text
stringlengths 199
648k
| id
stringlengths 47
47
| dump
stringclasses 1
value | url
stringlengths 14
419
| file_path
stringlengths 139
140
| language
stringclasses 1
value | language_score
float64 0.65
1
| token_count
int64 50
235k
| score
float64 2.52
5.34
| int_score
int64 3
5
|
|---|---|---|---|---|---|---|---|---|---|
Is Your Money Going Up in Smoke?
Attention smokers: If the health implications haven't motivated you to give up smoking, perhaps the wealth implications will! A new study shows that a person's net worth decreases by $410, or about four percent, for each year he or she continues smoking.
Approximately 8,900 people born between 1957 to 1964 were surveyed in the National Longitudinal Survey of Youth in 1985, 1992, 1994, and 1998 about several issues, including smoking habits and wealth. Wealth was assessed based on home values, savings, stocks, bonds and other assets; smokers were labeled "heavy" if they smoked more than one pack of cigarettes a day and "light" if they smoked less than one pack a day.
Results: By 1998, the final year of the study, participants identified as smokers averaged a net worth of about $50,000. According to the researchers, smokers tend to come from lower socioeconomic classes; taking this into consideration, other factors that influence wealth were studied, including education, race and income. After taking these factors into account, researchers still found that the net worth of heavy smokers was approximately $8,300 less than nonsmokers, while light smokers' net worth was roughly $2,000 less than nonsmokers.
"While a casual relation cannot be proven, smokers appear to pay for tobacco expenditures out of income that is saved by nonsmokers. Hence, reductions in smoking will boost wealth, especially among the poor," the researchers said.
The moral of the story is clear: Smoking not only negatively affects your health, it negatively affects your weatlh, too. Rather than spend your cash on unhealthy cigarettes, try investing in a smoking cessation program.
To learn more tips on keeping yourself healthy, visit www.chiroweb.com/find.
Zagorsky JL. The wealth effects of smoking. Tobacco Journal 2004;13: 370-74.
Newswise. Smoking hurts wealth as well as health. Feb 2, 2005. www.newswise.com.
|
<urn:uuid:27cf2869-60e4-4811-a543-2ba9fb80c865>
|
CC-MAIN-2016-26
|
http://www.chiroweb.com/mpacms/tyh/article.php?id=783
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402746.23/warc/CC-MAIN-20160624155002-00158-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.965937
| 420
| 2.546875
| 3
|
Fun with Geoscience Trivia
||In which geological period would rocks of the Ludlovian age be placed?
||How many cycles in a megacycle?
||What term was given by gold miners for the main deposit, often undiscovered, that occurred in a mineral district?
Want more trivia?
Get your very own copy of GSA Geoscience Trivia (questions from the 1st Annual Trivia Night in Denver '04).
Thanks for playing!
See you again next month.
|
<urn:uuid:4350621d-4135-479e-8899-10983f9591f7>
|
CC-MAIN-2016-26
|
http://www.geosociety.org/GSA_Connection/0602/trivia.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399425.79/warc/CC-MAIN-20160624154959-00064-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.90373
| 107
| 2.859375
| 3
|
Summary of information from States Members of the United Nations and other relevant stakeholders on best practices in the application of traditional values while promoting and protecting human rights and upholding human dignity
III. Analysis and Conclusions
83. Several respondents found that some traditional values were closely related to human dignity and human rights, provided the basis and background of universal rights, and supported their promotion and protection. Examples were provided as best practices in the application of traditional values while promoting and protecting human rights and upholding human dignity by both States and other stakeholders.
84. Some respondents were of the view that traditional values could be invoked to justify the status quo and undermine the rights of the most marginalized and disadvantaged groups. They noted that traditional values were at times misused to justify human rights violations especially with regard to freedom of belief, women’s rights, sexual orientation and gender identity. It was underlined by many that traditional values could never be used to justify violations of universal human rights or as a basis for discrimination in any form.
The full report can be found here, or in the downloadable pdf file.
- Protection of the Family resolution increases vulnerabilities and exacerbates inequalities
- Indonesia's Aceh bans women from nightspots after 11pm
- United Nations members resolve to end child marriage
- A plea to the new High Commissioner for Human Rights: defend women's rights
- Due diligence for women's human rights: transgressing conventional lines
- Universality Of Human Rights At Stake! Act Now To Oppose Russian Resolution On Traditional Values!
- UN: Open letter from NGOs to the General Assembly regarding terrorism debate
- UN: Security Council resolution 1373 to combat terrorism
- UN: Reproductive Health Goal Dropped
- Raise Your Voice Against the 'Protection of the Family' Resolution
- Women's Sport as Politics in Muslim Contexts
- Recommendations for action against gender-related killing of women and girls
- Reclaiming and Redefining Rights: ICPD+20: Status of Sexual and Reproductive Health and Rights in the Middle East and North Africa
- Discrimination Against Women in Bahraini Society and Legislation
- Substantive Equality and Reproductive Rights: A Briefing Paper on Aligning Development Goals with Human Rights Obligations
|
<urn:uuid:226e1a65-2412-49da-8915-39f019a74a53>
|
CC-MAIN-2016-26
|
http://www.wluml.org/resource/summary-information-states-members-united-nations-and-other-relevant-stakeholders-best-prac
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395548.53/warc/CC-MAIN-20160624154955-00009-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.916063
| 456
| 3.109375
| 3
|
My mother recently sent me an interesting article in Vanity Fair magazine about Texas inventor Tim Jenison’s quest to prove that Dutch painter Johannes Vermeer used a camera obscura-based device to make his photorealistic paintings. Jenison’s experiments are the subject of a new documentary called Tim’s Vermeer produced and directed by the magicians Penn and Teller, which is now in limited release.
Tim Jenison, who had a career developing video editing and post-production software and hardware, endeavored to not only reproduce the apparatus he thinks Vermeer used – a camera obscura fitted with a handmade four-inch lens, a parabolic mirror and a smaller mirror to paint from – but to test his theory by painting a replica of The Music Lesson. This required building and sourcing a fully accurate set that mirrors the room in Delft, Netherlands that Vermeer depicted. The construction of the set in his San Antonio studio took over eight months and the painting took over 230 hours of work. It is worth noting that Jenison is an amateur painter, with no training prior to undertaking this project.
Jenison was inspired by earlier research that suggested that Vermeer might have used an optical device to assist in making his most famous paintings. The theories were based on analysis of the accurate depiction in Vermeer’s work of out of focus areas of the scene, the perfect reflections in a mirror and the proper display of the light values falling on the white wall in the painting The Music Lesson. These attributes of the paintings are claimed to not be possible without the assistance of an optical device, suggesting that the details Vermeer included in his work could not have been seen by the human eye alone or with the era’s understanding of the nature of light.
Other critics though are resisting these proposals, at least insomuch as they “oppose drastic devaluations of the role of art”, which Metropolitan Museum of Art curator of European paintings Walter Liedtke is quoted as saying in the Vanity Fair article. We’ll leave it to you to determine if these discoveries about how likely it was that Vermeer used new technology to create his art undermines the artistry and beauty of his work or if it strengthens his reputation as a master of the use of light.
|
<urn:uuid:da59088a-20a1-4ae5-acfe-c9fc3f151333>
|
CC-MAIN-2016-26
|
http://www.dvafoto.com/2013/12/vermeers-camera-obscura/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396147.66/warc/CC-MAIN-20160624154956-00148-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.973837
| 476
| 2.796875
| 3
|
- NMNH Home ›
- Research & Collections ›
- Botany ›
- Research ›
- Biological Diversity of the Guiana Shield ›
Preliminary Checklist of the Mammals of the Guiana Shield : Introduction
The Guiana Shield as defined by Hollowell et al. (2001) includes the states in southern Venezuela (Amazonas, Bolívar, and Delta Amacuro), and all of Guyana, Surinam, and French Guiana. This region, however, is defined more broadly in a geological context to include this core area and parts of Brazil north of the Amazon River (states of Amapá, Pará, Roraima and Amazonas) and eastern Colombia (departments of Vichada, Guainía and Vaupés), with the western limit reaching Serranía Chiribiquete (Huber, 1994; Gibbs and Barron, 1993). In terms of mammalian biogeography, the Guiana Shield is defined by some authors as a subregion of Amazonia located east of the Rio Negro and north of the Amazon River (e.g., Wallace, 1854; Voss and Emmons, 1996). For the purpose of this study, we restrict our mammal inventory to the area of the Guiana Shield embracing the aforementioned three states in southern Venezuela, Guyana, Surinam, and French Guiana (Fig. 1). The areas of northern Brazil and eastern Colombia are relatively unexplored in terms of its flora and fauna, but we hope this paper will stimulate future research on the mammal communities from this region so that a comprehensive revised checklist for the entire region can be compiled in the future.
Much has changed concerning species concepts and distributions since Eisenberg (1989) started his ambitious series on the mammals of the Neotropics, beginning with northern South America. The only other synthesis beyond political boundaries was the influential work of Tate (1939), who focused on the highlands of southern Venezuela, western Guyana, and northern Brazil. Our study is the first attempt to summarize and standardize the current taxonomy of Guiana Shield mammals, and presents coarse-level distributions of the species recorded in the six political units of Fig. 1. The checklist is based on the most recent systematic revisions, which may differ from the concepts of some other mammalogists. It will serve, however, as a starting point for our understanding of species diversity and boundaries in the Neotropics.
The checklist is derived in part from the summary of bats of the Guiana Shield by Lim and Engstrom (2001), in addition to the results of inventories conducted by J. Ochoa G. and other researchers in southern Venezuela. The bat list incorporates many of the recent taxonomic proposals of Simmons and Voss (1998). Nonvolant mammals are based on our work in Guyana (Lim and Engstrom, submitted) and Venezuela (Ochoa), with the systematic updates of Voss et al. (2001). This in turn is complemented with the information provided by publications on the mammals of the Venezuelan Guayana Region (Handley, 1976; Ochoa et al., 1993; Linares, 1998) and Surinam (Husson, 1978). Taxonomic and distributional information can also be found in the recent literature (e.g., Voss and Emmons, 1996), in addition to the ongoing studies of Lew (2001) and Rivas (1998) in Venezuela, H. H. Genoways in Surinam, A. Brosset, P. Charles-Dominique and F. Catzeflis in French Guiana, and other colleagues.
next: Taxonomic considerations
[ TOP ]
|
<urn:uuid:fb7cc89b-8d2a-407f-b14e-717e0909ff6d>
|
CC-MAIN-2016-26
|
http://botany.si.edu/bdg/shieldmammals/intro.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783403508.34/warc/CC-MAIN-20160624155003-00072-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.895301
| 757
| 3.359375
| 3
|
Something in the Air
by Sylvia Wright
The articles below, which feature several researchers of the School of Veterinary Medicine, originally appeared in UC Davis Magazine, Spring 2006.
Take a deep breath. Now entering your lungs, bloodstream and perhaps your brain—“air” bearing all the exhalations of modern life: tailpipe exhaust, fireplace smoke, flame-broiled animal fats, industrial chemicals and carpet fumes. If you are within 100 yards of a freeway, you also have inhaled tire shreds and partially burned diesel fuel. If downwind from a farm, then ammonia from animal wastes or soot from burning rice straw. At the coast, you’ll breathe in salt, of course, maybe trans-Pacific sand from eroding Chinese deserts and perhaps something unexpected: sulfuric acid from the smokestacks of unregulated cargo and cruise ships.
Every fifth-grader knows that we breathe carbon dioxide and oxygen. But no one knows exactly what else we breathe, how much, where it comes from or how it affects our health. Answering those questions now is particularly urgent: Some UC Davis researchers have found disturbing patterns that link air pollution with serious human health problems, including chronic asthma in children and early death in some adults, and others see novel roles for air pollution in climate change.
UC Davis has a tradition of expertise in many aspects of air pollution: shedding light on the contributions of agricultural activities, the origins of haze over national parks, the benefits of cleaner fuels and emission controls in automobiles. It’s a success strengthened by a delight in inventing new research tools when the need arises and a willingness to bridge the traditional divides between the biological and physical disciplines. Now, with 60 faculty and staff researchers focused on the issues and a record $50 million in directed funding, the campus has become a leader among the handful of institutions in the United States working intensively on problems related to air pollution.
A Winning Approach
How long has UC Davis been exploring the effects of air pollution on human health? Here’s one measure: The National Institutes of Health recently renewed a grant for ozone research at UC Davis School of Veterinary Medicine for the 32nd year. The project’s lead scientist, professor [emeritus] Charlie Plopper, jokes, “It has to be one of the few grants left with a three-digit ID number.” New grants now get numbers in the low five digits.
In fact, it was Plopper, along with Kent Pinkerton, Bill Adams and a handful of other now-senior faculty, who first put UC Davis on the air-and-health map in the 1980s and ’90s with groundbreaking findings about the unrecognized damage done to children’s lungs by ozone and secondhand tobacco smoke. Now they, and the young graduate students and assistant professors they have mentored, are managing the campus’s bulging portfolio of air quality and health studies.
Plopper credits the recent surge in activity to new interdisciplinary partnerships. “UC Davis has always had real strong expertise in the biological aspects of respiratory health—biochemists, cell biologists, pathologists, the full range, from the medical school, the vet school and the ag school—all working together,” he says. “But there was not a lot of mixture of physical scientists and biological scientists. Only recently has that occurred, which I think is just critical. Now is the time for it.”
Much of the credit for that development goes to engineering professor and modeling expert Tony Wexler, who came to Davis from the University of Delaware in 2000 with an interest in the health effects of very small airborne particles. Wexler revived an old mailing list of UC Davis researchers interested in air pollution and convened lunch discussions at the Silo. By 2002, at the urging of Vice Chancellor for Research Barry Klein, Wexler had organized a new research unit, the UC Davis Air Quality Research Center. By 2003, he and Pinkerton had set their sights on winning some of $40 million in grants that the U.S. Environmental Protection Agency would award in 2005 for air-quality research. The EPA specifically wanted to know much more about airborne particulate matter and its effects on human health. The answers, the agency emphasized, were to be discovered using “an integrated approach” and offering “the opportunity for investigators from different disciplines to work together.”
Pinkerton and Wexler proposed an ambitious research program that would experiment locally (in the notoriously polluted San Joaquin Valley) and produce results that would apply nationally. The genius of the UC Davis proposal lay in “the mixture” that Plopper describes. The physical scientists and engineers would not just collect and analyze airborne particles; the biologists would not just assess how living tissue responded when the pollutants were inhaled. Their expertise would overlap and magnify. For instance, if biologists identified a particularly toxic airborne particle, the physical side could manufacture a batch of those particles for further study. If physical scientists devised computer models of particle movement in the body’s transport systems (airways and bloodstream), the biologists could focus their attention on sites where particles were most likely to deposit and cause injury.
The UC Davis proposal was up against tough competition. In 2000, the first round of EPA particulate-matter (PM) center funding had gone to Harvard and New York universities, the universities of Rochester and Washington, and UCLA. Now all were running for renewal on their five-year records. But in the end, UC Davis’ innovative and collaborative approach carried the day. The grants to NYU and Washington were not renewed; UC Davis and Johns Hopkins University took their places.
One of the young UC Davis biologists whose work will be supported by the PM center grant is Michelle Fanucchi, who studies childhood lung development with Pinkerton and Plopper. Fanucchi was involved in the development of the PM center proposal and calls its collaborative spirit “amazing.”
“At the beginning, I told [associate professor of engineering] Mike Kleeman, ‘You have to talk to me like I’m a sixth-grader.’ They have 16 words for carbon!” Fanucchi says. “At the same time, the engineers have a lot to learn from the biologists. It’s been very challenging but very fun. And now we are uniquely set up to finally make advances in understanding how particulates affect health.”
A Toll on Human Health
UC Davis researchers have made major contributions to understanding how airborne environmental toxins (such as smoke, dust and vehicle emissions) affect human health, particularly children’s health. One of their most troubling findings: Contrary to common belief, very young children’s lungs are more susceptible than adults’ to injury by environmental toxins, and those injuries cause significant deformities in essential airways that may be permanent.
Charlie Plopper, an expert in lung health and development, says the human respiratory system is shaped like an inverted tree that admits air through its trunk and transports it through its branches. Cells of various types line the surfaces of these branchlike airways and act on the particles and gases carried on the flowing breath. Many cells are sentries that mechanically trap or enzymatically dismember intruders. Other cells, at the distant ends of the branches, conduct the remnants of the breath—mostly oxygen molecules with an unknown number of other compounds and particles that evaded capture—across the airway membrane into the bloodstream.
Having established that inhaled toxins are bad for children, UC Davis researchers now want to understand why that is and how long the damage persists. They also want to know how air pollution might be bad for adults; Kent Pinkerton, an expert in lung response to air pollution, has found structural deformities in the lungs of older Central Valley farm workers—changes that might have been provoked by long exposure to mineral dust, fertilizers and pesticides.
The investigators also hope to answer one of the most urgent questions in environmental studies: Which of the myriad features of airborne contaminants are the most damaging? Think of air pollutants as a flurry of teeny-weeny chocolate-coated raisins swirling into your lungs. What makes them dangerous—their sugary, fatty coating? Their size? Shape? Number? Or perhaps it is all those factors together, with the added variable of your individual vulnerabilities—exposure to tobacco smoke (directly or secondhand), an antioxidant-poor diet, diabetes, obesity.
Similarly, very little is known regarding where airborne particles come to rest internally and what they do there. UC Davis researchers are especially concerned about ultrafine particles—bits of stuff so tiny that a billion would fit on the period at the end of this sentence. Ultrafines are abundant in places like the Central Valley, where much of the pollution comes from burning fossil fuels in vehicle engines.
Pinkerton with his colleagues and graduate students have shown that when mice briefly inhaled ultrafine particles, their heart rates changed. Was it because the particles traveled through the animals’ bloodstreams directly to their hearts? Veterinary pathologist Dennis Wilson plans to find out. He will be hunting ultrafines throughout the body—in coronary vessels and heart tissue, as well as the liver and brain. Concurrently, Pinkerton will study whether the particles act on the heart indirectly, not by going through the bloodstream but rather by short-cutting through nasal tissues to the brain centers that control heart rate. “This has never been looked at,” Pinkerton says.
Go online to see the articles in their original context.
|
<urn:uuid:8f719f33-e6f0-45a8-a1db-172c19d9861a>
|
CC-MAIN-2016-26
|
http://www.vetmed.ucdavis.edu/whatsnew/article2.cfm?id=1771
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397749.89/warc/CC-MAIN-20160624154957-00132-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.95369
| 1,980
| 2.578125
| 3
|
The DRC is available to consult regarding reducing barriers for persons with disabilities.
Universal Design principles are effective in increasing accessibility in the classroom, in student services, in technology and physical access. The principles of Universal Design are:
Examples of these principles in action:
Faculty Development and Instructional Design is available for making coursework technology accessible. See Resources for Accessible Teaching.
Respect the right of students with disabilities to maintain privacy regarding their disability and their accommodations. Disclosing this information is a violation of FERPA.
DeKalb, Illinois 60115 | Regional Sites | Contact Us Emergency Information | Employment | Maps | Accessibility
|
<urn:uuid:359fc86a-ce7b-47ee-8e6b-4e8d27974f67>
|
CC-MAIN-2016-26
|
http://niu.edu/disability/audience/faculty_staff.shtml
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395992.75/warc/CC-MAIN-20160624154955-00077-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.872144
| 132
| 2.9375
| 3
|
This study examines the evolution of China's Third World policy from the Maoist era to the present. The term "third World" refers to all developing and underdeveloped countries in Central Asia, South Asia, Southeast Asia, Africa and Latin America. Since 1949, the People's Republic of China was mainly responding to the international pressures from the United States and the Soviet Union rather than dealing with the Third World countries per se. But after the launching of the War on Terror in 2001, the American military expansion into Iraq and Afghanistan completely changed China's diplomatic priorities. Beijing has begun to pursue an active policy of engaging many Third World countries in order to undermine the U.S.-dominated international order. This development reflects the current official rhetoric about the China's peaceful ruse, meaning that a powerful China will not threaten its Asian neighbors as the Western imperialists had done in the past.
Lee, Joseph Tse-Hei, "China's Third World Policy from the Maoist Era to the Present" (2008). Global Asia Journal. Paper 3.
|
<urn:uuid:89094c9b-13ae-45fa-859c-d2cc84c6573c>
|
CC-MAIN-2016-26
|
http://digitalcommons.pace.edu/global_asia_journal/3/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783408828.55/warc/CC-MAIN-20160624155008-00200-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.901065
| 210
| 2.5625
| 3
|
Sometimes it can help children’s understanding of maths and numbers if they are shown a completely different way of approaching a calculation. In Year 6 most children will be familiar with the standard written method of multiplication, but this method is far from the only one which can be used. It just happens to be quite an efficient method which is relatively easy to use.
The great Egyptian civilisation used a very different method to work out multiplication calculations. Rather than learning tables, they just got very good at adding up pairs of the same number (or doubling as we know it today). One of the reasons for this is that they did not have multiplication ‘tables’.
The method is quite long, but nevertheless quite easy if you are good at addition and it is explained in detail on the first worksheet.
- © 2009 Maths Blog
|
<urn:uuid:9da0b03a-02eb-45c9-83cc-c58bde89278f>
|
CC-MAIN-2016-26
|
http://mathsblog.co.uk/2011/09/21/multiply-the-egyptian-way/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783404382.73/warc/CC-MAIN-20160624155004-00085-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.951823
| 171
| 4.0625
| 4
|
Second day at the LILAC conference #lilac13 in Manchester, UK, and I attended a session on Using visual literacy in teaching and learning, from Gwenda Mynott and Catherine Bonser, Liverpool John Moores University.
They gave "The ability to understand and produce visual messages" as a straightforward definition of visual literacy. They also referred to the ACRL guidelines http://acrlvislitstandards.wordpress.com/. Then the speakers gave examples of what they did with their students.
Visual boards. They ask students to put together images that represent their experience e.g. if the subject focus is management, the learners were encouraged to select images about work experience, that represent what they think work is, hobbies and clubs that might have a managment aspect to draw out. It gives a good focus for discussion, drawing out reflection around the subject. Also it is good for getting to know the students.
Selecting photos of leaders. The photos selected by students were put physically on the wall, and they could be grouped in different ways (e.g. sector, male/female) to stimulate discussion around the notion of leadership.
Drawing - for example drawing pictures of themselves as learners. At this point the speakers highlighted that of course not everyone is a visual learner, some people don't like being asked to draw things, so that examples can include text as well as drawings.
Concept maps of key key concepts and theories - they used this for assessment, and stressed that you needed to develop the learners' confidence in developing them. I have found this myself when I've used concept and mindmaps in teaching and assessment of information literacy - there are usually some people in the class who are immediately pleased we are using them, and a few who say they hate having to do them. The presenters highlighted the need to think-through what criteria you will use for assessing the concept maps.
The photo shows me taking a picture of someone taking a picture of the presentation
|
<urn:uuid:305cb8cb-1072-4f2c-a0a6-128e77e27bfd>
|
CC-MAIN-2016-26
|
http://information-literacy.blogspot.com/2013/03/using-visual-literacy-in-teaching-and.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393533.44/warc/CC-MAIN-20160624154953-00084-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.968472
| 409
| 2.71875
| 3
|
The End of Antibiotics. Can We Come Back from the Brink?Posted on by
This post originally appeared in The Health Care Blog.
Antibiotic resistance — bacteria outsmarting the drugs designed to kill them — is already here, threatening to return us to the time when simple infections were often fatal. How long before we have no effective antibiotics left?
It’s painfully easy for me to imagine life in a post-antibiotic era. I trained as an internist and infectious disease physician before there was effective treatment for HIV, and I later cared for patients with tuberculosis resistant to virtually all antibiotics.
We improvised, hoped, and, all too often, were only able to help patients die more comfortably.
To quote Dr. Margaret Chan, Director General of the World Health Organization: “A post-antibiotic era means, in effect, an end to modern medicine as we know it.”
We’d have to rethink our approach to many advances in medical treatment such as joint replacements, organ transplants and cancer therapy, as well as improvements in treating chronic diseases such as diabetes, asthma, rheumatoid arthritis and other immunological disorders.
Treatments for these can increase the risk of infections, and we may no longer be able to assume that we will have effective antibiotics for these infections.
Last September, CDC published our first report on the current antibiotic resistance threat to the United States.
The report conservatively estimates that each year, at least 2 million Americans become infected with bacteria resistant to antibiotics, and at least 23,000 die. Another 14,000 Americans die each year with the complications of C. difficile, a bacterial infection most often made possible by use of antibiotics. WHO has just issued their report on the global impact of this health threat.
It’s a big problem, and one that’s getting worse. But it’s not too late. We can delay, and even in some cases reverse the spread of antibiotic resistance.
Clinicians, health care facility leaders, public health leaders, agriculture leaders and farmers, policymakers, and patients all have key roles to play.
The FY 2015 President’s Budget requests $30 million for the CDC’s Detect and Protect Against Antibiotic Resistance Initiative (known as the AR Initiative), part of a broader CDC strategy to target investment and achieve measurable results in four core areas:
Detect and track patterns of antibiotic resistance.
A new five-region lab network, if funded, will speed up our ability to detect the most concerning resistance threats. The network would increase susceptibility testing for high priority bacteria and keep pace with rapidly mutating bacteria so labs are ready to respond to new threats as they emerge.
A new public data portal will show national trends as well as variations in rates of antibiotic prescribing and resistance among states and regions. An increase of $15 million in the FY 2015 President’s Budget for CDC’s National Healthcare Safety Network (NHSN) will allow full implementation of electronic tracking data from U.S. hospitals on antibiotic use and resistant bacteria. (I’ll talk more about this in a future post.)
Respond to outbreaks involving antibiotic-resistant bacteria.
Enhanced information from hospitals and the new lab network will help detect outbreaks that might previously have gone unnoticed. We’ll be able to better track the movement and evolution of bacteria, helping local and state responders better prepare for and stop outbreaks of antibiotic-resistant bacteria.
Prevent infections, prevent resistant bacteria from spreading, and improve antibiotic prescribing.
We’re establishing AR Prevention Collaboratives, groups of health care facilities around the country working together to implement best practices for inpatient antibiotic prescribing and preventing infections. Hospitals, long-term acute care hospitals, and nursing homes can all work together to protect patients from drug-resistant infections as patients move between medical facilities in a community.
They’ll scale up or extend the reach of interventions proven to reduce or stop antibiotic-resistant threats, improving antibiotic prescribing and stewardship programs and ultimately reduce antibiotic resistance.
Discover new antibiotics and new diagnostic tests for resistant bacteria.
Because antibiotic resistance occurs as part of the natural evolutionary process of bacteria, it can be slowed but not completely stopped. New antibiotics and therapies will always be needed to keep up with resistant bacteria, as will new tests to track the development of resistance.
To support these efforts, CDC will create a Resistance Bacteria Bank that will make drug-resistant samples available to diagnostic manufacturers, pharmaceutical companies, and biotech firms to develop new diagnostic tests and evaluate new antibiotic agents and therapies.
Exciting new molecular diagnostics may be able to determine if patients have an infection, and whether it is resistant, within hours instead of days, allowing treatment to be tailored to the patient’s particular infection.
With $30 million annual funding over the next five years, CDC’s AR Initiative could cut the deadliest resistant organism, CRE, in half, and also cut healthcare-associated C. difficile in half, saving at least 20,000 lives, preventing 150,000 hospitalizations, and cutting more than $2 billion in health care costs.
Other projected outcomes include a 30 percent reduction in healthcare-associated multidrug-resistant Pseudomonas; a 30 percent reduction in invasive MRSA; and a 25 percent reduction in MDR Salmonella infections.
Urgent action is needed now by everyone who manufactures, prescribes, or uses antibiotics. Drug development for new antibiotics and antifungals is necessary but not sufficient to deal with our antibiotic resistance threats.
Doctors and health care systems need to improve prescribing practices. And patients need to recognize that there are both risks and benefits to antibiotics – more medicine isn’t best, the right medicine at the right time is best.
Consider this a down payment for our country to start tackling our biggest drug-resistant threats. The actual funding needed to effectively address all of our drug-resistant threats will likely be many times this amount.
But with this type of significant public health investment, we can open a new chapter in the fight against resistance.
- Page last reviewed:May 6, 2014
- Page last updated:May 6, 2014
- Content source:
|
<urn:uuid:312e8f87-a597-4fa8-a7bf-0991a8f30476>
|
CC-MAIN-2016-26
|
http://blogs.cdc.gov/cdcdirector/2014/05/05/the-end-of-antibiotics-can-we-come-back-from-the-brink/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398075.47/warc/CC-MAIN-20160624154958-00023-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.915138
| 1,284
| 2.640625
| 3
|
When I discuss SQL Server security, one of the basic concepts I concentrate on is the difference between logins and users with respect to SQL Server. As of SQL Server 2005, Microsoft introduced new terminology, that of server and database principals. So the mappings look like:
However, when you look at the T-SQL given to create these objects within SQL Server, and the T-SQL was also introduced in SQL Server 2005, you find that they are CREATE LOGIN and CREATE USER respectively. So logins and users will remain a part of the nomenclature for the foreseeable future. Because of this, and because we are often very ambiguous when we use the term USER, I looked for a way to better communicate what SQL Server means when it uses LOGIN and when it uses USER. I finally came up with the self-storage facility model, which seems to work well. For instance:
In order to get into most self-storage facilities, you usually have to enter a code. For instance, there's a keypad at the gate of one such self-storage facility.
You can see the individual self-storage units inside. If the facility itself is considered the SQL Server and the individual self-storage units are the databases, then the first thing you must do is enter the facility. You do so by typing in the passcode. This is the equivalent to having a login. A login allows you to enter the SQL Server. However, that doesn't mean you have any access to any of the individual self-storage units, aka databases. That's because when we do a close-up on the storage units, we see:
Along the right side there's the place for a lock (or multiple locks) to go. We'll assume just one. In order to get into the unit, you have to be able to open the lock. In the real world that means either having the key or having the combination. Once you open the lock, you can enter the facility. This corresponds to having a user account in the database. For each database where you have the "keys" (you are a user), you can enter.
So what about master, msdb, and tempdb? Well, in those cases everyone comes in as guest (with the exception of members of the sysadmin role or anyone who has been granted CONTROL SERVER rights, in which case you come in as dbo). That's easy to fit into this model, too. Those are storage units where there is no lock. Everyone who can enter the server can get into them. And that's by design.
Now once you're in the database, there are permissions at the schema level, on the individual objects, etc. Once you get into a storage unit, there's nothing stopping someone from putting a safe, a locked box, or some other secured storage container in place. If you think of tables, stored procedures, schemas, and the like as those individual components that can fit inside the storage unit, that completes the model.
|
<urn:uuid:912a529f-2cf6-46b6-951d-18f85a0b940c>
|
CC-MAIN-2016-26
|
http://www.sqlservercentral.com/blogs/brian_kelley/2009/04/21/sql-server-security-basics-logins-vs-users/print/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783392099.27/warc/CC-MAIN-20160624154952-00031-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.958103
| 622
| 2.515625
| 3
|
I'm guessing you brush twice a day or aspire to. Our ancestors were a little less diligent. But that's a good thing for scientists. Because ancient, plaque-coated teeth are like time capsules, preserving early evidence of cavities or even plague DNA.
Now researchers have turned to thousand-year-old teeth from a convent cemetery outside Frankfurt, Germany. And they cleaned 'em, much like your dentist does.
"We used the same dental tools, and collected the calculus from the teeth." That's molecular anthropologist Christina Warinner of the University of Oklahoma. Inside that calculus—or plaque—she and her colleagues found tiny bits of pork, bread wheat and cabbage, identified by their DNA. Along with the bugs behind strep throat, bacterial meningitis and an oral strain of gonorrhea. And don't be too quick to judge. "Nearly all of us still have gonorrhea in our mouth." Their study is in the journal Nature Genetics. [Christina Warinner et al., Pathogens and host immunity in the ancient human oral cavity]
Some of those bugs were antibiotic resistant too. Because long before penicillin, some microbes produced natural antibiotics to attack rivals. "Your mouth is like a battlefield of bacteria." So chew on that.
[The above text is a transcript of this podcast.]
|
<urn:uuid:d8da6e3f-086b-4cc5-af55-90a0dd70527b>
|
CC-MAIN-2016-26
|
http://www.scientificamerican.com/podcast/episode/1000-year-old-teeth-reveal-diet-and-disease/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397636.15/warc/CC-MAIN-20160624154957-00139-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.930022
| 271
| 3.296875
| 3
|
Help support New Advent and get the full contents of this website as an instant download. Includes the Catholic Encyclopedia, Church Fathers, Summa, Bible and more all for only $19.99...
(Anglo-Saxon Biscop, Busceop, German Bischof; from the Greek episkopos, an overseer, through Latin episcopus; Italian vescovo; Old French vesque; French évêque).
It is of Catholic faith that bishops are of Divine institution. In the hierarchy of order they possess powers superior to those of priests and deacons; in the hierarchy of jurisdiction, by Christ's will, the are appointed for the government of one portion of the faithful of the Church, under the direction and authority of the sovereign pontiff, who can determine and restrain their powers, but, not annihilate them. They are the successors of the Apostles, though they do not possess all the prerogatives of the latter. (Council of Trent, Sess. XXIII, ch. iv; can. vi, vii. See APOSTOLIC COLLEGE.) The episcopate is monarchical. By the Will of Christ, the supreme authority in a diocese does not belong to a college of priests or of bishops, but it resides in the single personality of the chief.
The subject will be treated under five heads:
The historical origin of the episcopate is much controverted: very diverse hypotheses have been proposed to explain the texts of the inspired writings and of the Apostolic Fathers relating to the primitive ecclesiastical hierarchy. They are most easily found in the work of von Dunin-Borkowski, on the latest researches concerning the origin of the episcopate (Die Neuren Forschungen uber die Anfange des Episkopats, Frieburg, 1900). The Apostolic and consequently the Divine origin of the monarchical episcopate has always been contested but especially so since Protestantism put forward the doctrine of a universal Christian priesthood. At the present day, rationalistic and Protestant writers, even those who belong to the Anglican Church, reject the Apostolic institution of the episcopate; many of them relegate its origin to the second century. Loning attempts to prove that originally there were several different organizations, that some Christian communities were administered by a body of presbyters, others by a college of bishops, others again by a single bishop. It is the last named form of organization, he declares, which has prevailed (Gemeindeverfassung des Urchristentums. Halle, 1889). Holtzmann thinks that the primitive organization of the churches was that of the Jewish synagogue; that a college of presbyters or bishops (synonymous words) governed the Judaeo Christian communities; that later this organization was adopted by the Gentile churches. In the second century one of these presbyter-bishops became the ruling bishop. The cause of this lay in the need of unity, which manifested itself when in the second century heresies began to appear. (Pastoralbriefe, Leipzig, 1880.) Hatch, on the contrary, finds the origin of the episcopate in the organization of certain Greek religious associations, in which one meets with episkopoi (superintendents) charged with the financial administration. The primitive Christian communities were administered by a college of presbyters; those of the presbyters administered the finances were called bishops. In the large towns, the whole financial administration was centralized in the hands of one such officer, who soon became the ruling bishop (The Organization of the Early Christian Churches, Oxford, 1881). According to Harnack (whose theory has varied several times), it was those who had received the special gifts known as the charismata, above all the gift of public speech, who possessed all authority in the primitive community. In addition to these we find bishops and deacons who possess neither authority nor disciplinary power, who were charged solely with certain functions relative to administration and Divine worship. The members of the community itself were divided into two classes: the elders (presbyteroi) and the youths (neoteroi). A college of presbyters was established at an early date at Jerusalem and in Palestine, but elsewhere not before the second century; its members were chosen from among the presbyteroi, and in its hands lay all authority and disciplinary power. Once established, it was from this college of presbyters that deacons and bishops were chosen. When those officials who had been endowed with the charismatic gifts had passed away, the community delegated several bishops to replace them. At a later date the Christians realized the advantages to be derived from entrusting the supreme direction to a single bishop. However, as late as the year 140, the organization of the various communities was still widely divergent. The monarchic episcopate offers its origin to the need of doctrinal unity, which made itself felt at the time of the crisis caused by the Gnostic heresies.
J.B. Lightfoot, who may be regarded as an authoritative representative of the Anglican Church, holds a less radical system. The Primitive Church, he says, had no organization, but was very soon conscious of the necessity of organizing. At first the apostles appointed deacons; later, in imitation of the organization of the synagogue, they appointed presbyters, sometimes called bishops in the Gentile churches. The duties of the presbyters were twofold: they were both rulers and instructors of the congregation. In the Apostolic age, however, traces of the highest order, the episcopate properly so called, are few and indistinct. The episcopate was not formed from the Apostolic order through the localization of the universal authority of the Apostles, but from the presbyteral (by elevation). The title of bishop originally common to all came at length to be appropriated to the chief among them. Within the period compassed by the Apostolic writings, James, the brother of the Lord, can alone claim to be regarded as a bishop in the later and more special sense of the term. On the other hand, through especially prominent in the Church of Jerusalem, he appears in the Acts as a member of the body. As late as the year 70; no distinct signs of episcopal government yet appeared in Gentile Christendom. During the last three decades of the first century, however, during the lifetime of the latest surviving Apostle, St. John, the episcopal office was established in Asia Minor. St. John was cognizant of the position of St. James at Jerusalem. When therefore, he found in Asia Minor manifold irregularities and threatening symptoms of disruption, he not unnaturally encouraged in these Gentile churches an approach to the organization, which had been signally blessed and had proved effectual in holding together the mother-church of Jerusalem amid dangers no less serious. The existence of a council or college necessarily supposes a presidency of some kind, whether this presidency be assumed by each member in turn, or lodged in the hands of a single person. It was only necessary, therefore, to give permanence, definiteness, stability to an office the germ of which already existed. There is no reason, however, for supposing that any direct ordinance was issued to the churches by St. John. The evident utility and even pressing need of such an office, sanctioned by the most venerated name in Christendom, would be sufficient to secure its wide though gradual reception. The earliest bishops, however, did not hold the position of independent supremacy which was and is occupied by their later representatives. This development is most conveniently grasped in connection with three great names: Ignatius, Irenaeus, and Cyprian, who represent as many successive advances towards the supremacy ultimately attained. By Ignatius the bishop is regarded as the centre of unity; to Irenaeus he is the depositary of primitive truth; to Cyprian, he is the absolute vicegerent of Christ in things spiritual (Lightfoot, The Christian Ministry, 181-269, in his commentary on St. Paul's Epistle to the Philippians, London, 1896).
Catholic writers agree in recognizing the Apostolic origin of the episcopate, but are much divided as to the meaning of the terms which designate the hierarchy in the New Testament writings and the Apostolic Fathers. One may even ask if originally these terms had a clearly defined significance (Bruders, Die Verfassung der Kirche bis zum Jahre 175, Mainz, 1904). Nor is there greater unanimity when an attempt is made to explain why some churches are found without presbyters, others without bishops, others again where the heads of the community are called sometimes bishops, sometimes presbyters. This disagreement increases when the question comes up as to the interpretation of the terms which designate other personages exercising a certain fixed authority in the early Christian communities. The following facts may be regarded as fully established:
During the first three centuries, the entire religious life of the diocese centered around the person of the bishop. The priests and deacons were his auxiliaries but they worked under the immediate direction of the bishop. In large cities, however, like Rome, it was soon found necessary to hand over permanently to the priests and deacons certain definite functions. Moreover, as a result of the spread of Christianity outside the great centres of population, the bishop gradually left to other ecclesiastics the administration of a fixed portion of the diocesan territory. In the East, at first bishoprics were created in all districts where there was a considerable number of Christians. But this system presented great inconveniences. To distant or rural localities, therefore, the Church sent bishops, who were only the delegates of the bishop of the city, and who did not possess the right of exercising the most important powers of a bishop. Such bishops were known as Chorepiscopi or rural bishops. Later on, they were replaced by priests (Gillman, Das Institut der Chorbischöfe im Orient, Munich, 1003). The establishment of parishes from the fourth and the fifth century on gradually freed the bishops from many of their original charges; they reserved to themselves only the most important affairs, i.e. those which concerned the whole diocese and those which belonged to the cathedral church. However, above all other affairs, the bishops retained the right of supervision and supreme direction. While this change was taking place, the Roman Empire, now Christian, granted bishops other powers. They were exclusively empowered to take cognizance of the misdemeanors of clerics, and every lawsuit entered into against the latter had to be brought before the bishop's court. The Emperor Constantine often permitted all Christians to carry their lawsuits before the bishop, but this right was withdrawn at the end of the fourth century. Nevertheless, they continued to act as arbitrators, which office the earliest Christians had committed to them. More important, perhaps, is the part which the Roman law assigns to the bishops as protectors of the weak and oppressed. The master was permitted to legally emancipate his slave in the bishop's presence; the latter had also the power to remove young girls from immoral houses where their parents or masters had placed them, and to restore them to liberty. Newly born infants abandoned by their parents were legally adjudged to those who sheltered them, but to avoid abuses it was required that the bishop should certify that the child was a foundling. The Roman law allowed the bishops the right to visit prisons at their discretion for the purpose of improving the condition of prisoners and of ascertaining whether the rules in favour of the latter were observed. The bishops possessed great influence over the Christian emperors, and though in the Eastern Church these intimate relations between Church and State led to Casaropapism, the bishops of the West preserved in a great measure their independence of the Empire (Löning, Geschichte des deutschen Kirchenrechts, Strasburg, 1878, I, 314-331; Troplong, De l'influence du christianisme sur le droit civil des Romains, Paris, 1842, new ed., 1902).
The authority of the bishop was even greater after the barbarian invasions; among the Germanic peoples he soon became an influential and powerful personage. He inspired confidence and commanded respect. He was beloved for he protected the young and the weak, he was the friend of the poor, was accustomed to intercede on behalf of the victims of injustice, and especially on behalf of orphans and women. Through his influence, in many spheres, he became the real master of the episcopal city. The only functionaries whose authority was comparable with that of the bishop were the dukes and the counts, representatives of the king. In certain districts the preeminence showed itself clearly in favour of the bishop; in some cities the bishop became also count. In France, as a general rule, this state of affairs did not continue, but in Germany many bishops became temporal lords or princes. Finally, the bishop acquired an extensive civil jurisdiction not only over his clergy but also over the laity of his diocese (Viollet, Histoire des institutions politiques de la France, Paris, 1890, I. 380-409). Such an exalted position was not without its difficulties. One of the gravest was the interference of the lay authority in the election of bishops. Until the sixth century the clergy and the people elected the bishop on condition that the election should be approved by the neighbouring bishops. Undoubtedly, the Christian Roman emperors sometimes intervened in these election, but outside the imperial cities only, and generally in the case of disagreement as to the proper person.
As a rule they contented themselves with exercising an influence on the electors. But from the beginning of the sixth century, this attitude was modified. In the East the clergy and the primates, or chief citizens, nominated three candidates from whom the metropolitan chose the bishop. At a later date, the bishops of the ecclesiastical province assumed the exclusive right of nominating the candidates. In the West, the kings intervened in these elections, notably in Spain and Gaul, and sometimes assumed the right of direct nomination (Funk, "Die Bischofswahl im christlichen Altertum und im Anfang des Mittelalters" in "Kirchengeschichtliche Abhandlungen und Untersuchungen", Paderborn: 1897, I, 23-39; Imbart. de la Tour. "Les élections épiscopales dans l'ancienne France", Paris, 1890). This interference of princes and emperors lasted until the quarrel about Investitures, which was especially violent in Germany, where from the ninth to the eleventh centuries abbots and bishops had become real temporal princes. (See INVESTITURE.) The Second Lateran Council (1139) handed over to the chapter of the cathedral church the sole right of choosing the bishop, and this legislation was sanctioned by the Decretals (Decretum Gratiani. P. I., Dist. lxiii, ch. xxxv; ch. iii. De causa possessionis et proprietatis, X, II, xii; ch. liv, De electione et electi potestate, X, I, vi; Friedberg, Corpus Juris Canonici, Leipzeig, 1879-81, I, 247, II, 95,276) The bishops of the Middle Ages acquired much temporal power, but this was accompanied by a corresponding diminution of their spiritual authority. By the exercise of the prerogative of the primacy the Holy See reserved to Itself all the most important affairs, the so-called causae majores, as for instance the canonization of saints (ch. i, De reliquiis X, III, xlv; Friedberg, II, 650), the permission to venerate publicly newly discovered relics, the absolution of certain grave sins, etc. Appeals to the pope against the judicial decisions of the bishops became more and more frequent. The religious orders and the chapters of cathedral and collegiate churches obtained exemption from episcopal authority. The cathedral chapter obtained a very considerable influence in the administration of the diocese. The pope reserved also to himself the nomination of many ecclesiastical benefices (C. Lux. Constitutionum apostolicarum de generali beneficiorum reservatione collectio et Breslau, 1904). He also claimed the right to nominate the bishops, but in the German Concordat of 1448 he granted the chapters the right to elect them, while in that of 1516 he permitted the King of France to nominate the bishops of that nation. Subsequently the Council of Trent defined the rights of the bishop and remedied the abuses which had slipped into the administration of dioceses and the conduct of bishops. The council granted them the exclusive right of publishing indulgences; it also impressed upon them the obligation of residence in their dioceses, the duty of receiving consecration within three months after their elevation to the episcopate, of erecting seminaries, of convoking annual diocesan synods, of assisting at, provincial synods, and of visiting their dioceses. It also forbade them to cumulate benefices, etc. The same council diminished exceptions from episcopal authority, and delegated to the bishops some of the rights which in the past the Holy See had reserved for itself. Subsequent pontifical acts completed the Tridentine legislation, which is still valid. Protestantism and at a later date the French Revolution destroyed all temporal power of the bishops; thenceforth they were free to consecrate themselves with greater earnestness to the duties of their spiritual ministry.
Two classes of bishops must be distinguished, not with regard to the power of order, for all bishops receive the fullness of the priesthood but with regard to the power of jurisdiction: the diocesan bishop and the titular bishop or, as he was called before 1882 the episcopus in partibus infedelium. The former is here considered. Those belonging to the second class cannot perform any episcopal function without the authorization of the diocesan bishop; for as titular bishops there have no ordinary jurisdiction. They can; however, act as auxiliary bishops, i.e. they may be appointed by the pope to assist a diocesan bishop in the exercise of duties arising from the episcopal order but entailing no power of jurisdiction. (See AUXILIARY BISHOP.) Such a bishop is also called vicarius in pontificalibus, i.e. a representative in certain ceremonial acts proper to the diocesan bishop, sometimes suffragan bishop, episcopus suffraganeus. In the proper sense of the term, however, the suffragan bishop is the diocesan bishop in his relations with the metropolitan of the ecclesiastical province to which he belongs, while the bishop who is independent of any metropolitan is called an exempt bishop, episcopus exemptus. The titular bishop may also be coadjutor bishop when he is appointed to assist an ordinary bishop in the administration of the diocese. Sometimes he is incorrectly called auxiliary bishop. He possesses some powers of jurisdiction determined by the letters Apostolic appointing him. Often also, notably in missionary countries, the coadjutor bishop is named cum jure successionis, i.e. with the right of succession; on the death of the diocesan bishop he enters on the ordinary administration of the diocese.
The Council of Trent determined the conditions to be fulfilled by candidates for the episcopate, of which the following are the principal: birth in lawful wedlock, freedom from censure and irregularity or any defect in mind, purity of personal morals, and good reputation. The candidate must also be fully thirty years of age and have been not less than six months in Holy orders. He ought also to have the theological degree of Doctor or at least be a licentiate in theology or canon law or else have the testimony of a public academy or seat of learning (or, if he be a religious, of the highest authority of his order) that he is fit to teach others (c. vii, De electione et electi potestate, X.I. vi; Friedberg, II, 51. Council of Trent. Sess. XXII, De ref., ch. ii). The Holy Office is charged with the examination of persons called to the episcopate, with the exception of the territories subject to the Congregation of the Propaganda or to the Congregation of Extraordinary Ecclesiastical Affairs, or of those countries where the nomination of bishops is governed by special laws and concordats ("Motu Proprio" of Pope Pius X. 17 December, 1903; "acta sanctae Sedis, 1904, XXXVI, 385). We have said that the Decretals recognize the right of the cathedral chapters to elect the bishop. This right has long been long withdrawn and is no longer in force. In virtue of the second rule of the Papal Chancery the choice of bishops belongs exclusively to the pope (Walter, Fontes juris eccesiastici antiqui et hodierni, Bonn, 1861, 483) Exceptions to this rule, however, are numerous. In Austria (with the exception of some episcopal sees), in Bavaria, in Spain, in Portugal and in Peru, the Government presents to the sovereign pontiff the candidates for the episcopate. It was so in France, and in several South American Republics before the rupture or denunciation of the concordats between the states and the Apostolic See. By the cessation of these concordats such states lost all right of intervention in the nomination of bishops; this does not, however prevent the Government in several South American Republics from recommending candidates to the sovereign pontiff. The cathedral chapter is authorized to elect the bishop in several dioceses of Austria, Switzerland, Prussia, and in some States of Germany, notably in the ecclesiastical province of the Upper Rhine. The action of the electors, however, is not entirely free. For example, they may not choose persons distasteful to the Government (Letter of the Cardinal Secretary of State to the Chapters of Germany, 20, July 1900; Canonist Contemporain, 1901, XXIV, 727). Elsewhere the pope himself nominates bishops, but in Italy the Government insists that they obtain the royal exequatur before taking possession of the episcopal see. In missionary countries the pope generally permits the "recommendation" of candidates, but this does not juridically bind the sovereign pontiff, who has the power to choose the new bishop from persons not included in the list of recommended candidates. In England the canons of the cathedral select by a majority of the votes, at three successive ballots, three candidates for the vacant episcopal see. Their names, arranged in alphabetical order, are transmitted to the Propaganda and to the archbishop of the province, or to the senior suffragan of the province, if the question is one of the election of an archbishop. The bishops of the province discuss the merits of the candidates and transmit their observations to the Propaganda. Since 1847 the bishops are empowered, if they so desire, to propose other names for the choice of the Holy See, and a decision of the Propaganda (25 April, 3 May, 1904) confirms this practice (Instruction of Propaganda, 21 April, 1852; "Collectanea S. C. de Propagandâ Fide", Rome, 1893. no. 42; Taunton, 87-88). Analogous enactments are in force in Ireland. The canons of the cathedral and all the parish priests free from censure and in actual and peaceful possession of their parish or united parishes, choose in a single ballot three ecclesiastics. The names of the three candidates who have obtained the greatest number of votes are announced and forwarded to the Propaganda and to the archbishop of the province. The archbishop and the bishops of the province give the Holy See their opinion on the candidates. If they judge that none of the candidates is capable of fulfilling the episcopal functions no second recommendation is to be made. If it is a question of the nomination of a coadjutor bishop with the right of succession the same rules are followed, but the presidency of the electoral meeting, instead of being given to the metropolitan, his delegate, or the senior bishop of the province, belongs to the bishop who asks for the coadjutor (Instruction of Propaganda, 17 September, 1829, and 25 April, 1835; "Collectanea," nos. 40 and 41). In Scotland, where there is no chapter of canons, they follow the rules as in England; and when there is no chapter, the bishops of Scotland and the archbishops of Edinburgh and Glasgow choose by a triple ballot the three candidates. The names of these latter are communicated to the Holy See together with the votes which each candidate has obtained. At the same time is transmitted useful information about each of them according to the questions determined by the Propaganda (Instruction of the Propaganda, 25 July, 1883; "Collectanea". no. 45). In the United States of America the diocesan consultors and the irremovable rectors of the diocese assemble under the presidency of the archbishop or the senior bishop of the province, and choose three candidates, the first dignissimus, the second dignior, and the third digmus. Their names are sent to the Propaganda and to the archbishops of the province; the archbishop and the bishops the province examine the merits of the candidates proposed by the clergy and in their turn, by a secret ballot propose three candidates. If they choose other candidates than those designated by the clergy, they indicate their reasons to the Propaganda. In the case of the nomination of a coadjutor with right of succession, the meeting of the clergy is presided over by the bishop who demands a coadjutor. If it concerns a newly created diocese, the consulters of all the dioceses from whose territory the new diocese was formed and all the irremovable rectors of the new diocese choose the three candidates of the clergy. Finally, if it is a matter of replacing an archbishop or of giving him a coadjutor with right of succession all the metropolitans of the United States are consulted by the Propaganda (Decree of Propaganda, 21 January, 1861, modified by that of 31 September, 1885; Collectanea, no. 43). In Canada by a decree of 2 December, 1862, the Church still follows the rules laid down by the Propaganda on 21 January, 1861, for the United States (Collectanea. no. 43; Collectio Lacensis 1875, III, 684, 688). Every three years the bishops must communicate to the Propaganda and to the metropolitan the names of the priests they think worthy of episcopal functions. In addition, each bishop must designate in a secret letter three ecclesiastics whom he believes worthy to succeed him. When a vacancy occurs, all the bishops of the province indicate to the archbishop or to the senior bishop the priests whom they consider recommendable. The bishops then discuss in a meeting the merits of each of the priests recommended, and proceed to the nomination of the candidates by secret vote. The acts of the assembly are transmitted to the Propaganda. In Australia, a method similar to that in use in the United States is followed. Two differences, however, are to be noted: first the bishops still signify every three years, to the metropolitan and to the Propaganda the names of the priests whom they consider worthy of the episcopal office. Second, when the nomination of a coadjutor bishop is in question, the presidency over the assembly of consultors and irremovable rectors belongs not to the bishop who demands a coadjutor, but to the metropolitan or to the bishop delegated by him (Instruction of Propaganda, 19 May, 1866, modified by the decree of 1 May, 1887; Collectanea, no. 44).
Whatever the manner of his nomination, the bishop possesses no power until his nomination has been confirmed by the Holy See, whether in consistory or by pontifical letters. Moreover, he is forbidden to enter on the administration of his diocese therefore taking possession of his see by communication to the cathedral chapter the letters Apostolic of his nomination (Const. "Apostolicae Sedis", 12 October, 1869, V, i; "Collectanea", no. 1002). From this moment, even before his consecration, the new bishop is entitled in his diocese to all rights of jurisdiction. He is required to make the prescribed profession of faith in the first provincial synod held after his elevation (Council of Trent, Sess., XXV, De ref., ch. ii). Finally, he is obliged within the space of three moths to receive episcopal consecration. The right of consecrating a bishop belongs to the sovereign pontiff, who generally permits the newly elected to be consecrated by three bishops of his own choice. However, if the consecration takes place in Rome, he must select a cardinal or one of the major patriarchs residing at Rome. If however, his own metropolitan is at that time in Rome, he would be obliged to choose him. The consecration ought to take place on a Sunday or on the feast of an Apostle, by preference in the cathedral church of the diocese or at least within the ecclesiastical province (Council of Trent, Sess., XXIII, De ref., ch. ii). Before consecration, the bishop must take an oath of fidelity to the Holy See. (For the formula of this oath for the bishops of the United States of America see "Acta et Decreta conc. Plen. Balt., III", Baltimore, 1886. Appendix, 202.) Consecration by a single bishop would not be invalid but would be illicit. However, the bishops of South America have the privilege of being consecrated by one bishop assisted by two or three priests, if it prove difficult for them to obtain three bishops (Letters Apostolic of Leo XIII "Trans Oceanum", 18 April 1897; "Acta Sanctae Sedis", 1896-97, XXIX, 659). Episcopal consecration has the effect of giving to the bishop the full powers of Order. (See Holy Orders.)
The bishop possesses, as already stated, the powers of order and jurisdiction. The power of order comes to him through episcopal consecration, but the exercise of this right depends on his power of jurisdiction. The sacerdotal ordination performed by every duly consecrated bishop is undoubtedly valid, yet the bishop can ordain only in conformity with the enactments of canon law. Only the bishop can confer major orders. The question has been discussed, as to whether the pope could delegate to a priest, for example the abbot of a monastery, the power to ordain a deacon. The bishop is the only ordinary minister of the Sacrament of Confirmation (Council of Trent, Sess. XXIII, can. vii). Ecclesiastical law has reserved certain benedictions and consecrations to him, viz., those which are performed with holy oil. The following functions are reserved to the bishop: the dedication of a church, the consecration of an altar, of chalices and patens, and generally of the articles serving for the celebration of Holy Mass, the reconciliation of a desecrated church, the benediction of bells, the benediction of an abbot, the benediction of the holy oils, etc. A bishop is forbidden to exercise the Pontificalia i.e. to perform episcopal functions in another diocese without the consent of the ordinary, i.e. the proper bishop (Council of Trent, Sess. VI, De ref., ch. v).
Besides the power of order, bishops possess that of jurisdiction; they have the right to prescribe for the faithful the rules which the latter must follow in order to obtain eternal salvation. The power of jurisdiction is of Divine origin, in the sense that the pope is held to establish in the Church bishops whose mission it is to direct the faithful in the way of salvation. The bishops have then in their dioceses an ordinary jurisdiction, limited, however, by the rights that the pope can reserve to himself in virtue of his primacy. But this jurisdiction is independent of the will and consent of the faithful, and even of the clergy. In certain important matters, however, the bishop must at times seek the advice, at other times the consent, of the cathedral chapter. In certain countries where chapters are not established, the bishop is bound to consult in some specified cases the consultores cleri dioecesani, or diocesan consultors (Third council of Baltimore, nos. 17-22, 33, 179). On the other hand, certain classes of persons, especially the regulars properly so called, are exempt from episcopal authority, and certain matters are removed from the bishops jurisdiction. Moreover, he has no power against the will of a superior authority, i.e. the pope, the councils, whether general, plenary, or provincial. The Bishop possess also other important powers through "delegated" jurisdiction which is accorded to him either by law, whether written or established through the Roman Congregations. The last named jurisdiction he exercises in the name of the Apostolic See (see below). Certain writers attribute to the bishop a third kind of jurisdiction which they call "quasi-ordinary" jurisdiction, but there are wide differences as to the definitions of this kind of jurisdiction. Several writers (such as: Wernz, II, 10; Bargilliat, "Praelect. ju. can.", Paris, 1900, I, 164; and amoung the older canonists, Boix, "De princep. juris canonici", Paris, 1852, 530) think that this distinction is useless; the jurisdiction known as quasi-ordinary is nothing else than an ordinary or delegated jurisdiction granted by written law or by custom.
It is a controverted question whether the bishops hold their jurisdiction directly from God or from the sovereign pontiff. The latter opinion, however, is almost generally admitted at the present day, for it is more in conformity with the monarchical constitution of the Church, which seems to demand that there should be no power in the Church not emanating immediately from the sovereign pontiff. Authors who hold the contrary opinion say that it is during the episcopal consecration that bishops receive from God their power of jurisdiction. But habitually before their consecration the bishops have already all powers of jurisdiction over their dioceses (Bargilliat, I, 442-445). Another question also discussed is whether the potestas magisterii, or teaching authority, is a consequence of the power of order or of jurisdiction (Sägmüller, Lehrbuch des katholischen Kirchenrechts, Frieberg, 1900-04, 24-25). Whatever the conclusion, teaching authority will here be ranked among the powers of jurisdiction. The teaching authority of the bishop and his governing authority (potestas regiminis) will now be successively considered, the latter comprising the legislative, dispensative, judicial, coercive, and administrative powers.
By Divine law bishops have the right to teach Christian doctrine (Matthew 28:19; Council of Trent, Sess. XXIV, De ref., ch. iv; Encyclical of Leo XIII, "Sapientiae christianae", 10 January, 1890; "Acta Sanctae Sedis": 1890, XXXII, 385). At the same time, the obligation of instructing the faithful either personally or, if hindered, through other ecclesiastics is incumbent upon them. They are bound also to see that in the parish churches the parish priests fulfil the requirements of preaching and teaching which the Council of Trent imposes on them (Sess. V, De ref., ch. ii; Sess. XXIV, De ref. ch. iv). The bishop must also supervise the teaching of Christian doctrine in the seminaries, as well as in secondary and primary schools (Conc. Balt. III, nos. 194 sqq.; Const. "Romanos pontifices", 8 May, 1881; op. cit., Appendix, 212). In virtue of this right of superintendence, and because of the intimate relations which exist between instruction and education, the bishop is empowered to forbid attendance at undenominational schools, at least in those districts where Catholic schools exist, and where attendance at the former schools is dangerous. In virtue of the same right he will very often be bound to erect Catholic schools or favour their establishment (Third Council of Baltimore, nos. 194-213). No one is allowed to preach Christian doctrine without the consent of the bishop, or at least without his knowledge if it is a question of exempt religious preaching in their own churches (Council of Trent, Sess. V, De ref., ch., ii; Sess. XVIV, De ref., ch. iv). The Bishop has power to supervise writings published or read in his diocese; works regarding the sacred sciences are subject to his approbation; he may forbid the reading of dangerous books and newspapers. He exercises a special control over the publications of the secular clergy, who are bound to consult him before undertaking the direction of newspapers or of publishing works even upon profane matters (Const. of Leo XIII, "Officiorum et munerum", 25 January, 1897; Vermeersch, "De probitione et censura liborum", 4th ed., Rome, 1906). He has the right of special supervision over the manuals used in educational establishments, and as far as possible he will encourage the publication of good books and good newspapers (Third Council of Baltimore, nos. 210,220, 221, 225, 226). The bishop is the Inquisitor natus or protector of the faith for his diocese. He has not, it is true, the right to define, outside an ecumenical council, controverted questions with regard to faith and morals, but when a heated discussion arises in his diocese, he can impose silence upon the parties concerned while awaiting a decision from the Holy See. If anyone, however, denies a point of doctrine defined by the Church, even though it be all exempt religious, the bishop will have the power to punish him (Council of Trent, Sess. V, De ref., ch. ii; Sess. XXIV, De ref., ch, iii). He must likewise guard the faithful of his diocese against dangerous societies condemned by the Holy See (Third Council of Baltimore, nos. 244-255).
(1) Legislative Power
The bishop can enact for his diocese those laws which he considers conducive to the general good. Though he is not bound to convoke a synod for this purpose, his legislative power is not absolute. He cannot legislate contra jus commune, i.e. enact a law contrary to the general law of the Church, written or established by custom, or to the decisions of general, plenary, or provincial councils. This is on the principle that an inferior cannot act contrary to the will of his superiors (ch. 11, "De electione et electi potestate", I, iii, in the Clementines; Friedberg, II, 937) He can, however, enact laws juxta jus commune, i.e. he can urge the observance of provisions of the common ecclesiastical law by penalizing the violation of the same (ch. ii. De constitutionibus, VI, I, ii; Friedberg, II, 937). He can determine the common ecclesiastical law, i.e. he can permit or forbid that which the common law neither forbids nor permits with certitude, and can apply to the particular needs of his diocese the general enactments of the pontifical laws. Many writers say that the bishop has also the power to enact laws praeter jus commune, i.e. to regulate those matters concerning which the common ecclesiastical law is silent; or at least particular points unforeseen by the common law. In any case, if the bishop wishes to add to the enactments of the common law (and the same principle is valid when it is a question of applying to the needs of his own diocese a general law of the Church), he must take care to make no enactment on matters which the common law, in the intention of the supreme legislator, has completely regulated. The common law implicitly forbids any episcopal action in such matters. Thus, e.g., the bishop cannot introduce new irregularities. In his diocesan legislation the bishop must not go beyond the purpose intended by the common ecclesiastical law. Thus, the latter forbids the clergy to take part in games of chance (ludi aleatorii), the aim of the law being to, condemn the love of lucre and to avoid scandal; at the same time the bishop cannot forbid in private houses other games which are not games of chance. On the other hand, if it be a matter concerning which the common law is silent, the bishop may take all necessary measures to prevent and put and end to abuses and to maintain ecclesiastical discipline. He must abstain, however, from imposing on his clergy extraordinary charges and obligations, and from unusual innovations. The legislative power of the bishop præter jus commune, is, therefore, far from being absolute. (Chaeys-Bouuaert, De canonicâ cleri sæcularis obedientiâ, Louvain, 1904, 69-77). Canonical writers discuss the right of the bishop to abrogate a local custom contrary to the enactments of the common ecclesiastical law. He probably has not the right, provided that the custom be juridical, i.e. a reasonable one and legitimately prescribed this custom obtains only because of pontifical consent, it does not belong to the bishop to act contrary to the will of the pope. The power of granting dispensations is correlative to the legislative power. The bishop may, therefore, dispense with regard to all diocesan laws. He may also dispense, in particular cases only, from the laws of provincial and plenary synods; any dispensation of these laws would be almost impossible, if it were necessary on all such occasions to convoke a fresh provincial or plenary synod. The bishop however, cannot dispense from enactments that relate directly to himself, and impose obligations upon him, or from enactments that accord rights to a third party. The bishop cannot dispense from laws made by the sovereign pontiff. To this there are, however, some exceptions. In certain matters, the written law or custom has granted this right to the bishop. He may also dispense from such laws in virtue of an expressly delegated power, or even sometimes in virtue of the consent, presumed or tacit, of the sovereign pontiff. These cases in reality are determined by custom. Canonical writers also admit that a bishop may grant a dispensation, when there is a doubt whether a dispensation is required, though in such a case it may be a question whether any dispensation at all is requisite (Bargilliat, I, 483-491)
(2) Judicial Power
This power is exercised in two ways: without legal apparatus (extra judicialiter) or in a judicial process (judicialiter). In his diocese the bishop is judge in the first instance in all trials, civil and criminal that pertain to the ecclesiastical tribunal, unless the persons be exempt from his authority, or the matters reserved for other judges; such. e.g., are the process of canonization reserved to the pope or the misdemeanors of a vicar-general, which fall under the cognizance of the archbishop. (Ch. vii, De officio judicis ordinarii, VI, I, xvi; Friedberg, II, 988; Council of Trent, Sess. XXIV, De ref., ch. xx.) In ecclesiastical trials he must conform to the general or special provisions of the law. (For matrimonial trials see "Instructio de judiciis ecclesiasticis circa causas matrimoniales" in "Acta et decreta Concilii Plenarii Baltimorensis III", Appendix, 262; for trials of ecclesiastics see the Instruction of the Propaganda, "Cum Magnopere", which reproduces substantially the Instruction of the Congregation of Bishops and Regulars of 11 June, 1880, op. cit., 287; see also S. Smith, "New procedure in criminal and disciplinary causes of ecclesiastics", 3d ed., New York, 1898.) The bishop has also judicial power which he exercises extra judicialiter both in foro externo (publicly) and in foro interno (in conscience). He has the power to absolve his subjects from all sins and censures not reserved to the Holy See. Moreover, the absolution from a censure inflicted by an ecclesiastical judge is always reserved for the latter or to his superiors (Bull, "Sacramentum Poenitentiæ" 1 June, 1741 in "Benedicti XIV, Bullarium", Venice, 1775, I, 22; Const. "Apostolicæ Sedis", "Collectanea S.C.P.", 1002). On the other hand, the bishop may reserve to himself absolution from certain sins (Council of Trent, Sess. XIV, "De poenit.", ch. vii; Third Plenary Council of Baltimore, nos. 124, 127)
(3) Coercive Power
The right to punish is a necessary consequence if the right to judge. Formerly the bishop could and did inflict even corporal punishments and fines. These are no longer customary even for ecclesiastics. The usual penalties for the laity are censures; for ecclesiastics, religious exercises, confinement for a time in a monastery. (Third Plenary Council of Baltimore, nos. 72-73), degradation to an office of less importance (privatio officii ecclesiastici), and censures, especially suspension. The bishop may inflict suspension ex informatâ conscientia, i.e. on his personal responsibility, and without observing any legal formality, but in cases foreseen by the law (Instruction of Propaganda, 20 October, 1884; Conc. Balt. in, Appendix, 298). To the coercive power of the bishop belongs also the right of issuing certain commands (præcepta) i.e. of imposing on a particular ecclesiastic special obligations sanctioned by certain penalties (Constitution, "Cum Magnopere" nos. 4 and 8). He has also the lawful power to remove the penalties inflicted by him. Bishops call also grant indulgences: cardinals 200, archbishops 100, and bishops, 50 days' indulgence (Decree of Congregation of Indulgences, 28 August, 1903; Acta Sanctæ Sedis. XXXVI, 318).
(4) Administrative Power
The matters to which the administrative power of the bishop extends can only be briefly indicated here:
Bishops have also a "delegated jurisdiction" which they exercise in the name of the Holy See; this power is granted to them a jure or ab homine. Ecclesiastical law frequently accords to bishops delegated powers; but it would be wrong to say, for instance, that every power of dispensation granted by a general law of the Church is a delegated one. Such power is perhaps quite as often an ordinary power. But when the law accords a power of jurisdiction to the bishop, tanquam Sedis apostolicæ delegatus, it is a delegated power that he receives. (See, for example, Council of Trent, Sess. V, De ref. ch., I, ii; Sess. VI, De ref., ch. iii; Sess. VII, De ref., ch. vi, viii, xiv, etc). Writers do not agree as to the nature of the power accorded to the bishop also as a delegate to the Apostolic See, etiam tanquam sedis apostolicæ delegatus. Some maintain that it is in this case the bishop has at the same time both ordinary and delegated power, but only relative to such persons as are subject to his jurisdiction. (Reiffenstuel, Jus canonicum universum, Paris, 1864, tit. xxix, 37); others contended that in this case the bishop has ordinary jurisdiction with regard to his subjects, and only a delegated one with regard to those who are exempt (Hinschius, System des katholischen Kirchenrechts, Berlin, 1869, I, 178; Scherer, Handbuch des Kirchenrechts, Graz, 1886, I, 421, note 36); others maintain that the bishop has the same time both an ordinary and a delegated power over his subjects, and a delegated power over those who are exempt (Wernz, II, 816); finally, others see in this formula only a means of removing any obstacles which might prevent the bishop from using the power accorded to him (Santi, Praelect. jur. can., New York, 1898, I, 259). The delegated powers ab homine are at the present of very geat importance especially in missionary countries. The Apostolic Penitentiary grants those which are only concerned with the forum of conscience. The others are granted by the Congregation of the Propaganda. They are called facultates habituales, because not granted for a determined individual case. These faculties are no longer accorded only to the bishop in his own person but to the ordinaries, that is to say, to the bishop, to his successor, to the administrator pro tem of the diocese, and to the vicar general, to vicars apostolic, prefects, etc. (Declaration of the Holy Office, 26 November, 1897, 22 April, 1898, 25 June, 1898, 5 September, 1900; Acta Sanctæ Sedis, 1897-98, XXX, 627, 702; 1898-99, XXXI, 120; 1900-01, XXXIII, 225). As a general rule the bishop can subdelegate these powers, provided that the faculties do not forbid it (Holy Office, 16 December, 1898; Acta Sanctæ Sedis, 1898-99, XXXI, 635). For further information see Putzer-Konings, "Commentarium in facultates apostolicas" (5th ed., New York, 1898). On the other hand, the bishop can always ask the Holy See for such delegated powers as are necessary in the administration of his diocese. The bishop is also the ordinary and habitual executor of the dispensations which the Holy See grants in foro externo, i.e. for public use or application.
In describing the rights of bishops we have already in great measure indicated what their obligations are. All their efforts must aim at preserving the true faith and a high moral tone among the people; they attain this end by good example, by preaching, by daily solicitude for the good administration of the diocese, and by prayer. Bishops, in effect, are bound by the Divine law to implore the help of God for the faithful committed to their care. Canon law has determined more fully this obligation, and imposes upon the bishops the obligation of celebrating Mass for the faithful of their dioceses (missa pro grege) every Sunday, on the feast days of obligation and on the abrogated feast days (Const. Leo XIII "In supremâ", 10 June, 1882; "Collectanea, S.C.P.", no. 112). The bishop is bound to take special care of the education of youth and of the training of his clergy; he must exercise continual vigilance over the latter and assist them with his counsels. The Church has imposed as special obligations upon bishops the canonical visitation of the diocese and the holding of an annual diocesan synod. The bishop is bound to visit each year the greater part of his diocese either personally or, if prevented, through his delegates. This visit will permit him to administer the Sacrament of Confirmation (Council of Trent, Sess. XXXIV, De ref., ch. iii). The Third Plenary Council of Baltimore grants the bishop three years for making this visitation (Acta et decreta, no 14). The Council of Trent ordered that an annual diocesan synod should be held (Sess. XXIV, De ref. ch. ii). At present, the Holy See no longer urges the strict observation of this legislation (Santi Praelect. Jur. can., I, 360) The Third Council of Baltimore decreed that the bishop should take counsel with the diocesan consultors whenever he wished to convoke a synod (Acta et decreta, no. 20) It is then unnecessary for the synod to assemble every year. However in missionary countries the Holy See desires that these synods should be rather frequent and dispenses the bishop from the observation of the formalities difficult to fulfill, e.g. the convoking of all ecclesiastics who ought to be present at the synod (Letter of Propaganda to the Bishop of Milwaukee, 19 July, 1889, "Collectanea, S.C.P." no. 117). It is evident, finally, that the bishop cannot fulfill the duties of his office unless he observes the law of residence. The bishop is obliged to reside in his diocese and it is proper that he should be in the episcopal city on the principal feast days of the year. He cannot be absent from his diocese for more than three months, except for grave reason approved of by the Holy See (Council of Trent. Sess. VI, De ref., ch. i; Sess. XXXIII, De ref., ch. i; Benedict XIV, "Ad universae christianae", 3 September, 1746; Letters of Propaganda, 24 April and 24 August 1861; "Collectanea, S.C.P.", nos. 103, 105).
The bishop has also obligations regarding the Holy See. Throughout his entire administration he must conform to the general legislation of the Church and the directions of the pope. In this respect two special obligations are incumbent upon him: he must pay the Visitatio ad limina Apostolorum, and present the Relatio de statu diocesis, i.e. he must visit the shrines of Sts. Peter and Paul at Rome and present a report on the condition of his diocese. In the time of Paschal II (1099-1118), only metropolitans were bound to pay this visit. The Decretals imposed this obligation upon bishop whose consecration the pope reserved to himself (C. iv, "De electione et electi potestate"; X, I, vi; c. xiii, "De majoritate et obentia" X, I, xxxiii; c. iv, "De jurejurando", X, II, xxiv; Friedberg, II, 49, 201. 360). It has become general since the fifteenth century, and Sixtus definitely ruled in favour of this obligation (Bull, "Romanus Pontifex", 20 December, 1585; "Bullarum amplissima collectio", ed. Cocquelines, Rome, 1747, IV, iv, 173). According to this Bull the bishops of Italy and the neighbouring islands, of Dalmatia and Greece, must make the visit ad limina every three years; those of Germany, France, Spain, England, Portugal, Belgium, Bohemia, Hungary, Poland, and the islands of the Mediterranean Sea every four years; those of other parts of Europe, of North Africa, and the isles of the Atlantic Ocean situated to the east of the New World, every five years; those of other parts of the world every ten years. The bishops of Ireland, in virtue of a privilege of 10 May, 1631, are bound to pay this visit only every ten years. Even in the case of more recently erected sees the years are counted from 20 December, 1585, date of the aforesaid Bull (Instruction of Propaganda, 1 June, 1877; Collectanea, S.C.P.", no. 110). The bishops must pay this visit personally and for this purpose are allowed to absent themselves from their dioceses. The bishops of Italy for four months, other bishops for seven months. The Holy See sometimes dispenses a bishop from the obligation of paying this visit personally, and permits him to send, as his delegate, a priest of his diocese, especially one of those who have been promoted to a high office (dignitates), or a priest of the diocese sojourning at Rome, or even the agent of the bishop in that city, if an ecclesiastic. While this visit, as stated above, ought to be paid the third, fourth, fifth, or tenth year, the rule suffers frequent exceptions in practice (Wernz, II, 914). The Visitatio Liminum includes a visit to the tombs of St. Peter and St. Paul, an audience with the Holy Father, and a written report which the bishop ought to present to the Congregation of the Council (Congregatio specialis super statu ecclesiarum also called Concilietto) according to the formula of Benedict XIII in 1725 (A. Lucidi, De Visitatione saerorim Liminum, 5th ed., Rome, 1883).
Bishops subject to the Propaganda present this statement to the latter congregation (the proper formula is in "Acta Sanctae Sedis", 1891-92; XXIV, 382. "Collectanea", no. 104). In addition they ought also to send every five years, a report to the Propaganda according to the formulary drawn up by this congregation 24 April, 1861 (Collectanea, no. 104). This obligation had formerly been all annual one (Decrees of Propaganda, 31 October, 1838, 27 September, 1843, and 23 March, 1844; Collectanea, nos. 97-99; Third Council of Baltimore, no. 14).
Finally, mention may be made of certain privileges enjoyed by bishops. They do not fall under suspensions and interdicts, latæ sententia, i.e. incurred ipso facto, unless express mention of them is therein made; those who are guilty of assaults upon them are punished with an excommunication reserved speciali modo to the sovereign pontiff; they possess the right of having a domestic chapel and enjoy the privilege of the altare portabile, or portable altar, etc.
The title of bishop is still retained in certain Protestant churches. For its use in the Anglican Church see Sir R. Phillimore. "Ecclesiastical Law in the Church of England" (new ed., 1895; F. Makeower, "Verfassung der Kirche von England" (1894), and the "Encycl. Britannica" (9th ed.), III, 788-789; cf., also O. J. Reichel. "A Short Manual of Canon Law" (The Sacraments), London, 1896, 283-'298. For its use in the national Protestant Churches of Denmark and Sweden, see articles treating of those countries, and for its history and use in the Evangelical churches of Prussia and the European continent, Jacobson-Friedberg in "Real-Encycl. f. prot. Theol. und Kirche" (3d ed., 1897), III, 246-247. For its use in Protestant churches of the United States see BAPTISTS, METHODISTS, MORMONS. The antiquities and constitution of the Greek episcopate are treated by J. M. Heineccius in "Abbildung der alten und neuen griechischen Kirche" (Leipzig, 1711), and in Milasch-Pessic, "Das Kirchenrecht der morgenländischen Kirche" (Germ. tr. of 2nd ed., Mostar, 1905); the actual conditions of the Greek episcopate, Catholic and Orthodox (Schismatic), are described in Silbernagl-Schnitzer, Verfassung und gegenwartiger Bestand samtlicher "Kirchen des Orients" (2nd ed., Ratisbon, 1904), passim.
APA citation. (1907). Bishop. In The Catholic Encyclopedia. New York: Robert Appleton Company. http://www.newadvent.org/cathen/02581b.htm
MLA citation. "Bishop." The Catholic Encyclopedia. Vol. 2. New York: Robert Appleton Company, 1907. <http://www.newadvent.org/cathen/02581b.htm>.
Transcription. This article was transcribed for New Advent by Matthew Dean.
Ecclesiastical approbation. Nihil Obstat. 1907. Remy Lafort, S.T.D., Censor. Imprimatur. +John M. Farley, Archbishop of New York.
Contact information. The editor of New Advent is Kevin Knight. My email address is webmaster at newadvent.org. Regrettably, I can't reply to every letter, but I greatly appreciate your feedback — especially notifications about typographical errors and inappropriate ads.
|
<urn:uuid:2940062a-6f0a-4c90-8538-87057322f287>
|
CC-MAIN-2016-26
|
http://newadvent.org/cathen/02581b.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397873.63/warc/CC-MAIN-20160624154957-00193-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.954812
| 12,849
| 2.96875
| 3
|
Once thought extinct, the Eltham Copper Butterfly was rediscovered in 1986 in Eltham, in a small patch of bush that was going to be bulldozed to build houses. A campaign to save the butterfly’s habitat began and the local council, State government and local community raised the money to buy the land and make it a conservation reserve. Since then other sites have been reserved in other parts of Eltham, Greensborough, Castlemaine, Bendigo and Kiata.
Eltham Copper Butterfly (Paralucia pyrodiscus lucida) perched on Sweet Bursaria, Bursaria spinosa.
Image: Andrea Canzano
Source: Andrea Canzano
Over time, butterfly numbers in the Eltham reserves went down. People from the nearby houses would walk through the reserves, let their pets in and local kids couldn’t resist building cubby houses. Active trampling wasn’t the only problem. The reserves weren’t being grazed by native fauna or cleared by periodic burns any more. Vigorous native plants and weeds started to crowd out Sweet Bursaria, the butterfly's sole food. The habitat was no longer ideal for the larvae or butterflies which need patches of sunlight and clear flight-paths.
Eltham Copper larva being tended by Notoncus ants on a Sweet Bursaria bush. The Eltham Copper Butterfly can only live in habitats where this plant and these ants are present.
Image: Andrea Canzano
Source: Andrea Canzano
A couple of years ago I ventured out one cool September night to help with the larvae count at an Eltham reserve. While it was exciting to be in the bush at night we didn’t find a single larva where they had been numerous a few years earlier. Results like his made people realise that it was not enough to fence off reserves and expect the butterflies to flourish.
In 2012 the Friends of Eltham Copper Butterfly in partnership with Nillumbik Shire Council, Parks Victoria, Friends of Diosma Road, Friends of Woodridge Linear Reserve and Eltham East Primary School obtained a Communities for Nature grant to protect and enhance the habitat of the Eltham Copper Butterfly.
The habitat restoration involved skilled workers selectively weeding the reserves and planting more Sweet Bursaria, other butterfly-attracting native grasses and daisies to bring the vegetation back to an ideal mix for the Eltham Copper Butterfly.
And the result? Already, only 12 months later, there has been a significant increase in the number of Eltham Copper Butterflies recorded in the counts in this summer (2013-14). It is an encouraging start, and supports the idea that active management can make a decisive difference for an endangered species. Ongoing community involvement and education is the other vital component. This takes many forms from festivals, to butterfly-friendly garden courses, to education in the local schools.
Eltham East Primary School children have planted a butterfly garden. Here they're
learning about the Eltham Copper Butterfly.
Image: Alison Bayley
Source: Alison Bayley
So it looks hopeful for the Melbourne Eltham Copper populations but what about the butterfly in Central Victoria?
In 2009 there were only three known butterfly sites in Central Victoria but in the last five years a small team surveyed 3,000 hectares of public land looking for the right habitat features for the butterfly – a combination of enough Sweet Bursaria bushes in an open forest habitat. Having identified promising areas, they went back at the right time of year to see if they could find the adults. With great excitement they found seven new sites bringing the total in the region to ten.
Julie Whitfield, a leader in Eltham Copper butterfly conservation in Central Victoria, at a site where a colony of butterflies was found at Big Hill, Bendigo.
Image: Kate Phillips
Source: Museum Victoria
However at the same time these new butterfly colonies were being discovered, the risk of fire was brought into sharp focus and fuel reduction burns given greater priority.
Areas surrounding regional towns such as Castlemaine and Bendigo are set aside to be burnt each year. Many of these overlap with the newly-discovered Eltham Copper butterfly habitat. The fuel reduction burns are designed to be ‘thorough’. While this is seen as good fire risk management it endangers fire-sensitive species such as rare orchids; a fire in Eltham Copper Butterfly habitat could wipe out one of its populations. However when on-the-ground knowledge is used to guide fuel reduction burns, important habitat pockets can be excluded. It is not a case of conservation versus safety, but a balancing of the two needs.
Thanks to Andrea Canzano, Karen Borton, Anne Fitzpatrick and Julie Whitfield for their contributions to this post.
|
<urn:uuid:05929442-8547-459d-aabc-6d6887579521>
|
CC-MAIN-2016-26
|
https://museumvictoria.com.au/about/mv-blog/may-2014/eltham-copper-butterfly-update/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783404826.94/warc/CC-MAIN-20160624155004-00128-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.93886
| 1,006
| 2.765625
| 3
|
My motivation for this question is dog-based, but I suppose it would apply equally well to humans. How do animals recognize their own kind, particularly where there is large variation in appearance?
The background is that I am reading "Discrimination of human and dog faces and inversion responses in domestic dogs (Canis familiaris)" by Racca et al. (2010; Animal Cognition 13: 525-533). These authors show that when dogs are presented upright objects, human faces, and dog faces, they spend more time gazing on novel objects and human faces than they do on familiar ones. However, they spend significantly more time gazing on familiar dog faces than they do on novel ones.
This got me thinking how a dog "knows" another face belongs to a dog. Acedotally (which I realize is worth approximately nil in science), my dog reacts very differently to seeing another dog in an adjacent car compared to a person. Given that there is so much phenotypic variation in dogs, how does it know that other animal is a dog, and not a cat or very large rodent? I could understand a lion recognizing another lion, because all lions look more or less the same.
|
<urn:uuid:d25a6d7a-f347-46d2-9ad3-42fe7df137fc>
|
CC-MAIN-2016-26
|
http://cogsci.stackexchange.com/questions/213/how-do-animals-recognize-other-animals-of-their-own-species/297
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396887.54/warc/CC-MAIN-20160624154956-00129-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.966638
| 243
| 2.59375
| 3
|
How do I write a query that will tell me what day of the week a particular date is?
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
There are really only two choices: use whatever built-in database function is provided by your database system, or do the math yourself.
Most database systems have comprehensive date functions, and "day of the week" is usually included. Using Microsoft Access, for example, you can use the WEEKDAY(date) function, and the result will be an integer between 1 and 7, where 1=Sunday and 7=Saturday. Microsoft SQL Server's DATEPART(dw,date) function produces the same result. In Oracle, you use the TO_CHAR(date,'D') function. Each of these database systems has a mechanism whereby you can adjust which day of the week is associated with the number 1. MySQL, just to be different, gives you two functions: DAYOFWEEK(date) returns 1=Sunday through 7=Saturday, while WEEKDAY(date) returns 0=Monday through 6=Sunday.
If your database system does not include a "day of week" function -- and I cannot think of any that don't -- you can still do the math yourself, although doing it in one SQL query will be very, very tricky. See Eric Weisstein's Weekday for examples of algorithms you can use.
Finally, if you're interested, there's an algorithm that let's you calculate the day of the week for any date in your head. It's called the Doomsday Algorithm, and it was created by John Horton Conway, an eminent mathematician, perhaps best known as the inventor of the Game of Life.
For More Information
- Dozens more answers to tough SQL questions from Rudy Limeback.
- The Best SQL Web Links: tips, tutorials, scripts, and more.
- Have an SQL tip to offer your fellow DBAs and developers? The best tips submitted will receive a cool prize. Submit your tip today!
- Ask your technical SQL questions -- or help out your peers by answering them -- in our live discussion forums.
- Ask the Experts yourself: Our SQL, database design, Oracle, SQL Server, DB2, metadata, object-oriented and data warehousing gurus are waiting to answer your toughest questions.
Dig Deeper on Oracle and SQL
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.
|
<urn:uuid:b9fedb35-7e78-4d2f-a651-2bb786a1ed38>
|
CC-MAIN-2016-26
|
http://searchoracle.techtarget.com/answer/Day-of-the-week
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396455.95/warc/CC-MAIN-20160624154956-00200-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.925604
| 545
| 2.6875
| 3
|
|Securing and Optimizing Linux: RedHat Edition -A Hands on Guide|
|Prev||Chapter 10. Networking -Firewall||Next|
What is a Network Firewall Security Policy? Network firewall security policy defines those services that will be explicitly allowed or denied, how these services will be used and the exceptions to these rules. An organization's overall security policy must be determined according to security and business-need analysis. Since a firewall relates to network security alone, a firewall has little value unless the overall security policy is properly defined. Every rule in the network firewall security policy should be implemented on a firewall. Generally, a firewall uses one of the following methods.
Everything not specifically permitted is denied. This approach blocks all traffic between two networks except for those services and applications that are permitted. Therefore, each desired service and application should be implemented one by one. No service or application that might be a potential hole on the firewall should be permitted. This is the most secure method, denying services and applications unless explicitly allowed by the administrator. On the other hand, from the point of users, it might be more restrictive and less convenient. This is the method we will use in our Firewall configuration files in this book.
Everything not specifically denied is permitted This approach allows all traffic between two networks except for those services and applications that are denied. Therefore, each untrusted or potentially harmful service or application should be denied one by one. Although this is a flexible and convenient method for the users, it could potentially cause some serious security problems.
What is Packet Filtering? Packet Filtering is the type of firewall built into the Linux kernel. A filtering firewall works at the network level. Data is only allowed to leave the system if the firewall rules allow it. As packets arrive they are filtered by their type, source address, destination address, and port information contained in each packet. Most of the time, packet filtering is accomplished by using a router that can forward packets according to filtering rules. When a packet arrives at the packet-filtering router, the router extracts certain information from the packet header and makes decisions according to the filter rules as to whether the packet will pass through or be discarded.
The following information can be extracted from the packet header:
Source IP address Destination IP address TCP/UDP source port TCP/UDP destination port ICMP message type Encapsulated protocol information (TCP, UDP, ICMP or IP tunnel)
|
<urn:uuid:56359e99-6d9f-42bf-bb47-92bcfe9b245b>
|
CC-MAIN-2016-26
|
http://www.tldp.org/LDP/solrhe/Securing-Optimizing-Linux-RH-Edition-v1.3/chap10sec97.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783392527.68/warc/CC-MAIN-20160624154952-00099-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.91549
| 500
| 3.140625
| 3
|
Italian form of BEATRIX
. Beatrice Portinari was the woman who was loved by the Italian poet Dante Alighieri. She served as Dante's guide through paradise in his epic poem 'The Divine Comedy' (1321). This was also the name of a character in Shakespeare
's play 'Much Ado About Nothing' (1599).
|
<urn:uuid:61fe5403-fd10-4a85-a4a0-6bdf1333f770>
|
CC-MAIN-2016-26
|
http://www.behindthename.com/php/view.php?name=beatrice
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397428.37/warc/CC-MAIN-20160624154957-00134-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.984582
| 74
| 2.59375
| 3
|
The epic Mahabharata and Puranas refer to Yadu as the eldest son of mythological king Yayati. Yadu was banished from ruling and had become rebel who first started ruling in outskirts of India and then intruded the mainland. The jambudwipa referred in scriptures is believed to be in memory of these islands. The regions where the Yadu clan settled is not certain, but certain scholars suggest that Yadu clan inherited the territories to the south-west of the Gangetic plains, between the Chambal River, Betwa and Ken, which correspond to the border areas of present Indian states of Uttar Pradesh and Madhya Pradesh. Descendants of yadu were called Yadavavanshi. Krishna, founder of Jat sangha, was born in Yadavavansh. Yadu are called Gadun or Jadu in Afghanistan. Yadu clan is found in Afghanistan.
The Mahabharata, the Harivamsha and the Puranas mention Yadu as the eldest son of king Yayati and his queen Devayani. The prince of King Yayati, Yadu was a self-respecting and a very established ruler. According to the Vishnu Purana, the Bhagavata Purana and the Garuda Purana Yadu had four sons, while according to the rest of the Puranas he had five sons. The names of his sons are: Sahasrajit (or Sahasrada), Kroshtu (or Kroshta),, Nila, Antika and Laghu. The kings between Budha and Yayati were known as Somavanshi. As mentioned before, Yadu had officially lost the title to govern by his father's command since he had refused to exchange his youth with his father. Thereby, he could not have carried on the same dynasty, called Somvanshi. Notably, the only remaining dynasty of King Puru was entitled to be known as Somvanshi. Thereby King Yadu ordered that the future generations of his would be known as "Yadu" or "Yadava" and the dynasty would be known as "Yaduvanshi". The generations of Yadu had an unprecedented growth and got divided into two branches.
Migration of Yadus
James Tod writes that before we attempt, by following the tide of Yadu migration during the lapse of thirty centuries, to trace them, from Indraprastha, Surapura, Mathura, Prayaga, Dwarica, Judoo-ca-dang (the mountains of Jud), Behera, Gujni in Zabulistan ; and again refluent into India, at Salbahana or Salpoora in the Punjab. Tunnote, Derawul, Lodorva in the desert, and finally Jessulmer, founded in S. 1212, or A.D. 1156.
Having elsewhere descanted at length on the early history of the Yadus, we may refer those who are likely to take an interest in this discussion to that paper, and proceed at once to glean what we can from the native annals before us, from the death of their leader, Hari-Krishna, to the dispersion of the Yadus from India. The bare fact of their migration altogether out of India proper, proves that the original intercourse, which conducted Budha, the patriarch of the Yadu race, into India (where he espoused Ella, a princess of
" Prayaga is the cradle of the Yadus who are Somavansa (of the lunar race). Thence Mathura founded by Pururwa remained for ages the seat of power. The name of Jadoo (Yadu), of whom there were fifty-six tribes, became famous in the world, and of this race was the mighty Hari-Krishna, who founded Dwarica."
The grand international conflicts amongst the " fifty-six Yadu " tribes," at Kurukshetra, and subsequently at Dwarica, are sufficiently known to the reader of Hindu history, and may be referred to elsewhere. These events are computed to have happened about 1,100 years before Christ. On the dispersion of these races many abandoned India, and amongst these, two of the many sons of Krishna. This deified leader of the Yadus had eight wives, and the offspring of the first and seventh, by a singular fate, now occupy what may be termed the outposts of Hinduism.
Rukmani was the senior of these wives ; and the eldest of her sons was Pradyumna, who was married to a princess of Vidarbha ; she bore him two sons, Aniruddha and Vajra, and from the latter the Bhattis claim descent. Vajra had two sons, Naba and Khira.
"Jambuvati was the name of the seventh wife, whose eldest son was called Samba — he obtained possession of the tracts on both sides the Indus, and founded the Sind-Samma dynasty, from which the Jharejas are descended. There is every probability that Sambus of Samba-nagari (Minagara), the opponeot of Alexander, was a descendant of Samba, son of Krishna. The Jhareja chroniclea, in ignorance of the origin of this titular appellation, say that their " ancestors came from Sham, or Syria".
" When the Yadus were exterminated in the conflict at Dwarica, and Hari had gone to heaven, Vajra was on his way from Mathura to see his father, but had only marched twenty coss (forty miles), when he received intelligence of that event, which had swept away his kindred. He died upon the spot, when Naba was elected king and returned to Mathura, but Khira pursued his journey to Dwarica.
" The thirty-six tribes of Rajpoots hitherto oppressed by the Yadus, who had long held universal dominion, now determined to be revenged. Naba was compelled to fly the holy city (Dwarica) ; he became prince of Marusthali in the west.
Descendants of Yadu
King Sasasrajit's descendants were named after his grandson Haihaya and were well known as the Haihayas. King Kroshtu's descendants had no special name, but were known particularly as the "Yadavas", According to P.L. Bhargava, when the original territory was partitioned between Sahasrajit and Kroshta, the former received the part lying to the western bank of the river Sindhu and the latter received the territory situated along the east bank of the river. King Haihaya was Shatajit's son and Sahasrajit's grandson. King Sahasrajit instituted a new state and a new dynasty and offered the same, by his own will and against his birth right, to be taken care of by his younger brother Kroshta. Thereby, Kroshta officially became the heir of King Yadu. Consequently, the generations of King Puru, Paurav or Puruvanshi were the only ones to be known as Somvanshi.
The regions where the Yadu clan settled is not certain, but certain scholars suggest that Yadu clan inherited the territories to the south-west of the Gangetic plains, between the Chambal River, Betwa and Ken, which correspond to the border areas of present Indian states of Haryana, Uttar Pradesh and Madhya Pradesh. The descendants of Yadu tribe (Yaduvanshi) include Krishna. Yadu-Dynasty belongs to the family deriving from Soma, identified with the moon god Chandra.
Origin of Jats from Yadu
Many historians consider the origin of Jats from Yadu.
- Thakur Deshraj has mentioned with reference to Pandit Lekhram Arya who says in 'Risalajihad' that word Jat has derived from Yadu as under.
- Yadu(यदु) → Jadu(जदु) → Jādu(जादु) → Jād(जाद) → Jāt(जात) → Jāt(जाट)
- James Todd and Wilson have also supported this theory.
- Mr Neshfield, a renowned Indologist, says that "The word Jat is nothing more than the modern Hindi pronunciation of Yadu or Jadu, the tribe in which Krishna was born.
- The Sinsinwar Jat rulers of Bharatpur have been recorded as Yadavavanshi, the descendants of Krishna by Prakash Chandra Chandawat.
- UN Sharma has mentioned the chronology of Krishna in which starting from Sindhupal in 64th generation of Krishna to Bharatpur ruler Maharaja Brijendra Singh (1929-1948) all the rulers are mentioned as Yaduvanshi Jats.
- Almost all early Jat rulers have been mentioned by contemporary poets as Yaduvanshis. The poet Sudan , poet Somnath , poet Udayram have write about the origin of Sinsinwar Jat rulers of Bharatpur as under -
- तीन जाति जादव की, अंधक, विस्नी, भोज ।
- तीन भांति तेई भये, तै फिर तिनही षोज ।।
- पूर्व जनम ते जादव विस्नी ।
- तेई प्रकटे आइ सिनसिनी ।।
- Jat historian Bhaleram Beniwal has written after recent researches with evidences in his book "Jāton kā Ādikālīn Itihās" that Krishna was by all evidences noting other than Jat. He has mentioned the above refered evidences in addition to the following authors which mention Krishna as Jats. These are Yogendrapal Shastri, Motilal Gupta Walter Hamilton.
- The Muslim contries have a notion that Jats are the ancestors of Yadavas. The Arabian traveller Al-Biruni has mentioned that Lord Krishna was a Jat.
- Dr Natthan Singh has also mentioned the theory of origin of Jats from Yadu. Yadu was banished from ruling by Yayati for not obeying him and made his other son Puru as king. Yadu had become rebel who first started ruling in outskirts of India in south-west border areas. Slowly he gained strength by forming a federation of Shaka, Pallava, Parad, Yavan and Kamboja tribes. The king Sagar failed his these attempts and suppressed them. In order to avoid confrontation with Sagar, the Yaduvanshis came to Sursena area (Mathura). Here he again formed a federation of 18 tribes. One of thse tribe was vrishni in which Krishna was born. Many historians connect Jats with these Yadus. Looking to similar physical features, food habits, life and culture both Jats and Yaduvanshis can be treated belonging to same caste.
Branches of Yaduvansh
Dalip Singh Ahlawat writes that Krishna formed the sangha of many clans. He himself was Jat. The Branches of Yaduvansh include the following: Vrishni, Andhaka, Hala, Sheokhande, Dagur-Digrana, Khirwar-Khare, Balhara, Saran, Sinsinwar, Chhonkar, Sogarwar, Hanga, Ghanihar, Bhoj
Complete ancestry of Yaduvansha
- James Todd, Annals and Antiquities of Rajasthan, Volume I,: Chapter 7 Catalogue of the Thirty Six Royal Races, pp. 101-104
- Genealogy of Yadu
- An Inquiry Into the Ethnography of Afghanistan By H. W. Bellew, The Oriental University Institute, Woking, 1891, p.87
- An Inquiry Into the Ethnography of Afghanistan By H. W. Bellew, The Oriental University Institute, Woking, 1891, p.158
- Pargiter, F.E. (1972). Ancient Indian Historical Tradition, Delhi: Motilal Banarsidass, p.87.
- Misra, V.S. (2007). Ancient Indian Dynasties, Mumbai: Bharatiya Vidya Bhavan, ISBN 81-7276-413-8, pp.162-3
- Matsya Purana,43.6-7
- James Tod: Annals and Antiquities of Rajasthan, Volume II, Annals of Jaisalmer, p.194-195
- Gazetteer of the Bombay Presidency ..., Volume 1, Part 1 By Bombay (India : State), Page no.58
- Thakur Deshraj: Jat Itihas (Hindi), Maharaja Suraj Mal Smarak Shiksha Sansthan, Delhi, 1934, 2nd edition 1992. Page 85-86
- Parmesh Sharma & Rajpal Shastri: Kshatriyon ka Itihas
- James Todd: Annals and Antiquities of Rajasthan, 2 Vols., Routledge & Kegan Paul Ltd., London, 1972 (reprint), first published in 1829
- Dr. Prakash Chandra Chandawat: Maharaja Suraj Mal aur unka yug, Jaypal Agencies Agra, 1982
- UN Sharma :Jaton ka Navin Itihas
- Sudan: Sujan-charitra, page-4
- Somnath: Sujanvilas,page 133
- Udayram: Sujan samva
- Bhaleram Beniwal : "Jāton kā Ādikālīn Itihās" (page 26-30), Jaypal Agencies Agra
- Yogendrapal Shastri:Jaton ka utkarsh (page286)
- Motilal Gupta: Matsya Pradesh ki Hindi Sahitya ko den (page214)
- Walter Hamilton: The east India Gazeteer (Vol. 1, page 233)
- Al-Biruni, India:Translated by Kayamuddin, Published by National Book Trust, India, 1997 page-176
- Dr Natthan Singh: Jat - Itihas (Hindi), Jat Samaj Kalyan Parishad Gwalior, 2004 (Page31-32
- Dalip Singh Ahlawat: "Haihay vansh evam Yadu vansh ke Shakha Gotra, Jat Samaj, Agra, August 1995, p. 13
Back to The Ancient Jats
|
<urn:uuid:fb730567-dba3-4a00-8b8d-91690088cfd9>
|
CC-MAIN-2016-26
|
http://www.jatland.com/home/Yadu
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396949.33/warc/CC-MAIN-20160624154956-00007-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.958381
| 3,232
| 3.421875
| 3
|
Causes of Crime and Delinquency - ADJ 205
- ADJ 205 - Causes of Crime and Delinquency
- Teaches the principal causes, conditions, motives and other influences which tend to encourage young persons or adults to become involved in illegal acts or criminal careers, crime and delinquency rates. Adult and juvenile justice systems will also be compared and studied.Lecture 3 hours. Total 3 hours per week.
|
<urn:uuid:b32432db-3781-4bbd-a161-4672d595ae06>
|
CC-MAIN-2016-26
|
http://courses.vccs.edu/courses/ADJ205-CausesofCrimeandDelinquency
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395346.72/warc/CC-MAIN-20160624154955-00146-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.925558
| 87
| 3.109375
| 3
|
Africa is a huge continent that’s made up of many different habitats, including sand, rock, water and grass. Each of those habitats is the perfect place for all sorts of cool creatures to live. Get to know some of the awesome animals of Africa!
Augrabies Flat Lizard
Onyx or Gemsbok
Rock: The Ethiopian Highlands
Millions of years ago a volcano erupted and made a huge dome 620 miles wide. This mountain range is called the Ethiopian Highlands. During the rainy season, many rare animals feed off the grass and plants that grow among the rocks.
Ethiopian Wolf: This carnivore (meat-eater) lives in pairs or small groups. Every morning the pack gathers for a noisy greeting ceremony. Then they start hunting for small mammals to eat during the day. Their long, thin snouts (noses) are perfect for sniffing out rats. These wolves are only found in Ethiopia, and there are only 500 left in the wild.
Gelada Baboon: With the strongest fingers of any primate, this baboon is a great climber and lives in grass-eating groups of up to 800 baboons. At night, they sleep together on rocky cliffs to avoid predators.
Walia Ibex: This rare goat species grazes in groups, so they can alert each other if there’s any sign of danger. Their rubbery hooves have hollow middles that act like suction cups to help the walia jump between rocks.
Grass: The Savanna
Grass is the main plant of the Savanna’s ecosystem. This grass provides food for the hundreds of species of herbivores (plant-eaters) that roam across the African Savanna.
Red-Billed Quelea: This small bird has a huge effect on its habitat. The birds cluster in flocks that can number in the thousands. At dawn, the flock searches for seeds and, by sunset, some farmers may find themselves without any crops left!
Wildebeest: Also called gnus, herds of wildebeest start migrating across Africa in May, walking up to 2,000 miles every single year. Throughout their trip, the animals’ hooves spread grass seeds and fertilize the ground, feeding birds and bugs.
Hyena: These carnivores leave their cubs at home for as long as four days at a time to find food. Hyenas can digest even the toughest parts of an animal, leaving behind few scraps for scavengers.
Sand: The Deserts
Africa is home to the largest desert on earth – the Sahara. It’s also home to the Namib Desert and the Kalahari. The climate is harsh, with high air temperatures and little rain. Animals in the desert have adapted to survive this tough environment.
Dromedary Camel: These camels store fat, not water, in their one humps, and can survive for days without anything to drink. But once they find water, dromedaries can gulp down 30 gallons in just a few minutes – a trick that would kill other animals. Dromedaries have furry ears, hairy nostrils and two layers of long, curly eyelashes any girl would KILL for! During a desert sandstorm, which can raise up walls of dust a mile high, dromedaries shut their ears, noses and eyes.
Augrabies Flat Lizard: These lizards live along the Orange River, which flows through the Kalahari Desert. Because the river attracts so many bugs and flies, the lizards can catch up to 17 flies per minute! At sunset, these cold-blooded reptiles squeeze between rocks, where it’s still warm.
South African Onyx: Also called a gemsbok, these animals move across the Namib desert in herds of 10-30. When a predator approaches, the herd circles its calves with horns facing out. To survive the heat, the onyx can make itself stop sweating in order to conserve water.
Namib Lion: These lions have adapted to the desert environment by absorbing almost all the moisture they need from their prey, the Oryx. In fact, desert lions can survive for two or three weeks without drinking water.
Namib Elephant: Africa’s largest herbivore survives in the desert by digging deep to find juicy, succulent plant roots. Their smaller bodies save water and their large ears are filled with blood vessels that spread the heat around their bodies evenly to keep the elephants cool as they search for new water holes.
Water: The Rivers
During the dry season, herds of animals walk miles to find water. Africa is home to the planet’s largest freshwater lakes: Malawi, Tanganyika and Victoria It’s also home to the longest river in the world, the Nile.
Nile Crocodile: These crocs can grow up to 16 feet long, and like to hide along the river’s edge, waiting for dinner to walk their way. Even so, it can take a crocodile up to an hour to drown a powerful Wildebeest.
Chacma Baboon: These scavengers eat fruit, bugs and seeds. They are the largest and heaviest baboon species in the world. It’s hard for them to walk upright, but they must do it in order to cross a flooded river. In fact, no member of the group, young or old, would ever be left behind.
|
<urn:uuid:66f59fd1-0498-4db5-b9e9-9f7b3987c16b>
|
CC-MAIN-2016-26
|
http://www.kidzworld.com/article/22400-the-animals-of-africa
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396875.58/warc/CC-MAIN-20160624154956-00168-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.922407
| 1,131
| 3
| 3
|
By Elizabeth Payne
Sam Barton was doing what children do every day — playing in gym class — when “somebody fell on somebody,” in his father’s words, and the 10-year-old banged his head on the floor.
There were no visible bumps or bruises, no signs of nausea, but Sam complained of a headache and feeling off, so his parents took him to the doctor. There he was diagnosed with a probable concussion. Tests he did later, as part of research at the Children’s Hospital of Eastern Ontario (CHEO), confirmed that not only did he have a concussion but that the knock had affected his ability to concentrate and his muscle strength, among other things.
Concussions are more common in children and youths than in adults — one in 70 children brought to the emergency room is there because of a concussion, and an estimated 10 to 20 per cent of hockey players between nine and 17 have at least one head injury a year. But pediatric concussions have always been less well understood.
That should change with the release Wednesday of the first ever comprehensive guidelines for pediatric concussions, developed by a team led by Dr. Roger Zemek, a scientist at the CHEO, along with the Ontario Neurotrauma Foundation.
The guidelines are meant to help doctors, nurses, parents, teachers, coaches and community workers recognize the signs of concussion in children and youth, as well as what to do when they identify one, how it should be treated and when a child is ready to return to school and sports.
One of the key pieces of advice is to remove children from play as soon as a concussion is suspected, with the underlying message: “If in doubt, sit them out.”
That is crucial, said Zemek, because a second concussion before the brain has recovered can have “devastating consequences.”
The guidelines released Wednesday include pocket-sized assessment tools that list signs and symptoms of concussion.
“We are all aware that there is no such thing as a minor concussion. A head injury is a head injury,” said Sam’s father, Michael Barton.
But, he added, parents need some reasonable guidelines for what to look for and “the path for return to play.”
Although many sports organizations have developed their own guidelines over the years, Zemek said it was important to have comprehensive guidelines with the most up-to-date science because concussions don’t just happen in hockey rinks or playing fields, but also in their backyards, the playground, recreation centres and at school. And, although many doctors are getting better at recognizing signs of concussion in children, only a minority base their recommendations about return to school and sports on the latest and best evidence, said Zemek.
One of the keys to managing concussions is understanding that a wide range of symptoms, including irritability, sadness and fatigue can be signs that the brain has not yet healed.
Once symptoms have resolved, the child or adolescent should gradually return to school, sports and other activities — and if symptoms return they should return to physical and mental rest.
|
<urn:uuid:ca5ca8b5-e39f-4372-b241-e06046def986>
|
CC-MAIN-2016-26
|
http://o.canada.com/news/national/new-concussion-guidelines-for-kids-aimed-at-helping-doctors-parents
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395621.98/warc/CC-MAIN-20160624154955-00068-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.980131
| 649
| 2.765625
| 3
|
- Historic Sites
The author entered the conquered capital days after the surrender to meet high officers of the Imperial Navy
May/June 1995 | Volume 46, Issue 3
One officer of whom we heard rumors but never interviewed was Rear Adm. Sokichi Takagi, a member of the Naval General Staff secretariat, who from at least the time of Midway had been much concerned about the future. Ordered to produce a study of the lessons of the war to date, Takagi in late 1943 and early 1944 had systematically analyzed the losses so far and concluded that success was impossible and a compromise peace necessary. But his conclusions never saw the light of day; the army was in control, and the fear of assassination was too strong.
Even at the highest levels this was true. Admiral Toyoda told of a meeting of the Supreme War Guidance Council on June 6, 1945, when ending the war had been under active consideration for more than a month. The group concluded that “the nation’s war power was bound to decline very rapidly. [But] that is not to say that anyone there expressed the opinion that we should ask for peace; for when a large number of people are present like that, it is difficult for any one member to say that we should so entreat. So the decision was that something must be done to continue this war.”
Both Germany and Japan kept fighting for more than a year in causes that were doomed; only the logical Italians took the rational way out. Admiral Fukudome had all along thought the outcome was doubtful; with the loss of the Marianas, “I felt that the last chance had slipped from us definitely; [the] fact that I realized that, however, does not mean that it had any effect upon our determination or will to fight.” Similarly, when Admiral Kurita turned back briefly under a heavy air attack while en route to oppose the Philippine landings, Admiral Toyoda ordered him on: “There would be no sense in saving the fleet at the expense of the loss of the Philippines.”
In any event both fleet and Philippines were lost. Still, with its empire divided and its resources cut off, Japan fought on, necessitating very hard campaigns for Iwo Jima and Okinawa. Despite further changes of government in Tokyo and the underlying pessimism (or realism) of numerous senior civilians and naval officers, every setback produced merely statements of defiance and continued resistance, until the atomic bombs fell and the Soviets came in.
But even then the will to fight endured. “I do not think it would be accurate to look upon use of the Atomic Bomb and the entry and participation of Soviet Russia into the war,” said Admiral Toyoda, “as direct cause of termination of the war, but I think that those two factors did enable us to bring the war to a termination without creating too great chaos in Japan.”
Some chaos there was. attempts were made to seize and destroy the recording of the emperor’s surrender statement before it could be broadcast, to suborn parts of the Tokyo garrison, and to kill cabinet ministers. The lord privy seal spent the night cowering in the palace basement; the prime minister got over his garden fence just before the troops came in the front door. There was talk of suicide attacks on the American fleet, and the authorities had a hard time guarding supplies of fuel and ammunition. Also, there were a number of suicides among the military, including the war minister; the commander of the Tokyo military district; Adm. Takajiro Onishi, the founder of the kamikaze corps; and Adm. Matome Ugaki, chief of staff to Admiral Yamamato in the early months of the war, who took off in an airplane and killed himself by crashing into the sea. Both because of his interest as a subject for interrogation and because he had fired on me from the Yamato one morning off the Philippines, I regretted his passing.
These ructions turned out to be mercifully brief, although some Japanese thought it fortunate that bad weather had delayed General MacArthur’s arrival by a couple of days. Had we known about them before our arrival, which we had not, we would have found the general peace and good order that prevailed a bare month later even more remarkable than we did. As it was, our interrogations and search for documents started up promptly, as if they were the most normal thing in the world, and ran in a steady stream, morning and afternoon.
|
<urn:uuid:aeef2ebb-405e-47b6-a671-98a0eafd6f21>
|
CC-MAIN-2016-26
|
http://www.americanheritage.com/content/tokyo-1945?page=4
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783394937.4/warc/CC-MAIN-20160624154954-00100-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.981123
| 923
| 3.078125
| 3
|
Tons of sand and stone are required for the leach field.
Getting the septic tank pumped every three to 10 years is a household chore that makes its way onto long-range to-do lists of only the most fastidious rural homeowners.
“I know there's a lot of tanks that aren't cleaned for years. You'd be lucky if 20 percent get cleaned every five to eight years,” said Russell Steffel, who operates a Defiance County septic tank installation service under his own name.
“Nobody wants to mess with it. It's an extra expense that people don't really think they need. But it prolongs the life of the system.”
Septic tanks are the most typical rural substitute for a municipal sewer system. The number of septic tanks in the area probably peaked 10 to 20 years ago; since then, development has lagged the pace of extension of municipal sewer lines. Still, a few septic systems are in Lucas County, and some are even in Toledo.
The tanks, which are often made of concrete, collect waste that flows from toilets, bathtubs, sinks, washing machines, and other drains in the buildings. Health departments typically recommend a 1,000-gallon tank for a one-bedroom home and a 2,500-gallon tank for six or more bedrooms. Drain or leach fields, which are part of the septic system, usually are 2,000 to 7,000 square feet.
Costs for installing such a system, which is underground, typically range from $4,000 to $15,000. Installation includes soil tests; some soil is better able to absorb and transport liquids.
Ideally, solid wastes settle to the bottom of the tank and wastewater filters into the underground drainage area. The solid material is what builds up in the tank and should be removed.
For large families, Mr. Steffel suggests pumping the tank every three years. People who live alone and don't have a garbage disposal or use much water often can get by with pumping the septic tank every decade. Pumping typically costs $100 to $200.
If a septic tank is not pumped regularly, accumulated solids can clog the leach field. That can lead to a backup in drains or to sewage rising to the soil surface outside. If that happens, there are few simple fixes. Contractors often recommend starting over with a new tank and leach field.
Septic tank systems, experts say, typically last 20 to 25 years. Septic fields generally are near the house. Maps and other paperwork describing the systems often are on file with the county health department.
The home's water well should be at least 50 feet from the septic system, and driveways, buildings, or trees should not be placed above it.
Requirements vary by county, but often numerous semi trailer loads of sand and stone are needed for the leach field. For most systems, the property must be at least a half-acre. Smaller lots sometimes have a system with an aerator, powered by electricity.
In Lucas County, newer systems were inspected by the county health department when they were built. The county requires permits for work done on septic systems. But for $50 the agency will do an inspection at any time and provide a letter of findings.
Inspection costs in other counties vary by county.
Experts recommend that property owners with septic tanks not pour much bleach and other harsh cleaning solutions down the drain because large amounts of such chemicals can upset the bacteriological digestion in septic tanks.
If municipal sewer lines are extended past a property, Ohio law requires property owners to hook on.
The cost of such public sewer lines is typically assessed to the property owner.
|
<urn:uuid:f3d8e167-e650-4fc5-b1cf-a58290afff51>
|
CC-MAIN-2016-26
|
http://www.toledoblade.com/Real-Estate/2003/06/15/Country-version-of-the-sewer.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783400031.51/warc/CC-MAIN-20160624155000-00076-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.963947
| 773
| 2.671875
| 3
|
Louisa May Alcott is best known today for her novel for young girls, Little Women (1868-9, originally published as Little Women and Good Wives), yet she wrote in many genres both before and after the publication of this famous novel. She began as a writer of "thrillers" and published them under the name A.M. Barnard, a pseudonym that hid her identity so successfully that these early works were not discovered until 100 years after her death. Those of you who have read Charlotte Bronte's Jane Eyre might be especially interested in Alcott's Behind a Mask,which is an interesting "thriller" based on the basic governess plot that Bronte used.
Alcott was brought up in Concord, Massachusetts, the daughter of Bronson Alcott, a Transcendentalist philosopher and teacher, and Abba May Alcott, one of the first professional social workers in Boston. Both her parents were idealistic, as can be seen in her fictionalized version of their year in Bronson's utopian community Fruitlands, "Transcendental Wild Oats." Little Women is a fictionalized version of her life with her three sisters in Concord, and the home in which she lived there after writing the novel still exists. Bronson Alcott called the place "Orchard House," but Louisa May called it "Apple Slump," one of many instances in which she affectionately chided her father's idealism.
Alcott was steeped in Transcendentalism from the time she was born. She and her sisters were the subject of her father's educational experiments, which included progressive methods such as allowing children to learn through their natural questions instead of being whipped for failing to memorize facts. Both parents and daughters kept journals and recounted in them their reflections over their own consciences as well as meals such as Graham crackers, apples, and water for dinner. (An early edition of her journals is at Google Books.)
When they lived in Concord, the Alcotts had famous neighbors who influenced her ideas: Nathaniel Hawthorne, who lived next door to the Alcotts and whose children looked to Louisa May for adventures (see Julian Hawthorne's account here); Ralph Waldo Emerson, whose books Louisa May Alcott borrowed and who was, she wrote in her journal, "the god of my idolatry"; and Henry David Thoreau, who took the Alcott girls huckleberrying out at Walden Pond. Her first book, Flower Fables, was a compilation of stories that she had told to Ellen Emerson, Ralph Waldo Emerson's daughter.
Throughout her life, Alcott struggled between two conflicting goals: a desire to write novels that she felt were artistic and worthwhile, such as Work, Moods, and Diana and Persis (a novel about a woman artist), and works for juvenile readers that would sell, such as Little Women, Eight Cousins,Rose in Bloom, Under the Lilacs, and An Old-Fashioned Girl. On at least occasion, she called her work in this vein (and in Aunt Jo’s Scrap-Book ) “moral pap for young people.”
Alcott’s critical reputation has risen in recent years after the disdain heaped upon her work in the first half of the twentieth century. She was one of the early casualties of modernist denunciations of “sentimentalism,” as critics often dismissed women’s writing under that label as didactic and lacking in substance, and her work unfairly became a shorthand way of referring to moral prissiness and prudery. However, with the growth of feminist criticism, serious critical interest in Alcott has grown over the past three decades, including essays and books on her affiliations with traditions such as “woman’s fiction,” her intellectual roots in Transcendentalism, and her promotion of reform movements such as abolitionism, woman suffrage, and equality of the races, as can be seen in Work— the very sorts of political references that were thought to be insufficiently “aesthetic” by the modernists . You can find a list of secondary sources here: http://www.wsu.edu/~campbelld/amlit/alcottbib.htm.
Please read the questions on Work only after you’ve read the book; some of them contain spoilers.
1. Would you call Work a feminist novel? Why or why not?
2. Christie declares her independence in the first chapter in the language of the Declaration of Independence. In what ways is Christie’s progress through the novel and her various occupations an American success story? In what ways does it refute the kinds of success typically sought in those stories?
3. How does Christie upset the kinds of gender stereotypes associated with nineteenth-century women and the heroines of conventional romances? For example, is the plot of the two suitors necessary for this work?
4. Why does Christie choose David over Mr. Fletcher?
5. Why does Alcott devote so much space to the Wilkins family? Why are they in the book?
6. As readers of Little Women know, Alcott used the allegorical work Pilgrim’s Progress in her novels, including features such as allegorical names that indicate the character’s function. For example, she calls Mr. Lawrence “Mr. Greatheart” in an allusion to Pilgrim’s Progress. In Work and in “Transcendental Wild Oats,” she frequently names her characters in this fashion. Analyze the meanings of some of the names in these works.
7. Alcott describes a number of admirable women in this book, including some who are foils or contrasting characters for Christie. Choose one or two of these characters and examine the ways in which they function in the book.
8. For her era, Alcott has a progressive view of racial equality, yet her views of the Irish, who were at the time subject to intense anti-Irish prejudice, are less enlightened. Discuss the ways in which Alcott portrays these characters.
9. In what ways is Work a “political enterprise” (Tompkins 515) like Uncle Tom’s Cabin? What “cultural work” of social reform is Alcott trying to accomplish in writing it?
10. Alcott writes about characters and ideas that would have been considered unladylike topics for women in her era, including suicide, insanity, prostitution or the “fallen woman,” and even being an actress, which was often considered disreputable. How does she handle these topics, and what is her perspective on them?
11. What part does the Civil War play in this novel? In what ways is it important for Alcott’s conception of Christie’s life? How does it connect her with her early “declaration of independence”?
12. An important symbolic pattern in this novel is that of the garden, flowers, and vegetation in all their forms. Analyze what Alcott does with this pattern, including the character of David Sterling, who is thought to be loosely based on Henry David Thoreau.
13. Tompkins discusses features of the home, such as the rocking chair and the kitchen, as exemplifying certain values or truths in Uncle Tom’s Cabin, and she links these to Catharine Beecher’s The American Woman’s Home. Alcott, too, provides descriptions of rooms or other spaces that symbolize certain themes within the work. Using a close reading of some of these passages, analyze how these features are used symbolically.
14. Echoes of Jane Eyre and Pride and Prejudice frequently appear in Alcott’s novels, as do echoes of Dickens’s novels. Can you find and analyze some of those echoes in Work? (See, for example, p. 65).
15. As described in the Context section for this lesson, Alcott’s background in Transcendentalism is expressed in this novel, although “Transcendental Wild Oats” presents quite a different picture of the value of Transcendentalist thinking. Analyze some of the ways in which Transcendentalism appears in the scenes and characters in Work.
16. If you have read Little Women or other novels by Alcott, compare some features of these novels with Work. How does Christie differ from, or in what ways is she similar to, other Alcott heroines such as Jo March?
17. Tompkins notes that by the end of Uncle Tom’s Cabin, “Stowe reconceives the role of men in human history” in that women, African Americans, and others do the work whereas “men groom themselves contentedly in a corner” (526). Could the same be said of Work, with its famous vision of an interracial group of women holding hands around a table at the end of the novel (see p. xx of your book for an illustration)?
|
<urn:uuid:c6300706-08c7-4f83-88dc-ccae024414e6>
|
CC-MAIN-2016-26
|
http://public.wsu.edu/~campbelld/amlit/alcottworkques.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396959.83/warc/CC-MAIN-20160624154956-00152-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.970633
| 1,873
| 2.984375
| 3
|
If you missed part one, here ya go.
SLEEP 101 (probably more like 102)
“If sleep does not serve an absolutely vital function, then it is the biggest mistake the evolutionary process has ever made”
University of Chicago Sleep Laboratory
Smithsonian, November 1978
Why do we sleep? The answer to this question still remains a mystery, yet scientific advances have revealed many functions taking place at night to restore the brain and body for the next day. All of us recognize the need for sleep grows stronger the longer we stay awake. We also intuitively grasp its importance because even one night of either good or bad sleep affects our performance, mood, and wellbeing the next day. But what is taking place after you close your eyes that determines the version of You that is shared with the world the following day? This article will explore some of these mysteries and will hopefully deepen your understanding for this indispensible function of a healthy life.
Once asleep, we cycle through a sequence of stages that repeat several times over the night. The pattern of this cyclical sequence is referred to as ‘sleep architecture.’ The primary stages are named rapid eye movement (REM) sleep and non-REM sleep, which is then further subdivided into stage 1 non-REM, stage 2 non-REM and Slow Wave Sleep. From all the stages, the deepest is Slow Wave Sleep and it is in this stage that it is hardest to arouse a person. If you wake from Slow Wave Sleep, you will likely feel disoriented and confused. Not unlike those who attend Phish concerts.
As the night progresses the proportion of these stages change in each cycle. At the beginning of the night you have more non-REM sleep, and at the end of the night you have more REM sleep, per cycle. The sequence of these stages appears to have importance. A highly fragmented sleep sequence – as seen in those suffering from sleep apnea, which produces disruptive micro-arousals during sleep – has been associated with many maladies including inadequate restoration (i.e., next day sleepiness) and weight gain! This holds true even when the total amount of time in each sleep stage is not significantly different from a normal night of non-fragmented sleep. Sequence matters.
Many things differ between these stages including brain cell activity, hormone release, heart rate, blood pressure, breathing rate, etc. Interestingly, we’ve recently learned that brain activity is regionally specific and dependent on usage prior to the sleep period. Did you use your dorsal-lateral prefrontal cortex much today? If you did, the activity pattern in that specific part of the brain would be indicative of prior usage during sleep recordings. This type of local activity speaks to the dynamic interrelationship between these two states of consciousness, and also whispers hints suggesting how the deprivation of sleep is not likely a wise strategy for optimal performance.
How is your natural sleep wake cycle determined?
In the early 20th century, a Professor of Psychiatry and Neurology from Vienna named Constantin von Economo began to see patients with a mysterious brain virus that would make them either sleep 20 hours a day, or have severe insomnia. Further exploration by von Economo found these patients had brain lesions in locations he then determined important in the control of human sleep and wake states. More than a half a century later, scientists would discover the remarkable accuracy of von Economo’s interpretations.
Only in the last 20 years have we begun to unravel the circuits and signals in the brain that regulate sleep and wake states. We now understand that the wakefulness you’re experiencing at the current moment is dependent on a network of cell groups that coordinate to provide the signals to wake you up. Cells within the wake network produces a variety of neurotrasmitters to communicate their wake signal to the rest of the brain, including dopamine, acetylcholine, histamine, serotonin, and norepinephrine (or noradrenalin). These signals activate the thalamus and cortex to produce consciousness.
We’re also now aware of a specialized group of cells that facilitate sleep. Yep, these cells become more active during sleep and are located in an area of the brain called the VLPO (ventral lateral preoptic area) which is located in the anterior hypothalamus. Once activated, the VLPO shuts off the wake network actively suppressing wakefulness. It should therefore be no surprise that animals with lesions in this area have real bad insomnia.
So, during the night the sleep center suppresses the wake network, and reciprocally, during the day, the wake network suppresses the sleep center. In addition, it is important to mention a collection of cells in the posterior hypothalamus called hypocretin neurons. These neurons stabilize both states so that wake can be maintained throughout the day and so sleep can be maintained over the night. Notably, the absence of a functioning hypocretin system produces the neurological condition of narcolepsy, which in case you live under a rock or simply haven’t seen the movie My Own Private Idaho, is a condition most recognized for the pathological sleepiness it induces. Patients with narcolepsy don’t need more or less sleep than you or I. Rather, their sleep and wake schedule is highly fragmented. Because they don’t have functioning hypocretin neurons to stabilize the sleep-wake system, a narcoleptic can only maintain wakefulness for a few hours before falling asleep, and then once asleep, they can’t sleep very long. The end result is that these patients will transition between sleep and wake states many times over a 24 hour period instead of having one solid block of wakefulness and one solid block of sleep like you or I have the luxury to experience regularly.
Transitioning between sleep and wake: Why and when?
In 1982, sleep researcher Alexander Borbely (pronounces ‘Borbay’), currently a Professor of Pharmacology at the University of Zurich in Switzerland, published a paper in a small journal in which he proposed a model referred to as the “two-process model for sleep and wake.” Since that time, Borbely’s model has influenced entire sub-fields of research and has become a bedrock of human understanding of sleep, in general. In fact, this seminal article has been cited over 1000 times and is still widely cited today, 30 years after it was first published. What does this model propose, and why is it so important?
In the two-process model,1 alertness (i.e., how sleepy you feel or how awake you feel) is affected primarily by two, mutually exclusive processes: 1) sleep pressure, which builds up during wakefulness and dissipates during sleep and 2) by a wake-promoting circadian rhythm that oscillates in intensity over a 24 period, and in rhythm with the light and dark cycle of our environment.2 Across the day and night, at any moment in time, your sleepiness / wakefulness will be primarily determined by the combined effects of these two processes working somewhat independently of each other.
When conducting research, Borbely noticed sleep would be altered depending on how long the subject was previously awake. In fact, extending wakefulness changed sleep architecture in a dose-dependent fashion; more time awake, more sleep pressure builds, more changes to sleep occur. This led Borberly to hypothesize the existence of a substance that accumulates with wakefulness and subsides during sleep. As the brain continues to work at a high rate during wakefulness, the energy metabolite adenosine is released in the space outside the cell. While questions still remain, there is evidence that the accumulation of extracellular adenosine could be the molecule behind sleep pressure. Here are three pieces of evidence to support this: First, if you inject adenosine into the basal forebrain, sleep ensues rapidly. Second, Starbucks has achieved ubiquity born from the needs of a sleep deprived society. Caffeine blocks adenosine from binding to its receptor, thereby temporarily masking sleepiness. Third, adenosine stimulates Slow Wave Sleep. As Slow Wave Sleep occurs, adenosine rapidly reduces in concentration in a proportional manner.
Importantly, sleep pressure is relieved in a decreasing exponential fashion. In less nerd-like terms, per hour, you dissipate more sleep pressure in the beginning of the night than you do in the later half of the night. The additional sleep pressure that builds (after say, your sound decision to stay up late to watch reruns of Battlestar Galactica) then facilitates longer sleep times. Here’s an example: Let’s say you typically need around 8 hours of sleep per night to feel fully rested but this last week you averaged only 6 hours per night. Then, on the weekend, you were able to sleep 10 hours both on Saturday and Sunday. The elongated sleep was facilitated by the increased sleep pressure that had accumulated during the week – accruing day after day of insufficient nightly sleep. As you can see in this example, despite the fact that sleep pressure wears off faster in the beginning of the night, there was enough “pressure” remaining in the morning to elongate both nights of weekend rest. As mentioned earlier, just how long one can continue to accumulate sleep pressure, and just how long it takes to fully relieve prolonged, accumulated sleep are matters of ongoing investigation.
24 hour Wake Rhythm
The other component of Borbely’s 2-process sleep model is the rhythmic, 24 hour repeating process we’ll refer to as “wake drive.” This drive for wakefulness is independent of sleep pressure and dependent on the light and dark cycle of the environment. So, how does this process work? Environmental light enters the eye and stimulates specialized, light sensitive cells that produce a pigment called ‘melanopsin.’ These cells carry the light signal to a not-yet-mentioned area of the hypothalamus called the suprachiasmatic nucleus (SCN). (Side note: Are you seeing the dominance of the hypothalamus as a critical anatomical site for our sleep wake cycle yet?).
The SCN serves as the brain’s ‘central clock.’ On a daily basis, the “rhythm” of the SCN is reset by light in both direct and indirect ways. First, by light’s direct stimulation of the SCN through the process just described. Second, in a natural environment, when light dims at sundown, the pineal gland begins to release the hormone melatonin (aka: dim-light melatonin onset). Both light and melatonin affect the transcriptional-translational mechanisms that control output signals originating from the SCN. Thus, you can see here how the light / dark signal helps keep the 24 hour rhythm of the body in coordination with the 24 pattern of one complete day. Seasonal adaptions are also likely mediated through similar mechanisms but are beyond the scope of this article.
We now see how the brain synchronizes with the 24 hour cycle of the environment. From here, our central clock synchronizes with internal clocks in tissue throughout the body. It is in this way that our body forms a melody of hormones and behaviors. The timing of these rhythms form functional phase relationships between hormones, cellular activity, gene expression, and behavioral state. For example, as we enter sleep at night, our body temperature drops, melatonin levels are high, and cortisol levels are low. Perhaps the ultimate function of our tissues is dependent upon the entirety of these elements working together? What other process do you think are dependent on the synchronicity of these hormonal-gene-behavioral phase relationships? Everything.
When we sleep, if our body is attuned to our environmental signals, the phasic patterns of temperature, hormones, and other physiological processes come into a sort of balance. If, for example, you go to sleep many hours later than normal for you, you will be sleeping in a different hormonal pool than you would be if you went to bed at a normal time. This is one reason we can’t assume we can grab a few power naps over the day and have the same beneficial effects of nighttime sleep. A nap may relieve some sleep pressure but you may not experience other beneficial functions provided by circadian-aligned sleep episodes. Certainly, we have the ability withstand occasional perturbations of an off-balance night. I also think we have the capacity to withstand the adoption of a polyphasic schedule on a temporary basis. The most available example is new parents. With the birth of a child, all of a sudden a monophasic sleep is no longer an option. In this case, napping when possible seems to be a great temporary option for both the mother and father to achieve (or get closer to) total sleep need. However, chronic misalignment of the multitude of rhythms throughout our body is likely to have consequences. Indeed, shift workers who exist years at a time with an ever-changing schedule, suffer increased risk for many mortal conditions, like cardiovascular disease and cancer. We are, truly, one with nature and I believe it is useful for all of us to personally acknowledge that fact. This information helps us make that connection more tangible.
Wait, why specifically are we referring to this as the wake rhythm?
Good question. One of the many processes that are influenced by the SCN is the activation of our neural wake network. When it’s time to be awake, the SCN will indirectly activate the state-stability hypocretin neurons, which then signal the entire wake network to activate the cortex to produce consciousness. When it’s time for sleep, through some sort of “metabolic voodoo” (read: we ain’t quite sure how this happens), sleep pressure activates of the VLPO, which sends signals to directly inhibit the wake networks and the flip is switched from wakefulness to sleep. As discussed previously, once asleep, as the night progresses, the brain and body go through different stages associated with different restorative functions. Amongst those functions, is a reduction in sleep pressure and – if you’ve been getting good, consistent sleep – you’ll begin the next day with very low sleep pressure, feeling alert and vigilant. Indeed, healthy sleep results in a large variety of cognitive benefits: you are mentally fast and accurate; you have stable mood and stable attention, which allows you to focus on the task at hand; you have good working memory (holding new information in your mind, like digits of a telephone number) and good memory recall, where you’re able to retrieve learned memories stored in neural networks; your decision making is fully functional as executive functions counteract impulsive signals from the limbic system (e.g., yum, I’m going to eat a whole gallon of ice cream! Wait, maybe I shouldn’t. Impulse meets executive control); creativity is heightened; and your economic preferences for risk and reward are optimized. For the last point, when you are sleep deprived you tend to devalue losses and overvalue potential gains. Let’s consider this in the context of gambling. At 4 am at the craps table, you’re more likely to focus on the possibility of winning large sums of money and less likely to consider the consequences of losing your hard earned savings; Casinos make a lot of money during the hours of 3 and 6 am.
Conversely, inadequate sleep causes impairments in all the systems mentioned. However, here is one major problem: We don’t always recognize our own impairment. That’s right, despite significant objective impairments in cognitive performance, a sleep deprived person will tend to underestimate their impairment and overestimate their readiness to perform tasks. Therefore, we should be highly weary of self-reports that claim great performance despite little sleep. Who knows how well this person would have performed with normal sleep. Maybe they would have completed the job twice as fast.
Final judgement and recommendations
Here are my recommendations. Instead of trying to get more for less, try to get the optimal amount of sleep so that you allow yourself the best physical and cognitive performance during the time you are awake. Truly, 16 hours of full cognitive function is preferable to 20 hours of suboptimal performance. Having said that, I think that polyphasic sleep schedules can help those who are having difficulty achieving a full nights rest, and this includes new parents and (other) extreme situations. To these people, I recommend napping when the opportunity presents itself. Prioritize sleep so that you can be the most present, optimistic, and functional parent for your child. Other scenarios likely benefit from different napping schedules, but these benefits come not from reducing sleep need, but from recovering or preventing lost sleep, particularly if you need to adopt this polyphasic sleep schedule for more than a few days. Can a polyphasic sleep schedule reduce total sleep need (or, maintain wake performance) over a few day period? I think it’s possible, but I wouldn’t adopt this approach as a long term strategy for either performance or health. Know the facts and make the right decision for you.
To conclude, I thought I would offer a few alternative chapter titles for Ferris’ book for those who do want to attempt to use polyphasic sleep to sleep less (not more).
|Current Chapter Title||Alternative Chapter Title for Sleep Restrictors|
|Subtracting fat||Adding fat, heart disease, and cancer.|
|Adding muscle||Getting comfortable with sand kicked in your face.|
|Improving sex||Not tonight dear. I’m…..(pause….snore).|
|Perfecting sleep||How to be a version of yourself you don’t like, day after day.|
|Reversing injuries||Crutches: Get some!|
|Running faster and farther||Sitting and dozing.|
|On longer and better life||Just jump stupid. Life sucks anyway.|
Lastly, I’m glad biohackers exist to evaluate new concepts for an improved life. My default, however, is not to try to beat my nature, but to understand it, respect it, and make life decision that prioritize it so I can thrive with health, good performance, and longevity.
Dan Pardi is the CEO of Dan’s Plan, a ‘Quantified-Paleo’ company helping you pursue optimal health in our modern world. We help fix the core problem for poor health – a broken lifestyle. Dan’s Plan focuses on food, movement, and sleep, and provides tools to track personal health data and create feedback loops that “nudge” healthy behaviors. @dansplanonline1.
1. Borbély A. A two process model of sleep regulation. Human neurobiology 1982 1 195.
2. Van Dongen H & Dinges D. Sleep, circadian rhythms, and psychomotor vigilance. Clin Sports Med 2005 24 237-249.
|
<urn:uuid:6367118c-b15f-480c-84d3-5548ac10db1a>
|
CC-MAIN-2016-26
|
http://robbwolf.com/2011/12/09/polyphasic-sleep-part-deux/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783403826.29/warc/CC-MAIN-20160624155003-00005-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.936325
| 3,936
| 2.859375
| 3
|
The general title of Battlefield includes national battlefield, as well as national battlefield park, national battlefield site, and national military park. At present, there are 11 national battlefields in the National Park System.
Antietam National Battlefield
General Lee's first invasion of the North was ended here on September 17th, 1862, in a battle that resulted in more than 23,000 men killed, wounded, and missing.
Big Hole National Battlefield
Nez Perce Indians and U.S. Army troops fought here in a five month conflict that came to be called the Nez Perce War of 1877.
Cowpens National Battlefield
Commemorates a decisive Revolutionary War victory by the army of Daniel Morgan over Banastre Tarleton and his British troops on January 17, 1781.
Fort Donelson National Battlefield
First major victory for the Union Army in the Civil War occurred here in February of 1862 under the command of Ulysses S. Grant. National Cemetery adjoins the park.
Fort Necessity National Battlefield
Colonial troops led by 22-year-old Colonel George Washington were defeated here in the opening battle of the French and Indian War on July 3, 1754.
Monocacy National Battlefield
Known as the "Battle That Saved Washington", the battle of Monocacy on July 9, 1864, marked the last campaign of the Confederacy to carry the war into the north.
Moores Creek National Battlefield
Commemorates the February 27, 1776, Battle of Moores Creek Bridge, the first decisive Patriot victory of the Revolutionary War.
Petersburg National Battlefield
Setting for the longest siege in American history (9 1/2 months) when General Grant failed to capture Richmond in the spring of 1864.
Stones River National Battlefield
Civil War battle that took place at Stones River between December 31, 1862 and January 2, 1863 allowed the Union army to control middle Tennessee.
Tupelo National Battlefield
Lieutenant General Nathan Bedford Forrest tried to cut the railroad supplying the Unions march on Atlanta here on July 13-14, 1864.
Wilson's Creek National Battlefield
The battle fought here on August 10, 1861, was the first major Civil War engagement west of the Mississippi River.
|
<urn:uuid:32c41231-dca0-44d1-932d-3c3f754ce5b3>
|
CC-MAIN-2016-26
|
http://usparks.about.com/blparktypes-nb.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783392527.68/warc/CC-MAIN-20160624154952-00080-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.935446
| 463
| 3.390625
| 3
|
COUILLARD DE LESPINAY, LOUIS, coseigneur of Rivière-du-Sud; baptized 29 Nov. 1658 at Quebec, son of Louis Couillard*, Sieur de Lespinay, and of Geneviève Després; buried 15 May 1728 at Saint-Pierre du Sud.
Louis Couillard de Lespinay gradually built up a large fief. On 4 Aug. 1671 he received from his father, as a settlement of portion by anticipation, an arriere-fief of “four arpents in the said seigneury of Rivière-du-Sud, fronting on the St Lawrence River and extending to a depth of 40 arpents.” On 29 Nov. 1685, conjointly with his brother Jacques, he inherited half of the Rivière-du-Sud seigneury of which his mother had had possession since her husband’s death in 1678; this part became his completely when he bought out his brother Jacques in 1690.
During all these years, Louis Couillard proved to be a good administrator. In 1700 he won a sensational lawsuit against Isaac (Alexandre) Berthier, seigneur of Bellechasse, over the boundaries of his seigneury. Under his stimulus, settling progressed rapidly and the number of settlers increased steadily, so much so that around 1720 the seigneury of Rivière-du-Sud was the second in size from the point of view of population.
This growth made necessary the opening of roads to the interior. Louis Couillard thus became one of the creators of the “king’s road.” In 1713 he obtained an ordinance from the king requiring the settlers of Saint-Thomas and Saint-Pierre to work on roads and bridges, under penalty of fines. As there was a good deal of stalling and opposition, Michel Bégon* issued a new decree on 22 April 1720. A start was thus made on the organization of road-building in New France.
Louis Couillard de Lespinay was buried on 15 May 1728. He had been married four times. On 23 Oct. 1680 he married Marie Vandry, by whom he had two children who died young. On 4 May 1688 he married Marie Fortin, who bore him 11 children. He married Marguerite Bélanger in 1712, became a widower in 1717, and two years later took as his fourth wife Louise Nolin, by whom he had three children.
Jug. et délib. A. Roy, Inv. greffes not., III, 64. Azarie Couillard Després, Histoire des seigneurs de la Rivière-du-Sud et leurs alliés canadiens et acadiens (Saint-Hyacinthe, Qué., 1912). F.-J. Audet, “La seigneurie de la Rivière du Sud,” BRH, VI (1901), 117–19. Azarie Couillard Després, “En marge de l’histoire de la Rivière-du-Sud, BRH, XXI (1915), 116–22.
|
<urn:uuid:69c6d421-61a4-45bd-8fa0-6ddbcbcf7e86>
|
CC-MAIN-2016-26
|
http://www.biographi.ca/en/bio/couillard_de_lespinay_louis_1728_2E.html?revision_id=475
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395166.84/warc/CC-MAIN-20160624154955-00112-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.936904
| 686
| 2.578125
| 3
|
(also stage production)
A play performed on stage rather than broadcast or made into a film: the stage play and later film of Pygmalion
More example sentences
- Ronald Harwood has adapted his stage play for the screen.
- There is no doubt that O'Brien can write, but Eden offers no evidence whatsoever that he can write a stage play.
- We'll also be looking for an extra chorus and lead roles for the Christmas stage production at Sadler's Wells.
For editors and proofreaders
Line breaks: stage play
Definition of stage play in:
What do you find interesting about this word or phrase?
Comments that don't adhere to our Community Guidelines may be moderated or removed.
|
<urn:uuid:f0e4bd1f-f29a-47b4-89c3-4cc91abd6bf9>
|
CC-MAIN-2016-26
|
http://www.oxforddictionaries.com/us/definition/english/stage-play
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783392159.3/warc/CC-MAIN-20160624154952-00179-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.960679
| 150
| 2.8125
| 3
|
You quickly learn that if you don’t want a preschooler to do something then just start your sentence with the word “Don’t!”. Come see what my preschoolers are saying, “Don’t push my button!”
We recently introduced the letter Kk, and with Valentine’s day coming soon, we thought it was most appropriate to explore hugs and KISSES.
To introduce this our new shape unit we read the new book “Hearts are for Loving” and played this fun and colorful game in preschool.
We are waking our bears after a long winter’s sleep. Come and see our celebration of our hibernation in preschool!
We are stuffing bears and putting them down for a long winter’s nap for a lesson on hibernation.
Perhaps you are one of the many who are in the process of taking down the Christmas tree. Well don’t be too quick to think Christmas has to be completely over yet!
The Mitten is one of our favorite winter stories to share with our preschool children. Today I’m sharing a few activities to go along with the book.
A fun book and simple activity to get you talking about your sense of smell during the Christmas season.
Today, we had fun putting a new spin on the gift giving process with the help of a new book and an empty box. Come and see how we enjoyed the Gift of Nothing!
My students cooked up their own Thanksgiving feast to serve up for our classroom family. Teach Preschool wishes you and your family a Happy Thanksgiving too!
|
<urn:uuid:8688818f-5fbc-46b7-bffb-1abe55cad73f>
|
CC-MAIN-2016-26
|
http://www.teachpreschool.org/category/childrens-books/page/3/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783391634.7/warc/CC-MAIN-20160624154951-00082-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.954052
| 333
| 2.71875
| 3
|
Home -> Personal -> Castles -> Cahir
Cahir, Co. Tipperary, Eire. Maintained by the Commissioners of Public Works.
Cahir castle is built on a rocky island in the river Suir (the name is derived from the Gaelic Cathair, meaning stone fort). Although the island was fortified well before, most of the current castle was built in the fifteenth and sixteenth centuries.
The castle was perhaps the strongest fortification in Ireland at the time of Tyrone's rebellion. In 1599, Queen Elizabeth sent the Earl of Essex at the head of an army to crush the rebellion, and in May of that year he took Cahir castle; the castle fell in three days, after the Earl's cannon and culverin (he had one of each) battered down substantial portions of the east wall.
The castle, though easily strong enough to stand against the normal raids, was very vulnerable to gunpowder. Thus, in 1650, when Cromwell appeared before Cahir and presented his usual offer to allow the garrison to "march away with your baggage, arms, and colours, free from injuries or violence," it appears that the garrison attempted no resistance.
The castle was allowed to fall into disrepair following the Civil War. In 1840, the Earl of Glengall had William Tinsley begin repairs, which continued through 1846; the work, unfortunately not accurate restoration, is responsible for much of the detailed appearance today.
Copyright © 1992, 1996, 1998, 2002 Leif Bennett. All rights reserved.
|
<urn:uuid:7a010f61-2b89-4137-a5be-6ddb99b6ec46>
|
CC-MAIN-2016-26
|
http://alumnus.caltech.edu/~leif/cahir.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395620.9/warc/CC-MAIN-20160624154955-00110-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.979608
| 322
| 3.015625
| 3
|
Scientist’s research seeks to identify critical genetic triggers behind aging
Whether a stray gray hair or a crick in the knee, the first signs of aging are often viewed as a force beyond our control. What is aging, it seems, but entropy played out on a more personal level.
But is it?
The notion of aging as a haphazard process is fast losing ground at the frontiers of genetic research where today scientists such as Anne Brunet, PhD, assistant professor of genetics, are uncovering the fundamental mechanisms that help govern the body's resistance to the wear-and-tear of daily life—and ultimately each individual's life span.
The emerging picture shows aging as the result of an orchestrated response by cells to a variety of stimuli. Whether repairing cellular damage or triggering cell death, this response allows the body to evaluate how best to allocate its limited resources as it adapts to changing conditions.
Brunet's research aims to understand this dynamic in its entirety, including which environmental stimuli damage the body, which genes help the body resist or repair this damage and which molecular mechanisms turn these genes on or off.
Understanding this dynamic could potentially shed light on a range of seemingly unrelated human diseases, such as cancer, diabetes and neurodegenerative disorders, which all have a clear age dependency, said Brunet.
Brunet's lab is focused on investigating transcription factors, the proteins that bind to parts of DNA and then act as master switches to trigger the specific genetic programs. She is particularly interested in the forkhead box O, or FOXO, group of factors, which regulates genes responsible for programmed cell death, DNA repair and the detoxification of free radicals, the reactive oxygen molecules produced by the body during metabolism.
Brunet's goal is to use FOXO as a molecular handle to pry open the black box of how longevity is regulated.
"These factors are more of a tool at the beginning," said Brunet. "Once we begin to understand their role in aging, it will allow us to expand our research into why and how we age in a more global manner. But we need to start somewhere."
Brunet first became interested in FOXO factors as a key to longevity in 1997 when researchers at UCSF and Harvard Medical School found that worms with hyperactive factors lived two to three times as long as their normal counterparts. Realizing that these factors exist across species, Brunet decided to study their importance in mammals.
Since then, Brunet has helped to elucidate FOXO's role in what she calls one of the most compelling examples of the molecular regulation of longevity: the insulin-Akt pathway.
After eating, the body releases insulin into the bloodstream. When insulin binds to a cell's surface, it jumpstarts a number of reactions, including the signaling pathway responsible for activating the serine/threonine kinase Akt.
Working with human and mouse cell cultures, Brunet found that Akt inhibits FOXO function by adding a phosphate group to factors in the cell's cytoplasm. The modified factors are in turn prevented from entering the nucleus and turning on their target genes.
Brunet's findings, which were published in Cell in 1999, show that lowering insulin levels helps promote the processes of cell maintenance under FOXO control. Because the body produces less insulin when it consumes less food, these findings may also explain why calorie restriction has been shown to extend life span in species ranging from yeast to primates.
Building on this link between FOXO and longevity, Brunet has gone on to explore other aspects of these factors, including new target genes and other stimuli that regulate their function. In 2004, she published results in Science showing that oxidative stress, caused by free radicals in the cellular environment, prompts these factors to express genes for stress resistance.
Brunet's lab has also shed light on a signaling network within the nucleus that regulates FOXO's response to different conditions. "When activated, these factors do not express all of the genes under their control at the same time," said Brunet. "We are working to understand how specific protein partners in the nucleus combine with them to tell them whether to repair damage, resist damage or induce cell death if a cell is beyond repair."
Having studied their behavior within cell cultures, Brunet is now developing mouse models to uncover their action on the level of the organism. Among other questions, these models will help Brunet explore why an individual's organs tend to age at the same rate and whether the brain plays a central role in controlling this process.
Brunet's current hypothesis points to the hypothalamus-pituitary axis, a region in the brain known to send chemical messengers throughout the body. Early studies by her lab have already confirmed the presence of FOXO factors in high concentrations in this region of the brain.
While aging has long been a subject of study, scientists have only recently made significant headway. "Before, scientists didn't have genes to understand the pathways," said Brunet. "They basically saw a million things happening and didn't know which one was causative."
Today, with the discovery of specific genetic mutations that play a role in aging, Brunet and other scientists have the leverage they need to understand its interrelated processes. And in Brunet's case, this means making full use of FOXO as a molecular tool.
"We want to understand this one piece," said Brunet, "and then from there, hopefully we can shed light on the entire black box."
|
<urn:uuid:29e05ce0-c92d-4cf0-b933-78b14401d9aa>
|
CC-MAIN-2016-26
|
http://news.stanford.edu/news/2006/november8/med-aging-110806.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783403823.74/warc/CC-MAIN-20160624155003-00167-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.957206
| 1,129
| 3.03125
| 3
|
Online MA in TESOL!
NAZO'S TAP THE SHOULDER- PRE READING ACT
Here is an activity that I had learned from one of my university teachers in Holland. You can do this activity as a pre-reading activity or as a speaking discussion activity.
1- Half of the students sit in a circle.
2- The other half of the students stand behind each student that sits.
3- The ones who sit have the right to talk, the others who stand are not allowed to talk unless the teacher taps on the shoulder. When the teacher taps on the student's shoulder who stands, that student has to exchange places with the student who sits in front of him/her.
4- The inner circle students who sit talk about the content questions that are related to the reading passage: e.g if the reading passage is about arranged marriages: "What do you think about arranged marriages?" or "Do most of the arranged marriages lead in fiasco?"
5- The number of students that I have in my classes is 16, so I have 8 students sitting in the middle and 8 standing students. If you have more students in your class, then it would may be ideal to have two cirlcles.
SABANCI UNIVERSITY, ISTANBUL TURKEY
World's Best Jobs!
Dave's ESL Cafe Copyright © 2016 Dave Sperling. All Rights Reserved.
|
<urn:uuid:18138853-b5cb-47d7-862d-2fc54e07aac6>
|
CC-MAIN-2016-26
|
http://www.eslcafe.com/idea/index.cgi?display:1095061646-15530.txt
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395346.6/warc/CC-MAIN-20160624154955-00064-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.949992
| 292
| 2.90625
| 3
|
Why is straight gasoline (or whetever the mixture was before the introduction of ethanol) more efficient (ie, more miles/gallon) than E85? I've known since it's introduction that E85 was less efficient, but why is it?
There is less chemical energy per unit mass in ethanol than there is in the major chemical components of gasoline.
Standard enthalpies of formation for:
Ethanol: -277.0 kJ/mol
n-Hexane: -40.0 kJ/mol (other hexanes have similar (40-60 kJ/mol) standard enthalpies)
Carbon Dioxide: -393.5 kJ/mol
Water: -285.83 kJ/mol
Combustion of ethanol: 1365 kJ/mol
Combustion of n-Hexane: 4381 kJ/mol
Even taking into account that n-Hexane has a molecular mass ~2 times greater than ethanol, you can see that burning hexane releases a lot more energy.
|
<urn:uuid:251b9ef5-0c4e-4f59-87f3-77796228368c>
|
CC-MAIN-2016-26
|
http://physics.stackexchange.com/questions/12421/why-is-e85-less-efficient-than-straight-gasoline
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396872.10/warc/CC-MAIN-20160624154956-00060-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.890425
| 223
| 3.03125
| 3
|
The consumer confidence index is a monthly survey of public attitudes toward the economy. It is compared to the optimism of the nation in 1985, which was arbitrarily given a score of 100. Hence a score below 100 means the public is less confident in the economy, and a score above 100 means the public is more confident. The highest ever recorded on the consumer confidence index was a 144.7 in January, 2000 during the presidency of Bill Clinton. By contrast, the lowest ever recorded on the consumer confidence index was a 25.3 in February, 2003 during the George W. Bush administration. This monthly report is watched closely by stock market traders and politicians.
|
<urn:uuid:73b7ab4d-6332-41cb-a82c-373fdc95dfbd>
|
CC-MAIN-2016-26
|
http://www.conservapedia.com/index.php?title=Consumer_confidence&oldid=1032093
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783400031.51/warc/CC-MAIN-20160624155000-00004-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.959876
| 130
| 2.875
| 3
|
(BlackDoctor.org) — Asthma is a lung disorder characterized by sudden fits of wheezing, coughing, or shortness of breath. According to research or other evidence, the following self-care steps may be helpful:
What You Need To Know:
- Clean it up
To avoid triggering asthma attacks, control household and workplace irritants such as dust, mold, smoke, chemicals, and animal dander, and dietary triggers like certain food additives
- Keep a healthy body weight
Shed extra pounds to improve breathing and decrease the need for medications
- Check out certain antioxidants
30 mg a day of lycopene or 64 mg a day of natural beta-carotene can help prevent exercise-related asthma attacks
- Try proven herbal remedies
Supplements containing boswellia extract (900 mg a day), ivy leaf extract (50 drops a day), or tylophora leaf (200 to 400 mg a day) may improve breathing symptoms; children should be given one-half of these amounts or less, depending on body weight
- Watch the salt
Avoid aggravating symptoms by limiting use of table salt and salty fast foods, and by reading labels to find low sodium groceries
- See an allergist
Find a specialist to help you build tolerance to allergens
These recommendations are not comprehensive and are not intended to replace the advice of your doctor or pharmacist. Continue reading the full asthma article for more in-depth, fully-referenced information on medicines, vitamins, herbs, and dietary and lifestyle changes that may be helpful.
Dietary Changes That May Be Helpful
A vegan (pure vegetarian) diet given for one year in conjunction with many specific dietary changes (such as avoidance of caffeine, sugar, salt, and chlorinated tap water) and combined with a variety of herbs and supplements led to significant improvement in one group of asthmatics. Although 16 out of 24 people who continued the intervention for the full year were much better and one person was actually cured, it remains unclear how much of the action was purely a result of the dietary changes compared with the many other therapies employed.
Vitamin C, an antioxidant present in fruits and vegetables, is a powerful antioxidant and anti-inflammatory. This anti-inflammatory activity may influence the development of asthma symptoms. A large preliminary study has shown that young children with asthma experience significantly less wheezing if they eat a diet high in fruits rich in vitamin C.
Studies suggest that high salt intake may have an adverse effect on asthma, particularly in men. In a small, preliminary trial, doubling salt intake for one month led to a small increase in airway reactivity (indicating a worsening of asthma) in men with asthma, as well as in non-asthmatics. Several double-blind trials have provided limited evidence of clinical improvement following a period of sodium restriction. It is difficult to compare the results of these studies because they used different amounts of sodium restriction. However, they consistently suggest that increased dietary sodium may aggravate asthma symptoms, especially in men.
Although most people with asthma do not suffer from food allergies, unrecognized food allergy can be an exacerbating factor. A medically supervised “allergy elimination diet,” followed by reintroduction of the eliminated foods, often helps identify problematic foods. A healthcare professional must supervise this allergy test because of the possibility of triggering a severe asthma attack during the reintroduction.
Some asthmatics react to food additives, such as sulfites, tartrazine (yellow dye #5), and sodium benzoate, as well as natural salicylates (aspirin-like substances found in many foods). A doctor or an allergist can help determine whether chemical sensitivities are present.
Lifestyle Changes That May Be Helpful
Being overweight increases the risk of asthma. Obese people with asthma may improve their lung-function symptoms and overall health status by engaging in a weight-loss program. A controlled study found that weight loss resulted in significant decreases in episodes of shortness of breath, increases in overall breathing capacity, and decreases in the need for medication to control symptoms.
Medical management of asthma includes controlling environmental factors that can trigger an attack (animal dander, dust mites, airborne molds and pollens, and certain foods).
Vitamins That May Be Helpful
Lycopene, an antioxidant related to beta-carotene and found in tomatoes, helps reduce the symptoms of asthma caused by exercising. In one double-blind trial, over half of people with exercise-induced asthma had significantly fewer asthma symptoms after taking capsules containing 30 mg of lycopene per day for one week compared to when they took a placebo.
Vitamin B6 deficiency is common in asthmatics. This deficiency may relate to the asthma itself or to certain asthma drugs (such as theophylline and aminophylline) that deplete vitamin B6. In a double-blind trial, 200 mg per day of vitamin B6 for two months reduced the severity of asthma in children and reduced the amount of asthma medication they needed. In another trial, asthmatic adults experienced a dramatic decrease in the frequency and severity of asthma attacks while taking 50 mg of vitamin B6 twice a day. Nonetheless, the research remains somewhat inconsistent, and one double-blind trial found that high amounts of B6 supplements did not help asthmatics who required the use of steroid drugs.
Magnesium levels are frequently low in asthmatics. Current evidence suggests that high dietary magnesium intake may be associated with better lung function and reduced bronchial reactivity. Intravenous injection of magnesium has been reported in most, but not all, double-blind trials to rapidly halt acute asthma attacks. Magnesium supplements might help prevent asthma attacks because magnesium can prevent spasms of the bronchial passages. In a preliminary trial, 18 adults with asthma took 300 mg of magnesium per day for 30 days and experienced decreased bronchial reactivity. However, a double-blind trial investigated the effects of 400 mg per day for three weeks and found a significant improvement in symptoms, but not in objective measures of airflow or airway reactivity. The amount of magnesium used in these trials was 300 to 400 mg per day. Children usually take proportionately less based on their body weight, but one study of asthmatic children between the ages of 17 and 19 used 300 mg of magnesium per day.
Pycnogenol is a proprietary mixture of flavonoids extracted from the bark of a French maritime pine tree. In a double-blind trial, supplementing with pycnogenol significantly improved lung function and asthma symptoms and significantly reduced the need for rescue medication in a group of children (ages 6 to 18 years) with asthma. In contrast, no significant changes were seen in the placebo group. The amount of pycnogenol used was 1 mg per pound of body weight per day, in two divided doses, for three months.
Supplementation with 1 gram of vitamin C per day reduces the tendency of the bronchial passages to go into spasm, an action that has been confirmed in double-blind research. Beneficial effects of short-term vitamin C supplementation (i.e., less than three days) have been observed. In double-blind trials, supplementation with 1,000 to 1,500 mg of vitamin C per day for 2 to 14 days prevented attacks of exercise-induced asthma. Two other preliminary trials found that vitamin C supplementation reduced bronchial reactivity to metacholine, a drug that causes bronchial constriction. However, other studies, including two double-blind trials, have failed to corroborate these findings. The only double-blind trial of a long duration found that vitamin C supplementation (1 gram per day for 14 weeks) reduced the severity and frequency of attacks among Nigerian adults with asthma. A buffered form of vitamin C (such as sodium ascorbate or calcium ascorbate) may work better for some asthmatics than regular vitamin C (ascorbic acid).
People with low levels of selenium have a high risk of asthma. Asthma involves free-radical damage that selenium might protect against. In a small double-blind trial, supplementation with 100 mcg of sodium selenite (a form of selenium) per day for 14 weeks resulted in clinical improvement in six of eleven patients, compared with only one of ten in the placebo group. Most doctors recommend 200 mcg per day for adults (and proportionately less for children)-a much higher, though still safe, level.
Double-blind research shows that fish oil partially reduces reactions to allergens that can trigger attacks in some asthmatics. Another double-blind study showed that fish oil supplements prevented exercise-induced asthma attacks in people with asthma. A few other researchers have reported small but significant improvements when asthmatics supplement with fish oil, but reviews of the research concluded that most fish oil studies showed little or no benefit. It is possibl
e that some of these trials failed to show an improvement because they did not last long enough to demonstrate an effect. There is evidence that children who eat oily fish may have a much lower risk of getting asthma. Moreover, in a double-blind trial, children who received 300 mg per day of fish oil (providing 84 mg of EPA and 36 mg of DHA) experienced significant improvement of asthma symptoms. It should be noted that these benefits were obtained under circumstances in which exposure to food allergens and environmental allergens was strictly controlled. Though the evidence supporting the use of fish oil remains somewhat conflicting, eating more fish and supplementing with fish oil may still be worth considering, especially among children with asthma.
In a double-blind study of people with asthma, supplementation with aproprietary extract of New Zealand green-lipped mussel (Lyprinol) twice a dayfor 8 weeks significantly decreased daytime wheezing and improved airflowthrough the bronchi. Each capsuleof Lyprinol contains 50 mg of omega-3 fatty acids.
A study conducted many years ago showed that 80% of children with asthma had hypochlorhydria (low stomach acid). Supplementation with hydrochloric acid (HCl) in combination with avoidance of known food allergens led to clinical improvement in this preliminary trial. In more recent times, HCl has usually been supplemented in the form of betaine HCl. The amount needed depends on the severity of hypochlorhydria and on the size of a meal. Because it is a fairly strong acid, betaine HCl should be used only with medical supervision.
In some people with asthma, symptoms can be triggered by ingestion of food additives known as sulfites. Pretreatment with a large amount of vitamin B12 (1,500 mcg orally) reduced the asthmatic reaction to sulfites in children with sulfite sensitivity in one preliminary trial. The trace mineral molybdenum also helps the body detoxify sulfites. While some doctors use molybdenum to treat selected patients with asthma, there is little published research on this treatment, and it is not known what an appropriate level of molybdenum supplementation would be. A typical American diet contains about 200 to 500 mcg per day, and preliminary short-term trials have used supplemental amounts of 500 mcg per day. People who suspect sulfite-sensitive asthma should consult with a physician before taking molybdenum.
Quercetin, a flavonoid found in most plants, has an inhibiting action on lipoxygenase, an enzyme that contributes to problems with asthma. No clinical trials in humans have confirmed whether quercetin decreases asthma symptoms. Some doctors are currently experimenting with 400 to 1,000 mg of quercetin three times per day.
Bromelain reduces the thickness of mucus, which may be beneficial for those with asthma, though clinical actions in asthmatics remain unproven.
Some researchers have suggested that asthma attacks triggered by exercise might be caused by free-radical damage caused by the exercise. Beta-carotene is an antioxidant that protects against free-radical damage. Israeli researchers reported that 64 mg per day of natural beta-carotene for one week in a double blind trial protected over half of a group of asthmatics who experienced attacks as a result of exercise. More research is needed to confirm this promising finding.
The oral administration of a thymus extract known as thymomodulin has been shown in preliminary and double-blind clinical trials to improve the symptoms and course of asthma. Presumably this clinical improvement is the result of restoration of proper control over immune function.
|
<urn:uuid:c5ac072e-318a-4d17-af18-d77343c33e6e>
|
CC-MAIN-2016-26
|
http://blackdoctor.org/2580/natural-remedies-for-asthma-for-kids/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397864.87/warc/CC-MAIN-20160624154957-00114-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.943638
| 2,599
| 3.203125
| 3
|
Translation of tail in Spanish:
- 1 1.1 countable(of horse, fish, bird) cola (feminine)to be on somebody's tailpisarle los talones a alguienthey've been on our tail since we left
seguir a alguien de cercanos vienen pisando los talones desde que salimosto turn tailponer pies en polvorosawith one's tail between one's legscon el rabo entre las piernascon la cola entre las patas (Mexico)to chase one's (own) tail [colloquial]ir y venir de un lado para otro sin conseguir nadaExample sentences1.2 countable [colloquial] (buttocks)
trasero (masculine) [colloquial]cola (feminine) (Latin America) [colloquial]pompis (masculine) (Spain) [colloquial]Example sentences1.3 uncountable (US) [vulgar] (woman)he's after some tail
- Lastly, all chordates have a post-anal tail, or extension of the notochord and nerve cord past the anus.
- The tail, like the rest of the body, had no internal skeleton and was reinforced only by lines of scales.
- During the acupuncture stimulation, animals were kept in plastic holders with their tails and hind legs protruding out.
anda buscando un polvo [slang]
- An honest man would have packed his bags, hopped in his truck, and hauled tail out of that place a long time ago.
- 2 countable(of plane, comet, kite) cola (feminine)(of shirt, coat) faldón (masculine)(before noun) tail section(of animal) parte (feminine) de la cola(of aircraft) sección (feminine) de la colasee also→ tails 1
alerón (masculine) de colaExample sentences
- Use the rudder to keep the tail right behind the nose, independent of what you're doing with the ailerons.
- The tail unit comprises all-moving horizontal tail surfaces and a single-fin vertical tail fitted with a rudder.
- Before departing they are instructed to try and photograph identification numbers or aircraft tails, if possible, and bring back the evidence.
- The tail of his shirt and parts of his pants and underpants were burned.
- Nicanor wore a multicolored striped oxford shirt with the tails tied at his waist.
- While she had been reading, he had unbuttoned the dark green cotton shirt and untucked the tails from his jeans.
- It is this solar wind - seen only in comet tails - that carries storms from the Sun to Earth.
- The refrigerator-sized satellite will collect dust particles from the tail of comet Wild 2 as the two pass each other on Friday morning.
- They noted that comets had two tails - one of dust, one of ions - and only the dust tail could be explained by the pressure of sunlight pushing against the comet.
- 3 countable (pursuer) [colloquial] to put a tail on somebodyhacer seguir a alguienExample sentences
- Then again Jack had a reason to drive evasively; even if he hadn't detected a tail, which was likely.
- In a scene right out of The Sopranos, a tail followed a BFI truck out of the Lincoln Tunnel one evening and nearly ran it off the road in New Jersey.
- 1 (follow)(suspect)he was tailing me
seguirme venía siguiendo (los pasos)are you sure you haven't been tailed?¿seguro que no te han seguido?Example sentences
- Richard Tomlinson is racing down the autostrada just outside Rimini with two Italian secret service men tailing him.
- Ilyich growled, but knew that he was outmatched for the time being, so with great reluctance, he bolted out of the room as fast as possible, with Jerwon and Greg tailing him closely.
- Online shopping is hot this year with famous folk, since schlepping to FAO Schwartz with an entourage and a legion of paparazzi tailing you tends to negate the warm, holiday glow!
- The decking market in Australia is huge, obviously tends to follow and tail along with the housing market in Australia.
- Behind us my guards and H'risnth's entourage tailed along, Kh'hitch engaged in a subdued exchange with the ambassador.
- When he's on a job on the weekend, she's usually right beside her dad, tailing along.
- 2 (Cooking) → top and tailExample sentences
- Top and tail the green beans and cook them in salted boiling water for 3-4 minutes till tender, then drain them and rinse under cold, running water.
- Top and tail the green beans, peel the baby onions or cut the spring onion into 2.5cm pieces.
- Top and tail the green beans, then cook in boiling salted water until very tender.
- 1 (diminish)
- traffic is tailing back from the centre
- 1 (diminish)
ir disminuyendo or mermando
ir disminuyendo or mermando
hay una cola de tráfico or una caravana de coches que se extiende desde el centro
What do you find interesting about this word or phrase?
Comments that don't adhere to our Community Guidelines may be moderated or removed.
|
<urn:uuid:3473f481-fe95-4e52-b66e-4737cbd3d4b1>
|
CC-MAIN-2016-26
|
http://www.oxforddictionaries.com/translate/english-spanish/tail
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783400572.45/warc/CC-MAIN-20160624155000-00081-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.859466
| 1,228
| 2.859375
| 3
|
Two years after the pacific coast of Japan was rocked by a massive earthquake and tsunami, many people are still struggling to recover.
Two years after the devastating tsunami and earthquake that killed close to 19,000 people and wiped out many coastal villages on March 11, 2011, too many people are still living in temporary housing, villages closer to Fukushima are still struggling to recover from the radioactive fallout caused by the nuclear crisis, and people in many remote fishing villages who were economically strapped before the tsunami face a future that’s uncertain at best and bleak at worst.
You may call that quintessential Japanese efficiency–or a Pecksniffian obsession with appearances.
Meanwhile, Japan’s recovery is stuck in neutral, afflicted by a failure of flexibility and imagination on the part of government, bureaucracies and the people who have the power to change existing rules and regulations but don’t use it.
Rule-bending, of course, has never been Japan’s forte.
In a press briefing held at the Foreign Correspondents’ Club of Japan earlier this year, Futoshi Toba, mayor of Rikuzentakata, Iwate Prefecture, noted, “Honestly speaking, the state of our city is nowhere close to recovery.” Rikuzentakata, hard hit by the tsunami, saw 1,556 people killed, including the mayor’s own wife, with 218 people never found. In summary, 7 percent of its total population disappeared.
Asked about the root cause of the delayed recovery, the mayor cited government red tape, vertically organized government agencies (each working in a silo) and leadership’s inability to act and think outside regulations never formulated to cope with a thousand-year storm.
Futoshi Toba, mayor of Rikuzentakata
After two long years, Mayor Toba said, “We see piles of rubble everywhere, while damaged public facilities remain inactive.” The situation for Rikuzentakata is particularly devastating, because the town itself, located in the middle of nowhere, is built on weak economic and financial foundations, while its small population has many senior citizens.
While there are several reasons for our slow recovery, Toba pinned the main blame on “the way our bureaucracy thinks and acts.”
Toba recalled what happened several months after the earthquake and tsunami hit the town. “We were left with not a single supermarket in town. There were no retail outlets standing where our residents could even buy bottled water, let alone food.” The plan for a much needed supermarket was turned down by regulators, said Toba, on the grounds that the area is zoned for agricultural use. Every day, the town smacks head-first into a Japan too rigid to adapt compassionately to crisis.
After the Xenia, Ohio tornado, you could still see damage scars twenty-five years later. I have been to Sendai, Japan before the tsunami. It will be many years before they can even restore the basic services, so I suspect they will be rebuilding for many years to come.
These things take time. There are no immediate miricles for planning a new environment and getting everything cleaned up and rebuilt. Patience please.
Just my opinion.
Wow! Stop complaining? I did not see it coming. I am on their side (those in Rikuzentakata). What the people in that town are facing and fighting against deserve to be heard. Japan's paralysis is truly heart breaking.
Using various slices of the RF spectrum for sensing rather than communications has fascinating potential and some impressive implementations, but there are still many significant challenges, especially in the terahertz (sub-mm) band.
Using environmental energy to power remote sensor nodes remains a high interest item among system designers, especially those choosing wireless sensor node (WSN) components for remote and/or hazardous locations. At the Sensor Expo conference in Santa Clara, Calif., presenters at an energy harvesting and power symposium agreed that energy harvesting systems still require juggling many variables.
|
<urn:uuid:28722832-d7ad-4beb-9487-d9c687dc0588>
|
CC-MAIN-2016-26
|
http://www.eetimes.com/author.asp?section_id=36&doc_id=1287096&piddl_msgpage=2
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398209.20/warc/CC-MAIN-20160624154958-00026-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.957491
| 834
| 2.578125
| 3
|
I'm trying to add 10 seconds to a table field using the TIMESTAMPADD function. But I'm getting all types of syntax errors. I tried all types of combinations, nothing seems to work. Oracle's web site is not too helpful.
SELECT TIMESTAMPADD(SQL_TSI_SECOND, 10, SYSDATE) FROM DUAL;
Any help would be greatly appreciated.
Are you sure it's an Oracle function and not a user defined function?
We can be more helpful if you post error codes and messages.
If you have a date MY_DATE you can add 1 day with +1:
SELECT my_date+1 FROM dual;
You can add one hour with +1/24:
SELECT my_date+1/24 FROM dual;
You can add one second with +1(60*60*24):
SELECT my_date+1/(60*60*24) FROM dual;
To add 10 seconds:
SELECT my_date+10/(60*60*24) FROM dual;
1 day = 86400 seconds, thus one second = 1/86400 days. Adding 1 to a date adds one day. Thus adding one second by adding 1/86400. To add 10 seconds, just add (1/86400)*10 = 1/8640.
select sysdate + 1/8640 from dual; // this returns sysdate + 10 seconds.
I found TIMESTAMPADD in a SQL reference, but I couldn't get it to work and couldn't find it in the data dictionary.
Thank you very much! It seemed to have worked...
Why am I having a problem adding a minute to a certain date?
I'm trying to execute the following statement:
SET my_date = my_date + 1/(60*24)
When I query the table, my_date column doesn't get updated.
Any help would greatly be appreciated.
It gets updated, however your defoult date format is probably showing you just the day portion of the date, without the time part.
Select from your table like this:
SELECT TO_CHAR(my_date,'MM/DD/YYY HH24:MI:SS') FROM my_table;
ASCII a stupid question, get a stupid ANSI
24 hours in a day .... 24 beer in a case .... coincidence?
Thanks, it worked.
Click Here to Expand Forum to Full Width
|
<urn:uuid:43995242-4ddf-473a-8e78-7f09aef5bb61>
|
CC-MAIN-2016-26
|
http://www.dbasupport.com/forums/showthread.php?7447-TIMESTAMPADD-function-problems
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396887.54/warc/CC-MAIN-20160624154956-00139-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.818197
| 515
| 2.625
| 3
|
Pathways is a part of the Ministry of Education’s Student Success Initiative, which is transforming our system. The goal of Pathways is to prepare students for the future. It is important for students to find success and joy in their learning throughout high school and beyond. Pathways assists students in planning and pursuing a post-secondary destination that relates to their interests, skills and abilities.
Pathways planning is an integral part of the Guidance and Career Education program in our schools, which plays a central role in helping students understand, develop and apply skills related to lifelong learning, interpersonal relationships, educational and career planning and goal setting.
Pathways initiatives provide a wide range of course types, programs and learning opportunities to prepare students for success in secondary school and beyond. Secondary schools offer a variety of course types to meet the needs of all learners.
|
<urn:uuid:4936f421-8374-42ae-83f1-63919a602dfb>
|
CC-MAIN-2016-26
|
http://haltonpathways.ca/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393442.26/warc/CC-MAIN-20160624154953-00037-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.961082
| 171
| 2.765625
| 3
|
Please Report Any Broken Links Or Trouble You Might Come Across To The Webmaster
\ Please Take A Moment To Let Us Know So That We Can Correct Any Problems And Make Your Visit As Enjoyable And As Informative As Possible.
|Click On Image
For Full Size Image
By And/Or Copyright
|26k||Abraham Whipple was born on 26 September 1733 near Providence RI and chose to be a seafarer early in his life. He embarked upon a career in the lucrative West Indies trade. In the French and Indian War period, he became a privateersman and commanded privateer Game Cock from 1759 to 1760. In one six-month cruise, he captured 23 French ships. As American colonists began to resist unfair oppression by the British crown, acts of defiance became more and more prevalent. One such occurrence happened on 18 June 1772, when Whipple led 50 Rhode Islanders in the capture and burning of British revenue cutter Gaspee, which had run aground off Pawtucket while chasing the packet Hannah.
Three years later, the Rhode Island Assembly appointed Whipple commodore of two ships fitted out for the defense of the colony's trade. On the day the sea captain received his commission, 15 June 1775, he led his men to capture the frigate HMS Rose. After cruising in the vicinity of Narragansett Bay, he headed south to Bermuda to procure gunpowder for use by the colony and, on the return voyage, transported naval recruits to Philadelphia. Upon her arrival there, his ship, Katy, was taken over by agents of the Continental Congress and was fitted out as sloop-of-war Providencce. Whipple was commissioned a captain in the Continental Navy on 22 December and was given command of 24-gun frigate Columbus. During the period from 17 February to 8 April 1776, he commanded that ship during the first American Navy-Marine Corps amphibious expedition to cruise to New Providence, in the Bahamas, to seize essential military supplies from the British garrison at Nassau. After returning north to New England, Whipple captured five British prizes before 27 March 1778, when his ship ran aground off Judith Point. After stripping the ship, the wily captain and his crew abandoned her and escaped capture ashore. Next assigned to command 28-gun frigate Providence, Whipple ran the British blockade on the night of 30 April 1778, damaging HMS Lark and outrunning another Britisher during the escape. Tacking for France, Whipple's Providence crossed the Atlantic unmolested, bearing important dispatches relating to agreements between France and the American colonies, and reached Paimboeuf. After acquiring needed guns and supplies for the Continental Army, Providence and Boston sailed home to the colonies, taking three prizes en route.
Upon his return, Whipple received command of a small squadron; Providence, Ranger, and Queen of France. On one occasion in mid-July 1779, this group of ships encountered a large British convoy in dense fog off the Newfoundland Banks. Whipple cagily concealed his guns and ran up the British flag. Like a wolf among sheep, he cut 11 prizes out of the convoy, eight of which contained spoils of war valued together at over one million dollars, easily one of the richest captures of the entire war. Following this adventure, Whipple cruised off Bermuda before arriving at Charleston, S.C., on 23 December 1779. British forces threatened that key Continental port, causing the guns and crews from the Continental Navy ships in port to be moved on shore to reinforce the land batteries to repulse the expected British assault. However, after a rugged four-month siege, the overwhelming pressure of British arms forced the Continental forces to surrender on 12 May 1780. Whipple remained a prisoner of the British until he was paroled to Chester, Pa., and he took no further part in the war. Upon the conclusion of hostilities, Whipple took up farming near Cranston RI. For the remainder of his life, he remained a farmer, with the exception of two spells of seafaring as master of merchantmen, first of General Washington and then of St. Clair. With the formation of the Ohio Company in 1788 and the initial westward migration into that territory, Whipple and his family became pioneers on the American frontier and were among the founders of the town of Marietta, Ohio. Granted a pension by Congress in recognition of his distinguished service in helping to win American independence, Whipple died at Marietta on 27 May 1819.
USS Whipple (DE 1062) was the third ship named in his honor, preceded by Destroyer #15 (1902-1919), and DD 217 (1920-1945). (Photo from the Whipple Family Web Site)
|166K||1 October 1974: off Hawaii - USS Whipple underway. (U.S. Navy photo #KN-22730 by PH3 D.J. Tyree)||Ed Zajkowski|
|100K||December 1974: Hong Kong - Whipple tied up to a mooring buoy while on a port visit to the Crown colony.||Robert Hurst|
|87K||circa 1977-1979: at Pearl Harbor - moored inboard of USS Badger (DE 1071)||Dr. Kenneth Hartman|
|149K||date / location unknown||Robert M. Cieri|
|218k||02 October 1970: Vancouver, British Columbia, Canada - USS Whipple (DE 1062) underway off Vancouver. (Photograph by Walter E. Frost) (Photo #AM1506-S3-3-: CVA 447-8942 from the City of Vancouver Archives)||Mike Green|
|147k||26 May 1977: At sea - A sailor suffering from a collapsed lung is hoisted aboard an HH-53 Super Jolly helicopter from the helicopter pad of Whipple. The US Air Force helicopter will transport him to a medical facility on shore. (U.S. Navy photo DVID #DF-ST-86-11913 by Ssgt Martin Cavazos from the Defense Visual Information Center)||Navsource|
|99k||circa 1978: At sea - USS Whipple (DE 1062) underway as a SH-3 Sea King ASW helicopter hovers over her flight deck, during fleet exercises, circa 1978. An SH-2D LAMPS (Light Airborne Multipurpose System) helicopter is spotted on Whipple's deck forward of her Sea Sparrow missile launcher. (U.S. Naval Historical Centre Photo #KN-26918, Photo and text from the Dictionary of American Naval Fighting Ships)||Robert Hurst|
|70k||An undated postcard view of Whipple as an FF. (Postcard #ICS-107337 © Marine Photos and Publishing Co., San Diego, Cal.; shown at 125% of original size)
Caption reads: U.S.S. WHIPPLE (FF-1062) - Named for Commodore Abraham Whipple (1733-1819) of the Continental Navy and the third ship of the fleet to bear the name. She is the eleventh ship of the Knox Clas of destroyer escorts, specially designed for Anti-Submarine Warfare, but also capable of effective performance in patrol, Anti-Air Warfare, shore bombardment and command functions.
|63k||An undated postcard view of Whipple as an FF. (Postcard #P43257 © Marine Photos and Publishing Co., Spring Valley, Cal.; shown at 125% of original size)
Caption reads: U.S.S. WHIPPLE (FF-1062), a Knox class frigate home ported in Pearl Harbor, Hawaii, is the third ship of the fleet christened in honor of Revolutionary War hero Abraham Whipple. Primarily an anti-submarine warfare (ASW) platform, she also has effective anti-air (AAW) and anti-surface warfare (ASUW) capabilities.
|143k||22 May 1982: At sea - Crew members aboard Whipple stand at the ship's rail to render honors to the crew of the frigate USS Brewton (FF 1086) after the completion of a manila high-line transfer-at-sea. (U.S. Navy photo DVID #DN-SN-84-01401 by Don S. Montgomery from the DVIC)||Navsource|
|194k||***1 January 1993: Naval Station, Subic Bay P.I. - A view of the repair ship USS Ajax (AR 6) moored at the Boton pier. The three frigates nested with the Ajax are the USS Brewton (FF 1086), Whipple and USS Ouellet (FF 1077). (U.S. Navy photo DVID #DN-ST-93-01096 by Don S. Montgomery from the DVIC) (This, and the next photo are dated 1 January 1993. However, as pointed out by Carl Musselman, Ajax was decommissioned in 1986. In addition, Brewton hadn't received her hull upgrade in these shots. The date has to be incorrect, and the real date has to be prior to 1984.)|
|228k||***1 January 1993: Naval Station, Subic Bay P.I. - A view of the repair ship Ajax moored at the Boton pier. The three frigates nested with the Ajax are the USS Brewton (FF 1086), Whipple and USS Ouellet (FF 1077). (U.S. Navy photo DVID #DN-ST-93-01095 by Don S. Montgomery from the DVIC)|
|90K||July 1985: Off Oahu Hawaii (Photo © Richard Leonhardt)||Richard Leonhardt|
|195k||6 January 1987: At sea - An elevated starboard view of Whipple underway. (U.S. Navy photo DVID #DN-SC-86-08674 by PH2 Powell from the DVIC)||Navsource|
|150K||July 1987: Pearl Harbor - USS Badger (FF 1071) pierside with Whipple outboard of her.||Robert M. Cieri|
|132k||1 June 1989: Pearl Harbor, Hi. - A starboard quarter view of Whipple underway. (U.S. Navy photo DVID #DN-SC-92-06499 by OS2 John Bouvia from the DVIC)||Navsource|
|117k||18 September 1989: San Diego, Cal. - Whipple moves past the carrier piers at Naval Air Station, North Island, as it departs San Diego at the start of PACEX '89. Tied up in the background are the aircraft carriers USS Constellation (CV 64), left; USS Ranger (CV 61), center; and USS Independence (CV 62), right. (U.S. Navy photo DVID #DN-ST-90-09780 by PHAN Andrew Heuer from the DVIC)|
|155k||18 September 1989: San Diego, Cal. - Whipple moves past the carrier piers at Naval Air Station, North Island, as it departs San Diego at the start of PACEX '89. Tied up in the background is the USS Independence (CV 62). (U.S. Navy photo DVID #DN-ST-90-09781 by PHAN Andrew Heuer from the DVIC)|
|179k||31 May 1996: Pearl Harbor, Hi. - Port quarter view of the decommissioned guided missile frigate Duncan (FFG 10) moored with other reserve ships at the Ships Intermediate Maintenance Facility in the middle loch at Pearl Harbor. To the right are the Knox class frigates Harold E. Holt (FF 1074), Whipple (FF 1062) and one unidentified unit. (U.S. Navy photo DVID #DN-SC-97-01130 by Don S. Montgomery, USN (ret.), from the DVIC)|
|165k||4 June 2000: Middle Loch, Pearl Harbor - Port quarter view of Whipple moored at the Naval Ships Intermediate Maintenance Facility. Whipple was the last remaining Knox class ship at this site. (U.S. Navy photo DVID #DN-SC-02-05644 by Don S. Montgomery from the DVIC)|
|77K||1 August 2000: Moored at NISMF Pearl Harbor, Hi.||© Jim Bedient|
|62k||undated: Pearl Harbor, Hi. - A screen capture from the movie "Pearl Harbor" shows Whipple and another unidentified Knox class frigate in the scene.||William Erndt
USS Whipple 73 - 76
|385k||23 April 2009: the Atlantic Ocean - The Mexican navy Knox-class frigate ARM ARM Almirante Francisco Javier Mina (F-214) sails in formation during the photo exercise of UNITAS Gold, the 50th iteration of the annual multinational maritime exercise. This is the first time Mexico has participated in the partnership building exercise. (U.S. Navy photo by Mass Communication Specialist 2nd Class Alan Gragg. (U.S. Navy photo by MC2 Alen Gragg from the United States Southern Command)||Robert Hurst|
|280k||04 May 2009: off Jacksonville, Fla. - The Mexican ship ARM Almirante Francisco Javier Mina (F-214), along with ships from other countries participating in Exercise Unitas Gold, takes part in a parade of ships just off the coast of Jacksonville. The Jacksonville area hosted maritime forces from Argentina, Brazil, Canada, Chile, Colombia, Ecuador, Germany, Mexico, Peru, the United States and Uruguay for the 50th iteration of the annual multinational maritime exercise. (U.S. Navy photo #090504-N-1644C-380 by MCC Anthony Casullo from the Navy News Service)|
|371k||09 July 2009: location unknown - The Mexican ship ARM Almirante Francisco Javier Mina (F-214) tied up pierside. (Photo by Hendric)|
|Whipple's Commanding Officers
Thanks to Wolfgang Hechler & Ron Reeves
|Dates of Command||Commanding Officers|
|1.) 22 Aug. 1970 - 14 Feb. 1972||Cmdr. Jack Campbell|
|2.) 14 Feb. 1972 - 10 Sep. 1973||Cmdr. Walter Anthony Orsik|
|3.) 10 Sep. 1973 - 25 Jul. 1975||Cmdr. Richard David Milligan|
|4.) 25 Jul. 1975 - 07 Jul. 1977||Cmdr. Thomas Dean Paulsen|
|5.) 07 Jul. 1977 - 18 Aug. 1979||Cmdr. William C. Francis (ret. as Radm.)|
|6.) 18 Aug. 1979 - 11 Aug. 1981||Cmdr. Stephen K. Laabs ('64) (Las Cruces, N.M.)|
|7.) 11 Aug. 1981 - 26 Aug. 1983||Cmdr. George Morey Miller III|
|8.) 26 Aug. 1983 - 08 Nov. 1985||Cmdr. Anderson Wade Wacaser III|
|9.) 08 Nov. 1985 - 28 May 1988||Cmdr. James Douglas Brotherton|
|10.) 28 May 1988 - 22 Jun. 1990||Cmdr. Steven Garland Tinsley|
|11.) 22 Jun. 1990 - 14 Feb. 1992||Cmdr. Francis Joseph Klingseis|
Contact information is compiled from various sources over a period of time and may, or may not, be correct. Every effort has been
made to list the newest contact. However, our entry is only as good as the latest information that's been sent to us. We list only
a contact for the ship if one has been sent to us. We do NOT have crew lists or rosters available. Please see the Frequently Asked
Questions section on Navsource's Main Page for that information.
|To The DE Photo Index Page||Back To The Main Photo Index|
|
<urn:uuid:f101b610-341d-4494-bd81-0665080bb385>
|
CC-MAIN-2016-26
|
http://www.navsource.org/archives/06/06021062.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783404382.73/warc/CC-MAIN-20160624155004-00110-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.903994
| 3,348
| 2.796875
| 3
|
From hurricanes and tropical storms to flooding, tornadoes, wildfires and more, Florida experiences many natural disasters over the course of any given year. Disasters can also include incidents involving hazardous materials, technological hazards, terrorism and other incidents.
Perhaps more than in any other state, Floridians have learned that planning for such events is essential at the personal, community and state-wide levels.
Plans are developed, updated and implemented at the state and county levels to help communities plan for these emergencies and their after-effects. In cooperation with county emergency management offices, the Florida Division of Emergency Management and Florida Division of Community Affairs lead on such efforts.
Each county in Florida has an adopted Local Comprehensive Emergency Plan. Communities may also chose to adopt a Post-Disaster Redevelopment Plan to assist with faster and more efficient recovery from natural disasters while maintaining local control over recovery and building back better.
Check below for more information on how your community can become better prepared to deal with disaster and its after effects.
This section includes reports by 1000 Friends of Florida as well as various state agencies.
Disaster planning for Florida’s historic resources:
Disaster planning for historic resources, with case studies
Disaster mitigation for historic structures (2008) – The Florida Department of State, Florida Division of Emergency Management and 1000 Friends of Florida produced this award-winning manual to identify materials, systems, products and installation techniques available to address the specific mitigation needs of historic structures. Intended audiences include property owners, planners, building industry professionals and volunteers.
Disaster planning for historic resources, with case studies (2006) – Prepared by 1000 Friends of Florida on behalf of the Florida Department of State and Florida Department of Community Affairs, this full-color handbook outlines steps to integrate historic resource protection into the local disaster planning process and includes case studies. This is an updated version of the award-winning 2003 manual.
Disaster planning for Florida’s communities:
Disaster evacuation and smart growth – Prepared by the Florida Department of Health, this Macromedia Presentation outlines how smart growth strategies can assist with disaster evacuation.
Post-disaster redevelopment planning: A guide for Florida communities (2010) – To become more disaster‐resilient, local governments should plan for what must happen after rescue and recovery operations are completed in order to return the community to normal or perhaps rebuild an even better community. This handbook by the former Department of Community Affairs outlines the steps to prepare a Post-Disaster Redevelopment Plan (PDRP).
Wildfire risk reduction in Florida: Home, neighborhood and community best practices (2010) – This report by the Florida Department of Agriculture and Consumer Services outlines local planning, regulatory, community design, building construction, landscaping and other strategies to reduce the risk of wildfire in Florida.
Handbook for floodplain acquisition and elevation projects (2001) – Prepared by the former Florida Department of Community Affairs, this report includes information on local mitigation strategies and projects geared to Florida communities.
Handbook for hazard mitigation projects (2001) – Another publication of the former Florida Department of Community Affairs, this handbook focuses on local mitigation strategies for the pre-disaster and post-disaster phases.
|
<urn:uuid:03d360d8-388b-439b-88f1-66f94ff86134>
|
CC-MAIN-2016-26
|
http://www.1000friendsofflorida.org/building-better-communities/disaster-planning/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396224.52/warc/CC-MAIN-20160624154956-00175-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.92389
| 658
| 2.75
| 3
|
Address: P. O. Box 1457, Los Gatos,
Figure 1. Impedance in Ohms vs. Frequency from 30 MHz to 3 GHz
Two other Technical Tidbit articles (April 2002 and May 2002) explored the strong coupling between a pwb and nearby metal plane. This month the subject is further explored with data provided by Neven Pischl (see acknowledgment below). This is the first Technical Tidbit based upon data not personally taken by myself, but it ties closely with the previous articles and provides additional useful insight into printed wiring board coupling to nearby conductive objects.
Figure 1 shows an impedance plot measured between the metal faceplate of a board in a shelf with respect to the board "ground" plane from 30 MHz to 3 GHz. The faceplate of the board was contacting adjacent faceplates to make a continuous plane across the front of the shelf, comprising an integral part of the complete enclosure. The board was a few cm from the side of the enclosure. Figure 2 shows the overall test setup. Figure 3 shows the details of the connector mounted to the board and faceplate. Note that the board did not have a metal plane backing. However, it is still strongly coupled to the enclosure walls and front metal faceplates. The board was "single point grounded" for DC and low frequencies by the power/ground connections in the backplane.
Figure 2. Test Setup for PWB to Chassis Impedance Measurement
Figure 3. Connector for Impedance Measurement Mounted On PWB Faceplate
With reference to Figure 1, the power/ground connection in the backplane likely provides the low initial impedance at 30 MHz. After a peak of about 300 Ohms at about 100 MHz there are two more sharp peaks and broad nulls. The nulls, occurring at about 160 MHz, 570 MHz, and 920 MHz have magnitudes of just tens of Ohms. At these low points of impedance, the front of the board is essentially connected to the faceplate even though no such metallic connection is made. The first three impedance peaks range from 200 to 300 Ohms despite the backplane ground connection.
There are a number of effects that result in the impedance plot of Figure 1 including: the backplane connection, standing waves on the PWB, cavity resonances in the enclosure, and of course distributed capacitive coupling between the board and the enclosure. If the backplane connection were not present, there still would be similar low and high points of the impedance as measured, although they would likely be shifted in frequency.
The conclusion can be drawn that parasitics, including coupling between a board and nearby metal, can have significant effects that overshadow attempts to single point ground a circuit board.
Thanks to Neven Pischl, at Broadcom, who provided the data and pictures for this article as well as a review of the text. If you want to contact him via email, click here.
Related measurement articles on this website are:
Top of page
|
<urn:uuid:cf7613b8-1843-49ac-9c3b-6883678585ce>
|
CC-MAIN-2016-26
|
http://www.emcesd.com/tt2002/tt100102.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783404405.88/warc/CC-MAIN-20160624155004-00029-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.93794
| 611
| 2.71875
| 3
|
Catholic Recipe: Election Cake
Election Day was the great holiday of early New England. In importance it ranked second only to Thanksgiving. Even after 1776, Election Day boasted more processions, sermons, social gatherings and good eating than either Fourth of July or Training Day — the time when volunteer militiamen marched and drilled in all their glory. Since our Puritan ancestors were denied the joys of Christmas, Easter, and Whitsunday, Election Day with its festivities — parades, religious ceremonies, balls, and fine foods — helped compensate for the loss.
"Their Chief Red Letter Day is St. Election which is annually Observed according to Charter to choose their Governor," wrote Madam Sarah Kemble Knight about the State of Connecticut, in her Journal of 1702. The Honorable John Winthrop, Esquire, a descendant of the Massachusetts founder, was Governor of Connecticut at the time. Madam Knight, a retired schoolmistress, who was traveling from Boston to New York on business, kept a diary of all the interesting customs and events she observed along the way.
At Hartford, Election Day — which came there on the second Thursday in May — was unmatched in excitement by any other occasion. A traditional feature was the famous Hartford Election Cake which, according to one old family recipe, called for seven eggs, five pounds of shortening (largely butter), a pint of yeast, and unspecified amounts of wine and brandy. In other places Election Cake might be just a sweet raised bread, topped by egg-and-molasses glaze, but in Hartford it resembled a rich well-seasoned fruit cake.
In his autobiography Edward Everett Hale, who was born in Boston and there became the most famous preacher of his day, reminisces on early nineteenth-century election customs. Every child expected a present of " 'lection money" from his elders, according to Mr. Hale. This was pocket money to squander at stalls and booths on the Common. For most youngsters election spending sprees were confined largely to things to eat and drink. The Hale children's mother gave each of her own brood twelve-and-a-half cents, and with coins jingling in pockets the young were off to the Common — boys with boys, and girls with girls. There, food hucksters sold such delicacies as dates, candies of all descriptions, and oysters — two for a penny. There were lobsters, too, for those who wanted them, but the Hale children got plenty of them at home. Ginger beer and spruce beer, sold from small wheelbarrows, were favorite thirst-quenchers. And if a lad lacked two cents — the price for a full glass — dealers obliged with a half glass at half price.
Election night supper was always a festive meal which featured such delicacies as homemade sausages, creamed potatoes — made with real cream and plenty of butter — pickles, relishes, and hot soda biscuits with fruit preserves. The meal ended with Election Cake and several kinds of pie.
There are many versions of Election Cake, the crowning glory of New England's holiday festivities. This cake — a cross between fruit cake and fruit-filled yeast bread — keeps a long time when wrapped in foil and stored in the refrigerator. A century and a half ago, housewives made the cake in quantities large enough to last the winter. There was enough fruit and brandy in the original Hartford variety to ensure freshness for several months. The cake was sliced and offered with wine or eggnog. I can think of no better way to serve it today, although the cake is delicious with all hot beverages, or with tall glasses of milk.
Scald milk, add white sugar. When lukewarm add yeast, stir, and set aside for 5 minutes. Add 1 cup of flour, beat thoroughly and let rise in greased covered bowl until double in bulk (about 1 hour).
Cream butter and brown sugar until very light. Then add egg and brandy and beat vigorously. Add to raised yeast mixture and stir.
Dredge fruits with 2 tablespoons of the flour. Then sift together remaining flour with salt and spices and add to other mixture gradually, beating after each addition. If batter is too thin, a little more flour may be added. Work in fruits last of all.
Put dough in well-greased floured bread pan, or in 9- to 10-inch tube pan. Let rise, covered, in warm place until double in bulk (about 1 1/4 hours). Bake about 45 minutes in moderate oven (375° F.).
Some cooks prefer Election Cake decorated like fruit cake, others like a butter icing which, when ornamented with candied fruits, has a truly festive appearance. For the first type of decoration arrange candied cherries, citron, and other fruits on top of the dough before baking. A sheet of foil placed over the loaf will prevent scorching.
When frosting is used let the loaf cool thoroughly before spreading top and sides. Use Orange or Lemon Frosting (see recipe).Recipe Source: Feast-Day Cakes from Many Lands by Dorothy Gladys Spicer, Holt, Rinehart and Winston, 1960
|
<urn:uuid:a1e92801-5dae-4f70-8aef-96835e48860d>
|
CC-MAIN-2016-26
|
http://www.catholicculture.org/culture/liturgicalyear/recipes/view.cfm?id=1184
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397864.87/warc/CC-MAIN-20160624154957-00111-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.966948
| 1,070
| 2.953125
| 3
|
I decided to put the much heralded WolframAlpha to the test with the obvious word - dyslexia, just to see how it faired. I think my response at this level must be "nothing to write home about". Here are the results.
Input interpretation: dyslexia (English word)
Definition: Noun - dyslexia - impaired ability to learn to read
Word origins: German | Greek (first recorded use: 1887 (122 years ago))
American pronunciation: (This does not appear to show well here.)
Broader terms: learning disability / learning disorder
In response to "How do you make a concept map?" it responded "Wolfram|Alpha isn't sure what to do with your input."
At least when I put the same question to Google it gave me half a dozen good answers.
|
<urn:uuid:f90083a8-03d7-418f-89b8-4f51e7744880>
|
CC-MAIN-2016-26
|
http://technodys.blogspot.com/2009/05/24-wolfram-alpha-on-test.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395560.14/warc/CC-MAIN-20160624154955-00172-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.909539
| 172
| 2.640625
| 3
|
The Effects of Marriage Equality in Massachusetts: A survey of the experiences and impact of marriage on same-sex couples
Publication Date: May 2009
Keywords: marriage; same-sex couples
May 17th, 2009 marks the 5th year of marriage equality in the state of Massachusetts. To mark this anniversary, the Massachusetts Department of Public Health conducted the largest survey to date of married same-sex couples, the Health and Marriage Equality in Massachusetts (HMEM) survey. During the past year, four other states have extended marriage to same-sex couples and several other states are considering marriage legislation. The HMEM data allows us to address important questions that arise as other states consider whether to extend marriage to same-sex couples. The data provides answers to several key questions: Who is getting married? Why are same-sex couples getting married? What impact has marriage had on same-sex relationships? And, what impact has marriage had on the children of same-sex couples?
|
<urn:uuid:68fb7f79-e700-444d-9e83-561ae1476d37>
|
CC-MAIN-2016-26
|
http://www.policyarchive.org/handle/10207/18503
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783394987.40/warc/CC-MAIN-20160624154954-00022-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.9497
| 197
| 2.65625
| 3
|
Overview of Urinary Incontinence
Urinary control relies on the finely coordinated activities of the smooth muscle tissue of the urethra and bladder, skeletal muscle, voluntary inhibition, and the autonomic nervous system.
Urinary incontinence can result from anatomic, physiologic, or pathologic (disease) factors. Congenital and acquired disorders of muscle innervation (e.g., ALS, spina bifida, multiple sclerosis) eventually cause inadequate urinary storage or control.
Acute and temporary incontinence are commonly caused by the following:
- Limited mobility
- Medication side effect
- Urinary tract infection
Chronic incontinence is commonly caused by these factors:
- Birth defects
- Bladder muscle weakness
- Blocked urethra (due to benign prostate hyperplasia [BPH, enlarged prostate], tumor, etc.)
- Brain or spinal cord injury
- Nerve disorders
- Pelvic floor muscle weakness
- Vaginal prolapse
Incidence and Prevalence of Incontinence
According to the U.S. Department of Health and Human Services, approximately 13 million people in the United States suffer from urinary incontinence. The condition is far more prevalent in women than men. In the general population aged 15 to 64 years old, 1030 percent of women versus 1.55 percent of men are affected. At least 50 percent of nursing home residents are affected. Of that number, 70 percent are women.
|
<urn:uuid:0cfcea52-7e23-49c2-9057-e383413a3c4a>
|
CC-MAIN-2016-26
|
http://www.healthcommunities.com/urinary-incontinence/overview-of-incontinence.shtml
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395560.69/warc/CC-MAIN-20160624154955-00135-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.909649
| 305
| 3.09375
| 3
|
Fact Sheet: Yellow-Cheeked Crested Gibbon (Nomascus gabriellae)
Yellow-cheeked crested gibbon
Other names: Buff-cheeked crested gibbon, red-cheeked
Traditionally, all crested gibbons have been considered being members of a single species of the genus Hylobates (i.e. "H. concolor"), and this species was considered the only representant of the subgenus Nomascus. The yellow-cheeked crested gibbon has been considered being a subspecies ("H. concolor gabriellae") of that species (e.g. Groves, 1972; Marshall, & Sugardjito, 1986). More recently, vocal characteristics and other features suggested that yellow-cheeked crested gibbon should be recognized as a distinct species (Geissmann, 1995a; Geissmann et al., 2000). In addition, recent molecular evidence documented that the distance among gibbon subgenera was as large or larger than the distance between chimpanzees (Pan) and humans (Homo) (Roos & Geissmann, 2001). As a consequence of this finding, all four subgenera are now recognized as full genera, and the traditional scientific name of the yellow-cheeked crested gibbon changes from "Hylobates concolor gabriellae" to Nomascus gabriellae.
No subspecies of the yellow-cheeked crested gibbon are known, but the affinities of the gibbon populations in the northern part of the distribution area unknown (Geissmann, 1995a; Geissmann et al., 2000).
The yellow-cheeked crested gibbon occurs in southern Laos, southern Vietnam and eastern Cambodia (Geissmann, 1995a, Geissmann et al., 2000).
This species is found in tropical evergreen forests. They are scarce between 1,500 and 2,000 m (Eames & Robson, 1993) and appear to prefer lowland forests (Dao Van Tien, 1983).
Ecology and diet
The yellow-cheeked crested gibbon remains virtually unstudied in the wild. Like other gibbons, it is an arboreal and a diurnal species. Like other gibbons, it probably prefers the upper canopy of the forest, and sleeps and rests in emergent trees (Leighton, 1987). It is mainly frugivorous, but will also consume leaves and insects.
Reproduction and ontogeny
Gibbons typically exhibit a highly specialized form of locomotion which is called brachiation. They swing below the branches suspended by their arms. Brachiation is an energetically advantageous mode of locomotion. It facilitates feeding in the fine branch niche. It allows for relatively high speeds in the canopy and for jumps of 10 meters or more (Fleagle, 1999). When moving on branches or on the ground, gibbons walk on two legs (bipedalism), often using their arms for balance.
The pelage of adult males is black with small pale
yellow or pale orange cheeks. Males also have a group of erect hairs (a crest) on
the top of their heads, thus the name "crested gibbons" for the genus Nomascus.
Group size and social structure
Although yellow-cheeked crested gibbon are unstudied in the wild, they probably live in small, monogamous family groups. Typical groups probably consist of an adult pair with 0-4 immature offspring. Young gibbons leave their natal group when they become adult.
Gibbons are territorial (Leighton, 1987). Each family group occupies an area of about 20-50 hectares, but the typical territory size of this species has not been reliably determined in the wild. Territories are defended from intrusion by other gibbons by loud morning songs and by actively chasing intruders off of the territory.
At night, gibbons sleep sitting up. The family group spends the night in one of several preferred "sleeping" trees of the territory.
Gibbon groups produce loud, stereotyped song bouts in the early morning. Songs probably serve to defend resources such as territories, food trees, partners, but may also help to attract potential mates. Gibbon songs include species specific characteristics which are inherited and not learned (Geissmann, 1993).
Mated yellow-cheeked crested gibbons typically produce duet songs which consist of coordinated vocal interactions by both partners using sex-specific phrases (Geissmann, 1993, 1995a; Geissmann et al., 2000). Other family members may participate in the song bout (Merker & Cox, 1999). Solo song bouts (Goustard, 1976) are typically produced by unmated yellow-cheeked crested gibbons only.
Crested gibbons exhibit extended fields of skin glands situated in the axillary, sternal and inguinal areas of the body. The glands produce a reddish secretion and are particularly active under hot temperatures and when the animals are exited. It has been speculated that the glands may play a role in olfactory communication (Geissmann, 1993; Geissmann & Hulftegger, 1994). The glandular secretion also influences the amount of red visible in the yellowish female pelage coloration.
Social grooming probably plays a role in reinforcing the bonds between group members.
There is some evidence for self-recognition in the mirror (Ujhelyi et al., 2000).
Adult gibbons typically live in the crown region of the forest where they have no natural predators except man. In the lower stories of the forest, leopards, clouded leopards, and pythons may be potential predators of gibbons.
Wild population estimates
Status and conservation
Dao Van Tien (1983). On the North Indochinese gibbons (Hylobates concolor) (Primates: Hylobatidae) in North Vietnam. Journal of Human Evolution 12: 367-372.
Duckworth, J.W., Timmins, R.J., Anderson, G.Q.A., Thewlis, R.M., Nemeth, E., Evans, T.D., Dvorak, M. & Cozza, K.E.A. (1995). Notes on the status and conservation of the gibbon Hylobates (Nomascus) gabriellae in Laos. Tropical Biodiversity 3: 15-27.
Duckworth, J.W., Timmins, R.J., Khounboline, K., Salter, R.E. & Davidson, P. (1999). Large mammals. In Duckworth, J.W., Salter, R.E. & Khounboline, K. (compilers), Wildlife in Lao PDR: 1999 status report, IUCN - The World Conservation Union / Wildlife Conservation Society / Centre for Protected Areas and Watershed Management, Vientiane, pp. 161-220.
Eames, J.C. & Robson, C.R. (1993). Threatened
primates in southern Vietnam. Oryx 27: 146-154.
Geissmann, T. (1991). Reassessment of age of sexual maturity in gibbons (Hylobates spp.). American Journal of Primatology 23: 11-22.
Geissmann, T. (1993). Evolution of communication in gibbons (Hylobatidae), Ph.D. thesis, Anthropological Institute, Philosoph. Faculty II, Zürich University.
Geissmann, T. (1995a). Gibbon systematics and species identification. International Zoo News 42: 467-501.
Geissmann, T. (1995b). The yellow-cheeked gibbon (Hylobates gabriellae) in Nam Bai Cat Tien (southern Vietnam) revisited. Primates 36: 447-455.
Geissmann, T. & Hulftegger, A.M. (1994). Olfactory communication in gibbons? In Roeder, J.J., Thierry, B., Anderson, J.R. & Herrenschmidt, N. (eds.), Current primatology, vol. 2: Social development, learning and behaviour, Université Louis Pasteur, Strasbourg, pp. 199-206.
Geissmann, T., Nguyen Xuan Dang, Lormée, N. & Momberg, F. (2000). Vietnam primate conservation status review 2000 - Part 1: Gibbons (English edition), Fauna & Flora International, Indochina Programme, Hanoi.
Goustard, M. (1976). The vocalizations of Hylobates. In Rumbaugh, D.M. (ed.), Gibbon and siamang, vol. 4, Karger, Basel and New York, pp. 135-166.
Groves, C.P. (1972). Systematics and phylogeny of gibbons. In Rumbaugh, D.M. (ed.), Gibbon and siamang, vol. 1, Karger, Basel and New York, pp. 1-89.
Hilton-Taylor, C. (compiler) (2000). 2000 IUCN Red List of threatened species. IUCN, Gland, Switzerland and Cambridge, UK.
Leighton, D.R. (1987). Gibbons: Territoriality and monogamy. In Smuts, B.B., Cheney, D.L., Seyfarth, R.M., Wrangham, R.W., and Struhsaker, T.T. (eds.), Primate societies, University of Chicago Press, Chicago and London, pp. 135-145.
Marshall, J.T. & Sugardjito, J. (1986). Gibbon systematics. In Swindler, D.R. & Erwin, J. (eds.), Comparative primate biology, vol. 1: Systematics, evolution, and anatomy, Alan R. Liss, New York, pp. 137-185.
Merker, B. & Cox, C. (1999). Development of the female great call in Hylobates gabriellae: A case study. Folia Primatologica 70: 97-106.
Ujhelyi, M., Merker, B., Buk, P. & Geissmann, T. (2000). Observations on the behavior of gibbons (Hylobates leucogenys, H. gabriellae, and H. lar) in the presence of mirrors. Journal of Comparative Psychology 114: 253-262.
Site by Thomas Geissmann.
For comments & suggestions, please email to
|
<urn:uuid:bde45641-3279-47b4-87aa-4782b0237c62>
|
CC-MAIN-2016-26
|
http://www.gibbons.de/main2/08teachtext/factgabriellae/gabriellaefact.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395039.24/warc/CC-MAIN-20160624154955-00081-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.83293
| 2,278
| 3.328125
| 3
|
A deduction in formal logic is a way of proving a proposition. Specifically, when a conclusion is inferred from premises or facts, it is said to "follow" (like the water downstream to the spring source), from previously stated propositions via certain logical rules.
Deduction is used most often in geometry, but also has its place in philosophy and law. Deduction is often un-used in science, as deduction requires that one have certainty of truth of both the major and minor premises--something science is unwilling to make claims about.
The normal contrast to deduction is induction, whereby the two are posed as distinct opposites. However, they are not so distinct as to be alien to each other. Rather, induction and deduction have a single common root from which they necessarily are operationally distinguished: the mind. So, in regard to formal logic in this root sense, a merely mechanical or electronic simulator of genuine mental operations does not possess either any actual deductive or actual inductive logic.
The most famous formal deductive rule goes as follows:
- A is true.
- If A is true, then B is true.
- Therefore, B is true.
Another type of deduction, known as "proof by contradiction", is:
- If Q is true, then R is true.
- R is not true.
- Therefore, Q is not true.
Truth Values in Sentential Logic
T implies T, True T implies F, False F implies F, True F implies T, True
The final two are rooted in the fact that the consequent following from an antecedent that is not true says nothing about the truth or falsity of the statement, it must be assumed to be true.
Aristotle codified the rules of syllogistic deduction two millenia ago in Ancient Greece. He created 256 forms of syllogisms relating to groups of things. For example, an AAA1 syllogism:
- All men are mortal.
- Socrates is a man.
- Therefore, Socrates is mortal.
|
<urn:uuid:5c5ae0d9-1a47-44f9-bbdf-c3dff0f05e0d>
|
CC-MAIN-2016-26
|
http://www.conservapedia.com/Deduction
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783408840.13/warc/CC-MAIN-20160624155008-00153-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.951728
| 420
| 4
| 4
|
Double Grind- Knife edge bevels are ground on both side of the blade. This includes V, all types of Convex edges and Hollow grind edges.
Single Grind- Knife edge bevel is ground only on one side of the blade. This includes all types of Chisel grind edges.
Flat (V)- The simplest and most widespread in factory knives. The edge tapers from both sides of the blade. Gets sharp, sacrifices durability though. Induces extra drag, because of the sharp transition point.
Convex- My favorite. Provides the most durable edge at a given angle and has less drag compared to other edge grind types due to smooth transition lines. Instead of tapering in a straight line, the edge is slightly curved outwards. Famous Japanese Samurai katanas featured this type of the edge.
Semi-Convex or Asymmetrical Convex- Not very common, combines durability of the convex edge and ease of sharpening of the V edge, until the edge gets real dull. Jerry Busse used it a lot in his knives, see Busse Combat Knives>.
Asymmetrical Flat (V)- The edge tapers on the straight line from both sides, but the angles are uneven. Used for more durable edges, sacrifices sharpness.
Compound or Double Bevel- The edge first on the straight lines, but at the end the angle(secondary bevel) is greater than at the beginning(primary bevel). Provides stronger, durable edge. Sacrifices sharpness. One way of improving cutting ability and durability of the softer steels. Cuts better then V edge at the same angle as the secondary bevel, yet lasts longer that V edge if ground at the same angle as the primary bevel.
Hollow- The edge tapering line is curved inwards, in other words it's concave. Gets very sharp, but low durability. Induces extra drag due to the shoulders and sharp transition points.
Chisel or Single Bevel- The edge is flat from one side, tapers on the straight line from the other side of the blade. This is the sharpest edge, found mainly on chisels in western world. Japanese use it widely in their kitchen knives, however the back side(Urasuki) of those knives as usual is concave, significantly reducing the drag.
Chisel With Back Bevel- Variation of the Chisel edge. Back side has a microbevel, as usual at a very low angle 3°-5° or so. Sacrifices little bit of sharpness for increased edge durability.
Chisel With Urasuki- Urasuki is traditionally found on Japanese single beveled knives. Back side of the blade is concave to reduce the drag during cutting.
|
<urn:uuid:cc688b56-b201-4319-aa38-0fbb168f649c>
|
CC-MAIN-2016-26
|
http://zknives.com/knives/articles/knifeedgetypes.shtml
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397744.64/warc/CC-MAIN-20160624154957-00127-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.902967
| 577
| 2.59375
| 3
|
Individual differences |
Methods | Statistics | Clinical | Educational | Industrial | Professional items | World psychology |
Broadly, body memory argues that memories can be stored not only in the brain, but also throughout the body; or that one's physical symptoms and responses can indicate the presence of repressed or otherwise forgotten memory, particularly traumatic memories such as sexual abuse.
Body memory is often discussed in the context of childhood sexual abuse and repressed or recovered memory. The best-selling book The Courage to Heal, a guide for sexual abuse survivors, has the slogan "The body remembers what the mind forgets." Some believe that a Body memory can even be from a past life and can have a physical manifestation, such as skin blistering
Mainstream scientific responseEdit
Few studies have been done on Body Memory per se. However, trauma researcher Bessel van der Kolk of Harvard University notes that post-traumatic stress disorder patients often experience memory problems, and often display physiological or emotional responses they cannot easily explain or understand:
- trauma interferes with declarative memory, i.e. conscious recall of experience, but does not inhibit implicit memory, or non-declarative memory, the memory system that controls conditioned emotional responses, skills and habits, and sensorimotor sensations related to experience.
Issues In Child Abuse Accusations -- a non-peer-reviewed fringe journal edited by Hollida Wakefield, who resigned from the False Memory Syndrome Foundation following a paedophila-related scandal -- describes body memory as pseudoscience.
- ↑ http://www.stopbadtherapy.com/main/smith/body.shtml
- ↑
- ↑ van der Kolk, Bessel A. "The Body Keeps The Score: Memory & the Evolving Psychobiology of Post Traumatic Stress." Harvard Review of Psychiatry, 1994, 1(5), pp. 253-265"
- ↑ Smith (1993). Body Memories: And Other Pseudo-Scientific Notions of "Survivor Psychology". Issues in Child Abuse Accusations 5 (4).
See also Edit
|This page uses Creative Commons Licensed content from Wikipedia (view authors).|
|
<urn:uuid:11b1ea64-fd8d-4762-b6f9-b6c7afaf9d66>
|
CC-MAIN-2016-26
|
http://psychology.wikia.com/wiki/Body_memory
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783391634.7/warc/CC-MAIN-20160624154951-00068-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.83983
| 447
| 3.125
| 3
|
Even large telescopes have their limitations. For example, according to the discussion in the preceding section, the 5-m Hale telescope should have an angular resolution of around 0.02''. In practice, however, it cannot do better than about 1''. In fact, apart from instruments using special techniques developed to examine some particularly bright stars, no ground-based optical telescope built before 1990 can resolve astronomical objects to much better than about 1''. The reason is Earth's turbulent atmosphere, which blurs the image even before the light reaches our instruments.
As we observe a star, atmospheric turbulence produces continuous small changes in the optical properties of the air between the star and our telescope (or eye). The light from the star is refracted slightly, again and again, and the stellar image dances around on the detector (or retina). This is the cause of the well-known "twinkling" of stars. It occurs for the same basic reason that objects appear to shimmer when viewed across a hot roadway on a summer day.
On a good night at the best observing sites, the maximum deflection produced by the atmosphere is slightly less than 1''. Consider taking a photograph of a star under such conditions. After a few minutes' exposure time (long enough for the intervening atmosphere to have undergone many small, random changes), the dancing sharp image of the star has been smeared out over a roughly circular region 10 or so in diameter (Figure 3.11). Astronomers use the term seeing to describe the effects of atmospheric turbulence. The circle over which a star's light is spread is called the seeing disk.
A telescope placed above the atmosphere, in Earth orbit, can achieve resolution close to the diffraction limit, subject only to the engineering restrictions of building or placing large structures in space. The Hubble Space Telescope (HST), named for one of America's most notable astronomers, Edwin Hubble (Figure 3.6b), has a 2.4-m mirror and a diffraction limit of 0.05", giving astronomers a view of the universe as much as 20 times sharper than that normally available from even much larger ground-based instruments. (See Interlude 3-1.)
CCDs have two important advantages over photographic plates, which were the staple of astronomers for over a century. First, CCDs are much more efficient than photographic plates, recording as many as 75 percent of the photons striking them, compared with less than five percent for photographic methods. This means that a CCD instrument can image objects 10 to 20 times fainteror the same object 10 to 20 times fasterthan can a photographic plate. Second, CCDs produce a faithful representation of an image in a digital format that can be placed directly on magnetic tape or disk, or even sent across a computer network to an observer's home institution for analysis.
Using computer processing, astronomers can compensate for known instrumental defects and even correct some effects of bad seeing. In addition, the computer can often carry out many of the tedious and time-consuming chores that must be performed before an image or spectrum reaches its final form. Figure 3.14 illustrates how computerized image-processing techniques were used to correct for known instrumental problems in the Hubble Space Telescope, allowing much of the planned resolution of the telescope to be recovered even before its repair in 1993.
By analyzing the image while the light is still being collected, it is possible to adjust the telescope from moment to moment to reduce the effects of mirror distortion, temperature changes, and bad seeing. Some of these techniques, collectively known as active optics, were first combined in the New Technology Telescope (NTT) at the European Southern Observatory in Chile (Figure 3.12). This 3.5-m instrument achieves resolution of about 0.5" by making minute modifications to the tilt of the mirror as its temperature and orientation change, thus maintaining the best possible focus at all times and greatly improving image quality (Figure 3.15). The Keck and VLT instruments employ similar methods and may ultimately achieve resolution as fine as 0.25" by these means.
An even more ambitious undertaking is known as adaptive optics. This technique deforms the shape of a mirror's surface, under computer control while the image is being exposed, in order to undo the effects of atmospheric turbulence. In the experimental system shown in Figure 3.16(a), lasers probe the atmosphere above the telescope, returning information about the air's swirling motion to a computer that modifies the mirror thousands of times per second to compensate for poor seeing. Already, impressive improvements in image quality have been obtained (Figure 3.16b). These developing techniques are also being incorporated into Keck and VLT. In the next decade, it may well be possible to achieve with large ground-based telescopes the kind of resolution presently attainable only from space.
What steps do optical astronomers take to overcome the obscuring and blurring effects of Earth's atmosphere?
|
<urn:uuid:040a1655-6629-4883-bcb5-e1b8bb0bd977>
|
CC-MAIN-2016-26
|
http://www.castlerock.wednet.edu/HS/stello/Astronomy/TEXT/CHAISSON/BG303/HTML/BG30303.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395160.19/warc/CC-MAIN-20160624154955-00106-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.939324
| 993
| 4.40625
| 4
|
When a credit card company first issues you a credit card they give you a credit limit. This credit limit is the maximum amount that you can charge to your account at any given period of time. If you are young you might not have a very extensive credit history which means you might be given a lower credit limit.
How is a Credit Limit Determined?
Credit card companies will usually take several different factors into consideration when determining your limit. The biggest factor is your credit score. Your credit score is a number that tells creditors how reliable of a borrower you have been in the past and helps to predict your ability to repay future debts. Other factors that credit card companies look at are your income and other debts that you currently have such as student loans, home loans and more. Lastly, they will also look at the amount of credit that you have available to you from other credit card companies and retail stores (Target, Macy’s, etc)
Just because you have a certain credit limit doesn’t mean this can’t change in the future. If you prove yourself to be a responsible borrower and you are consistently on time with your payments you might find that your credit card company might automatically raise your limit. You can also ask them for a raise and they might be more than happy to oblige.
If you have a lower credit rating than you might want to start by going over tips to improve your credit score. This will be the first and most important step to being able to get a higher credit limit in the future.
Latest posts by Sean Bryant (see all)
- How to Afford the City Lifestyle as a Millennial - June 22, 2016
- 5 Bicycle Maintenance Routines to Avoid Costly Repairs and Injuries - June 3, 2016
- Growing Without Letting Go of the Startup Culture - May 31, 2016
|
<urn:uuid:4d764ee9-5990-446e-8cd4-b64f15e10db5>
|
CC-MAIN-2016-26
|
http://www.onesmartdollar.com/how-is-my-credit-limit-determined/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396027.60/warc/CC-MAIN-20160624154956-00156-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.970148
| 378
| 2.53125
| 3
|
1 Answer | Add Yours
Volcanoes may serve as land building events. The Hawaiian islands were formed as lava from volcanoes from deep under the ocean's surface erupted and the magma cooled and increased the height of the volcanic cone. Lava from the Kilauea volcano is currently adding to the surface area of the island of Hawai'i. Surtsey Island rose above water level of the North Atlantic Ocean on Nov. 15, 1963 and continued to grow until June 5, 1967.
In the aftermath of earthquakes under the ocean, tsunamis may cause extensive erosional damage along shorelines. Scientists who compared the coastline of some of the Kuril Islands, first surveyed and measured in 2006 and revisited after tsunamis in Nov., 2006 and Jan., 2007, found that "in some places the amount of sand and soil removed by tsunami erosion was nearly 50 times greater than the amount deposited."
We’ve answered 328,285 questions. We can answer yours, too.Ask a question
|
<urn:uuid:ce816a74-b53c-4be8-9be3-884a13e5f454>
|
CC-MAIN-2016-26
|
http://www.enotes.com/homework-help/most-geologic-events-happened-very-slowly-name-two-364174
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783404382.73/warc/CC-MAIN-20160624155004-00199-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.954576
| 208
| 3.671875
| 4
|
The Scenarios: Attack on Pataliputra, 319 BC
As we saw in “Notes from the Designer” #15
, the kingdom of Magadha was originally brought under rule by a prince of the Paurava family (of “Porus” fame). The dynasty, known as Haryanka, came to an end when its last king was murdered by a usurper known today only as Shishunaga. Shishunaga had a successful career, ruling over several kingdoms in what could legitimately be called India’s first empire, but his karma (one could say) eventually caught up with him. According to Curtius, the bastard son of the last prince of the Haryanka clan – known as Ugrasena Nanda – thrust a dagger into Shishunaga’s throat, then promptly had the royal children murdered. The Nanda dynasty was born.
Born of a Sudra (plebian or labor-caste) courtesan, Nanda waged war against the aristocracy, exterminating many of the Kshatriya (warrior caste) dynasties in his growing empire. In doing so he garnered the relentless hostility of politically minded Brahmins such as Chanakya, a political refugee from the Nandan court who quickly rose to the occasion and began plotting to overthrow the government in Gandhara. Chanakya flees to Takshashila where he meets Chandragupta, and he and his young protégé begin recruiting mercenaries and other armed malcontents for a rebellion.
This inaugural battle did not go well for Chandragupta, as he and his insurgents brashly attacked the capital without having consolidated their power base among the “hereditary” (i.e. Maula
) military class (see “Notes” #9
). By all accounts they were defeated, forcing them to regroup in the countryside to build up their military strength and political support. The Combatants:
The Nanda army vs. Chandragupta’s coalition of tribals, guild militia, and mercenaries. From Jain legend, Chanakya
was a charioteer in the initial uprising against the Nandas. As Chandragupta
was quite young here, Chanakya is likely to have been the OC. It is not known who commanded the Nandas, but we opt here to give the assignment of mopping up this insurrection to the Nanda’s able general Bhadrasala
, who enjoyed some respect as Mahasenapati
(commanding general), even among his adversaries. Chandramas
were the younger of Ugrasena’s sons; we’ve given them commands here appropriate for Nandan princes. The Battlefield:
The historical location is not known, though it is generally described as being waged outside the walls of Pataliputra (very rash indeed!) in basically flat and featureless terrain. Special Features:
This scenario introduces the players to Dharmayuddha
, discussed in “Notes” #10
. Next week: The Scenarios -- Magadha.
Until then, please visit the CSW Chandragupta Forum
for the latest news and discussion …
|
<urn:uuid:c6d85606-ec73-4bfc-84b2-be6630d821a8>
|
CC-MAIN-2016-26
|
http://www.gmtgames.com/t-ChandraNotes18.aspx
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395560.69/warc/CC-MAIN-20160624154955-00079-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.961859
| 679
| 3.21875
| 3
|
A new study finds substantial improvement in a mouse model of a rare, hereditary neurodegenerative disease after transplantation of normal human neural stem cells. The research findings, published by Cell Press in the September 4th issue of the journal Cell Stem Cell, show that the transplanted cells provided a critical enzyme that was missing in the brains of the experimental mice and represent an important step toward what may be a successful therapeutic approach for a currently untreatable and devastating disease.
Infantile neuronal ceroid lipofuscinosis (INCL), commonly known as Batten disease, is a fatal neurodegenerative disease in children. It is caused by a mutation in the gene that makes a crucial enzyme called palmitoyl protein thioesterase-1 (PPT1). A deficiency of PPT1 in the brain causes the abnormal accumulation of a cellular lipid storage material called lipofuscin, which leads to neuron death, a decline in cognitive and motor skills, visual impairment, seizures and premature death. Unfortunately, intravenous enzyme replacement therapy is not a viable treatment approach as it is nearly impossible to get the PPT1 enzyme into the brain.
Although there is currently no effective treatment for INCL, it has been hypothesized that transplanted donor cells might be able to secrete the needed enzyme directly into the host brain. A mouse model of INCL that mimics many aspects of the human disease has been developed and provides an excellent experimental model for testing whether a human neural stem cell transplant may be a beneficial disease treatment. Dr. Nobuko Uchida from StemCells, Inc., in Palo Alto, California led a study that tested this hypothesis with banked human neural stem cells that had been purified, expanded, and preserved.
"We took a novel approach and transplanted normal, nontumorigenic, and nongenetically modified human neural stem cells to deliver the deficient enzyme in the mouse model of INCL," explains Dr. Uchida. "We transplanted self-renewing human neural stem cells because, theoretically, these transplants can provide life-long production of the missing enzyme." Dr. Uchida and colleagues found that the purified human neural stem cells engrafted to the brain of INCL mice, migrated extensively, and produced enough PPT1 in the host mice to elicit significant improvement. Specifically, the INCL mice exhibited reduced lipofuscin, widespread neuroprotection, and a delayed loss of motor coordination.
"Early intervention with neural stem cell transplants into the brains of INCL patients may supply a continuous and long-lasting source of the missing PPT1 and provide some therapeutic benefit through protection of endogenous neurons," concludes Dr. Uchida. "These data support our rationale for continued development in humans and the potential for a medical breakthrough in this deadly disease." Notably, StemCells, Inc., recently reported positive results from the first Phase 1 clinical trials assessing the safety of these human neural stem cells as a potential treatment for Batten disease.
The researchers include Stanley J. Tamaki, StemCells, Inc., Palo Alto, CA; Yakop Jacobs, StemCells, Inc., Palo Alto, CA; Monika Dohse, StemCells, Inc., Palo Alto, CA; Alexandra Capela, StemCells, Inc., Palo Alto, CA; Jonathan D. Cooper, King's College London, London, UK; Michael Reitsma, StemCells, Inc., Palo Alto, CA; Dongping He, StemCells, Inc., Palo Alto, CA; Robert Tushinski, StemCells, Inc., Palo Alto, CA; Pavel V. Belichenko, Stanford University School of Medicine, Stanford, CA; Ahmad Salehi, Stanford University School of Medicine, Stanford, CA; William Mobley, Stanford University School of Medicine, Stanford, CA ; Fred H. Gage, The Salk Institute for Biological Studies, La Jolla, CA; Stephen Huhn, StemCells, Inc., Palo Alto, CA; Ann S. Tsukamoto, StemCells, Inc., Palo Alto, CA; Irving L. Weissman, Stanford University School of Medicine, Stanford, CA; and Nobuko Uchida, StemCells, Inc., Palo Alto, CA.
|
<urn:uuid:bb67d5cb-7f3d-4521-93f1-12201d97a031>
|
CC-MAIN-2016-26
|
http://www.eurekalert.org/pub_releases/2009-09/cp-ths082809.php
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397636.15/warc/CC-MAIN-20160624154957-00022-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.907496
| 884
| 2.78125
| 3
|
Oregon Historical County Records Guide
Harney County Records Inventory
Animal Bounty Records
Series documents the payment of county and state bounty money to individuals who presented the scalps and other prescribed body parts of targeted predatory animals. The program was intended to control the threat to livestock. Examples of targeted animals include coyote, cougar, mountain lion, panther, wildcat, bobcat, lynx, and wolf. Records include registers, affidavits, certificates, and statements. Information includes claimant and affiant names; kind of animal; number of scalps; date killed or presented; and number, amount, and date of warrant. The records are also referred to as scalp bounty records.
Beginning in circa 1915, animal bounty information was included in the Commissioners Journals (County Commissioners Administrative Journals).
Records at the Harney County Courthouse, Clerk's Basement Records Room:
Bounty Record Harney County, 1909-1921 (1 volume).
|
<urn:uuid:e72b3374-7ec7-423d-85f3-208774d01d44>
|
CC-MAIN-2016-26
|
http://arcweb.sos.state.or.us/pages/records/local/county/harney/inv/animal.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395992.75/warc/CC-MAIN-20160624154955-00021-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.920806
| 194
| 2.609375
| 3
|
What is the significance of the synagogue in Jewish life today? Do you think that the role of the synagogue has changed over the years? What are some of the challenges facing the modern American synagogue? And how are we responding to these challenges?
The Aish Rabbi Replies:
The synagogue is important for Jews to gather together and pray to God, as explained in the verse "A multitude of people is a kings glory" (Proverbs 14:28). In other words, when many people gather together for a spiritual purpose it shows respect to God. In fact, Jewish law requires that prayer services be conducted with a "minyan" of 10 adult men.
The synagogue also serves as a central point of community gatherings – such as lifecycle events and Torah study.
The phenomenon of suburbs is a challenge for the modern American synagogue. For many years, Jews lived together in one small neighborhood, and therefore the synagogue was located within walking distance of each home. This is important because there is a Torah prohibition against driving on Shabbat ("You shall light no fire on Shabbat" – Exodus 35:2).
But with the advent of suburbs, people live far apart, and now they are driving to the synagogue rather than staying home. Some argue that this is an appropriate exception to Jewish law (i.e. surely God would approve!). But in fact, a community driving on Shabbat eliminates the necessity to live close together. There is no longer a need for the neighborhood Jewish school, Jewish bakery, Jewish clubs, etc. The experience of growing up in a Jewish community is lost, and children are absorbed into the melting pot of secular society. The result is that the American Jewish community is experiencing massive assimilation and 60 percent intermarriage, with many Jews being lost to the Jewish people forever.
Fortunately, there are many people today dedicated to doing something about it. Aish branches, community kollels and others are forming core communities that attract young people with a warm, open and intellectually stimulating approach. These communities continue to grow and expand, and are now found in virtually every city around the Jewish world.
If you tell me what city you're located in, I'll be happy to recommend a place for you to contact.
|
<urn:uuid:7c78bac6-4bf7-4d6a-8d2e-bd1e13cfe363>
|
CC-MAIN-2016-26
|
http://www.aish.com/atr/The_Synagogue.html?catid=911244
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393332.57/warc/CC-MAIN-20160624154953-00026-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.970185
| 457
| 2.546875
| 3
|
1196 he procured a second privilege from the pope, together with an order to the archbishop to put him in possession of the abbey, and a letter inhibiting the monks from electing an abbot. His agents took these to Glastonbury in February 1197, and the monks sent a protest to the archbishop, who told them that they were too slack in their own cause, for the bishop did not sleep, and that Savaric would have had possession before then if he had not hindered him (Domerham p. 369). Savaric was sent to Richard by the emperor to propose a compensation for the king's ransom, and in October was with Richard at Rouen. The archbishop, in November, unable longer to delay obedience to the pope's orders, commanded the monks to obey the bishop, and Savaric's proctors took possession of the abbey. Savaric went to England, and is said to have begun to distress the monks. In 1198, however, the king encouraged them in their appeal to the new pope, Innocent III, and in August, acting on the archbishop's advice, deprived Savaric of the abbey and took it into his own hands. He employed Savaric along with other bishops at this time to propose terms of reconciliation to Geoffrey (d. 1212) [q. v.], archbishop of York. In October he gave the monks authority to elect an abbot, and in November they elected William Pyke (Pica). The next day Savaric sent his official and others to the abbey to announce that he had excommunicated Pyke and his supporters.
On Richard's death Savaric renewed his attempts on Glastonbury. He was present at John's coronation on 27 May 1199, and is said to have purchased the king's assent to his taking possession of the abbey. On 8 June Bernard, archbishop of Ragusa (called in Hearne's Adam de Domerham, ii. 382, ‘Arragonensis’), and the archdeacon of Canterbury were sent with royal letters to insist on the submission of the monks and to enthrone Savaric, who accompanied them with a band of armed men. He had the gates of the abbey forced, and was enthroned in the church. His guards shut the recalcitrant monks in the infirmary and kept them without food until the next day, when he summoned them to the chapter-house and there had some of them beaten before him, and induced most of the convent, some by fear and others by cajolery, to submit to him. It was probably at this time that he caused one of the beneficed clerks of the abbey to be beaten in his presence so grievously that the man died a few days afterwards (ib. p. 406). He then accompanied the king to Normandy, and later went to Rome, where the monks were pressing their appeal. It was believed that he applied for leave to deprive Bath of its cathedral dignity and transfer his see to Glastonbury (Rog. Hov. iv. 85), and it is asserted that he had actually done so by King Richard's authority (Ralph de Coggeshall, p. 162), but this is erroneous. A long record of the outrages committed by him and his agents was laid before the pope, who in 1200 annulled Pyke's election, confirmed the union of the churches of Bath and Glastonbury, ordered Savaric to abstain from violence, and appointed commissioners to draw up terms between him and the abbey. Pyke died at Rome on 3 Sept., and at Glastonbury it was believed possible that Savaric had caused him to be poisoned (Domerham, ii. 399). In October and November Savaric was in attendance on the king at Lincoln and elsewhere. The award of the pope's commissioners, made in 1202 and confirmed by the pope, gave the abbey to Savaric, assigned to him and his successors certain of its estates calculated to bring in a fourth of the revenue of the house, gave him rights of patronage and government, and ordered that he should bear his proportion of the liabilities of the convent, and should make compensation to certain whom he had injured (ib. pp. 410–25). Savaric, having thus gained the victory in his long conflict, became gracious to the monks, and conferred some benefits on the convent (ib. p. 422). He made some grants to the Wells chapter, which had strenuously supported him in his struggle with Glastonbury, and he carried out what was evidently a definite policy of strengthening the secular chapter of the church of Wells, which, though not in his day a cathedral church, was of prime importance in his bishopric, by bringing into it the heads of the greater monastic houses within, or connected with, his diocese; for besides annexing the abbacy of Glastonbury to his see, he founded two new prebends and attached them to the abbacies of Athelney and Muchelney, and, after some dispute, prevailed on the abbot of Bec in Normandy to hold the church of Cleeve in Somerset as a prebend of Wells (Wells Cathedral Manuscripts, pp. 13, 22, 25, 29, 34, 294; Church, p. 119). He instituted a daily mass at Wells in honour of the Virgin, and another for all benefactors, and endowed a daily mass for his own soul, and ordered that a hundred poor should be fed on his obit. He granted a charter to the city of Wells, and prevailed on King John to grant one also in 1201 (ib. pp. 386–91). When the treasures of churches were seized to make up Richard's ransom, he saved the treasure of
|
<urn:uuid:680a1b62-893d-4a9a-aafa-39f1b7ee3b46>
|
CC-MAIN-2016-26
|
https://en.wikisource.org/wiki/Page:Dictionary_of_National_Biography_volume_50.djvu/365
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395166.84/warc/CC-MAIN-20160624154955-00117-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.990307
| 1,209
| 2.671875
| 3
|
Families are not democracies. Each family has its own ways of deciding who has the power and authority within the family unit, and which rights, privileges, obligations, and roles are assigned to each family member.
In most families parents are expected to be the leaders or executives of the family; children are expected to follow the leadership of their parents. As children in the middle years grow older, they will ask for, and certainly should be allowed, more autonomy, and their opinions should be considered when decisions are made; however, parents are the final authorities.
Of course there will always be disagreements among the generations. Your child may want to go to the beach on a family vacation; you may want to go to the mountains. He may think he has too many chores to do; you may think he has just the right amount. Let him speak his mind, but the ultimate decision is yours. Explain why you've made the judgment you have, without becoming defensive or apologetic. You won't always be popular in these decisions, but your youngster is still going to love you.
Although generational hierarchies are the most obvious ones within families, other types of hierarchies exist as well. Sometimes they depend on gender. In patriarchal societies such as ours, men have traditionally had power over women, including within the family. Traditionally, fathers have been the providers and authority figures, but while they may be the final decisionmakers, they often have assumed only limited functions beyond that in the family. Mothers have been the caretakers, responsible for the emotional side of the family; they have kept the family together and functioning smoothly. What this means is that mothers and fathers are likely to hold different positions in the family hierarchy, that mothers take primary responsibility and that fathers may have only partial responsibility for day-to-day parental decisions.
Today, however, there are challenges to this traditional gender-based structure. In many families both fathers and mothers are bringing home paychecks. And while women still seem to shoulder the larger share of responsibility for the day-to-day operations of the family, more fathers are assuming greater roles in child-raising and household duties.
It is useful to consider what roles each family member takes within the family, and whether everyone is satisfied with the current arrangement. For example, the oldest children in the family may take on the parental role of caring for their younger siblings. Or grandparents may acquire an important place within the family by assuming a central child-rearing role while parents work.
Think about who is responsible for what within your own family and how the current arrangement is working. Some responsibilities may be open to negotiation, particularly if the family does not seem to be functioning optimally. For example, an older child may be resentful of having too much responsibility for watching over the younger children, while the younger children may also resent the older child playing a parental role. This will result in arguments whenever the oldest child is left in charge. Parents need to review what is going on, discuss how the children are feeling about it, and come up with some alternatives.
|
<urn:uuid:30a6d456-219d-4ab7-bc7a-8aa429c3248d>
|
CC-MAIN-2016-26
|
https://www.healthychildren.org/English/family-life/family-dynamics/Pages/Roles-Within-the-Family.aspx
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397695.90/warc/CC-MAIN-20160624154957-00044-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.97703
| 625
| 3.75
| 4
|
Environmental Factor, September 2009, National Institute of Environmental Health Sciences
Research Suggests Viral Protein Manipulates Host Cells to Cause Flu-like Symptoms
By Brian Chorley
In response to the current H1N1 pandemic, the scientific community has increased its efforts to better understand how influenza virus spreads and how to mediate its adverse health effects. Physiologist Sadis Matalon, Ph.D., of the University of Alabama in Birmingham (UAB), and an NIEHS-supported research group, which included influenza experts Diana Noah, Ph.D., and James Noah, Ph.D., of the Southern Research Institute Emerging Infectious Diseases section in Birmingham, are currently exploring such issues by determining the mechanisms by which influenza virus invades its host and propagates.
In their recent study (http://www.ncbi.nlm.nih.gov/pubmed/19596899?ordinalpos=1&itool=EntrezSystem2.PEntrez.Pubmed.Pubmed_ResultsPanel.Pubmed_DefaultReportPanel.Pubmed_RVDocSum) , available online from the Journal of the Federation of American Societies for Experimental Biology (FASEB), Matalon (http://www.sadismatalon.com/) and his research team demonstrated for the first time how a specific viral protein, M2, decreases airway cell ion channel activity, which can lead to flu symptoms such as pulmonary edema. Understanding this mechanism may lead to "new therapeutic strategies for altering the progression of the viral infection" and for maintaining alveolar fluid absorption, the authors conclude.
According to the researchers, influenza is a highly contagious respiratory virus responsible for an estimated 36,000 deaths annually in the U.S. alone. It infects humans and other animal species, such as dogs, horses, pigs and birds. The virus is highly adaptable to its environment because of its ability to incorporate genetic material from different viral strains, thereby creating a novel strain not recognized by the immune system of the host. For example, the current H1N1 strain evolved from strains that previously infected humans, birds and swine.
Understanding the mechanisms by which influenza viruses evolve, invade and replicate also clues scientists as to why viruses create flu-associated symptoms. Many of the respiratory symptoms can be attributed to signaling changes mediated by the airway epithelial cells. The virus first encounters this cellular lining, which protects the airway from environmental challenges. These cells were the focus of Matalon's study.
Specifically, changes in sodium transport across the epithelial cell lining after influenza virus exposure was measured. Sodium transport directly influences the absorption of fluid that lines the trachea and distal airways. Abnormal buildup of this fluid, or pulmonary edema, reduces the ability of oxygen exchange in the lung, which can be fatal. In the study, the researchers demonstrated that the M2 protein attenuates the presence of the epithelial sodium transport channel ENaC.
M2 protein itself is an ion (proton) channel and is utilized by the virus to create an environment conducive for replication. Since M2 protein functions in the same cellular space as ENaC, the research team looked for interaction between the two ion channel proteins that could explain M2-mediated regulation of ENaC. Surprisingly, they found that M2 increased targeted degradation of ENaC through an indirect mechanism involving reactive oxygen species production and a downstream protein kinase cascade.
Decreased amounts of active ENaC through the action of viral M2 protein may contribute to fluid buildup in the airway. This buildup could lead to pulmonary edema, as well as contribute to less serious flu symptoms, such as runny nose. Medications that specifically target the viral M2 protein, such as amantadine, should act to dampen these symptoms by inhibiting ENaC depletion.
Unfortunately, due to their highly adaptable nature, many viral strains are amantadine-resistant, limiting the effectiveness of this medication as an anti-viral treatment. Evidence provided by this study demonstrates, however, that targeting M2 protein may have multiple beneficial effects. Perhaps findings such as these will lead to future efforts to develop novel drug therapy that targets the viral M2 channel.
The study was supported by grants from multiple institutes of the National Institutes of Health, including the National Institute of Environmental Health Sciences. The findings will be published in the November 2009 edition of FASEB.
Citation: Lazrak A, Iles KE, Liu G, Noah DL, Noah JW, Matalon S. (http://www.ncbi.nlm.nih.gov/pubmed/19596899?ordinalpos=1&itool=EntrezSystem2.PEntrez.Pubmed.Pubmed_ResultsPanel.Pubmed_DefaultReportPanel.Pubmed_RVDocSum) 2009. Influenza virus M2 protein inhibits epithelial sodium channels by increasing reactive oxygen species. FASEB J. [Epub ahead of print]
(Brian Chorley, Ph.D., is a postdoctoral fellow in the NIEHS Laboratory of Molecular Genetics Environmental Genomics Group.)
|
<urn:uuid:d5ae48fd-8334-45ff-a3b8-1dbebd4d4b8d>
|
CC-MAIN-2016-26
|
http://www.niehs.nih.gov/news/newsletter/2009/september/science-viralprotein.cfm
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397636.15/warc/CC-MAIN-20160624154957-00039-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.922121
| 1,064
| 3.359375
| 3
|
The Straw Game is one of the cool kids indoor party games, and fun activities for children to play.
Safety first. Use objects large enough that they cannot be sucked up into the straw.
Divide the kids into two teams with the same number of players. Players sit on the floor, side by side, facing the other team.
Give each player a straw.
Then put a paper plate with mini marshmallows on one end of each team, and an empty paper plate on the other end of each team.
The leader calls out, "One, two, three, "GO!" and the player on each team closest to the marshmallows picks up a marshmallow with the straw that is in her mouth.
The first player drops the marshmallow into the hands of the player to her right.
This player then picks the marshmallow out of his hand with the straw, then puts it in the hands of the player to his right.
Play continues until the player on the other end has the marshmallow and drops it, using his straw, into the empty bowl.
The first team to pass all their marshmallows down to the empty bowl wins.
So, how fast were you able to go? Did your team win?
|
<urn:uuid:d75c43ee-fd2c-4533-a06e-d684d40ba804>
|
CC-MAIN-2016-26
|
http://www.lots-of-kids-games.com/straw-game.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395620.9/warc/CC-MAIN-20160624154955-00035-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.971436
| 257
| 2.828125
| 3
|
Probably one of the most notorious pioneer women attorneys, Mary Leonard was the first women lawyer in both Oregon and Washington. She was a Swiss immigrant who moved to the Northwest territory after the Civil War. her two-year mariage ended in a bitter divorce. Her ex-husband, who refused to honor a court order for providing support, was found dead from a gunshot wound. Leonard was charged but acquitted of murder. She then inherited David Leonard's estate, became financially solvent, and decided to study law. She passed the Washington bar in 1884, then subsequently moved to Portland, Oregon, where she practiced about a year, then retired due to bad health.
|
<urn:uuid:10b17706-9fc3-4875-a0f4-d2d1ae88dc40>
|
CC-MAIN-2016-26
|
http://maryleonardlawsociety.blogspot.com/p/about-mary-gysin-leonard.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393997.50/warc/CC-MAIN-20160624154953-00191-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.985223
| 132
| 2.609375
| 3
|
Glycemic Index 101
Curious what the glycemic index actually means and if it’s relevant to you? Find out here what it is and why you should keep it in mind when shopping and eating.
Curious what the glycemic index actually means and if it’s relevant to you? Find out here what it is and why you should keep it in mind when shopping and eating. Glycemic index and glycemic load offer information about how foods affect blood sugar and insulin. The lower a food's glycemic index (or glycemic load), the less it affects blood sugar and insulin levels.
The glycemic index (GI) is a ranking of carbohydrates on a scale from 0 to 100 according to the extent to which they raise blood sugar levels after eating. Foods with a high GI are those which are rapidly digested and absorbed and result in marked fluctuations in blood sugar levels. You can view an extensive list here.
Low-GI foods, by virtue of their slow digestion and absorption, produce gradual rises in blood sugar and insulin levels, and have proven benefits for health. Low GI diets have been shown to improve both glucose and lipid levels in people with diabetes (type 1 and type 2). They have benefits for weight control because they help control appetite and delay hunger. Low GI diets also reduce insulin levels and insulin resistance.
Low GI Foods (55 or less): 100% stone-ground whole wheat or pumpernickel bread, oatmeal (rolled or steel-cut), oat bran, muesli, pasta, converted rice, barley, bulgar, sweet potato, corn, yam, lima/butter beans, peas, legumes and lentils, most fruits, non-starchy vegetables and carrots
Medium GI (56-69): Whole wheat, rye and pita bread, quick oats, brown, wild or basmati rice, couscous
High GI (70 or more): White bread or bagel, corn flakes, puffed rice, bran flakes, instant oatmeal, shortgrain white rice, rice pasta, macaroni and cheese from mix, russet potato, pumpkin, pretzels, rice cakes, popcorn, saltine crackers, melons and pineapple
What’s the difference between glycemic index and glycemic load? The glycemic load takes into account serving size.
Glycemic Load gives a relative indication of how much a serving of food is likely to increase your blood-sugar levels. Glycemic load estimates the impact of carbohydrate consumption using the glycemic index while taking into account the amount of carbohydrate that is consumed. For example, watermelon has a high GI, but a typical serving of watermelon does not contain much carbohydrate, so the glycemic load of eating it is low.
As a rule of thumb, most nutritional experts consider Glycemic Loads below 10 to be "low," and Glycemic Loads above 20 to be "high." Because Glycemic Load is related to the food's effect on blood sugar, low Glycemic Load meals are often recommended for diabetic control and weight loss. Click here for examples of glycemic load.
|
<urn:uuid:970dd08e-0d71-443b-871e-2571e786bdd0>
|
CC-MAIN-2016-26
|
http://www.supermarketguru.com/articles/glycemic-index-101.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399425.79/warc/CC-MAIN-20160624154959-00150-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.879282
| 645
| 2.84375
| 3
|
Oil is NOT a fossil fuel
by Peter J. Morgan
We all grew up believing that oil is a fossil fuel, and just about every day this ‘fact’ is mentioned in newspapers and on TV. However, let us not forget what Lenin said – “A lie told often enough becomes truth.” It was in 1757 that the great Russian scholar Mikhailo V. Lomonosov enunciated the hypothesis that oil might originate from biological detritus. The scientists who first rejected Lomonsov’s hypothesis, at the beginning of the nineteenth century, were the famous German naturalist and geologist Alexander von Humboldt and the French chemist and thermodynamicist Louis Joseph Gay-Lussac, who together enunciated the proposition that oil is a primordial material erupted from great depth, and is unconnected with any biological matter near the surface of the Earth.
With the development of chemistry during the nineteenth century, and following particularly the enunciation of the second law of thermodynamics by Clausius in 1850, Lomonosov’s biological hypothesis came inevitably under attack. In science, a hypothesis is merely somebody’s attempt to explain something. It is merely that – an attempt. In the scientific method, a hypothesis is also an open invitation for somebody else to discredit it by using physical evidence to demonstrate that the hypothesis is flawed, or incorrect – that is how scientific knowledge is advanced. Einstein is reputed to have remarked that just one fact was all that was needed to invalidate his theory of relativity.
The great French chemist Marcellin Berthelot particularly scorned the hypothesis of a biological origin for petroleum. Berthelot first carried out experiments involving, among others, a series of what are now referred to as Kolbe reactions and demonstrated the generation of petroleum by dissolving steel in strong acid. He produced the suite of n-alkanes and made it plain that such were generated in total absence of any “biological” molecule or process. Berthelot’s investigations were later extended and refined by other scientists, including Biasson and Sokolov, all of whom observed similar phenomena and likewise concluded that petroleum was unconnected to biological matter.
During the last quarter of the nineteenth century, the great Russian chemist Dmitri Mendeleev also examined and rejected Lomonosov’s hypothesis of a biological origin for petroleum. In contrast to Berthelot who had made no suggestion as to where or how petroleum might have come, Mendeleev stated clearly that petroleum is a primordial material which has erupted from great depth. With extraordinary perception, Mendeleev hypothesised the existence of geological structures which he called “deep faults,” and correctly identified such as the locus of weakness in the crust of the Earth via which petroleum would travel from the depths. After he made that hypothesis, Mendeleev was abusively criticised by the geologists of his time, for the notion of deep faults was then unknown. Today, of course, an understanding of plate tectonics would be unimaginable without recognition of deep faults.
Soon after the end of World War II, the Soviet dictator, Stalin, realized that the then Soviet Union needed its own substantial oil reserves and production system if it was ever again called upon to defend itself against an attacker such as Hitler’s Germany. In 1947, the Soviet Union had, as its petroleum ‘experts’ then estimated, very limited petroleum reserves, of which the largest were the oil fields in the region of the Abseron Peninsula, near the Caspian city of Baku in what is now the independent country of Azerbaijan. At that time, the oil fields near Baku were considered to be “depleting” and “nearing exhaustion.” During World War II, the Soviets had occupied the two northern provinces of Iran, but in 1946, they were forced out by the British. By 1947, the Soviets realised that the American, British, and French were not going to allow them to operate in the Middle East, nor in the petroleum producing areas of Africa, nor Indonesia, nor Burma, nor Malaysia, nor anywhere in the Far East, nor in Latin America. The government of the Soviet Union recognised then that new petroleum reserves would have to be discovered and developed within the U.S.S.R.
Stalin’s response was to set up a task force of top scientists and engineers in a project similar to the Manhattan Project – the top-secret US program to develop the atom bomb during WWII – and initially under the same secrecy, and charged them with the task of finding out what oil was, where it came from and how to find, recover and efficiently refine it.
In 1951, the modern Russian-Ukrainian theory of deep, abiotic petroleum origins was first enunciated by Nikolai A. Kudryavtsev at the All-Union petroleum geology congress. Kudryavtsev analyzed the hypothesis of a biological origin of petroleum, and pointed out the failures of the claims then commonly put forth to support that hypothesis. Kudryavtsev was soon joined by numerous other Russian and Ukrainian geologists, among the first of whom were P. N. Kropotkin, K. A. Shakhvarstova, G. N. Dolenko, V. F. Linetskii, V. B. Porfir’yev, and K. A. Anikiev.
During the first decade of its existence, the modern theory of petroleum origins was the subject of great contention and controversy. Between the years 1951 and 1965, with the leadership of Kudryavtsev and Porfir’yev, increasing numbers of geologists published articles demonstrating the failures and inconsistencies inherent in the old “biogenic origin” hypothesis. With the passing of the first decade of the modern theory, the failure of Lomonosov’s eighteenth century hypothesis of an origin of petroleum from biological detritus in the near-surface sediments had been thoroughly demonstrated, the hypothesis discredited, and the modern theory firmly established.
An important point to be recognised is that the modern Russian-Ukrainian theory of abiotic petroleum origins was, initially, a geologists’ theory. Kudryavtsev, Kropotkin, Dolenko, Porfir’yev and the developers of the modern theory of petroleum were all geologists.
Their arguments were necessarily those of geologists, developed from many observations, and much data, organized into a pattern, and argued by persuasion.
By contrast, the practice of mainstream, predictive modern science, particularly physics and chemistry, involves a minimum of observation or data, and applies only a minimum of physical law, inevitably expressed with formal mathematics, and argued by compulsion. Such predictive proof of the geologists’ assertions for the modern Russian-Ukrainian theory of deep, abiotic petroleum origins had to wait almost a half century, for such required the development not only of modern quantum statistical mechanics, but also that of the techniques of many-body theory and the application of statistical geometry to the analysis of dense fluids, designated scaled particle theory.
To recapitulate, Stalin’s team of scientists and engineers found that oil is not a ‘fossil fuel’ but is a natural product of planet Earth – the high-temperature, high-pressure continuous reaction between calcium carbonate and iron oxide – two of the most abundant compounds making up the Earth’s crust. This continuous reaction occurs at a depth of approximately 100 km at a pressure of approximately 50,000 atmospheres (5 GPa) and a temperature of approximately 1500°C, and will continue more or less until the ‘death’ of planet Earth in millions of years’ time. The high pressure, as well as centrifugal acceleration from the Earth’s rotation, causes oil to continuously seep up along fissures in the Earth’s crust into subterranean caverns, which we call oil fields. Oil is still being produced in great abundance, and is a sustainable resource – by the same definition that makes geothermal energy a sustainable resource. All we have to do is develop better geotechnical science to predict where it is and learn how to drill down deep enough to get to it. So far, the Russians have drilled to more than 13 km and found oil. In contrast, the deepest any Western oil company has drilled is around 4.5 km.
A team consisting of Russian scientists and Dr J. F. Kenney, of Gas Resources Corporation, Houston, USA, have actually built a reactor vessel and proven that oil is produced from calcium carbonate and iron oxide, as detailed on the --
This is what Dr Kenney has to say about how he came to be involved:
“In the first instance, the articles on this” (his company’s website --) “are dedicated to the memory of Nikolai Alexandrovich Kudryavtsev, who first enunciated in 1951 what has become the modern Russian-Ukrainian theory of deep, abiotic petroleum origins. After Kudryavtsev, all the rest followed. Secondly, these articles are dedicated generally to the many geologists, geochemists, geophysicists, and petroleum engineers of the former U.S.S.R. who, during the past half century, developed modern petroleum science. By doing so, they raised their country from being, in 1946, a relatively petroleum-poor one, to the greatest petroleum producing and exporting nation in the world today. These articles are dedicated specifically to the late Academician Emmanuil Bogdanovich Chekaliuk, the greatest statistical thermodynamicist ever to have turned his formidable intellect to the problem of petroleum genesis. In the Summer of 1976, during the depths of the cold war and at immeasurable hazard, Academician Chekaliuk chose to respond, across a gulf of political hostility, to an unsolicited letter from an unknown American chief executive officer of a petroleum company headquartered in Houston, Texas. Thenafter and for almost fifteen years, Academician Chekaliuk was my teacher, my collaborator, and my friend. [JFK] 1. Kudryavtsev, N. A. (1951) Petroleum Economy [Neftianoye Khozyaistvo] 9, 17-29.”
A US Public Service Radio interview with Dr Kenney may be heard on the --.
Some may ask “How come all of this isn’t commonly known?” For the answer, one needs to consider what happened to Galileo when he first put forward the hypothesis that rather than the conventional wisdom that the sun revolved around the earth, the earth revolved around the sun. He was branded a heretic and locked up! You are invited to read an excellent article entitled “Cognitive Processes and the Suppression of Sound Scientific Ideas”, by J. Sacherman 1997, at --
Some may say “Well, even if oil is a renewable resource, mankind should not burn it because the carbon dioxide so produced causes global warming.” My answer to that is that the idea that mankind’s production of carbon dioxide causes global warming is merely a hypothesis, and this has been thoroughly discredited by Prof. Robert Carter and numerous other scientists. You are invited to view a video of Prof. Robert Carter’s demolition of the “mankind’s production of carbon dioxide causes global warming” hypothesis -- where you will see Prof. Carter illustrate five examples of verifiable science that refute the hypothesis. Prof. Carter makes the point that truth in science is never decided by consensus, but if you prefer to believe the pronouncement by the United Nations Intergovernmental Panel on Climate Change (IPCC) that “2,500 scientists of the United Nation’s IPCC agree that humans are causing a climate crisis”, which is repeated ad nauseam by environmentalists, the press and governments around the world, including ours, then you are invited to read an article at -- where Tom Harris and John McLean tell the truth about this deception and point out that “an example of rampant misrepresentation of IPCC reports is the frequent assertion that ‘hundreds of IPCC scientists’ are known to support the following statement, arguably the most important of the WG I report, namely “Greenhouse gas forcing has very likely caused most of the observed global warming over the last 50 years.” In total, only 62 scientists reviewed the chapter in which this statement appears, the critical chapter 9, “Understanding and Attributing Climate Change”. Almost 60% of the comments received from the 62 expert reviewers of this critical chapter were rejected by the IPCC editors and 55 of the 62 expert reviewers had serious vested interest, leaving only seven expert reviewers who appear impartial. In my view, seven does not constitute “a consensus of the world’s scientists..” If it’s consensus you want before you decide on what the truth is, then follow the link to The National Post to read about the petition signed by more than 32,000 scientists, more than 9000 of whom hold PhDs. That’s consensus!
|
<urn:uuid:8c94d839-b2c6-4b02-b260-d87f018b9513>
|
CC-MAIN-2016-26
|
http://origeminorganicadopetroleo.blogspot.com/2011_10_01_archive.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396887.54/warc/CC-MAIN-20160624154956-00000-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.959583
| 2,753
| 2.78125
| 3
|
A study led by Benjamin Chi of the University of Alabama, Birmingham, USA and colleagues reports on the development of a standard definition for loss-to-follow-up (LTFU) that can be used by HIV antiretroviral programs worldwide. Based on their findings, which are published in this week's PLoS Medicine, the authors recommend that the standard definition for LTFU should be when 180 days or more have elapsed since the patient's last clinic visit.
Patient attrition from antiretroviral therapy (ART) programs is recognized as a threat to the long-term success of such programs worldwide. A standardized method for classifying patients as LTFU is essential in order to be able to compare the performance of different programs, and deduce which factors are responsible for LTFU. In this study, the researchers performed a statistical analysis using data from 111 health facilities across Africa, Asia, and Latin America, categorizing patients receiving ART at each facility at a ''status classification'' date as active, or LTFU, using a range of intervals (thresholds) since their last clinic visit.
The authors found that, at a facility level, the best-performing threshold for patient classification ranged from 58 to 383 days (with an average of 150 days), but application of a 180-day threshold to individual facilities only slightly increased misclassifications. Using this 180-day interval, the average LTFU at individual facilities was 19.9%. Though the 180-day threshold produced the fewest patient misclassifications when data from all facilities were pooled, the authors acknowledge that local, national, or regional definitions of LTFU may be more appropriate in certain contexts.
Adopting this standard definition for LTFU should facilitate harmonization of monitoring and evaluation of ART programs across the world as well as helping to identify ''best practices'' that are associated with low LTFU rates. The authors note: "Further research is needed to understand individual- and facility-level predictors of LTFU, so that at-risk populations can be identified and appropriate interventions can be evaluated".
They add: "[Standardisation] provides the necessary framework for continued research to improve patient retention, so that the health gains from HIV treatment programs may be maximized and sustained".
Funding: The International Epidemiologic Databases to Evaluate AIDS (IeDEA) collaboration is funded jointly by the National Institute of Allergy and Infectious Diseases, the National Cancer Institute, and the Eunice Kennedy Shriver National Institute of Child Health and Human Development through the following grants: Central African region (U01AI069927), Eastern African region (U01AI069919), Southern African region (U01AI069924), Western African region (U01AI069919), Asia/Pacific region (U01AI069907), and Caribbean, Central American, and South American region (U01AI069923). The TREAT Asia HIV Observation Database, a contributor to the Asia/Pacific IeDEA region, is jointly supported by the Foundation for AIDS Research (amfAR), the Dutch Ministry of Foreign Affairs, and Stichting Aids Fonds. Additional salary and trainee support was provided by the US National Institutes of Health (D43-TW001035; P30-AI027767) and the Doris Duke Charitable Foundation (2007061). No funding bodies had any role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.
Competing Interests: The authors have declared that no competing interests exist.
Citation: Chi BH, Yiannoutsos CT, Westfall AO, Newman JE, Zhou J, et al. (2011) Universal Definition of Loss to Follow-Up in HIV Treatment Programs: A Statistical Analysis of 111 Facilities in Africa, Asia, and Latin America. PLoS Med 9(10): e1001111. doi:10.1371/journal.pmed.1001111
University of Alabama at Birmingham
Centre for Infectious Disease Research in Zambia
+260 977 859 179
|
<urn:uuid:71206b17-f877-4763-8a7a-01f9204a9f77>
|
CC-MAIN-2016-26
|
http://www.eurekalert.org/pub_releases/2011-10/plos-sdo101811.php
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783392527.68/warc/CC-MAIN-20160624154952-00182-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.901553
| 848
| 2.59375
| 3
|
Pesticide Action Network Updates Service (PANUPS)
A Weekly News Update on Pesticides, Health and Alternatives
See PANUPS archive for complete information.
- Lindane one of nine chemicals added to POPs treaty
- WHO reaffirms commitment to phase out DDT
- Bhopali U.S. tour points to MIC at Bayer pesticide plant
- Cancer rates rise with pesticide use in Punjab
- EPA cancels food uses of carbofuran
- EPA rejects 'CheckMate' & registers new moth pesticide
- New evidence linking pesticides, genes & Parkinson's
In a late-night session in Geneva ending a week of heated negotiations, countries of the world agreed to target nine new chemicals for global elimination. Early on the morning of May 9th, the new chemicals joined twelve of the most dangerous and environmentally damaging chemicals ever manufactured already slated for elimination under the Stockholm Convention on Persistent Organic Pollutants (POPs). Last week's meeting marked the first consideration of new chemicals under the treaty since it entered into force in 2004, and reaching agreement to phase out chemicals still widely used proved difficult, according to NGO observers (PDF). For example, one of the newly listed chemicals is the pesticide lindane, a highly toxic insecticide that persists in the environment. Despite the fact that all uses of lindane have been phased out in 52 countries, a pharmaceutical use exemption was included, allowing some uses to continue for the next five years. “While we’re pleased that production of lindane and its use in agriculture will now end, we’re very disappointed that a loophole was added allowing use of existing stocks of lindane products to treat lice and scabies,” says Karl Tupper, Staff Scientist with Pesticide Action Network North America. “This exemption in essence allows companies to dispose of existing stocks by dumping them on children’s heads.” A broad coalition—including governments from the European Union to Mexico, Arctic Indigenous groups, and NGOs—supported listing lindane without the exemption. The U.S., which had previously insisted on the exemption, announced at the meeting’s opening on Monday that it now supported banning lindane without the exemption. Other new chemicals listed under the treaty include the by-products of lindane production, the agricultural chemical chlordecone, three types of flame retardants, pentachlorobenzene and perfluoroctane sulfonic acid (PFOS).
In September 2006, Arata Kochi, head of the World Health Organization's malaria unit, stunned malaria, health and environmental experts by announcing that DDT had been given a "clean bill of health," and the infamous insecticide would "once again play a major role in [WHO's] efforts to fight [malaria]." In fact, there had been no new evaluation of DDT (WHO is due to release its updated reassessment within a year), and the agency had made only minor adjustments to its official guidelines on DDT use, slightly expanding the list of situations where it recommended DDT. Still, the damage was done: Kochi's strongly worded statement catalyzed the expansion of DDT spray programs, with donors enthusiastically funding projects and a few African countries announcing they were initiating or expanding existing DDT spray programs. Despite a global commitment to eventually phase out DDT under the Stockholm Convention on Persistent Organic Pollutants, its use has been increasing since the Convention entered into force in 2004. With a new announcement by the WHO and UNEP, this trend will likely be turned around. On May 6th, during a meeting of the Stockholm Convention, WHO Director of Public Health and the Environment Maria Neira announced a "rejuvenated international effort" to roll back both malaria and the use of DDT. The collaborative effort with the United Nations Environment Programme will be implemented in 40 countries across Africa, Asia, and the Middle East, and will roll out Integrated Vector Management strategies that have a proven track record of beating malaria in other parts of the world. The initiative aims for a 30% reduction in DDT use by 2014, and total elimination of DDT by "early 2020s if not sooner." Medha Chandra, campaign coordinator at Pesticide Action Network North America, welcomed the announcement but said it was overdue: "We're encouraged that WHO has publicly reaffirmed its commitment to phasing out DDT, but it's unfortunate that it has taken this long. With more effective, safer alternatives available, it's time everyone must get serious about using them to defeat malaria."
"Sarita Malviya wasn't born when an explosion at a Union Carbide chemical plant in Bhopal, India, on Dec. 3, 1984, sent a cloud of deadly gas containing the compound methyl isocyanate [MIC] into the old section of the city, searing the lungs and causing the deaths of at least 4,000 people," writes Rick Steelhammer in West Virginia's Charleston Gazette. "When her family moved to Bhopal years after the world's worst industrial disaster, 'we had no idea that Union Carbide left toxic waste in three ponds,'" the 16-year-old told an audience through an interpreter at West Virginia State University on May 1. Sarita is one of four Bhopali activists touring Canada and the U.S. to raise awareness about the dangers of pesticide manufacturing and the ongoing tragedy in Bhopal. The tour is also raising funds for advocacy and to support the Sambhavna Clinic that treats survivors. At 14, "she became a founding member of Children Against Dow/Carbide, an organization trying to force the former chemical giant and the company that bought it to fix lingering environmental problems and fund the study of related public health issues. 'On the night of the Bhopal disaster, 40 tons of MIC was being stored by Union Carbide,'" Sarita told the university students and residents of Institute, WV, where a Bayer plant that produces and stores MIC exploded, again, last year. "'I understand more than 100 tons are being stored...here. I can only imagine what would happen to a community like this if that much MIC was released." Sarita's appearance is part of a 25-city tour taking place on the 25th anniversary of the Bhopal disaster, sponsored by the International Campaign for Justice in Bhopal. Next appearances are planned in Toronto (May 16), Chicago (15-19th), Houston and Austin (18-20th), San Francisco Bay Area (23-26), followed by other West Coast cities. To get involved see the complete Bhopal tour schedule.
"Are the modern farming methods brought by the so-called Green Revolution of the 1960s and '70s making people sick?," asks NPR's "All Things Considered" reporter Daniel Zwerdling, in a May 11 feature titled, "In Punjab, Crowding Onto the Cancer Train". Starting with the stories of some 60 patients who pack the train arriving each night at a regional government cancer center, Zwerdling examined the links between the rise of cancers, including those afflicting children, and marked increases in the use of synthetic pesticides. "Farmer Jarnail Singh helped spur research into whether the Green Revolution — a movement in the 1960s and '70s to introduce American farming methods such as the use of pesticides, fertilizers and high-yield seeds — has been hurting the public's health. The first clue Singh noticed was that peacocks — India's national bird — disappeared from the fields." The report cites recent research (PDF) into the potential contributions of pesticide use to cancer in India, including high levels of heptachlor, ethion, and chloropyrifos in drinking water.
On May 12, in the latest of several blows to FMC, the U.S. corporation that manufactures and will still market carbofuran around the world, the U.S. EPA confirmed its 2008 ruling that carbofuran residues will no longer be allowed "on domestic or imported food, a decision that would effectively remove the chemical from the U.S. market." Infamous for killing millions of birds worldwide, the acutely toxic insecticide is one of three carbamates recently confirmed as contributing to the decline of salmon in the Pacific Northwest. It is also highly toxic to mammals, including people. A March 29 60 Minutes program was the latest report on how Furadan, FMC's brand of the pesticide, is used illegally by herders to kill lions in Kenya. The new ruling does not prohibit continued manufacture of carbofuran's active ingredient, also called furadan, at Bayer CropScience's Institute, West Virginia plant. Carbofuran is a classic example of the "Circle of Poison," wherein products banned or restricted for use in their country of origin are still exported and may return on imported foods. Carbofuran is common in coffee production in Costa Rica, for example, and on bananas, rice and sugar cane in many developing countries. "The EPA said it soon will issue rules banning other uses of carbofuran because of risks to farm workers and the environment," according to the Associated Press, confirming its intention first announced in July 2008.
U.S. EPA has revoked approval of the two “CheckMate” pesticides that were used in aerial spraying over California Bay Area counties in late 2007, according to Jane Kay, writing in the San Francisco Chronicle. The urban spraying program was launched to “eradicate” the invasive Light Brown Apple Moth (LBAM). USDA funded the program, claiming that millions of dollars in damage to agriculture could result if the moth was not stopped. USDA had sought an emergency exemption from EPA to use the pesticides without prior environmental and health impact evaluations and state registration. The spraying was blocked by the courts before the program could be extended beyond Monterey and Santa Cruz counties. In June 2008, after an uprising by residents and pleas from several city governments, Gov. Schwarzenegger put an indefinite hold on urban spraying until safety tests were completed. Instead, USDA is breeding and releasing sterile moths as a way to keep down the LBAM population without pesticides. CheckMate is based on a pheromone that disrupts male moth mating behavior. Another pheromone-based product the state tested in early 2008 is Hercon's Disrupt Bio-Flake. It was registered by EPA in January 2009, after "Tests on animals for acute effects, but not chronic effects, showed no immediate problems.... Hercon must apply for registration in California and undergo an evaluation that could take months. Stephan Volker, an Oakland attorney representing the residents in last year's suit against the EPA, said residents want to know all of the ingredients in any product,” Kay reports. Meanwhile, Pesticide Action Network and other groups have petitioned USDA to reclassify the LBAM as a pest not requiring extraordinary control measures.
"Exposure to commonly used agricultural pesticides may increase the risk of developing Parkinson’s disease, particularly among people who have certain gene types," reports Environmental Health News. Summarizing the new research, EHN notes: "The degenerative nerve disease can develop when dopamine levels in the brain are lower than normal. Without pesticide exposures, susceptible gene variants alone were not sufficient to increase risk. The increased risk to Parkinson's required both susceptible genes and pesticide exposure." The full article (PDF) is available from Environmental Health Perspectives.
|
<urn:uuid:427d5d46-d379-462a-8e7b-9f1adfda8687>
|
CC-MAIN-2016-26
|
http://www.panna.org/resources/panups/panup_20090514?quicktabs_1=2
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402479.21/warc/CC-MAIN-20160624155002-00106-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.950405
| 2,350
| 2.578125
| 3
|
Sir Paul McCartney urged world leaders to alter their food policies
Cutting out meat consumption on one day a week can have a major impact on reducing CO2 emissions, Sir Paul McCartney has said.
In an interview with Parliament Magazine he appealed for "people power" to make the difference in the fight against global warming.
He says halving UK meat consumption would do more to reduce emissions than halving the use of private transport.
Sir Paul will take his "Meat-free Monday" campaign to Brussels this week.
The estimated effect of the reduction in meat consumption, by Compassion in World Farming, is central to Sir Paul's campaign which began last June and will continue on Thursday at a European Parliament conference.
The event is also being attended by UN climate change chief Dr Rajendra Pachauri.
Writing in the Brussels-based Parliament Magazine, Sir Paul said: "Whilst we press politicians to pass global laws to reduce carbon emissions, we should not forget our individual capacity to act in ways that will help to fight climate change - such as limiting the eating of meat.
"Having one designated meat-free day a week is a meaningful change that everyone can make."
He described having a meat-free day each week as "the little thing that can make a big difference" and urged governments to back individual action with "the right policies".
"People power can always win out over government inaction. By making a simple change in the way you eat, you are taking part in a world-changing campaign where what's good for you is also good for the planet," said Sir Paul.
The former Beatle said he would appeal to world leaders, who will be converging on Copenhagen for climate change talks in a few days, to remember that sustainable food policy is an essential weapon in the fight against global warming.
Global livestock production currently comprised about 18% of annual global greenhouse gas emissions and could double by 2050, according to Sir Paul.
"From farm to fork, the more meat we produce and eat, the bigger that carbon footprint will get. We simply cannot go on consuming like this," he said.
To support his view, he pointed to a joint report by Friends of the Earth and Compassion in World Farming.
It claims that if the industrialised world halved meat consumption it would be possible to feed the world in 2050 without large agricultural expansion, intensive crop and animal farming, or any further deforestation.
|
<urn:uuid:73d99b41-c213-4062-8ac1-fb9a871c205f>
|
CC-MAIN-2016-26
|
http://news.bbc.co.uk/2/hi/uk_news/8385465.stm
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393332.57/warc/CC-MAIN-20160624154953-00141-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.966695
| 496
| 2.515625
| 3
|
Drillercising with Children to Prep them for Disaster
Article written by Naomi Broderick
Disasters usually happen when you least expect them to. It’s Murphy’s Law. For adults this usually poses less of a problem than it does for children. The grownups can draw from experience and hopefully have already informed themselves on what to do and where to go in case of an emergency, such as a hurricane. For the most part children aren’t prepared for these things. This can lead to either reckless behavior because they aren’t aware of the danger or to extreme fear of the unfamiliar occurrence. This is something I personally think we can and should change. Here are a few tips on how you can get your children ready for disaster and make the prepping fun too.
Raising Safety Awareness
Protecting your home and your family is the most important thing. Every good lesson starts at the base, in this case at home and with the parents. Children watch us very closely and mimic our actions. It is how we have all learned to speak, to walk and do many other things. Your little ones look up to you and follow your lead. So be a good role model and lead by example. Make sure you close your windows, lock your doors and turn your home security system on when you leave the house. Have your child activate the security system so he/she learns to use it. Explain why it’s important and what could happen if you didn’t have a security system. But be kind, don’t make it a nightmare scenario, just a good dose of reality by examples they can process. For example you could explain that if the security system weren’t on a stranger could come into the house and take the TV with them and if that happened, you couldn’t watch your cartoons. Make sure that they understand in case of a disaster, such as a tornado, you are leaving your home for an indefinite period of time and your neighbors will be doing the same, therefore the risk of burglary is even higher. So don’t forget to arm the home security system on your way out of the house.
Bug Out Bag
In case of a disaster, especially the ones that aren’t predictable, you should have a bug out bag ready, in an easily accessible place. This is something grownups know and have. Does your child? Most people will answer this question with a no. Children’s needs are different than ours and should be taken into consideration. Each child in your house should have their own. Let your child pack their backpack and explain why they are doing this. Make sure they understand that this stays put until it is needed and let them know why. The backpack should be lightweight and contain, aside from a change of clothes, something to entertain them. Children do get bored easily and need diversion. It doesn’t have to be the Gameboy and it doesn’t have to be a lot. A deck of cards or two can entertain your children in many ways. There are a number of child friendly card games and the cards can be used to build card houses and castles and all kinds of neat stuff. A dry erase marker and a piece of white vinyl table cloth can keep them busy drawing and be re-used. A few balloons can be blown up quickly and double as a ball. You should also add a flashlight and some snacks with a long shelf life (i.e. granola bars or dried fruit).These are things that are light and go a long way. You’ll be grateful you have this and so will they.
Escape Routes & Shelters
Make sure you know where the escape routes and shelters in your area are. Show your children where they are and explain what they’re for. Some designated shelters are used for other purposes until they have to be used as one. Schools often double as shelters. Once you know where your closest shelter is take your children there, explain the purpose of a shelter and most importantly decide on a meeting point. If you are separated from your children they have to know where they can find you. Establishing this meeting point now and making sure they know where it is, will help them feel more confident in such a situation. They may be at school and you’re at work when disaster strikes, that’s why it’s important to have this information firmly implanted in their minds now.
Periodically you should stage drills for emergency situations. These can be fun and at the same time impart vital information to your children and keep you on your toes as well. This is also the best way to see if there are flaws in your execution. Have a game plan for any situation. For example you can stage;
- An electricity fall out at night. Just turn the main switch and you will be simulating the situation you want to practice. Everyone should know where the flashlights are and how to reach them. Let your children get a feel for what it’s like being without electricity; leave the lights off until the next day (Once they’re asleep turn the lights back on you don’t want your freezer to thaw).
- An emergency evacuation for a hurricane. Limit the time everyone has to get out of the house and don’t let them take longer. Have everyone grab their bug out bags and actually drive the escape route to your nearest shelter. Since it probably won’t be accessible stay in the car and demonstrate how in these situations you may have to make due with little space and only have what you brought with you.
- A fire in your house. How long does it take you to get out? Time these things, set goals to get better at it. Show children where the fire extinguishers in your house are and how and when to use them. If you have gas show the children where the shut off is and have them practice shutting it off during these drills. Visit a fire station with your children. Firemen will be happy to explain the hazards and what can be done to avoid them and how to react in various situations.
Make a list of the things your child needs to know in case of an emergency, like where are the flashlights, where are the matches, where is the bug out bag and more. Make it a competition if there is more than one child. Make it a game to win prizes, if you have only one child. For example if you are going to ask 10 questions you can offer for;
- 5 -6 correct answers wins an ice cream sundae,
- 7-8 correct answers wins a lunch at their favorite drive thru,
- 9 correct answers you’ll rent their favorite movie and
- 10 correct answers wins them the movie and a sundae.
Can you tell how easy it is to prepare your child for any disaster? The important thing is to keep it playful and repeat it often enough so it sinks in. A prepared child is a much safer child and makes for a much more relaxed and confident parent. Knowing that your child will know exactly what to do in case of an emergency is priceless. Happy Drillercising!
Naomi Broderick is a mother of three and a professional writer. When she’s not juggling her three children in the front yard she writes for Protect Your Home, a leader in home alarm systems.
This information has been made available by Ready Nutrition
share this article with others
Leave A Comment...
Ready Nutrition Home Page
|
<urn:uuid:78303c42-a09a-4e63-865d-ac3d37b614f5>
|
CC-MAIN-2016-26
|
http://readynutrition.com/resources/drillercising-with-children-to-prep-them-for-disaster_03102013/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397842.93/warc/CC-MAIN-20160624154957-00063-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.960876
| 1,547
| 2.578125
| 3
|
The Basic Economic Problem
Scarcity means that economic resources are not enough to completely satisfy our wants. Scarcity arises because human wants are unlimited and economic resources are scarce.
All the scarce materials found on the earth are called resources. These include natural resources, machinery, people and so on.
Why are resources important?
Resources are important because they are used to make goods and services to satisfy human wants.
Human wants are unlimited. They are always growing and changing. When we satisfy one want another one will come up.
These are things that satisfy our wants. Goods are made with scarce resources.
Part of a nation’s resources is used to produce services that people want to consume as well as goods. E.g. Education, health, transport, communication, hotel, catering, tourism, entertainment etc.
Needs and wants:
Wants are goods and services that are not necessary for our survival, they give us pleasure. Example TV, motorcars, telephone etc.
Needs are the goods and services that are necessary for our survival.
Example: Food, clothing, house, medicine etc.
Free goods are goods that are unlimited in supply. They are not scarce goods. They have no opportunity cost. Example: ice at the North Pole, sand in a desert, air.
Economic goods are scarce goods. These are the goods and services that are produced by using the scarce economic resources.
Wealth and income
The real wealth of a nation consists of its capital like roads, railways, houses, factories, machines and other stock of capital goods available to use or consume in the future.
The real income of a nation consists of goods and services produced by its resources over a given periods of time.
Thus, wealth is essentially a stock of goods that has been accumulated , where as income is a flow of both goods and services measured over time.
People cannot find enough resources to satisfy all their wants and needs, so they must choose the most urgent wants and satisfy them first. This is called choice.
Choice involves an opportunity cost.
Why is choice necessary?
Choice is necessary because resources have alternative uses.
EXERCISE : I
Scarce Resources have Alternative uses:
Below is a list of resources. See how many alternative uses you can find for them, that is, see how many different goods and services they can help to produce.
1. An area of farmland.
2. A person who is good at Mathematics.
3. A shovel.
4. An egg.
Opportunity cost: The cost of choice
Human wants are unlimited and economic resources are scarce. Therefore we have to make choice. When we make a choice something has to be given up or sacrificed. The thing that we give up is the opportunity cost of what we have chosen.
Example: Ahmed has just enough money to buy either a coca cola or an ice cream. He chooses the ice cream. His opportunity cost is the coca cola that he gave up.
Opportunity cost arises not only when we buy things, but also when we choose what goods and services we produce.
For example, in deciding to use a piece of land to build a new sports complex, we may be going without the benefit new houses.
The Next Best Thing
Choosing between goods and services involves a very special cost . Now imagine that you were unable to get any of these items. Copy and complete the table.
What have I just bought
What could I have bought instead?
Four bed room house
Box of chocolates.
A ticket to the cup final
In the second column you have listed your second best choices, or your next best alternatives. For example, if you had bought the compact disc player, you may be going without the benefit of a record -player. The benefit of the record player given up is the real cost of owing the compact disc player .The real cost of choosing one thing and not another is known as the opportunity cost. This measures the benefit you could have had from the next best alternative you have gone without.
1.3 Implications of particular courses of action in terms of opportunity cost.
Opportunity cost arises not only when we buy things, but also when we choose what goods and services to produce. For example, in deciding to use a piece of land to build a new sports complex, we may be going without the benefit of new houses.
EXERCISE : 3
If there were enough resources to produce everything everybody wanted, would there be any opportunity cost? Explain your answer.
1.4 Production, consumption and exchange
All the economic activities can be classified into three groups. They are production, consumption and exchange:
Production means producing goods and services to satisfy human wants.
Producer: The people who make and sale goods and services are known as producers.
This describes the using up of goods and services in order to satisfy our wants.
A person who uses up goods and services
Goods, which are wanted for their own sake because they provide immediate satisfaction.
Example: food, clothing, a household’s furniture, a family car etc.
Durable consumer goods:
These are the consumer goods that have a fairly long life. Many of them last for several years.
Example: TV, table, chair.
Non-durable consumer goods:
These are the commodities, which are used up immediately or in a short period of time. Some of these are single use goods. Example: food, soap, toothpaste etc.
These include the services that we use in modern life.
Example: transport, entertainment communication, legal, education, and health services, etc.
Exchange is the act of buying and selling goods and services either in the form of barter or through a market.
The modern system of exchange depends upon the use of money. We sell our goods and services for money and then use this money to buy the goods and services that others have produced.
1. What is the basic economic problem common to all societies?
A. The allocation of scarce resources.
B. The elimination of inflation.
C. The need to achieve full employment.
D. The need to reduce taxation.
2. How can economics be defined?
A. Economics is a study of limited resources only.
B. Economics is a science that studies limited wants only.
C. Economics is a social science which studies human behavior as a
relationship between ends and scarce means which have alternative uses .
D. Economics is a study of limited wants and unlimited resources.
3. Which one of the following is true?
A. Wants are limited and resources are unlimited.
B. Wants are unlimited and resources are limited.
C. Wants are limited and resources are limited.
D. Wants are unlimited and resources are unlimited.
4. Which one of the following is an example of free goods?
A. Free food offered to poor people. B. Free traveling.
C. Free meal in a restaurant. D. air
5. What is the term used to describe a situation whereby a student is unable to buy a school bag because he has bought an account textbook?
B. Opportunity cost.
C. Social cost.
6. How can the term “opportunity cost” be defined?
A. The next best opportunity to buy a product.
B. The next best alternative forgone.
C. The next best alternative forgone.
D. The next best opportunity to sell a product.
7. What is the main objective of production?
A. To satisfy human wants.
B. To help management.
C. To help the government in controlling the economy.
D. To provide free goods.
8. A carpenter works five 9-hour days each week and produces wooden bowls at a rate of 2 per hour. What is the opportunity cost of taking a holiday on a working day?
C. 2 bowls
D. 18 bowls
9. The need to make choice arises because
A. wants are limited
B. resources are limited
C. resources to satisfy our wants are scarce
D. goods and services are unlimited
10. The basic economic problems of any economy are
A. what to produce
B. what and how to produce
C. for whom to produce
D. what, how and fro whom to produce
11. Resources are also known as
A. consumer goods
B. public goods
D. factors of production
12. Which of the following choices would be classed as part of the basic economic problem?
A. To have public rather than private ownership of industry.
B. To use direct taxes rather than indirect taxes
C. To use fiscal rather than monetary policy
D. To use land for industry rather than agriculture.
13. A student leaves school and decides to spend the next two years at a college improving her qualifications. What is the opportunity cost for improving her qualifications for the next two years?
A. The extra money she will earn as a result of her improved qualifications
B. The money she would have earned if she had been in work for the two years.
C. The increase in job opportunities she will have as a result of her extra qualifications.
D. The lost production due to her not being in work.
E. The cost of the course fees at the college.
14. An artist works five 8-hour days each week and produces greeting cards at the rate of 150 per hour. She sells the cards for 110 cents each. What is the opportunity cost of taking a holiday on a working day?
A.10 cents B. 150 cents C. 150 cards
D. 1200 cards E. 6000 cards.
15. Which of the following describes the opportunity cost to society of building a new school?
A. The money spend on building the school
B. The increase in taxation to pay for the school
C. The extra cost of producing equipment and teachers to run the school efficiently.
D. The goods and services that could have been produced instead of the school.
16. Commercial companies are cutting tropical rain forests for hardwood timber. What is the opportunity cost to society of this activity?
A. The revenue from the sale of the timber
B. The natural habitat that is lost.
C. The products made from the timber
D. The value of the land cleared of timber
E. The profits of the companies
17. A housewife knits 5 baby garments a day. What is the opportunity cost if she stops knitting for two days and bakes bread instead?
A. Ten garments
B. The cost of the flour for the bread.
C. The cost of the wool she would have used.
D. The value of the bread produced.
18. Which combination of features describes the basic economic problem?
Factors of production Wants
A. Limited Limited
B. Limited Unlimited
C. Unlimited Limited
D. Unlimited Unlimited
19. A person makes sandwiches at home for five hours each day. She makes 20 sandwiches per hour, which she sells for $2 each. What is the opportunity cost if she takes a holiday on a working day?
A. $2 B. $40 C. 20 sandwiches D. 100 sandwiches
20. When economist says that something is scare; what does it mean to them?
A) Some thing is rare
B) Something is available very small quantity
C) Something is available enough quantity
D) Not enough quantity available to satisfy everyone’s wants
21. Which of the following can be considered as free goods but not as economic goods?
A) ice B) sand C) air D) sunshine
22. Which of the following is correct about free goods?
A) They can be obtained without sacrificing something
B) Sacrificing is must to obtain these goods
C) They have less cost of production
D) The production of these goods uses up scarce resources
23. We make choice because we have:
A) Unlimited wants and limited resources
B) Limited resources and limited wants
C) Unlimited wants and unlimited resources
D) Unlimited resources and limited wants
24. The principal of your school awarded you a cap for your outstanding performance in G.C.E ‘O’ level examination. Here the ‘cap’ is not considered as free good because.
A) It is freely available to you
B) It does not have opportunity cost
C) Zero price does not mean zero cost
D) It is not limited in supply
25. Scarcity is a feature of:
A) poor society only
B) rich society only
C) all societies
D) developed society
26. Which of the following goods does not require resources to produce them?
A) Economic goods
B) Free goods
C) Merit goods
D) Social goods
27. The total quantity of goods and services produced in any country is:
A) determined by the labour force
B) sufficient to satisfy people’s need
C) unlimited in supply
D) less than what people want
28. Economic problem arises because:
A) wants are unlimited
B) resources are scarce
C) scarce resources have limited uses
D) a particular want is satiable
29. Charles wants to buy either a pen or an apple with all his pocket money. He does not like either a chocolate or an orange .If he decides to buy a pen, and then the opportunity cost of it is:
A) an orange
B) an apple
C) a chocolate
D) none of the above
1. Define the economic problem?
2. What is scarcity?
3. Explain opportunity cost?
4. What are the durable consumer goods?
4. What are the non-durable consumer goods?
5. Write the difference between needs and wants?
6. What are economic goods?
7. What is utility?
8. Distinguish between free goods and economic goods?
9. What do you mean by an exchange?
10. Who is a consumer?
Cross Word Puzzle:
|
<urn:uuid:39acba7f-bf46-4902-99b6-8763f3707b96>
|
CC-MAIN-2016-26
|
http://rajammanappara.blogspot.com/2010/05/grade-8-economics-chapter-1-basoc.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397865.91/warc/CC-MAIN-20160624154957-00082-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.945642
| 2,950
| 3.703125
| 4
|
Costa Rica (officially the Republic of Costa Rica) is a country in Central America. Bordered on the north by the Republic of Nicaragua and the southeast by the Republic of Panama. It has 4,301,712 inhabitants according to census data in 2011. Its territory, with a total area of 51,100 km ², is bordered to the east by the Caribbean Sea and west by the Pacific Ocean.
Its capital, political and economic center is San Jose, and the official language is Spanish.
Costa Rica is one of the most stable democracies in Latin, is the only Latin American country on the list of the 22 oldest democracies worldwide recognition world.6 being the first nation in the world to abolish the army on December 1 1948, abolition was perpetuated in the Constitution of 1949.
Costa Rica ranks fifth worldwide in the classification of the Environmental Performance Index 2012 and the first among the countries in the Americas. In the classification of tourism competitiveness index, 2011 Costa Rica was ranked in 44th place in the world and second highest in Latin America, surpassed only by Mexico. Costa Rica is ranked in 2011 as the country with greater press freedom in Latin America and number 19 worldwide. According to the ranking by Reporters without Borders
Currently human development index is the seventh best in Latin America and the second in Central America.
In 2010, the UNDP noted that Costa Rica is among the few countries that have reached a much higher human development than other countries in their level of income.
In 2007, the Government of Costa Rica announced plans to become the first country in the world carbon neutral or C-neutral by 2021 when as a nation will meet its bicentennial. That is, is a country to offset their carbon emissions by releasing equivalent amounts of oxygen. National Climate Change Strategy. Costa Rica According to the New Economics Foundation, 2012, Costa Rica is ranked 12 in the Happy Planet Index (HPI) and is the "greenest" country in the world.
|
<urn:uuid:0072351b-13be-43a0-8da1-7b250e306313>
|
CC-MAIN-2016-26
|
http://costaricapura.blogspot.com/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397428.37/warc/CC-MAIN-20160624154957-00056-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.943159
| 401
| 2.8125
| 3
|
DateTime dateTime = new DateTime(2002, 2, 13);
string dateTimeString = dateTime.ToString("MM/dd/yyyy");
These preconceptions must be eliminated from the code. Many of these preconceptions are obvious, such as the date/time format, but many are not so obvious. Globalization issues include date/time formats, number formats, currency formats, string comparisons, string sort orders, calendars, and even environmental conditions. Do you assume, for example, that the
Program Files folder is always "
Program Files"? (It isn't.) Or that the first day of the week is Sunday, or that everyone uses a 12-hour clock? The subject of globalization is fully covered in Chapter 6, "Globalization," but the bottom line is that if you always use the .NET framework globalization classes and you always use them properly, you will greatly diminish the number of globalization problems in your applications.
MessageBox.Show("Insufficient funds for the transfer");
To make the application "localizable," we must rewrite this code to make this resource load at runtime. You will see how to achieve this later in this chapter.
Internationalization Terminology Confusion
The term "globalization" is used to describe the entire process. whereas the term "internationalization" is used to describe sometimes world-readiness and sometimes globalization. Unfortunately for us, the rest of the industry has the upper hand in this issue. In the mid-1990s, Microsoft transposed the meanings of internationalization and globalization, and it stuck. All Microsoft documentation (including namespaces in the .NET Framework) uses the Microsoft interpretations of these terms. So if you read documentation from non-Microsoft sources, be aware that it might use the same words but have different meanings.
Chapter 3: 'An Introduction to Internationalization'
Visit the Addison-Wesley website for a detailed description and to learn how to purchase this title.
Throughout this book, I use various internationalization terms to describe different parts of the internationalization process. In this section, I identify these terms and describe their meaning. Figure 3.1 shows the hierarchy of internationalization terminology as adopted by Microsoft. It shows the term as an umbrella for the various stages in the process: world-readiness, localization, and customization. Let's take a look at each term in turn. is an umbrella term for all the functionality that developers must provide to complete their part of the internationalization process. This includes globalization, localizability, and customizability. is the process of engineering an application so that it does not have cultural preconceptions. For example, an application that converts a to a string using this code has a cultural preconception that the date format should be : is the process of adapting an application so that its resources can be replaced at runtime. , in this context, are primarily the strings used in your application, but also include the bitmaps, icons, text files, audio files, video files, and any other content that your users will encounter. In this code, there is a hard-coded, literal use of a text string: is the process of adapting an application so that its functionality can be replaced at runtime. For example, taxation laws vary considerably from location to location; California sales tax, for example, is not the same rate and does not follow the same rules as, say, Value Added Tax in the U.K. (or in the Netherlands, for that matter). A "customizable" application is one that is capable of having critical parts of its functionality replaced. Often this means using a plug-in architecture, but it might be sufficient to store a set of parameters in a data store. You will encounter customizability less than localizability—or, indeed, never. Customizability is also referred to as , especially on Microsoft Web sites. All these steps (globalization, localizability, customizability) together make up the work that developers must complete as they refer to adapting the application's source code to make it ready for localization and customization. is the process of creating resources for a specific culture. Primarily, this involves translating the text of an application from its original language into another language, such as French. Often the translation process is performed by a translator, but it might also be performed by a machine (known as machine translation, or "MT") or by a bilingual member of staff. In addition, the localization process might or might not include the redesign of forms and pages so that translated text doesn't get clipped or truncated and so that the form or page still looks correct in the target culture. It also involves translating other resources into culturally correct resources for the specific culture. Aclassic example of a culturally unaware resource is the first Windows version of CompuServe's e-mail program. The Inbox was represented by an icon for a U.S. metal mailbox with a flag indicating that mail had arrived. This icon is specific to the U.S. and had little or no meaning outside the U.S. In this case, the entire icon needed to be changed, but in other cases, localization might simply require changing a color. For example, a red "Stop" sign doesn't convey a warning in China or Japan, where red can indicate prosperity and happiness. is the process of creating a specific implementation of functionality. Whereas customizability gives an application the potential to be customized, customization is the implementation of a specific case. If your application supports customization through a plug-in architecture, this step will likely be performed by developers. The developers might be your own developers, but in highly customizable applications that offer an open plug-in architecture, these developers could be anyone. The terminology described so far and the terminology used throughout this book use the interpretations used by Microsoft. This makes sense because this book focuses on a Microsoft technology as implemented by Microsoft. You should be aware, however, that the rest of the industry does not adhere to these definitions. Primarily, the meanings of and are transposed. Figure 3.2 shows the broad hierarchy of internationalization terminology according to the rest of the industry.
|
<urn:uuid:a9ec8b69-8ebe-43ed-a0f3-458ba755ffa6>
|
CC-MAIN-2016-26
|
http://searchsap.techtarget.com/feature/Chapter-3-An-Introduction-to-Internationalization
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396459.32/warc/CC-MAIN-20160624154956-00200-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.919935
| 1,255
| 2.90625
| 3
|
Our Granulomatosis with Polyangiitis (GPA or Wegener's Granulomatosis) Main Article provides a comprehensive look at the who, what, when and how of Granulomatosis with Polyangiitis (GPA or Wegener's Granulomatosis)
Definition of Wegener's granulomatosis
Wegener's granulomatosis: An uncommon type of inflammation of small arteries and veins (vasculitis) that classically involves the vessels supplying the tissues of the lungs, nasal passages (sinuses), and kidneys.
Wegener's granulomatosis usually affects young or middle-aged adults.
The diagnosis of Wegener's granulomatosis is confirmed by finding evidence of vasculitis and abnormal cellular formations called granulomas on biopsy of tissue involved by the inflammatory process.
Wegener's granulomatosis is a serious disease. Without treatment, it can be fatal within months. Treatment is directed toward stopping the inflammation process by suppressing the immune system.
Last Editorial Review: 6/9/2016
Back to MedTerms online medical dictionary A-Z List
Need help identifying pills and medications?
|
<urn:uuid:db8130a3-4408-442c-a77e-0a8802c9f225>
|
CC-MAIN-2016-26
|
http://www.medicinenet.com/script/main/art.asp?articlekey=7300
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397636.15/warc/CC-MAIN-20160624154957-00003-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.839131
| 248
| 2.703125
| 3
|
A version of this piece was originally published by Civil Eats.
Next month, after three years of legislative tug-of-war, the Navajo Nation will become the first place in the United States to impose a tax on junk food. The Healthy Diné Nation Act of 2014, signed into law by Navajo Nation President Ben Shelly last November, mandates a 2 percent sales tax on pastries, chips, soda, desserts, fried foods, sweetened beverages, and other products with "minimal-to-no-nutritional value" sold within the borders of the nation's largest reservation.
Authored by the Diné Community Advocacy Alliance (DCAA), a grassroots organization of community volunteers, the legislation was modeled on existing taxes on tobacco and alcohol, as well as other fat and sugar tax initiatives outside the United States. The act follows on the heels of a spring 2014 amendment that removed a 5 percent tribal sales tax on fresh fruits and vegetables.
The sales tax will generate an estimated $1 million a year in 110 tribal chapters for wellness projects—greenhouses, food processing and storage facilities, traditional foods cooking classes, community gardens, farmers' markets, and more.
Those who advocate for a return to a more traditional diet hail the law as a positive change: The Navajo Nation, a 27,000-square-mile area that straddles three states, has a 42 percent unemployment rate. Nearly half of those over the age of 25 live under the federal poverty line. The USDA has identified nearly all of the Navajo Nation as a food desert, meaning heavily processed foods are more available than fresh produce and fruit.
According to a 2014 report from the Diné Policy Institute there are just 10 full-service grocery stores on the entire Navajo reservation, a territory about the size of West Virginia that straddles parts of Arizona, New Mexico, and Utah. As a result, many people rely on food stamps to stretch grocery dollars with the inexpensive processed, fried, and sugary foods commonly found in gas stations or convenience stores.
But even having a grocery store nearby doesn't guarantee access to healthy food. A DCAA survey of one major grocer in the town of Kayenta found approximately 80 percent of the store's inventory qualified, in the group's definition, as junk food. Compounding the issue is the continued popularity at family gatherings, flea-markets, and ceremonial gatherings of lard-drenched frybread—whose dubious origins have been traced back to the "Long Walk," the federal government's forced removal of Navajos to a military fort in New Mexico 300 miles away from ancestral land in Arizona.
The heavy consumption of soda, fat, and processed foods has taken its toll. According to the Indian Health Service, an estimated 25,000 of the Navajo Nation's 300,000 members have type-2 diabetes and another 75,000 are pre-diabetic. The tribe has some of the worst health outcomes in the United States, with rampant hypertension and cardiovascular disease. According to data collected between 1999 and 2009 by the Center for Disease Control and Prevention (CDC) overall death rates for American Indians and Alaska Natives were nearly 50 percent greater than those of non-Hispanic whites.
These stark health statistics drove the DCAA to lobby for a consumer tax—despite strong opposition at the start from Shelly and some council delegates. Navajo Nation Council Delegate Jonathan Nez was a co-sponsor of the Healthy Diné Nation Act. He says there was "overwhelming support" for the initiative in his region, a large rural area on the Utah and Arizona border, but he did hear misgivings amongst the general population and some of the other delegates.
"Some people thought: 'A two-percent sales tax is going to hit my wallet,'" says Nez. The legislation was vetoed three times by Navajo Nation President Ben Shelly, because of questions about how the tax would be regulated. He also cited concerns about how the tax would be enacted along with its potential impact on small business owners. Other opponents said the bill would place undue burden on consumers and drive desperately needed revenue off the reservation and into surrounding cities. After multiple revisions, the tax gained support from a majority of the council, with the added concession of a 2020 expiration date.
While this is the first "junk-food tax" in the United States, the movement to slow the consumption of unhealthy foods gained momentum last November after residents of Berkeley, California voted to tax soda and other sweetened beverages. (And there was a failed attempt back in 1992 to add a tax to snack foods, candy, and bottled water in California.) According to the Rudd Center for Food Policy and Obesity, which supports a national sugar-sweetened Beverage (SSB) Tax, studies show a correlation between added excise taxes and lower consumption rates. One 2011 study published in Preventive Medicine showed that a penny-per-ounce tax on sugar-sweetened beverages nationally could generate nearly $16 billion a year in revenue between 2010 and 2015 while cutting consumption by 24 percent.
It's still too soon to evaluate the tax's effect on consumption habits in the Navajo Nation, but Nez says it has already opened a discussion "about how to take better care of yourself, how to return back to the way we used to live, with fresh produce, vegetables, and fruit along with our own traditional unprocessed foods."
Denisa Livingston, a community health advocate with the DCAA, has been leading grocery store tours in Window Rock, Arizona to educate government officials and community members about how the layout and inventory of local markets affects buying patterns. "I've been telling the councils, food can either empower us and make us strong, or it can kill us," she says. "Healthy food is not just our tradition, it's our identity. This is the start of a return to food sovereignty."
|
<urn:uuid:bc8bd1b9-f2c1-4207-98a5-44432b1c9ebe>
|
CC-MAIN-2016-26
|
http://www.motherjones.com/environment/2015/03/navajo-nation-junk-food-tax
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402699.36/warc/CC-MAIN-20160624155002-00084-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.959646
| 1,191
| 2.671875
| 3
|
You are currently signed in as .
0 Items in Your Cart
Vault Guides are THE source for insider insight on career information and employer reviews. Shop Vault Guides
Industries & Professions /
Accounting is nearly as old as civilization itself. Even before coins were introduced in about 600 B.C., farmers kept track of their livestock and other valuable possessions in order to have an accurate financial record. This came in handy when it was time to plan how many sheep to keep to ensure continued offspring, and how many could be traded. This was the first, most basic, type of accounting.
Financial records have been found in the ruins of ancient Greek and Roman towns showing that accountants and bookkeepers were at work balancing the financial records of businesses. Once currency in the form of paper money came into play—about 600 A.D. in China but not until the 1600s in Europe—more advanced accounting skills were needed to keep track of where the money went.
In 1494, Luca Pacioli, an Italian mathematician, wrote a treatise on accounting and bookkeeping that established the foundation for modern bookkeeping methods. One of these was the double-entry method of bookkeeping, in which each transaction is recorded twice in a financial ledger, once to the debit of one account and once to the credit of another. This method allowed businesses to keep track of the movement of their funds.
As property investment, taxation, and tax write-offs made running a business more complex, there was a growing need for flexible, comprehensive bookkeeping methods. In the 18th century, the Industrial Revolution gave birth to large businesses that were involved in a vast array of production and manufacturing services. The heads of these companies needed accurate financial records to determine the cost and effectiveness of doing business. This set the stage for the establishment of the first professional accounting firms in London by William Deloitte (1845), Samuel Price and Edwin Waterhouse (1849), William Cooper (1854), William Peat (1867), and George Touche (1899).
The U.S. accounting profession dates back to the 1880s, when English and Scottish investors began buying stock in American companies. Needing experts to keep an eye on their investments, they sent over accountants. Many of these accountants stayed in the United States and started their own accounting businesses.
Federal legislation, including the introduction of the income tax in 1913 and the excess profits tax in 1917, helped bring about an accounting boom that has made the profession one of the largest in business today.
In order to establish standardization and identification of qualified public accountants, the certified public accountant (CPA) examination was developed in 1917. The Uniform CPA exam measures professional competence and earning the CPA certificate is evidence of professional qualification.
Until the 1980s, eight large, conservative, and stable firms known as the Big Eight dominated the industry. Accounting jobs tended to be predictable and dependable. But that changed as accounting firms became "lean and mean," consolidating and diversifying to become more competitive. Some, like Arthur Andersen, added new services such as management and computer consulting. Others bought out rival companies. The Big Eight was reduced to the Big Six as companies were hit by the recession and the savings and loan crisis.
Accounting firms were blamed as savings and loan institutions went bankrupt and were sued for faulty audits. Facing costly lawsuits while in the midst of a recession, firms began to cut jobs in an effort to lessen costs. Salaries were reduced, training programs cut, and the days of guaranteed employment, promotion, and job security came to an end.
In 1998, the Big Six became the Big Five with the merger of two of the industry's powerhouses. To better compete in the global marketplace, Price Waterhouse and Coopers & Lybrand joined to form PricewaterhouseCoopers. In 2002, the Big Five became the Big Four as a result of Arthur Andersen's indictment for obstruction of justice for its role in the bankruptcy of Enron Corporation, which defrauded investors and energy consumers on a massive scale. The company was convicted, and although the conviction was overturned in 2005, Arthur Andersen ceased nearly all business operations.
In response to this financial crisis, the federal government passed the Sarbanes-Oxley Act in 2002. This law requires higher levels of financial accounting and disclosure from all publicly held companies. In 2010, Congress passed the Dodd-Frank Wall Street Reform and Consumer Protection Act, which increases regulation of the financial industry and offered improved protections to consumers. It also passed the Patient Protection and Affordable Care Act, which increased the need for professionals who specialize in health-care accounting.
Today, the four largest public accounting firms are Deloitte, EY, KPMG, and PricewaterhouseCoopers. In addition to opportunities in public accounting, there is strong demand for accountants in corporations, government agencies, and nonprofit organizations. Advances in technology (computers, Internet, mobile devices, cloud computing)—have automated many basic accounting tasks, and accountants are now being tasked with more demanding duties such as management consulting, mergers and acquisitions, litigation, and business development.
|
<urn:uuid:a97b3c16-7010-4212-bf4a-cec6e390ce29>
|
CC-MAIN-2016-26
|
http://www.vault.com/industries-professions/industries/accounting.aspx?id=background
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397567.28/warc/CC-MAIN-20160624154957-00008-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.973758
| 1,053
| 3.203125
| 3
|
Plug-in electric vehicles are poised to become practical and important, which is why we’re seeing a crescendo of reports about their “MPG” fuel economy. Unfortunately, these reports raise more questions than they answer, including two questions that will occur to informed consumers: “How is this ‘MPG’ value defined?” and “What does it mean for me, given how I drive?”.
In evaluating and comparing vehicles that are all powered only by gasoline, miles-per-gallon (MPG) makes great sense. But MPG isn’t what it used to be. As discussed in Eric Cahill’s recent post (here), MPG is obsolete for two main reasons: the growing popularity of alternative fuels, and the emergence of vehicles powered by multiple fuels (most importantly electricity plus gasoline or other liquid fuels).
Comparing the MPG of gasoline with the MPG of ethanol (to use one example) is like the proverbial comparison of apples to oranges; besides, what’s a gallon of electricity? For a Plug-in-Hybrid-Electric-Vehicle (PHEV), MPG is even more misleading (at best, it tells just part of the story – e.g., accounting for just the liquid fuel but not the electricity).
As the figure of merit for fuel economy, the Progressive Insurance Automotive X PRIZE is using MPGe (miles per gallon energy equivalent), defined as:
MPGe = (miles driven) / [(total energy of all fuels consumed)/(energy of one gallon of gasoline)])
MPGe is a simple, well-defined measure of overall vehicle efficiency. MPGe is easy to explain, accounts in a neutral manner for any combination of fuels, and reduces to the familiar MPG in the case of gasoline fuel only.
To make it easier to understand (and get some intuition about) MPGe, we’ve developed a spreadsheet available here. It includes three simple calculators:
(1) Enter the distance driven and the amounts of all fuels consumed – result is MPGe. The formula for this calculation is the one given above.
(2) For the special case of gasoline-electric PHEVs, enter the gasoline usage (MPG gasoline) and electricity usage (watt-hours per mile) – result is MPGe. The formula for this is given and discussed at length in my blog post available here.
(3) For the case of any plug-in vehicle, enter the charging time and the charging efficiency – result, for three different electric circuit types, is the total energy added to the battery, expressed both as kWh and as (energy-equivalent) gallons of gasoline.
This is a hard time for the automotive industry. But it’s also an exciting time of change and innovation. Consumers will soon have a variety of energy efficient and environmentally friendly vehicle choices as diverse technologies and alternative fuels come to market. This diversity will make it harder to evaluate and compare vehicles, and how best to do so is a difficult question. MPGe is not the entire answer, as it must be presented in the context of driving style, frequency, and distance. But we believe it’s part of the answer. MPGe should be the new MPG.
|
<urn:uuid:2cd999fa-ed23-42a9-9c4e-c54d67d5a852>
|
CC-MAIN-2016-26
|
http://autoblog.xprize.org/axp/2009/08/calculating-mpge.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395346.6/warc/CC-MAIN-20160624154955-00082-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.914858
| 680
| 2.859375
| 3
|
WARM SPRINGS CANYON HERD MANAGEMENT AREA
The Warm Springs Canyon Herd Management Area (HMA) is located in western Humboldt County, approximately 140 miles north of Reno, Nevada. The HMA contains approximately 83,136 acres of public and private lands. The terrain consists of a plateau that is dissected by
steep north-south trending canyons made up of volcanic materials. Elevations within the HMA range from 4,550 feet at Fly Canyon to 7,084 feet at Trough Mountain. Climate is characterized by warm dry days, cool nights and low yearly precipitation that ranges from 6 to 8 inches at lower elevations to approximately 14 inches at higher elevations.
The area is also utilized by domestic livestock during part of the year and numerous wildlife species. Typical wildlife species found in the area include mule deer, California bighorn sheep, pronghorn antelope, sage
grouse, chukar partridge, coyote, bobcats, and various rodents. Unique to this area is a threatened minnow species, desert dace, that is only found in the hot springs located in the southern part of the HMA. The East Fork High Rock Canyon, the North Black Rock Range and the High Rock Lake Wilderness Areas are partially contained within the HMA. The Warm Springs Canyon HMA is partially located within the Black Rock Desert/High Rock Canyon Emigrant Trails National Conservation Area.
Vegetation is made up of small meadows associated with numerous hot springs, surrounded by low sagebrush/grass communities at lower elevations, to big sagebrush/grass communities at upper elevations. Typical species in the low sagebrush community includes low sage, needlegrass,
squirreltail and Sandbergs bluegrass. Species typical of the sagebrush/grass communities include mountain big sagebrush, bitterbrush, mountain mahogany, aspen, snowberry, rabbitbrush, horsebrush, needlegrass, basin wildrye, squirreltail, Indian paintbrush and phlox.
The appropriate management level (AML) for wild horses and burros in the HMA ranges from 105 to 175 horses and 15 to 24 burros. Periodic removals are conducted to maintain the population within the management range. Horses within the HMA are descendants of ranch horses that either escaped or were released into the area and horses raised for the cavalry remount program. The majority of horses exhibit a bay, brown or sorrel color pattern; however, there are a number of paint and buckskin horses as well.
Burros within the HMA are the descendants of pack animals used by miners and sheep ranchers. The majority of the burros exhibit a gray color pattern; however, pinto burros are also found in the area.
|
<urn:uuid:303def64-0bc6-489c-b106-18c72d6fb2fa>
|
CC-MAIN-2016-26
|
https://www.blm.gov/adoptahorse/herdareas.php?showAll=yes&herd_areas_seq=98&herd_states_seq=8
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783391766.5/warc/CC-MAIN-20160624154951-00015-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.936126
| 576
| 2.75
| 3
|
The world's two most powerful computers have not been surpassed in 2009, but the latest edition of the Top 500 supercomputer list shows a new entry in third place and continued dominance from the likes of IBM, Cray, HP and Intel.
Announced Tuesday, the Top 500 Supercomputer Sites list ranks the world's fastest machines twice a year. The total combined performance of the 500 machines has reached 22.6 petaflops, nearly twice what was achieved only one year ago. Each petaflop represents one thousand trillion calculations per second.
Still ranked number one is the Roadrunner system at the Department of Energy's Los Alamos National Laboratory, which was built by IBM and is rated at 1.105 petaflops.
Still in second place is the Cray XT5 Jaguar system at Doe's Oak Ridge National Laboratory, rated at 1.059 petaflops.
The highest-ranking newcomer on the list is an IBM BlueGene/P system in Germany, which is called JUGENE and is installed at the Forschungszentrum Juelich research center. JUGENE performs 825.5 trillion calculations per second and has a "theoretical peak performance" of more than 1 petaflop, according to the Top 500 announcement.
JUGENE edged out the previous third-place entrant, a NASA machine known as Pleiades. The Juelich research center also houses the new 10th place finisher, which is called Europa and achieved 274.8 trillion calculations per second using Bull NovaScale and Sun Blade x6048 servers. These two German computers are the only top ten systems from outside the United States.
There were two other new entries in the top ten: A Cray XT5 system at the University of Tennessee, which is in sixth place; and an IBM system at Lawrence Livermore National Laboratory, in ninth place.
In addition to changes in the top, there was significant upheaval in the lower levels of the top 500. The slowest computer of the 500, which achieved 17.1 trillion calculations per second, would have been the 274th fastest only six months ago.
On average, each system in the top ten consumes 2.45 megawatts, unchanged from six months ago. Power efficiency has increased substantially, however, as the systems are now offering greater performance in the same power envelope.
Six months ago, Microsoft achieved a milestone by placing a Windows-based system in the top ten. That system, based at the Shanghai Supercomputer Center, is now rated #15 in the world.
In broader terms, the Top 500 update shows that HP still has the most individual systems on the list, but IBM ranks the highest when it comes to total performance of systems in the Top 500.
Cray's XT systems are still popular in large high-performance computing centers, with 10 out of the top 50 systems worldwide. Nearly 80% of the Top 500 computers are based on Intel processors, up from 75.8% six months ago. Intel gained at the expense of IBM and AMD. IBM Power processors account for 55 of the Top 500, down from 60; while AMD Opteron accounts for 43 systems, down from 59.
The United States accounts for 291 of the top systems, compared to 145 in Europe and 49 in Asia.
|
<urn:uuid:a897358f-3f35-42f1-8868-fc84288b0026>
|
CC-MAIN-2016-26
|
http://www.goodgearguide.com.au/article/308549/ibm_cray_lead_top_500_supercomputer_rankings/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396959.83/warc/CC-MAIN-20160624154956-00140-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.937531
| 678
| 2.609375
| 3
|
GCC, the GNU Compiler Collection, includes front ends for C, Objective-C, C , Fortran, Java, and Ada, as well as libraries for these languages (libstdc , libgcj,...).Like most GNU software, GCC must be configured before it can be built. This document describes the recommended configuration procedure for both native and cross targets.We use srcdir to refer to the toplevel source directory for GCC; we use objdir to refer to the toplevel build/object directory.If you obtained the sources via CVS, srcdir must refer to the top gcc directory, the one where the MAINTAINERS can be found, and not its gcc subdirectory, otherwise the build will fail.If either srcdir or objdir is located on an automounted NFS file system, the shell's built-in pwd command will return temporary pathnames. Using these can lead to various sorts of build problems. To avoid this issue, set the PWDCMD environment variable to an automounter-aware pwd command, e.g., pawd or `amq -w', during the configuration and build phases.First, we highly recommend that GCC be built into a separate directory than the sources which does not reside within the source tree. This is how we generally build GCC; building where srcdir == objdir should still work, but doesn't get extensive testing; building where objdir is a subdirectory of srcdir is unsupported.If you have previously built GCC in the same directory for a different target machine, do `make distclean' to delete all files that might be invalid. One of the files this deletes is Makefile; if `make distclean' complains that Makefile does not exist or issues a message like "don't know how to make distclean" it probably means that the directory is already suitably clean. However, with the recommended method of building in a separate objdir, you should simply use a different objdir for each target.Second, when configuring a native system, either cc or gcc must be in your path or you must set CC in your environment before running configure. Otherwise the configuration scripts may fail.Note that the bootstrap compiler and the resulting GCC must be link compatible, else the bootstrap will fail with linker errors about incompatible object file formats. Several multilibed targets are affected by this requirement, see host/target specific installation notes.To configure GCC: % mkdir objdir % cd objdir % srcdir/configure [options] [target]Target specification· GCC has code to correctly determine the correct value for target for nearly all native systems. Therefore, we highly recommend you not provide a configure target when configuring a native compiler.· target must be specified as --target=target when configuring a cross compiler; examples of valid targets would be m68k-coff, sh-elf, etc.· Specifying just target instead of --target=target implies that the host defaults to target.
На нашем сайте Вы можете скачать GCC exe бесплатно, без регистрации и смс, удобно и быстро, за один клик.
|
<urn:uuid:785366c1-66c3-4dcc-8d19-cc4b350ae8b7>
|
CC-MAIN-2016-26
|
http://softkumir.ru/index.php?id=1232937476
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783404826.94/warc/CC-MAIN-20160624155004-00080-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.834979
| 725
| 2.984375
| 3
|
Native Americans in the Military
"…American Indians have proudly worn our nation’s uniform in every one of our conflicts…American Indians per capita—have had the highest percentage of their people in military service, exceeding every American ethnic group."
Ben Nighthorse Campbell
Former U.S. Senator, Colorado
Medal of Honor
The Medal of Honor is the highest award for valor in action against an enemy force which can bestowed on an individual serving in the armed services of the United States. This award is generally presented to its recipient by the President of the United States on behalf of Congress.
Master Sergeant Woodrow Wilson Keeble
On March 3, 2008, Master Sergeant Woodrow Wilson Keeble was posthumously awarded the Medal of Honor for his actions in the Korean War by President George W. Bush. Keeble was a U.S. Army National Guard of both WWII and the Korean War. Keeble had previously been awarded: The Distinguished Service Cross, The Silver Star, The Bronze Star for Valor, The Bronze Star for Merit, The Combat Infantry Badge, and two Purple Hearts.
Highlights of Service
Ira Hayes – Iwo Jima Flag Raiser
On Feb. 23, 1945 to signal the end of Japanese control, Ira Hayes and five other's raised the U. S. flag atop Mount Suribuchi on the island of Iwo Jima. Three of the six men were killed while raising the flag. This heroic act was photographed by Joe Rosenthal, and it transformed Ira Hayes' life forever. Hayes was a full blood Pima Indian and is buried in Arlington Cemetery.
Involvement in Every U.S. War:
Early Wars (before World War I)
- From the Revolutionary War through the Civil War, American Indians served as auxiliary troops and as scouts.
- The Indian Scouts were established in 1866. This service was active for the remainder of the nineteenth century and the early twentieth century.
World War I
- Roughly 12,000 Native Americans served in the military during World War I.
- Four American Indians serving in the 142nd Infantry of the 36th Texas-Oklahoma National Guard Division received the Croix de Guerre medal from France.
World War II
- Over 44,000 Native Americans served between 1941 and 1945. The entire population of Native Americans in the United States was less than 350,000 at the time.
- Native American military personnel worked as cryptologists, using their Native languages to encode messages so that enemy code-breakers could not decipher them.
- Alaska Natives were a significant presence on the Alaska Combat Intelligence Detachment. This outfit was the first ashore on each island occupied by Allied forces in the Aleutian Campaign.
- Approximately 10,000 Native Americans served in the military during this period.
- Three were awarded the Medal of Honor.
- More than 42,000 Native Americans served in the military in the Vietnam Era, and over 90 percent of these Servicemembers were volunteers.
- AIAN Servicemembers continued to serve in high numbers after the Vietnam Era.
- AIAN Servicemembers saw action in Grenada, Panama, Somalia, the Gulf War, and in Operation Enduring Freedom (OEF), Operation Iraqi Freedom (OIF) and Operation New Dawn (OND).
Source: American Indian and Alaska Native Veterans, September 2012, Department of Veterans Affaris. http://www.va.gov/vetdata/docs/SpecialReports/AIAN_Report_FINAL_v2_7.pdf
Navajo Code Talkers
Cpl. Henry Bake, Jr., and Pfc. George H. Kirk, Navajos serving in December 1943 with a Marine Corps signal unit, operate a portable radio set in a clearing that they have hacked in the dense jungle close behind the front lines. Photo courtesy of www.archives.gov.
The idea to use Navajo for secure communications came from Philip Johnston, the son of a missionary to the Navajos and one of the few non-Navajos who spoke their language fluently. Johnston, reared on the Navajo reservation, was a World War I veteran who knew of the military's search for a code that would withstand all attempts to decipher it. He also knew that Native American languages notably Choctaw had been used in World War I to encode messages.
Read more (http://www.history.navy.mil/faqs/faq61-2.htm)
Articles and Reports of Interest
Native American Women Veterans
Very little is known about the contributions of Native American women to the United States military. The Women In Military Service For America Memorial Foundation is attempting to fill this gap by encouraging Native American women veterans to register with the Memorial so that their stories may be recorded and preserved. They are also conducting research on the contributions of Native American women of earlier eras.
Native Words, Native Warriors - Smithsonian Exhibition
When the United States issued the call to arms in World Wars I and II, American Indians answered as warriors. Some men discovered that words—in their Native languages—would be their most valued weapons. Crackling over the airwaves and telephone lines, the code talkers' messages proved indecipherable to the enemy and helped the United States achieve victory in combat. Decades later, the U.S. government declassified the code talker programs, paving the way for the participants' long-overdue recognition.
Native Words, Native Warriors tells the remarkable story of Indian soldiers from more than a dozen tribes who used their Native languages in the service of the U.S. military. Developed with the Smithsonian's National Museum of the American Indian, this inspiring exhibition was made possible in part thanks to the generous support of Elizabeth Hunter Solomon. Additional support has been provided by the Smithsonian Women's Committee and the AMB Foundation.
CSPAN: History of Native American Service (Dec. 2, 2011)
A panel was held on the history of military service by Native Americans since the American Revolution, featuring American Indians who served in the armed forces during World War II, Korea, Vietnam, and Iraq.?Mr.?Emhoolah gave an opening prayer.?Herman Viola gave a PowerPoint presentation based on his book Warriors in Uniform: The Legacy of American Indian Heroism. Slides were also shown during other presentations, some of which included drumming and singing.?Chuck Boers presented the museum with a plaque of feathers he carried in the battle of Fallujah, Iraq.?Jason Giles moderated. “Our Warrior Spirit: Native Americans in the U.S. Military” was held in the Rasmuson Theater of the National Museum of the American Indian. (2 Hours, 4 minutes)
Recognizing Tribal Sovereignty and Cultural Traditions
Working to Fulfill Federal Trust Responsibilities
Protecting Natural and Cultural Resources
Consulting with Tribal Nations
|
<urn:uuid:dfd81aa6-fb28-4400-9af8-6a0e9682d7b0>
|
CC-MAIN-2016-26
|
http://denix.osd.mil/na/Military.cfm
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783391519.0/warc/CC-MAIN-20160624154951-00041-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.949555
| 1,420
| 3.734375
| 4
|
Of or concerning a diocese.
- Each local context requires creative action that enables parish and diocesan leaders to promote a sense of belonging and ownership among Latinas and Latinos.
- As I look back on decades of chairing parish and diocesan meetings, the book's purpose hits home.
- Diocesan newspapers do not broadcast weaknesses in diocesan procedures or policies.
The bishop of a diocese.
- Since 1704 the chief bishop of the Anglican church, designated the Primus, is elected from among the Scottish diocesans.
- Although the financial arrangements are kept under constant review, it is expected that the diocesan's obligations will continue for many years.
- Its Diocesan is Archbishop Gregorios, who resides in London.
Late Middle English: from French diocésain, from medieval Latin diocesanus, from Latin dioecesis (see diocese).
Words that rhyme with diocesanarchdiocesan
For editors and proofreaders
Definition of diocesan in:
What do you find interesting about this word or phrase?
Comments that don't adhere to our Community Guidelines may be moderated or removed.
|
<urn:uuid:9daa2295-ff95-4dff-9b0e-a836f639f54a>
|
CC-MAIN-2016-26
|
http://www.oxforddictionaries.com/us/definition/american_english/diocesan
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783392069.78/warc/CC-MAIN-20160624154952-00195-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.91037
| 251
| 2.859375
| 3
|
Hackmatack National Wildlife Refuge
Randy Stowe, firstname.lastname@example.org
The Hackmatack National Wildlife Refuge is a newly established United States national wildlife refuge that will include noncontiguous properties, especially tallgrass prairie patches, wetland properties, and oak savanna parcels, located in the northwestern region of the Chicago metropolitan area and the southern part of the Milwaukee area. The refuge's boundaries encompass parts of McHenry County, Illinois, and Walworth County, Wisconsin. The refuge will be operated by the United States Fish and Wildlife Service, known as USFWS. 85 percent of the refuge will be in Illinois, and 15 percent in Wisconsin.
The refuge will cover 11,200 acres of land in Illinois and Wisconsin, which will complement 23,000 acres already acquired for public use or under environmental protection as of 2011. Existing parklands adjacent to the proposed refuge's boundaries include several McHenry County Conservation District areas.
The name Hackmatack is an Algonquin term for the American tamarack or Larix laricina, an evergreen formerly abundant in regional wetlands. Hackmatack was the word used by many language groups in the Algonquin language group, including the Potawatomi, the tribe that most intensively utilized this ecosystem at the time this area was first mapped in the 17th and 18th centuries.
109 separate threatened or endangered species, including 49 species of birds, are listed within the area being studied for the proposed refuge designation. Examples of endangered fauna that find a home within the boundaries of the proposed refuge include the Blanding's turtle.
For more information:
|
<urn:uuid:9511f908-7623-4af4-b725-c7b60a31b602>
|
CC-MAIN-2016-26
|
http://wlmpoa.org/?q=Hackmatack_National_Wildlife_Refuge
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397562.76/warc/CC-MAIN-20160624154957-00142-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.936658
| 332
| 2.828125
| 3
|
Roman FuneralsPosted under: learning >> School-Resources Tags: burials, cemetery, community, cremation, grave, grave goods, inhumation, objects, pyre, roman, shrine
Funeral and burial rituals in Roman London
Corpses were either buried or cremated during the Roman period. The way that the population of Londinium buried their dead changed over time. Burials and cremations are found across the East London cemetery from the whole period.
Burials were sometimes marked by tombstones, and some of these had inscriptions that gave information about the dead person, such as name, age, family and sometimes, what they did for a living. A picture of the wealthier part of the population of Londinium can be built up from these inscriptions – since most people buried in the cemeteries probably couldn’t afford to be remembered with a tombstone.
Antiquarians (people who collected and recorded archaeology and history in the past) began to write down their observations of burials and tombstones they found in the area east of the City wall from the 16th century.
The area where burials have been found has been called a cemetery, although archaeologists are still not completely sure if all the burials are part of one area.
There is evidence for lots of different types of burial rite within the cemetery. There is a lot of evidence for where bodies were burnt, called funeral pyres which are not often found on other British sites. About half of all the cremations were buried in urns – the rest may have been buried as a pile of ashes and bone, or placed in containers made out of materials such as straw, wood or leather, that have not survived well.
Where the dead bodies were buried rather than burnt, they were usually laid out on their back, and 80% were buried in wooden coffins. A small number of people were buried in other types of containers such as lead coffins. Many people were not buried in anything. Perhaps they were wrapped in cloth or blankets, or buried in straw or wooden containers that have decayed.
Plenty of evidence for grave goods has been discovered in the cemetery. Lots of artefacts such as pots, coins, glass vessels and jewellery, animal bones and plant remains have been found with the burials or mixed up into the surrounding soil. About a fifth of all the known burials from the cemetery have some kind of grave goods that have survived. Many may have been buried with items that have rotted away or been removed during later disturbance. Buring the bodies with jewellery or pottery during cremation may have destroyed the grave goods that accompanied some burials completely.
Perhaps those people buried with or without grave goods had different religious beliefs. Perhaps the funeral procession was more important to this group of people than being buried with objects. Perhaps a lot of poor people were buried in the eastern cemetery, and only the richest members of the population could afford to bury things in their graves. As we excavate the burials at Prescot Street, we may be able to find out more about why people chose to be buried in certain ways.
|
<urn:uuid:e196e243-b0e1-4374-8a5f-6f751679780a>
|
CC-MAIN-2016-26
|
http://www.lparchaeology.com/prescot/learning/auntie-alia-classroom-activities
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397695.90/warc/CC-MAIN-20160624154957-00140-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.987409
| 649
| 3.84375
| 4
|
Definitions of mastabah
- In Mohammedan countries, a fixed seat, common in dwellings and in public places. 2
- A type of tomb, of the time of the Memphite dynasties, comprising an oblong structure with sloping sides (sometimes containing a decorated chamber, sometimes of solid masonry), and connected with a mummy chamber in the rock beneath. 2
The word "mastabah" uses 8 letters: A A A B H M S T.
No direct anagrams for mastabah found in this word list.
Words formed by adding one letter before or after mastabah (in bold), or to aaabhmst in any order:
s - mastabahs
All words formed from mastabah by changing one letter
Browse words starting with mastabah by next letter
|
<urn:uuid:8e289e24-2f27-44fe-98b5-35b76a4ec4d8>
|
CC-MAIN-2016-26
|
http://www.morewords.com/word/mastabah/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396222.11/warc/CC-MAIN-20160624154956-00071-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.880887
| 174
| 2.734375
| 3
|
In the world of computers and new technologies there is a phrase that is more than likely spun around a bit: Hard-Disk drive.While for an average Joe who merely presses the power button on his PC and who doesn't have any knowledge what is going on in that little humming case under his/her desk, just what precisely is a hard drive? How precisely does it work? But why is this device so popular in todays computers, and what are some pros cons of having a hard drive? Well you are definitely reading the correct post if you want to understand the answer to these questions. So let us now take a few minutes and discuss this issue and data recovery - the process of retrieving files from broken hard drives in depth.
To begin with, let's investigate the often asked question : What is a fixed disk drive? Briefly declaring it, it is a component inside your PC that stores and allows you to access your information. The sole reason as to why the word disk is used is because a hard disk drive uses rotating disks (aka platters) with a special magnetic solution on the platters. With a fixed disk drive, there is a read and write head ( tiny magnet) that flies somewhat over the disk that is being wrote to and read from.
what we will talk about next is quantity and units of measurement. In case you opened up a computer and noticed a hard drive, first thing you would notice is just how small it is, being about the size of an ordinary paperback book, but with far more weight to it. Most hard drives sit in a 3.5 inch bay (where the drive is stored ). If you are installing drive, you can readily see how a drive slots in that bay, because of the screw holes in the sides of the drive. In case your hard disk drive is for a 5.25-inch bay, there are relevant adapters that will allow you to connect the drive to your PC.
At the rear of your hard disk drive there are interfaces for both your power supply unit (PSU) along with the data cable to your mother board. If you would like to install more than one drive you will notice on the rear there are what is known as jumper settings. These are used for the mother board to understand and recognise each drive.
So hopefully right now you have a great knowledge of hard drives as well as how they work. So just what is it that makes devices so prevalent today? Well to begin with there's a popular saying that summarises this perfectly " tough to transition when you're stuck in tradition". Hard disk drives have always been made in the exact same way. The majority of us don't know of the alternatives to hard drives that are available. When you categorise data storage, users will think only in terms of that which is..
Hard disk drives may be as popular as they are because of the lack of knowledge about the dangers involved. If you think something is break-proof, then there should be no reason it should be altered, but unfortunately they have only a limited life as hard drives utilise mechanical parts. So just why do drives fail, what are the reasons behind hard drive failure.
A principal factor to drive failure could be the surrounding environments of the drive. Exposure to hot weather, or water are common factors. As stated earlier the platter is coated with a magnetic substance, so being exposed to powerful magnetism can very easily cause hard disk drives to break. Head crashes are among the most frequent problems with hard disk drives. Head crashes occur when independent factor or contaminate changes the platter in the tiniest way, inducing the floating read write heads to make contact and damage the platter (which stores your data).
Hard drive failure basically means you have lost your capability to access your files. All your docs, files, folders or work, anything digital is lost. Any attempts done by you to retrieve the information again can lead to even additional damage. A specialist must be contacted who can use special gear to regain your files.
Overall, hard drives have their benefits, but might break, your understanding of hard drives will cause an educated choice in the purchasing of a fixed disk drive or not.
Frequently the first task if your hard drive fails would be to look on the internet. Type the failure symptoms of the hard drive and you'll discover that a large number of other people have had the same problem at some point. Perhaps you are lucky and find an answer to your problem that you can complete yourself, or you might find some recommendations for reputable data recovery companies. Please be cautious as frequently doing the wrong task will utterly destroy any chance of folder recovery in case you are trying to regain the lost data. You need to have the ability to get an idea of how competent a company is by reading their reviews in case you are considering using a data recovery company that.
I have just been required to write a short blog post about computer hard disks. Now according to NAS data recovery and hard drive repair experts these items are the rectangular steel boxes that live in your Mac and save all your valuable documents, photos and movies. People change their hard-drives quite occasionally and therefore years and years of valuable data and files is collected up on them with time. Regardless of this, scarcely their data is backed up by anyone, this is fairly short sighted as it could lead to lots of troubles if the drive crashes or becomes faulty.
You take the possibility of losing that information because drives can fail for a range of various causes, once you save important information on a disk drive. Losing folders on a hard drive may be tough because you really do not know how to proceed to regain your data, if you are not computer literate. Fortunately, there are businesses which can help you to get that important data back. These are known as data recovery businesses and they can retrieve files from almost any type of hard drive in almost any type of condition. So when you end up in a scenario where you have lost precious information you should not assume this missing data can't be retrieved.
A Mac has at least a single standalone hard disk drive. It is the bit of the computer system that stores all of the data, files and photos you make. A hard drive is frequently full of treasured files, so obviously, a hard drive failure is better avoided.
It could be possible to buy a program from the internet to retrieve your data. Software can not repair a damaged drive . However, it could recover damaged data from a working one. Basically go on the internet and look for some data recovery programs. If you would like the program to actually retrieve folders for you you'll have to purchase it - this will not cost very much. The quality of data recovery software varies significantly - some software is excellent, other software is garbage. Again, you must choose carefully.
Many people think that as soon as their hard drive crashes the information on it is disappeared but this isn't true. Frequently an experienced data recovery firm will be able to rescue the lost data for you by initially repairing the fault on the hard drive and then by accessing the data on the drive and rebuilding your documents. If you have a hard drive failure or delete some data, go online and first determine what sort of issue you have. When it is something that can be fixed by running an application then obviously that's the best thing to do, and it'll often be the cheapest alternative too. If you have then to a hard disk problem your are almost always going to require the help of a decent hard drive recovery business. Again, I am unable to emphasise enough how much you must read reviews of the firms first so you can make an informed choice about who to send your defective disk drive to for data restoration and repair.
There was a time when important data was held in paper records you might browse through at leisure and take off the shelf. Today information is more likely to be put on hard drives than any place else. However, is your data safer as a result?
It really is astonishing how many of us believe that having our information to a disk drive means our data is completely safe . Hard-drives are mechanical devices and, like other mechanical devices, can go wrong.
Many of us have abandoned writing anything down altogether. I have. People write not just their business but their private data like photographs and music to their own hard drives too. If all of us take music for example, an album or CD could won't play and become scratched. Scratching a hard drive case is not going to cause the information to be lost, but scratching the real surface of the hard drive - the component that holds the files will have the same effect.
Old photographs can be repaired as long as you still have access to the negatives but other documents held on paper will fade over time and risk being entirely ruined by mildew and damp conditions. Frequently old records are kept in peoples garages and studios - these storage areas are hardly ideal and the temperatures can vary significantly. Often there is frequently a high moisture content that is unfortunately fatal to written material.
Once data is stored digitally, backing this up is a practical action to take. It is necessary to back folders up regularly as it can soon become old however, this is something which few people do. Because of this, if the data on your own hard drive becomes inaccessible you can get in touch with a data recovery organisation to aid retrieve the files from your hard drive. Obviously data recovery will not apply to information which is written in books and diaries but it's merely an example of how transitory data is.
Data recovery services are used whenever there is some sort of file loss. In case the missing data is of no value then there is little purpose in making use of a data recovery specialist. When the missing data is valuable and is required a company supplying data recovery services should be contacted who will manage to retrieve the missing data. These companies specialise in repairing broken hard disk drives and retrieving the data from them. Of course, whenever the data you have is backed up someplace this minimises the chances of data-loss as well as the need to make use of a data recovery support company.
If you find yourself with a damaged hard disk containing data you require back the next step is to get in touch with a recommended data recovery service. There are many data recovery services but just a few of them are actually any good. All you need to do is go online and search for some data recovery services reviews. These should provide you with a good idea of the recommended data recovery company you can get in touch with to retrieve your hard disk drive data.
What Is A RAID?
RAID set-ups are hardware and software systems that are capable of reading or writing data to and from multiple hard drives, in a modern system different levels of RAID systems can be nested or combined to supply more data redundancy & integrity or for a higher read/write speed, The level of a RAID is consistently signified with a number from 0-6 for instance RAID 0 or RAID 1 an example of a nested RAID would be RAID 1+0 the 1 means a RAID 1 and the 0 means a RAID 0.
There are 2 terms that can identify each RAID level's function these are striping and mirroring, both with several operations that they will perform. Striping is the action of writing a solitary file to several drives in tiny bits, if for example there are two hard drives within a RAID array the file would be broken up into two and written to both hard drives, performing this offers a quick write speed but in the most basic type doesn't supply any defence from redundancy. Mirroring is when data is written to two or more drives in the same manner, each drive is going to be just like the other because they all store the same data, mirroring provides a considerably faster read performance when loads of users desire to get into identical data, it also provides increased integrity as losing one hard drive doesn't mean that the data on the failed drive is lost as it will be restored by the other drives
What Is A RAID 5?
This unique type of RAID utilises striping to improve read efficiency but in addition provides fault-tolerance and redundancy in case of a disk failure. This is achieved by having parity bit data stored across the drives in the RAID; it could be rebuilt with the data stored on the other hard drives if one disk fails. A RAID 5 set-up will maximise the utilisation of storage space, as there's no massive amount of data mirrored across multiple hard drives, which has significant advantages. .. Advantages of RAID 5 as a Business Option You will find 3 principal advantages : 1) Fast read speed 2) Maximise storage use 3) Protection against hard drive failure The fast read speed of a RAID 5 means that the program is recommended for data archiving systems or some business which gets particular data on a constant basis, the write speed of a RAID 5 is not as fast as other RAID's because of the fact that the parity bit has to be written in addition to the original data. If data does not be modified by your business on a constant basis but it's read by several users, A RAID 5 would be the best option; nonetheless you will need to know about potential failures.If there is data within your business that's not altered on a constant basis, nevertheless at the same time is read by numerous systems and users, subsequently RAID 5 is possibly an ideal resolution for you. However, you are doing need to be aware of potential system failures. The fast read speed makes this method idyllic for data archiving systems and any business area which gets specific information on an incredibly habitual basis. On the other hand write speed is decreased compared to other RAID's, as the added parity bit data must be written in addition to the core data. RAID 5 Failures A RAID 5 isn't a backup alternative it provides a fixed level redundancy from one hard drive failing, if one hard drive does break the system goes into critical mode where the read and write speed is greatly reduced, the failed hard drive needs to be substituted as quickly as possible because if the hard drive isn't changed and one more breaks the system will be unable to rebuild itself and you would be looking in a substantial price to regain what data is left on the drives. Data recovery on RAID 5 systems is even more complicated than normal data recovery and requires a high degree of technical competence, specialist RAID recovery experts like Data Clinic's RAID data recovery service, see http://www.dataclinic.co.uk/hard-disk-raid-recovery/ provide complete RAID fault diagnosis, restoration and recovery from all types of RAID system. RAID 5's can supply a high read speed for businesses that rely on rapid entry to their data to be successful, it also offers a level of built-in protection against hard drive failure, therefore in the event your business does process a lot of data it's likely the finest setup to go for, you will see a significant difference in the rate of computer system.
|
<urn:uuid:11ebeafe-a58b-47a3-9ebb-835921a2b558>
|
CC-MAIN-2016-26
|
http://www.thursdaynightblues.com/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397865.91/warc/CC-MAIN-20160624154957-00131-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.965265
| 3,058
| 2.921875
| 3
|
Thomas Hardy's first love was poetry. It was not until 1898, when he was 58, that his first book of poetry, Wessex Poems was published. For the final years of his life he abandoned fiction and devoted himself entirely to poetry; he is now not only regarded as one of the most important English novelists but is also a poet of major stature and increasing popularity. The Complete Poems includes Hardy's more than 900 poems, complemented by detailed notes. Collected here are his eight books of verse, all the uncollected poems, Domicilium, and the songs from The Dynasts. This edition contains an additional poem, The Sound of Her.
Back to top
Rent Thomas Hardy: The Complete Poems 1st edition today, or search our site for other textbooks by James Gibson. Every textbook comes with a 21-day "Any Reason" guarantee. Published by Palgrave Macmillan.
Need help ASAP? We have you covered with 24/7 instant online tutoring. Connect with one of our Poetry tutors now.
|
<urn:uuid:343e1541-4422-47fa-9f01-c2bfdd406284>
|
CC-MAIN-2016-26
|
http://www.chegg.com/textbooks/thomas-hardy-the-complete-poems-1st-edition-9780333949290-0333949293
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783394987.40/warc/CC-MAIN-20160624154954-00037-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.979804
| 218
| 2.71875
| 3
|
For a soldier I ‘listed,
to grow great in fame,
And be shot at for sixpence a day
--Charles Dibdin, 1745-1814
- Of some 240,000 wounds treated by Union medical officers during the Civil War, fewer than a thousand had been inflicted by the bayonet.
- Although the use of the spontoon – a short halberd-like weapon – as a sign of officer’s rank had been abandoned by the troops in the field as early as 1755, its use was not officially abolished by the British Army until 1786.
- The most successful air attack against shipping of World War II was undoubtedly that made on February 22, 1940 by a Ju-88A of KG30 off the coast of Borkum, in the North Sea, when it accounted for two destroyers in a single bomb run, Lebrecht Maas and Max Schultz, though unfortunately both happened to be German, a case of poor ship recognition skills on the part of the Luftwaffe.
- The Italian term for "theater of operations" is scacchieri, which literally means "chessboard."
- Elvis Aron Presley entered the United States Army at Memphis, Tennessee, on March 24, 1958, served in Germany with the 3rd Armored Division, was released from service at Fort Dix, New Jersey, on March 5, 1960, and discharged from the Army Reserve on March 23, 1964.
- The term "Shavetail" originated in the practice of shaving the tail of a new mule, so that the troops would know that they were untrained and apt to do something stupid.
- By the end of WW I the Grand Fleet's maximum complement of ship-borne and carrier-borne heavier-than-air aircraft was over 300.
- Of every seven U.S. casualties in World War II, one died either in combat or from wounds, five were wounded not mortally, and one was a psychoneurotic case.
|
<urn:uuid:15260fb8-e76e-48a2-9752-ac230c809f5d>
|
CC-MAIN-2016-26
|
http://strategypage.com/cic/docs/cic57a.asp
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783404405.88/warc/CC-MAIN-20160624155004-00075-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.976176
| 420
| 2.984375
| 3
|
By Barbara Shields, Esri Writer
"We can use technologies such as GIS to save biodiversity. We can still help local people retain their cultures and traditional means of existence." This is the message of Dr. Willie Smits, founder of the Borneo Orangutan Survival Foundation and the Masarang Foundation, which raise money and awareness to restore habitat forests around the world.
Smits is a biologist dedicated to rebuilding orangutan populations and improving forest habitats worldwide. His campaign is on two fronts. One is a zealous battle against deforestation and habitat destruction, and the other is the promotion of sustainable agribusiness that benefits two species of primates, human and orangutan. "We cannot save the environment if we do not simultaneously take care of people's needs," maintains Smits.
In recent decades, palm oil plantations have become prevalent on the Indonesian islands of Borneo and Sumatra, where, for thousands of years, colonies of orangutans have thrived in lush tropical forest. The main goal of the Borneo Orangutan Survival Foundation is to protect orangutans and their natural habitat, but the desecration of this habitat has become so pervasive that the foundation has taken into its care more than 2,000 orphaned orangutans, almost 1,000 of which are, at present, awaiting a chance for release into the wild. Scientists estimate that wild orangutans are disappearing at the rate of 2,000 a year and will be extinct in 10 years.
Smits uses Esri's ArcGIS software to identify the expansion of oil palm plantations and the harvest of palm oil as the main cause of the destruction of Indonesia's ecosystems. Palm oil, easily grown in these areas, is used in a wide range of products, from cookies to cosmetics. Demand is high, making the oil palms a major cash crop for Indonesia. But it is not a sustainable product to harvest because oil palms deplete the soil of nutrients and must be cut down for harvest, thereby ravaging the land.
GIS also clearly reveals illegal logging, clear cutting, and uncontrolled burning associated with oil palm operations that destroy the tropical rain forests and severely threaten the orangutans with extinction. "Destroying forests leaves orangutans with no food and no place to run," says Smits. Furthermore, the oil palm tree cultivation provides an easy inroad for illegal logging of other valuable rain forest timber and opens access for the atrocities of animal trade.
Smits combines satellite imagery and GIS to show changes both on forests and on humans. The technology is used to challenge the hypothesis that Borneo can indefinitely continue supporting oil palm plantations; to show the profit and cost factors of these sites and their proximity to transportation and shipping; to assess the precision farming factors of soil, elevation, and climate and their relationship and infringements on local communities; and to disclose property ownership disparities.
SarVision has deployed SPOT imagery at 1 x 1 kilometer resolution for all of Indonesia to show how forests are receding and ground cover is changing from trees to shrubs and weeds. It is also used to reveal corruption by showing where companies say they are cultivating palm oil but, in fact, are clear-cutting high-quality rain forest. Some images reveal a conspiracy between timber and oil palm businesses running covert timber operations. Flyovers above suspect areas provide aerial images that pinpoint logging equipment in areas where it should not be. The eye of satellite imagery and the analytic ability of ArcGIS reveal these schemes and force the hand of law enforcers to take action. Moreover, remote-sensing imagery and GIS are proven tools for convincing various governments around the world that palm oil consumption is indeed destroying these precious forests.
"By using GIS, we were able to demonstrate in a very convincing way that people were misusing oil palms to get their hands on timber," says Smits. "More than half of permitted oil palm plantations in Central Kalimantan are located on unsuitable land for oil palms. But they are located in areas where formerly highly profitable forests were growing. GIS is extremely important for visually relaying this information. I don't need to give complicated explanations of the problem because people can easily understand what is happening from our maps. They see how fast the forest has shrunk in just three years. This leads them to wonder what the rest of the world will look like in 10 years."
Because the Indonesian economy is so tied to the cultivation of palm oil, Smits must do more than preach conservation—he has to promote an economically feasible alternative. Smits studied sustainable options and cited sugar palm, which is a multipurpose plant that is edible and can be used for creating ethanol. "It uses little water, needs no artificial fertilizer, and is six times as productive as sugar cane," claims Smits. Since harvesting processes tap the sugary juices of the sugar palm's flowering branches rather than removing parts of the tree as does the palm oil harvest, the process retains the forest land's fertility.
GIS is part of the sugar palm remediation plan. It helps direct the activities of a cooperative of more than 6,200 farmers and shows them where and when to extract the palm's liquid. The technology also shows the best roads for oxcart to automobile transport, processing points in the village hubs, and pipeline placement for gravitational transmission of the product down to the coast for export. GIS shows microclimates and different soil types, as well as predicts yields. The outcomes of the analyses become the source for determining the amount of labor needed for planting and cultivation. It also provides a basis for estimating how much a sugar palm operation could cost. GIS also is useful for calculating the carbon sequestration rates of Indonesian forests, a valuable analysis for obtaining funding from programs concerned with climate change.
"We have mapped all of Borneo's forests to study the suitability of sugar palms," Smits explains. "We are using these same processes in other parts of the world, such as in Colombia, where we have a pilot project that includes one million sugar palms. We are looking at the worldwide potential, looking where the temperature and rainfall are sufficient, the infrastructure is in place for cultivation, and the human resources are large enough to perform the labor-intensive tapping processes. We have located many places throughout the world where sugar palms can be economically planted without depleting the soil. Among the GIS design tools are models for assessing site suitability and predicting impact on local hydrology, carbon storage, and the biodiversity of the area. GIS also indicates the best location to plant the palms and when it is seasonable to do so. GIS is a valuable tool for showing what has happened and designing plans for change."
|
<urn:uuid:8e40d819-9331-467f-8a92-d23474a9afe9>
|
CC-MAIN-2016-26
|
http://www.esri.com/news/arcwatch/0110/rain-forest.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402699.36/warc/CC-MAIN-20160624155002-00033-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.957331
| 1,375
| 3.640625
| 4
|
NCLB Accountability: Educators Give Views
Most teachers support the idea of standards-based accountability as outlined by the federal No Child Left Behind Act, but they feel challenged by the insufficient alignment of local curricula with state standards, concludes a study by the Santa Monica, Calif.-based RAND Corp.
Teachers also reported reduced morale and a narrower teaching focus as a result of standards-based accountability. RAND surveyed superintendents, principals, and teachers in three states—California, Georgia, and Pennsylvania—to identify effective methods for implementing the NCLB law.
Vol. 26, Issue 41, Page 12
|
<urn:uuid:9ca8a362-acbc-43d4-bd48-1860507102fd>
|
CC-MAIN-2016-26
|
http://www.edweek.org/ew/articles/2007/06/13/41report_web1.h26.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395160.19/warc/CC-MAIN-20160624154955-00119-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.945172
| 125
| 2.890625
| 3
|
Pre-college educators face many challenges when integrating marine topics with other subject areas. They find it difficult to fit in new topics such as oceans because their time and effort is focused on meeting learning standards and district / state assessments. COSEE-OS scientists who teach at the university level have likewise noted that they and their peers are often not well prepared to teach science using an interdisciplinary approach. In most cases, the result is a curriculum of discrete topics that doesn't provide students with a framework in which to view the "big picture."
To help alleviate this problem, COSEE–OS resources have been selected to showcase fundamental science concepts which can be mapped within a "big picture context." Our primary mode of dissemination to broad audiences is the Ocean Climate Interactive (OCI). This flash-based application allows users to explore concepts and their relationships through a variety of assets - videos, images, news articles, and teaching resources - within a profile that gives breadth and depth to the learning experience. The OCI, when used in conjuction with our Concept Map Builder, constitutes part of the COSEE-OS suite of ocean-climate multimedia known as the Concept Linked Integrated Media Builder (CLIMB).
The OCI was created from a series of concept maps developed by scientist-educator teams. After several iterations, the overarching map was parsed into three distinct "views" - the Earth-Sun View, the Earth View, and the CloseUp View - which showcase various concepts, each of which is linked to other concepts, subconcepts, and a multitude of assets. Educators can use the OCI in their classrooms as an easy-to-access resource for engaging material; students can browse the concepts and their assets to learn more about them in a way that invites further exploration.
As beta versions of the COSEE-OS ocean-climate multimedia continue to be developed, COSEE-OS will work with focus groups to discover how the various interfaces / interactions should be integrated to optimize the educational experience for formal and informal education audiences. Preliminary survey results indicate that providing "customized journeys" – e.g., tools that allow learners to pull topics from a "shopping list," see how these topics are tied within a concept map, and then progress through the connected ideas in a stepwise manner – may be a powerful way to reach new audiences with ocean systems content.
Please see our tutorials to learn how to navigate the OCI or visit the OCI interface to begin using this tool.
|
<urn:uuid:7da954de-01df-401a-b51d-9930d3cb9186>
|
CC-MAIN-2016-26
|
http://cosee.umaine.edu/tools/oci/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396147.66/warc/CC-MAIN-20160624154956-00104-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.944355
| 510
| 2.9375
| 3
|
References are an ideal place to begin your research because they provide easy access to information. Many reference sources are arranged in alphabetical order, are heavily indexed, or offer ready access through some other means. Reference articles, the units that make up most reference works, offer overviews of topics that are usually brief, specific, and written for readers who are unfamiliar with the subject matter. UACCB references are identified by "REF" over the call number of the item.
Examples of reference works include dictionaries, encyclopedias, handbooks, almanacs, and atlases. Most reference works in the Row-Johns Library are shelved in a specific area known as the Reference Collection. These books cannot be checked out. You should consult both general works (e.g., Academic American Encyclopedia) and discipline-specific works (e.g., Encyclopedia of Nursing Research, Complete Costume Dictionary, Encyclopedia of Southern Culture).
When starting your research, try to locate one or more reference articles that relate to your topic. Look for three things in a reference article:
- A brief introduction to your topic
- Definitions of key terms
- A bibliography of other sources about your topic.
These three elements will accelerate the pace of your research.
Do you know the criteria for Evaluating Web Pages?
If you have reference questions please contact the Library.
|
<urn:uuid:612a3b6c-d70e-4c4c-97da-64f9f5443457>
|
CC-MAIN-2016-26
|
http://www.uaccb.edu/library/reference
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397428.37/warc/CC-MAIN-20160624154957-00136-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.895017
| 279
| 3.265625
| 3
|
Dillon Valley Elementary may not be considered the biggest school, either in size or population, but it can certainly be called the most diverse, especially where the teaching staff is concerned. Dillon Valley currently employs 12 teachers with an international background, all of whom are bilingual and come from Spanish-speaking countries.
Six of the international teachers hail from Spain (from northern, central and southern areas), three are from Mexico, two are from Columbia and one is from Guatemala. Most did not know each other before meeting at Dillon Valley.
Carolina Lopez de Blas of Spain has been here the longest - nearly three years, teaching first grade. She's been enjoying herself immensely, and is hoping to extend her stay. The newest teacher is Eva Nunez, who just arrived from Spain this summer. Though she has at times felt a bit overwhelmed working and living in a foreign country, she says that she, too, has been having fun.
"I love it so far," she said. "I'm really happy here."
The learning climate and class structure at Dillon Valley is unique. Each of the foreign teachers pairs with a native English-speaking co-teacher. The students, from kindergarten up to fifth grade, trade between the two teachers, learning subjects in both Spanish and English languages. No matter what language they speak at home, students spend time each day speaking both languages.
Harriet Hoffman lives in Blue River, but she brings her daughter, first-grader Lucia Hoffman-Farmer, across the county every day to attend Dillon Valley. Hoffman cites the dual-language program as a main reason for doing this.
"I think it expands their concept of the world around them," she said. "They get more of a global perspective, they hear different accents. ... It expands their learning ability and how their brain works."
Hoffman says her daughter sometimes speaks Spanish at home, though her accent has shifted a bit toward that found in Spain. Hoffman views this as an interesting example of cultural learning.
Just as American accents are different from British and Australian, so are accents between Spain, Mexico and South American countries. The teachers relate occasional difficulties in understanding between themselves, and between students who are native Spanish speakers.
"Sometimes we don't understand each other, and we're speaking the same language," said Isabel Rodriguez, who is from Mexico and teaches second grade. "Their vocabulary is so different (and) we have to figure out, 'how do you say this in this country, how do you say this in that country?'"
Though certain difficulties arise, for the most part, the teachers say that their students at all levels understand them very well. Communication does not lie in understanding every single word spoken, but in understanding the concept that is put across. Once the concept comes across, the words and the grammar follow.
Rather than be discouraged by differences in accent or expression, the teachers have found an opportunity for teaching about culture. When an expression is used that not everyone knows, it's discussed and compared with others. The teachers also say that the cultural angle can be found in nearly every aspect of the classroom.
"When I am teaching something, I try to compare with the way we do it (in Spain), and let them know that things can be done in several ways," said Eugenio Perez, who teaches fourth grade. "I try to put in cultural aspects from my home country."
This practice is particularly pervasive in math class, according to Perez. Though often considered a universal language, math between U.S. and Spanish culture can be difficult, because the style and layout of math problems differs between the two.
"They just really help bring some authentic global perspective to what we try to do in the building every day," said Dillon Valley principal Cathy Beck.
Deborah Hage, whose granddaughter attends third grade, agrees.
"I think education is more than book learning, it's more than memorization of facts. I think it has to be very experiential," she said. "Having these different, diverse forms of thought and expression in the school is more important to the kids than memorizing or getting a certain bit of facts."
Cultural learning takes place both inside and outside of the classroom, which all of the international crew have come to recognize. Not only are they teaching the children about their home culture, but they are learning about American culture at the same time.
When asked to share something that they found in America that was unexpected, they brought up volunteer work and the overall sense of openness and generosity.
"People (here) are really warm," Lopez de Blas said. They're really open-minded, more than we've heard. ... The things that arrive in our country about the United States are always negative, and it's so sad."
"That's why teaching culture is so important," Rodriguez added. "because the culture here is so giving."
"But I think we can change that," said Nuria de la Cruz Mena, a first-grade teacher from Spain. "When we go back, we will teach the culture in that way."
"The purpose of our program is to teach Spanish here, and to teach our culture, and also to create links, and teach back the culture we have learned here," Perez said. "I think it's important ... to create a bridge between the two cultures."
In addition to discussing the culture of the United States, the teachers also explained that Summit County was special.
"I think we are very happy in being in this spot in particular," said Perez. "I think we would have a quite different experience if we went to Denver, or a different school in the state. I think we are in a very different and special, unique spot."
The other teachers nodded, agreeing, pointing out that colleagues in other cities and states have since come and gone, fulfilling only the minimum requirement of program time.
Nunez, the newest arrival, spoke up for all of them. "I feel that we have come to the right place."
|
<urn:uuid:e0e1b5ef-53b0-4ab3-ab20-9d6dde74081b>
|
CC-MAIN-2016-26
|
http://www.summitdaily.com/article/20121113/NEWS/121119941
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783400572.45/warc/CC-MAIN-20160624155000-00100-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.98044
| 1,239
| 2.546875
| 3
|
The pineapple (Ananas comosus) is a tropical plant with edible multiple fruit
consisting of coalesced berries, also called pineapples, and the most
You will be surprised: growing pineapple plants is a lot easier than you think. To
grow pineapples all you need is...
With some patience, you can even grow a new pineapple from this plant. It takes
about two to three years, though, and even then some plants are difficult to get ...
Sep 16, 2011 ... Growing a Pineapple; Pineapple Plants http://CreativeCookingCornr.com Want to
know how to grow a pineapple; pineapple plants grow inside ...
Pineapple plants are self-incompatible, meaning pollen from the same variety will
not result in seed production and seedy fruit. However, growing several ...
Feb 8, 2013 ... Pretty interesting, right? Seeing this field of pineapple plants helps makes sense
out of why they can make such a great container house plant.
The deep green, strap-like leaves and size of a pineapple plant (Ananas
comosus) makes it a striking addition to a potted garden. Pineapples grow
naturally in ...
Pineapple Plant - Many people think that a pineapple fruit comes from a tree. Just
because it is a fruit, it does not mean that it does not come from trees. Another ...
From any pineapple you can grow a pineapple plant. To do so cut off the crown (
the leafy top) of the pineapples and strip a few of the leaves from the crown.
Jan 8, 2015 ... Simply choose a fresh pineapple from your local grocery or produce store, cut the
top off and sprout your plant. Try picking one having the most ...
|
<urn:uuid:6166e6ac-89ff-479e-9c53-eb75b4eaf015>
|
CC-MAIN-2016-26
|
http://www.ask.com/web?q=Pineapple+Plant&o=2603&l=dir&qsrc=3139&gc=1
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783392099.27/warc/CC-MAIN-20160624154952-00153-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.888938
| 367
| 3.140625
| 3
|
The World Meteorological Organisation (WMO) is a specialized international agency of the United Nations with the aim of gathering, analysing, standardizing and disseminating international meteorological observations and improving the exchange of information. Its establishment was agreed in 1947 as a successor to the International Meteorological Organization, it came into being in 1951, and later in 1951 it became a UN agency. It has 185 members (179 member states and 6 dependent territories).
Its chief activities are the World Weather Watch programme, which coordinates facilities provided by member states, and a programme that aims to extend knowledge of the natural and human-induced variability of climate. It also encourages research and training; standardizes observations and ensures their uniform publication; and furthers the application of meteorology to aviation, shipping, agriculture, and other human activities. Its headquarters are in Geneva.
Data from all over the world are needed to provide weather forecasts. If there were no WMO, the nations of the world would have to conclude individual agreements with one another to ensure the exchange and availability of data to meet their national requirements, such as provision of forecasts for the public and special services for various economic sectors like agriculture, utilities (gas, electric power production) and so on. An aircraft does not take off, nor does a ship leave port, without a weather forecast. The provision of such services is part of the international responsibilities of individual countries which would be hard pressed to provide accurate and timely information if the global infrastructure established under the auspices of WMO did not exist.
|
<urn:uuid:4e3cb7df-1515-4aa3-be29-ba019f7d7360>
|
CC-MAIN-2016-26
|
http://www.weatheronline.pt/reports/wxfacts/World-Meteorological-Organisation-WMO.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393997.50/warc/CC-MAIN-20160624154953-00032-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.959692
| 308
| 3.734375
| 4
|
Baby's First Year
- Baby's First Year
- Parenting Resources
- Families: Nebraska's Future
- Search this Site
- Your Local Extension Office
Programs are available throughout Nebraska to help meet the needs of families and children
Playing Rough with Baby
Researchers find that men and women play differently with babies. Men are more likely to play rough. Some women would say that men are too wild!
Men are more likely than women to swing babies around, lift them high in the air, bounce them high and low, tickle and chase them. Babies enjoy this: moms often worry. Mothers might feel better if they knew that most men are like this, and most babies not only survive, but like it! It's fun to play rough with baby, and most babies love active play. Keep it safe–a few games are too wild to play with baby.
Don't throw baby into the air. Baby could fall if something distracts you. Instead, lift baby over your head without letting go.
Don't jerk a baby's arm. If you swing baby around in a circle, don't hold her by the hands. This is too much stress for baby's elbows and shoulders. These joints could be dislocated. Hold baby under the arms by the chest instead.
Never shake a baby. This can lead to blindness, brain damage or death.
Some fun and safe ways to play with baby are chasing her as she crawls and rolling her along the floor.
More Parenting & Family Resources:
Photo Credit - USDA Photo by Ken Hammond
|
<urn:uuid:ec78a0bf-7512-44df-8e59-2e4b0a851db0>
|
CC-MAIN-2016-26
|
http://lancaster.unl.edu/family/parenting/month9_952.shtml
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397567.28/warc/CC-MAIN-20160624154957-00172-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.95071
| 322
| 2.796875
| 3
|
25 May 1999|
UNU to hold Open House on 4 June
World Environment Day is celebrated each year on 5 June in more than 100 countries around the world to focus attention on environmental awareness and protection. “The theme for World Environment Day 1999, ‘Our Earth – Our Future – Just Save It!’, is an urgent appeal to each and every one of us to renew our pledge to cherish and respect the planet that sustains us,” declared United Nations Secretary-General Kofi Annan. This year’s World Environment Day ceremonies will be held in Tokyo, and related events will take place all over the country. To help celebrate the occasion, the United Nations University (UNU), in cooperation with the Global Environment Information Centre (GEIC), will hold World Environment Day ’99, “Global Echo.”
as part of World Environment Day ’99 activities
One of the events of “Global Echo” is the first-ever United Nations University Open House, which will be held on Friday, 4 June 1999, from 9:30 a.m. to 5:30 p.m. on the 2nd floor of the UNU Headquarters in Tokyo and the 1st floor of the Institute of Advanced Studies. The purpose of these events is to introduce the University’s efforts in addressing vital global environmental issues, and to provide information on the UNU, other UN agencies in Japan, and UN-related activities in Tokyo and throughout Japan.
Other “Global Echo” events being held in conjunction with World Environment Day ’99 include live “environmental music” performances, a “bicycle expo,” and an NGO/NPO Global Bazaar and displays on Friday and Saturday, 4 and 5 June, and an environmental photo contest exhibition on Friday, 4 June – all on the UNU grounds.
Educational events will include an Environment Week Seminar Series at GEIC in Tokyo (daily from 6 p.m., Wed.–Sat., 2 through 5 June; reservations required) and a two-day Environmental Issues Leadership Training course at Shonan Village, Kanagawa Prefecture (Sat.–Sun., 12 and 13 June).
Media representatives are cordially invited to attend all events.
For more details about these World Environment Day ’99 events, see http://www.geic.or.jp/wed/, or contact the UNU Public Affairs Section or GEIC (Tel. 03-3407-8107).
* * *
For further information, please contact the UNU Public Affairs Section.
Tel.: (03) 5467–1243, –1246
Fax: (03) 3406–7346.
Return to UNU Press Releases
Return to UNU Homepage
|
<urn:uuid:d167f69e-521e-4aec-b173-2da8cf3bb1f6>
|
CC-MAIN-2016-26
|
http://archive.unu.edu/media/archives/1999/pre-10.99.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397842.93/warc/CC-MAIN-20160624154957-00088-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.897421
| 576
| 2.5625
| 3
|
The intermediate plug-in hybrid electric vehicle (PHEV) course provides an introduction to hybrid engine technology. This course is a part of series of courses for PHEV training. The suggested targets for this course are professional auto workers.
The concept of hybrid technology along with its history will be discussed. A brief explanation on air standard thermodynamic cycles will be included. The definition of efficiency and advantages and disadvantages of using hybrid technology will be highlighted. Different designs of hybrid electric vehicles will be analyzed. This course also covers the safety and maintenance procedures of hybrid vehicles. The selected topics are listed below:
- Concept of hybrid
- Introduction to thermodynamic
- Power cycles
- Environmental impact
- Power sources
- Electrical machines
- Energy storage
- Design of HEV
- Maintenance and service
- Equipment and tools
06/01/2015 - 07/24/2015 (Online)
This is an online course which is offered over an eight-week period. All communication, announcements, course material, homework/project assignments, examinations and any other course related activities are done using Angel Distant Learning Tool. There are eleven modules covering the course materials. For each module, homework is given and upon the completion of the modules the students will be given an examination.
Duration: 8 weeks
Class limit: 25
Instructor: Mohamad Zoghi, PhD (Assistant Professor, Mechanical Engineering Technology Department)
The deadline for payment is one week prior to the selected workshop date.
Register before deadline: $600
Register after deadline: $695
- Professional auto workers
- General public with basic understanding of internal combustion engine and electrical principles
Phone: 631-794-6175 (Registration)
Phone: 631-420-2315 (Technical)
|
<urn:uuid:be27aec7-bef6-46c4-b4e8-2c3d95e30830>
|
CC-MAIN-2016-26
|
https://www.farmingdale.edu/academics/centers-institutes/resc/phev/index.shtml
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396027.60/warc/CC-MAIN-20160624154956-00027-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.873441
| 362
| 2.53125
| 3
|
A Ridiculously Brief History of Electricity
"He wrested the flash of lightning from heaven and the scepter from the tyrants"
-From an inscription on a bust of Benjamin Franklin by the French sculptor Houdon in 1778
The most famous American in the world in the latter half of the 18th century was Benjamin Franklin. One historian, H.W. Brands, called Ben Franklin the first American. From the humblest of origins, Franklin made himself into one of the most influential characters in world history. His experiments in electricity made Franklin a superstar of his day, introducing the concept of electricity into common culture. Most of the electrical terms we use today, such as battery, positive/negative, condensor, conductor, charge, and even electrician, were originally coined by Franklin.
He conjectured that the static sparks he was generating in his laboratory had something fundamental in common with the phenomenon of lightning. Building on the discovery of conduction in 1729, Franklin saw electricity as having similar qualities to a fluid, and, like a fluid, electricity could be directed to follow prescribed paths.
Practical concerns were also guiding Ben Franklin’s research. One of his many businesses included a fire insurance company. Lightning-initiated fires were a common occurrence in the Philadelphia of the 1700s. Persuading lightning to flow outside of rather than through a building was good for business, especially if your business was fire insurance. Franklin's famous and incredibly dangerous kite flying experiment of 1752, lead to the lightning rod/electrode system that is still in use today. If you are ever in Philadelphia, be sure to stop by Ben's grave at 5th and Arch St. and pay your respects.
|
<urn:uuid:78f0e4db-f779-49d8-8b7a-68a447ce5ebe>
|
CC-MAIN-2016-26
|
http://www.codecheck.com/cc/Briefhistory3.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396959.83/warc/CC-MAIN-20160624154956-00062-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.978264
| 355
| 2.953125
| 3
|
The contact lens equipped with a head-up display has always seemed like one of the sci-fi gadgets most likely to become a reality. Today, The Centre of Microsystems Technology announced that it has developed a curved LCD that is able to be embedded into a contact lens, bringing us even closer to full-time, glasses-less augmented reality.
If you’re wondering why a curved LCD was chosen rather than embeddable LEDs, it’s because the LCD option allows the use of the entire display, whereas an LED array can only use a small area of the surface. Jelle De Smet, the main researcher on the project, explains that even flexible liquid crystal displays are normally not designed to withstand the shaping process however, by using new kinds of conductive polymers they were able to create a spherical shape.
Along with the larger display area, the team can change the pattern, number, and size of the pixels in the LCD. For example, if the team creates lenses using one large pixel per lens, they could change the pixels’ shade, effectively creating lens-based sunglasses. If they instead decide to stuff as many pixels into the LCD as possible, then the lens could act as a detailed display.
To go along with their announcement, the team presented a prototype. So far, the lens is only able to display simple shapes and patterns, with the demonstration displaying a dollar sign — perhaps a hopeful gesture for the product’s future.
Currently the display is more similar to a calculator’s LCD, rather than something like a tiny television. Unfortunately the current design is only able to display patterns that can be seen on the outside, rather than to the wearer. However, the team is currently researching if the pixels’ proximity to the eye can be made to be seen by the wearer. The unit is a prototype, so displaying potential termination targets in red text isn’t currently possible either.
Though the unit in its current state isn’t capable of displaying complex patterns, the team feels that it holds potential for more intricate uses in the future, such as changing the color of the iris on the fly, or moderating the amount of light coming into a damaged retina. CMST feels that now that they’ve gotten the initial tech out of the way, they can work toward real-world applications, and could perhaps even make the unit commercially available within a few years. Don’t worry, given time, the lens could function as a heads-up display, making us all feel like high-tech killbots.
|
<urn:uuid:07df1a37-89a3-428a-b522-39c62ad7a3f4>
|
CC-MAIN-2016-26
|
http://www.extremetech.com/electronics/142459-curved-lcd-paves-way-for-augmented-reality-contact-lens
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395621.98/warc/CC-MAIN-20160624154955-00099-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.948346
| 528
| 2.640625
| 3
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.