text
stringlengths
199
648k
id
stringlengths
47
47
dump
stringclasses
1 value
url
stringlengths
14
419
file_path
stringlengths
139
140
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
50
235k
score
float64
2.52
5.34
int_score
int64
3
5
A transfer of 20 mountain caribou from northern to southern B.C. went reasonably well, officials say, despite weather complications and the death of one of the animals en route. Over the weekend, government biologists and veterinarians attempted to transfer 20 caribou from a healthy donor herd in the Dease Lake area, about 250 kilometres south of the B.C.-Yukon border, to the endangered southern Purcell herd in the East Kootenay. The animals travelled by truck from Dease Lake to Kimberley, then were transferred by helicopter to two sites in the southern Purcells, a 1,300 kilometre journey. One of the caribou died during the transfer — probably from stress, said government biologists — and weather prevented the team from dropping the 19 remaining animals all in the same area. Ten of the caribou were put near the existing herd, but the other nine had to be dropped in a different valley. Officials hope the three herds will eventually reunite. Transplant a boost for caribou herd Still, the transfer was a success, said John Bergenske of Wildsight, an environmental group that helped with the transfer. "It was a day that so many of us have been waiting for, literally, for years in terms of trying to bring caribou herds in the Kootenays back into what they once were," said Bergenske. "Our hopes are they will thrive and adapt to habitat and help recover mountain caribou in southern British Columbia." The southern Purcell herd near Kimberley has dwindled to just 15 animals, and officials hope the transplanted caribou will boost the struggling herd. All the animals have been radio collared and biologists will study their movement patterns. Wolves and cougars in the area have also been radio collared, and if they start to attack the transplanted herd, the predators may be destroyed. If the northern caribou adapt well to their new surroundings, another 20 will be relocated next year, at a cost of $10,000 each. Officials say they hope the population will naturally grow to 100 animals by 2027.
<urn:uuid:beb73d49-2934-411b-8a2f-9faf56d35a39>
CC-MAIN-2016-26
http://www.huffingtonpost.ca/2012/03/06/bc-caribou-herd_n_1324532.html?ref=green&ir=Green
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783394605.61/warc/CC-MAIN-20160624154954-00181-ip-10-164-35-72.ec2.internal.warc.gz
en
0.959866
444
2.65625
3
Franklin, the seat of Macon County, is located on the remains of a sacred Cherokee site, Nikwasi. Within the Cherokee culture, the name is translated to mean “center of activity.” The mound itself has decreased in size since its construction. The estimated date of construction is ca. 1000 A.D. Ancient mounds were common in what is now North Carolina when the first European explorers and settlers arrived. The mound at Nikwasi is one of about thirty formerly in place in the mountain region. An active Cherokee village until 1819, today all that remains is a large mound. Original Date Cast: The Cherokees treated Nikwasi as a spiritual and ceremonial center. The town is thought to have occupied around 100 acres, with a large square to the east of the mound. Remnants of a ramp leading from the town square in the east to the top of the mound are still visible today. Nikwasi was the ceremonial town of the Middle Cherokees, who inhabited present-day Macon County until their lands were overtaken in 1819. In 1730 Scotsman Sir Alexander Cuming held a council of Cherokee leaders at the council house, then located on the mound. Cuming recruited local headman Moytoy to act as “Emperor of the Cherokee.” With Moytoy’s support, Cuming persuaded those present to pledge their allegiance to King George II. Soon thereafter, Cuming traveled with a group of Cherokee representatives to England, where the men were coerced into signing "Articles of Friendship and Commerce." In September 1776 state militia led by Griffith Rutherford marched across the region destroying all Cherokee crops and villages, including Nikwasi. The campaign was an act of retribution for the punishment enacted by the native people against the newly arrived settlers. The Cherokee continued to inhabit the sacred site until 1819, but were slowly pressured from the surrounding areas by European settlers. After the formal concession of their lands to the United States government, the town of Franklin was built on the former land of Nikwasi. Today the large mound in the center of Franklin’s commercial district best displays the ancient past of a sacred Cherokee and earlier aboriginal tribes’ town. Barbara McRae, Franklin’s Ancient Mound: Myth and History (1993) Burt Kornegay, “Nikwasi: Sacred Fire,” Wildlife in North Carolina (July 2000) William S. Powell, ed., Encyclopedia of North Carolina (2006) William S. Powell, North Carolina Gazetteer (1968) Articles of Friendship and Commerce: Unpublished paper on Cuming’s visit: http://www.iga.ucdavis.edu/Research/All-UC/conferences/2006-fall/Chambers.pdf
<urn:uuid:676c0517-fb55-4355-a904-75652fbd6257>
CC-MAIN-2016-26
http://www.ncmarkers.com/Markers.aspx?sp=Markers&k=Markers&sv=Q-9
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395620.9/warc/CC-MAIN-20160624154955-00191-ip-10-164-35-72.ec2.internal.warc.gz
en
0.950587
579
3.875
4
2 Answers | Add Yours The naval officer has two major functions in the story: a representative of the adult world and a representative of the world war that is engulfing the outside world. This novel is primarily a coming of age story. At the end of the story the once happy-go-lucky Ralph weeps for the "end of innocence." A coming of age story almost by necessity must include a representative from the adult world. The first representation is the dead man with a parachute, who instead of creating order, creates more chaos. The second is the naval officer who presumably rescues the boys from their own destruction. He sees the savages as little boys, and ironically teases them about playing war. He scolds them by telling them that as English boys they should have done better. The events that the boys have been involved in sharply contrast the officer's perspective of them as children who play together. Yet, it is a no coincidence that the man who rescues the boys is an officer of war. Throughout the novel, Golding reminds us that the adults are faring no better than the children on the island,. The conflicts, violence, savagery on the island make it a microcosm for the world at large. The adults are not "sitting down and having tea." They are engaged in their own war, and the military uniform of the naval officer is a reminder of that. The officer's eyes rest on the cruiser in the ocean. Will it be the boys' rescue or their entry to another war--even more devastating that the one on the island? Are they truly rescued? Is order really restored? The naval officer symbolizes plenty of things: First, it is a paternal figure which the boys desperately need. Second, it is a figure of authority and salvation, which the kids are also desperately in need of. Third, it is the first contact the boys have with the outside world. Fourth, it is a figure of discipline, order, and organization- those are the very things that the boys lost when they were left to their own devices. Fifth, he represents reality. Even the Naval Officer himself was a bit grossed out at the state of the children, and the children did not respond to him in a child-like or infantile way: Instead, everyone was shocked in both sides, and that is the same way reality hits- shockingly at times. Finally, the naval officer represents salvation and a return to humankind. The boys had been living in a semi primitive state. How interesting that it is a NAVAL officer, one who commands the ocean (a very uncertain element) appears to re-organize and save the boys. Yet, naval officers equally follow nature's signs, and use objects to guide them through the most unreliable elements, and make it. Therefore, the naval officer is the ultimate salvation to the boys. We’ve answered 327,755 questions. We can answer yours, too.Ask a question
<urn:uuid:f61ff586-8cd9-4205-bc0a-343b5ed55526>
CC-MAIN-2016-26
http://www.enotes.com/homework-help/assess-last-paragraph-what-symbolic-nature-naval-217495
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396147.66/warc/CC-MAIN-20160624154956-00133-ip-10-164-35-72.ec2.internal.warc.gz
en
0.971659
607
2.984375
3
made, in one of which, to the left of Shiloh , General Beauregard himself led in person, carrying the battle flag of a Louisiana regiment; and Trabue 's Brigade, having carried an eminence near Owl Creek , repulsing every effort to dislodge him, held the position until the retreat was ordered. Here, as on the right, the Confederate troops were animated by the greatest intrepidity on the part of their superior officers. It was now after I o'clock. The battle, kindled soon after daylight, had raged furiously from right to left for more than five hours. And notwithstanding the odds of fresh troops brought up against them, despite their long-continued engagament, the Confederates had not receded from the ground upon which they had been concentrated as soon as it was apparent that the battle was on their hands. But they were being fearfully depleted meanwhile. Beginning the combat with not more than 20,000 men exclusive of cavalry, less than 15,000 were now in the Confederate , seeing the unprofitable nature of the struggle, determined not to prolong it. Directing his adjutant-general to select a position and post such troops as were available to cover the retreat, he dispatched other staff officers to the corps commanders, with the order to retire simultaneously from their several positions, ready, however, to turn and fight should it become necessary. And accordingly, about 2 o'clock the retrograde movement of the Confederates was inaugurated and carried out with a steadiness never exceeded by veterans of a hundred fields. During the various stages of the conflict General Beauregard tried to use his cavalry, but so dense and broad spread were the woods that they proved altogether fruitless of results. , with ever-useful instincts, however, was able to render effective service during the morning in repressing straggling, until about 11 o'clock he was ordered by General Breckinridge , in whose vicinity he happened to be, to place his regiment on the right flank, where he soon became engaged in a brisk skirmish. Three times the enemy endeavored to break that part of the Confederate line, but was repulsed, as we have related, until near 1 o'clock, when on an order from General Beauregard carried his regiment to the center, where it was dismounted
<urn:uuid:7996852f-1bc4-4c8f-ad96-f331dfa700b3>
CC-MAIN-2016-26
http://www.perseus.tufts.edu/hopper/text?doc=Perseus:text:2001.05.0293:chapter=1.54:section=c.1.54.61:page=224&ie_sort=display
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396147.66/warc/CC-MAIN-20160624154956-00126-ip-10-164-35-72.ec2.internal.warc.gz
en
0.98547
509
2.515625
3
Help stop pet overpopulation Every day in the United States, thousands of puppies and kittens are born because of the uncontrolled breeding of pets. Add to that number the offspring of stray and abandoned companion animals, and the total becomes even larger. Every year, between six and eight million dogs and cats enter U.S. shelters and pounds; approximately half of these animals are euthanized because there are not enough homes for them. Too many companion animals competing for too few good homes is the most obvious consequence of uncontrolled breeding. However, there are other equally tragic problems that result from pet overpopulation: the transformation of some animal shelters into "warehouses," the acceptance of cruelty to animals as a way of life in our society, and the stress that caring shelter workers suffer when they are forced to euthanize one animal after another. Living creatures have become throwaway items to be cuddled when cute and abandoned when inconvenient. Such disregard for animal life pervades and erodes our culture. Abandoned and stray companion animals who survive in the streets and alleys of cities and suburbs pose a health threat to humans and other animals. Homeless companion animals get into trash containers, defecate in public areas or on private lawns, and anger citizens who have no understanding of their misery or their needs. Some of these animals scare away or prey upon wildlife—such as birds—or frighten small children. The public health epidemic of dog bites—which number more than 4.5 million each year—is due in part to uncontrolled breeding of pets. Bites by so-called dangerous dogs have drawn an enormous amount of media attention, and fatalities caused by dangerous dogs are a serious concern. Often, the vicious tendencies found in some dog breeds can be attributed to irresponsible breeding without regard for temperament. Spaying and neutering can help reduce this aggressive behavior. Clearly, pet overpopulation is not just a problem for the animals or for the shelters involved. Each year communities are forced to spend millions of taxpayer dollars trying to cope with the consequences of this surplus of pets. These public costs include services such as investigating animal cruelty, humanely capturing stray animals, and sheltering lost and homeless animals. The answer to the pet overpopulation problem is to have your pet spayed or neutered because the euthanasia rate at shelters and pounds in the United States will never be meaningfully reduced solely through the adoption of animals to new homes. By making certain that your pet cannot have puppies or kittens, you will help reduce the number of stray and unwanted animals that come into an animal shelter and this, in turn, will help reduce the euthanasia rate. The Humane Society of the United States has compiled alarming statistics on the number of companion animals that are euthanized each year in this country. Spaying and neutering of pets also reduces the risk of certain health and behavioral problems. Many of the common perceptions about the spaying and neutering of animals are just myths; please get the facts. The procedure of spaying or neutering a pet is safe and effective. Licensed veterinarians perform the procedure while the pet is under anesthesia. Depending on the pet’s age, size and health, the pet will stay at the veterinarian’s office for only a few hours or overnight. Your veterinarian can explain the procedure to you in detail. If you have a new puppy or kitten, do not wait. Pets can become parents sooner than you think. Early spay/neuter is safe, so talk with your veterinarian at your pet’s first visit. Content on this page was developed from materials provided by The Humane Society of the United States.
<urn:uuid:585fbb83-7429-4d9a-82f6-8b061c436ffe>
CC-MAIN-2016-26
http://www.rcacp.org/about/Whyyoushouldspayorneuteryourpet.php
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783404405.88/warc/CC-MAIN-20160624155004-00113-ip-10-164-35-72.ec2.internal.warc.gz
en
0.947072
741
3.234375
3
HUNTSVILLE, AL - Are you worried your children's brains will be oozing out their ears after a summer of video games and television? In academic circles, it's called the summer slide or slump. According to the National Summer Learning Institute's website: - Without educational activities during the summer, young people experience learning losses. Research shows that students typically score lower on standardized tests at the end of summer vacation than they do on the same tests at the beginning of the summer. - Most students lose about two months of grade-level equivalency in mathematical skills over the summer months. Low-income students also lose more than two months in reading achievement. - More than half of the achievement gap between lower- and higher-income youth can be explained by unequal access to summer learning opportunities. - Children gain weight more rapidly when they are out of school during summer break. - Parents cite summer as the most difficult time to ensure that their children have productive things to do. The 30 students attending the CollegeFirst program that began on June 7 at the University of Alabama in Huntsville are getting a jump start on advanced placement classes they'll be talking in the fall. The students voluntarily signed up to spend three weeks in classrooms and labs on the UAH campus to stay academically fresh. But not all children keep learning when school's out. "Summer slide is a real phenomenon," said Stephen Black, president of Impact Alabama, the not-for-profit organization that is partnering with A+ College Ready on the CollegeFirst program. While teachers have been handing out summer work for a long time, "that has been handled with varying levels of success," said Mary Boehm, president of A+ College Ready, a division of A+ Education Partnership. "More than half of the achievement gap present in ninth grade between lower- and higher-income children can be explained by summer learning loss," Boehm said. "That relates to what higher income parents are able to do," such as send their kids to dance classes and summer camps and go on trips. "That leads to educational development of another kind," Boehm said. To keep kids' minds sharp during the summer, Boehm suggests parents encourage them to read. Sign up for the summer reading program at the public library or check out books on summer reading lists, even if your child's teacher isn't requiring the book. - Get them involved in sports, which keeps kids healthy and active as well as teaches them teamwork. - Get them outside and away from the television and video games. That will help with obesity and exercise the mind. - Practice math skills in the grocery store or the mall. "Part of summer slide research shows it's important to provide (children) with opportunities to have intellectual activities," Black said. The National Summer Learning Association has several links to help parents keep their kids academically sharp while they're out of school for the summer: Scholastic Summer Reading Challenge This free summer-long literacy program is designed to motivate children to read four or more books. The Summer Challenge site also features resources for educators and parents. Active Bodies Active Minds This site provides summer reading and fitness challenges designed by Summer Bridge Activities and Major League Soccer to help kids stay sharp and fit over the summer. Reading Is Fundamental RIF's Summer Reading Guide has tips, book ideas and a daily calendar of summer reading activities. Read Write Think This site has a range of summer activities that promote "Learning Beyond the Classroom" for K-12 children and youth. Freshbrain.org offers an online summer camp focused on multimedia development and production including application development, graphic design, music mixing and robotics. Exploratorium is an virtual science center with exhibits, interactive tools and modules, as well as science projects. American Library Association The ALA has tips on making the most of the trip to the library.
<urn:uuid:2eef87b2-601a-47c1-994d-375411d42e33>
CC-MAIN-2016-26
http://blog.al.com/breaking/2010/06/keep_kids_busy_to_avoid_summer.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399428.8/warc/CC-MAIN-20160624154959-00015-ip-10-164-35-72.ec2.internal.warc.gz
en
0.949397
804
3.109375
3
Sends a signal to a list of processes. Returns the number of processes successfully signaled (which is not necessarily the same as the number actually killed). If SIGNAL is zero, no signal is sent to the process, but checks whether it's possible to send a signal to it (that means, to be brief, that the process is owned by the same user, or we are the super-user). This is useful to check that a child process is still alive (even if only as a zombie) and hasn't changed its UID. See perlport for notes on the portability of this construct. Unlike in the shell, if SIGNAL is negative, it kills process groups instead of processes. That means you usually want to use positive not negative signals. You may also use a signal name in quotes. The behavior of kill when a PROCESS number is zero or negative depends on the operating system. For example, on POSIX-conforming systems, zero will signal the current process group and -1 will signal all processes. See Signals in perlipc for more details.
<urn:uuid:9eacb6ad-bfb6-4af4-bc92-d87e7e39eecc>
CC-MAIN-2016-26
http://perldoc.perl.org/5.14.2/functions/kill.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397873.63/warc/CC-MAIN-20160624154957-00024-ip-10-164-35-72.ec2.internal.warc.gz
en
0.919247
231
2.796875
3
Calendula officinalis – Sunflower Family by Greg Tilford c.2010 Appearance: Also known as pot marigold, the bright yellow, orange, or red-orange flowers of calendula are a familiar sight in gardens and landscape designs everywhere. Calendula officinalis is a small plant that seldom exceeds 18 inches in height. The lance-shaped or oblong, alternate leaves have coarse surfaces and are borne on sturdy, branching stems. Calendula should not be confused with other “marigolds”, namely “French marigolds” and other members of the Tagetes genus of the sunflower family, which have a pungent odor and much different, compound leaf characteristics. Habitat & Range: Originally a native of Europe and Africa, calendula is a cultivated plant throughout most of the world. Cycle & Bloom Season: The word “calendula” is derived from the “calends”— meaning that the plant blooms continuously; on the new moon of each month. While calendula really doesn’t keep such an accurate calendar, it does remain in a constant and generous state of bloom throughout most of its annual life span. Parts Used: The flowers. Actions: Anti-inflammatory, lymphatic, vulnerary, astringent, antibacterial, antifungal, antitumor, cholagogue, emmenogogue. Affinities: Skin and mucous membranes. Preparation: Water or oil infusion, tincture, poultice, salves and ointments. Specific Uses: Calendula is among the first herbs to consider in minor first aid situations. A broad array of medicinal compounds in the flowers of the plant, including various essential oils, flavonoids, saponins, triterpene alcohols, carotenes and others, combine to help speed cell reproduction and inhibit bacteria and fungi at the site of injury. For minor cuts, insect bites, abrasions, or post-surgical incisions, calendula salve will bring quick, soothing relief to pain and swelling, while lending wound-healing, antimicrobial properties to the body’s healing effort. Infusions of the flowers are effective as a soothing and healing skin wash for various forms of inflammatory dermatitis— such as flea bites, poison ivy, eczema, or sunburn. The antimicrobial and astringent nature of this plant make it useful for treating burns as well. In these circumstances, a cooled water infusion (skin rinse) is recommended over oils, salves, or poultices, as the latter may seal in heat, causing further aggravation of the injury. A cooled water infusion may also be used as an eyewash for conjunctivitis, where the mild but predictable astringency of the plant combines with its bacteria-fighting properties to reduce irritation and infection. To make an eyewash or skin rinse, refer to “The Basics of Making Herbal Preparations”. Internally, an infusion or tincture of the flower may be used to treat inflammation or ulceration of the digestive or urinary tracts, where it serves in the drainage of lymph-engorged tissues and reduces inflammation. It may also prove beneficial in the treatment of candidosis— a fungal infection which infects mucous membranes in the mouths and digestive tracts of birds, cats, horses, and sometimes dogs. The antifungal qualities of this herb also make it a possible option for topical treatment of chromomycosis; an infection of the skin which occurs from various fungi origins in cows, horses, dogs, cats, and amphibians— or in the treatment of entomophthoromycosis ; a fungal infection of the nostrils, mouth, or lips of horses. While virtually no scientific data exists to validate the effectiveness of calendula against these three forms of disease, its safety and reputed effectiveness as a broad-spectrum antifungal agent make it an option worth trying. Preparations containing calendula have been shown effective in the treatment of chronic colitis1. Animal studies have shown that the saponin constituents in calendula may possess antitumor activities2. Availability: Over 30 cultivars of calendula are available at nurseries everywhere. Propagation & Harvest: Sow seeds in early spring, or transplant the starts after danger of frost is past. Calendula likes moderately rich soil and full sun. It is not picky about pH— as long as your soil is not excessively alkaline or acidic in nature, calendula will do just fine. Once established, plants will self-sow from their prolific seed production. Seedlings that emerge each spring should be thinned to about six inches apart, otherwise you can expect a continuous, relatively carefree supply of calendula. Harvest the flowers whenever the are in full bloom. They can then be made into an herbal preparation while they are fresh, or you can dry them indoors for use in the near future. Alternatives and Adjuncts: For use in first aid salves, calendula combines especially well with comfrey and St. John’s wort. To increase its effectiveness in antifungal uses (internally or externally), try combining it with bee balm, oregon grape, or licorice. For urinary or digestive tract inflammations, calendula can be combined with cornsilk, marshmallow, or plantain. Cautions & Comments: Although calendula is without question one of the safest herbs around, it does have a reputation for stimulating menstruation, and in some studies it has been shown to possess abortifacient activities in rodents3. Therefore, it should be avoided during early pregnancy. Calendula may contain a very small measure of salicylic acid4, a constituent that is potentially toxic to cats. Although this compound is likely confined to the leaves and stems of the plant and does not occur in quantities that are likely to be of immediate danger to felines, its presence should be taken into account prior to long term internal use. 1. Chakurski I., Matev M Koichev A., Angelova I., Stefanov G. “Treatment of Chronic Colitis with an Herbal combination of Taraxacum officinale, Hypericum perforatum, Melissa officinalis, Calendula officinalis and Foeniculum vulgare.” Pharmazie (1988 Mar) 43(3):220. 2. Boucard-Maitre Y et al. “Cytoxic and Antitumoral activity of Calendula extracts.” Pharmazie 1988; 43: 220. 3. Morelli I et al. Selected Medicinal Plants. Rome: FAO, 1983 4. Foster, Steven. Herbal Renaissance – Growing, Using, and Understanding Herbs in the Modern World. Layton, Utah: Peregrine Smith Books, 1993.
<urn:uuid:403eb5cf-d43c-4de4-9eac-4ce183cb76b0>
CC-MAIN-2016-26
http://theanimalherbalist.com/?page_id=147
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395613.65/warc/CC-MAIN-20160624154955-00189-ip-10-164-35-72.ec2.internal.warc.gz
en
0.906923
1,467
3.0625
3
Human factors/ergonomics researchers have long studied the connection between cognitive function and the ability to perform well on multiple simultaneous tasks, and recently a group of neuroergonomics researchers went a step further to examine a genetic link to multitasking ability. Neuroergonomics is the study of the brain in relation to performance. In their Human Factors paper, "Interactive Effects of the COMT Gene and Training on Individual Differences in Supervisory Control of Unmanned Vehicles," Parasuraman and colleagues hypothesized that individuals with the Met/Met genotype of the Val158Met variant of the Catechol-O-Methyltransferase (COMT) gene would perform better in a simulated air-defense task than would people without that genotype. The presence of the COMT gene has been shown to increase dopamine levels in the prefrontal cortex (PFC), which controls executive function (e.g., memory, reasoning, problem solving). "Dopamine availability in the PFC appears to be particularly important when task demands are high," the authors note in the paper. Parasuraman et al. examined the performance of 99 men and women ages 18 to 38, who were divided into three genotyped groups based on the Val158Met variant. Over the course of four training blocks, participants controlled six unmanned aerial vehicles (UAVs) in low- and high-task-load conditions to destroy enemy targets, prevent enemy incursions, and avoid friendly fire while attending to a communications task. The researchers did indeed find that participants with the Met/Met genotype of the COMT gene showed more improvement with training and performed better than did those in the other two genotype (Val/Met and Val/Val) groups. The results of this study, which was supported by a grant from the Air Force Research Lab, Wright-Patterson Air Force Base, are promising for improving the training of real-world operators of multiple UAVs. Parasuraman et al. also note that the work has value for illustrating that matching training to individuals based on their cognitive abilities could be more important than other factors in personnel selection. To obtain a copy of the paper for news reporting purposes, contact HFES Communications Director Lois Smith (email@example.com, 310/394-1811). The Human Factors and Ergonomics Society is the world's largest nonprofit individual-member, multidisciplinary scientific association for human factors/ergonomics professionals, with more than 4,600 members globally. HFES members include psychologists and other scientists, designers, and engineers, all of whom have a common interest in designing systems and equipment to be safe and effective for the people who operate and maintain them. "Human Factors and Ergonomics: People-Friendly Design Through Science and Engineering" Plan to attend the 2014 International Symposium on Human Factors and Ergonomics in Health Care: Leading the Way, March 16-19, Sheraton Chicago Hotel and Towers.
<urn:uuid:8dd994d9-8bb9-4c43-a874-bfdea9951c08>
CC-MAIN-2016-26
http://www.eurekalert.org/pub_releases/2014-01/hfae-imm010714.php
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402746.23/warc/CC-MAIN-20160624155002-00053-ip-10-164-35-72.ec2.internal.warc.gz
en
0.942383
610
2.875
3
University of Colorado students will build a tiny spacecraft to observe particles in space that should give scientists a better understanding of solar flares and their interaction with Earth's atmosphere, according to CU. The university's Laboratory for Atmospheric and Space Physics and the aerospace engineering sciences department were awarded a grant of $840,000 over three years from the National Science Foundation for the project. The project involves the development of a "loaf of bread-sized spacecraft carrying a miniature instrument package to observe energetic particles tied to 'space weather' in the near-Earth environment," according to a CU news release. Graduate students will develop and test the experiment, conduct mission operations and analyze the data. Known as the Colorado Student Space Weather Experiment, the instrument package is expected to weigh less than 5 pounds. Data from the mission will shed light on the electrons trapped in the Earth's magnetosphere, often referred to as "killer electrons" because of their impact on spacecraft and on astronauts in space. Gaining knowledge about such electrons would help scientists understand how the particles accelerate to speeds that are dangerous to spacecraft and humans. Students are expected to begin building the spacecraft in the spring semester and will use the aerospace engineering sciences department's machine and electronics shops.
<urn:uuid:4914b8cf-ce68-4d92-a03b-d1a284b8d1de>
CC-MAIN-2016-26
http://www.dailycamera.com/science-environment/ci_14083577
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395160.19/warc/CC-MAIN-20160624154955-00025-ip-10-164-35-72.ec2.internal.warc.gz
en
0.936699
249
3.234375
3
How does science work, really? You can read all about it in plenty of texts in philosophy of science, but if you have ever experienced the making of science on an everyday basis, chances are you will feel dissatisfied with the airtight account given by philosophers. Too neat, not enough mess. To be sure, I am not denying the existence of the scientific method(s), as radical philosopher Paul Feyerabend is infamously known for having done. But I know from personal experience that scientists don’t spend their time trying to falsify hypotheses, as Karl Popper wished they did. By the same token, while occasionally particular scientific fields do undergo periods of upheaval, Thomas Kuhn’s distinction between “normal science” and scientific “revolutions” is too simple. Was the neo-Darwinian synthesis of the 1930s and 40s in evolutionary biology a revolution or just a significant adjustment? Was Eldredge and Gould’s theory of “punctuated equilibria” to explain certain features of the fossil record a blip on the screen or, at least, a minor revolution? But, perhaps, the least convincing feature of the scientific method is not something theorized by philosophers, but something actually practiced by almost every scientist, especially those involved in heavily statistical disciplines such as organismal biology and the social sciences. Whenever we run an experiment, we analyze the data in a way to verify if the so-called “null hypothesis” has been successfully rejected. If so, we open a bottle of champagne and proceed to write up the results to place a new small brick in the edifice of knowledge. Let me explain. A null hypothesis is what would happen if nothing happened. Suppose you are testing the effect of a new drug on the remission of breast cancer. Your null hypothesis is that the drug has no effect: within a properly controlled experimental population, the subjects receiving the drug do not show a statistically significant difference in their remission rate when compared to those who did not receive the drug. If you can reject the null, this is great news: the drug is working, and you have made a potentially important contribution toward bettering humanity’s welfare. Or have you? The problem is that the whole idea of a null hypothesis, introduced in statistics by none other than Sir Ronald Fisher (the father of much modern statistical analyses), constraints our questions to ‘yes’ and ‘no’ answers. Nature is much too subtle for that. We probably had a pretty good idea, before we even started the experiment, that the null hypothesis was going to be rejected. After all, surely we don’t embark in costly (both in terms of material resources and of human potential) experiments just on the whim of the moment. We don’t randomly test all possible chemical substances for their role as potential anti-carcinogens. What we really want to know is if the new drug performed better than other, already known, ones—and by how much. That is, every time we run an experiment we have two factors that Fisherian (also known as “frequentist,” see below) statistics does not take into account: first, we have a priori expectations about the outcome of the experiments, i.e., we don’t enter the trial as a blank slate (contrary to what is assumed by most statistical tests); second, we normally compare more than two hypotheses (often several), and the least interesting of them is the null one. An increasing number of statisticians and scientists are beginning to realize this, and are ironically turning to a solution that was devised, and widely used, well before Fisher. That solution was contained in an obscure paper that one Reverend Thomas Bayes published back in 1763, and is revolutionizing how scientists do their work, as well as how philosophers think about science. Bayesian statistics simply acknowledges that what we are really after is an estimate of the probability of a certain hypothesis to be true, given what we know before running an experiment, as well as what we learn from the experiment itself. Indeed, a simple formula known as Bayes theorem says that the probability that a hypothesis (among many) is correct, given the available data, depends on the probability that the data would be observed if that hypothesis were true, multiplied by the a priori probability (i.e., based on previous experience) that the hypothesis is true. In Fisherian terms, the probability of an event is the frequency with which that event would occur given certain circumstances (hence the term “frequentist” to identify this classical approach). For example, the probability of rolling a three with one (unloaded) die is 1/6, because there are six possible, equiprobable outcomes, and on average (i.e., on long enough runs) you will get a three one time every six. In Bayesian terms, however, a probability is really an estimate of the degree of belief (as in confidence, not blind faith) that a researcher can put into a particular hypothesis, given all she knows about the problem at hand. Your degree of belief that threes come out once every six rolls of the die comes from both a priori considerations about fair dice, and the empirical fact that you have observed this sort of events in the past. However, should you witness a repeated specified outcome over and over, your degree of belief in the hypothesis of a fair die would keep going down until you strongly suspect foul play. It makes intuitive sense that the degree of confidence in a hypothesis changes with the available evidence, and one can think of different scientific hypotheses as competing for the highest degree of Bayesian probability. New experiments will lower our confidence in some hypotheses and increase it in others. Importantly, we might never be able to settle on one final hypothesis because the data may be roughly equally compatible with several alternatives (a frustrating situation very familiar to any scientist and known in philosophy as the underdetermination of hypotheses by the data). You can see why a Bayesian description of the scientific enterprise—while not devoid of problems and critics—is revealing itself to be a tantalizing tool for both scientists, in their everyday practice, and for philosophers, as a more realistic way of thinking about science as a process. Perhaps more importantly, Bayesian analyses are allowing researchers to save money and human lives during clinical trials because they permit the researcher to constantly re-evaluate the likelihood of different hypotheses during the experiment. If we don’t have to wait for a long and costly clinical trial to be over before realizing that, say, two of the six drugs being tested are, in fact, significantly better than the others, Reverend Bayes might turn out to be a much more important figure in science than anybody has imagined over the last two centuries.
<urn:uuid:b1c89de4-e09c-421d-b89d-26303f8a6f31>
CC-MAIN-2016-26
http://www.2think.org/rs-2002-1.shtml
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783391634.7/warc/CC-MAIN-20160624154951-00091-ip-10-164-35-72.ec2.internal.warc.gz
en
0.960631
1,401
2.84375
3
Roseville Plantation Florence Florence County - Location Florence, Florence County 3636 N. Williston Road (Old Georgetown Road) - Origin of name From the confederate rosebushes that lined the long drive. There are still a few of the bushes on the side of the house. - Other names ? - Current status Privately owned - ? Earliest known date of existence - 1771 House built the Dewitt family (National Register). - 1821 Richard Brockinton purchased the plantation from Harris Dewitt and Nathaniel S. McCall (National Register). - 1831 or 1832 The original house burned (National Register). - 1835 Brockinton built a house using hand-hewn construction (National Register). - 1840-1843 Richard Brockinton died sometime during this period and his widow, Mary Hart Brockinton, inherited Roseville (National Register). - 1851-1853 Mary died leaving the plantation to her nephew, Peter Samuel Bacot. Peter and his wife, Anna Jane White Bacot, had been living at Roseville before Mary's death (National Register). - 1864 Peter died from yellow fever and left his estate to be divided equally between his six children as Anna had proceeded him in death (National Register). - 1870 Peter's son, Peter Brockinton Bacot, owned four of the six shares of Roseville (National Register). - 1877 Peter and Anna's eldest daughter, Ada White Bacot, and her third husband, James E.H. Clarke, returned to Roseville to oversee the plantation's operations (National Register). - ? Ada and James' son, Thomas Alfred Clarke, inherited Roseville and continued farming the land. Thomas expanded the crops to include tobacco (National Register). - ? James Henry Clarke owned Roseville (National Register). - 1948 Roseville was sold outside of the Clarke family (National Register). - ? Carl and Eleanor Tucker purchased Roseville (National Register). - Number of acres 1,200 in 1850; 13.5 acres in 1997 (National Register) There is an oak-lined avenue that leads to the house (National Register). - Primary crops Cotton, rice, Indian corn, peas, beans, sweet potatoes, and tobacco in the 1900s (National Register) - Chronological list Harris Dewitt and Nathaniel S. McCall (?-1821); Richard Brockinton (1821-1843); Mary Hart Brockinton (1843-1853); Peter Samuel Bacot (1853-1864); Peter Brockinton Bacot (1870-?); Thomas Alfred Clarke; James Henry Clarke; Carl and Eleanor Tucker - Number of slaves Over 100 in 1850 (National Register) - There is a two-story frame house, garage building, and old barn currently on the property (National Register) - National Register of Historic Places Nomination form - PDF - submitted in 1997 Photographs, architectural overview - 30-15 Plantation File, held by the South Carolina Historical Society
<urn:uuid:c9344e99-9c4f-4e89-b9c4-baab5311bcc3>
CC-MAIN-2016-26
http://south-carolina-plantations.com/florence/roseville.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396875.58/warc/CC-MAIN-20160624154956-00195-ip-10-164-35-72.ec2.internal.warc.gz
en
0.866033
624
2.71875
3
NEW YORK — A bald eagle, its wings spanning more than 6 feet, swoops toward an Alaskan riverbank, its talons spread to grasp a salmon. A steel rod, concealed by a feather, is connected to the exhibit case in the Hall of North American Birds at the American Museum of Natural History, seeming to suspend the specimen in midair. In the Hall of North American Mammals, a sinuous mink, its fur a lustrous chestnut brown, is poised to pounce on a tree frog among the flora of what is presented as the Pine Barrens of New Jersey. Hundreds of the specimens that enthrall visitors at the museum on Manhattan’s Upper West Side — coyotes, geese, striped bass, and snakes of all kinds — were captured in seemingly everlasting life by David Schwendeman. Mr. Schwendeman, the last full-time taxidermist at the 143-year-old museum, died Monday at the home in Milltown, N.J., where he had lived for all of his 87 years. His son, Bruce, confirmed his death. Preferring the title principal preparer, he considered taxidermy a scientific art form. ‘’He would say you might stuff your Thanksgiving turkey, but not an accurate rendering of an African elephant for display in a museum,’’ said Steve Quinn, manager of exhibitions. ‘‘He was an extraordinary artist, an expert sculptor,’’ Quinn said. ‘‘He could pose animals accurately and scientifically, and at the same time make them aesthetically beautiful. He saw as his goal to inspire wonder and nurture concern for nature.’’ Mr. Schwendeman was the museum’s chief taxidermist for 29 years, starting in 1959. By then, its vast halls of mammals — exhibiting elephants, antelopes, rhinos, deer, bear, and moose, among many other creatures — had been assembled decades earlier. He focused on birds, reptiles, amphibians, and fish, particularly from North America. There is, for example, his covey of quail (connected by fine rods) in midflight. The proper term for what taxidermists do is ‘‘mount.’’ But that hardly conveys their skills. The process includes making sketches, watercolor paintings, and plaster masks to record details that could be lost as the specimen is skinned. It involves carefully removing, scraping, boiling, and bleaching the skeleton, then reassembling it with wires, metal rods, or wooden reinforcements. Plaster molds and papier-mache forms are sculptured to precisely replicate internal tissue, which then fit into the tanned and preserved skin in the pose to be depicted in the exhibition. Often, the taxidermist must apply paint or varnish for the finishing touches. ‘‘You have to have respect and intuition for the animals to bring out their best characteristics,’’ Mr. Schwendeman said for Melissa Milgrom’s 2010 book, ‘‘Still Life: Adventures in Taxidermy.’’ He learned his craft at Schwendeman’s Taxidermy Studio, which his father opened in 1938 in Milltown. His mastery of the family trade led to his hiring by the museum. His son now runs the studio. David James Schwendeman was born to Arthur and Lillian Falk Schwendeman. Besides his son, he leaves his wife, Irene; three daughters; a brother; and four grandchildren.
<urn:uuid:511f58bc-9868-4815-8d15-0b4d8921f2c1>
CC-MAIN-2016-26
http://www.bostonglobe.com/metro/obituaries/2012/12/02/david-schwendeman-creative-shaper-specimens-natural-history-museum/cVWW7A55HIYRaTuLWRYQgP/story.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396029.85/warc/CC-MAIN-20160624154956-00174-ip-10-164-35-72.ec2.internal.warc.gz
en
0.969707
753
2.515625
3
What can I do to help my child to develop good values and to learn right from wrong? We want our children to develop respect and compassion for others. We want them to be honest, decent and thoughtfulto stand up for their principles, to cooperate with others and to act responsibly. We want them to make sound moral choices. The payoffs for encouraging a child's values are enormous: those who grow up with strong, consistent and positive values are happier, do better in school and are more likely to contribute to society. Talk to your children about good values and why they matter. Just as children need to be guided academically, so too must they be educated in the values of a civil societyvalues like love your neighbor; give an honest day's work for an honest day's wages; tell the truth and be honest; respect others, respect their property and respect their opinions; and take responsibility for your decisions. In word and deed, parents play an important role in helping their children develop a good sense of right from wrong and good from bad. Many of the major threats to our children today are not a matter of chance, but are a matter of choice choices like drinking and driving, smoking, drugs, sex, and dropping out of school. The research tells us that young people who engage in one risky behavior are more likely to participate in others, so parents should help their children understand the potential risks and consequences of their choicesnot just for the immediate future but for their lifetime as well. Fortunately, most children share the values of their parents about the most important things. Your priorities and principles and your example of good behavior can teach young teens to take the high road when other roads look tempting. Here are some ways that you can help your child to develop good values: If you stick with a challenging job, your child will be more inclined to finish homework and chores. When you volunteer at a food kitchen, your child will be more likely to have compassion for others who are less fortunate. When you accept a loss on the basketball court graciously, your child can learn that winning isn't everything. If your child sees his parents treat each other with respect, he is more likely to follow this example in dating and into marriage. When your daughter senses that her parents appreciate people of all colors and creeds, she is likely to become more open to friends of all races and backgrounds. When you tell a sales clerk that she gave you change for a ten-dollar bill and not a five, your child sees honesty in action. When your child see his parents make tough choices"We're buying a used car so that we can save more money for a vacation"he picks up the cues. If you accept disappointments as a part of lifeif you pick yourself up and keep goingyour child stands a better chance of becoming a survivor. If you can laugh at your own mistakes, your child is more likely to accept his own imperfections. When you say "no" to alcohol before heading out on the highway, your child takes note. The way that you view money and material goods can also mold your child's attitudes. If you see your self-worth and the worth of others in terms of cars, homes, furniture, nice clothes and other possessions, your child is more likely to develop these attitudes as well. It is equally important to meet your child's needs but to guide him to set them apart from his wants. The expensive leather jacket that he has to have may be OKif you can afford it. Giving your child an allowance is one good way to help her understand the value of money. But you must decide how much the allowance will be, taking into account your resources, your child's age and what expenses the allowance will cover (lunches, clothes, church donations, entertainment or whatever). An allowance can help your young teen learn how to save and how to use money wisely. Naturally, parents want to disclose information and provide guidance that is consistent with their values and religious beliefs. We know from child development experts that parents are often better at providing information about the facts of life than they are at talking about what matters more: their values concerning sexuality. To make good decisions, young teens need to have accurate information about "the birds and the bees" that takes into consideration strong values. Parents often find it easier to teach their children values when they rely on their friends and other parents for support and guidance. Many parents also draw support from their churches, synagogues, mosques or other religious institutions. At some point in their adolescentrearing efforts, many parents find themselves disappointed and frustrated. ("I can't believe my kid did something so dumb and insensitive. What did I do wrong?") Generally, there is no reason to panic if your child sometimes behaves in a way that differs from your standardsas long as he doesn't do it regularly. Bad behavior needs to be recognized and dealt with. But we would all do well to remember our own adolescencemost of us turned out OK.
<urn:uuid:14eec679-738b-4a37-8d89-adf5ba0e87a6>
CC-MAIN-2016-26
http://www2.ed.gov/parents/academic/help/adolescence/partx5.html?exp=1
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783408840.13/warc/CC-MAIN-20160624155008-00078-ip-10-164-35-72.ec2.internal.warc.gz
en
0.968313
1,030
3.75
4
Aperture cards (ACs) are the old-fashioned PC cards of ancient times. The only noticeable difference is that they have a cut-out rectangle containing a 35mm drawing or several 16mm documents. Many engineering firms still use ACs on an every day basis. ACs usually contain blueprints, drawings, maps, schematics, or deed records. Some ACs may have a drawing number, address, or other data typed or handwritten on the top of the card. Small punch holes (Hollerith code) may also be present. Aperture scanning is the process of converting that old analog media to digital image. In other words, instead of hunting for a particular AC and using a microfilm viewer or reader printer, you can simply bring the image up on your computer screen. You can e-mail it, print it, share it, make copies, and enhance the image. Aperture card scanning enables the images to be indexed and a database or spreadsheet to be created from the data contained on the headers or Hollerith code. Black & white (actually called bi-tonal) or greyscale images can be produced. Most clients choose a PDF format, but TIFF and JPEG are also viable options for aperture card scanning. Generation Imaging’s employees have experience with hundreds of aperture card scanning jobs over the years. There is no need for you to learn aperture card scanning from scratch; let the paperless experts take care of it for you. You know it’s time for your organization to become more efficient and go digital. So please contact Generation Imaging today for your aperture card scanning price quote.
<urn:uuid:926184aa-7a66-4c51-8878-c379a6d09999>
CC-MAIN-2016-26
http://apertures.scanning360.com/tag/price-quote/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399428.8/warc/CC-MAIN-20160624154959-00106-ip-10-164-35-72.ec2.internal.warc.gz
en
0.897752
336
2.734375
3
Recordings April, Herts, England unless noted. Blue Tit songs. The following are clearly songs, but as with other titmice, many vocalizations are difficult to assign to call or song. Singing atdawn is persistent. At the end of this recording I believe mating occurred, with one of the birds twittering at high frequency (May, Herts). twitter, time scale reduced Coal Tit songs are similar in rhythm to the Great Tit, but have a different tone. Coal Tit and Great Tit together. Coal Tit "courtship/copulation" song. This extended song was made at the time of intimate association with a female. Initially the birds chased around a bush with twittering, and then the male fluttered his wings rapidly and at one point mounted the female, uttering this remarkable continuous vocalization (Apr, Herts). time scale reduced Marsh and Willow Tits are very similar in appearance but have different vocalizations. Willow Tit (May, Herts). One of the two song types of the Wood Warbler is similar to the Willow Tit (June, Suffolk).
<urn:uuid:512a98d0-1a12-4164-bb2b-083d3884f1fc>
CC-MAIN-2016-26
http://pjdeye.blogspot.com/2010/01/titmice-songs.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396029.85/warc/CC-MAIN-20160624154956-00197-ip-10-164-35-72.ec2.internal.warc.gz
en
0.944594
237
2.59375
3
|James L. Kraft| AKA James Lewis Kraft Birthplace: Stevensville, Ontario, Canada Location of death: Chicago, IL Cause of death: Complications of Surgery Remains: Buried, Memorial Park Cemetery, Skokie, IL Religion: See Note Race or Ethnicity: White Sexual orientation: Straight Nationality: United States Executive summary: Inventor of processed cheese James Kraft, son of a Canadian farmer, started a cheese delivery service in 1903. Driving a horse named Paddy, he supplied Chicago area grocers with cheese he purchased at wholesale, delivering the cheese early in the morning, before it could melt or spoil -- a key advantage in a time before refrigeration was common. Many stores refused to even carry cheese in the summer months, because it would rot before it was sold. As the business grew, Kraft acquired his its own dairy facilities, and addressed the spoilage problem by shredding Cheddar cheese, then heating it enough to kill its inherent mold and bacteria, stopping the cheese aging process. His patented, pasteurized cheese had a much longer shelf life than ordinary cheese, though connoisseurs complained that Kraft had literally "killed the cheese", and makers of what is now called "natural cheese" -- unpasteurized -- demanded that Kraft be forced to sell its product as "embalmed cheese". Instead, federal regulations eventually required Kraft and other makers of altered cheese products to market such foodstuffs as "processed cheese". While James Kraft controlled the company, Kraft introduced Velveeta in 1928, Miracle Whip in 1933, macaroni and cheese in 1937, Parkay margarine in 1940, sliced processed cheese in 1950, and Cheez Whiz in 1952. "After we are gone", he wrote in a company newsletter, "there will be Kraft salesmen trekking the veldt of Africa, braving the snows of Siberia and battling the superstitions of Mongolia -- all earnestly striving to increase sales, which by that time will be far in excess of a hundred million". Raised Mennonite, later joined the Baptist Church. Father: George Kraft (farmer, b. George Krafft 1842, d. 1914) Mother: Minerva Alice Tripp Kraft (b. 1848, d. 1933) Brother: William Kraft (b. 24-Mar-1872) Sister: Sarah Ann Kraft (b. 5-Aug-1876) Brother: George Franklin Kraft (b. 5-Aug-1878) Brother: Charles Herbert Kraft (Kraft executive, b. 17-Oct-1880) Brother: Robert Harvey Kraft (b. 11-Oct-1882) Sister: Ivy May Kraft (b. 30-Oct-1884) Brother: Frederick Kraft (Kraft executive, twin b. 1-Feb-1887) Sister: Florence Kraft (twin b. 1-Feb-1887) Brother: Norman Kraft (Kraft executive, b. 31-Dec-1889) Brother: John Henry Kraft (Kraft executive, b. 6-Jun-1891) Wife: Pauline Kraft Daughter: Edith Kraft Kraft Foods Founder & President (1909-53) Naturalized US Citizen Do you know something we don't? Submit a correction or make a comment about this profile Copyright ©2014 Soylent Communications
<urn:uuid:8978004f-71f4-4046-8f33-695f684a6c3f>
CC-MAIN-2016-26
http://www.nndb.com/people/021/000165523/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397636.15/warc/CC-MAIN-20160624154957-00145-ip-10-164-35-72.ec2.internal.warc.gz
en
0.891105
716
2.59375
3
Alternate name: Christmas Cholla Family: Cactaceae, Cactus view all from this family Description This inconspicuous shrubby plant with many short, intertwined, usually spineless stems bears flowers which open only in the late afternoon. Habit: native perennial shrub; thin trunk with scaly pale brown trunk. Stem: succulent, cylindrical segments, alternately branched, dark green becoming gray-green to purple-green, 0.8-3 in (2-8 cm) tall, to 0.2 in (5 mm) diameter; thicket-forming. Height: 1.5-6 ft (0.5-1.8 m). Leaf: spine, red-brown to gray-brown, to 2 in (5 cm) long or more; one per areole; frequently spineless. Flower: small, with translucent petals, pale yellow to greenish yellow to bronze, with occasional red tip, 0.5-1 in (12-25 mm) wide; held along stem; opening in late afternoon, closing at night. Fruit: spineless barrel-shaped berry, green to yellow becoming scarlet, around 0.5 in in (12 mm) long and 0.25 in (6 mm) diameter, sometimes larger; held along stem. Warning These cacti have sharp spines as well as tiny barbed hairs called glochids that can be difficult to remove from the skin. Flower March to August, sometimes in October. Flower April - June Habitat Low elevation desert: overgrazed grasslands, mesas, chaparral, arroyos, oak-juniper woodlands, flats, washes, bajadas and slopes, sandy, loamy to gravelly substrates; 130-4900 ft (40-1500 m). Range New Mexico east to Oklahoma and Texas, south into Mexico. Discussion Also known as Christmas cactus, pencil cholla, desert Christmas cholla, tesajo cactus, rat-tail cactus, slender-stem cactus, garambullo. Now classified as Cylindropuntia leptocaulis. Collection is restricted in Arizona. This plant has the slenderest stems of all southwestern chollas. During winter its bright red fruits add attractive color to the brown desert. Exposure Preference Sun. Native Distribution Arizona to Oklahoma, Texas & adjacent Mexico Site Preference Mesas, flats, valleys & washes in deserts Soil Preference Sandy soils.
<urn:uuid:5258c7ca-d1bc-4aa0-a7f9-0bbc6a2e514d>
CC-MAIN-2016-26
http://www.enature.com/fieldguides/detail.asp?shapeID=1155&curGroupID=11&lgfromWhere=&curPageNum=21
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402746.23/warc/CC-MAIN-20160624155002-00030-ip-10-164-35-72.ec2.internal.warc.gz
en
0.864812
539
2.875
3
Bats in the group exposed to the clockwise magnetic fields flew east, for example, while those in the opposite group flew west. But some of the errant bats eventually realized their mistake and made it home that night, suggesting either a recalibration of the compass or use of other navigational cues, Holland says. A Sense of Where You Are A magnetic sense has been described in a wide array of animals, not just ones that fly. Lobsters have it. So do salamanders. (Related: "Rat Radar: Rodent Uses Natural 'GPS'" [January 29, 2004].) "It's not just associated with long-distance movements or migration," said John Phillips, a biologist at Virginia Tech university in Blacksburg. "We find even short-distance movements by simple animals are patterned by use of directional compass cues." Scientists know of two kinds of magnetic orientation. In one, a simple compass sense is based on particles of a mineral found in many organisms known as magnetite. Some birds can also "see" changes in light intensity in different locations within Earth's magnetic field. (Related story: "Magnetic Beaks Help Birds Navigate, Study Says" [November 24, 2004].) This more sophisticated sensory apparatus provides an internal "map sense" of where the birds are on the globe. "We don't know if bats have a light-dependent compass," Holland said. "But they do have magnetite in their bodies." Free Email News Updates Best Online Newsletter, 2006 Codie Awards Sign up for our Inside National Geographic newsletter. Every two weeks we'll send you our top stories and pictures (see sample). SOURCES AND RELATED WEB SITES
<urn:uuid:59a95796-6f41-4015-8d76-960c140d9c27>
CC-MAIN-2016-26
http://news.nationalgeographic.com/news/2006/12/061206-bats-compass_2.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783391519.0/warc/CC-MAIN-20160624154951-00167-ip-10-164-35-72.ec2.internal.warc.gz
en
0.927745
358
3.59375
4
This view is a close-up of an area featured in a previous Gallery image. The region is located diametrically opposite the Caloris impact basin, and has been affected by converging seismic waves or ejecta that caused the peculiar "hilly and lineated" texture. Members of the Mariner 10 team informally called this the "weird terrain" when it was first discovered in 1974. This image was acquired as part of MDIS's high-resolution surface morphology base map. The surface morphology base map will cover more than 90% of Mercury's surface with an average resolution of 250 meters/pixel (0.16 miles/pixel or 820 feet/pixel). Images acquired for the surface morphology base map typically have off-vertical Sun angles (i.e., high incidence angles) and visible shadows so as to reveal clearly the topographic form of geologic features. The MESSENGER spacecraft is the first ever to orbit the planet Mercury, and the spacecraft's seven scientific instruments and radio science investigation are unraveling the history and evolution of the Solar System's innermost planet. Visit the Why Mercury? section of this website to learn more about the key science questions that the MESSENGER mission is addressing. During the one-year primary mission, MDIS is scheduled to acquire more than 75,000 images in support of MESSENGER's science goals. Date acquired: August 02, 2011 Image Mission Elapsed Time (MET): 220756231 Image ID: 581158 Instrument: Narrow Angle Camera (NAC) of the Mercury Dual Imaging System (MDIS) Center Latitude: -29.92° Center Longitude: 342.0° E Resolution: 235 meters/pixel Scale:The scene is about 248 km (155 mi.) across. Incidence Angle: 85.4° Emission Angle: 19.3° Phase Angle: 104.7° These images are from MESSENGER, a NASA Discovery mission to conduct the first orbital study of the innermost planet, Mercury. For information regarding the use of images, see the MESSENGER image use policy.
<urn:uuid:6a804a1a-db07-4aaf-9048-e43c1a3dbe33>
CC-MAIN-2016-26
http://photojournal.jpl.nasa.gov/catalog/PIA15240
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395560.69/warc/CC-MAIN-20160624154955-00164-ip-10-164-35-72.ec2.internal.warc.gz
en
0.886827
445
3.53125
4
This colossal resource is a must-have for young scientists ages 9 and up. Newly updated and revised with more than 2,100 entries that cover all branches of science from astronomy to zoology. Why do some plants blossom only during the day? How do certain birds know when and where to migrate? Seymour Simon explains the workings of human and animal biological clocks. Whether or not you believe in ghosts, you’ll be spellbound by these nine true tales from the spirit world. Which are the most dangerous snakes, where do they live, what do they eat, and how do they behave? Most ants don’t look dangerous but certain species can be lethal. Discover nine bizarre-but-true incidents which remain unsolved to this day. © Seymour Simon. All Rights Reserved.
<urn:uuid:d5f53d62-7835-453e-95c2-326ca37e9b72>
CC-MAIN-2016-26
http://www.seymoursimon.com/index.php/books/dover_books/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402746.23/warc/CC-MAIN-20160624155002-00136-ip-10-164-35-72.ec2.internal.warc.gz
en
0.877466
165
3.109375
3
Slide 1: Characteristics of Life Section 1.1 What is Biology? : Section 1.1 What is Biology? Biology : Biology The study of Life Bio logy (greek) Life Study of Characteristics of Living Things : Characteristics of Living Things Biologists have formulated a list of characteristics by which we can recognize living things Living Things : Living Things What are some examples of living things? ●What about these things? Rocks, bicycles, books Slide 6: What Does it Mean to Be Alive? The Characteristics of Life Slide 7: Life!!! All living things share some basic properties. Cellular Organization Metabolism (Obtain and Use Energy) Growth and Development Adapt Through Evolution Slide 8: All Living Things are Made Up of Cells Unicellular Organisms Entire organism is made up of one single cell Bacteria and protists Cells are basic structural units of life. Smallest unit capable of all life functions. Cells are the building blocks of all organisms = living things. Two types of cells are: Multicellular Organisms The organism is made up of many cells Cells have specialized functions within the organism Slide 9: Cells Slide 10: UniCellular Slide 11: MultiCellular Slide 12: All Living Things Reproduce Reproduction is the process of producing new organisms of the same type. Two types of reproduction Asexual Reproduction A single parent organism reproducing by itself Sexual Reproduction Two different parent organisms contribute genetic information Involves the combination of male and female sex cells Slide 13: Asexual Slide 14: Sexual: a new genetic combination Slide 15: All Living Things Obtain and Use Energy Living organisms need energy to grow, develop, repair damage, and reproduce Slide 16: Anabolism The process of building up complex substances from simpler substances Building up cells and cellular components Photosynthesis Slide 17: Catabolism The process of breaking down complex substances into simpler substances to release energy Digestion Cellular Respiration Slide 18: Metabolism The total of all chemical reactions in an organism Anabolism + Catabolism = Metabolism Slide 19: A stable state of conditions in the body that are necessary for life Body temperature Water balance All Organisms Maintain Homeostasis Slide 20: Stable Interior Conditions Slide 21: Even though exterior conditions are changing Slide 22: All Organisms Pass Along Hereditary Traits Genes carry hereditary information Genes are composed of DNA Heredity is the reason children resemble their parents Mutations change DNA code and can be passed from generation to generation Slide 23: All Living Things Respond to Their Environment Organisms react to stimuli: Pressure An example is a plant’s leaves and stems growing toward light Slide 24: All Living Things Grow Growth means to get bigger in size Slide 25: All Living Things Develop Development involves a change in the physical form or physiological make-up of an organism - An example would be how a frog is conceived and born. - A frog begins as a single cell in a fertilized egg and then grows into a tadpole and eventually into a fully grown frog. Slide 26: Development Slide 27: All Living Things Adapt to Their Environment Through Evolution Adaptation A process that enables organisms to become better suited to their environment Species obtain adaptations through evolution over great periods of time Slide 28: An Example of Adaptation Desert plants have succulent waxy leaves and stems to store water and reduce water loss Living things adapt and evolve : Living things adapt and evolve Resources : Resources http://www.firstschoolyears.com/science/resources/games/ourselves/living/living.htm (sorting) http://www.teachersdomain.org/resource/tdc02.sci.life.colt.lp_living/ http://www.youtube.com/watch?v=OvMBJZLEwFs&feature=related (movie) http://www.youtube.com/watch?v=uM_CgOgJGG0&feature=fvw (movie w/ song) http://www.youtube.com/watch?v=PZ2FI50oecs&feature=related (note and voice)
<urn:uuid:65206a0e-4bcb-4242-b807-c941b34e0dad>
CC-MAIN-2016-26
http://www.authorstream.com/Presentation/marglema9-625716-characteristics-of-living-things/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395620.56/warc/CC-MAIN-20160624154955-00027-ip-10-164-35-72.ec2.internal.warc.gz
en
0.825936
860
3.5625
4
The darkest skies I've enjoyed have been overhead in national parks. Winter nights in Yellowstone National Park so cold and so dry that stars seem almost within reach. At Natural Bridges National Monument, the Milky Way forms a horizon-to-horizon band over the landscape. Skies are so dark over most of Canyonlands National Park that shooting stars burn trails through the night. These sorts of star shows -- and especially the Perseid meteor showers in August -- encourage you to go tentless in the parks, to sprawl on your back in your sleeping bag and doze off under the most spectacular night lights you'll ever encounter. More and more national parks are building both delight in and respect for these dark night skies with festivals. Bryce Canyon National Park celebrates its 10th annual Astronomy Festival July 7-10, Acadia National Park is the backdrop for 2nd Annual Acadia Night Sky Festival September 9-13, and the 20th Annual Grand Canyon Star Party was held on the park's North Rim in early June. And those are just some of the opportunities that exist for you to get together with other star gazers to enjoy the night skies. Thanks to Tyler Nordgren, though, you don't have to wait for a specific star festival to learn more about the skies over the national parks. Dr. Nordgren, an associate professor of physics at the University of Redlands in California, late this spring published Stars Above, Earth Below, A Guide to Astronomy In the National Parks. The idea for such a book came to Dr. Nordgren during a visit to Yosemite National Park in the spring of 2005. One night he attended a campfire program that revolved around astronomy, "and what I saw that night would lead me, over the next four years, to work with park rangers from Denali in Alaska to Acadia in Maine, and Big Bend on the Rio Grande to Glacier on the Canadian border." (Editor's note: Dr. Nordgren is scheduled to be the keynote speaker at next month's Bryce Canyon star festival.) During that Yosemite campfire program, Dr. Nordgren met Kevin Poe, one of the National Park Service's "Dark Rangers," who happened to be visiting Yosemite from his home base at Bryce Canyon National Park. Their conversation led to a 14-month odyssey that took Dr. Nordgren to a dozen national parks to not just study the skies overhead but also to better educate both rangers and the general public on the dark skies above. Along the way he also gathered the material to write Stars Above, Earth Below. The heft of this 444-page, $30 book can be downright intimidating, but don't let it be. Though the book's index is sprinkled with chapters touching on the Milky Way, Black Holes, and "our cosmic connection," just to cite three intriguing entries, national parks are at the heart of the book. But to enable you to better understand the skies over the parks, Dr. Nordgren lays down a thick primer of what actually is over your head, be it a star, a constellation, the Milky Way, or a comet. East of Scorpious is the giant teapot asterism at the heart of Sagittarius. The teapot pours downwards onto the tail of Scorpius while magnificent clouds of celestial 'steam' billow between them before rising high into the sky. This 'steam' is the Milky Way and it's the reason I eagerly look for these constellations each summer. The ribbons of vapor rise northward from the teapot on the southern horizon all the way to the zenith where it forks in two and then faces away to the far northeastern horizon. If you're lucky enough to be in the southern half of the country the first puffs from the spout are the brightest part. There are times when the text lapses almost into a college lecture: High in the Helena Formation limestone are one billion year old fossils revealed by the retreating Grinnell Glacier. The fossils look like concentrations of giant concentric circles; what they are are stromatolites and they record some of the earliest known forms of life on Earth. A stromatolite is a large cabbage-shaped knob of limestone created by the respiration of masses of aquatic cyanobacteria (commonly called blue-green algae). But there also are colorful first-person narratives interspersed throughout: I saw my first glacier when I moved to Alaska as a boy at the age of 10. Portage Glacier was my 'neighborhood' glacier just an hour's ride down the Seward Highway from Anchorage. I vividly remember standing with my brother on the edge of the glacial lake as the howling, frigid wind nearly blew us into the water. Clearly, this is not your typical national park guidebook. But then, the night skies overhead are a bit more complicated than a hiking trail or a historic building. In pulling this richly illustrated book together -- along with his own night sky photographs the professor treats readers to some from NASA and, naturally, some from the National Park Service -- Dr. Nordgren explains how past cultures -- Chaco, Navajo, Hopi, and Chumash, among others -- viewed the night skies. He mixes the science, the history, and the skies overhead with his travels through the parks. At Big Bend National Park, for instance, he found that "the backcountry campsites south of the Chisos Mountains have perhaps the darkest, least light polluted skies of any part in the continental United States." At Grand Teton National Park, he marvels at the Moon as the Sun's light illuminates it over the Teton Range during an eclipse back in 2007. He points to the defining feature of Crater Lake National Park when discussing the pock-marked face of the Moon. To help you understand what you're seeing overhead, Dr. Nordgren has provided star maps that you can hold over your head. By exploring the heavens above, he also explains some of the features of our own world, and visa versa. Yellowstone with its underlying volcanism comes into play when discussing Venus, Mars and Jupiter. Look at a photograph of Io (one of Jupiter's moons). Every single black speck and dark circle is a hot spot like the Yellowstone hot spot; every one is a volcano. The tidal heating that produces those volcanoes long ago boiled away all the water and ice that is still found on Jupiter's other moons. What's left is a hellish wasteland of sulfur compounds in neon yellows, oranges, reds, and whites. For anyone who's ever visited one of Yellowstone's major geyser basins, this description isn't too far wrong. There's no mistaking that this is a serious book on astronomy. Indeed, it no doubt will appear in more than a few college classrooms. But if you're looking for a sound text that explains what's overhead on your next national park trip, Stars Above, Earth Below won't fail you.
<urn:uuid:309a2344-e8a9-4ae7-b436-f89f19e4fe99>
CC-MAIN-2016-26
http://www.nationalparkstraveler.com/review/2010/stars-above-earth-below-guide-astronomy-national-parks6082
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783400031.51/warc/CC-MAIN-20160624155000-00122-ip-10-164-35-72.ec2.internal.warc.gz
en
0.936131
1,438
2.84375
3
Fruit and nut trees will grow well if irrigated regularly. Drought stress will reduce fruit size and stunt growth especially in young trees. If the water status of the plant is severely deficient the leaves will wilt, curl, and sunburn. The fruit can be dramatically affected, too, through reduction in size, water loss and shrivel, and sunburn. Good irrigation practices in California include the application of water at sufficient intervals in order to never induce significant plant stress. This will ensure the maximum plant growth, fruit size, and yield. In some circumstances, however, a slight water stress induced at specific growth stages can improve fruit flavor, enhance sugar or oil content, and limit vegetative growth. Water quality may be an issue in parts of California with salt, or mineral excess problems. Irrigation water should be tested for its mineral content to avoid toxicity to plants if there is a problem expected. More trees are lost to over-irrigating than probably to any other cause. Over-irrigation combined with poor drainage especially leads to tree death. For the period after leaf drop in the fall and until shoot and leaf growth get underway in the spring, trees normally will not need irrigation. Irrigation recommendations are often stated in the following ways: “irrigate when needed,” “irrigate thoroughly, but not frequently.” The meaning of these statements are unclear for many, especially the novice and those with the tendency to irrigate more when plants appear unhealthy. The key to irrigating any plant is “how much” and “how often.” To water optimally you must know: - Daily water use - Soil type - Amount of water applied - The area a plant covers - Rooting depth - Efficiency adjustments Putting It Together The amount of water a fruit tree uses depends primarily on how big it is and how hot the day is. Several other factors influence water use such as relative humidity and wind, but they are less important. The water use by fruit trees is amazingly similar between species. The goal is maximum growth in the early years to fill the allotted space and maximum production of large fruit. This requires a lot of water in a state where the days are hot and dry. All fruit trees grown for high production have green succulent growth. If the amount of leaves covering an area is the same then the species or variety of tree does not make much difference. The greatest difference in water use is due to tree size. In the Guide, look at the difference between a tree that occupies 36 ft2 (6 ft. × 6 ft.) and one roughly three times that size 100 ft2 (10 ft. × 10 ft.). The water use is three times (5.6 gallons per day compared to 15.6 gallons per day). Water use for a medium sized semi-dwarf fruit tree is about 16 gallons of water per day on a hot summer day on the coast of California without any fog influence (0.25"/day). That same tree in the Sacramento or San Joaquin Valley would be about 19 gallons per day (0.3"/day). Therefore, a tree with two, one-gallon drip emitters on each side would have to be irrigated about 8–9 hours every day. The theory and practice of drip irrigation is to provide just what the tree needs every day. Not enough water is applied to leave any in storage in the soil for the next day, so it needs to be watered again the next day. Drip irrigation is a good delivery system because it only wets a small area so that weed growth is limited and the system is easily adapted to many landscape situations. Fortunately only a small fraction (10–20%) of the root area needs to be watered in order to achieve good results. Soil type or depth has very little influence on drip irrigated trees since the water use rate is determined by weather and trees size. Soil water holding capacity is unimportant due to daily irrigations. Based on tree response from irrigation studies, it has been determined that for young trees it is beneficial to irrigate them by a factor of 2 (double) until the trees reach 70% full cover. It seems that “over irrigated” young trees grow even better than if they receive their daily water use allotment based on evapotranspiration. See the example below: For drip irrigation, start irrigating in early spring before much soil moisture has been used because this stored water may be needed later in case the system is accidentally shut down. Soil type or depth is almost inconsequential, and only 10–20% of the rooting area need be wetted for good tree performance. A 2 year-old semi-dwarf fruit tree occupies a space of 10 ft2. It has 2, 1 gal/hr emitters, and on a warm spring day the water use rate (ET) is about 0.20 in/day. How much: 1.25 gal/day (from Guide) × 2 (for an efficiency adjustment on young trees with 10–15% canopy) = 2.5 gal/day. How often: 2.5 gal/day divided by two emitters per tree = 75 minutes per tree every day or 2.5 hours every other day. A mature standard sized (large) fruit tree occupies and area of 300 ft2 with four, one 1 gal/hr emitters per tree. On a hot summer day it uses 0.25 in/day (ET). How much: 46.8 gallons per day (from Guide). How often: 46.8 divided by 4 emitters = 11.7 hours everyday. Every other day = 23.4 hours. Mini-sprinklers are small sprinklers with the water delivered through drip irrigation tubing. Each individual mini-sprinkler usually delivers about 10 gallons per minute or 10 times the average drip emitter. The mini-sprinkler system is typically run twice to three times per week with some water held in the soil in storage. Run times can be calculated (from the Guide), multiplied by number of days between irrigation intervals. Care must be taken to investigate the depth that the irrigation water is reaching for mini-sprinklers since some of them shoot the water so far that they would have to run continuously for days in order to water down 24 inches. Most fruit tree roots are located between 6 inches and 24 inches of the top of the soil. This is also the area with all the nutrients (topsoil) and the oxygen. Keep this area moist at all times and really focus on maintaining adequate moisture there. The old adage of forcing the tree roots down deep is just that it is forcing the tree and causing stress. Home orchard trees that are on deep soils can get by with less intensive irrigation management because the tree roots are deeper and there is a buffering capacity for drought stress. Shallow soils need to be managed much more intensely with frequent lighter irrigations. Sprinkler irrigated trees use the same amount of water as drip irrigated trees (which is based on how hot it is) plus an additional 20% for loss to evaporation and non-uniformity of application. The real difference is that with sprinkler irrigated trees, more water is applied at once, it is stored in the soil for 2-3 weeks before the next irrigation, and the entire area is watered. When the whole area under the trees is irrigated, water can not be saved based on tree size. Weed growth also covers a much greater area. Another important difference for sprinkler irrigated trees is that soil rooting depth (volume of soil) and soil water holding capacity (soil type, sand or clay) becomes important since water is stored in the soil. If trees are over irrigated water is lost beyond the root zone. Under irrigation is usually caused by not running the sprinklers long enough to wet the entire depth of the root zone or miscalculating the amount of water stored in the particular soil type and going too long between irrigation intervals. For sprinkler irrigation, water is not applied daily, but on a periodic basis to fill the soil, which acts as a storage reservoir for water available to the plant. Soil type and rooting characteristics are very important. Recent research shows beneficial results from irrigating at or before 50-75% depletion of the (soil-stored) available water, then applying what has been used + 20% for efficiency loss. A mature standard size (large) fruit tree occupying an area of 300 ft. A rooting depth of 3 ft., loam soil, and a daily water use (ET) of 0.25 in/day in July. How much: 3 ft. rooting depth × 2" of available water per feet = 6" of available water. 6" x 75% depletion = 4.5" = amount of water to apply + 20% = 5.4" How long: Use the Catch Can Test to measure how long it takes to apply 1" of water × 5.4" = the duration of set. Most sprinklers apply about 0.3" of water per hour, so it would take 18 hours to apply 5.4" of water. How often: 5.4" of water divided by 0.25 in/day = 21 days. If you want to figure out how many gallons of water the tree would use you need two other figures: 27,154 gallons in an acre-inch and 43,560 square feet in an acre = 1,010 gallons of water per tree. For a more complete, detailed discussion of this subject, see Micro-Irrigation of Trees and Vines: A Handbook for Water Managers, by Schwankl, Hanson and Prichard, published for University of California Irrigation Program, by the University of California, Davis, 1995.
<urn:uuid:6158850b-2ad3-48b8-942c-92afd52960f8>
CC-MAIN-2016-26
http://homeorchard.ucanr.edu/The_Big_Picture/Irrigation/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783403826.29/warc/CC-MAIN-20160624155003-00008-ip-10-164-35-72.ec2.internal.warc.gz
en
0.945237
2,048
3.734375
4
January 7, 2014 Many people look up into the sky everyday and notice white trails being sprayed from airliners. Some believe they are seeing innocent condensation trails (‘contrails’), yet a growing number of people around the world are beginning to uncover the evidence that proves these lingering white trails (‘chemtrails’) are actually evidence of a stratospheric aerosol geoengineering spraying program. A quick glance at Wikipedia would have you believe chemtrails are a conspiracy theory and if you watched the Sci Fi Network’s TV show Joe Rogan Question’s Everything, you would also believe that the jet trails seen above were simply just fuel being burned off by airplanes. Ellen Degeneres asked Al Gore about the ‘rumour’ of scientists trying to block the sun with chemicals, in an effort to slow down global warming and Gore played it off as hokey sounding, although he sure knew a lot about the science. The more this science is researched, the more names you find to describe it. Geoengineering, solar radiation management, weather modification, climate remediation and cloud seeding are all agreed upon academic terms and not labeled as conspiracy theory. Why does the word chemtrail automatically trigger people to think conspiracy theory? The word chemtrail has a negative connation that makes a lot of people immediately write it off as a conspiracy theory, because it sounds harmful. Many claim, “the government wouldn’t do that to us” or “that would be too expensive and hard to keep secret.” So let’s take a look at the undeniable evidence, to finally prove if chemtrails are real or not. First of all, the stratospheric aerosol spraying patents must be read thoroughly. The list is long, but it is sourced and provides a good way to look into the history of the technology of using planes to disperse chemicals for a wide variety of reasons. Next, we must look back to the Vietnam War, where our military ran Operation Popeye, a weather modification operation to ‘make mud not war.’ The purpose of this operation was to seed clouds to create heavy rains that would deny the enemy access to roadways and bridges. All military rainmaking operations were halted within days following the New York Times’ report on them in 1972. Now that we know about the past, we can look ahead to the future. On November 1, 2013, President Obama signed an Executive Order titled, ‘Preparing the United States for the Impacts of Climate Change.’ In Section 5 of the order it says, “these plans evaluate the most significant climate change related risks to, and vulnerabilities in, agency operations and missions in both the short and long term.” We can’t prove the operations and missions that were mentioned related to chemtrails, but we can prove that earlier in 2013, Foreign Affairs, published by the Council on Foreign Relations (CFR), described the scientific process as, “spraying material into the stratosphere, where it would turn into reflective clouds.” Shockingly, the article went on to say, “Flying a fleet of high-altitude aircraft that spray particles into the upper atmosphere would cost perhaps ten billion dollars per year -- a pittance for a country that is suffering from severe climate change and seeks a quick solution.” Now we’re in trouble. So if chemtrails are actually real after are, what does a contrail look like? Contrails dissipate after a short period of time, as opposed to chemtrails which linger for hours, eventually leaving the sky covered in a silverly white haze. This difference is important to remember, as not all planes above us are apart of this operation. With so many people talking about climate change these days, it’s important that we dispel the chemtrail conspiracy myth and begin using the scientific terms instead of chemtrail. We are living under a massive geoengineering experiment and as we saw with the ending of Operation Popeye, we can put this operation to a halt quickly. The solution to climate change doesn’t start with carbon taxes, trades or reduced emmissions, it starts with admitting chemtrails are the cause of our planet’s climate change problems. Once we can move past the word chemtrail and begin using the correct terms, stratospheric aerosol geoengineering, solar radiation management, weather modification, climate remediation, cloud seeding and reverse global warming, then we can actually start addressing more solutions to this problem. For more information on this subject, check out the documentaries What In the World Are They Spraying, Why In The World Are They Spraying and Look Up!
<urn:uuid:b51b1ca6-0dd1-4921-8e17-560d2d381e4e>
CC-MAIN-2016-26
http://wearechangecolorado.org/Home/tabid/734/ID/10614/Are-Chemtrails-Real.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783408828.55/warc/CC-MAIN-20160624155008-00058-ip-10-164-35-72.ec2.internal.warc.gz
en
0.940393
988
2.5625
3
Mule deer are giving new meaning to watching out for other mothers' kids. An intriguing study of mule deer and whitetail deer conducted by the University of Alberta in Edmonton, Canada and the University of Lethbridge, also in Canada, showed that both species responded to the recorded distress calls of fawns, similar to the responses elicited when coyotes attack fawns, with mule deer mothers responding to both whitetail and mule deer calls, even when their own fawn stood next to them. In contrast, the whitetail mothers responded only to their own species' call, and only when they could not see their own fawn. "The fact that mule deer ran to the speaker when their own fawn was standing next to them safe and sound revealed they do not help other fawns because they mistake them for their own," said lead author Susan Lingle, who conducted the research as a postdoctoral fellow in biological sciences at the University of Alberta and in psychology at the University of Lethbridge. "It was surprising just how indiscriminate mule deer females were. For example, the females that weren't even mothers also ran to the speakers to help fawns. That would not be expected if females were simply trying to protect their own fawns." The results appear in this month's issue of Animal Behaviour. In field trials using speakers that broadcast the calls of fawns under threat, the mule deer came to the speaker and stayed there as long as the calls played, twisting and turning as they confronted the perceived attackers. Whitetail mothers that came close to the speaker tended to withdraw right away and then stayed safely outside that distance. The behaviour of mule deer defies traditional explanations that parental care, kin selection or reciprocity play a part in the defence of fawns other than their own. But while the study's findings seem to point to mule deer as superior mothers, the motivation for looking out for other fawns i s likely based not on altruism but on simple survival, said Lingle. "Having a rigid and aggressive response to the simple sound of a fawn distress call may ensure effective defence of a female's own offspring, even though this means the female invests time and energy and puts herself at risk by helping many other animals. In contrast, a whitetail mother waits to assess whether a fawn is her own before she steps in to defend it. As a result, whitetail fawns suffer considerably more predation during the first months of life than do mule deer fawns." Mule deer may have developed a more effective aggressive defence because they rely on fighting to protect themselves against predators year-round, while whitetails and many other species restrict aggressive defence to just the youngest fawns. Whitetails rely on flight rather than fight for most of their lives, so this may affect their ability to mount an aggressive defence," Lingle said. Source:University of Alberta Related biology news : 1. Climate change: The rice genome to the rescue 2. Batfish to the rescue! 3. Angelman syndrome deficits rescued in mice 4. Adding Radiation Therapy To Chemotherapy Improves Survival In Patients With High-risk Breast Cancer 5. Another Look Finds Promising Proteomics Test is Not Biologically Plausible 6. Elephants imitate truck noises, other animals 7. Deficiency of growth hormone and IGF-1 reduces cancer and kidney disease, but creates other problems 8. NJIT Presidential Award winner takes stem cell research another step 9. New Treatment Rivals Chemotherapy For Lymphoma, Study Finds 10. NASA links nanobacteria to kidney stones and other diseases 11. Anti cancer virotherapy well tolerated in first human administration, research finds
<urn:uuid:c19f5ef6-de63-4ac3-8054-876aae2aa96c>
CC-MAIN-2016-26
http://www.bio-medicine.org/biology-news/Mule-deer-moms-rescue-other-fawns-5399-1/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398869.97/warc/CC-MAIN-20160624154958-00062-ip-10-164-35-72.ec2.internal.warc.gz
en
0.957447
786
3.421875
3
PEST OF THE MONTH Eastern Subterranean Termites As their name indicates the type of termites we deal with in New England are Subterranean and are typically moving around in the soil. Termites are an important part of recycling in the environment but are a structural destructive force in your home or business. Termites enter your home through a crack less than 1/16th of an inch. In a colony you will find workers, soldiers and reproductive termites. Termites require a moist environment in order to survive so they need to get back down into the soil to re-moisturize their bodies. In the springtime a “swarm” of winged termites can be seen inside or outside of your home. We Have Found Termites Damaging: Since termite colonies are in the ground or must return to the ground, the full area around the foundation is treated to create a barrier around your home. The chemical used (a termiticide) cannot be detected by the termites. Through there social interactions, they pass this material on to each other. Slowly knocking off each member of the colony in such a way that they don’t realize they are in danger. Are you beeing bugged? Contact us at 1-800-649-9992 or FORDSHOMETOWN.COM
<urn:uuid:bf16f74e-ece8-4c30-ad9b-1a055ad7e495>
CC-MAIN-2016-26
http://www.fordshometown.com/blog/2013/03/a-little-info-on-our-pest-of-the-month/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397744.64/warc/CC-MAIN-20160624154957-00096-ip-10-164-35-72.ec2.internal.warc.gz
en
0.929962
275
3.03125
3
Charles Pomeroy Stone (1824-1887) Charles Pomeroy Stone (September 30, 1824 - January 24, 1887) was an officer in the U.S. Army who became a Brigadier General during the American Civil War. Stone was born in Greenfield, Massachusetts on September 30, 1824. After graduating from the U.S. Military Academy at West Point, Stone served as an Ordnance Officer with Maj. Gen. Winfield Scott's army in Mexico. There, he was brevetted First Lieutenant and Captain. After the Mexican-American War, he spent five years as Chief of Ordnance of the Pacific Department. In 1856 Stone resigned from the Army and was employed by the Mexican government as a surveyor, leading a scientific expedition in Sonora,Mexico. With the outbreak of war in 1861, Stone returned to Washington and as Inspector General of the District of Columbia militia secured the capital for the arrival of President-elect Abraham Lincoln. Stone was appointed a Colonel of the 14th U.S. Regulars in May and a Brigadier General of Volunteers in August. He commanded a brigade in the Shenandoah Valley during the First Bull Run campaign and afterward commanded a division, the Corps of Observation, guarding the fords on the upper Potomac. In October 1861 he sent a portion of his command to attack a suspected Confederate camp near Leesburg, Virginia, and it was soundly defeated at the ensuing Battle of Ball's Bluff. Stone bore the brunt of public and congressional criticism. In February 1862 he was arrested in the middle of the night, without charges being preferred, and confined for 189 days. Stone was released without explanation. It was not until 1863 that he was given another assignment, in the Department of the Gulf. However, in April 1864 the Secretary of War ordered Stone mustered out of his commission, and Stone was without a command. He finally resigned from the Army in September of the same year. After the war he served thirteen years as Chief of Staff and general aide-de-camp for the khedive in the Egyptian Army, during which he was given the rank of Lieutenant General and the title of Ferik Pasha. Stone later returned to the United States, where he served as the Chief Engineer for the construction of the Statue of Liberty's pedestal and concrete foundation. He died in New York City on January 24, 1887.
<urn:uuid:03f7b47a-73cf-451e-9afe-e0015cf84b71>
CC-MAIN-2016-26
http://www.thelatinlibrary.com/chron/civilwarnotes/stone.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398628.62/warc/CC-MAIN-20160624154958-00196-ip-10-164-35-72.ec2.internal.warc.gz
en
0.985001
499
2.671875
3
1 Answer | Add Yours The story begins on a boat (the Nellie, “a cruising yawl”) on the Thames estuary, in London. It is probably late afternoon, the air is dark and “seemed condensed into a mournful gloom.” There are five people on the boat, waiting for the tide to change; the narrator is one of them (“We four affectionately watched his back … “) and refers to the others using job titles (e.g., the “Lawyer”, the “Accountant”) except for Marlow, who is the only one endowed with a name. The narrator describes him as a sort of Buddha, an idol (“Marlow sat cross-legged … “), probably to herald his central position in the tale as a carrier of wisdom. At a certain point, Marlow starts speaking and, after a few lines, we understand that he will be in charge of narration (“… we knew we were fated …” says the narrator). The first three pages set forth the most important elements of the novel: the dichotomy between light and darkness, the sea voyage as self-discovery, the relationship between the Romans and the new European colonisers, Marlow’s view of efficiency and conquest, the nature of the narrative itself (“… a glow brings out a haze …”). There is also a very interesting hint as to what and where the heart of darkness really is: at the end of the story, we will be back in London as the narrator outlines the terrible darkness over London. We’ve answered 328,204 questions. We can answer yours, too.Ask a question
<urn:uuid:749ae9ef-a798-4b85-97c3-6351fbefd912>
CC-MAIN-2016-26
http://www.enotes.com/homework-help/what-setting-chapter-1-heart-darkness-286968
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402516.86/warc/CC-MAIN-20160624155002-00019-ip-10-164-35-72.ec2.internal.warc.gz
en
0.963597
362
2.875
3
No existe una traducción para este contenido. USDA is encouraging healthy eating habits to Flint residents to help mitigate lead absorption. USDA honors schools for helping kids form healthy habits and developing an understanding of the importance of nutrition and agriculture. Disasters are never easy, but USDA is proud to play a crucial role in lifting the burden that families face. It may seem like common sense for child nutrition programs to benefit children, but some see it differently today. Games and activities for your summer meal site! A recent FNS report shows all of the hard work of WIC agencies and mothers nationwide is paying off. March is a month to celebrate both the foundation and purpose of the American food system. When disasters strike, it’s not only important for you and your family to be prepared, it’s also critical that your community be prepared. Help Americans Eat Smart and Maintain a Healthy Weight Preserve Public Trust in Our Programs FNCS is an Efficient, High Performing and Adaptable Organization Reduce Food Insecurity by Helping Feed Those in Need Ensure Access, Equality and Respect in FNS Programs and Activities
<urn:uuid:1c547677-3342-4c4f-8257-841db038934b>
CC-MAIN-2016-26
http://www.fns.usda.gov/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393442.26/warc/CC-MAIN-20160624154953-00135-ip-10-164-35-72.ec2.internal.warc.gz
en
0.896497
246
2.765625
3
Few American economists have wielded as much influence on economic thought and policy as the late Milton Friedman. He was an articulate and ardent advocate of free markets and personal liberty. In 1962, his CAPITAL AND FREEDOM, which continues to be in print with nearly one million copies sold, pointed the way not only to economic but also political freedom. A year later his MONETARY HISTORY OF THE UNITED STATES, 1867-1960, co-authored with Anna Schwartz, cast a new light on the Great Depression and the policies that caused it. He was a passionate critic of all versions of socialism and a fervent censor of Keynesian economics which stands as the most influential economic formulation of the 20th century. One of the most prolific writers of his time, Professor Friedman wrote many pertinent economic columns in Newsweek. His outstanding achievements earned him the NOBEL PRIZE in 1976. It may be folly to criticize and censure a famous author whom all the world admires. Yet this economist has been at odds with Professor Friedman ever since he advanced his monetarist thought. It is strange that Professor Friedman and his fellow monetarists, who are such defenders of the market order, should call on politicians and bureaucrats to provide the most important economic good–-money. Granted, monetarists do not trust them with discretionary powers, which led Friedman to write a detailed prescription, a Constitutional Amendment; however, the Constitution is supreme force, backed by courts and police. The amendment is a political formula to be adopted by political authorities and, when enacted, a constitutional prohibition of monetary freedom. The Amendment calls for issue of government money in the form of non-interest bearing obligations which would not alter the nature of currency expansion, it merely would change its technique. The stock of these obligations is supposed to grow, year after year, without any obligation to repay, which changes their nature from being “obligations” to being mere government paper. The Friedman proposal would merely simplify the technique of money issue; instead of the Federal Reserve creating and lending its funds to the U.S. Treasury, earning an interest thereon and then returning the interest to the Treasury as “miscellaneous receipts,” Friedman would have the Treasury issue non-interest bearing U.S. notes. This would save the U.S. Treasury the interest it is now paying, and eliminate the “miscellaneous receipts” the Treasury is now receiving. In its search for stability, the Friedman amendment, unfortunately, proceeds on the old road to nowhere. There is no absolute monetary stability, never has been, and never can be. Economic life is a process of perpetual change. People continually choose among alternatives, attaching ever-changing values to economic goods; therefore, the exchange ratios of their goods are forever adjusting. Economists searching for absolute stability and measurement are searching in vain, and they become disruptive and potentially harmful to the economic well-being of society when they call upon government to apply its force to achieve the unattainable. Money is no yardstick of prices. It is subject to man’s valuations and actions in the same way that all other economic goods are. Its subjective, as well as objective, exchange values continually fluctuate and, in turn, affect the exchange ratios of other goods at different times and to different extents. There is no true stability of money, whether it is fiat or commodity money. There is no fixed point or relationship in economic exchange. Yet, despite this inherent instability of economic value and purchasing power, man is forever searching for a dependable medium of exchange. The precious metals have served him well throughout the ages. Because of their natural qualities and their relative scarcity, both gold and silver were dependable media of exchange. They were marketable goods that gradually gained universal acceptance and employment in exchanges. They even could be used to serve as tools of economic calculation because their quantities changed very slowly over time. This kept changes in their purchasing power at rates that could be disregarded in business accounting and bookkeeping. In this sense, we may speak of an accounting stability that permits acting man to compare the countless objects of his economic concern. Contrary to monetarist doctrine, an expansion of the money stock of three to five percent suffices to generate the business cycle. Economic booms and busts occur in every case of fiat expansion, whether the expansion is one percent or hundreds of percents. The magnitude of expansion does not negate its effects; it merely determines the severity of the maladjustment and necessary readjustment. Monetarists are quick to proclaim that business recessions in general, and the Great Depression in particular, are the result of monetary contraction. Mistaking symptoms for causes, they prescribe policies that treat the symptoms; however, the prescription, which is reinflation, tends to aggravate the maladjustments and delay the necessary readjustment. The Friedman amendment, unfortunately, would cause the same economic and social conflicts as the present fiat system. It would create income and wealth with the stroke of a pen, and then distribute the booty to a long line of eager beneficiaries. The amendment would fix the quantity of issue, but the mode of its distribution, which confers favors and assigns losses, would be left to the discretion of the monetary authorities. It would enmesh them in ugly political battles about “credit redistribution,” which soon would spill over to the halls of Congress, just as it does today. The monetarists actually have no business cycle theory, merely a prescription for government to “hold it steady.” From Irving Fisher to Milton Friedman the antidote for depressions has always been the same: reinflation. The central banker who permits credit contraction is the culprit of it all. If there is a recession, he must issue more money, and if there is inflation, that is, rising price levels, he must slow the increase in the supply of money, but increase it nevertheless. Professor Friedman himself seems to have been aware of his lack of business cycle theory when he admitted “little confidence in our knowledge of the transmission mechanism.” He had no “engineering blueprint,” but merely an “impressionistic representation” that monetary changes are “the key to major movements in money income.” His “gap hypothesis,” therefore, is designed to fill the gap of theory and allow for the time it takes for all adjustments to be corrected. He seeks to time the recession without explaining it. The increasing importance of government obligations as bank assets gives great confidence to monetarists; however, it creates anxiety because government obligations merely are receipts for money spent and savings consumed. Every budgetary deficit that creates more government obligations consumes productive capital and thereby hampers economic production. The growing importance of government obligations in bank portfolios actually signals government consumption of economic substance and wealth. To commercial banks, it means the loss of real property securing the loans, and the addition of yet more government promises to tax, print and pay. A banking system built primarily on government IOUs is in a precarious condition. What Professor Friedman called the “dethroning” of gold was, in truth, the default of central banks to make good on their legal and contractual obligations. Following the example set by the United States on August 15, 1971, central banks all defaulted in their duty to redeem their currencies in gold. The default, unfortunately, did not bring stability and prosperity; it opened the gates for world-wide inflation. It made the U.S. dollar the world currency, elevated the Federal Reserve System to the world central bank, and inundated the world with U.S. dollars. (Cf. My Money and Freedom, Libertarian Press, 1985.)
<urn:uuid:af71e6f4-3b40-41d9-a83f-d95c7290bc43>
CC-MAIN-2016-26
http://www.visionandvalues.org/2006/12/milton-friedman-1912-2006/print/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393533.44/warc/CC-MAIN-20160624154953-00201-ip-10-164-35-72.ec2.internal.warc.gz
en
0.960957
1,581
2.640625
3
Buckwheat: A Multi-Purpose, Short-Season Alternative Robert L. Myers and Louis J. Meinke Department of Agronomy Most Americans know of buckwheat only from its use in buckwheat pancakes. Those more familiar with the crop know it to be a versatile, easy-to-grow, short-season grain crop adapted to many regions. It tolerates poor soils and is often used as a soil-improving crop, a role it served for such notables as Thomas Jefferson and George Washington on their Virginia farms. Buckwheat production has been limited by a small market and the crop's relatively low yield. However, it has made a niche for itself because of some desirable food characteristics and its unique status as a short-season crop that can be planted later than any other summer grain crop. In most areas where it is grown, it is used as the sole crop for a field in the summer, often as a late planted alternative after regular crops have failed. In Missouri, however, a real opportunity exists to grow buckwheat as a double crop after wheat, especially where soybeans are not feasible for double cropping. In recent years, roughly 60,000 to 70,000 acres of buckwheat have been grown in the United States (more than 4 million acres are grown worldwide). Japan is the main market for U.S. buckwheat. Demand for buckwheat in the U.S. as a food source is relatively small, but since the export market is currently strong, the crop is regaining some popularity. Buckwheat was grown on approximately 2,000 acres under contract in west central Missouri in 1993. Contracting is expected to continue due to the strong export market. Buckwheat was one of the earliest crops to be domesticated in Asia. It's earliest use as a food crop was most likely in China 5,000 to 6,000 years ago. It spread through Asia to Europe and was brought to the American colonies in the 1600s. At its peak in the last half of the 19th century, more than a million acres of buckwheat were grown in the U.S. Historically, the eastern and northern parts of the country, particularly New York and Pennsylvania, have grown the most buckwheat. In recent decades, production has been greatest in the north central states. Little buckwheat has been grown on Midwestern farms during the last century. Most buckwheat grown in Missouri in recent decades has been on small acreages for special purposes, such as a cover crop, wildlife food, or a pollen source for bees. Research at MU indicated buckwheat has good potential for double cropping in the state, leading to the start of contract production in 1993. Buckwheat is a broadleaf, herbaceous plant that flowers prolifically over a period of several weeks. The small, white flower clusters quickly develop into triangular brown seeds roughly the size of soybean seeds. The brown buckwheat grains actually consist of a true seed (groat) surrounded by a thick hull. Buckwheat is sometimes referred to as a pseudocereal because the grain is used in ways similar to cereal grains such as oats, but it is not a true cereal crop due to seed and plant type. Both the scientific name of buckwheat, Fagopyrum sagittatum (Gilib.), and its common name stem from the seed's appearance, which is similar to the seed of the beech tree. The Dutch name, boekweit, means beech-wheat. Buckwheat is a member of the Polygonaceae family, which also includes smartweed species. A weed in the southern and western U.S. called wild buckwheat is of the same botanical family, but is a different genus and species. Like soybeans, buckwheat produces flowers in an indeterminate fashion, and flowering will often occur right up until harvest or frost. At peak bloom, the green leaves of the crop canopy are almost hidden under masses of white flowers. Flowers are self-sterile and must be cross-fertilized by insects or wind for seed set to occur. Cool, moist conditions also aid in seed set, but many flowers will abort in any case. Buckwheat emerges quickly in warm soil conditions and reaches a height of 2 to 4 feet. The plant has a fairly small, shallow rooting system, and thus is not particularly drought tolerant (but it may avoid midsummer droughts if planted late). Buckwheat sometimes temporarily wilts during hot, dry afternoons. Branches form primarily in the upper canopy. Leaves are alternate and heart-shaped, usually 2 to 3 inches in length. When seeded in narrow rows, a thick crop canopy develops within a few weeks of planting. In the U.S., most buckwheat is sold as processed flour or in pancake mixes. The Japanese use buckwheat flour in noodles and other products. In eastern Europe, buckwheat groats (dehulled seeds) called kasha are cooked and served like rice. The groats are sometimes used in the U.S. as a breakfast cereal. Buckwheat flour can be light in color if hulls (one-fourth of the grain in weight) are completely removed before grinding the groats, but often some hull fractions remain in the ground material, giving the flour a dark color. Whole-grain buckwheat is about 11 to 12 percent protein, but after removing the hull, the remaining seed is about 15 to 17 percent protein with 3 percent fat. Buckwheat is used most frequently in the U.S. for soil cover as a green manure crop or smother crop on gardens or small fields. As a green manure crop, buckwheat produces only modest biomass but offers rapid growth, improves soil tilth and makes phosphorous more available. Quick, aggressive growth accounts for its success as a smother crop for suppressing weeds, particularly in late summer. Buckwheat is popular among beekeepers. It produces a dark-colored honey with a distinctive flavor. An acre of buckwheat can support a hive of bees producing up to 150 pounds of honey, if prevailing weather conditions are suitable for good nectar production (reportedly, sunny days and cool nights are best). Buckwheat has long been used as a livestock and poultry feed. Unfortunately, little data is available on use of buckwheat as a feed source. Nevertheless, the literature suggests that buckwheat has reasonable feed value, roughly comparable to oats. The main value of the grain is that it is high in lysine, an essential amino acid that most grains are deficient in. Several research reports indicate that buckwheat is best used in a mixed feed ration, often as no more than one-third of the total mix. Although buckwheat has often been fed to hogs, it is considered more suitable for cattle. Light-skinned livestock (and humans) can develop a rash and possible complications if they are exposed to sunlight after eating a large amount of buckwheat. Dehulled buckwheat may be less likely to cause this photosensitive reaction. Marketing and economics Making a profit from buckwheat in Missouri requires growing it as a double crop, keeping input costs low and obtaining average or better yields. By growing buckwheat after wheat, the land charge and fixed costs can be covered by the return from the wheat crop. Then the buckwheat return will only have to cover variable costs associated with its production. The biggest expenses will normally be seed, labor and machinery costs. Labor and machinery costs will vary depending on how the crop is planted and harvested. Fertilizer costs can and should be kept minimal. No herbicides or pesticides can be used legally, so there is no cost for those inputs. In most cases, no new equipment should be needed. Estimated variable costs per acre for buckwheat production in Missouri ||$15 to 25 ||$0 to 20 ||$10 to 15 ||$5 to 10 ||$2 to 5 |Drying and/or cleaning ||$3 to 5 |Total variable cost per acre ||$35 to 80 With contract price for buckwheat grain normally close to 10 cents per pound, yields of between 350 and 800 pounds per acre or better usually are needed to make a profit (prices may be up to 12 or 13 cents per pound when supplies are short). Such yields are normally quite feasible (production section below). However, buckwheat, like any alternative crop, is somewhat riskier than a traditional crop. Producers should start with a modest acreage to gain experience. Transportation costs can quickly reduce profits if a delivery point is not nearby. On-farm use of buckwheat as a feed source may not be profitable but may help meet other farm goals. It is difficult to estimate the economic benefit to the cropping system and soil by having buckwheat in the rotation, but these benefits should be considered. How to grow buckwheat Buckwheat generates only modest grain yields in comparison to many crops, in part reflecting the very limited amount of breeding that has been done with the crop in recent decades. Typical yields are 800 to 1,200 pounds per acre in Missouri, with yields of 1,500 pounds per acre or more under optimum conditions. These yields are comparable to the major areas of buckwheat production in north-central and northeast states. However, a hot, dry period in late August and early September, which would not be unusual in Missouri, could greatly reduce buckwheat yields. Night temperature may be more important than day temperature. Drought can compound the effect of high temperature, leading to poor seed set. In Missouri, buckwheat is economically feasible as a grain crop only if it is double cropped after wheat or planted as an emergency crop when regular crops have failed. Although some have suggested wheat residue negatively affects buckwheat, this has not been documented. Buckwheat is sensitive to several broadleaf herbicides, including trifluralin, triazine and sulfonylurea products. If this is a concern, hand-plant a small area of buckwheat at least 2 to 3 weeks prior to the target date for seeding a field and check for herbicide injury to emerging plants. Another consideration in rotation planning is that buckwheat, like soybeans, leaves little residue, so soil can be in erodible condition following harvest. Some growers plant rye after buckwheat as a winter cover crop. A good soil-conserving, two-year rotation option is wheat, double-crop buckwheat, rye for winter cover, soybeans in spring, followed by wheat again in the fall. Buckwheat tolerates relatively poor, infertile soils better than most grains, but yields best on medium-textured, well-drained soils. It is reportedly tolerant of poorly drained soils, but should be avoided on heavy or droughty soils. It tolerates acid soils down to a pH of 5. Soils prone to surface crusting may not be the ideal choice, since buckwheat can have emergence problems when crusting occurs. Choosing a variety Relatively few varieties of buckwheat are readily available in the U.S. — most farm suppliers sell a type simply known as "common" buckwheat, genetic material that has not been maintained as a pure variety. Most buyers, especially those exporting to Japan, will specify the variety to be used as part of the production contract. Larger-seeded varieties are almost always the ones desired for food use. Mancan and Manor are commonly grown, large-seeded varieties developed by Agriculture Canada and available in the U.S. Winsor Royal is a comparable large-seeded type released as a U.S. variety by Winsor Grain, Inc. Since buckwheat varieties are not hybrids, harvested seed can be successfully used for replanting the next year. However, many companies that contract for buckwheat prefer or require that their growers use certified seed each year (Table 2). Sources of buckwheat seed |Company (varieties sold) |Glasgow Co-op, Glasgow (common) |MFA, Columbia (common) |Mangelsdorf Seed Co., St. Louis (common) |Out of state |Cenex Land-O-Lakes, Minot, ND (Mancan, Manor) |Green Thumb Commodities, Oldham, SD (Mancan) |Minn-Dak Growers, Grand Forks, ND (Mancan, Manor) |Wensman Seed Co., Carol, Iowa (Mancan) |Winsor Grain Co., Minneapolis, Minn, (Winsor Royal) Field preparation and fertilization For buckwheat, as with most grains, it is important to prepare a firm seedbed if the field is tilled. When no-till planting, make adjustments to ensure that the soil closes over the seed furrow. Many growers do not fertilize buckwheat due to its relatively low value and modest fertility needs. However, for optimum yields, some fertilizer may be needed. Nitrogen fertilizer may improve growth, particularly if available soil N is depleted following wheat. Low rates of N should be used, since more than 50 pounds of nitrogen per acre may lead to lodging. Buckwheat can get by without P and K on soils testing medium to high in these nutrients, but on soils testing low in P or K, application is recommended to achieve optimum yields. Research indicates that buckwheat is effective in capturing soil P, or P from rock phosphate fertilizer, and that P becomes available to the next crop in the rotation as the buckwheat residue breaks down. In planting buckwheat, the key is to achieve a solid, even stand, which is mainly a matter of having good soil moisture and planting at an appropriate date. Buckwheat grown for purposes other than grain harvest can be planted at any date after the frost-free date in the spring. For grain harvest, it is desirable to plant relatively late in the summer, since flowering and seed set will then be more likely to occur as the days and nights begin to cool in early fall. When planted in late July or early August, buckwheat usually matures in 8 to 10 weeks. In the northern half of Missouri, avoid planting later than the first week of August. In the southern half, buckwheat could be planted as late as Aug. 15. At Columbia, highest yields occurred in 1991 and 1992 when buckwheat was planted between July 15 and Aug. 1 (Figure 1). It is possible that an early July date can obtain a good yield, if weather conditions are appropriate. Response of buckwheat varieties to planting date at Columbia, Mo., in 1991 and 1992. A general recommendation for seeding rate is 700,000 plants per acre, which is about 50 to 55 pounds per acre of large seed or about 40 pounds per acre of small seed. Buckwheat can compensate somewhat for a thin stand by branching more, and as a result studies show little yield response to seeding rate. Typical seeding depths are 1 to 2 inches, depending on depth to soil moisture. With warm soils, the seedlings will emerge in 4 to 5 days. The crop must be drilled in narrow rows, typically 6- to 7-inch widths, to obtain a good canopy for shading weeds and for optimum yield. Most standard grain drills will work effectively with buckwheat. Broadcast seeding is not recommended unless the plants are just to be used as a cover crop or as a nectar source for honey production. No herbicides are currently registered for buckwheat in the U.S. Growers must rely on sensible field selection, pre-plant weed control and establishing a uniform, dense crop canopy to shade out weeds from late-season rain. Tillage shortly before planting can control existing weeds and provide a good seedbed. However, care should be taken to avoid drying out the seedbed through excessive tillage. Buckwheat will reseed itself, but is easily controlled by tillage or a number of broadleaf herbicides. Thus it is not likely to present a weed problem in a following crop. Buckwheat has few reported pests, perhaps because the crop is not extensively grown. Reported insect pests include aphids, wireworms and Japanese beetles. Rhizoctonia root rot may occur, but other diseases are rare. Deer or other wildlife may occasionally cause localized damage. Overall, pests are unlikely to cause any significant loss in a buckwheat field. Harvesting and storage In many of the traditional buckwheat production areas, swathing is preferred over direct combining. This reflects the indeterminate nature of buckwheat, with some seeds maturing well before others and flowering occurring right up to harvest. Swathing can reduce the amount of shatter loss and allow some immature seeds to continue ripening in the windrow before harvest. However, growers in Missouri are cautioned that the advantages of swathing have to be balanced with the potential for inclement fall weather, making dry-down and pick-up of a windrow relatively difficult. If the crop is to be swathed, begin swathing when 75 to 80 percent of the seeds in the upper part of the canopy are mature (brown). If direct combining, harvest when 90 to 95 percent of seeds are mature. In either case, expect the stems and some leaves to still be green at harvest, since the crop has not been bred for complete dry-down like soybeans or wheat. Combine cylinder speed should be 600 to 800 rpm, and the concave should be set initially at 1/2 inch, then adjusted for seed size. Avoid cracking hulls, especially if the crop is intended for the food market. A discount is usually charged if grain is brought to an elevator at more than 16 percent moisture. Temperatures greater than 110 degrees Fahrenheit should be avoided in drying buckwheat. Moisture of 16 percent is fine for short-term storage. For longer-term storage, grain should be no more than 12 to 13 percent moisture. Desired test weights vary by company, but are typically 45 or 46 pounds per bushel (historically, buckwheat test weight was listed as 48 pounds per bushel). Large-seeded varieties will often have a test weight only in the low 40s, so producers should be prepared to take a slight discount on test weight. Smaller-seeded varieties have higher test weights, but are otherwise considered undesirable for food markets. It is important to sell the crop within a few months of harvest, because the groats will begin to darken (they are light-colored when fresh), and this reduces the grain's appeal to certain buyers in the food market.
<urn:uuid:e2c09004-2d42-4293-a6e9-622493c51a95>
CC-MAIN-2016-26
http://www.extension.missouri.edu/p/G4306
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395679.92/warc/CC-MAIN-20160624154955-00138-ip-10-164-35-72.ec2.internal.warc.gz
en
0.952995
3,929
3.234375
3
ONLINE, January 2000 Copyright © 2000 Information Today, Inc. After all the work, time, and money that's invested in building and maintaining the library Web site, you and your staff will most likely want to know who, if anyone, is using it. Additionally, what features and resources do visitors use most often? Are the people accessing the site the same people who come into the library? How do people find the Web site? Do they use a search engine? These are usage questions, and librarians already have experience in gathering usage data. For example, librarians count the number of questions asked at a reference desk as a way of measuring its use. Like the reference desk, the library Web site represents a service point. The Web site service point, however, is electronic, and it requires new methods of measuring usage. Understanding the basics of Web server technology and the data servers record is a good start in developing usage measurement techniques. After that, you can explore the software that exists to help you make sense of Web site statistics, and find the right software for your system. remotehost rfc931 authuser [date] "request" status bytes Broken out, each component of a common log file has its own meaning. A typical log entry might look something like: gateway.iso.com - - [10/MAY/1999:00:10:30 -000] "GET /class.html HTTP/1.1" 200 10000 In this example, the remote host is gateway.iso.com. The next two fields, rfc931 and authuser, are blank (represented by dashes). The request was made on May 10, 1999 at 10 minutes after midnight. The file requested was class.html. The error code 200 (status OK) was returned, and the file requested was 10,000 bytes in size. The common log file format may be the standard, but variations of log files exist. Additional information may be stored in referrer and agent logs. 08/02/99, 12:02:35, http://ink.yahoo.com/bin/query?p="sample+log+file"&b=21&hc=0&hs=0, 999.999.999.99, jaz.med.yale.edu In this example, the referring page was a search engine, ink.yahoo.com, and the search used to find the requested page was "sample log file." (Many Web designers and marketers are interested in the search words that lead users to their sites.) Note that the IP address of the computer making the request, 999.999.999.99, is also recorded here. 07/09/99, 13:59:24, , 999.999.99.99, scooby.northernlight.com, firstname.lastname@example.org, Gulliver/1.2 In addition to the standard information about the date, time, and IP address, email@example.com tells you that this hit came from a crawler. A hit from a Web browser would reveal the browser name and version, such as Mozilla/4.0. This probably means the visitor's browser was Netscape version 4.0 (Mozilla was the code name for Netscape and is still used for a browser compliant with the open-source Netscape code.) Browser information, however, is not always considered reliable. Common log files, referrer logs, and agent logs are sometimes combined into one log. Whatever format your Web server uses, the first thing you will need to do is determine what type of log file is being generated. The person responsible for the server should be able to tell you what format is used. In addition, there may be options in the log file that determine what data is recorded, and you may be able to use these options to increase or decrease the data collected, depending on your needs. To sum up, some of the things you can learn from your Web server's log files are: There are also concerns about how caching affects log files. Caching occurs when you visit a Web page and your browser stores that page in memory. The next time you request the same URL, your browser will search its memory for the URL. If it is cached, it will pull the page from memory, and the server will never receive the request. You are using the site, but that will not be recorded in the server's log files. ISPs also utilize caching, which exacerbates the problem. A good rule to remember is that the log file measures requests for specific files on a server, not exact usage. The number of requests does not translate into number of unique visitors, and the numbers may not reflect all usage because of caching. Measuring usage requires extrapolating from what the log file tells us and entails some level of error. To gain more exact knowledge about Web site usage, other means of investigation, such as questionnaires or cookies, must be used. Also remember that dynamic addressing masks some individual users because they are not associated with a unique IP address. Anyone, however, who connects directly to the Internet will have a unique, unchanging IP address. Even though a name is not recorded, access to an individual's IP address can reveal their actions on a Web site. There are currently no laws covering how to handle the information contained in a log file, but because log files can contain information about individual IP addresses, they should be considered confidential, much as circulation records are confidential. Any data the library makes public from its log files should mask individual IP addresses. Data can always be presented at the level of usage by large groups (such as users from a particular country or in-house versus outside users). However your library decides to analyze log files, the library Web site should carry a complete statement of what data is collected, who can see the data, and how that data is used. Before you consider analysis software, make sure you understand what you really want to know about your library's Web-site usage. There is free and commercial software available for log analysis-each has advantages and disadvantages. In general, commercial software offers more features, enhanced graphics, and some level of customer support. If your needs are not too complex, a simpler-and less expensive-alternative may suit you as well as, or better than, the most full-featured analysis packages. The following are not reviews of software. They are quick snapshots of some of the features of free and commercial software to acquaint you with what is available and the price range. No single software package is right for everyone. Performance of individual software will be affected by the types of log files your server produces, so you need to test your own system using your own log files to evaluate what works best in your environment. As you examine software options, keep one key point in mind. Log analysis software can aid in gathering, distilling, and displaying information from log files, but no matter how sophisticated the software, it cannot add to or improve on what is already available in the log file. The contents of the log file are the ultimate limiting factor in what log analysis software can do for you. Analog is a very popular, freely available log analysis software developed by Stephen Turner. Analog offers a standard report, which can be configured to the specifications of the user, and offers a General Summary of requests to a Web server. An important feature is the Request Report. This report displays the most requested Web pages on the Web site, from most to least. The Request Report lists the number of requests, the last date when the file was requested, and the file name. In addition to the General Summary and the Request Report, Analog will display monthly, daily, and hourly summaries. This can help to identify the busiest month, day of the week, and hour of the day. Also, Analog can show the most common domain names of computers where requests for the server's pages originated. This can tell you, for example, that 35% of requests came from academic sites in the U.S. Analog makes no attempt to try to identify the number of visitors to a site. Analog is widely used. It runs on a variety of platforms and can recognize many log files. It does not offer advanced graphics capabilities. The two titles below are also free and can be downloaded from the Internet. PRODUCER: Roy Fielding CUSTOMER SUPPORT: No LOG FILE FORMAT: Common log file format TITLE: http-Analyze 2.01 PRICE: Free for educational or individual use Customer Support: No LOG FILE FORMAT: Common log file format, some extended log file formats WebTrends is a powerful software package that attempts to simplify the process of log analysis. Log profiles and reports are created and edited in menu-driven systems, with wizards and online help available to ease the process. WebTrends lets you manage multiple log files across several servers. Generating a customized report is done easily through the Report Wizard. In the report creation module, you may elect to generate tables and graphics from General Statistics, Resources Accessed, Visitors & Demographics, Activity Statistics, Technical Statistics, Referrers & Keywords, and Browsers & Platforms. Including a table or graph is as easy as checking a box in the wizard process. Graphs can be further customized as pie charts, or bar or line graphs. Reports can be generated as HTML, Microsoft Word, or Microsoft Excel documents. Some of the WebTrends reports are similar to what is offered in free software. For example, WebTrends will generate a report of the most requested pages on the Web site. Notice that a graph is included and that file addresses are also identified by titles. WebTrends has more reports available than the free software. In the area of Resources Accessed alone, WebTrends generates tables and graphs for entry pages, exit pages, paths through the site, downloaded files, and forms. The other report sections are also full of enhanced capabilities. Referrers & Keywords presents the top search engines, sending hits to your site and the search terms that found your site. WebTrends reports can be filtered to exclude or include particular data. For example, you can choose to exclude requests generated by library employees by filtering those IP addresses out of the report. Other filters can present data for only one page, for a particular day of the week or hour of day, or for a particular referrer page. This feature is helpful in controlling the amount of data presented and aids in more finely targeting your reports to a particular subject. WebTrends uses mathematical algorithms to try to distinguish the number of visitors to your site. There are difficulties in determining unique users from log files, and this information may not be credible. WebTrends itself states that the only way to determine a unique visitor to the site is to use authentication (i.e., logons and passwords.) For sites that do require authentication, WebTrends offers the ability to link user profile information in databases to visitor activity on the site. WebTrends offers many easy-to-use features. In some ways, it's a bridge between low-cost or free utilities and very high-end software packages, which can cost from $7,000-$10,000. Some of the advanced capabilities in WebTrends might be more than your library requires. The following two software packages present many of the same capabilities as WebTrends, such as predefined and customizable reports, data filtering, graphics, and friendly user interfaces. TITLE: Netintellect V.4.0 CUSTOMER SUPPORT: Support by phone, email, and online, as well as an online tutorial and documentation TRIAL: Free 15-day trial LOG FILES: Recognizes 45 log file formats PLATFORMS: Windows 95/98/NT 25-day free trial CUSTOMER SUPPORT: Free technical support via email, no phone support available PLATFORM: Windows 95/98/NT Server logs were designed to measure traffic and demand loads on a computer server, and they work well for this purpose. When server log files are used to try to measure how people use a site, they don't work quite as well. They can, however, give you useful information about the relative usage of pages on your Web site, other sites that refer visitors to your site, and how search engines help people find your site, among other important data. Although log analysis isn't perfect, few measures of usage are. For example, when we count people who come through the doors of our library, we don't know if they are there to read books or magazines, or just use the bathroom. When we circulate a book, we don't know why it was selected or even if it is read. Server log file analysis can be viewed in the same light, as a flawed but necessary measure of usage. The important thing is to educate yourself about the abilities and limitations of log file analysis so that you can make educated use of the data it produces. 2. Stehle, Tim. "Getting Real About Usage Statistics." Available at http://www.wprc.com/wpl/stats.html. 3. Stout, Rick. "Web Site Stats: Tracking Hits and Analyzing Traffic." Osborne/McGraw-Hill, Berkeley, CA, 1997. 4. "Web Site Analysis Tools." PC Magazine Online, March 10, 1998. Available at http://www.zdnet.com/pcmag/features/Webanalysis2/default.htm. Kathleen Bauer (firstname.lastname@example.org) is an Informatics Librarian at the Yale School of Medicine Library. Comments? Email letters to the Editor at email@example.com. Copyright © 2000, Information Today, Inc. All rights reserved.
<urn:uuid:047fb59d-8c8b-423a-8085-0decf2b8cd9b>
CC-MAIN-2016-26
http://www.infotoday.com/Online/OL2000/bauer1.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393442.26/warc/CC-MAIN-20160624154953-00176-ip-10-164-35-72.ec2.internal.warc.gz
en
0.919918
2,885
2.515625
3
Chromosomal deletions in DNA often involve just one of two gene copies inherited from either parent. But scientists haven't known how a deletion in one gene from one parent, called a "hemizygous" deletion, can contribute to cancer. A research team led by Stephen Elledge, a professor in the Department of Genetics at Harvard Medical School, and his post-doctoral fellow Nicole Solimini, has now provided an answer. The most common hemizygous deletions in cancer, their research shows, involve a variety of tumor suppressing genes called STOP genes (suppressors of tumorigenesis and proliferation) that scatter randomly throughout the genome, but that sometimes cluster in the same place on a chromosome. And these clusters, said Elledge, who is also a professor of medicine at Brigham and Women's Hospital, tend to be deleted as a group. "Eliminating the cluster gives a bigger bang for the deletion buck," he said. This finding is especially interesting in light of the two-hit model of cancer formation, which holds that both copies of a recessive gene need to be inactivated to trigger a biological effect. Thus the loss of a single tumor suppressor copy should have little or no influence on tumor cell proliferation because the remaining copy located on the other chromosome is there to pick up the slack. Elledge's research points to a different hypothesis, namely that STOP genes in a hemizygous deletion aren't recessive but are instead haploinsufficient, meaning that they depend on two copies to function normally. "If a tumor suppressor is haploinsufficient, then a single gene copy lacks the potency needed to fully restrain tumorigenesis," Elledge explained, who is also a Howard Hughes Medical Institute Investigator. "So by removing clusters of haploinsufficient genes all at once, the cancer cell immediately propels its growth forward without having to wait for the other copies to also be lost." Angelika Amon, a professor of biology at the Massachusetts of Technology, said she's surprised by the findings. "We've known from a lot of human syndromes that haploinsufficiency is widespread in the development of complex multicellular organisms," she said. "But these data show it's also critical for individual cells and cell proliferation." The results also offer a different take on the two-hit model in carcinogenesis, Amon said. Being remarkably unstable, cancer cells can delete gene copies at every turn of the corner. If the loss of a single tumor suppressor copy provides no survival advantage for the tumor, then the tumor has no incentive to retain the cell with that deletion. But if the loss of that copy boosts proliferation, then the probability of a second hit later is greatly increased. "So haploinsufficiency is a way for the cancer cell to dramatically accelerate the acquisition of growth beneficial mutations," Amon said. In other words, all it takes is a 50 percent reduction in gene activity for a cancer cell to grow. "That tells us it's a lot easier to get cancer than we might have hoped," Amon said. According to Elledge, the number of hemizygotic deletions averages roughly six per tumor, with some tumorsbreast and pancreatic, for instanceaveraging up to ten. Each deletion involves 25 to 40 genes, many of them STOP genes, but also a few GO genes (growth enhancers and oncogenes) that enhance proliferation. That the STOP genes substantially outnumber their GO counterparts is important, Elledge explained, because it means cancer cells can tilt scales toward proliferation without also compromising it at the same time. "The data reveal a lot of haploinsufficient players that have small effects individually, but large effects in combination," Elledge said. "Unfortunately, it's not easy to see how to take advantage of that chemotherapeutically." What's important about the results, he emphasized, is that they open up new views on how tumors evolve. Moreso, they underscore the importance of proliferation as a fundamental feature of tumor growth, he added. The challenge now, Elledge said, will be to find out which of the genes in a recurring deletion are haploinsufficient. "At the moment, we estimate roughly 25 percent," he said. "So these findings could also have important ramifications for other human diseases in addition to cancer." |Contact: David Cameron| Harvard Medical School
<urn:uuid:3de235ad-e94e-49be-9e40-b9f3790b75de>
CC-MAIN-2016-26
http://www.bio-medicine.org/medicine-news-1/Cancer-may-require-simpler-genetic-mutations-than-previously-thought-91177-1/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396872.10/warc/CC-MAIN-20160624154956-00195-ip-10-164-35-72.ec2.internal.warc.gz
en
0.954032
910
3.5625
4
Individual differences | Methods | Statistics | Clinical | Educational | Industrial | Professional items | World psychology | |Classification and external resources| Patient with the syndrome showing characteristic facial appearance, with elongated face, prominent nose, and smooth Philtrum Prader-Willi Syndrome is a genetic disorder in which seven genes (or some subset thereof) on chromosome 15 are missing or unexpressed (chromosome 15q partial deletion) on the paternal chromosome. It was first described in 1956 by Andrea Prader, Heinrich Willi, Alexis Labhart, Andrew Ziegler, and Guido Fanconi of Switzerland. The incidence of PWS is between 1 in 12,000 and 1 in 15,000 live births. The distinction of chromosome by parental origin is due to imprinting and PWS has the sister syndrome Angelman syndrome that affects maternally imprinted genes in the region. Traditionally, PWS was diagnosed by clinical presentation. Currently, the syndrome is diagnosed through genetic testing, and is recommended for newborns with pronounced hypotonia. Early diagnosis of PWS allows for early intervention as well as the early prescription of growth hormone. Daily recombinant growth hormone (GH) injections are indicated for children with PWS. GH supports linear growth and increased muscle mass, and may lessen food preoccupation and weight gain. PWS should be considered when presented with a hypotonic (floppy) newborn. Accurate consensus clinical diagnostic criteria exist, but the mainstay of diagnosis is genetic testing, specifically DNA-based methylation testing to detect the absence of the paternally contributed Prader-Willi syndrome/Angelman syndrome (PWS/AS) region on chromosome 15q11-q13. Such testing detects over 97% of patients. Methylation-specific testing is important to confirm the diagnosis of PWS in all individuals, but especially those who are too young to manifest sufficient features to make the diagnosis on clinical grounds or in those individuals who have atypical findings. The classic PWS presentation includes: - short stature - small hands and feet - hypotonia and poor muscle development - excess fat, especially in the central portion of the body - narrow forehead - almond shaped eyes with thin, down-turned lips - light skin and hair relative to other family members - lack of complete sexual development in adolescence PWS is caused by absence of the paternally derived PWS/AS region of chromosome 15 (15q11-13) by one of several genetic mechanisms, including uniparental disomy, imprinting mutations (i.e. inappropriate "paternal imprinting"), chromosome translocations, and gene deletions. The genes responsible for Prader-Willi syndrome are expressed only on the paternal chromosome. (Interestingly, a deletion on the maternal chromosome causes Angelman syndrome.) This is the first known instance of imprinting in humans, and is a fascinating model of this genetic phenomenon. The risk to the sibling of an affected child of having PWS depends upon the genetic mechanism which caused the disorder. The risk to siblings is <1% if the affected child has a gene deletion or uniparental disomy, up to 50% if the affected child has a mutation of the imprinting control center, and up to 25% if a parental chromosomal translocation is present. Prenatal testing is possible for any of the known genetic mechanisms. Individuals with PWS are at risk for learning and attention difficulties. Prader-Willi Syndrome is also frequently associated with an extreme and insatiable appetite, often resulting in morbid, and in some cases life-threatening, obesity. There is currently no consensus as to the cause for this particular symptom. There are several aspects of PWS that support the concept of growth hormone deficiency in individuals with PWS. Specifically, individuals with PWS have short stature, are obese with abnormal body composition, have reduced fat free mass (FFM), have reduced LBM and total energy expenditure, and have decreased bone density. PWS is characterized by hypogonadism. This is manifested as undescended testes in males and benign premature adrenarche in females. Testes may descend with time or can be managed with surgery or testosterone replacement. Adrenarche may be treated with hormone replacement therapy. Prader-Willi Syndrome has no "cure", however, several treatments are in place to lessen the symptoms of the condition. During infancy, subjects should undergo therapies to improve muscle tone. During the school years, children benefit from a highly structured learning environment as well as extra help. Throughout their lives, the subject's food should literally be kept under lock and key, since the largest problem associated with the syndrome is severe obesity. Key texts – BooksEdit Additional material – BooksEdit Reviews of the areaEdit Key texts – PapersEdit Additional material - PapersEdit - AAFP Overview A clear and concise overview of PWS. - Prader-Willi Syndrome Associations: - PWS Notes A wiki covering PWS for parents - Foundation for Prader Willi Research - Gretton Homes - UK Care homes supporting people with PWS
<urn:uuid:c943db85-1b17-4c1c-b292-891b3a2d5401>
CC-MAIN-2016-26
http://psychology.wikia.com/wiki/Prada-Willi_Syndrome
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783408840.13/warc/CC-MAIN-20160624155008-00080-ip-10-164-35-72.ec2.internal.warc.gz
en
0.910349
1,066
3.125
3
The Teacher and his Students |Fun:|| (1.68) | |Difficulty:|| (2.95) | A teacher and his students stand in an empty room. The room has no windows, no chalk, and no chalkboard. The room is completely barren except for 10 students and one teacher. The students ask the teacher if they can go eat lunch, and the teacher says, "That won`t be necessary, it is already here." How did they get their lunch? Answer:The teacher is a mathematics teacher. He makes each student pluck a hair out of their head. He then breaks off the root of each hair follicle and places all ten roots in the shape of a square. The square root of 10 is an old approximation of pi. The students divide the pie and eat lunch. Comments on this teaser Most Popular | Hardest | Easiest Privacy | Terms Copyright © 2003
<urn:uuid:c58c4223-a082-4f9a-a81a-68800b0a1f2d>
CC-MAIN-2016-26
http://www.braingle.com/palm/teaser.php?op=2&id=162&comm=0
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397636.15/warc/CC-MAIN-20160624154957-00102-ip-10-164-35-72.ec2.internal.warc.gz
en
0.951284
193
2.984375
3
Details about Learning Together with Young Children: Many curriculum books treat teaching as something teachers do to or for children. Deb Curtis and Margie Carter, best-selling authors in the early learning field, believe teaching is a collaborative process in which teachers reexamine their own philosophies and practices while facilitating children's learning. Each chapter in this curriculum framework includes a conceptual overview followed by classroom stories and photographs to illustrate the concepts. The book helps teachers create materials and a classroom culture reflective of their values: Teach through observation, reflection, inquiry, and action, and encourage children to represent their learning in multiple ways, including songs, stories, and drama. Back to top Rent Learning Together with Young Children 1st edition today, or search our site for other textbooks by Deb Curtis. Every textbook comes with a 21-day "Any Reason" guarantee. Published by Redleaf Press. Need help ASAP? We have you covered with 24/7 instant online tutoring. Connect with one of our tutors now.
<urn:uuid:301534ba-b30a-49bf-a3e3-952abc186c1c>
CC-MAIN-2016-26
http://www.chegg.com/textbooks/learning-together-with-young-children-1st-edition-9781929610976-1929610971
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783404382.73/warc/CC-MAIN-20160624155004-00124-ip-10-164-35-72.ec2.internal.warc.gz
en
0.934099
204
3.484375
3
Maintaining healthy self-esteem is difficult for anyone, but especially for parents, who spend most of their time tending to the safety and happiness of their family. However, experts say that having a healthy self-esteem affects your child’s self-esteem. By modeling good self-esteem, you teach your child to feel good about himself. And, research has shown that children who feel good about themselves, are more successful in school. Want to know how you can help raise your child’s self-esteem? Here are seven tips from psychotherapist and author Mary Jo Rapini: - Remember that we all make mistakes. It is important to remember that no one is perfect. Demanding perfection from your children causes them to be anxious and depressed. They feel like they will never be good enough. Start a new rule in your home: it is more important to try to be good enough, than to try and then feel badly about not being perfect. - Pay attention to what you say. Pay attention to what you say to yourself around your children. The negative things you say about yourself will be remembered by your children, and your children may in turn repeat that about themselves. Always talk to yourself nicely when your children are around. (Talk nicely to yourself when they aren’t around, too.) - Teach respect. Treat your children and your spouse with respect. That doesn’t mean you give in to them, it means you don’t interrupt when they are talking and you listen attentively. Address them lovingly. No matter how old your child is, he needs to be talked to respectfully. - Hug your child. Affection tells your child you love him, and he is worthy of love. Remember, teens need as much if not more hugs than small children do. - Keep your promises. Parents who are never on time or change plans constantly raise children who don’t trust. If you cannot trust others, you cannot feel good about yourself. If you grew up in a home where no one followed through, change that for your child. - Give your child responsibility. Parents must give chores and follow through with consequences if they aren’t done. This teaches your child he is part of the family and his work is necessary to help the family. Parents who don’t give their children chores raise kids who think they really don’t matter to the family. This leads to disengagement of the family. - Show interest in your child’s interests. Any interest your child expresses is an opportunity to raise her self-esteem. Talk to her in regards to her interest. Listen to her. Buy her books, take her to appropriate museums, or join a group with other people who share that interest. When you show interest in your child’s interest, you make your child feel valued and important. This encourages her to be more curious. Children with healthy self-esteem are more curious because they aren’t afraid to take risks. They believe they will not fail and if they do they will be okay. Raising healthy children is so important. Being a healthy mom and dad predicts your child’s ability to feel good about herself. If you came from a family that wasn’t accepting or affectionate, it can be difficult to teach your child love and acceptance. Never give up. Take one small step a day to insure your child’s success.
<urn:uuid:f99d88fa-ce6e-4602-8b89-7da3fa1f2ebc>
CC-MAIN-2016-26
http://www.education.com/magazine/article/esteem-affect-child/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396100.16/warc/CC-MAIN-20160624154956-00079-ip-10-164-35-72.ec2.internal.warc.gz
en
0.966716
708
3.3125
3
Definitions for narrow down This page provides all possible meanings and translations of the word narrow down pin down, peg down, nail down, narrow down, narrow, specify(verb) "I cannot narrow down the rules for this game" specialize, specialise, narrow, narrow down(verb) become more focus on an area of activity or field of study "She specializes in Near Eastern history" Make more specific. The numerical value of narrow down in Chaldean Numerology is: 9 The numerical value of narrow down in Pythagorean Numerology is: 1 Sample Sentences & Example Usage I think it will probably narrow down at some point to a smaller group than 15, but I don't know who those (candidates) will be. I'm not sure they'll all be the eight that I'm closest to from a policy standpoint, it may be some I have a little more distance from. Critic Editors ' live and breathe cruising, sailing year-round and covering every aspect of the industry -- from new ships and programs to updated amenities and features, with so many wonderful cruise options available, it's never an easy list to narrow down, but these awards truly represent the lines that our experts have recognized as the best of the best. My yardage books have always been produced with the aim of helping all players narrow down the exact length they want to hit a shot but this new greens contours book takes it to another level, for the past five years in America my business colleague Mark Long has produced both types of books for players on the U.S. Tour and Justin Rose and Graeme McDowell have persuaded me to see the potential demand of doing them for England Europe. Having caddied for many top players in the world like Nick Faldo in the 1990s when Nick Faldo in the 1990s was world number one and Colin Montgomerie later on, I appreciate how fine the line is between being a good player and a truly great one, my yardage books have always been produced with the aim of helping all players narrow down the exact length they want to hit a shot but this new greens contours book takes it to another level. Images & Illustrations of narrow down Find a translation for the narrow down definition in other languages: Select another language:
<urn:uuid:3a01b1bc-19ac-4c1c-92e4-98ad1f69b524>
CC-MAIN-2016-26
http://www.definitions.net/definition/narrow%20down
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402479.21/warc/CC-MAIN-20160624155002-00010-ip-10-164-35-72.ec2.internal.warc.gz
en
0.935355
481
2.6875
3
Russia is the largest country in the world and is so vast that it has eleven time zones and a coastline of more than 23,000 miles. Known mostly for its natural resources, Russia has more than 100,000 rivers, and the world’s largest forest, and largest lake (Lake Baikal). Russian is the predominant language, but more than 100 languages are spoken throughout the country. Russia is famous for the Bolshoi Ballet, dancers such Rudolf Nureyev and Anna Pavlova, classical music composers Tchaikovsky and Rachmaninoff, and literary masers such as Tolstoy, Pushkin, and Dostoevsky. Russia is also known for its fine vodka and caviar. Moscow is the capital and largest city in Russia, followed by St. Petersburg and Novosibirsk. Arriving in Russia Russia attracts international visitors who most often enter the country at Moscow International Airport (Domodedovo Airport), which is connected to the capital by a modern highway. Public transportation as well as taxis are also available from the airport. Regularly scheduled passenger trains arrive and depart from the Paveletsky Railway Station in Moscow and take passengers directly to the airport. Most international airlines have direct daily flights to Moscow. Aeroflot is Russia’s largest international airline carrier. Some international carriers offer service within Russia. There are more than a dozen domestic Russian airlines from which to choose, such as Saratov Airlines, Transaero, and Orenburg Airlines. Because Moscow International is the country’s largest airport, travelers can easily board domestic flights with daily service to Russia’s 394 airports. Another popular way to travel is by way of Russian railways. The railway system in Russia is divided into some seventeen territorial branches such as the Kaliningrad Railways, The Sakhalin Railways, and the West Siberian Railways. The railway system in Russia is modern in the major metropolitan centers but can be an adventure in the rural areas. One the most famous of all railway lines is the Trans-Siberian railway. Travelers must bear in mind that a visa is required for entry into Russia and that the Russian visitation and immigration policies are complicated and restrictive. When planning a visit, travelers may take comfort in knowing that accommodation providers generally follow the “star” rating system of one to five stars. However, the rating system is not necessarily applied uniformly. Nevertheless, throughout Russia, travelers can find a wide selection of accommodations from such five-star luxury hotels in Moscow as the Hotel Baltschug Kempinski, the Hotel Sheraton Palace, and Hotel Metropol to more modest hotels, apartments and extended-stay establishments through the metropolitan areas. In Moscow and St. Petersburg, there is a wide selection of excellent hotels offered by such global franchises as Holiday Inn, Marriott Courtyard, Crowne Plaza, and Sheraton. Budget-minded student or casual travelers may wish to consult with the Russian Youth Hostile Association (RYH), keeping in mind that there are only seven hostels certified by that organization. City Touring: Palaces and Museums Russia has many historical and cultural attractions that can be seen in organized tours that are available in the two of its largest cities: Moscow and St. Petersburg. Some of the most popular tours in Moscow include visits to famous palaces, such as Catherine Palace, the Alexander Palace, or the imperial estate of Peterhof. Tours around the city centre may include visits to Moscow City, the summer residence of the Russian Czars, the Kremlin and Red Square, The Tsar Bell, and Cathedral Square. In St. Petersburg there are some of the world’s finest museums and gardens such as the Hermitage, the Russian Museum, the Summer Gardens, and the Admiralty. Museums abound in Russia. In some of the most impressive displays of art and history can be seen at the Tretyakov Gallery, the Pushkin Museum of Fine Arts, and the Museum of Modern Art. Outdoor Activities and Attractions Throughout Russia, there are a number of Heritage Sites like the Volcanoes of Kamchatka, the Virgin Komi Forests, and Cultural and Historic Ensemble of the Solovetsky Islands. With the goal of encouraging the protection of cultural and natural heritage around the world, the UNESCO certification is an important move towards further preserving the national treasures of Russia. For travelers, Russia offers exceptional outdoor activities such as hiking, winter sports, and ecotourism from the Caucasus to Siberia. Trekking is a popular sport for adventure travelers who wish to climb such famous peaks as Mt. Elbrus where the Garabashi station is situated at 3400 meters. Our travel finder offers comparison flight information from all major airlines to more than two dozen airports in Russia as well as an accommodation locator service that has access to almost 500 hotels throughout Russia, and a car rental comparison guide that are available on this site. We look forward to seeing you in Russia and serving all of your travel needs.
<urn:uuid:372dcce9-3510-48fe-b2a3-c384f83bb842>
CC-MAIN-2016-26
http://www.russia-channel.com/about/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783392159.3/warc/CC-MAIN-20160624154952-00081-ip-10-164-35-72.ec2.internal.warc.gz
en
0.946273
1,031
2.515625
3
TG/2 Practical Text Generation: Some technical details For a general overview, you may want to consider the flyer first - in case you didn't do that already :-). TG/2 is a shallow generation system. The notion of shallow (not to be mixed up with surface generation!) emphasizes some similarity to shallow parsing. In both cases, the use of shallow models of language sacrifices the completeness of coverage and many linguistic generalizations. On the other hand, many useful applications can be in an easy way. For both shallow parsing and shallow generation, to the more comprehensive and theory-based models remain to be While TG/2 produces surface strings as output, it is much more than a surface generator. The most important difference ist that TG/2 can to 'deep' linguistic representations or even domain-semantic You can see a multilingual application demo with TG/2 at work (in Chinese, French, English, German, Japanese and Portuguese). TG/2 is based on restricted production system techniques that modularity of processing and linguistic knowledge, hence making the transparent and reusable for various applications. Here is an overview of TG/2's architecture that is discussed in the sequel. Generation rules are written in the language TGL, expressing and actions in a uniform format (for more details on TGL see [Busemann A context-free backbone allows the system to select rules on the basis of their categories (the left-hand side category is part of the the right-hand side categories are each assigned to an action). Input to TG/2 is first translated into a system-internal language - in the figure called GIL - in order to abstract away from many application-driven requirements on the input structure representations. A GIL structure is fed to engine, which performs the three-step processing cycle known from AI systems on the available TGL rules: The processing strategy for constructing derivations is top-down and The set of actions in a rule is fired from left to right. Each TGL rule may pick up some part of the current input structure, which forms the for some action. If a TGL rule fails, backtracking is used to try - identify all applicable rules, - select an applicable rule (e.g. according to preferences), - fire that rule. The interpreter yields all formulations the grammar can generate. It attempts to generate and output a first formulation, producing possible alternatives only on external demand. The order in which formulations generated can be influenced by parameterizing the generic backtracking mechanism. This method also allows the user to have the system generate a preferred formulation first. [Busemann and [Wein 1996] give the details. A current survey of ten years of TG/2 development and usage is found in [Busemann 2005]. Larger TG/2 grammars are nowadays being developed using the development environment eGram implemented in Java [Busemann 2004]. The rule format is easier to understand, syntactic consistency is checked, and grammars can easily be tested with TG/2 or XtraGen, the sister implementation in Java [Stenzhorn 2002]. Many thanks to Matthias Rinck for considerably improving and debugging the system, to Michael Wein, who implemented a first version of the and the backtracking mechanism (and who drew the above picture), and to Jan Alexandersson for influential work on an early version of the Work on TG/2 was partially funded by the German Minister for Research Technology (BMBF) under contract ITW~9402 (project COSMA, 1994-1996) and by the European Commission (Telematics Application under contracts C9-2945 (project TEMSIS, 1996-1998) and MLIS 5015 (project MUSI, Publications on TG/2 (for download of the paper search in the LT - Stephan Busemann. Ten Years After: An Update on TG/2 (and Friends), in: Graham Wilcock, Kristiina Jokinen, Chris Mellish, and Ehud Reiter (eds): Proceedings of the Tenth European Natural Workshop (ENLG 2005), Aberdeen, 2005, 32-39. - Stephan Busemann. Best-First Surface Realization, in: Donia Scott (ed.): Proceedings of the Eighth International Natural Language Workshop (INLG '96), Herstmonceux, Sussex, 1996, 101-110. Also at the Computation and - Matthias Rinck. Ein Metaregelformalismus für TG/2. Thesis, Institute for Computational Linguistics, University of the - Holger Stenzhorn. XtraGen. A Natural Language Generation Java- and XML-Technologies. Master's thesis, Institute for Linguistics, University of the Saarland, 2002. - Stephan Busemann. A Shallow Formalism for Defining Personalized Workshop Professionelle Erstellung von Papier- und für die automatische Textgenerierung at the 22nd Annual German Conference on Artificial Intelligence (KI-98), Bremen, September 16-17, - Michael Wein. Eine parametrisierbare Generierungskomponente Backtracking. Master's thesis, Department for Computer Science, of the Saarland, 1996. Publications on Applications Using TG/2 (for download of the paper search in the LT - Stephan Busemann. eGram - a Grammar Development Environment and Its Usage for Natural Language Generation, in Proc. Fourth International Conference on Language Resources and Evaluation (LREC), Lisbon, Portugal, 2004. - Stephan Busemann. Language Generation for Cross-Lingual Document in: Hyanye Sheng: Proceedings of the International Workshop on Language Technology and Chinese Information Processing, Shanghai, 2001. Science Press, Beijing. - Stephan Busemann and Helmut Horacek. A Flexible Shallow Approach Generation, in: E. Hovy (ed.): Proceedings of the Nineth Natural Language Generation Workshop (INLG '98), August 1998. Also at the Computation and Language Archive. Related - Stephan Busemann and Helmut Horacek. Generating Air-Quality Environmental Data, in: Tilman Becker, Stephan Busemann, and Wolfgang (eds.), DFKI Workshop on Natural Language Generation, April DFKI Document D-97-06, Saarbrücken. Related - Helmut Horacek and Stephan Busemann. Towards a Methodology for Application-Oriented Report Generation, in: O. Herzog (ed.): KI-98. 22nd Annual German Conference on Artificial Intelligence, Bremen, 1998. Related Online - Stephan Busemann, Thierry Declerck, Abdel Kader Diagne, Luca Klein, and Sven Schmeier, ``Natural Language Dialogue Service for Scheduling Agents'', in Proc. 5th Conference on Applied Natural Processing, Washington, DC., 1997. Also at the Computation and Language Archive. last modified: October 24, 2005 Stephan
<urn:uuid:d30cd49c-4093-4e71-ade4-db5a106204cd>
CC-MAIN-2016-26
http://www.dfki.de/~busemann/more-tg2.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783391519.0/warc/CC-MAIN-20160624154951-00128-ip-10-164-35-72.ec2.internal.warc.gz
en
0.746777
1,560
2.640625
3
Hoping to catch a cosmic breeze, NASA is preparing to launch a new spacecraft to seek evidence of the earliest days of our solar system 4 1/2 billion years ago. The satellite, to be known as Genesis, is scheduled to launch July 30. Its mission is scheduled to end in 2004 with a dramatic helicopter recovery over the Utah desert. If all goes according to plan, NASA officials said Wednesday, Hollywood's top stunt pilots will fly in formation with the capsule as it floats to Earth on a parafoil, a highly maneuverable parachute. They will have 12 chances to lasso the craft in midair, preventing the damage of a ground landing. The trial runs have been a success, and the recovery is expected to go smoothly, said the National Aeronautics and Space Administration officials. Mission spokesman Gilbert Yanow likens the spacecraft to a time machine. Its mission is to gather evidence about the composition of the solar system in its earliest form by collecting particles of the sun's surface. Scientists believe the solar system began with a dense cloud of gas and dust that collapsed in on itself. Most of this "solar nebula" condensed to form the sun, while outlying particles coalesced into the planets, moons and comets. But, although scientists have a general understanding of the formation of the solar system, they are missing a key piece of information: What was the initial nebula composed of? That question can be answered because, as unlikely as it seems, the nebula "is now stored for us in the outer layers of the surface of the sun," said Don Burnett, of Pasadena's Jet Propulsion Laboratory, who is the mission's chief scientist. The outer layer of the sun constantly spews particles into the solar system, the so-called solar wind. Genesis is designed to collect those solar wind particles and return them to Earth for study. Once at its destination--an orbital station known as L1, a place where the gravitational forces of the Earth and sun are balanced and little energy is required for orbit--Genesis will collect the solar wind on wafers made of sapphire, gold and diamond. Looking like a giant secret decoder watch, the lid of the craft will flip open and the collector arrays will unfurl. Solar particles should stick in the hexagonal wafers much like bullets shot into a wall. To maximize the amount of material it can bring back for study, Genesis will bask in the sun's rays for 29 months. Apollo missions to the moon in the 1970s brought back a smattering of solar wind but used aluminum foil for collection over only a few days. The high-tech, clean wafers will provide a much more accurate sample of the sun's surface. Back on Earth, scientists will perform sophisticated analysis to determine exactly what the nebula contained. Unlike large samples of moon rocks, the particles from the sun will add up to only 20 micrograms, the weight of a few grains of salt.
<urn:uuid:3d5c12c5-8583-4889-a349-6d5cf8be6a3c>
CC-MAIN-2016-26
http://articles.latimes.com/2001/jul/12/news/mn-21325
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783404826.94/warc/CC-MAIN-20160624155004-00108-ip-10-164-35-72.ec2.internal.warc.gz
en
0.937813
610
3.71875
4
for National Geographic News When villagers in the remote jungles of the Republic of Congo began falling ill last month, scientists quickly suspected Ebola. The virus had been confirmed in tests on the bodies of animals found dead in surrounding forests, and bush meat is a staple among the local population. Knowing how people may initially have contracted the virus has given medical experts a jumpstart on the epidemic, which has so far killed at least 64 people. But the larger question remains. Where does the deadly Ebola virus hide between outbreaks? "Primates die from Ebola," just like humans, said Dick Thompson, a spokesperson for the World Health Organization, which has sent a team of experts to the region. "The virus must live somewhere else in the environment." The search for a natural host has eluded scientists ever since the first Ebola epidemics in 1976. The quest is a catch-22. While an outbreak offers the best opportunity to find the natural reservoir, the priority for virus hunters is to contain the epidemic. In the process, the trail often goes cold because the virus kills so swiftly it covers its tracks. Ebola is one of the most contagious viruses known to man. A simple handshake can transmit the disease. Depending on the strain, Ebola kills anywhere from 50 to 90 percent of its victims through massive internal bleeding. Worst of all, there is no cure. Finding out where the virus is hiding between outbreaks would help predict how often it will strike and could aid in the adoption of safety measures. The genetic variability of the virus in its natural host may help design a vaccine. Immune to Ebola There has long been speculation among scientists that bats are the natural reservoir for Ebola. In scientific experiments, researchers have injected bats with the Ebola virus, and the bats have survived. "You find bats in almost every outbreak," said Bob Swanepoel, head of the Special Pathogens Division at South Africa's National Institute for Communicable Diseases. Bats were found in the roof of a Sudanese cotton factory where six people died in a 1976 epidemic. A Danish student died of Ebola after visiting a bat-infested cave in Kenya. At least 60 miners in northeastern Congo died from Marburg, an Ebola-related virus that may share Ebola's natural reservoir, during a 1999 outbreak. Six of the seven mining quarries were open, the seventh was located underground with an estimated 30,000 bats living in it. All of the miners who contracted the disease worked in the underground mine. Swanepoel has collected bats during several Ebola and Marburg outbreaks. "We have seen evidence of Ebola in bats," he said. "But we have never been able to isolate the virus." He believes only a fraction of the bats may host the virus. Catching the right specimens is almost impossible. Transmitting the Virus The latest outbreak began after researchers from the Wildlife Conservation Society reported a massive decline in ape populations in the Lossi Gorilla Sanctuary in northern Republic of Congo. In mid-December, scientists from the Centre International de Recherches Medicales de Franceville (CIRMF) in neighboring Gabon collected samples from four gorilla and two chimpanzee carcasses and confirmed the presence of Ebola in all six cases. SOURCES AND RELATED WEB SITES
<urn:uuid:c7c2eb9f-b0ad-4746-b998-fa88775365c2>
CC-MAIN-2016-26
http://news.nationalgeographic.com/news/2003/02/0219_030219_ebolaorigin.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396945.81/warc/CC-MAIN-20160624154956-00161-ip-10-164-35-72.ec2.internal.warc.gz
en
0.960967
669
4
4
The Online Teacher Resource Receive free lesson plans, printables, and worksheets by email: Help students learn to study well. We offer a number of great resources. Great printable graphic organizers for all subjects and grade levels! Bruner's theory on constructivism encompasses the idea of learning as an active process wherein those learning are able to form new ideas based on what their current knowledge is as well as their past knowledge. A cognitive structure is defined as the mental processes which offer the learner the ability to organize experiences and derive meaning from them. These cognitive structures allow the learner to push past the given information in constructing their new concepts. The learner, often a child, will take pieces of their past knowledge and experiences and organize them to make sense of what they know, then base further concepts and solve additional problems based upon a combination of what they already processed and what they think should be processed next. The teacher resources used should be focused on that of encouragement, aiding and allowing the student to uncover the main principles on their own. Communication between the learner and teacher is the key concept. Socratic learning is suggested as the best method of communication in this theoretical framework, as it allows the teacher to actively note any study skills the learner verbalizes, their progression, their frustrations, and form a rubric of their current learning state based on the dialogue. Seeing as this theory takes known information and expounds upon it, any teacher lesson plans, teacher worksheets, or resources should in fact be constantly building the learner's knowledge in a spiral manner. The four major principles of Bruner's theory on constructivism encompass 1) a predilection toward learning. The second, how a grouping of knowledge is able to be constructed to best be understood by the learner. The third is effective manners for the teacher to present said material to the learner, with the fourth and final aspect being the progression of rewards as well as punishments. Bruner is poignant about language and how this affects cognition within this theory of learning development. It is pertinent to any success of a child to identify the differences between adult language and the language used by children. With the child being younger, they need time to advance not only their conceptual learning but their language as well. Thus, teachers and parents alike are encouraged to envelop the "scaffolding" method of communication which is a strategy aimed to simplifying tasks within learning by making smaller steps, all leading to the final outcome. This aids in maintaining any frustration while keeping in mind what is important throughout the learning process. When evaluating study skills of the child, Bruner's theory suggests that the teachers be explicit regarding organization, help the learner to focus on the larger task at hand as well as the goals, instead of getting caught on minor details or frustrations. They are encouraged to praise the efforts put out by the learners while reminding them, helping them focus on relevant items, and encouraging them to practice and rehearse what they have learned. Social as well as cultural contingencies of learning were adapted into Bruner's later work, theorizing how these affected learning.
<urn:uuid:2a101ce9-fac9-4672-8109-421d90677837>
CC-MAIN-2016-26
http://www.teach-nology.com/currenttrends/constructivism/bruner/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783391634.7/warc/CC-MAIN-20160624154951-00025-ip-10-164-35-72.ec2.internal.warc.gz
en
0.969818
637
4.625
5
Altona was a village in the Mennonite colony of Zagradovka, province of Kherson, Russia, 80 miles (130 km) north of the city of Kherson, in the valley of the Ingulets, a tributary of the Dnieper, founded in 1873 by Mennonites from the Molotschna Colony. The original settlement was made on the right bank of the Ingulets; in 1876 and 1877 the village was moved to the nearby hills because of frequent floods on the original site. The postal station was Tiege. In 1900, 95 Mennonites emigrated from here to Siberia and settled near Barnaul, province of Tomsk. Altona embraced about 2,700 acres with 36 farms; it had 180 inhabitants, most of them farmers. There were also windmills and electric mills, cabinetmaking, tile manufacture, coral agate quarrying. With few exceptions all the families were Mennonites, equally divided among the Nikolaifeld Mennonite Church, the Tiege Mennonite Brethren Church, and the Altonau Evangelical Mennonite Church, which arose here in 1907. Altona had a German elementary school. Hege, Christian and Christian Neff. Mennonitisches Lexikon, 4 vols. Frankfurt & Weierhof: Hege; Karlsruhe: Schneider, 1913-1967: v. I, 48. Lohrenz, Gerhard. Sagradowka: die Geschichte einer mennonitischen Ansiedlung im Süden Russlands, Rosthern: Echo-Verlag, 1947. Lohrenz, Gerhard. Zagradovka: history of a Mennonite settlement in southern Russia. Winnipeg, MB: CMBC Publications, 2000. Cite This Article Hege, Christian. "Altona (Zagradovka Mennonite Settlement, Kherson Oblast, Ukraine)." Global Anabaptist Mennonite Encyclopedia Online. 1955. Web. 27 Jun 2016. http://gameo.org/index.php?title=Altona_(Zagradovka_Mennonite_Settlement,_Kherson_Oblast,_Ukraine)&oldid=119125. Hege, Christian. (1955). Altona (Zagradovka Mennonite Settlement, Kherson Oblast, Ukraine). Global Anabaptist Mennonite Encyclopedia Online. Retrieved 27 June 2016, from http://gameo.org/index.php?title=Altona_(Zagradovka_Mennonite_Settlement,_Kherson_Oblast,_Ukraine)&oldid=119125. ©1996-2016 by the Global Anabaptist Mennonite Encyclopedia Online. All rights reserved.
<urn:uuid:3f36d1b4-95a2-4b3d-a988-a996cd1e9276>
CC-MAIN-2016-26
http://gameo.org/index.php?title=Altona_(Zagradovka_Mennonite_Settlement,_Kherson_Oblast,_Ukraine)&oldid=119125
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395992.75/warc/CC-MAIN-20160624154955-00079-ip-10-164-35-72.ec2.internal.warc.gz
en
0.848569
607
2.671875
3
There are three types of pollution source investigations currently being done by the DES Watershed Assistance Section. - Illicit Discharge Detection Investigations - Microbial Source Tracking - Stream Morphology Assessments and Surveys In 1996, DES initiated illicit discharge detection investigations in an effort to identify pollution discharges to storm drainage systems. An illicit discharge is any discharge to a municipal storm drainage system that is not composed entirely of stormwater. Examples of illicit discharges commonly seen in urban communities in New Hampshire include sanitary wastewater piping that is directly connected from a home into a storm drainage pipe or a cross-connection between the municipal sewer to the storm sewer systems. The Coastal watershed communities were the first to undergo these investigations, beginning in 1996. Since then, over 30 illicit discharges have been identified and removed in this watershed. Illicit discharge detection investigations were initiated in the Merrimack watershed in 2001. Approximately 100 miles of shoreline were investigated by the end of 2002 with the majority of work completed in Nashua, the Winnipesauke River corridor, and along the Merrimack River corridor from the Massachusetts border, north to the confluence with the Souhegan River. In 2003, initial investigations continued in Nashua and along the corridors of the Souhegan and Winnipesaukee Rivers. In 2004, DES completed the initial investigations for surface waters in Nashua and continued to investigate the shorelines of the Souhegan and Winnipesaukee Rivers. The typical procedure for conducting illicit discharge investigations includes the following steps. - Illicit discharge investigations begin with a meeting between the DES staff and the department of public works (DPW) personnel in the municipality where the survey will take place. Storm drainage infrastructure maps are a good starting point for a discussion. - DES and DPW staff identify hot spots and prioritize survey areas. - DES staff conduct dry-weather field screening to look for non-stormwater discharges in the storm drain outfalls. - Water quality tests are conducted to see if the non-stormwater discharges are illicit charges. - DES and DPW staff team up again to track down the source and remove the illicit discharges. - Where pollution sources are found, staff work with appropriate parties on remediation, which often requires technical and financial assistance. In some cases, regulatory compliance and enforcement is warranted. The New Hampshire Estuaries Project has been providing grant funds to coastal communities to eliminate illicit discharges since 2000. The New England Interstate Water Pollution Control Commission published a useful manual for communities titled Illicit Discharge Detection and Elimination Manual: A Handbook for Municipalities. Copies of this document may be downloaded from www.neiwpcc.org. For more information in the Merrimack River watershed contact Steve Landry at firstname.lastname@example.org The DES Watershed Management Bureau staff has spent considerable time learning and applying the methods of assessing stream and river channel restoration principals. The DES Watershed Assistance Section awarded restoration grants for projects that focus on the identification and assessment of factors causing stream and river channel instability and the design of channel restoration plans. All of the funded projects employ the principals of fluvial geomorphology and natural channel design to accomplish specific restoration goals related to channel disturbances and instability. These projects will also demonstrate that addressing river-related problems yields greater benefits when compared to treating symptoms with costly, bank-armoring techniques. The Watershed Assistance Section staff are excited to see this trend in natural channel design-based stream and river restoration continue to increase as more project collaborators take advantage of the Generic Quality Assurance Project Plan for Stream Morphology Data Collection and the continued efforts and outputs of the New Hampshire Stream Team (NHST). The NHST’s mission is to advance the use of science in river restoration and streambank stabilization efforts, and provide a venue for communication among river management stakeholders. In order to meet its mission, the NHST has established goals to develop a Regional Hydraulic Geometry Reference Curve, provide and/or promote education, training, and technical assistance regarding natural stream channel design (NSCD) and fluvial geomorphic principles, incorporate NSCD methods in the New Hampshire wetlands permitting process, and collaborate with other New England states and academia regarding NSCD and regional hydrologic curve development. The successful implementation of these 319-funded river and stream restoration projects will demonstrate the necessity for watershed based assessments designed to reveal underlying problems, yielding the information necessary to develop appropriate, cost effective solutions. This is a trend that DES personnel responsible for permitting and grants management will continue to encourage and/or require when applicable. For more information about stream and channel restoration contact Steve Landry at email@example.com In the late 1990s, the DES Watershed Assistance Section (WAS) staff teamed up with researchers at the University of New Hampshire to find better tools for tracking down sources of fecal-borne bacteria. These bacteria can be found in lakes, streams and marine waters when sanitary wastewater flows untreated into surface water. This happens during situations such as failing septic systems, leaking sewer pipes, overflows at wastewater treatment plants, or when stormwater washes animal waste into a waterbody. Researchers found that a bacterial source tracking tool called Ribotyping is an effective and innovative way to identify the actual sources of bacterial pollution present in surface waters. Instead of just knowing how much bacteria is in the water, this technology can tell us if the bacteria came from a specific species such as a dog, cow, or human. The US Environmental Protection Agency and the NH Department of Environmental Services supported the start up costs of establishing a Ribotyping laboratory at the UNH Jackson Estuarine Laboratory located on the shore of the Great Bay Estuary. Several Ribotyping studies have been completed in the coastal watersheds, showing promising uses for this technology statewide. For example, residents in the Hampton/Seabrook Harbor watershed suspected that birds were the primary source of bacterial pollution, but the Ribotyping study results indicated that humans were responsible for a larger portion of the bacteria rather than birds. As a result, DES supported a pumpout boat to encourage frequent and proper disposal of boat sanitary waste and the Town of Hampton is conducting a major sewer replacement project in the beach area of the town. More recently, UNH purchased a RiboPrinter that allows for automated processing for Ribotyping analysis. This greatly increases the consistency and accuracy of the results. DES and UNH have conducted Ribotyping studies in Varney Brook and the Bellamy River in Dover; Hampton/Seabrook Harbor in Hampton, Hampton Falls, and Seabrook; Little Harbor in Portsmouth, New Castle and Rye; Parsons Creek in Rye; Bass Beach Brook in Rye; and Chapel Brook and Little River in North Hampton. If you are interested in the reports for any of these studies contact Natalie Landry (DES) at (603) 559-1507. If you are interested in the research aspects of ribotyping contact Dr. Steve Jones (UNH) at (603 )862-5124 or firstname.lastname@example.org.
<urn:uuid:b4377fed-2145-4d78-a676-9b7c4edf9b04>
CC-MAIN-2016-26
http://des.nh.gov/organization/divisions/water/wmb/was/investigations.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393146.70/warc/CC-MAIN-20160624154953-00072-ip-10-164-35-72.ec2.internal.warc.gz
en
0.91062
1,476
3.015625
3
This chapter introduces Large Objects (LOBs) and discusses how LOB datatypes are used in application development. This chapter contains these topics: Large Objects (LOBs) are a set of datatypes that are designed to hold large amounts of data. A LOB can hold up to a maximum size ranging from 8 terabytes to 128 terabytes depending on how your database is configured. Storing data in LOBs enables you to access and manipulate the data efficiently in your application. This section introduces different types of data that you encounter when developing applications and discusses which kinds of data are suitable for large objects. In the world today, applications must deal with the following kinds of data: Simple structured data. This data can be organized into simple tables that are structured based on business rules. Complex structured data This kind of data is complex in nature and is suited for the object-relational features of the Oracle database such as collections, references, and user-defined types. This kind of data has a logical structure that is not typically interpreted by the database. For example, an XML document that is processed by your application or an external service, can be thought of as semi-structured data. The database provides technologies such as Oracle XML DB, Advanced Queuing, and Messages to help your application work with semi-structured data. This kind of data is not broken down into smaller logical structures and is not typically interpreted by the database or your application. A photographic image stored as a binary file is an example of unstructured data. Large objects are suitable for these last two kinds of data: semi-structured data and unstructured data. Large objects features allow you to store these kinds of data in the database as well as in operating system files that are accessed from the database. With the growth of the internet and content-rich applications, it has become imperative that the database support a datatype that: Can store unstructured and semi-structured data in an efficient manner. Is optimized for large amounts of data. Provides a uniform way of accessing data stored within the database or outside the database. Examples of semi-structured data include document files such as XML documents or word processor files. These kinds of documents contain data in a logical structure that is processed or interpreted by an application, and is not broken down into smaller logical units when stored in the database. Applications involving semi-structured data typically use large amounts of character data. The Character Large Object ( CLOB) and National Character Large Object ( NCLOB) datatypes are ideal for storing and manipulating this kind of data. Binary File objects ( BFILE datatypes) can also store character data. You can use BFILEs to load read-only data from operating system files into NCLOB instances that you then manipulate in your application. Unstructured data cannot be decomposed into standard components. For example, data about an employee can be structured into a name, which is stored as a string; an identifier, such as an ID number, a salary and so on. A photograph, on the other hand, consists of a long stream of 1s and 0s. These bits are used to switch pixels on or off so that you can see the picture on a display, but are not broken down into any finer structure for database storage. Also, unstructured data such as text, graphic images, still video clips, full motion video, and sound waveforms tends to be large in size. A typical employee record may be a few hundred bytes, while even small amounts of multimedia data can be thousands of times larger. SQL datatypes that are ideal for large amounts of unstructured binary data include the BLOB datatype (Binary Large Object) and the BFILE datatype (Binary File object). The database supports LONG as well as LOB datatypes. When possible, change your existing applications to use LOBs instead of LONGs because of the added benefits that LOBs provide. LONG-to-LOB migration enables you to easily migrate your existing applications that access LONG columns, to use LOB columns. Applications developed for use with Oracle Database version 7 and earlier, used the LONG or LONG RAW data type to store large amounts of unstructured data. With the Oracle8i and later versions of the database, using LOB datatypes is recommended for storing large amounts of structured and semi-structured data. LOB datatypes have several advantages over LONG and LONG RAW types including: LOB Capacity: LOBs can store much larger amounts of data. LOBs can store 4GB of data or more depending on you system configuration. LONG and LONG RAW types are limited to 2GB of data. Number of LOB columns in a table: A table can have multiple LOB columns. LOB columns in a table can be of any LOB type. In Oracle Database Release 7.3 and higher, tables are limited to a single LONG or LONG RAW column. Random piece-wise access: LOBs support random access to data, but LONGs support only sequential access. LOBs can also be object attributes. Different kinds of LOBs can be stored in the database or in external files. Note:LOBs in the database are sometimes also referred to as internal LOBs or internal persistent LOBs. LOBs in the database are stored inside database tablespaces in a way that optimizes space and provides efficient access. The following SQL datatypes are supported for declaring internal LOBs: NCLOB. Details on these datatypes are given in "Large Object Datatypes". Internal LOBs (LOBs in the database) can be either persistent or temporary. A persistent LOB is a LOB instance that exists in a table row in the database. A temporary LOB instance is created when you instantiate a LOB only within the scope of your local application. A temporary instance becomes a persistent instance when you insert the instance into a table row. Persistent LOBs use copy semantics and participate in database transactions. You can recover persistent LOBs in the event of transaction or media failure, and any changes to a persistent LOB value can be committed or rolled back. In other words, all the Atomicity Consistency Isolation Durability (ACID) properties that pertain to using database objects pertain to using persistent LOBs. External LOBs are data objects stored in operating system files, outside the database tablespaces. The database accesses external LOBs using the SQL datatype BFILE datatype is the only external LOB datatype. BFILEs are read-only datatypes. The database allows read-only byte stream access to data stored in BFILEs. You cannot write to a BFILE from within your application. The database uses reference semantics with BFILE columns. Data stored in a table column of type BFILE, is physically located in an operating system file, not in the database tablespace. You typically use BFILEs to hold: Binary data that does not change while your application is running, such as graphics. Data that is loaded into other large object types, such as a BLOB or CLOB where the data can then be manipulated. Data that is appropriate for byte-stream access, such as multimedia. Read-only data that is relatively large in size, to avoid taking up large amounts database tablespace. Any storage device accessed by your operating system can hold BFILE data, including hard disk drives, CD-ROMs, PhotoCDs and DVDs. The database can access BFILEs provided the operating system supports stream-mode access to the operating system files. Note:External LOBs do not participate in transactions. Any support for integrity and durability must be provided by the underlying file system as governed by the operating system. When you use a LOB in an operation such as passing a LOB as a parameter, you are actually passing a LOB locator. For the most part, you can work with a LOB instance in your application without being concerned with the semantics of LOB locators. There is no need to dereference LOB locators, as is required with pointers in some programming languages. There are some issues regarding the semantics of LOB locators and how LOB values are stored that you should be aware of. These details are covered in the context of the discussion where they apply throughout this guide. In all programmatic environments, database semantics differ between internal LOBs and external LOBs as follows: Internal LOBs use copy semantics. With copy semantics, both the LOB locator and LOB value are logically copied during insert, update, or assignment operations. This ensures that each table cell or each variable containing a LOB, holds a unique LOB instance. External LOBs use reference semantics. With reference semantics, only the LOB locator is copied during insert operations. (Note that update operations do not apply to external LOBs as external LOBs are read-only. This is explained in more detail later in this section.) Table 1-1 describes each large object datatype supported by the database and describes the kind of data each datatype is typically used for. The names of datatypes given here are the SQL datatypes provided by the database. In general, the descriptions given for the datatypes in this table and the rest of this book also apply to the corresponding datatypes provided for other programmatic environments. Also, note that the term "LOB" is generally used to refer to the set of all large object datatypes. Binary Large Object Stores any kind of data in binary format. Typically used for multimedia data such as images, audio, and video. Character Large Object Stores string data in the database character set format. Used for large strings or documents that use the database character set exclusively. Characters in the database character set are in a fixed width format. National Character Set Large Object Stores string data in National Character Set format. Used for large strings or documents in the National Character Set. Supports characters of varying width format. External Binary File A binary file stored outside of the database in the host operating system file system, but accessible from database tables. Any kind of data, that is, any operating system file, can be stored in a You can declare LOB datatypes as fields, or members, of object datatypes. For example, you can have an attribute of type CLOB on an object type. In general, there is no difference in the usage of a LOB instance in a LOB column and the usage of a LOB instance that is a member or of an object datatype. Any difference in usage is called out when it applies. When used in this guide, the term LOB attribute refers to a LOB instance that is a member of an object datatype. Unless otherwise specified, discussions that apply to LOB columns also apply to LOB attributes. You can use LOBs to create other user-defined datatypes or store other datatypes as LOBs. This section discusses some of the datatypes provided with the database as examples of datatypes that are stored or created with LOB types. An instance of type VARRAY in the database is stored as an array of LOBs when you create a table in the following scenarios: If the VARRAY storage clause— VARRAY varray_item STORE AS —is not specified, and the declared size of varray data is more than 4000 bytes. If the varray column properties are specified using the STORE AS LOB clause— VARRAY varray_item STORE AS LOB ... A good example of how LOB datatypes can be used to store other datatypes is the XMLType datatype. The XMLType datatype is sometimes stored as a CLOB . Setting up your table or column to store XMLType datatypes as CLOBs enables you to store schema-less XML documents in the database. Oracle Multimedia uses LOB datatypes to create datatypes specialized for use in multimedia application such as Multimedia ORDAudio, ORDDoc, ORDImage, and ORDVideo. Oracle Multimedia uses the database infrastructure to define object types, methods, and LOBs necessary to represent these specialized types of data in the database.
<urn:uuid:057fd2ba-d698-485e-893c-170b384b8713>
CC-MAIN-2016-26
http://docs.oracle.com/cd/B28359_01/appdev.111/b28393/adlob_intro.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783408840.13/warc/CC-MAIN-20160624155008-00068-ip-10-164-35-72.ec2.internal.warc.gz
en
0.878136
2,640
3.40625
3
Help support New Advent and get the full contents of this website as an instant download. Includes the Catholic Encyclopedia, Church Fathers, Summa, Bible and more all for only $19.99... An Italian archeologist, b. at Mont Olmo, near Macerata, in 1732; d. at Florence in 1810. In 1749 he joined the Society of Jesus, on the suppression of which, in 1773, the Grand-Duke of Tuscany made him assistant director of the Florentine Museum and curator (antiquario) in 1776. His tomb is in the church of S. Croce, near that of Michael Angelo. He applied himself early to the study of ancient and modern literature (Cicero, Dante, Firenzuola), filled several times chairs of rhetoric, and was elected a member of the literary society of the "Arcadians" (where he was called Argilio Celerio). He wrote in Florence his excellent "Guide to the Museum" (1780), published in the "Giornale di Pisa" (1782). As an archeologist, particularly with regard to Etruscan subjects, Marini styles him the Varro of the eighteenth century. His "Saggio di lingua etrusca e di altre antiche d'Italia" appeared at Rome in 1789 (3 vols.). It was followed by different treatises of the same tenor on ancient paleography, on some ancient vases, and other antiquities. He won still more widespread reputation by his history of modern Italian painting (Storia pittorica dell' Italia dal risorgimento delle belle arti fin presso al fine del XVIII secolo, 3 vols., Bassano, 1795-96). This work, often reprinted (lastly at Venice, 1837-39), was translated into German, French, and English (twice in the latter tongue, by Roscoe, London, 1828, and by Evans, abridged, London, 1831). Lanzi describes the Schools of Art and their development, and opens his narration with the Florentine artists of the thirteenth century, whom he looks upon as the preservers and revivers of art in Italy. He is remarkable for his widespread learning, his masterful grasp of his subject, his sound judgment, and the classic simplicity of his beautiful diction. He never lost his interest in Greco-Roman antiquity, and published at Florence, as late as 1808, a critical edition of Hesiod's "Works and Days", with a Latin and an Italian translation (the latter in three-line stanzas). His qualities as a writer matched his proficiency as a humanist, and he published at Florence (1807) three volumes of "Inscriptiones et Carmina"; he left numerous translations from Catullus, Theocritus, and others, either printed or in manuscript form. Lanzi was always a devout and ascetic priest. A collection of his edifying works on the Sacrament of the Altar, on the Sacred Hearts of Jesus and Mary, and on St. Joseph, was published at Rome in 1809. SOMMERVOGEL, Bibliotheque de la compagnie de Jesus, s.v.; MAURUS BONI, Saggio di Studii del P. Luigi Lanzi (Venice, 1815); ALESS. CAPRI, Biografia di Luigi Lanzi (Forli, 1840). APA citation. (1910). Luigi Lanzi. In The Catholic Encyclopedia. New York: Robert Appleton Company. http://www.newadvent.org/cathen/08793c.htm MLA citation. "Luigi Lanzi." The Catholic Encyclopedia. Vol. 8. New York: Robert Appleton Company, 1910. <http://www.newadvent.org/cathen/08793c.htm>. Transcription. This article was transcribed for New Advent by Joseph E. O'Connor. Ecclesiastical approbation. Nihil Obstat. October 1, 1910. Remy Lafort, S.T.D., Censor. Imprimatur. +John Cardinal Farley, Archbishop of New York. Contact information. The editor of New Advent is Kevin Knight. My email address is webmaster at newadvent.org. Regrettably, I can't reply to every letter, but I greatly appreciate your feedback — especially notifications about typographical errors and inappropriate ads.
<urn:uuid:8c136bff-4d39-492a-b0bd-1eb68bef768e>
CC-MAIN-2016-26
http://newadvent.org/cathen/08793c.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397565.80/warc/CC-MAIN-20160624154957-00103-ip-10-164-35-72.ec2.internal.warc.gz
en
0.942146
948
2.5625
3
Adirondack Community College Website Content Contributions Other Contribution (1) Preconceptions: Private Universe part of Starting Point-Teaching Entry Level Geoscience:First Day of Class:Activities Don Minkel, Adirondack Community College Course: Introduction to Astronomy 22 students This activity is designed to inform students about how misconceptions can interfere with the learning process, and to alert ...
<urn:uuid:68e28aa1-0647-4dff-ba92-6bc368f09e8e>
CC-MAIN-2016-26
http://serc.carleton.edu/person/8118.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397567.28/warc/CC-MAIN-20160624154957-00112-ip-10-164-35-72.ec2.internal.warc.gz
en
0.787194
84
2.625
3
Updating your working copy For more details on using Subversion visit the Subversion online instruction book Periodically, you should ensure that changes done by others get incorporated into your local working copy. The process of getting changes from the server to your local copy is known as updating. Updating may be done on single files, a set of selected files, or recursively on entire directory hierarchies.To update: $ svn update U index-b.html U newfile-b.html Updated to revision 2 By running svn update we see that someone has checked in modifications to the files index-b.html and newfile-b.html since the last time you updated, and Subversion has updated your working copy to include these changes. Sometimes conflicts will occur when you are updating. This is caused by other authors changing the same lines in the same file and thus the changes do not match. The resolving conflicts page will show you how to fix this issue. Local File Already Exists Sometimes when you run update, it will fail with a message to say that there is already a local file of the same name. This happens when Subversion tries to checkout a newly versioned file, and finds that an unversioned file of the same name already exists in your working copy. Subversion will never overwrite an unversioned file. If you get this error message, the solution is simply to rename the local unversioned file. After completing the update, you can check whether the renamed file is still needed.
<urn:uuid:890f8a22-f244-4c6a-9a39-f7505c31b1f0>
CC-MAIN-2016-26
http://www.cl.cam.ac.uk/local/web/subversion/linux/updating.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395560.69/warc/CC-MAIN-20160624154955-00197-ip-10-164-35-72.ec2.internal.warc.gz
en
0.885351
320
2.84375
3
Nearly 20% neglect to take drugs that could prevent another blood clot, study finds FRIDAY, Dec. 11 (HealthDay News) -- About one-fifth of ischemic stroke survivors don't take medications that can reduce their risk of another stroke, a U.S. study has found. Ischemic stroke is caused by blocked blood flow in the brain. Several types of medications can reduce the risk of another ischemic stroke. These include blood thinners (antithrombotic medications), of which aspirin is the most common. This seven-year study of 4,168 ischemic stroke survivors found that about 19 percent of patients didn't take blood thinners. Men, older patients and non-Hispanic patients were more likely to take blood thinners. Further research is needed to determine exactly why patients who can benefit from these medications don't take them, said the University of California, Los Angeles researchers. The study will be published in the January issue of the American Journal of Preventive Medicine. The Washington University School of Medicine has more about ischemic stroke. -- Robert Preidt SOURCE: University of California, Los Angeles, news release, Dec. 3, 2009 All rights reserved
<urn:uuid:5ba13c6d-5b14-4894-a42d-7f5b5a28c7f8>
CC-MAIN-2016-26
http://www.bio-medicine.org/medicine-news-1/Many-Stroke-Survivors-Dont-Take-Lifesaving-Meds-63164-1/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783403508.34/warc/CC-MAIN-20160624155003-00056-ip-10-164-35-72.ec2.internal.warc.gz
en
0.924086
254
2.734375
3
Cut and Assemble X Blocks The following instructions make one X block. Repeat the cutting and assembly instructions to make nine X blocks total. From one assorted print, cut: 1—11-7/8" square, cutting it diagonally twice in an X for 4 large triangles total 2—2-5/8" squares, cutting each in half diagonally for 4 small triangles total From a second print, cut: From a third print, cut: 1. Referring to Diagram 1, sew together large triangles, rectangles, and square in three diagonal rows. Press seams toward rectangles. Join rows to make center unit. Press seams toward middle row. 2. Sew small triangles to corners of center unit (Diagram 2) to make an X block. Press seam toward center unit. The block should be 14-5/8" square including seam allowances.
<urn:uuid:5d9dc2e5-b990-414f-ba40-665b8f137477>
CC-MAIN-2016-26
http://www.allpeoplequilt.com/quilt-patterns/quilt-throws/playful-pastel-throw?page=0%2C2
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399385.17/warc/CC-MAIN-20160624154959-00144-ip-10-164-35-72.ec2.internal.warc.gz
en
0.848374
188
3.203125
3
Saturday, February 10, 2007 Robin migration and wintering We often have questions from people who see American Robins in northern regions during the winter and wonder why the robins haven't migrated south. Most robins go to warmer regions of the country during winter. A few robins may stay in northern regions, which could be a problem if severe weather sets in. Robins wander in flocks and eat fruits and berries. Here on Sanibel Island, FL we are seeing many robin flocks, some containing hundreds of birds, who wander then descend on an area and eat fruits. Sanibel has strict laws that encourage people to keep native vegetation on their properties, so Sanibel is full of the native fruits that robins love. In our yard, they are eating the fruits of the native Sabal Palm tree that hang in great clusters. They eat many other kinds of fruits including those of Wild Coffee. No matter where you are in the country, you can help robins during their migration by planting native trees and shrubs that produce fruits and berries. On our NH property, we plant many crab apple trees. Some people also put out raisins that have been plumped up in warm water, for robins that are caught in severe winter weather in northern regions.
<urn:uuid:c013cab8-2599-49c3-a2b2-22131d79fdaf>
CC-MAIN-2016-26
http://stokesbirdingblog.blogspot.com/2007/02/robin-migration-and-wintering.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783403825.35/warc/CC-MAIN-20160624155003-00058-ip-10-164-35-72.ec2.internal.warc.gz
en
0.978532
261
2.921875
3
WikipediaRead full entry The upper side of the wings is jet black, offset with three pairs of white spots, two on the forewing and one on the hind. These spots are surrounded by purple iridescence. In addition, the upper side of the hindwing bears a series of small white dots. The upper side of the wings of the female is a brownish black and does not have any spots like those of the male. The edges bear white markings which are similar to those of the Common Indian Crow. H. bolina is found in Madagascar in the west, through to South and Southeast Asia, South Pacific islands (French Polynesia, Tonga, Tuvalu, Samoa, Vanuatu), and occurs in parts of Australia, Japan, and New Zealand. H. bolina is a fairly common butterfly found in lightly wooded country, deciduous forests, thick and moist scrub, and the greener parts of human habitats. To the west the female is monomorphic, mimicking species of the oriental and Australasian danaid genus Euploea. Eastwards H. bolina is frequently polymorphic and most forms are then non-mimetic. In areas where it resembles Euploea the butterfly has usually been designated a Batesian mimic. Life cycle and ecology H. bolina is known for maternal care, with the females guarding leaves where eggs have been laid. Males are also very territorial and site fidelity increases with age. Territories that enhance the detection of females are preferred. The female hovers over a plant to check for ants which will eat her eggs. After selecting a plant which has no ants on it, she lays at least one but often two to five eggs on the undersides of the leaves. The eggs are a pale, glassy green with longitudinal ridges except on the top. After about four days the eggs hatch. The caterpillars immediately disperse. They are black with an orange head. The last segment is also orange. The head bears a pair of long branched black horns. The body surface is also covered with long, branched, orangish black spines. These spines look whitish and transparent immediately after moulting, but soon become the usual orange. In later instars the spiracles are surrounded by thin, dirty orange rings. Infection by Wolbachia bacteria is known to exclusively kill male specimens. The pupa is suspended by just one point. It is brown with a grey tinge on the wings. The abdominal segments have distinct tubercles. The surface of the pupa is rough. The butterfly emerges after seven to eight days as pupae (female development is always a bit longer). Recent evolutionary changes On the Samoan Islands of Upolu and Savai'i, a parasite (probably Wolbachia) had been killing the male members of Hypolimnas bolina. The problem was so severe that by the year 2001, males made up only 1% of the population. However, in 2007, it was reported that within a span of just 10 generations (less than a year), the males had evolved to develop immunity to the parasite, and the male population increased to nearly 40%. - H. b. bolina (Linnaeus, 1758) – (Sumatra, Java, Lesser Sunda Is., W.Borneo, Sulawesi, Salayar, Kabaena, Galla, Banggai, Sula, Maluku, New Guinea, Solomon Is., Australia, New Caledonia) - H. b. constans (Butler, 1875) – (Tasmania?) - H. b. enganica Fruhstorfer, 1904 – (Engano I.) - H. b. gigas (Oberthür, 1879) – (Sangihe) - H. b. incommoda Butler, 1879 - H. b. inconstans Butler, 1873 – (Navigator Is.) - H. b. jacintha (Drury, 1773) - H. b. jaluita Fruhstorfer, 1903 - H. b. kezia (Butler) – (Formosa) - H. b. kraimoku (Eschscholtz, 1821) – (Lifu) - H. b. labuana Butler, 1879 – (Labuan) - H. b. lisianassa (Cramer, 1779) – (Moluccas) - H. b. listeri Butler, 1888 – (Christmas I.) - H. b. montrouzieri (Butler) – (Woodlark, Fergusson, Trobriand Is.) - H. b. naresii Butler, 1883 – (Fiji) - H. b. nerina (Fabricius, 1775) – (Timor - Kai, Aru, Waigeu, West Irian - Papua, N.Australia - E.Victoria, Bismarck Archipelago, Solomon Is., New Zealand) - H. b. pallescens (Butler) – (Fiji) - H. b. philippensis (Butler, 1874) – (Philippines) - H. b. pulchra (Butler) – (New Caledonia) - H. b. rarik Eschscholtz, 1821) – (Lifu) - Liza Gross (2006). "Conflict within the genome: evolving defenses to suppress the male killers". PLoS Biology 4 (9): e308. doi:10.1371/journal.pbio.0040308. - Cyril Clarke & P. M. Sheppard (1975). "The genetics of the mimetic butterfly Hypolimnas bolina (L.)". Philosophical Transactions of the Royal Society of London. Series B, Biological Sciences 272 (917): 229–265. doi:10.1098/rstb.1975.0084. JSTOR 2417483. PMID 4830. - Darrell J. Kemp (2001). "Age-related site fidelity in the territorial butterfly Hypolimnas bolina (L.) (Lepidoptera: Nymphalidae)". Australian Journal of Entomology 40 (1): 65–68. doi:10.1046/j.1440-6055.2001.00199.x. - Darrell J. Kemp & Ronald L. Rutowski (2001). "Spatial and temporal patterns of territorial mate locating behaviour in Hypolimnas bolina (L.) (Lepidoptera: Nymphalidae)" (PDF). Journal of Natural History 35 (9): 1399–1411. doi:10.1080/002229301750384329. - K. Kunte (2006). "Additions to the known larval host plants of Indian butterflies". Journal of the Bombay Natural History Society 103 (1): 119–121. - T. R. Bell (1910). "Common Butterflies of the Plains of India". Journal of the Bombay Natural History Society 20 (2): 287–289. - A. Rajagopalan (2005). "A new food plant of the Great Eggfly". Journal of the Bombay Natural History Society 102 (3): 355. - E. A. Dyson, M. K. Kamath & G. D. Hurst (2002). "Wolbachia infection associated with all-female broods in Hypolimnas bolina (Lepidoptera: Nymphalidae): evidence for horizontal transmission of a butterfly male killer". Heredity 88 (3): 166–171. doi:10.1038/sj.hdy.6800021. - Sylvain Charlat, Emily A. Hornett, James H. Fullard, Neil Davies, George K. Roderick, Nina Wedell & Gregory D. D. Hurst (2007). "Extraordinary flux in sex ratio". Science 317 (5835): 214. doi:10.1126/science.1143369. PMID 17626876. - Hypolimnas, funet.fi |Wikimedia Commons has media related to Hypolimnas bolina.| |Wikispecies has information related to: Hypolimnas bolina|
<urn:uuid:f81d0b07-51d5-4c78-a665-aeb8ef3194d3>
CC-MAIN-2016-26
http://www.eol.org/pages/162837/overview
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399425.79/warc/CC-MAIN-20160624154959-00155-ip-10-164-35-72.ec2.internal.warc.gz
en
0.788981
1,781
3
3
Problem : What is the volume of a cube with edges of length one inch?1 cubic inch. Problem : Imagine a square, and another square in a plane perpendicular to the plane of the first square. If each square has side length one inch, what is the volume of the figure consisting of both squares?The volume is zero. Two polygons can never be combined into a simple closed surface, and a simple closed surface is necessary to form the boundary of a solid that can have volume. Problem : Into what kind of solid can all polyhedra be divided?Pyramids
<urn:uuid:229f08b0-d10a-4083-a658-10a3f6c52ab0>
CC-MAIN-2016-26
http://www.sparknotes.com/math/geometry2/3Dmeasurements/problems_1.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397565.80/warc/CC-MAIN-20160624154957-00100-ip-10-164-35-72.ec2.internal.warc.gz
en
0.920023
118
3.109375
3
The Museum Collection Edmund Quinn Bust of Poe Description:The Bronx Society of Arts and Sciences presented a bronze version of this bust to the City of New York on January 19, 1909 in honor of the centennial of Poe's birth. The Bronx Society of Arts and Sciences gave this plaster cast of the work to the Poe Museum in 1931. The Poe Museum displayed the piece in the Poe Shrine in the Museum's garden until 1987, when it vanished. Some time later, a gentleman carried the bust to the bar of the Raven Inn and bought it a beer. The police found the bust sitting on the bar with a mug of beer and a transcription of Poe's poem "The Spirits of the Dead." Having trained under the painter Thomas Eakins at the Pennsylvania Academy of the Fine Arts, Edmond T. Quinn established himself as a successful sculptor of portrait busts and statues which a 1919 issue of the New York Times described as "recording subtleties of expression that play like rippling water over the rock structure of the human head." His best-know work is the bronze statue of Edwin Booth as Hamlet in New York City's Gramercy Park. Gift of the Bronx Society of Arts and Sciences
<urn:uuid:b0098f7c-c84c-4db5-9b7f-87072e581a1a>
CC-MAIN-2016-26
http://poemuseum.org/collection-details.php?id=19
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783403502.46/warc/CC-MAIN-20160624155003-00164-ip-10-164-35-72.ec2.internal.warc.gz
en
0.928587
250
2.515625
3
By Jennifer Openshaw Most of us use our cell phones for just about everything these days -- texting a buddy, monitoring social networking sites, or checking the weather. But the ubiquitous cell phone could dramatically affect hundreds of millions of people in countries like China, India, and Africa. New companies such as Obopay and Moka are providing access to a new virtual world made available by cell phone technology. Obopay, for instance, is enabling third-world countries including India to receive and send payments via text message, while Moka provides language translations, such as English to Chinese. What does this mean? In India, where many people don't have access to an address or a bank account, cell phones are the new means for government or an employer to send payments. Once the money is deposited into the recipient's "account," he/she can then remit money internationally, send funds to his family, or pay bills -- all right from the phone. Obopay's system also eliminates the risk of theft in cash-based economies. Imagine the Indian farmer who heads to the market to sell his products. The buyer arrives with a safe filled with cash to buy goods -- imagine how vulnerable that cash may be. A cell phone makes that transaction less risky. And this new cell phone technology isn't just providing better access to money without physical banks. Imagine living in Mexico, home to 100 million people, or China, with a population of 1.3 billion. Many people living in rural areas in either of these countries face limited access to schools or medical facilities. And in China, with so many different dialects, it's easy for crucial information to get muddied up -- whether it's to teach people English or to inform them of the availability of new vaccinations in their area. By enabling translation via text messaging or SMS, Moka can ensure that converting communication from one language to another is done with fewer problems. With the ever-popular Twitter now readily available via mobile phones, we're now seeing those who never had a voice really take on government. In Myanmar, thousands of monks took to the streets in pro-democracy demonstrations by communicating through twitter via their cell phones, leaving the military generals "caught in a rare dilemma," according to Reuters. It's a reminder of just how powerful social media has become for human rights and other issues. For entrepreneurs, it means new opportunities to start and grow businesses -- and to do good works in the process. It's sparking all kinds of ingenuity - imaginative minds developing new ways to leapfrog over the lack of infrastructure and bring these people into the 21st century. In Africa, for instance, there's been an effort to bring laptops to those who've never owned a computer. But this effort may not be practical, because they take more electricity to charge than a cell phone. For Africans, the challenge isn't so much about getting a gadget, but rather access, and cell phones can help solve this. Bringing it closer to home, the global financial crisis has underscored how little the average person knows about the economy. Yet by breaking outside the traditional Wall Street box in tone and language, even WeSeed.com is able to provide ordinary people -- including students in public schools -- an opportunity to learn and experiment in a way they wouldn't have had before. These days, mobile technology is perhaps the most powerful enabler to access -- access for the billions who have gone without for too long. It's helping people become more self-sufficient and more educated. It's providing the on-ramp to banking, credit, and money-management tools. It's even creating the road to preventative health care and the maps to locate it. If there's one tool that may prevent people from being left behind, it's mobile technology. Jennifer Openshaw, author of The Millionaire Zone, is co-founder and president of WeSeed, whose mission is to enable people to discover the stock market in their everyday lives through their passions, their jobs and the brands they know and love. Her empowering advice, which helps everyday Americans do more with what they have, has been seen on Oprah, Dr. Phil, The Today Show, CNN, CNBC, and Nightline. You can find her on Twitter @jopenshaw or on Facebook. You can also reach her at email@example.com. SUBSCRIBE AND FOLLOW Get top stories and blog posts emailed to me each day. Newsletters may offer personalized content or advertisements.Learn more
<urn:uuid:63e5eaa5-c8d3-4868-8a0c-caff3a0d9bdb>
CC-MAIN-2016-26
http://www.huffingtonpost.com/2009/04/23/mobile-phones-key-to-deve_n_190809.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402699.36/warc/CC-MAIN-20160624155002-00198-ip-10-164-35-72.ec2.internal.warc.gz
en
0.957826
930
3.078125
3
To contend with a maturing workforce and fewer students worldwide taking science, technology, engineering and math (STEM) courses each year, Honeywell is creating programs to develop the engineering talent of the future, including plant operators, maintenance technicians, implementation engineers, system administrators and managers. "The shortage of engineering skills is an industry-wide challenge," stresses HPS president Norm Gilsdorf. "Experienced engineers are retiring, leaving behind a void that is not being sufficiently filled by newly qualified talent. With a globally expanding business like HPS, the problem is magnified. Honeywell needs more engineers. For us to find them we have had to develop a number of programs, which are not only designed to deliver immediate results but to also foster interest and desire in STEM careers for future generations." Central to such programs is simulation. "Simulation allows students to make mistakes and training allows you to accelerate knowledge transfer," says Pete Henderson, London, Ont.-based product manager for HPS' simulation business. Customers typically report that panel operators trained using simulators can work independently in one year instead of the three years of actual plant operation experience this usually takes. "The reason is that you don't have to wait for these training scenarios to evolve in the control room. Simulators capture a lifetime of experiences, which are then easily transferred to new operators within controlled, repeatable curriculum in a fraction of the time. Operator confidence improves with acquired knowledge and skills, allowing them to respond to changing conditions quickly, instinctively, inherently and reflexively. This doesn't mean that you don't want the operator to think about what is happening -- but this newly acquired knowledge and familiarization frees the operator from having to figure out what is going on in the heat of the moment." Henderson believes training aids such as animations, podcasts and dynamic process simulations that interactively engage the student are excellent because experiential (hands-on) learning allows the person to relate simple operations with future process outcomes of inter-related variables. Such practical skills dynamically reinforce fundamental knowledge transferred during traditional classroom lectures, resulting in the greatest long-term knowledge retention. "In simulation, seeing relationships helps form a strong basis for skills development that we encounter during process plant procedures. Students also learn through practice, repetition (like learning how to play a piano), familiarization and orientation. In this way, operators begin to understand how their actions, commands, set points and procedures relate to the plant's operations." To measure training's success, pre-configured exercises can monitor key performance indicators, alarms, events and student response. The same exercises also assess the student's ability to keep the plant within an operating window -- i.e., performance criteria. Operators are graded on how they perform, for example, with pump trips. "We monitor how they respond and react. It might be that they react inappropriately and have to repeat the training. With the help of the coach, you can make sure that particular operators get exactly the right training to tackle the weaknesses that they have," says Henderson.
<urn:uuid:9fa28fa9-07b0-428f-9f29-4eec65a41c96>
CC-MAIN-2016-26
http://www.chemicalprocessing.com/articles/2011/operator-training-gains-ground/?start=2
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397842.93/warc/CC-MAIN-20160624154957-00163-ip-10-164-35-72.ec2.internal.warc.gz
en
0.957544
620
2.53125
3
Posted September 27, 2005 COLLEGE STATION, Sept. 27, 2005 - A new strain of flu-type virus has been proven to pass from horses to dogs, a rarity in the animal world - and it's been detected in Texas . While it's not uncommon for a flu-type virus to hop from one animal to another, such as several horses becoming infected from a sick one while all are confined in a close environment, it is rare that a disease is passed to a different species - such as a dog - and cause for concern. The virus - identified as H3N8, first discovered in Florida - has been confirmed to being passed from horses to greyhounds, killing some of the infected dogs at racetracks in several states, according to results published in the current issue of Texas A&M University graduate student Pamela Ferro, one of the authors of the study, says there is no evidence yet of the virus being passed to humans. "The virus we identified originally started as a horse-type flu," Ferro explains. "But this is one of the first viruses of its type that we know has been passed on to dogs. So yes, it is unusual and it is a definite reason to be concerned, especially among dog breeders such as those in the racing industry." So far, the disease has been detected in Florida , Texas , Iowa , Arizona , West Virginia , Wisconsin and Massachusetts , says the Center for Disease Control (CDC). The CDC says that while the chance of human infection is very low, the fatality rates for dogs that contract the disease can be as high as 10 percent, an alarming number especially to those in the racing industry where greyhounds have been particularly hit "We identified the disease last year, and tests proved conclusively this year that the disease is related to the equine influenza strain," explains Ferro, a researcher in the Texas Veterinary Medical Diagnostic Laboratory. "As you might expect, there are several groups trying hard right now to develop a vaccine to fight it." The disease often resembles "kennel cough," a common ailment found in dogs housed in kennels and a cousin of the bacteria that is often found in whooping cough in children. Because dogs don't have a natural immunity to the H3N8 virus, researchers believe it is likely that more dogs will contract the disease, which is highly contagious. Angela G. Clendenin Director, Communications & Public Relations Ofc - (979) 862-2675 Cell - (979) 739-5718 ↑ Back to Top « Back to Press Releases
<urn:uuid:8236c5cb-8713-408e-9e56-09c95ac67216>
CC-MAIN-2016-26
http://vetmed.tamu.edu/news/press-releases/dog-virus
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393332.57/warc/CC-MAIN-20160624154953-00133-ip-10-164-35-72.ec2.internal.warc.gz
en
0.952361
587
2.828125
3
Mental Health Nurse A Mental Health Nurse (MHN) is a nurse that is qualified in the care of those suffering from a wide-range of mental disorders. Qualified MHNs undergo a period of education at university and obtain both an academic and a vocational qualification. The academic qualification can be a degree (including both BSc and BA) or a Diploma, depending upon the course of nurse education offered by the univeristy. Such courses focus on the evidence base for a range of nursing interventions, including psychosocial interventions, family therapies and indivualised problem-solving therapies. In addition the education course includes childbirth, old age and death and dying as subjects to be covered. The vocational qualification permits the nurse to register with a professional governing body which has legal powers to investigate complaints about nurses' conduct. These powers include the being able to strike off or suspend a nurse from practicing. Most countries around the world require qualified nurses to be registered with such a body before practicing. The range of clinical autonomy MHNs are allowed varies from country to country. Some countries, including the UK, allow mental health nurses a high level of clinical autonomy of action, including assessing, treating and discharging patients. Other countries continue to confine the role of the mental health nurse to that of a doctor's assistant, whereby a nurse cannot make a clinical decision without the direct approval of, or reference to, a medical member of staff. Mental health nurses occupy increasingly expanded roles within the healthcare culture, including taking on the role of therapists delivering Cognitvie Behavioural Therapy (CBT), Dialetical Behaviour Therapy (DBT) and psychotherapy.
<urn:uuid:19416f59-83ef-497e-b2fb-d4fd3cef6f5c>
CC-MAIN-2016-26
http://www.conservapedia.com/Mental_Health_Nurse
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783392159.3/warc/CC-MAIN-20160624154952-00110-ip-10-164-35-72.ec2.internal.warc.gz
en
0.946592
342
2.859375
3
A new app designed by young people is breaking down the stigma of seeking help from others through the gamification of goals. Goalzie, developed by the Young and Well Cooperative Research Centre in collaboration with teenagers, lets users challenge their friends to complete goals -- or face the consequences. “Challenges include things like writing a resume, making a Vine video, doing a workout,” Young and Well CRC CEO, Associate Professor Jane Burns, told The Huffington Post Australia. “If you don’t do the things that you set yourself, there’s consequences – washing the car, not using Facebook for two days, doing chores – things that aren’t necessarily terrible but might be unpleasant.” And though it’s a bit of fun, the serious side of the app is its aim of helping young people get into the practice of asking others for help if they’re in trouble. The creators say that encouraging social networking between peers -- and attaching it to the setting and completion of goals -- fosters an attitude where young people are willing to approach others for help. 75 per cent of mental health difficulties occur before the age of 25 in Australians, with 70 per cent of girls and 80 per cent of boys not seeking help when managing their mental health issues. “Through apps like Goalzie we are trying to break down stigma and instil help-seeking behaviour using humour and gamification,” Burns said. She said giving young people the power to manage their own care was one of the most effective ways to ensure they looked after themselves as they grew up. “It’s called person-centric care -- the person rather than the professional looks after and supports their own wellbeing, interfaced with professional care. The person is in control,” she told HuffPost Australia. The app links to other services offered by Australian mental health and wellness groups if the person using it is having a tough time. “The other really important thing about Goalzie is – it really promotes the idea that if you are struggling, you access support from services like Reachout, Headspace, and Kids Helpline, or Lifeline,” Burns said. Groups of young people were involved in every stage of the app’s creation, from the initial design through to testing and feedback. 13-year-old schoolmates Diya Mehta, Kris Kavanagh, and Milos Mijatovic were part of the group that helped create the app. Mehta said it was exciting to receive a challenge from a friend. “A lot of content online nowadays, it’s either fun or good for you. Goalzie strikes a balance between the two. It’s engaging but educational too,” she told HuffPost Australia. Kavanagh said the app helped keep him focused on what he wanted to achieve. “I feel like some young people don’t know what they want to do. If you set goals you feel motivated to achieve them.” Young co-collaborators say it was great to be involved as "too often adults dismiss what we try to say, so it was good to be heard" #Goalzie— Young and Well CRC (@yawcrc) February 5, 2016 He’s got a rivalry with friend Mijatovic, with the two sending each other challenges each day to complete for a bit of friendly competition. For Mijatovic, being involved in the app’s creation built his confidence. “It helps with real-life experiences at school and outside of school. If a teacher sets you homework you don’t understand, it helps you to ask your friends or a guardian how to do it,” he told HuffPost Australia. “Through this app and creating this app it helped me, it helped me to ask for help myself.” Lead researcher on the project, Dr Barbara Spears, from the University of South Australia, said Goalzie was based on extensive research and consultation with young people. “By practising setting goals for others, and helping them to achieve their goals in a fun way, young people are learning and establishing important, positive patterns of behaviour,” Dr Spears said. “Being socially connected, and reaching out to others for help and assistance breaks down barriers and stigma about setting goals and seeking help to achieve them.”
<urn:uuid:b6c0132e-6dad-44d4-9832-e78e0ea763eb>
CC-MAIN-2016-26
http://www.huffingtonpost.com.au/2016/02/04/goalzie-mobile-app_n_9164182.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395679.92/warc/CC-MAIN-20160624154955-00058-ip-10-164-35-72.ec2.internal.warc.gz
en
0.961502
920
2.78125
3
[The Enemy Never Came: The Civil War in the Pacific Northwest by Scott McArthur (Caxton Press, 2012). Softcover, map, photos, notes, appendices, bibliography, index. Pages main/total:250/286. ISBN:978-0-87004-512-7 $18.95] McArthur begins with a brief history of the settlement of the Pacific Northwest and the response of its residents to the outbreak of Civil War. A significant number of settlers were from the border states and the South, and Democratic governor John Whiteaker was not especially keen on participating in the conflict. The author cites the insular political climate, the great distance to the fighting fronts, and the proximity of newly discovered gold fields in Oregon, Idaho, and British Columbia as important factors in the generally poor response to the call for troops (at least in Oregon). Only three regiments, the 1st Oregon Volunteer Cavalry, 1st Oregon Volunteer Infantry, and the 1st Washington Territorial Infantry, were raised in the Pacific Northwest. Unlike the Washington unit, the Oregon formations did not accept Californians and were only able to recruit in fits and starts, never achieving full regulation strength. With the departure of all but a few companies of regulars, the most immediate threat came in the form of restive Indian tribes. McArthur describes many small scale punitive expeditions, the most significant conducted east of the Cascade Mountains. Other threats, imagined real at the time, were omnipresent. Authorities feared uprisings by southern sympathizers in the Willamette Valley and below (perhaps fomented by secret societies like the Knights of the Golden Circle), seaborne threats by the British navy and Confederate privateers, and land incursions from Canada and even the Mormons of Utah. In addition to highlighting these largely groundless fears, McArthur covers responses to them like the suppression of Democratic "Copperhead" newspapers in Portland, Salem, Eugene, Albany, and Corvallis. Civilian and soldier life are also discussed. Frontier existence was isolated and difficult, but the regional economy benefited from the war to some extent. Proceeds from the gold fields enriched both individuals and those that supplied their efforts, and local industries (e.g. wool production, lumber, fisheries, and coal extraction) expanded. The soldiers had the usual complaints of Civil War fighting men, and the usual vices. Exceptional tedium, dreams of mining riches, and the false promise of transfer to the east, all undoubtedly contributed to a high rate of desertion in the Oregon and Washington regiments. The bibliography offers a nice collection of material (including books, articles, newspapers, theses, dissertations, government documents, and manuscript collections) on a neglected subject. While still leaning on oft used primary sources like Royal Bensell and William Hilleary1, McArthur was also able to uncover other interesting on-the-ground perspectives from the archives. Beyond the comparative neglect of the Washington Territory2, my main complaint with the book is with its organization. The writing is choppy and the chapters are largely self-contained discussions. The latter is not necessarily bad, but, in this case, significant gaps in coverage emerge. Nevertheless, The Enemy Never Came is easily the most comprehensive introduction to the subject of the Civil War in the Pacific Northwest that one can find in stores. Both author and publisher deserve a great deal of credit for bringing the topic out of the shadows. 1 - Both have been published, Bensell in Gunter Barth's All Quiet on the Yamhill (University of Oregon Press, 1959) and Hilleary in A Webfoot Volunteer: The Diary of William M. Hilleary, 1864-1866, edited by Herbert B. Nelson and Preston Onstad (Oregon State University Press, 1965), the latter much more difficult to obtain. 2 - Happily, historian Lorraine McConaghy plans to publish a study of the role of Washington Territory in the Civil War.
<urn:uuid:51250923-9732-41d6-b90e-e7e77ed483cd>
CC-MAIN-2016-26
http://cwba.blogspot.com/2012/11/mcarthur-enemy-never-came-civil-war-in.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783391766.5/warc/CC-MAIN-20160624154951-00062-ip-10-164-35-72.ec2.internal.warc.gz
en
0.937524
817
2.734375
3
Regional Adaptation Strategies for the German Baltic Sea Coast (RADOST) The Ecologic Institute coordinates the five-year project RADOST (Regional Adaptation Strategies for the German Baltic Sea Coast). The Baltic coastline of Mecklenburg-Western Pomerania and Schleswig-Holstein is one of seven model regions in Germany that are supported by the Federal Ministry of Education and Research (BMBF) through the initiative KLIMZUG ("Managing climate change in the regions for the future"). The aim of the RADOST project is to develop regional adaptation strategies in a dialogue between research institutions, business, public administration and civil society. The essential idea of the project is to establish a close linkage of research and practice. In addition to a core consortium of 17 partners, RADOST involves a multitude of network partners from research organisations, business, public authorities and non-governmental organisations, part of which contribute to the research activities as subcontractors. At the time of proposal submission, this network included around 60 partners. It will be continuously expanded in the course of the project. The regional dialogue is complemented by a national and international information exchange involving partner regions in Europe, North America and North Africa. Today, millions of euros per year are already invested in coastal protection in the region. The efficient usage of these funds requires predictions about the coast line’s future development to be as precise as possible. However, the specific impacts of climate change – caused by the rising sea level, modified currents or an increase of surges – are still very uncertain. Another challenge is posed by water quality alterations in a warmer climate with modified river discharge patterns. In order to more accurately assess the dynamics of future environmental conditions, RADOST will use combinations of existing models to illustrate changes in more detail than before. RADOST activities in the field of natural science will include investigations into hydrodynamics, sediment transport, water quality and ecosystems. In addition, the socio-economic consequences of climate change and adaptation options in the region will be assessed. Research and strategy development activities focus on the issues of 1) coastal protection, 2) tourism and beach management, 3) water management and agriculture, 4) ports and maritime economy, 5) nature conservation and use, 6) renewable energies. Implementation projects with local partners will illustrate the economic opportunities of innovative responses to climate change. The envisaged practical applications include combining coastal protection constructions with diving tourism activities or geothermal energy generation; concepts for the aquaculture industry; design optimisation of ships for the use on routes through the Baltic Sea; and new marketing strategies for beach tourism. Further information on RADOST is available on the project’s website.
<urn:uuid:4663274b-94b8-4883-b26e-4e8f17eaf721>
CC-MAIN-2016-26
http://ecologic.eu/node/2926
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395620.9/warc/CC-MAIN-20160624154955-00193-ip-10-164-35-72.ec2.internal.warc.gz
en
0.891125
548
2.640625
3
What It Is? The problem description will help you keep the main goal of your social marketing effort in mind. The problem description clarifies what the public health problem is, who is affected, and what you propose to do to address it. A full, clear problem description and analysis will help you decide whether to undertake a social marketing effort. How It Is Done? Write a problem statement - The health problem is the gap between an acceptable or desirable health status and the current status. To write your problem statement, briefly answer these questions: - What should be occurring? What is occurring? - Who is affected and to what degree? - What could happen if the problem isn't addressed? - Use health status indicators to answer the first 3 questions. Health status indicators are data on outcomes or their causes (e.g., smoking rates). Health status indicator data is made available by numerous organizations. See list of organizations. List and map the causes of the health problem - Consider the following: - genetic or biological factors - psychological factors - factors in the physical environment (e.g., a lack of transportation) - factors in the social environment (e.g., social support, or policy) - Categorize the causes as direct and indirect, and as risk and protective factors. Weigh the factors and determine which ones are the primary factors. - Determine which of these can change as a result of programmatic action? (e.g., a social marketing program can't eliminate genetic risk factors) Identify potential audiences - Grouping the audience into meaningful segments will allow you to design efficient and effective strategies for reaching them. - Determine which audiences are: - most affected by the problem - most likely to change their behavior - most feasible to reach - key secondary audiences - Avoid making audiences too broad. It is a better use of your resources to impact fewer in a more meaningful way. - Be sure to add to the list target audiences your program is required to reach, and additional audiences that could help bring about change. Conduct a SWOT analysis - A SWOT (Strengths, Weaknesses, Opportunities and Threats) analysis assesses the factors in the broader situation that could impact the implementation of your program or its ultimate success. Tools and Templates - Page last reviewed: August 9, 2010 - Page last updated: August 9, 2010 - Content source: - Centers for Disease Control and Prevention - Page maintained by: Division of Public Affairs (DPA), Office of the Associate Director for Communication (OADC)
<urn:uuid:58f735b5-40f1-4a66-b7f0-0c300bc17b93>
CC-MAIN-2016-26
http://www.cdc.gov/healthcommunication/CDCynergy/ProblemDescription.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393332.57/warc/CC-MAIN-20160624154953-00191-ip-10-164-35-72.ec2.internal.warc.gz
en
0.932622
542
2.625
3
Health News from Around the World The report states that the large jump is due to a second peak of illnesses that occurred just after the last publicized estimate. The H1N1 flu has been confirmed as the cause of death in about 10,000 patients—more than three-quarters of whom were between 18 and 65—and had resulted in 200,000 hospitalizations. While seasonal flu kills an estimated 36,000 Americans each year, that number includes elderly patients who die from complications that the flu worsens—heart problems, pneumonia and strokes. The H1N1 death toll of 10,000 is considered conservative because it does not include those who died from these types of secondary illness. While 50 million Americans have had H1N1, that leaves 250 million who have not. If you have not gotten an H1N1 vaccination, the CDC recommends doing so.
<urn:uuid:f673df94-f35b-4c72-aa12-d935a5c02f68>
CC-MAIN-2016-26
http://www.oprah.com/health/Health-News-Roundup-December-2009/2
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393332.57/warc/CC-MAIN-20160624154953-00162-ip-10-164-35-72.ec2.internal.warc.gz
en
0.980073
179
2.90625
3
|The American Presidency Project| |• Jimmy Carter| |Proclamation 4752 - Jewish Heritage Week| |April 24, 1980| Ever since the first Dutch Jew set foot in New Amsterdam in 1654, Jews have been contributing bountifully to the culture and history of our country. Indeed, the history of the Jewish people in America goes all the way back to the Jewish scientists and mariners who helped Columbus reach the New World. Later, Jews took an active part in the War of Independence, in the settlement of the West, and in the dynamic expansion of American technology. In medicine, education, trade, the law, politics, the labor movement, religion, motion pictures, athletics, literature, and more, the Jewish people have richly endowed America and the American way of life. American Jews have made their heritage?a heritage of struggle for freedom, knowledge, and human dignity?part of the inheritance of all Americans. In recognition of this contribution, and in an effort to foster understanding and appreciation of the cultural diversity that has made America great, Jewish Heritage Week is celebrated each spring throughout the United States. This April is a particularly appropriate month because it contains events of special significance to the Jewish calendar?Passover, the anniversary of the Warsaw Ghetto Uprising, Israeli Independence Day, Solidarity Sunday for Soviet Jewry, and the Days of Remembrance of Victims and Survivors of the Holocaust. Therefore, the Congress of the United States, by joint resolution, has requested the President to proclaim April 21 through April 28, 1980, as Jewish Heritage Week (H.J. Res. 474). Now, Therefore, I, Jimmy Carter, President of the United States of America, do hereby proclaim the week beginning Monday, April 21, as Jewish Heritage Week. I call upon the people of the United States, Federal and local government officials, and interested organizations to observe that week with appropriate ceremonies, activities, and programs. In Witness Whereof, I have hereunto set my hand this twenty-fourth day of April in the year of our Lord nineteen hundred and eighty, and of the Independence of the United States of America the two hundred and fourth. |Citation: Jimmy Carter: "Proclamation 4752 - Jewish Heritage Week", April 24, 1980. Online by Gerhard Peters and John T. Woolley, The American Presidency Project. http://www.presidency.ucsb.edu/ws/?pid=33316.| © 1999-2011 - Gerhard Peters - The American Presidency Project
<urn:uuid:df8a15bb-a0a7-493f-aef4-66caad793dc0>
CC-MAIN-2016-26
http://www.presidency.ucsb.edu/ws/print.php?pid=33316
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397865.91/warc/CC-MAIN-20160624154957-00149-ip-10-164-35-72.ec2.internal.warc.gz
en
0.921499
517
3.28125
3
Solid-state and gas lasers have followed largely divergent development paths. Gas lasers are based primarily on direct electrical discharge for pumping (energizing), while solid-state lasers are pumped by flashlamps and semiconductor diode laser arrays. The alkali-vapor laser's intrinsically high efficiency (80+%) and its compatibility with today's commercially available diode arrays enable fast-track development paths to tactical systems, with mass-to-power ratios that far exceed what is possible with today's other laser systems. DPAL fires an array of high-powered diode lasers, a type used in consumer gadgets like DVD players, into a cloud of alkali metal atoms. The energy is absorbed by their outer electrons and then released as laser light William Krupke, WFK Lasers, LLC, proposed the diode-pumped alkali laser (DPAL) concept to benefit from the attractive efficiency and power-scaling properties of high-power pump-semiconductor-laser diodes, while replacing the solid-state gain medium with a gaseous (vapor) medium to recover convective transport of waste heat from the laser resonator. In previous DPAL experiments the gain medium was static, and waste heat removal from the lasing volume occurred through free convection. Efforts to further increase DPAL average output power have retained static gain media but resort to geometries in which at least one high thermal-conductivity wall is placed close to the pumped active laser volume, as in a circular capillary or a planar waveguide. Calculations suggest that capillaries may be scaled to output powers into the 100W regime, and that 2D waveguides may scale to output powers into the kilowatt range. In scaling to much higher powers, it is anticipated that a flowing DPAL medium will be needed, which will likely be undertaken in the next few years. New Scientist reported the Alkali laser as a leading contender for anti-missile lasers. Progress in alkali lasers development (2008) Diode pumped alkali vapor lasers developed during the last several years have the potential to achieve high power. Efficient operation of Rubidium, Cesium and Potassium lasers has been demonstrated. Laser slope efficiencies higher than 80% have been achieved. A diode laser pumping can provide high overall efficiency of these devices. A diode pumped continuous wave 10 W Cs laser and continuous wave 17 W Rb laser were demonstrated. In this paper we review the main results and recent achievements in high power alkali lasers development, discuss some problems existing in this field and ways to solve them Slope efficiency is the ratio of pump power to output power after the initial priming of the laser has been completed. (higher slope efficiency is better.
<urn:uuid:f0466e2e-9d7f-457c-9b7d-2c6f01f69095>
CC-MAIN-2016-26
http://nextbigfuture.com/2010/02/diode-pumped-alkali-lasers-could.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396872.10/warc/CC-MAIN-20160624154956-00162-ip-10-164-35-72.ec2.internal.warc.gz
en
0.926776
572
2.796875
3
Penn's relationship with Native Americans should be viewed in specific manner. For what Penn and his contemporaries realized, what scholars such as Francis Jennings remind us of, and what most viewers (at least those who their wrote comments) of the Capitol friezes ignored, was the variety inherent in Indian-White relations. I mean by this simply that there was no uniform 'white' colonist nor 'standard Indian'. Instead, there existed numerous tribes, with complex inter and cross tribal affiliations, as well as colonists from several different countries all vying power. And the various tribes did the same. We should also remember that Penn entered the American arena somewhat late in the game; political alliances among various tribes, and between the tribes and the colonists had been set. And by the end of the 17th century colonists often looked towards Indians as a means to wealth, especially through the fur trade, not only as 'savages' to be feared. Once Penn received his charter he realized--or at least was informed--that much of the land he wanted was held by Indians who would expect payment in exchange for a quitclaim to vacate the territory. The tribe he would have to deal with most often was the Delaware (Leni Lenape), who had never been defeated militarily by the Swedes or the Dutch. Penn, not surprisingly, had no military ambitions; he even refused to fortify Philadelphia. As such, the only practicle and legal way to get their land and secure their friendship was the treaty. The treaty also demonstrated Penn's claim to the land to his investors, who would have been much less interested in the venture without clear title. And so Penn and his agents began the process of buying land from its Native 'holders'. These holders were various Delaware chiefs, and not as legend has it the Iroquois. Despite the fact that this (mostly) New York State Confederacy of the 'Five Nations' had defeated the Delaware, they did not have the power the sell the land. As Francis Jennings points out, this misreading of the situation resulted from the fact that the Delaware played the role of peacemaker among various quarreling tribes. As Native women often mediated disputes, the Delaware held the position of the 'woman' in this arrangement. Europeans wrongly assumed that the 'woman' position signified a lack of rights and lack of power. However, they were correct in assessing that the Iroquois held the most power, though Penn thought that politics, at least dealing with Indians, were local so he favored the less militarily powerful Delaware. What is less assuredly myth--or fact--is whether Penn ever signed a 'Great Treaty' in 1682 at the village of Shackamaxon. As we have seen, for many Americans (and non-Americans such as Voltaire) this deed proved the most inspiring 'event' of Penn's life. Francis Jennings believes that Penn signed the treaty and never broke it, but that his less scrupulous successors destroyed the document, presumably so that they could renege on its provisions. (201) We do know that Penn did buy much land, so must have made at least one such agreement, instituting what was known in Indian terminology as a 'chain of friendship'. And there do exist several references to this chain being made between Penn and the Delaware. Penn paid a total of 1200 pounds for the land, which though a large sum, was probably fair for both sides. Penn took the advice of Dutch and Swedish colonists who had already set some parameters for treaty agreements These earlier settlers provided invaluable assistance in delineating who to contact, and who to pay for the land. On the other side of the 'covenant chain', the Delaware had many years of negotiating such treaties, and were ready to sell their land to Penn, on their terms. Disease had decimated much of their population so they needed less of the land near Philadelphia, and at the time there was plenty of un-occupied space to the North and West of the (future) city. As well, the Indian's 'ownership' of the land, was not as 'savagely simple' as had been assumed. (Jennings, 201). They worked with a complex arrangement of overlapping 'right's to use certain areas, and rights to dispose of these obligations. So Penn may have had to pay several times to the same holder in order to clear all claims. He was not 'duped' into paying several times for the same property. Though Penn was generally fair in his purchases, he also had to be a shrewd businessman, especially as he competed with Lord Baltimore for territorial rights. He out-maneuvered Maryland agents in his purchases, thus insuring that his future city would not be largely subsumed by its southern neighbor. Penn had competitors to the North as well. And any northern land transactions meant tangling with New York State for land, and perhaps more importantly, trading rights with the Iroquois Confederacy. To secure new routes to the interior and more trade with the Five Nations, Penn tried to purchase a large piece of land on the Susquehanna River. Pennsylvania could then have a trading post closer to the Iroquois than was Albany. However, New York State merchants beat Penn to the punch by using their comfortable relations with the Confederacy to claim the land--as a 'gift' from the Iroquois nonetheless--before Penn. Penn ultimately did gain access to the Susquehanna region, though he had to wait until 1700. By that time New York State governor Dongan, who had convinced the Iroquois to cede the land to him rather than to Penn, was gone. Once he returned to Ireland, as Earl of Limerick, he "blackmailed Penn out of 100 Pounds for the deed" (Jennings, 203). Penn's fortunes were also helped by the Iroquois' defeat by the French and their Native allies. As well, the French and Indian wars allowed the Susquehanock Indians to move back to their old homes at Conestoga, vacating much of the land that Penn sought. So by 1701, he could purchase the land without difficulty. The treaty of 1701 is both the first full treaty text that remains extant (there exist parts of earlier ones), and the last agreement brokered directly by Penn rather than his agents. It also capped a major power play: "It conveyed land, controlled trade, and arranged juridical relationships, all at the expense of New York and New York's partners, the Iroquois Five Nations" (Jennings 205). As he had done before, Penn rewarded 'his' Indians. His policies helped make Pennsylvania, in the words of the missionary John Heckewelder, "the last, delightful asylum" for Native Americans (Jennings, 207). Penn's successors were much less fair and scrupulous in dealing with the Indians. The ink was barely dry on the 1701 treaty when Penn's secretary and family steward, James Logan, began to devise ways to reclaim land set aside for the Susquehannocks and the Delaware. By 1701 Penn had returned to England for good, trying to administer to his declining fortunes at home, as well as to his colony, until he had a debilitating stroke in 1712. His legacy in dealing with the Indians was much more than ephemeral though, despite the fact that his heirs to the colony were much less fair than was its founder. The Iroquois rebuilt their empire after the French and Indian war, and as they did were linked into Pennsylvania's covenant chain of friendship. This relationship was formalized in a series of treaties in the first half of the 18th century, and gave the colony access to valuable trading routes and partners. And even more interestingly, Quakers were spared the vengeance of Indians who tried to reclaim their lands in the Seven Years war (1755-62). As Jennings points out, Quaker historians were at first mystified as to why the Delaware and their allies--who presumably had been well treated--would attack Pennsylvania colonies. They realized that Penn's beneficence had both obscured his descendants chicanery, as well as guaranteed the safety of many of the 'friendly' Quakers, whose lives and property were purposely spared during that war. Furthermore, Penn's relationship with the Natives ties in with his overall concept of his colony. He had a just and fair plan, though one formed by a conception of himself of lord of his domain. His planning was simultaneously 'idealistic' and pragmatic; he had grand visions of life in the New World, and realized them as much as was practicable. And as the various iconographers of Colonial America, including the Capitol sculptors, realized, his method did stand out from his contemporaries. While those who would argue that he essentially sought the same imperialistic goals, only in a kinder, gentler manner, may have a point, one must argue that this 'kindness' was relatively speaking, better than much of the outright hate and distrust that characterized Indian-White relations.
<urn:uuid:e46745bf-ae4e-484b-98cc-877dc424b01d>
CC-MAIN-2016-26
http://xroads.virginia.edu/%7Ecap/penn/pnind.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396455.95/warc/CC-MAIN-20160624154956-00168-ip-10-164-35-72.ec2.internal.warc.gz
en
0.988969
1,846
3.5
4
Researcher Discovers New Salmonella Serotype Salmonella Lubbock will provide new avenues for research into the bacteria’s prevention. Lubbock is known for many things. Some of them are reasons to celebrate, like being the home of Buddy Holly. Some portray the city in negative ways, like dust storms. The latest honor to come Lubbock’s way may not sound good at first, but when realizing it’s a breakthrough in biological sciences, it will become something to brag about. Marie Bugarel, a research assistant professor at Texas Tech University’s Department of Animal and Food Sciences in the College of Agricultural Sciences and Natural Resources, has discovered a new serotype of the salmonella bacteria. The new serotype was confirmed by the Pasteur Institute in Paris, the international reference center for salmonella. Because convention calls for a new serotype to be named after the city in which it is discovered, this one will be called Salmonella Lubbock (officially Salmonella enterica subsp. enterica Lubbock).
<urn:uuid:7f3a8fc4-b90e-436b-9595-b7515c066dd8>
CC-MAIN-2016-26
http://www.depts.ttu.edu/communications/thealist/article.php?category=staff&article=10&issue=1
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783403826.29/warc/CC-MAIN-20160624155003-00022-ip-10-164-35-72.ec2.internal.warc.gz
en
0.902714
228
2.96875
3
I have a question. [I don't like this opening. Of course you do otherwise you most likely won't be writing here] I'm reading this book called "reading people" and it in, the author explains some of the tactics she used to read ppl when she was a lawyer. One of the things she repeatedly mentioned was how she always tried to read the juries before choosing any of em. My question is, why/how does a laywer get to appoint the jury, who are ultimately going to make the verdict? If you're referring to the US legal system, the jury selection process involves a Q&A process called "voir dire", in which prospective jurors are questioned by attorneys representing both sides of a case about their backgrounds and potential biases before being invited to sit on a jury. "When people respond to a jury summons, they gather at the court house to form a pool of potential jurors from which they are called in groups for specific criminal or civil trials. There they are questioned by attorneys for each side and/or the trial judge about their background, life experiences, and opinions to determine whether they can weigh the evidence fairly and objectively. This process is called voir dire, an Anglo-French term meaning "to speak the truth." Through voir dire, an attorney can challenge a prospective juror "for cause" if that person says or otherwise expresses a bias against the attorney's case. Each attorney can also exercise a limited number of "peremptory" challenges for which no reason is required. Those individuals who are accepted by both attorneys [or the trial judge, if the judge conducts the voir dire] are impaneled and sworn in as the jury. Traditionally, American attorneys have had much latitude in conducting voir dire. The power to challenge-and the discretion to use it-is very important in our adversary system of justice; each attorney works for a jury most sympathetic to their side. Like all powers, this one has been subject to misuse and even abuse. As American society has evolved, so too has voir dire."
<urn:uuid:72704adb-2ff1-46e2-ab78-ee91115a6a19>
CC-MAIN-2016-26
http://www.antimoon.com/forum/t7297.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395160.19/warc/CC-MAIN-20160624154955-00043-ip-10-164-35-72.ec2.internal.warc.gz
en
0.969092
428
2.515625
3
HISTORY OF WESTERN EDUCATION finding the law that rules his life within himself, and he maintains that, in so far as the external restrictions are capable of passing into this inner law, they make for true liberty. But the proviso must be noted. It is not constraint as such that is good : only the constraint that ultimately approves itself to a self-determining being. Kant is quite in agreement with Rousseau about the badness of contemporary society, and of the education that prepares for it. The education that reconciles freedom and law must be very different from the ordinary education. It must be one directed by the ideal of a perfect humanity. " Children should be educated, not with reference to the present conditions of things, but rather with regard to a possibly improved state of the human race—that is, according to the ideal of humanity and its entire destiny."* In his discussion of the actual work of education, he holds strangely aloof from all the usual questions of curriculum and method. His main concern is with what goes on in the experience of the individual pupil in the -different stages of educational advancement. One of the few definite opinions he expresses on practical matters is that public education is to be preferred to private, because of the moral effects of the restraints imposed on the pupil by his contact with his fellows. At the same time, he is no believer in national education under the direction of kings and princes. (t Experience teaches us that the ultimate aim of princes is not the promotion of the good of mankind, but the well-being of their own state and the attainment of their own ends. When they provide money for educational enterprises, they reserve to themselves the right to control the plans." " There- fore/* he adds, " the management of the schools should be left entirely to the judgment of the most intelligent experts, "f In matters educational, Heinrich Pestalozzi (1746-1827) was a better Kantian than Kant himself. It is true that he was not a philosopher in any academic sense of the term, and that he had probably read none of Kant's works. But, like Kant, he had been profoundly moved by the Emile, and he had talked much with people more scholarly than himself who had come under the influence of Kant, with the result that his social ideals and his general conception of mental process (so far as it went) were very much like those of the great philosopher. At any rate, his principles and methods were just such as Kant might have evolved * On Pedagogy, p. 15. f Ibid.> p. 17.
<urn:uuid:065c4df8-1fbb-43f2-869c-a164cb453415>
CC-MAIN-2016-26
http://archive.org/stream/TheHistoryOfWesternEducation/TXT/00000333.txt
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393463.1/warc/CC-MAIN-20160624154953-00006-ip-10-164-35-72.ec2.internal.warc.gz
en
0.984246
531
3.234375
3
LONDON (Reuters) - European regulators have recommended approval of the Western world's first gene therapy drug - after rejecting it on three previous occasions - in a significant advance for the novel medical technology. More than 20 years since the first experiments with the ground-breaking method for fixing faulty genes, scientists and drug companies are still struggling to apply gene therapy in practice. Friday's decision by the European Medicines Agency (EMA) is a win for the drug's maker, the small Dutch biotech company uniQure, and a potential lifeline for patients with the ultra rare genetic disorder lipoprotein lipase deficiency (LPLD). It comes too late, however, for investors in the previous listed firm Amsterdam Molecular Therapeutics (AMT). After the earlier rebuffs for its Glybera medicine, AMT was taken private by newly created uniQure in April because it could no longer fund itself in the public markets. Patients with LPLD are unable to handle fat particles in their blood plasma and are afraid of eating a normal meal because it can lead to acute inflammation of the pancreas. The disorder - estimated to affect no more than one or two people per million - can cause acute pancreatitis and death. Winning approval for Glybera proved particularly challenging because the company was only able to test it on 27 patients in clinical trials, due to the rarity of the condition. That thin evidence base made the European agency reluctant to approve the drug initially. But the London-based watchdog said it now accepted there was sufficient benefit to justify a green light for the worst-affected patients, on condition that those receiving the one-off therapy continued to be followed. "This approval unlocks the potential of gene therapy because it is a first at either the EMA or FDA (U.S. Food and Drug Administration) for gene therapy," uniQure's chief executive Jorn Aldag said in an interview. "People have been skeptical as to whether the regulators would buy into this concept, which they have now done." The idea of treating disease by replacing a defective gene with a working copy gained credence in 1990 with the success of the world's first gene therapy clinical tests against a rare condition called severe combined immunodeficiency (SCID). People with SCID - also known as "bubble boy disease" - cannot cope with infections and usually die in childhood. The field then suffered a major setback when an Arizona teenager died in a gene therapy experiment in 1999 and two French boys with SCID developed leukaemia in 2002. In China, Shenzhen SiBiono GeneTech won approval for a gene therapy drug for head and neck cancer in 2003 but no products have been approved until now in Europe or the United States. More recently, some large pharmaceutical companies have also been exploring gene therapy. GlaxoSmithKline, for example, signed a deal in 2010 with Italian researchers to develop a SCID therapy. CHALLENGE FOR REGULATORS Tomas Salmonson, acting chairman of the EMA's Committee for Medicinal Products for Human Use, said evaluating Glybera had not been easy and experts had decided it should be recommended only for those patients with the greatest need for treatment. "Our established ways of assessing the benefits and risks of Glybera were challenged by the extreme rarity of the condition and also by uncertainties associated with data provided," he said. Recommendations for drug approvals by the EMA are normally formally endorsed by the European Commission within a couple of months. UniQure is now also preparing to apply for regulatory approval for Glybera in the United States, Canada and other markets. Aldag said it was too early to say what the medicine cost but the price would be "comparable" to that for other orphan drugs made by companies like Genzyme, a division of Sanofi , and Shire. These can cost hundreds of thousands of dollars a year. UniQure's largest shareholders are Forbion Capital Partners and Gilde Healthcare, two leading life sciences venture capital firms in the Netherlands.
<urn:uuid:79725b0c-ccad-4323-a5d4-15bce42af0a1>
CC-MAIN-2016-26
http://www.lifescript.com/health/centers/cholesterol/news/2012/07/20/european_regulators_back_first_gene_therapy_drug.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783403502.46/warc/CC-MAIN-20160624155003-00069-ip-10-164-35-72.ec2.internal.warc.gz
en
0.958876
848
2.546875
3
|born on||30 May 1869 at 15:00 (= 3:00 PM )| |Place||Caserta, Italy, 41n04, 14e20| |Timezone||LST m12e29 (is standard time)| |Astrology data||09°08' 09°10 Asc. 19°43'| Italian military, a general and air force theorist. An artillery officer in the Italian army, he participated in research on the mechanization of armed forces and forecast air supremacy as early as 1909. Douhet was criticized by the high command for antiquated military concepts during WW I, resulting in a court marshal and prison in 1916. He was later vindicated by the disastrous Italian defeat the Fall of 1917 and placed as Aviation Chief in 1918, becoming a General in 1921. Author of "Command of the Air." Douhet died 2/15/1930, Rome, Italy. Steinbrecher quotes B.R. (3:00 PM Rome time) - Vocation : Military : Military career - Vocation : Travel : Pilot/ military - Vocation : Writers : Textbook/ Non-fiction
<urn:uuid:c2fe544b-afc5-4c65-a740-bfb85b6c42ba>
CC-MAIN-2016-26
http://www.astro.com/astro-databank/Douhet,_Giulio
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397565.80/warc/CC-MAIN-20160624154957-00013-ip-10-164-35-72.ec2.internal.warc.gz
en
0.923728
241
2.578125
3
Many of us have suffered from broken bones, but it's rare, outside of the most serious accidents, for bones to ever shatter. Now, researchers have worked out why: because our bones, it turns out, are filled with goo. Researchers at the University of Cambridge have discovered that much of the mineral content from which bones are made is actually in the form of a goo, which sits trapped between tiny crystals, lubricating them—and, crucially, allowing for small movements. It's that flexibility that stops our bones from shattering, according the work they've published in the Proceedings of the National Academy of Sciences. The goo is made from citrate—a by-product of cell metabolism—mixed with water. It's a viscous fluid, and a thin layer of it sits between the nanocrystals—made of calcium phosphate—which make up the solid aspect of our bones. There's enough of it, though, to provide slip between the crystals, which absorbs the energy of impact that would otherwise shatter a solid piece of the crystal bone structure. Dr Melinda Duer, one of the researchers, explains: "Bone mineral was thought to be closely related to this substance called hydroxyapatite. But what we've shown is that a large part of bone mineral – possibly as much as half of it in fact – is made up of this goo, where citrate is binding like a gel between mineral crystals. This nano-scopic layering of citrate fluid and mineral crystals in bone means that the crystals stay in flat, plate-like shapes that have the facility to slide with respect to each other. Without citrate, all crystals in bone mineral would collapse together, become one big crystal and shatter. It's this layered structure that's been missing from our knowledge, and we can now see that without it you're stuffed." In fact, the researchers have observed that when the goo escapes, leaving just crystals, they fuse together, forming large brittle clumps that can shatter. They reckon that this could be what causes osteoporosis. The new finding, then, isn't just interesting; it could change the way we think about brittle bones diseases and, with any luck, inspire new treatments, too. [PNAS via Cambridge University] Image by Moody Man Chang under Creative Commons license
<urn:uuid:2a61e899-b754-4c0b-9bfd-18acbfdab089>
CC-MAIN-2016-26
http://gizmodo.com/your-bones-dont-shatter-because-theyre-full-of-goo-1551083614
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395679.18/warc/CC-MAIN-20160624154955-00127-ip-10-164-35-72.ec2.internal.warc.gz
en
0.959291
477
3.53125
4
Women with breast cancer often are advised to wait two years or longer after treatment before trying to become pregnant. This guideline, based solely on anecdotal evidence, attempts to deter women who may have an early recurrence and also to permit the completion of adjuvant treatment. There are no published data suggesting that postponing conception will alter the outcome of either the cancer or the pregnancy. This population-based descriptive study enrolled women 15 to 44 years of age, living in Western Australia, who received a diagnosis of breast cancer and subsequently became pregnant. Of 2539 women with pathologically confirmed breast cancer, presenting in the years 1982-2000, 123 (5%) had at least one pregnancy after being diagnosed. Sixty-two of the women who conceived after breast cancer was diagnosed (54%) did so within 2 years after diagnosis. Twenty-nine of them had an abortion, 27 bore a live child, and 6 miscarried. Most of the women in this study had breast-conserving surgery. Only 6% of the group took tamoxifen. Proportional hazards regression analysis showed that subsequent pregnancy was associated with improved overall survival. The hazard ratio (HR) was 0.59, with a 95% confidence interval (CI) of 0.37-0.95. Overall survival improved in women who waited at least 2 years to conceive (HR, 0.48; 95% CI, 0.27-0.83). A protective effect also was suggested in women waiting at least 6 months to conceive, but it was not statistically significant. These findings do not support a policy of recommending that premenopausal women with a diagnosis of breast cancer—at least those with localized disease and a good prognosis—wait two years before attempting to conceive a child. Such a recommendation may be appropriate for women receiving treatment and those having systemic disease at the time of diagnosis.
<urn:uuid:5383f7e6-856f-43cf-9e51-20f1f46b34b3>
CC-MAIN-2016-26
http://journals.lww.com/obgynsurvey/Abstract/2007/06000/Pregnancy_After_Breast_Cancer__Population_Based.7.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397744.64/warc/CC-MAIN-20160624154957-00156-ip-10-164-35-72.ec2.internal.warc.gz
en
0.972358
377
2.515625
3
October 17, 2012 Coercion, manipulation, ballot stuffing—how do we know when election fraud affects political outcomes? As part of our series profiling issues that affect American voters, LSA Professor of Political Science Walter Mebane outlines the factors that provoke election fraud. From correctly counting votes to accurately representing intentions, learn what political scientists look for to determine whether election outcomes are legitimate. See more from our series profiling political issues that affect American voters: Video production by Rob Hess and Natalie Condon.
<urn:uuid:8e82fef0-ba8e-42ea-9eb3-4a16a4159ed4>
CC-MAIN-2016-26
http://www.lsa.umich.edu/lsa/ci.badpolitics_ci.detail
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783408840.13/warc/CC-MAIN-20160624155008-00014-ip-10-164-35-72.ec2.internal.warc.gz
en
0.906342
103
2.546875
3
The adoption of the quantitative methods in Political Science has taught one tiling to the students of Political Science, viz., the language of variables. It is something which they did not know or practice before the “behavioural revolution” of 1950’s, because Political Science was then a traditional, legal and institutional study. By a variable we mean any trait, quality, characteristic, or condition which can vary in magnitude in different individual cases, e.g. the opinion of the party voters or the changes in public opinion. One of the essential features of a variable is that it can be measured or quantified. For example, it can be computed that a certain number of voters favour one political party, while another number of them favour another party and so on. Moreover, on the basis of variables, if is possible to form a hypothesis which can be substantiated or proved by further data collection by survey and analysis and the future trends can be predicted. In short, these developments in Political Science have made it a more exact social science than ever before. To conclude, the sciences of statistics, psychology and sociology and the application of quantitative methods to political data will enhance still more the claims of Political Science to be considered as an empirical science. A number of political acts behaviour and processes are statistical in nature, e.g. voting. Now, if a large number of facts are collected and studied with the aid of these methods and techniques, if the area from which these facts are gathered is wide and great care is taken in analysing them in relation to their environment, there would be greater-possibility that the conclusions and generalisations would be more precise, exact and valid than otherwise. “We can become, “writes Dr. Finer, “the prophets of the probable, if not the seers of the certain.” Science is measurement. The more the methods and techniques of measuring and quantifying the political events, processes and phenomena are developed, the more Political Science will become scientific and predictive. As Maurice Duverger puts it: “Politics is much more scientific in 1964 than was in 1870. Statesmen can and do effectively use statistics, manipulation of the masses and so on. However, we now know that the area covered by this scientific kind of politics is much smaller than that of politics as an art, based upon imprecise materia] that is not measurable but is intuitive and irrational”. The purpose of Political Science is to show why and how the politicians, Statesmen and citizens act in given situations but not to make choices for them in actual situations, which is the function of the art of politics. “It can make clear the real terms of choice, but it cannot choose”.
<urn:uuid:cbdd095a-9afa-4b8b-af53-373b5bc5743b>
CC-MAIN-2016-26
http://www.awamipolitics.com/the-language-of-variables-in-political-science-6920.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396029.85/warc/CC-MAIN-20160624154956-00148-ip-10-164-35-72.ec2.internal.warc.gz
en
0.953437
561
2.984375
3
The US Federal Bureau of Investigation is warning that a computer virus is being spread via e-mails that purport to be from the FBI. The FBI is investigating the e-mails The e-mails show that they have come from an fbi.gov address and tell recipients that they have accessed illegal websites. The messages warn that their internet use has been monitored by the FBI's Internet Fraud Complaint Center. An attachment in the e-mail contains the virus, the FBI said. The message asks recipients to click on the attachment and answer some questions about their internet use. But rather than being a questionnaire, the attachment contains a virus that infects the recipient's computer, according to the agency. It is not clear what the virus does once it has infected a computer. Users are warned never to open attachment from unsolicited e-mails or from people they do not know. STAYING SAFE ONLINE Install anti-virus software Keep your anti-virus software up to date Install a personal firewall Use Windows updates to patch security holes Do not open e-mail messages that look suspicious Do not click on e-mail attachments you were not expecting "Recipients of this or similar solicitations should know that the FBI does not engage in the practice of sending unsolicited e-mails to the public in this manner," the FBI said in a statement. The bureau is investigating the phoney e-mails. The agency earlier this month shut down fbi.gov accounts, used to communicate with the public, because of a security breach. A spokeswoman said the two incidents appear to be unrelated.
<urn:uuid:235beeee-8494-4841-a490-cf9867b2e016>
CC-MAIN-2016-26
http://news.bbc.co.uk/2/hi/technology/4293583.stm
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783394605.61/warc/CC-MAIN-20160624154954-00004-ip-10-164-35-72.ec2.internal.warc.gz
en
0.934351
341
2.640625
3
Traditional investment means first taking a risk to reap a reward later. The beauty of climate action is that the reward comes first and future risk is reduced. This can be especially true in Africa where ministers meet in mid-April for a special high-level event of the 7th Africa Carbon Forum. Renewable energy and smart grids, energy efficiency, cutting pollution and climate-proofing infrastructure, homes and industry have immediate benefits to government, business and citizens: cutting costs, improving health, protecting livelihoods and investments and generating new green jobs. Indeed the solutions to climate change offer a portfolio of no-regret policies and actions that are essential to achieve sustainable development and avoid the worst climate change. Africa would lose more than most from unchecked climate change but it will benefit more than most from strong climate agreements and effective action. This is a key time for Africa, with its rising economic potential and young, growing populations vulnerable to climate change to seize all the rising opportunities emerging in 2015. Access to electricity is crucial to development yet the International Energy Agency calculates that two-thirds of people in sub-Saharan Africa, more than 620 million of them, are without electricity. Nearly 730 million people still rely on cooking with wood and charcoal, harming health and destroying vital forest cover. Countries are already responding with ambitious plans, including one that was among many inspiring outcomes from the UN Secretary-General's Climate Summit last September. A total of 19 African countries have endorsed a plan for an Africa Clean Energy Corridor to speed deployment and trade of renewable power in a continuous network from Egypt to South Africa with support emerging from proposals including the Africa 2020 Access to Renewables Initiative. Success means that half of electricity in East and Southern Africa could come from renewables by 2030, up from a fifth today. Many countries in Africa recognize the threats but also the opportunities. When I spoke with African ministers in Cairo, in March, at their environment conference my confidence grew that Africa can leverage two critical events this year to do just that. First, governments will reach a new, universal climate change agreement in Paris in December under the UN Framework Convention on Climate Change. Climate science shows that Paris must deliver a three-part trajectory to keep average global temperatures from rising dangerously beyond 2 degrees Celsius: peak global emissions in the next decade; trigger a deep de-carbonization of all economies and reach climate neutrality in the second half of the century at the latest. Climate neutrality is when ecosystems or technology absorb all remaining human greenhouse gas emissions. Second, ahead of Paris, governments will submit their contributions to the agreement in the form of national climate plans, known as Intended Nationally Determined Contributions (INDCs). These offer developing nations a fresh chance to set out their own priorities for climate action in the context of sustainable development and in support of the Sustainable Development Goals. Clearly finance, both public and private and from within but crucially outside Africa will be key to realize the region's ambitions and protect the most vulnerable. Progress is being made. The Green Climate Fund hit its initial capitalization of over 10 billion dollars. The Global Environment Facility, Adaptation Fund and the multilateral development banks all offer climate financing. The African Development Bank recently released a strategy to promote high quality green growth in Africa taking into account risks and opportunity for action, including climate change. It is also fitting that the ministers in Marrakesh meet to discuss and plan their INDCs at a forum dedicated to finance, carbon markets and mechanisms such as the Kyoto Protocol's Clean Development Mechanism (CDM). The CDM has spurred the registration of nearly 7,900 projects and programs in over 100 countries, removing the equivalent of 1.5 billion tonnes of carbon dioxide from the atmosphere and mobilizing billions of dollars of investment. The CDM also leverages private sector investment up to 10 times the amount of public funds allocated. Another powerful tool under the UN Climate Convention that developing countries can use is something called a NAMA (Nationally Appropriate Mitigation Action). These plans range from local actions to broad national policy initiatives and are based on a country's specific needs and characteristics. The UN Development Program found that over 60 per cent of countries it surveyed will prepare their national climate plans ahead of Paris by building on their NAMAs. As African countries consider their national climate plans and help the world toward a successful conclusion in Paris, I encourage them to consider how to make best use of existing finance and mechanisms and to push forward with new and innovative policies. The Africa Carbon Forum offers an opportunity for countries across the region to take forward their ambitions for Paris upon which a lasting, sustainable century can be built.
<urn:uuid:c2de5137-fea9-4479-aae8-a4cca2524855>
CC-MAIN-2016-26
http://www.huffingtonpost.co.uk/christiana-figueres/a-paris-climate-agreement_b_7031904.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783394414.43/warc/CC-MAIN-20160624154954-00176-ip-10-164-35-72.ec2.internal.warc.gz
en
0.938905
952
2.703125
3
Also known as the mountain jungle, Tucuman- Bolivian jungle or just “el monte” to its inhabitants, Las Yungas covers the eastern side of the sub-Andean mountains, Pampean mountains and Andean foothills of the Argentinean provinces of Jujuy, Salta, Tucuman and Catamarca. Despite representing only 2% of the national territory, it consists of the richest environments in terms of variety of species and natural resources, along with the Misiones jungle. Together they are home to around 50% of Argentina’s biodiversity. However, in the last 50 years, human activities have resulted in the transformation and disappearance of large wooded areas. Huge environmental problems exist caused by forest degradation (due to overexplotation), foothill jungle land being converted for factory farming, fires, loss of habitat for transportation projects, etc. Sound recorded at night in October of 2013, in Parque Nacional Calilegüa (Calilegüa National Park). The park is located in the Las Yungas region of northeastern Jujuy. Arasy is the moon goddess in the Guarani culture, which is the predominant ethnic group in the area. 01 Track (30′30″) Field Recording Series by Gruenrekorder Gruenrekorder / Germany / 2014 / GrDl 151 / LC 09488 Birkut | Tiny Mix Tapes El Coro de Arasy is a single-track field recording captured at night in Parque Nacional Calilegua, Argentina. It’s a bold and political work that separates varying degrees of distance between the recording equipment and the furthest inflection of natural resonance. Each layer assumes a rich and diverse sonic tapestry while illustrating the imminent threat that lingers at the edge of what can be heard. By distilling the interplay between sub-Andean biodiversity and its discreet eradication, Juan Manuel Castrillo’s track triggers three interwoven responses, which can be identified in the following ways: 1. Threat: a sense of impending doom that’s clear in the otherwise anonymous collective tone of Castrillo’s cast. 2. Immediacy: as caused by subtle movements and their proximity to Castrillo’s equipment. 3. Sorrow: a consequence of the mechanical, motorized sounds that encircle the subject. There is a fascinating rhythm to be found in the fractured hum that washes over this otherwise dense and elaborate landscape. It’s near impossible to identify the source of the croaks, groans, ticks, swills, and pulses that carve their way about the fiery static of evening air, but they seem confounded by an apparent feeling of distress, at least to begin with. They do not flare or rise at the sign of a motorized vehicle, but they continue in their constant bombardment of secret language, of calls and of reflexes that will remain forever unknown. And yet, through their consistency, there is enough to recognize patterns — or regular occurrences — that bridge a geographical divide between the location and the audience. Without warning, something will break under the weight of a moving body. The effect is minor, but Castrillo positions his equipment in a way that makes it identifiable. It disturbs the flow caused by his natural subject, but it doesn’t break its pace, at least not in a way that’s noticeable. Castrillo has been scrupulous in forging this connect, this sense of immediacy between those who are listening and the moment in which he is recording. It gives us, the audience, ideas of proximity, as to just how distant the furthest creatures are and how close our curator is to the most immediate living entity. In achieving this, Castrillo brings us into the framework of his project; we are no longer a passive audience drenched in exotic fuzz, but participants in the work and witnesses to its careful and precise unveiling. When introducing the release, Castrillo discusses forest degradation. He talks about “jungle land being converted for factory farming,” as well as other damage — “fires, loss of habitat for transportation projects etc.” It’s the lack of a distinct reaction from his subject that conjures a feeling of deep sorrow when anything “unnatural” can be depicted here. The source of constant drone responsible for broadcasting that natural sound is unperturbed by a vehicle that patrols nearby. It’s apparent throughout the track — starting out in the left speaker and working its way around to the right, as though surrounding our natural species entirely. There is no distinguishable reaction — the reaction may well be there, but it doesn’t come in a form that would alter our instinctive perception — and this gives the impression that either the wildlife (the jungle as a singular, living entity) is on edge and in a constant state of alarm, or that this mechanical sound is all too familiar and any reaction we might expect is unjustified. Either way, the motion Castrillo captures through this brief snapshot ignites a feeling of anguish, regardless of our understanding. El Coro de Arasy is an unsettling listen, but it carries the weight of an artefact both personal and affecting. As a consequence of Castillo’s well-crafted narrative, he brings a sense of expectation to the piece before eradicating any preconceived notion as to what could happen next. It’s a dramatic work that’s bolstered by both the resilience of his subject and the peril it faces, which comes amplified through a coarse and gritty stampede of sound that was captured during a single evening on “el monte.” Łukasz Komła | polyphonia.pl Nowości płytowe z Gruenrekorder Właśnie ukazały się cztery nowe albumy w wersji cyfrowej w katalogu oficyny Gruenrekorder. Niemiecka wytwórnia Gruenrekorder to bez wątpienia jeden z najciekawszych europejskich labeli. Wiosną tego roku opisywałem na łamach Polyphonii krążek opublikowany przez Gruenrekorder, a był to album „Mosaïque Mosaic” duetu Christina Kubisch & Eckehard Güther. W ostatnich dniach pojawiły się cztery nowe pozycje, które gorąco polecam. […] Juan Manuel Castrillo | El Coro de Arasy Juan Manuel Castrillo zabiera nas do samego serca argentyńskiej dżungli usytuowanej w prowincjach Tucumán, Jujuy, Salta czy Catamarca. Te obszary stanowią zaledwie 2% terytorium całego kraju i należą do najbogatszych pod względem różnorodności gatunków zwierząt. Jednak w ciągu ostatnich 50 lat działalność człowieka doprowadziła do zaniku w dużej mierze tych obszarów leśnych.
<urn:uuid:43a4203e-bc49-4179-9626-ee8e4a96f786>
CC-MAIN-2016-26
http://www.gruenrekorder.de/?page_id=12593
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395613.65/warc/CC-MAIN-20160624154955-00056-ip-10-164-35-72.ec2.internal.warc.gz
en
0.843945
1,615
2.90625
3
The toadflax plant, Linaria vulgaris, normally produces asymmetrical flowers, but occasionally a mutant form grows symmetrical flowers, with identical upper and lower petals. When the great 18th-century Swedish botanist Carolus Linnaeus discovered the mutant flower in 1742, he thought it must be a new species, even though the rest of the plant was identical to typical toadflax. Linnaeus called the flower Peloria, Greek for "monster", not because it was ugly but because it had monstrous implications for the belief in the immutability of species. "This is certainly no less remarkable than if a cow were to give birth to a calf with a wolf's head," he wrote. Enrico Coen and his student Pilar Cubas, of the John Innes Centre in Norwich, have found the genetic explanation. The Lcyc gene changes as a result of having extra organic substances called methyl groups added to its chemical structure, according to research published in the journal Nature. It results in structural changes in the way the flower develops. Linnaeus, the founding father of the binomial system of biological classification, concluded that the mutant flower must have resulted from some sort of transformation of the common toadflax into a new species. Professor Coen said: "This is the first time that a natural modification of this kind has been found to be inherited, suggesting that this kind of change may be more important for natural genetic variation and evolution than has previously been suspected." "It provides a molecular understanding of what people have been doing for a long time about flowers, by taking them from nature and propagating them in their garden. "It shows that many of the flowers grown in gardens result from specific changes to the genes in the wild," he added.Reuse content
<urn:uuid:18d5ef70-b4e0-4ea4-8db0-2fb2c804c736>
CC-MAIN-2016-26
http://www.independent.co.uk/news/mystery-of-mutant-toadflax-solved-at-last-1117362.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783408840.13/warc/CC-MAIN-20160624155008-00186-ip-10-164-35-72.ec2.internal.warc.gz
en
0.961677
376
3.921875
4
DOCTOR'S VIEWS ARCHIVE For example, many people are intolerant of lactose, the sugar in milk. In some individuals, even small amounts of milk can cause symptoms that mimic irritable bowel syndrome. Therefore, testing for lactose intolerance or a trial of strict elimination of lactose from the diet may be necessary in patients in whom a diagnosis of irritable bowel syndrome is being considered. Individuals also may be intolerant of sucrose and may develop symptoms (diarrhea and cramps) that can mimic irritable bowel syndrome when they drink beverages like sodas that are sweetened with corn syrup which is high in sucrose. Sorbitol is another example of a sweetener used in reduced calorie foods, for example, sugar-free chewing gum. It also is used in prepared foods and for diabetics. Intolerance to sorbitol may cause irritable bowel-like symptoms as well.
<urn:uuid:8900d1b1-f438-4da0-9149-18b5b1e4d5a5>
CC-MAIN-2016-26
http://www.medicinenet.com/script/main/art.asp?articlekey=13630
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395160.19/warc/CC-MAIN-20160624154955-00006-ip-10-164-35-72.ec2.internal.warc.gz
en
0.920245
191
3
3
Illustrations of Masonry, by William Morgan, , at sacred-texts.com "What does a Master's lodge represent?" Ans. "The Sanctum Sanctorum, or holy of holies of King Solomon's Temple." "How long was the temple building?" Ans. Seven years, during which it rained not in the day-time, that the workmen might not be obstructed in their labor." "What supported the temple." Ans. "Fourteen hundred and fifty-three columns and two thousand nine hundred and six pilasters, all hewn from the finest Parian marble." "What further supported it?" Ans. "Three grand columns, or pillars." "What were they called?" Ans. "Wisdom, strength and beauty." "What did they represent?" Ans. "The pillar of wisdom represented Solomon, King of Israel, whose wisdom contrived the mighty fabric; the pillar of strength, Hiram, King of Tyre, who strengthened Solomon in his glorious undertaking; the pillar of beauty, Hiram Abiff, the widow's son, whose cunning craft and curious workmanship beautified and adorned the temple." "How many were there employed in the building of King Solomon's Temple?" Ans. "Three Grand Masters, three thousand three hundred Masters, or overseers of the work, eighty thousand Fellow Crafts, and seventy thousand Entered Apprentices; all those were classed and arranged in such a manner by the wisdom of Solomon that neither envy, discord nor confusion were suffered to interrupt that universal peace and tranquillity that pervaded the work at that important period." "How many constitutes an Entered Apprentice lodge?" Ans. "Seven; one Master and six Entered Apprentices." "Where did they usually meet?" Ans. "On the ground floor of King Solomon's Temple." "How many constitute a Fellow Craft's lodge?" Ans. "Five; two Masters and three Fellow Crafts." "Where did they usually meet?" Ans. "In the middle chamber of King Solomon's Temple." "How many constitute a Master's lodge?" Ans. "Three Master Masons." "Where did they usually meet?" Ans. "In the Sanctum Sanctorum, or holy of holies of King Solomon's Temple." "Have you any emblems on this degree?" Ans. "We have several, which are divided into two classes." "What are the first class?" Ans. "The pot of incense, the bee-hive, the book of constitutions, guarded by the Tyler's sword, the sword pointing to a naked heart, the all-seeing eye, the anchor and ark, the forty-seventh problem of Euclid, the hour-glass, the scythe, and the three steps usually delineated on the Master's carpet, which are thus explained: The pot of incense is an emblem of a pure heart, which is always an acceptable sacrifice to the Deity and, as this glows with fervent heat, so should our hearts continually glow with gratitude to the great and beneficent Author of our existence for the manifold blessings and comforts we enjoy. The bee-hive is an emblem of industry, and recommends the practice of that virtue to all created beings, from the highest seraph in heaven to the lowest reptile of the dust. It teaches us that, as we came into the world rational and intelligent beings, so we should ever be industrious ones, never sitting down contented while our fellow-creatures around us are in want, when it is in our power to relieve them without inconvenience to ourselves. When we take a survey of nature, we behold man, in his infancy, more helpless and indigent than the brute creation; he lies languishing for days, weeks, months and years, totally incapable of providing sustenance for himself; of guarding against the attacks of the wild beasts of the field, or sheltering himself from the inclemencies of the weather. It might have pleased the great Creator of heaven and earth to have made man independent of all other beings, but, as dependence is one of the strongest bonds of society, mankind were made dependent on each other for protection and security, as they thereby enjoy better opportunities of fulfilling the duties of reciprocal love and friendship. Thus was man formed for social and active life, the noblest part of the work of God, and he that will so demean himself, as not to be endeavoring to add to the common stock of knowledge and understanding, may be deemed a drone in the hive of nature, a useless member of society, and unworthy of our protection as Masons. The book of constitutions, guarded by the Tyler's sword, reminds us that we should be ever watchful and guarded in our thoughts, words, and actions, particularly when before the enemies of Masonry, ever bearing in remembrance those truly Masonic virtues, silence and circumspection. The sword pointing to a naked heart, demonstrates that justice will sooner or later overtake us; and although our thoughts, words and actions may be hidden from the eye of man yet that all-seeing eye, whom the sun, moon and stars obey, and under whose watchful care even comets perform their stupendous revolutions, pervades the inmost recesses of the human heart, and will reward us according to our merits. The anchor and ark, are emblems of a well grounded hope and a well spent life. They are emblematical of that Divine ark which safely wafts us over this tempestuous sea of troubles, and that anchor which shall safely moor us in a peaceful harbor, where the wicked cease from troubling, and the weary shall find rest. The forty-seventh problem of Euclid: This was an invention of our ancient friend and brother, the great Pythagoras, who, in his travels through Asia, Africa and Europe, was initiated into several orders of priesthood, and raised to the sublime degree of a Master Mason. This wise philosopher enriched his mind abundantly in a general knowledge of things, and more especially in Geometry, or Masonry, on this subject he drew out many problems and theorems; and among the most distinguished he erected this, which, in the joy of his heart, he called Eureka, in the Grecian language signifying, I have found it; and upon the discovery of which he is said to have sacrificed a hecatomb. It teaches Masons to be general lovers of the arts and sciences. The hour glass is an emblem of human life. Behold! how swiftly the sands run, and how rapidly our lives are drawing to a close. We cannot without astonishment behold the little particles which are contained in this machine; how they pass away, almost imperceptibly, and yet to our surprise in a short space of an hour they are all exhausted. Thus wastes man! To-day, he puts forth the tender leaves of hope; to-morrow, blossoms, and bears his blushing honors thick upon him; the next day comes a frost, which nips the root, and when he thinks his greatness is still ripening, he falls like autumn leaves, to enrich our mother earth. The scythe is an emblem of time, which cuts the brittle thread of life, and launches us into eternity. Behold! what havoc the scythe of time makes among the human race; if by chance we should escape the numerous evils, incident to childhood and youth, and with health and vigor come to the years of manhood, yet withal we must soon be cut down by the all-devouring scythe of time, and be gathered into the land where our fathers have gone before us. The three steps usually delineated upon the Masters carpet, are emblematical of the three principal stages of human life, viz.: youth, manhood and age. In youth, as Entered Apprentices, we ought industriously to occupy our minds in the attainment of useful knowledge; in manhood, as Fellow Craft, we should apply our knowledge to the discharge of our respective duties to God, our neighbors, and ourselves, that so in age, as Master Mason, we may enjoy the happy reflections consequent on a well spent life, and die in the hope of a glorious immortality. "What are the second class of emblems?" Ans. "The spade, coffin, death-head, marrow-bones, and sprig of cassia, which are thus explained: The spade opens the vault to receive our bodies where our active limbs will soon moulder to dust. The coffin, death-head, and marrowbones, are emblematical of the death and burial, of our Grand Master, Hiram Abiff, and are worthy of our serious attention. The sprig of cassia is emblematical of that important part of man which never dies—and when the cold winter of death shall have passed, and the bright summer's morn of the resurrection appears, the Son of Righteousness shall descend, and send forth his angels to collect our ransomed dust; then, if we are found worthy, by his pass word, we shall enter into the celestial lodge above, where the Supreme Architect of the Universe presides, where we. shall see the King in the beauty of holiness and with him enter into an endless eternity. Here ends the three first degrees of Masonry, which constitute a Master Mason's Lodge. A Master Mason's Lodge and a chapter of Royal Arch Masons, are two distinct bodies, wholly independent of each other. The members of a Chapter are privileged to visit all Master Mason's Lodges when they please, and may be, and often are members of both at the same time; and all the members of a Master Mason's Lodge, who are Royal Arch Masons, though not members of any Chapter, may visit any Chapter. I wish the reader to understand that neither all Royal Arch Masons nor Master Masons are members of either Lodge or Chapter; there are tens of thousands who are not members and scarcely ever attend, although privileged to do so. A very small proportion of Masons, comparatively speaking, ever advance any further than the third degree, and consequently never get the great word which was lost by Hiram's untimely death. Solomon, king of Israel; Hiram, king of Tyre, and Hiram Abiff; the widow's son having sworn that they nor neither of them would ever give the word except they three were present; [and it is generally believed that there was not another person in the world at that time that had it], consequently the word was lost, and supposed to be forever; but the sequel will show it was found after the lapse of four hundred and seventy years; notwithstanding the word Mah-hah-bone, which was substituted, by Solomon, still continues to be used by Master Masons, arid no doubt will be as long as Masonry attracts the attention of men; and the word which was lost is used in the Royal Arch degree. What was the word of the Royal Arch degree before they found the Master's word which was lost at the death of Hiram Abiff, and was not found for four hundred and seventy years? Were there any Royal Arch Masons before the Master's word was found? I wish some Masonic gentleman would solve these two questions. The ceremonies, history, and the lecture, in the preceding degree, are so similar, that perhaps, some one of the three might have been dispensed with, and the subject well understood by most readers, notwithstanding, there is a small difference between the work and history, and between the history and the lecture. I shall now proceed with the Mark Master's degree, which is the first degree in the Chapter. The Mark Master's degree, the Past Master's, and the Most Excellent Master's are called lodges of Mark Master Masons, Past Masters, and Most Excellent Masters; yet, although called lodges, they are a component part of the Chapter. Ask a Mark Master Mason if he belongs to the Chapter, he will tell you he does, but that he has only been marked. It is not an uncommon thing, by any means, for a Chapter to confer all four of the degrees in one night, viz.: The Mark Master, Past Master, Most Excellent Matter, and Royal Arch degree.
<urn:uuid:8432ff01-760d-4c1a-a3e4-b8cf5345b284>
CC-MAIN-2016-26
http://sacred-texts.com/mas/morgan/morg15.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783403508.34/warc/CC-MAIN-20160624155003-00161-ip-10-164-35-72.ec2.internal.warc.gz
en
0.963485
2,575
3.234375
3
- Brussels sprouts plants - garden shovel - sharp knife Step 1: Plant the Sprouts Firm the soil around new plants to help support the tall stems as they grow. Attach plant collars to protect against cabbage root fly. Step 2: Add Support Support the plants as they grow by earthing up with soil. In more exposed areas, insert canes or stakes to prevent plants from being rocked by the wind. Step 3: Harvest the Sprouts Use a sharp knife to harvest the sprouts, or twist them off with your fingers. Cut sprouts soon spoil, so only harvest when needed. Cut stems last several days. 0 Comments About this How To Its petal-like leaves not only make the artichoke a delicious, but beautiful, garden vegetable.
<urn:uuid:b79d45ae-7a7b-4588-bd27-f1afe814474d>
CC-MAIN-2016-26
http://www.hgtvgardens.com/vegetables/growing-brussels-sprouts
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397636.15/warc/CC-MAIN-20160624154957-00184-ip-10-164-35-72.ec2.internal.warc.gz
en
0.920668
166
2.828125
3
Newly Identified Strains Of Chlamydia Trachomatis Could Produce New Diseases A new study led by a scientist at Children's Hospital Oakland Research Institute (CHORI) is the first to conclude that Chlamydia trachomatis is evolving at a rate faster than scientists first thought or imagined. Chlamydia trachomatis is a bacterium that is the leading cause of sexually transmitted diseases and the second leading cause of blindness worldwide. Scientists believe the bacterium is evolving through a process called recombination where genes from one or more strains combine to create new strains and -- theoretically -- new diseases. The study is featured in the November issue of Genome Research and was led by Dr. Deborah Dean MD, MPH, senior scientist at Children's Hospital Oakland Research Institute (CHORI). Her research suggests that since Chlamydia trachomatis evolves through recombination where one or more strains combine, the traditional method of studying a single gene to track the transmission of the bacterium is wrong. "What we found is an organism that not only evolves rapidly, but in ways that we thought were rare. We also discovered that this organism can customize its attack," said Dr. Dean. "Consequently, the constant flux of the bacterium could serve as a gateway for new emerging diseases, but more research needs to be conducted to understand if and how this is happening." 600 million people are infected across the globe with Chlamydia trachomatis and 8 million are already blind or severely visually impaired. In some parts of third-world countries, more than 90% of the population is infected. Chlamydia trachomatis has a variety of strains; different strains are responsible for different diseases. Some strains cause sexually transmitted diseases while others cause eye infections. Blinding trachoma is caused by repeated eye infections that cause scarring, which result in the eyelashes turning in-wards. Bacterial infection develops as the eyelashes scratch the surface of the eye, which eventually heals by scarring, resulting in blindness. Previously, the organism was identified using a single gene, ompA, and the protein encoded by that gene, MOMP. In this study, the clinical strains, which are samples of Chlamydia trachomatis currently responsible for human disease today, were compared to standard reference strains that have been laboratory adapted over the last few decades. By studying multiple strains, the researchers discovered that the strains that were identified as the same strain were actually different. The next step will be to study clinical strains in comparison with laboratory reference strains to decipher exactly how different strains cause disease and whether new diseases are emerging as a result of the emergence of new strains. "Large-scale comparative genomics will be necessary to understand the precise mechanisms underlying Chlamydia trachomatis recombination and how other species of chamydiae may evolve and transfer from animals to humans." Source: Children's Hospital & Research Center at Oakland. December 2006. rating: 0.00 from 0 votes | updated on: 24 Aug 2007 | views: 988 |
<urn:uuid:1804ce44-fbb1-4880-99a8-310ef7e6384c>
CC-MAIN-2016-26
http://www.biology-online.org/articles/newly_identified_strains_chlamydia.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399117.38/warc/CC-MAIN-20160624154959-00084-ip-10-164-35-72.ec2.internal.warc.gz
en
0.959565
628
3.390625
3
Abraham Lincoln (18091865). Political Debates Between Lincoln and Douglas 1897. and patriots of that day, it was composed of Free States and Slave States, bound together by one common Constitution. We have existed and prospered from that day to this thus divided, and have increased with a rapidity never before equaled, in wealth, the extension of territory, and all the elements of power and greatness, until we have become the first nation on the face of the globe. Why can we not thus continue to prosper? We can, if we will live up to and execute the Government upon those principles upon which our fathers established it. During the whole period of our existence, Divine Providence has smiled upon us, and showered upon our nation richer and more abundant blessings than have ever been conferred upon any other. FELLOW-CITIZENS: It follows as a matter of course that a half-hour answer to a speech of an hour and a half can be but a very hurried one. I shall only be able to touch upon a few of the points suggested by Judge Douglas, and give them a brief attention, while I shall have to totally omit others for the want of time. Judge Douglas has said to you that he has not been able to get from me an answer to the question whether I am in favor of negro citizenship. So far as I know, the Judge never asked me the question before. He shall have no occasion to ever ask it again, for I tell him very frankly that I am not in favor of negro citizenship. This furnishes me an occasion for saying a few words upon the subject. I mentioned, in a certain speech of mine which has been printed, that the Supreme Court had decided that a negro could not possibly be made a citizen; and without saying what was my ground of complaint in regard to that, or whether I had any ground of complaint, Judge Douglas has from that thing manufactured nearly everything that he ever says about my disposition to produce an equality between the negroes and the white people. If anyone will read my speech, he will find I mentioned that as one of the points decided in the course of the Supreme Court opinions, but I did not state
<urn:uuid:b2315619-24b2-49d4-858b-c1f7046b6849>
CC-MAIN-2016-26
http://www.bartleby.com/251/pages/page288.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393463.1/warc/CC-MAIN-20160624154953-00179-ip-10-164-35-72.ec2.internal.warc.gz
en
0.978417
450
2.875
3
An entrenching tool ( e-tool for short) is a compact digging tool which is a good thing to have in your backpack. It can be used for a variety of purposes, -digging a toilet pit, digging a shallow trench around your tent to channel off rain water, digging for roots, mundane construction projects or to shovel soil onto the remnants of your camp fire to keep it from flaring up after you’ve left. The entrenching tool however has its origins in the military and is used for digging foxholes, latrine pits and probably for burying the dead as well. I’m sure it has more uses than what I’ve listed here. Some of these e-tools have their edges sharpened or serrated to be used as field expedient weapons or as a cutting/chopping tool for small branches. Cold Steel makes a variant of the shovel allegedly used by the Russian Spetsnaz. This could be/was used with deadly accuracy for throwing at people or probably for hunting for food in survival situations as well. Searching for an entrenching tool should give you a lot of hits, from militaria to production models. Among the lot, the Gerber Gorge, Cold Steel, the NATO e-tool and the Glock e-tool, I chose the latter. Among these available models, the two variants are the shovels with a wooden handle (or shovels which don’t fold) and the folding shovels. Some of them have a pick as well which has its own uses. For e.g. a pick is better suited for digging up tubers. The Glock unlike the others has a telescopic folding handle and a saw which narrowed down the choices for me. Of course there was also the Glock name and it would become my only “made in Austria” piece of equipment. The added advantage was that the shovel blade locks in three different positions which enables it to work either as a spade, a shovel or a hoe [ See the second photo from the top]. I had read somewhere that someone had a problem with dirt interfering in the locking mechanism of the e-tool. I had no such problem. It held well as I dug with it. Maybe the polymer handle helps as it slips when you put too much pressure on it, especially when your hands are wet. The locking mechanism on the handle is simple too. You pull out the telescopic handle, and holding the part of the handle attached to the blade still, turn the telescopic part of the handle counter clockwise till it can turn no more. Turn it clockwise and it unlocks and can then be pushed and shortened. It fits in sturdily and without any wiggle or wobble. However I did not get a chance to put it to the test. I will do so at the next opportunity and post the results. The saw has staggered teeth which is important in creating the right clearance for the saw when cutting through wood. I have no doubts whatsoever that it can cut through bone too! - Very high build quality - Innovative 3 in one design, can be used as a spade, a shovel or a hoe - I like the telescopic design more than the other folding shovels available on the market - Integrated saw blade - Compact to carry - Relatively slippery handle, if you have blood or other slimy stuff on your hand, you can forget about using this tool. Maybe the same can be said about shovels with wooden handles? - If the locking knob or handle locking system fails in the field, it is going to be more or less useless, unlike the non folding shovels for which you can fashion a new handle. - Susceptible to heat damage, if you leave it near a fire or if it catches fire for some reason, you can kiss it goodbye. I don’t think it can be used to shovel coals onto the lid of a pot for baking or browning either. All said and done, I like this babe and I highly recommend it. I might buy the cold steel version for my bug out bag though, as it is good to have tools which can be repaired or weaponized in the field if required. I’ll use this baby for regular backpacking and camping though. This post has been read 902 times 🙂
<urn:uuid:f89c5288-9e84-4194-931d-4cb7f31e5034>
CC-MAIN-2016-26
http://www.simplysimple.info/review-glock-entrenching-tool/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397865.91/warc/CC-MAIN-20160624154957-00086-ip-10-164-35-72.ec2.internal.warc.gz
en
0.957405
896
2.578125
3
Industries Natural Gas Storage The use of underground natural gas storage facilities is almost as old as the development of long distance transmission lines. The first high transmission lines began operations in 1891 with successful construction of two parallel 120-mile, 8-inch diameter lines from fields in northern Indiana to Chicago. The first successful gas storage project was completed in 1915 in Welland County, Ontario. The following year, operations began in the Zoar field (1916) near Buffalo, New York. Underground natural gas storage can be used to effectively balance a variable market with a nearly constant supply of natural gas provided by the Pipeline system. Storage fields (reservoir or reservoirs) are the warehouses that give a ready supply of natural gas that can serve a market with high peak demands in warm or cold weather. Generally, more natural gas is used during the winter because many homes are heated by natural gas. Therefore, natural gas is injected into storage fields during the summer (April - October), and withdrawn in the winter (November - March). However, recent increases in the amount of gas fired power generation have resulted in daily variances in the amount of natural gas being used. For more detailed information about natural gas storage, visit the following websites: - » EIA: Basics of Underground Natural Gas Storage - » NaturalGas.org: Storage of Natural Gas - » CH4: About Natural Gas – Geology - » The Energy Information Administration (EIA) - lists weekly reports on the state of natural gas storage. |« Back to Natural Gas Storage|
<urn:uuid:1cae64d9-e6ad-4f5e-8cba-49a567ca1f72>
CC-MAIN-2016-26
https://www.ferc.gov/industries/gas/indus-act/storage/background.asp
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783392069.78/warc/CC-MAIN-20160624154952-00196-ip-10-164-35-72.ec2.internal.warc.gz
en
0.926535
319
3.96875
4
Rev. Alban Butler (171173). Volume I: January. The Lives of the Saints. 1866. St. Lomer, or Laudomarus, Abbot IN his childhood he kept his fathers sheep, in which employment he macerated his body by regular fasts, and spent his time in studies and prayer, under the direction of a certain holy priest. Being afterwards, by compulsion, ordained priest, he was made canon and cellerer, (some moderns say provost,) of the church of Chartres. After some years he retired into a neighbouring forest. Mabillon thinks at the place where now stands Bellomer, a monastery of the order of Fontevrald. Many disciples being assembled near his hermitage, he removed with them into another desert, where he built the monastery of Corbion, (at present a priory called Moutier-au-Perche, six leagues from Chartres,) about the year 575. A wonderful spirit of prayer, and gift of miracles, rendered his name famous. He died on the 19th of January, in 593, at Chartres, in the house of the bishop, who had called him thither some time before. In the incursions of the Normans, his remains were removed from place to place, till they were lodged at Perly, in Auvergne. His head is now kept in the priory of Maissac, called St. Laumers, in Auvergne; the rest of his relics were removed to Blois, where an abbey was built which bears his name. See his anonymous life, written by one who knew him, in Bollandus and Mabillon, also Chatelain and the Paris Breviary.
<urn:uuid:a7061654-57f9-43b6-ac27-421e8ee49e6b>
CC-MAIN-2016-26
http://www.bartelby.com/210/1/196.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395166.84/warc/CC-MAIN-20160624154955-00022-ip-10-164-35-72.ec2.internal.warc.gz
en
0.98892
365
2.546875
3
How do you turn biting, stinging, pantry raiding, picnic ruining pests into pollinating, irrigating, aerating, fertilizing, ecosystem balancing helpers? … By educating as many people as possible about the role of bugs in the environment. One of the responsibilities of the U.S. Forest Service is to inform the public about the value of insects in helping to sustain the health, diversity and productivity of the nation’s forests and grasslands. With many people either afraid of or grossed out by bugs, changing their negative image is a challenge. However, a partnership between the Forest Service Southern Research Station and Kent House, in Alexandria, La., is demonstrating a growing public interest in insects. Read more »
<urn:uuid:1f183965-ec01-44a8-8041-e40d740b3a09>
CC-MAIN-2016-26
http://blogs.usda.gov/tag/alexandria/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396872.10/warc/CC-MAIN-20160624154956-00033-ip-10-164-35-72.ec2.internal.warc.gz
en
0.94438
148
3.078125
3
Garden Update: December 2, 2005 A flurry of planting since last month has brought a total of 313 gardens to the map. That gives us an additional 152 to watch when springtime comes to the Northern Hemisphere. Some of these gardens are located in warm climates and will be planted in 2006 after their refrigerated cold treatments. Tulip Garden Map Hurry and plant your garden so it will be on the final map published in the next Update Jan. 6. Your bulbs are settled seven inches underground, the temperature outside (on most parts of the continent) is dropping, and we're in the darkest time of year. What's going on underground? Invite students to ponder the conditions their bulbs might be experiencing. Then gather some materials and go outside to explore air and soil temperatures this this printable data sheet for recording your data. Act now if you are in a cold winter area where your soil freezes in early December. You’ll be ready to track temperatures as you track the coming of spring across the Seasonal Change in your Journey North Garden and print for a ready-made journal. Click and print this ready-made journal for keeping your notes and observations. Starting at planting time you can capture and reflect on observations, experiences, and data; add your opinions, theories, and predictions. Even collect the season’s Challenge Questions and you will have a complete record of your 2005-2006 tulip garden experience all in one book. Gustavus Students Defend their Planting Date: Answers to CQ #3 "What difference does it make whether you plant your tulips early or late in the fall? Is it going to be too late for the Gustavus, Alaska tulips to root before winter? Defend your answer." and planting dates in Alaska Students from Edgewood Elementary in Marysville, OH seem convinced and they have done some homework. Here’s what they think: not think it is too late for the Gustavus, Alaska tulips to root before winter for the following reasons. For instance the average temperature for November is above freezing. Also Gustavus has a warmer average November temperature than the other sites in Alaska. Furthermore Gustavus' ground will probably not freeze until mid December. That is why we do not think it is too late for Gustavus Alaska tulips to root before winter. “ We think that Sutton Alaska's tulips will emerge first, because they planted their tulips first. Also, because the average temperature is warmer than Palmer, Anchorage and Soldatna and is about one degree colder than Gustavus.” And now, word from Gustavus, AK students: Our soil temperatures in Gustavus Alaska (located on in Southeast Alaska) are much warmer than the other 4 tulip gardens that are located near Anchorage. In fact, our soil temperatures are about 20-30 degrees warmer than the other tulip gardens in Alaska. We just had our first significant snowfall this week, but the previous three weeks after planting our bulbs, it has been raining. We think our bulbs had time to root before winter. Our winters are not as harsh as the other sites and we think that spring will arrive sooner in Gustavus than in the tulip gardens further north in Alaska. Our soil will warm up sooner and we predict that our bulbs will emerge before the other Alaskan gardens. -the 1-5th grade science class at Gustavus School” Computer Lab Activity: Interactive Map Skills! Our interactive map allows us to take an event you are reporting (tulip planting, monarch sighting, etc.), automatically calculate its location (latitude and longitude) and display the information for anyone to use. This all happens within minutes. This is a terrific tool that you can use any time. It is a gathering place for real-life data. How well can you navigate around the map using all of its features? Use this step-by-step guide to learn some skills, then try a challenging game of hide on the Classrooms A quick glance at this week’s tulip garden map reveals gardens across the ocean on the European continent. View the gardens on our Interactive Map (click on Owl button to go there). Then gather your resources to answer the following questions about these gardens: - After locating the gardens, find the latitude and longitude of each garden. - Study the satellite map of the locations. Describe where each is located geographically (for example, think about land masses, surrounding water and proximity to the equator). - Where will spring arrive first? Predict which garden will bloom first. Defend your answering the questions try THIS! “ Find gardens in North America that you think will bloom at the same time as each European garden.” To respond to this question, please follow these instructions. The Next Tulip Garden Update Will be Posted on January 6, 2006. 1997-2005 Journey North. All Rights Reserved. Please send all questions, comments, and suggestions to our feedback form
<urn:uuid:cc5af4cb-9314-445f-b27c-d079b18504c4>
CC-MAIN-2016-26
http://www.learner.org/jnorth/tulip/fall2005/Update120205.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396875.58/warc/CC-MAIN-20160624154956-00006-ip-10-164-35-72.ec2.internal.warc.gz
en
0.89288
1,114
2.71875
3
Railroad Repairs Will Cut Water Flow in the Great Salt Lake The Union Pacific Railroad is planning to start repair work on its causeway across the Great Salt Lake. But it means closing off the culverts that allow water to pass between the north and south arms of the lake. The causeway was built in the 1950’s, cutting off much of the natural flow between the two arms of the lake. As a result, the north arm is much saltier and about a foot lower in elevation than the south arm. The culverts under the causeway have been sinking into the lake bed and creating a safety issue for the trains passing above. So the Army Corps of Engineers has issued an emergency permit to allow closing the culverts. Union Pacific officials have proposed a permanent solution, a 180-foot bridge near the middle of the lake to allow water to pass through. Jason Gipson, who heads the Corps’ regulatory branch in Utah, says the railroad will have to provide detailed studies of the water flow to get a permit for the bridge. “What we’re asking," Gipson tells KUER, "and have been asking, the railroad to do is show us what the effects of closing the two culverts and building that bridge are. Ideally, that bridge replicates the flows between the two arms of the lake as closely as possible.” The railroad also needs a permit from the Utah Division of Water Quality to go ahead with the work, but division director Walt Baker says that could be issued in a matter of days. Changes in the water flow could affect the biology of the lake, especially for brine shrimp. They support a large population of migratory birds and a multi-million dollar industry harvesting brine shrimp eggs. A 30-day public comment period on the bridge proposal begins on Friday.
<urn:uuid:44efe89b-134e-4074-bdc6-8dd5d682064a>
CC-MAIN-2016-26
http://kuer.org/post/railroad-repairs-will-cut-water-flow-great-salt-lake
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396106.25/warc/CC-MAIN-20160624154956-00071-ip-10-164-35-72.ec2.internal.warc.gz
en
0.966132
379
2.703125
3
There’s a milk revolution going on in supermarkets and it’s showing no sign of retreat. Where formerly we might have had a simple choice between cow milk and soy milk, with a few other niche products available in the bigger supermarkets, suddenly we’re facing a bewildering range: almond or macadamia milk? Cow, sheep, or goat? Coconut? Rice, oat or quinoa? First, let’s take a moment to reflect on the possible reasons for this phenomenon. The current interest in the Palaeolithic diet may certainly have something to do with it. Adherents seek alternatives to dairy and soy foods under the misconception that humans had entirely completed their evolutionary process before any use of these foods. They argue that this somehow means we are not “meant” to consume them. People with lactose intolerance have long avoided animal milks, which all contain lactose as their natural (but sometimes poorly absorbed) sugar. Environmental concerns are another possible reason people want to reduce their consumption of animal milks. Distrust of soy foods has also grown in recent years because of concerns about their hormonal effects, although there’s little evidence to support the idea they’re harmful. Nonetheless, people are looking further afield to find a suitable swap for cow’s milk if they have a dairy protein allergy or if they’re avoiding casein to help manage neurological conditions such as autism or dementia (as part of a diet that has been popular but controversial). Soy allergy is another reason people search for milk alternatives. The ranks of these searchers are boosted by the fact that plant-based and raw diets are on the increase. Not so good Unfortunately, unless they’re reading the packaging carefully, many consumers are probably being misled by the labelling of these alternative products as milk. What’s more, some are startlingly low on nutrition and, ironically, many are packed with additives despite their “natural” tag. Indeed, compared to animal milks, which usually contain only milk, a typical ingredients list for one of these alternative products might contain between ten and 18 different added substances. These include oils, thickening agents (starches, carrageenan, or vegetable gums), flavourings and syrup sweeteners, emulsifiers and added vitamins and minerals. And their main ingredient is water. The large amount of added water means that many of these products are quite dilute. Other than soy milk, none of the others have even a tenth of the protein in animal milks. If you adjust for the amount of added water by looking at their nutrition relative to calorie content (instead of just per 100 millilitres as most labels show), then some of the nut products look a bit better. They’re still very high in fat. And really, you’re mainly paying for some very expensive water. Then, there’s added salt, which surprisingly seems to be a supplement to every nut milk product on the market. Calcium content is not comparable either, unless it has been added. Unfortunately, the form of calcium commonly used is not easily absorbed by the human body compared to what’s present in animal milks. Nut milks are a mixture of ground nuts and water, usually with a sweetener and salt. They provide the beneficial fats that are found in nuts, as well as protein and calcium in very small amounts. Cereal milks, such as oat, rice or quinoa, are a starchy mixture of grain flours or brans – or both. They usually have added oil and, again, salt. Generally, these cereal milks provide little protein but the added oil usually has beneficial mono-unsaturated and polyunsaturated fatty acids. Coconut milk sold as a beverage usually has added water and salt. It is also very low in protein. Coconut oil is mostly saturated fat. While many advocates will argue for the specific benefits of the medium-chain triglycerides present in this fat, these form only part of the fat content of coconut. And it still doesn’t stack up as a healthier fat than the mono- and poly-unsaturated fats. The environmental implications of Palaeolithic-style eating are rarely mentioned. Eating like a cave-dweller sounds so natural, how could it be bad for the environment, right? But the world’s population is more than 6,000 times the size it was in the Palaeolithic era, so sustainability is now a much bigger issue! There would be huge environmental implications if six billion people tried to follow a diet high in meat, but the type of milk we choose may be very important too. The amount of water used to grow almonds is very large, for instance, and coconut milk will be high in food miles for most of us. So there isn’t a clear front-runner amongst these milks in the environmental stakes. Given the strict rules about what products can be called juice, it’s curious that manufacturers are allowed to call these products milk at all, since they really aren’t. Other than in the sense of being a white liquid you can put on cereal and in tea, and use in cooking, that is. If that’s all you’re looking for, then it’s up to you to choose which one you like most - but do read the label to see what else you’re getting!
<urn:uuid:825ba779-d7e7-4b94-b8bd-5d5fa66cac46>
CC-MAIN-2016-26
http://theconversation.com/milking-the-market-are-you-pouring-additives-on-your-cereal-33592
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397797.77/warc/CC-MAIN-20160624154957-00083-ip-10-164-35-72.ec2.internal.warc.gz
en
0.960191
1,133
2.75
3
Strong Start to a New Astronomical Field Right now there are high energy particles called neutrinos streaming through your body. These particles are produced from high energy events, such as the nuclear fusion of the Sun and experiments at particle accelerators. There are other sources of neutrinos in the Universe, and the IceCube observatory, manned by researchers from across the world, including Berkeley Lab, is helping to find them. Neutrinos are an interesting family of particles that have very little mass, high energy, and no electrical charge. This makes them very useful, as they can pass through barriers like the atmosphere, and difficult to work with, because they do not always interact with a detector. The IceCube observatory however was designed to catch them, with its 5160 detectors buried under a kilometer and a half of Antarctic ice. So far it is found 28 extremely high energy neutrinos that most likely occurred from astronomical events that took place outside of the Solar System. Two of these were the highest energy neutrinos ever reported then, exceeding one quadrillion volts, and one more actually doubles that. Now that we are finding some of these neutrinos, the question becomes, 'where are they coming from?' IceCube can point us in the right direction, and currently the best theory is that they are being produced as a result of particle jets from black holes. Source: Berkeley Lab
<urn:uuid:44397532-910f-4ab2-b99f-be0c5e4bc171>
CC-MAIN-2016-26
http://www.overclockersclub.com/news/34862/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396147.66/warc/CC-MAIN-20160624154956-00016-ip-10-164-35-72.ec2.internal.warc.gz
en
0.969817
288
3.71875
4
7809 is a voltage regulator integrated circuit(IC) which is widely used in electronic circuits. Voltage regulator circuit can be manually built using parts available in the market but it will take a lot of time to assemble those parts on a PCB. Secondly, the cost of those parts is almost equal to the price of 7809 itself so professionals usually prefer to use 7809 IC instead of making a voltage regulator circuit from scratch. Before you start using 7809, you will need to know about the pin structure of IC 7809. Apparently, it looks like a transistor. It has three pins. For a better understanding, I have given an image of 7809 bellow. Please take a look. You can easily see the V in and V out pins as well as the ground pin. It is really easy to use 7809 for voltage regulation purposes. I have also included a circuit diagram of 7809 so that you may learn how to use it in a circuit diagram. It is wise to use two .1uF capacitors on both input and output sides to filter any ripple or distortion in voltage but it is not necessary. In the image, you can see that 12V are being supplied on the input side of 7809 but the out put side of 7809 is outputting Regulated 9V. As long as the input voltage remains above 9V, output voltage of 7809 will remain smooth and regulated. Please note that input voltage of 7809 can be up to 23V but under my experience, it is wise to avoid input over 15V. 7809 is claimed to output 9V and almost 1.5A Current but again, I have experienced that we should not put a load over 9V and 1A on it. Since we are using it in power supply, the transfer of power will result in heat output. We will need to use a heat sink with 7809 otherwise this heat can damage it. It is advised to use a 1A fuse on the output side of 7809 and a 1.5A fuse on the input side of 7809 to avoid damage in case of short circuit.
<urn:uuid:f8c615d9-a859-472b-9b84-396cf5b7e63b>
CC-MAIN-2016-26
http://www.researchcell.com/general/7809-pin-and-circuit-diagram/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395560.14/warc/CC-MAIN-20160624154955-00101-ip-10-164-35-72.ec2.internal.warc.gz
en
0.939604
429
3.328125
3
Building a New Pyramid hen the Egyptians built the Pyramids, they painted the tops with gold in order to connect with the sun. The pyramids became a symbol of advanced science and a brand that raised the flag of an ancient civilisation and challenged the modern ones. The sky was the limit, and the construction of the Pyramids encouraged clusters of learning, research and the discovery of talent. Today, more than a year after the downfall of the Mubarak regime, Egypt needs to build a new pyramid -- a huge task involving parallel processes of political, economic and social reform. For this Egypt needs leadership that can inspire, mobilise and coach the nation. Other emerging powers, for example South Africa and also Brazil, have transformed themselves under inspirational leaders. And in a previous article last July, we identified elements of East Asia’s rapid economic development that could serve as an inspiration to Egyptian policy makers: openness to the world, investment in education, a pragmatic approach, a clear sense of the role of government, and the return of the “brain-drain” diaspora. But Egypt has so much to do, and sometimes it looks like mission impossible. At the same time, the construction of the New Pyramid needs to be fast. Expectations are sky high, and people will not wait for the 20 years that it took ancient Egyptians to build the Pyramids. So is the leadership there? Leaders who are Socio-Economic Architects Besides having to deliver rapidly, Egypt’s new leaders must pursue a fresh development model that inspires and is inspired by the ordinary person in the street (the bottom of the pyramid). Above all this needs to be inclusive – and seen to be so. With 40% of Egyptians in rural areas below the poverty line, the new leaders can’t simply focus on the country’s long-term development. They will have to fight poverty every day and achieve tangible results that will improve the quality of life of the average citizen. Above all they must give people hope. Even the hardest of times can be accepted, if there is hope that things will improve – especially for the children and grand-children of the current generations. Hence the need for two parallel strategies: “today for today” and “today for tomorrow”. A second element should be the encouragement of small and medium enterprises (SMEs). This is in contrast to Mubarak regime economic reforms, which tended to favour large oligopolistic conglomerates and left SMEs suffering from lack of funding and skilled labour. The new leaders will need to develop simplified processes: fast and with only minimum bureaucracy, with government acting as a facilitator and not as an obstruction to SME growth. SMEs can drive job creation as they already do in the European Union, where SMEs employ more than 70% of the working population. And Egyptian SMEs can also act as major driving forces for conquering new markets, similar to the SMEs in the so-called Anatolian Tigers of Turkey. Among other things, Egypt’s leaders have to stimulate and expand micro-financing initiatives to engage the bottom of the pyramid in the new economic era. Inspiration can be sought from the innovative role of micro-financing in countries such as Bangladesh. Thirdly, the economy needs to be rebalanced. In part this means moving away from the mega projects that have characterised Egypt during the last six decades. The country’s rulers dreamed of big, long-term projects to leave a huge personal legacy. Maybe it is in the DNA of Egyptians to dream of colossal works. But none of these projects gained the support of ordinary men and women. Contrary to the construction of the ancient pyramids, which produced an army of skilled labourers, those projects were mostly delivered with foreign assistance and did little to develop local workforces. The fourth point is that Egypt does not live in isolation from its regional environment. One of the dynamic effects in the growth of East Asia – which was significantly poorer than the MENA region not that long ago – has been the development of intra-regional dynamics. Many East Asian economies are now linked through global supply chains with their neighbours and hence have access to global markets. In MENA there is no regional economic force to speak of. Having an integrated MENA regional economy will also act as a magnet for foreign direct investment – something Egypt very much needs both as a generator of growth and jobs, and also as a means of transferring technology and know-how. Good economic reforms will help to sustain political development and stability. But neither political nor economic reforms will be sustainable without social reform. And here the most critical and urgent issue is education, an area much neglected by Egypt’s successive dictatorships. Basic education, primary and secondary, is insufficiently widespread and of poor quality with the result that far too many Egyptians lack the skills required to engage meaningfully in the global economy. Furthermore, in recent decades, the absence of critical thinking in higher basic education has greatly hindered the development of innovators and entrepreneurs. It has also contributed significantly to the brain drain. Not a single Egyptian university features among the top 500 universities in the world. The poverty in skills of Egyptians also means that those working abroad mostly find employment in only the lowest kinds of jobs, hence limiting the amount of remittances sent back home. Much effort will also need to go into raising the status and condition of women. The new leaders will have to inspire the nation Success breeds pride and so long as pride does not degenerate into hubris, it in turn can breed success. The successful reforms and consequent growth and development in China, India, Indonesia, Vietnam, Brazil, Mexico and Turkey, among others, have given their citizens a sense of pride. This is critical. Thus, in addition to economic policy, Egypt’s new leaders will have to mobilise the nation behind them. Through thousands of years the ancient Pyramids remained a brand representing great projects telling the story of a hard working nation with highly advanced science and education. In building a new pyramid, Egypt will need to rebuild its brand. The new leadership must aim to inspire confidence and pride among Egyptians in their country, and respect among its neighbours and the wider international community. Dr. Hischam El-Agamy is Executive Director at IMD. Jean-Pierre Lehmann is Emeritus Professor of International Political Economy, IMD, and Senior Fellow, Fung Global Institute, Hong Kong. - Why leaders should be playing games: 5 ways to harness gamification to change your employees' behavior
<urn:uuid:17ef8a96-8484-4f33-837b-e377d3880ebb>
CC-MAIN-2016-26
http://forbesindia.com/article/imd/building-a-new-pyramid/33424/1
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397864.87/warc/CC-MAIN-20160624154957-00048-ip-10-164-35-72.ec2.internal.warc.gz
en
0.951222
1,342
2.65625
3
Photo: Hockey match on the flight deck of an aircraft carrier with Hurricanes ready for action © Imperial War Museum The first major exhibition to examine the links between sport and war is currently taking place at the Imperial War Museum North in Manchester until November 1 2004. Photo: The Oval © Imperial War Museum Most people are aware of the famous football matches that happened in no-mans land during the Christmas 1914 but the Imperial War Museum has taken these and other stories to look at all aspects of sport in wartime. Examining the role of sport at home and on the front line in times of conflict the exhibition investigates how sport can be a symbol for war and peace whilst examining the background to some of today’s most enduring sporting rivalries. Photo: WAAF cricketers in action © Imperial War Museum The exhibition also focuses on the stories of eleven sporting heroes from Britain and the Commonwealth who fought for their country during the First and Second World Wars. One such hero was Walter Tull. As one of the first black professional footballers, Tull played for Tottenham Hotspur and Northampton Town until 1915. He was also the first black officer in the British Army, having risen from the rank of private to second lieutenant during the First World War. Photo: Officers and men playing football on Christmas Day in Salonika 1918 © Imperial War Museum Having enlisted in the Footballer’s Battalion of the Middlesex Regiment he was killed leading a counter attack against German positions during the Second Battle of the Somme on March 25, 1918. As well as some astonishing personal stories, the exhibition features many iconic objects. During the Battle of the Somme in 1916, Captain Nevill kicked two footballs out of a trench to encourage his troops to charge the enemy. You can see one of those footballs at the exhibition. Photo: Walter Tull © Imperial War Museum There is also the chance to see rare film footage as well as historical and contemporary art and photography - plundered from the vast archives of the Imperial War Museum’s collections. The exhibition has been augmented by loans from national sports museums and other associations around the country.
<urn:uuid:13392f9a-6f4f-4bc9-ab16-0f3e9c26212a>
CC-MAIN-2016-26
http://www.culture24.org.uk/places-to-go/north-west/manchester/art23136
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396100.16/warc/CC-MAIN-20160624154956-00152-ip-10-164-35-72.ec2.internal.warc.gz
en
0.968632
440
2.5625
3
Our idea of a calendar is ingrained from early in our school years. Teachers have large, colorful calendars with monthly tear-off sheets or calendar banners that scroll across the top of the chalkboard. Some take that image and it becomes their concrete idea of time. However, there are many people who visualize a year in a completely different way. Whether they have trained themselves to see it in a certain light, or the mind has already decided what these months will look like, they view the calendar in a seemingly odd sense. Is it possible to combine what others innately see, and productivity, to force yourself to visualize a calendar in a more efficient way? Synesthesia is a neurological condition in which the mind mixes sensory signals. People with synesthesia, known as synesthetes, may associate numbers with a certain color, or order. They may perceive a certain smell or taste simply by looking at something, and visa versa. Calendar Synesthesia is the unofficial/non-medical term for people who have sensory association with days, weeks, months, and years. There is a great discussion on a ‘Mental Calendar’ at this Metafilter thread. Examples of Mental Calendars The following examples illustrate that people have a firm idea of how a year looks to them. The mental construct is formed, and they can pull it out of their brain at any time. Mark Jaquith, a WordPress developer, created a mockup of how he visualizes the months. From his article: When I think of “now” in a month-to-month sense, I visualize myself as standing on the appropriate month on that layout. If I think about another month, I visualize myself looking at the other month’s placeholder. So when I look at September from April, I’m standing on April, facing south. I illustrated Lobster Mitten’s idea of a mental calendar for him/her. The following comment is how one person sees time: Mine is like the face of a clock. Jan1/New Year’s Eve is 12:00. Dec 1 is 1:00, Nov 1 is 2:00, Oct 1 is 3:00, and so on. Or sometimes I think the equinoxes are 3:00 and 9:00, and the solstices are 12:00 and 6:00. The following calendar is from Dana in the comments section. He describes his mental calendar as a, “3D circle tilted at about a 30 degree angle, which January 1st at the highest point. Each month of the year takes up varying amounts of space on the circle (summer months are typically bigger) and each month has a very distinct color associated with it.” Have an example of how you see time? Leave a comment or design it yourself and I will update this page with your example. Common Themes of Mental Calendars Some of the common ideas that I have seen from comments are indicators that the mental calendars are not the same as ones that are constructed from paper. January is Not the Beginning A comment from the same Metafilter thread from above explains that linear is not always the case. InsanePenguin writes: It’s pretty hard to explain but by my best estimation, it begins with Aug/Sept (perhaps because my birthday is in August, or the school year begins in September) and continues in monthly blocks to the right. That is, up until we hit December and January. January takes a sharp 90 degree turn straight up and continues that way… June/July and August/Sept never actually connect in my mind. I simply can’t figure out how the blocks would connect. Visualizing time as distance is reoccurring. Imagine the farthest distance being the latest month and January being right in front of you. As time passes, your mind pulls the calendar closer to you. Sara Anne’s comment illustrates that time and colors blend. Each month has a color: January is brown, February is pink, March is green, April is white, May is peach, June is turquoise, July is blue, August is gold, September is orange, October is black, November is gray/green, December is red. One of the most intriguing comments was not about those who see a solid picture, but rather the conscious forcing of an image: Since it’s not as concrete, some of this may be biased by the fact that I’m actively trying to visualize it the way I usually do, which inevitably means that it is definitely not accurate. Top to Bottom, Left to Right This is how I see a calendar. Not because I mentally see it like so, but because it makes the most practical sense. It has become the easiest method to force upon myself. As below, the practical sense of top to bottom, left to right, can be taken to a new level. Aaron Dragushan’s Method When discussing time with a good friend, Aaron raised the idea that calendars, in reality, can be displayed as they are envisioned in the mind. He took the time to cut apart his calendar and paste it together in a way that worked for him. What does your mental calendar look like? Leave a comment below!
<urn:uuid:d5ec3d2f-2d0a-453d-9f73-a6147d8b5a75>
CC-MAIN-2016-26
http://blog.calendars.com/tag/insanepenguin/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395039.24/warc/CC-MAIN-20160624154955-00084-ip-10-164-35-72.ec2.internal.warc.gz
en
0.964684
1,103
2.625
3
» Australian Lists » Landmarks Conductor Eugene Goossens began work with the Sydney Symphony Orchestra in 1947, and soon afterwards approached John Cahill, then premier of New South Wales, with an idea to build an opera house for the state. However, it was not until 1956 that the NSW Government announced that they would hold a design competition for an opera house to be located at Bennelong Point, Sydney. A Danish architect Jorn Utzon was the winner. While the Sydney Opera House was being built, several government officials demanded Utzon make changes to his design. He refused, and the arguments between Utzon and the officials ended with Utzon leaving Australia in 1966 never to return. In 1973, the Sydney Opera House was finally completed. Uluru stands 348 metres high and is more than 9 kilometres around its base. However, the section that is visible is only one-third of the rock. The other two-thirds is under the ground. This makes Uluru one of the largest monoliths in the world. In 1873, British explorer William Gosse named the rock after the premier of South Australia, Henry Ayers. For most of the 1900s, the federal government controlled Ayers Rock. However, in 1985, the government handed the rock and the surrounding land back, Kata Tjuta National Park, to the Traditional Aboriginal custodians. It is now known by its traditional name, Uluru. It is also a listed World Heritage Area for both its cultural and natural values. Historically an important area due to the belief that the first European to set foot on Western Australian soil did so on a small island in Shark Bay. In 1616, Dutch explorer Dirk Hartog sailed along the west coast of the continent. He left behind a pewter plate on a pole, inscribed with the details of his visit at the site now known as Cape Inscription. Later, in 1699, British explorer William Dampier explored the area and gave it the name 'Shark's Bay' because of the large numbers of sharks he saw. Shark Bay contains the world's best collection of stromatolites, a form of algae that are among the oldest life forms in the world. It also has one of the world's largest dugong populations, with about 14 000 of these strange-looking sea animals living in the region. In addition, dolphins, humpback whales and turtles live in the bay or pass through it. Five species of endangered mammals also live in the Shark Bay area. In 1991, Shark Bay was listed as a World Heritage site. As you would expect there are also plenty of sharks! Located off the coast of Queensland, the Great Barrier Reef is the world's largest coral reef system composed of roughly 3,000 individual reefs and 900 islands. Selected as a World Heritage Site in 1981 and it has also been touted as one of the seven natural wonders of the world. It is also the world's largest World Heritage Area extending 2,000 kilometres and covering an area of 35 million hectares. The Great Barrier Reef can be seen from outer space and is the world's biggest single structure made by living organisms. The World Heritage Listed Kakadu National Park is a unique archaeological and ethnological reserve, located in the Northern Territory. Inhabited continuously for more than 40,000 years it features cave paintings, rock carvings and archaeological sites that have recorded the skills and way of life of the region's inhabitants. The most prominent physical feature in Kakadu is the Arnhem Land Escarpment, a 1.6 billion-year-old sandstone cliff that stretches for miles across the park. The cliff, which hosts many waterfalls, is surrounded by towers of sandstone, rainforests, and swamps. It is also one of the most remote and wild regions of the country, filled with tropical forests, torrential monsoons, high humidity, wild animals, and few people. The park's 10,000 sq kilometers of woodlands, wetlands, and floodplains are home to an amazing array of wildlife, including more than 300 species of birds, 75 species of reptiles, 50 species of mammals, 1,500 species of butterflies and moths, 50 species of fish, 25 species of frogs, and thousands of species of plants, many of which remain unclassified. The Sydney Harbour Bridge construction started in 1923 from the design by Dorman Long and Co's Consulting Engineer, Sir Ralph Freeman. It took 1400 men eight years to build and includes six million hand driven rivets and 53,000 tonnes of steel making up its construction. 272,000 litres of paint were required to give the Bridge its initial three coats! Sadly, sixteen workers died during construction, but surprisingly only two from falling off the bridge. It now carries eight traffic lanes and two rail lines and almost 200,000 cars per day cross the bridge. It is the world's largest steel arch bridge with the top of the bridge standing 134 metres above the harbour. Familiar to Aboriginal Australians for centuries, most Europeans knew nothing of the Bungle Bungles until the 1980s, when they became part of the 45,000 hectare Purnululu National Park in Western Australia. The mountains rise 200 to 300 meters above a forest and grass plain in the Kimberley and cover an area of about 35 km by 24 km. Water is responsible for both the whimsical shape and colorful banding of these mountains. The beehive-shaped mounds are made of sandstone and other conglomerate rocks, deposited in the area by the meandering braids of ancient rivers. Water has also created the colorful bands that circle the Bungle Bungles. Where layers of the rock are soft, water seeps in, allowing dark algae to grow in black bands. The orange bands are made by a thin layer of iron and manganese, which coats layers of the rock, making them less permeable to water. The Horizontal Falls, near Talbot Bay, in the north-west of Western Australia is described by David Attenborough as "one of the greatest natural wonders of the world". Although they are called waterfalls, this natural phenomenon actually consists of immense tidal currents hurtling through narrow coastal gorges. And they do all this sideways - hence the name, Horizontal Falls. It is created by the enormous variation in tides - which are as much as 10 metres driven by the massive Montgomery Reef located 30 miles out to sea from the bay. The water level rising, or falling, in Talbot Bay (due to the tide) causes a major height difference with the water level in the inlet on the other side of the Falls. The velocity and mass of water involved in this twice daily event make it one of the largest tidal changes in the world. Talbot Bay is almost Australia's last frontier, few people have ever seen this spectacular event. There is no car access. The Twelve Apostles are the most famous of all formations along the spectacular Great Ocean Road in Victoria. Formed over many years by the errosive action of the sea against Limestone and Volcanic rock the tallest of the rock stacks is around 45 metres high. Today there are only there are only eight of the original twelve still standing due to the continous natural errosive forces. The stretch of coastline is known as the Shipwreck Coast because more than 80 ships have gone down here due to the rough ocean and rugged rock stacks. Wave Rock is a natural large stone formation in Western Australia near the town of Hyden. The formation is said to be many millions of years old and contains strips of grey and red granite in the wave formation. Its rounded wave-like shape, formed by weathering and water erosion, reaches 15 metres in height and extends 110 metres in length. Nearby there are other rock formations such as the Hippo's yawn, The Falls and the Breakers. The Three Sisters is part of the Blue Mountains National Park which is located just an hours drive west of Sydney. The formation is named after the Aboriginal dreamtime story of three sisters named Meehni, Wimlah and Gunnedoo who lived with their father. The Blue Mountains National Park area itself was originally formed many thousands of years ago from the sediment of a very large river system which over the years have eroded the surrounding landscape to form the multitude of deep valleys and relatively high peaks we find today. The Blue Mountains earned their name from the distinctive and deep blue haze caused by scattered rays of light coming in contact with fine dust particles and droplets of oil dispersed from the eucalyptus trees in the valleys. Lake Eyre, in South Australia, is Australia's largest salt lake, situated in the driest region in the country to the east and north-east of the lake lie the Tirari, Strzelecki and Sturt Stony deserts, for most, inhospitable environments. When dry, much like in the photo to the left - which is its usual state, the lake bed is a glistening sheet of white salt. When the lake does fill which has only been on three occasions in the last century, it becomes temporarily Australia's largest lake as it spreads out to 9500 square kilometres. The lake itself was named after Edward John Eyre who in 1840 became the first European to sight it. The Australian Antarctic Territory is the part of Antarctica claimed by Australia and is the largest territory of Antarctica claimed by any nation an area estimated at 6,119,818 km sq. in size, which is almost as large as the Australian mainland. Antarctica is the coldest, windiest, driest and highest continent in the world. It is also the most isolated where for part of the year the sun doesn't rise, and for another part it never sets. The territory is inhabited only by the staff of research stations and occasional tourists. Technically the highest peak in Australia, Mount McClintock stands at 3,492m within the Australian Antarctic Territory. The Swan Bells are a set of eighteen bells hanging in a specially built 82.5 m-high copper and glass campanile in Perth, Western Australia and is one of the largest sets of change ringing bells in the world. Swan Bells is one of only three peals of 16 bells hung for change-ringing in the world, the others being in Dublin and Birmingham. It features two extra 'semitone' bells although all 18 are never rung together. Twelve of the set are historic bells from St Martin-in-the-Fields church in Trafalgar Square in London and the six others were cast in recent times. Port Arthur was named after Van Diemen's Land lieutenant governor George Arthur. The settlement started as a timber station in 1830; it is best known for being a penal colony. From 1833, until 1850s, it was a destination for the hardest of convicted British and Irish criminals, those who were secondary offenders having re-offended after their arrival in Australia. Port Arthur was secured naturally by shark-infested waters on three sides and the 30m wide isthmus of Eaglehawk Neck that connected it to the mainland was crossed by fences and guarded by prison guards and dogs. Today, Port Arthur is one of Australia's great tourism destinations located within the scenic beauty and wonder of Tasmania. Lake St Clair National Park which includes Cradle Mountain is part of the Tasmanian Wilderness World Heritage Area. Lake St Clair is the deepest lake in Australia and the head of the Derwent River. The Australian Alps is an amazing mountanious region featuring 11 national parks and reserves. It's renowned for it's winter snow and summer flora. It's home to Mount Kosciuszko, Australia's highest peak and the region is part of the Great Dividing Range which extends from Queensland through New South Wales and into Victoria. Stretching for almost 300 kilometres Ningaloo Reef is a World Heritage listed coral reef system. The nearby Shark Bay, Australia's largest bay, features a 1,030 square kilometre Wooramel Seagrass Bank and is the largest of its type in the world. Ningaloo Reef is, at times, home to the Whale Shark, the largest fish species in the world. Watarrka National Park in the Northern Territory is home to some amazing landscapes and in particular, Kings Canyon. Kings Canyon goudes it's way into the earth some 270 metres at points. An island 7 times the size of Singapore yet home to only just over 4 thousand people. The island is a natural wonderland featuring amazing coastal scenery and diverse wildlife such as koalas, kangaroos, penguins, goannas, fur seals and sea lions to name some. Fraser Island off the Queensland coast is the world's largest sand island. It's 123 km long and 25 km at its widest. It was World Heritage-listed in 1992. Bondi Beach is about one kilometre long and receives many visitors throughout the year. It was added to the Australian National Heritage List in 2008. Apart from being a beautiful and popular beach it has also been the backdrop in several movies and recently TV shows. The Daintree Rainforest covers an area of around 1,200 square kilometresmaking it the single largest block of tropical rainforest in Australia. It is also World Heritage listed. Apart from strikingly diverse landscape it's home to a diverse array of flora and fauna, some being of the most ancient in the world. The Great Ocean Road stretches along the Victorian coast for some 243-kilometres between Torquay and Warrnambool. The road was built by returned soldiers between 1919 and 1932, and is dedicated to casualties of World War I making it the world's largest war memorial. The road is also Australian Heritage Listed. The Kimberley was one of the earliest settled parts of Australia, with the first arrivals landing about 40,000 years ago from the islands of what is now Indonesia.The Kimberley is an area of 423,517 square kilometres (163,521 sq mi), which is about three times the size of England or twice the size of Victoria. Pictured is Mitchell Falls. 3 more lists of landmark and tourist attractions Trip Advisors Top 10 Aussie landmarks Tripadvisor - Sydney Opera House, Sydney - Sydney Harbour Bridge, Sydney - Australian War Memorial, Canberra - Block Arcade, Melbourne - Eureka Skydeck 88, Melbourne - Port Arthur Historic Site, Port Arthur - Circular Quay, Sydney - Cape Byron Lighthouse, Byron Bay - Fremantle Prison, Fremantle - Kings Park War Memorial, Perth 10 natural wonders of Australia - CNN - Great Barrier Reef, QLD - Uluru, NT - Shark Bay, WA - The Pinnacles, Perth WA - Twelve Apostles, VIC - MacKenzie Falls, VIC - Fraser Island, QLD - Kakadu, NT - Blue Mountains, NSW - Bungle Bungles, WA 15 World Heritage Listings - AU GOV - Kakadu, NT - Uluru, NT - Queensland Wet Tropics, QLD - The Great Barrier Reef, QLD - Fraser Island, QLD - Central Eastern Rainforest Reserves, QLD - NSW - Willandra Lakes, NSW - Lord Howe Island Group - Tasmanian Wilderness, TAS - Shark Bay, WA - Purnululu National Park, WA - Australian Fossil Mammal Sites, QLD and SA - Macquarie Island - Blue Mountains, NSW - Heard and McDonald Islands
<urn:uuid:6af916f4-fd4a-44d7-bc7d-5a1fb8947c2c>
CC-MAIN-2016-26
http://www.list-directory.info/lists/landmarks.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397111.67/warc/CC-MAIN-20160624154957-00053-ip-10-164-35-72.ec2.internal.warc.gz
en
0.956861
3,231
3.0625
3
Learn how to use lookup functions to create exciting interactive A simple file for the Interactive whiteboard or PC screen, demonstrating equivalent fractions. Take any whole number between 1 and 999, add the squares of the digits to get a new number. Use a spreadsheet to investigate this In a three-dimensional version of noughts and crosses, how many winning lines can you make? What is the volume of the solid formed by rotating this right angled triangle about the hypotenuse? Label this plum tree graph to make it totally magic! Label the joints and legs of these graph theory caterpillars so that the vertex sums are all equal. You add 1 to the golden ratio to get its square. How do you find higher powers? Investigate the family of graphs given by the equation x^3+y^3=3axy for different values of the constant a.
<urn:uuid:8d70b2d2-54e7-42fb-ae3d-6d1afde8b3e2>
CC-MAIN-2016-26
http://nrich.maths.org/thismonth/4and5/2003/02
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396459.32/warc/CC-MAIN-20160624154956-00115-ip-10-164-35-72.ec2.internal.warc.gz
en
0.873786
188
3.78125
4