now called Cecil County. His voyage originated in Jamestown Virginia in 1608, and his expedition sailed north to the head of the Chesapeake Bay. It was through his written accounts that we know about the Indians who inhabited the area, and what life was like for them during that time. He explored the North East, Elk, Sassafras, and Susquehanna Rivers, and met members of numerous Indian tribes.
Augustine Herman (spellings also found - Hermann and Hermen)
Herman first traveled on Cecil's soil in the mid 1600s. He was dispatched to carry messages from Lord Baltimore to Dutch leaders of the land along Delaware Bay. He quickly became an important man in Maryland. He was an expert map maker by talent, and after charting Maryland, he received extensive Cecil land holdings as payment. Herman was also considered a visionary. He had the vision to break Cecil County away from Baltimore County, which in fact happened in 1674. He also had a vision to carve a canal between the Elk River and Delaware Bay. Though this project did not happen during his lifetime, it did become a reality in 1829 when the C and D Canal opened for business. Herman is one of Cecil County's founding fathers, and he lived at his treasured homestead "Bohemia Manor", on the Bohemia River, until his death in 1686.
The Hollingsworth Family
Henry Hollingsworth brought his family to Cecil County early in the 1700s when he was appointed the County's surveyor. For generations they were considered prominent citizens who contributed to the community around them at Head of Elk. They were enterprising and industrious, and at one time engaged in milling and the manufacture of flour. It was believed that the patriotic Colonel Henry Hollingsworth (Henry Hollingsworth's grandson) did more to advance colonial rights than others in the region. He took an active part in the military under George Washington, and fought at the Battle of Brandywine. For the remainder of the war however, he returned home under authority of the Continental Congress. His home was strategically located along a much traveled route for soldiers moving north and south. It was his responsibility to purchase and provide numerous and varied supplies for the colonial troops, including ships and rafts. Many family members were property owners in the County, and today, the Hollingsworth name is frequently linked to Cecil's heritage. In the early 18th Century, Zebulon Hollingsworth purchased property called Elk Landing which now has importance in the future of tourism in Cecil County. web site
William Paca: Signer of The Declaration of Independence
1740 - 1799; Paca was a Statesman and Revolutionary War leader. He served the Continental Congress, and served as a judge. Later he became the Governor of Maryland. Paca purchased land and built a house in Charlestown, the first incorporated town in Cecil County, 25 years prior to becoming a signer of the Declaration of Independence.
1733 - 1798; He was a judge and Revolutionary War Statesman. He was born in Cecil County, and later moved to Delaware. He served as a member of the 2nd Continental Congress, and became a US Senator and State Chief Justice.
Jacob Tome came to the western shores of Cecil County, along the Susquehanna River in 1833 on a raft from York County Pennsylvania. When he arrived in Port Deposit, he was penniless but ambitious, and aptly illustrated a "rags to riches" story. He formed a partnership with men of greater means, and went into the lumber business. The men quickly prospered, and he invested well. Tome expanded his business holdings as far away as the Great Lakes region of the United States, and he quickly became one of the wealthiest men in Maryland.
Tome was a critic of county school systems, and used part of his wealth to establish Jacob Tome Institute. He was known for his generosity, and in 1889 he funded the operation of a free school for area youth, through his Institute. After his death in 1898, an endowment of Tome's created a prestigious school for boys at Bainbridge, on a bluff overlooking the Susquehanna River. The school prospered, and its income supported the free schools he believed so strongly in. However, as the county educational system improved, his schools suffered lower enrollments, and all but one eventually closed. The generosity and influence of Jacob Tome are still felt today in the historic village of Port Deposit, as well as at the last of Tome's private schools, located in the town of North East.
|
<urn:uuid:2f38cc71-dca0-4ba6-abbe-d7082dbd2239>
|
CC-MAIN-2020-16
|
https://www.ccgov.org/government/tourism/explore/history
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371807538.83/warc/CC-MAIN-20200408010207-20200408040707-00024.warc.gz
|
en
| 0.983978 | 4,548 | 3.75 | 4 |
How to Paint the Interior of Your Victorian Home
The "Painted Ladies" of San Francisco epitomize the house colors of the Victorian era. These Victorian row-houses, built in the mid- to late 1800s, have been restored and painted in their original colors. They surprise and delight with their whimsy of color and near overdecoration. The colors used inside Victorian-styled homes are a continuation of the colors used on the exteriors, with a few subtle modifications. Consistency and consideration for the limitations of color-production of the time will lead a homeowner to a successful color combination for her Victorian home.
Colors of the Era
The Victorian color palette was greatly affected by the pigments available to the paint maker. Natural pigments found in plants used to produce the colors tended to be less intense than the chemically produced colors of the early 1900s. Colors were often grayed by adding the complementary or opposite color. Popular colors included aubergine, mustard yellow, teal, plum, lavender, black, walnut and burgundy.
A three-color scheme was typical in Victorian home interiors. The main color in a three-color scheme typically appears on about 60 percent of the surfaces, the secondary color on about 30 percent and the remaining color on the accents and accessories. This is a decorating and design guideline that, while perhaps not specific to any particular design era, offers a formula for balancing the color usage in room. These schemes are composed of colors equally spaced on a color wheel. For example, a three-color scheme based on red has yellow and blue as the other two components. A purple-based three-color scheme is purple, orange and green.
Private spaces are those used primarily by family members, such as bedrooms. The colors in these spaces tended to be lighter than the colors in the rest of the home; soft colors predominated. For example, a purple-based color scheme in a bedroom could have pale lavender walls, soft peach-colored fabric on the windows and pale green-colored trim.
The public spaces in a Victorian home tended to have darker, more intense colors. This could be a reaction to the soot and dust in the air at the time and an attempt to camouflage the air-born soil. Dark purple, burgundy, walnut and even black are colors often found in these areas. A purple-based three-color scheme for a living room, for example, could start with aubergine on the walls, continue with deep burnt orange drapery and very dark green trim.
Wallpaper and Fabric
Printed wallpaper and heavily patterned fabric were prominent in a Victorian home and era-accurate color schemes may be taken directly from them. Select the background color of the fabric as the main, or 60 percent color. Choose the next most prominent color as the secondary, or 30 percent color, and the third most prominent as the 10 percent color.
- Hemera Technologies/AbleStock.com/Getty Images
|
<urn:uuid:2364fba1-cc85-47ba-a139-509bb0f2d634>
|
CC-MAIN-2020-34
|
https://homeguides.sfgate.com/paint-interior-victorian-home-46156.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439739182.35/warc/CC-MAIN-20200814070558-20200814100558-00425.warc.gz
|
en
| 0.94726 | 616 | 2.75 | 3 |
Making anything in Illustrator involves using the shape tools more often than not. You combine shapes, using the various methods with pathfinder. You may have two shapes and want to combine them, but still want to refine the overall shape. This post shows you two options.
There are two techniques
The first technique combines two shapes but allows them to appear like one. This is handy for manipulating a shape that is transparent or refining in general. The second is a quick way of doing a clipping mask. This is handy for creating highlights and shadows, not having to worry about the outer shapes.
Method one: non destructive pathfinder
Pathfinder is one of the handiest tools within Illustrator which by default will combine shapes removing all knowledge of the previous state.
Open the pathfinder
You can do this by finding Window > Pathfinder.
Draw your shapes
Next the best way to demonstrate this is to draw two shapes, overlap them and reduce their opacity.
Select your shapes and hold alt using a pathfinder option
The important part is to hold alt, it will combine both shapes without destroying their paths.
After making using the pathfinder on the shapes, you’re free to change them as you like.
Use the direct selection tool to edit further
To select a shape press a to use the direct selection tool. You can also double click to isolate them, which can be easier to change the shape.
Method two: choose a drawing mode
Choosing a different drawing mode allows three options: normal, inside and behind. For this example you need inside.
Select an object
To be able to change drawing mode you need to select an object, so it can be used as a mask.
Change to the inside drawing mode
With the drawing mode, generally you will want to choose inside. This is a quick way to create a clipping mask out of any shape. The benefit is you can draw multiple shapes inside another shape and not worry too much about the remainder.
The icon can be found below the fill and stroke options in the toolbar.
A dotted border should appear
This is how you know when a different drawing mode is active. You’re free to draw shapes anywhere, however, parts will not be visible outside of the mask.
To exit select normal drawing mode
Once you’re done with drawing inside you can select the normal drawing mode.
These are two methods which allow you to combine shapes non destructively. Are there any that have been missed? Let me know on twitter.
|
<urn:uuid:a1265f02-3945-4575-b1fb-b70cfefd9936>
|
CC-MAIN-2017-34
|
https://iamsteve.me/blog/entry/illustrator-non-destructive-shape-editing
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886110485.9/warc/CC-MAIN-20170822065702-20170822085702-00572.warc.gz
|
en
| 0.924873 | 518 | 3.171875 | 3 |
Your doctor is likely to start with a medical history and physical examination.
After that, your doctor may recommend:
Nov. 27, 2014
- Enzyme tests. Damaged muscles release enzymes, such as creatine kinase (CK), into your blood. In a person who hasn't had a traumatic injury, high blood levels of CK suggest a muscle disease — such as muscular dystrophy.
- Electromyography. An electrode needle is inserted into the muscle to be tested. Electrical activity is measured as you relax and as you gently tighten the muscle. Changes in the pattern of electrical activity can confirm a muscle disease.
- Genetic testing. Blood samples can be examined for mutations in some of the genes that cause different types of muscular dystrophy.
- Muscle biopsy. A small piece of muscle can be removed through an incision or with a hollow needle. Analysis (biopsy) of the tissue sample can distinguish muscular dystrophies from other muscle diseases.
- Heart-monitoring tests (electrocardiography and echocardiogram). These tests are used to check heart function, especially in people diagnosed with myotonic muscular dystrophy.
- Lung-monitoring tests. These tests are used to check lung function.
- Darras BT. Clinical features and diagnosis of Duchenne and Beck muscular dystrophy. http://www.uptodate.com/home. Accessed Oct. 24, 2014.
- NINDS muscular dystrophy information page. National Institute of Neurological Disorders and Stroke. http://www.ninds.nih.gov/disorders/md/md.htm. Accessed Oct. 23, 2014.
- Mercuri E, et al. Muscular dystrophies. The Lancet. 2013;381:845.
- Benditt JO, et al. Pulmonary issues in patients with chronic neuromuscular disease. American Journal of Respiratory and Critical Care Medicine. 2013;187:1046.
- Darras BT, et al. Myotonic dystrophy: Etiology, clinical features, and diagnosis. http://www.uptodate.com/home. Accessed Oct. 24, 2014.
- Darras BT. Treatment of Duchenne and Becker muscular dystrophy. http://www.uptodate.com/home. Accessed Oct. 23, 2014.
- AskMayoExpert. What physical and occupational therapy interventions are available for muscular dystrophy (MD)? Rochester, Minn.: Mayo Foundation for Medical Education and Research; 2013.
- AskMayoExpert. Can braces or adaptive equipment help with muscular dystrophy? Rochester, Minn.: Mayo Foundation for Medical Education and Research; 2013.
- Darras BT. Patient information: Overview of muscular dystrophies (beyond the basics). http://www.uptodate.com/home. Accessed Oct. 23, 2014.
- Selcen D (expert opinion). Mayo Clinic, Rochester, Minn. Nov. 3, 2014.
- Abresch RT, et al. Exercise in neuromuscular diseases. Physical Medicine & Rehabilitation Clinics of North America. 2012;23:653.
|
<urn:uuid:fdfc867c-2634-4bdb-b9cf-9e4fc4f4352f>
|
CC-MAIN-2017-39
|
http://www.mayoclinic.org/diseases-conditions/muscular-dystrophy/basics/tests-diagnosis/con-20021240?footprints=mine
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689615.28/warc/CC-MAIN-20170923085617-20170923105617-00683.warc.gz
|
en
| 0.819576 | 675 | 2.875 | 3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.