text
stringlengths
199
648k
id
stringlengths
47
47
dump
stringclasses
1 value
url
stringlengths
14
419
file_path
stringlengths
139
140
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
50
235k
score
float64
2.52
5.34
int_score
int64
3
5
Posted 15 October 2014 By Alexander Gaffney, RAC US drug regulators have long known that the physical attributes of a drug product can affect its safety and efficacy. Now the US Food and Drug Administration (FDA) wants to know exactly how a change in a drug's appearance affects patient adherence. Since at least December 2013, FDA has been pushing generic drug companies to do more to take into account the size, shape and "other physical attributes" of their drug products. In its guidance document, Size, Shape, and Other Physical Attributes of Generic Tablets and Capsules, the agency said companies will need to do more to ensure their products aren't just the same chemically, but also physically similar as well. Take, for example, the size of a drug capsule. If the reference-listed drug is a small and easy-to-swallow capsule, but the generic drug is a large and cumbersome tablet, the end user may be unable to take the drug or even choke on it. "[We] are concerned that differences in physical characteristics (e.g., size and shape of the tablet or capsule) may affect patient compliance and acceptability of medication regimens or could lead to medication errors," FDA wrote in its guidance. "We believe these patient safety concerns are important, and we are recommending that generic drug manufacturers consider physical attributes when they develop quality target product profiles (QTPPs) for their generic product candidates," FDA added. The intended population for a drug—the very young, the very old or the very sick—might also impact what physical forms a drug product must take, FDA said. "Although not all patient factors can be addressed through pharmaceutical design and manufacture, the physical characteristics of a product can be," FDA explained. FDA recommended other factors be considered as well, including film coatings, taste-enhancing excipients, and the smell, weight, surface area and shape of products. Even the scoring of a drug tablet can be important, though FDA has said not so important as to merit delaying the entry of a generic product. However, one prominent attribute didn't receive much attention in FDA's December 2013 guidance: color. Historically, regulators haven't given all that much attention to the color of drugs, except perhaps when working to eliminate potential prescribing errors. But now FDA says it's working to study the issue, saying that changes in drug color—especially when pharmacists substitute brand name drugs for their differently colored generic equivalents—could cause patient confusion and decrease drug regimen adherence. Other changes in appearance, including in size and shape, can also have an impact. "Studies indicate that patients are more likely to stop taking their generic medications when they experience a change in their drugs' physical appearances, leading to harmful clinical and public health consequences as well as increased health care costs from avoidable morbidity and mortality," FDA explained. While that observation isn't necessarily new, FDA's deepening interest in it appears to be. The regulator says it plans to survey pharmacists and patients "about their perceptions about and experiences with generic drug product pill appearance change." The results of the survey will be used to "further [FDA's] understanding of the relationship between changes in pill appearance and non-adherence to prescribed therapeutic regimens," the agency wrote in a Federal Register notice. FDA said it will ask pharmacists to describe how often they change suppliers for their generic drugs, what strategies they use to help patients transition between pills of different color/size/shape and how patients respond to changes in pill color and appearance. Patients will also be polled. In one survey, FDA will focus on those older than 50 years of age with epilepsy, diabetes, hypertension, hyperlipidemia, depression, HIV or combinations of any of the six conditions. The second survey will draw from a database of commercially insured patients to find chronically ill patients who have experienced a change in pill appearance. A comment period on the proposed survey is open for the next 60 days. Federal Register Notice You Might Also be Interested In: A Facebook for Drugs? Regulators Want Help Building Database of What Every Drug Looks Like The Atlantic - The Power of Drug Color
<urn:uuid:290b945d-80ca-4ea9-b923-8bec72d6bff5>
CC-MAIN-2016-26
http://www.raps.org/Regulatory-Focus/News/2014/10/15/20562/FDA-Wants-to-Study-if-Drug-Color-Shape-and-Size-Affect-Patient-Adherence/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399117.38/warc/CC-MAIN-20160624154959-00195-ip-10-164-35-72.ec2.internal.warc.gz
en
0.950159
859
2.734375
3
The Chinese Civil War The Chinese Civil War took place between the forces loyal to the government of the Republic of China lead by the Kuomintang and the forces of the Communist Party of China. The war took place in April 1927 and ended near the time of the 1950s. The winners of the Chinese Civil War were the forced of the Communist Party of China. From this victory the communist form of government is used in China today. For more on the Chinese Civil War click the button above. To see more of the Chinese Civil War click the button above.
<urn:uuid:814a835b-4689-4873-ac00-f19fefdc770a>
CC-MAIN-2016-26
http://thecoldwaryearsrosalesv.weebly.com/the-chinese-civil-war.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396029.85/warc/CC-MAIN-20160624154956-00052-ip-10-164-35-72.ec2.internal.warc.gz
en
0.970043
117
3.625
4
During five austral summers, from 1994/95 until 1998/99, the Alfred Wegener Institute (AWI)carried out a large airborne radio echo sounding (RES) survey in Dronning Maud Land (DML),Antarctica. These ice thickness measurements are part of the AWI contribution to the pre-site survey for a deep ice core drill site in DML within the European Project for Ice Coringin Antarctica (EPICA). The survey encompasses more than 90,000 km RES profiles over DML and the adjacent coastal area, covering more than 1 million km^2. The lower boundary ofthe ice sheet could be determined area-wide. Internal horizons occuring in the upper two thirds of the ice column can also be traced for several hundred kilometers. This work presents the latest maps of the subglacial topography of the investigated area as well as of an internal horizon.
<urn:uuid:351423df-f911-44e3-a424-2ca9bfff7315>
CC-MAIN-2016-26
http://epic.awi.de/4480/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402699.36/warc/CC-MAIN-20160624155002-00070-ip-10-164-35-72.ec2.internal.warc.gz
en
0.886079
184
2.546875
3
Water users and governments are increasingly recognizing watershed conservation... Este estudio de caso aborda la necesidad de una... Potential Contributions of Investments in Watershed Services and Linkages to Poverty Reduction We are facing a growing number, and increasing range, of water issues. As with climate change, when it comes to water, we are on an inevitable collision course with global disaster. So what is the answer? One suite of tools that, in certain situations, could help to address water problems are watershed payments. Watershed payments provide financial or in-kind incentives to land managers and land stewards to adopt practices that can be linked to improvements in watershed services and and may also be considered as investments in watershed services (IWS), or more commonly referred to as payments for watershed services (PWS). Programs are driven both by private interests (although their number is few) and government entities focused on influencing land-use practices that affect water quality and flow. |Release Date:||October 2012| |File Size:||603 KB|
<urn:uuid:f95044e8-712b-4192-b864-919a58509a71>
CC-MAIN-2016-26
http://www.forest-trends.org/publication_details.php?publicationID=3186
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395679.18/warc/CC-MAIN-20160624154955-00069-ip-10-164-35-72.ec2.internal.warc.gz
en
0.941536
216
2.546875
3
Main Menu Sites Age. Late Wisconsin/Holocene. Much of the fauna clearly is Pleistocene, but upper portions of the cave fill include Holocene plant material and almost certainly some Holocene faunal elements. Synonyms. Bishop's Cap Cavern. Discussion. "In the summer of 1929, Mr. J. W. Lytle, Mr. H. A. Wylde and Mr. W. L. Bliss excavated a cavern on the east slope of the Organ Mountains, in Dona Ana County, New Mexico" (Howard 1931:206). Howard also mentions that the cave was named in honor of Mr. Roscoe P. Conkling as the discoverer. The cave is on the eastern side of Bishops Cap, a southern limestone outlier of the Organ Mountains. A vertical section (from a museum model) is shown in Conkling (1932). He mentions that the cavern was filled completely to within about 8 ft. "from the chimney-like neck at the entrance" and "Examination of the cave deposit indicates that some of the material is of the nature of wind-blown dune sand redeposited in old river beds"(p. 11). In his list, he has fresh water shells and some plant material (root of Algaroba or Mesquite tree; plant leaves; branch of Sotol Plant). Fig. 1. Entrance to Conkling Cavern. Photograph by John Green. Much of the faunal material certainly is Pleistocene in age, and presence of human remains (Stock 1931; Stewart 1952) indicate that the age to at least to considerable depth is late Wisconsin. Conkling (1932) was a layman interested in cave faunas (and the discoverer of several sites). As an untrained paleontologist, his publication leaves much to be desired; a fair degree of subjectivity is involved in interpreting taxonomic records. He listed mammalian taxa from a preliminary list complied by Chester Stock. I have considerable reservations about the records of Megalonyx and "Possibly Mylodon", but have listed them as given. Although he did not name Arctodus as the bear present, his description of it as a short-faced bear most closely related to the Spectacled Bear of South America leaves little doubt as to what was meant. Bison was represented by only one tooth, and it is possible that it represents a different large bovid. Dire Wolf (Canis dirus) was noted as occurring within the "Wolf Den" with gnawed horse, camel, and human bones. Several species not present in Conkling's list are, however, recorded as present in his discussion of various groups. Although only Antilocapra is mentioned in his list, he names and accurately describes Capromeryx in the family account and does not mention Antilocapra. Snake vertebrae and two plastrons of large turtles are mentioned without any further identification. Fig. 2. Looking up at the entrance of Conkling Cavern from the landing at the bottom of the shaft. Photograph by John Green. In comparing Conkling Cavern and Shelter Cave, there is a suggestion of differences in faunal ages in that great numbers of Coragyps occidentalis (47 specimens according to Conkling 1932) were present in Conkling Cavern while Cathartes aura is scarce (one specimen according to Conkling 1932), while the first was absent and the second abundant in Shelter Cave. At least in the Guadalupe Mountain region, Cathartes aura is rare or absent until near the end of the Pleistocene. Brattstrom (1964) listed Tetrameryx as having been recovered from Conkling Cavern. However, this appears to be a misinterpretation either of Conkling's (1932) discussion of Capromeryx or of an unclear statement by Stock (1930). Fig. 3. View back toward the bottom of the entrance shaft. Photograph by John Green. Occurrence of Gopherus morafkai is based on Brattstrom's (1961:551) statement that "Fragments of shell from this cave are similar to G. agassizii." The basis for the inclusion of Tamias and Spilogale in the faunal list as reported by Harris (1993c) appears to be undocumented and the taxa are withdrawn pending further investigation. Ambystoma mavortium—Barred Tiger Salamander (UTEP) Anaxyrus sp.—Bufonid Toad (UTEP) Gopherus morafkai—Morafka's Tortoise (Brattstrom 1961). Arizona elegans—Eastern Glossy Snake (Harris 1993c) Almost certainly Holocene (hair in internal parts strongly suggest recent owl pellet material) Masticophis sp.—Coachwhip Snake (Harris 1993c) Rhinocheilus lecontei—Long-nosed Snake (Harris 1993c) Crotalus sp.—Rattlesnake (UTEP) Branta canadensis—Canada Goose (Howard and Miller 1933) Callipepla gambelii—Gambel's Quail (Harris 1993c: ?) Cathartes aura—Turkey Vulture (Howard and Miller 1933) †Coragyps occidentalis—Western Vulture (Howard and Miller 1933) Gymnogyps californianus—California Condor (Howard and Miller 1933) Buteo swainsoni—Swainson's Hawk (Howard and Miller 1933) Haliaeetus leucocephalus—Bald Eagle (Howard and Miller 1933) Aquila chrysaetos—Golden Eagle (Howard and Miller 1933) Caracara cheriway—Crested Caracara (Howard and Miller 1933) Falco sparverius—American Kestrel (Howard and Miller 1933) Centrocercus urophasianus—Greater Sagebrush-grouse (Howard and Miller 1933) Callipepla sp.—Crested Quail (Howard and Miller 1933) Meleagris gallopavo—Wild Turkey (Howard and Miller 1933; Rea 1980) Geococcyx californianus conklingi—Conkling's Roadrunner (Howard 1931a; Howard and Miller 1933) Athene cunicularia—Burrowing Owl (Howard and Miller 1933) Asio otus—Long-eared Owl (Howard and Miller 1933: ?) Colaptes auratus—Northern Flicker (Howard and Miller 1933) Eremophila alpestris—Horned Lark (Howard and Miller 1933) Corvus corax—Common Raven (Howard and Miller 1933) Gymnorhinus cyanocephalus—Pinyon Jay (Howard and Miller 1933) Turdus migratorius—American Robin (Howard and Miller 1933) Sialia sp.—Bluebirds (Howard and Miller 1933) Agelaius phoeniceus—Red-winged Blackbird (Howard and Miller 1933: ?) Carpodacus mexicanus—House Finch (Howard and Miller 1933) Pipilo maculatus—Spotted Towhee (Howard and Miller 1933) †Megalonyx sp.—Megalonyx Ground Sloth (Conkling 1932) †Nothrotheriops shastensis—Shasta Ground Sloth (Conkling 1932 †Paramylodon sp.—Mylodontid Ground Sloth (Conkling 1932) Homo sapiens—Man (Stock 1931) Cynomys ludovicianus—Black-tailed Prairie Dog (Harris 1993c: cf.) Otospermophilus variegatus—Rock Squirrel (UTEP) Dipodomys spectabilis—Bannertail Kangaroo Rat (UTEP) Thomomys bottae—Botta's Pocket Gopher (Harris 1993c) Geomys sp.—Geomys Pocket Gopher (Harris 1993c) Microtus mogollonensis—Mogollon Vole (Smartt 1977) Neotoma cinerea—Bushy-tailed Woodrat (Harris 1993c) Neotoma leucodon—White-toothed Woodrat (Harris 1993c) Peromyscus sp.—White-footed Mouse (Harris 1993c) Lepus townsendii—White-tailed Jackrabbit (UTEP: cf)) Sylvilagus audubonii—Desert Cottontail (Harris 1993c) Sylvilagus nuttallii—Mountain Cottontail (Harris 1993c) Antrozous pallidus—Pallid Bat (UTEP) Myotis sp.—Myotis Bat UTEP) Canis dirus—Dire Wolf (Nowak 1979) Canis lupus—Gray Wolf (Conkling 1932) Canis latrans—Coyote (Conkling 1932) Vulpes macrotis—Kit Fox (Conkling 1932) Urocyon sp.—Gray Fox (Harris 1993c) Bassariscus sp.—Ringtail (Harris 1993c) Arctodus simus—Short-faced Bear (Conkling 1932) Mustela sp.—Weasel (Conkling 1932) Mephitis mephitis—Striped Skunk (Conkling 1932) Taxidea taxus—American Badger (Conkling 1932) Puma concolor—Mountain Lion (Conkling 1932) Lynx rufus—Bobcat (Conkling 1932: cf.) Equus conversidens—Mexican Horse (Harris data) Equus scotti—Scott's Horse (Harris data) †Hemiauchenia sp.—American Llama (Harris 1993c) †Camelops hesternus— (Conkling 1932) Antilocapra sp. Pronghorn (Conkling 1932) †Capromeryx sp.—Miniature Pronghorn (Conkling 1932) Bison sp.—Bison (Harris 1993c) Literature. Brattstrom 1961, ; Bryan 1929; Conkling 1932; Harris 1985a, 1993c; Howard 1931a, 1968; Howard and Miller 1933; Nowak 1979; Rea 1980; Smartt 1977; Stewart 1952; Stock 1931; Van Devender et al. 1976. Last Update: 19 Feb 2015
<urn:uuid:8a142e38-90a8-492f-910c-98124fb6ea1c>
CC-MAIN-2016-26
http://www.utep.edu/leb/pleistNM/sites/conklingcavern.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397795.31/warc/CC-MAIN-20160624154957-00198-ip-10-164-35-72.ec2.internal.warc.gz
en
0.833482
2,229
2.6875
3
Learn something new every day More Info... by email A portable digital media player is a compact device that is capable of playing various types of digital media. This generally includes digital media audio, digital media video, and various image formats. Some of the more sophisticated models have advanced features such as Wi-Fi capabilities, and act as personal digital assistants (PDAs). Because of their portability and extensive playback capabilities, it is not uncommon for a modern cell phone to be considered a portable digital media player. Nearly every portable digital media player supports audio playback. Most are compatible with the MP3 format, but several others are capable of playing Advanced Audio Coding (AAC), Windows Media Audio® (WMA) and WAV. Some devices even support open-source audio formats, such as Free Lossless Audio Code (FLAC) and Ogg Vorbis. Regardless of the format, each device has a bit-rate limit that determines the overall quality of the audio files. JPEG is the universal format for any portable digital media player that is capable of displaying images. Some players, however, have the ability to display additional formats such as GIF, PNG, and TIFF. Because there are so many formats available, some players are integrated with conversion software that enables the device to support other types of files. Many of the newer portable digital media player models support video through the MPEG-4 format. Some are compatible with Windows Media Video® (WMV) and AVI, which is the standard container format for Microsoft® Windows®. Digital media players are increasingly being developed to support video in DivX format, as well as Xvid — its open-source counterpart. While a portable digital media player may or may not come bundled with conversion software, most support third-party software that allows the user to convert video files into formats compatible with their device. The portable digital media player has advanced very quickly. A number of players have the ability to record video, while others include memory cards to provide users with additional storage. Some devices support games and even rich media technologies, such as Adobe® Flash Lite®. Other advanced features may include built-in radio receivers for listening to FM stations and web browsing capabilities. While it is largely viewed as consumer device geared towards entertainment, a portable digital media player has a multitude of purposes. It can be used to record an interview, display business presentations, or simply playback an intriguing audiobook. These devices are widely available, with the iPod® and Microsoft® Zune® being among the most popular brands.
<urn:uuid:fcfef862-c51b-410c-a11c-8bfca5fb7bd6>
CC-MAIN-2016-26
http://www.wisegeek.com/what-is-a-portable-digital-media-player.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395346.72/warc/CC-MAIN-20160624154955-00010-ip-10-164-35-72.ec2.internal.warc.gz
en
0.940457
519
2.578125
3
- Posted February 13, 2013 by - Tropical Storm In-Fa expected to regain typhoon strength - BREAKING NEWS: Hurricane Patricia should be a 'Category 7' storm, says scientist, and here's why - Massive Hurricane Patricia: Strongest Storm Ever Measured to Hit Mexico - Indonesia's Mt Sinabung erupts into life again - John Kerry says spoke to Najib about Anwar, freedom of expression New eruption of Paluweh volcano Partial dome collapse or explosions at the lava dome ( or both) produced new ash emissions on February 11, 2013. VAAC Darwin reported ash plume rising up to 2.1 km (7,000 feet). According to the Darwin Volcanic Ash Advisory Center (VAAC), Paluweh has experience minor ash and gas emissions almost daily since the initial blast on February 2/3, 2013. Paluweh volcano is located on Palu’e (Paluweh) Island. About 10,000 residents of the island were evacuated earlier last year after the volcano showed signs of unrest. Now, dozens of homilies situated in Waturia village, East Nusa Tenggara, are in dire need of food, clean water and medical supplies following the outbreak of diseases at the site, such as malaria, acute respiratory infections (ISPA) and famine, according to Jakarta Post. The ash has reportedly caused respiratory diseases among children. As many as 722 people sought refuge in Waturia village while more than 600 others were sheltered in Nangahure and Wairumbia villages following the eruption of Mount Rokatenda on Palue Island, NTT, on February 2/3, 2013. Ash destroyed most of plants and crops so evacuated islanders are now facing serious food shortage. Sikka Deputy Regent Damianus Wera said that he would immediately coordinate with related offices to monitor conditions in the affected area and consider the possibility of giving seedlings to local residents so they could plant crops during the current rainy season. Paluweh volcano, also known as Rokatenda, forms the 8-km-wide island of Paluweh north of the volcanic arc that cuts across Flores Island. Although the volcano rises about 3000 m above the sea floor, its summit reaches only 875 m above sea level. The broad irregular summit region contains overlapping craters up to 900 m wide and several lava domes. Several flank vents occur along a NW-trending fissure. The largest historical eruption of Paluweh occurred in 1928, when a strong explosive eruption (VEI 3) was accompanied by landslide-induced tsunamis and lava dome emplacement, ending up causing almost 100 fatalities.
<urn:uuid:c408f758-26f6-4a7e-9d85-3ad1fb4d8902>
CC-MAIN-2016-26
http://ireport.cnn.com/docs/DOC-926578?ref=feeds%2Flatest
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396222.11/warc/CC-MAIN-20160624154956-00043-ip-10-164-35-72.ec2.internal.warc.gz
en
0.94987
558
2.5625
3
1/17/2013 7:47:10 AM Regularly consuming sucrose—the type of sugar found in many sweetened beverages—increases a person's risk of heart disease. In a study published January 10 in the journal PLOS Genetics, researchers at Sanford-Burnham Medical Research Institute and Mount Sinai School of Medicine used fruit flies, a well-established model for human health and disease, to determine exactly how sucrose affects heart function. In addition, the researchers discovered that blocking this cellular mechanism prevents sucrose-related heart problems. comments powered by
<urn:uuid:fa9d96c1-15de-4f04-972e-0e62de3a2352>
CC-MAIN-2016-26
http://www.biospace.com/News/diabetic-fruit-flies-support-buzz-about-dietary/285048/Source=TopBreaking
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398628.62/warc/CC-MAIN-20160624154958-00050-ip-10-164-35-72.ec2.internal.warc.gz
en
0.916258
115
3.046875
3
Antarctica is the last untouched continent, making it a desirable destination for the intrepid traveler. It has no indigenous people, no politics and no economy, yet it covers almost 10 percent of the earth's surface -- making it 1.5 times the size of the United States. Overwhelming and awe-inspiring, it has a raw, emotional effect on visitors that few destinations match and is often described as "visiting another planet." Still, only 35,000 tourists visit each year -- a small number compared with Alaska's 1 million cruise visitors. The history of Antarctica's exploration includes Robert Scott and Roald Amundsen's famous race for the South Pole, as well as one of the greatest survival stories of all time. In 1914, Sir Ernest Shackleton and his crew set sail aboard Endurance on a quest to be the first to cross the southernmost continent over land. They abandoned their attempt when the ship was trapped in sea ice, but incredibly, thanks to Shackleton's courage and determination, all crewmembers survived. Show Cruise Prices Today, cruise ships visit just the tip of the iceberg compared with the voyages of the great explorers. Most ships travel just to the South Shetland Islands and the 1,000-mile-long Antarctic Peninsula. (Fewer passengers reach South Georgia, located 800 miles to the northeast of the peninsula, and only a handful venture deep into the Ross Sea on the other side of the continent.) Typically, one-third of all visitors come from the U.S., with Australian travelers ranking second and Chinese tourists third. U.K. and German adventure-seekers follow closely behind. For wildlife lovers, few destinations can match "The White Continent." Of course, everyone comes to see the penguins, which thrive in raucous colonies that may consist of tens of thousands of birds. Three types of penguins -- chinstrap, gentoo and Adelie -- are all common along the peninsula. Larger, and arguably more beautiful, king penguins are rarely seen on the peninsula but are found in vast colonies in South Georgia. Sightings of emperor penguins, which can reach 3 feet tall and weigh more than 80 pounds, are unlikely, although occasionally they can be found near the Weddell Sea or on ice in the far south of the peninsula. Many other creatures thrive there, too. Antarctica has a large concentration of marine wildlife, with six species of seals and at least nine types of whales. Seals are commonly found on the beaches and lazing on ice floes, and you'll commonly spy humpback whales and killer whales in the height of the summer. (For more awesome wildlife, check out our slideshow on Antarctica Wildlife). The cute penguins aside, many visitors leave with their most vivid memories being the abundant ice and remarkable scenery. Icebergs come in a variety of shapes and textures -- some stark while, others a deep, mournful blue -- and huge glaciers line the horizon. Most impressive are the immense tabular icebergs that break off from frozen ice shelves in huge chunks. Sometimes stretching for miles, they are imposing and powerful reminders of the vastness of the continent itself and the unmatched power of nature. Best Time for Antarctica Cruises The Antarctic summer and cruise season begins in November and ends in March. No tourist ships visit in the austral winter, when pack ice extends more than 620 miles around the continent and it is dark almost all day with temperatures rarely exceed freezing. December and January are traditionally the most popular time to visit the Antarctic Peninsula, when daylight lasts the longest and temperatures reach their most comfortable. By mid-December, the first penguin chicks emerge and whales start to arrive. In January, whales are in abundance (and remain so throughout the season), and the ice slowly begins to recede, which allows more exploration farther south. By February, nights are noticeably longer, and by the end of the season, winter's imminent arrival is felt. You'll experience a wide variety of weather conditions -- rain, snow, sleet and sunny skies -- no matter when you go. Temperatures can change by the hour, ranging from relatively mild in the high 30s to freezing and below (plus a significant wind-chill factor.) South Georgia's climate is milder, and the season stretches from mid-October until March. Many visitors prefer to come in mid-October or November, before aggressive fur seals take over the beaches and while the massive bull elephant seals can be seen in large numbers. Antarctica Cruise Lines Antarctic travel began in the late 1960s when Lars-Eric Lindblad pioneered commercial expedition travel. For a few decades, only a handful of specially built ships ventured south. In the 1990s, expedition cruising began to boom, and today, you'll find a variety of ships, sizes and prices. Size is the most important factor in choosing your type of experience. IAATO (International Association of Antarctica Tour Operators) guidelines dictate that ships carrying more than 500 passengers cannot land passengers ashore. Larger ships from Holland America, Crystal Cruises and Azamara Cruises, for example, instead spend several days scenic cruising with no landings. Most expedition ships, however, are much smaller, carrying fewer than 200 passengers and utilizing inflatable landing craft (usually Zodiacs) so that passengers can venture off the ship to set foot on land. The smallest vessels are run by lines like Aurora Expeditions, Oceanwide Expeditions and Antarpply Expeditions, while the more well-known sailings tend to be on the mid-sized ships of Hurtigruten, Zegrahm Expeditions, Lindblad Expeditions, Quark Expeditions, G Adventures and Noble Caledonia. With the strong interest in Antarctica, the traditional image of an expedition ship -- with an ice-strengthened hull and utilitarian appearance placed above creature comforts -- has given way to a more refined and luxurious product. Silversea sends its Silver Explorer every year, and Ponant makes voyages with its Le Boreal-class ships. Even Seabourn has entered the market, sending the specially outfitted Seabourn Quest each season. Antarctica Cruise Itineraries Most Antarctica itineraries (and fares) include charter flights to the cruise port of Ushuaia, Argentina, from (and back to) Buenos Aires, Argentina or Santiago, Chile. There is generally an overnight scheduled at a hotel in Buenos Aires or Santiago on the way to the cruise. Once you reach Ushuaia, there are two primary options for your actual cruise: Classic Antarctica: Most expedition ship itineraries last nine to 12 nights and visit the South Shetland Islands and the Antarctic Peninsula. South Georgia and the Falklands: Sailings from 15 to 22 nights on expedition ships add the Falkland Islands, where you can visit large albatross colonies and learn about the 1982 Falklands War between Argentina and Britain. The voyage continues on to the wilderness mecca of South Georgia, where you can watch four-ton elephant seals battle on beaches, and history buffs can pay respects at Shackleton's grave. Around Cape Horn: In the large-ship, conventional cruise category, the journey to Antarctica is usually a six-night portion of a two-week around-the-horn South America cruise. Remember, you won't have the opportunity to get off the ship in Antarctica. No matter what ship you choose, where you go depends on weather conditions. If it's too windy and dangerous to land the Zodiacs at one spot, the captain will sail to another landing. The idea of a scheduled itinerary with defined port calls simply doesn't exist in Antarctic cruising. Whether you choose a large or a small ship from South America, there's almost no getting away from sailing across the notorious Drake Passage -- roughly 36 to 48 hours of often choppy seas and gale-force winds. There's a reason it's called expedition cruising. The area is nicknamed the Drake Lake on calmer days and the Drake Shake on wilder days. Come prepared with a supply of seasick patches, but remember that Antarctica is well worth a few days of discomfort! For those who just can't stomach the idea of the Drake Passage, Quark Expeditions and Antarctica XXI offer options to fly to and from the South Shetlands and pick up your ship in Antarctica. Antarctica XXI offers sailings as short as four nights. Be aware, however, inclement weather can sometimes delay flights. Antarctica Cruise Port Highlights Antarctic landings are unlike anything you will experience on a regular cruise. There are no cafes, no shops, no towns and no people, except at a handful of research stations. Most ships drop anchor and take passengers by Zodiac to roughly the same landing spots (although a few more adventurous companies get off the beaten . These are some of themore commonly visited landings: Deception Island. An active volcano with black ash, Deception Island is one of the most popular landings, and when arriving through Neptune's Bellows -- a 200-meter-wide gap in the wall of the caldera -- it's easy to see why. On the shore is an abandoned British Antarctic survey base and crumbling boilers from a Norwegian whaling operation. It's a great hiking spot, and from the higher peaks, you may be lucky enough to spot a pod of humpback whales in the sea below. The volcanic activity means a trickle of warmer water can often be found -- prompting many visitors to jump in for a (very quick) swim! Elephant Island. Habitat for chinstrap and gentoo penguins, this is where Shackleton's crew was stranded while he took five of his men in search of help. The men were eventually rescued from the island but only after spending a grueling winter there. Landing at the campsite is almost never possible; if conditions are good, expect a Zodiac cruise around the area instead. Port Lockroy. A British station on Wiencke Island was secretly established by Prime Minister Winston Churchill during World War II to report enemy activity and provide weather reports. Now, the rustic building is like a time capsule from the 1960s, complete with original tins of food in the kitchen and peeling painted pin-ups in the bedroom. Managed by the Antarctic Heritage Trust, it is manned and maintained by a small team each summer. The building is part museum and part shop, so get your cash ready. There's a great selection of souvenirs, and you can even send a postcard. Half Moon Island. This crescent moon-shaped South Shetland island is the site of an Argentine research station, and you'll find the wreck of an old wooden whaling boat on its shores. It is home to a large chinstrap penguin colony, as well as nesting Antarctic terns and kelp gulls. You'll also find fur and elephant seals lazing on the beach or ferociously fighting in the surf. The Lemaire Channel. This is one of the most spectacular and photographed waterways on the planet. It's obvious why it is nicknamed Kodak Gap as you glide through clear sapphire seas among mountain peaks capped with pristine white snow and ice-blue bergs. This is not a landing, but the Zodiacs may be lowered for seal-spotting and taking photos of the ship. Antarctica Cruise Tips Day tripping. It is possible to visit Antarctica for a few hours without going by sea. On a limited number of South American cruises, such as Victory Adventure Expeditions, you can book shore excursions (weather permitting) from Punta Arenas, Chile. Flights are 2.5 hours each way, and you can spend approximately four hours on King George Island in the South Shetland Islands. You won't get to see all the amazing scenery that you would on a cruise, but you'll still have opportunities to see penguins and get significant bragging rights. Crystal Cruises offers a similar excursion departing from Ushuaia, Argentina, and including an overnight at a Chilean base. The excursion costs $13,965. Extending your trip. One night isn't nearly enough time to explore the vibrant departure cities of Buenos Aires and Santiago. It pays to add a few days -- or even a week -- on your own. You won't regret it. What to pack. Essential clothing for Antarctica includes a winter coat (although many companies provide complimentary parkas), waterproof trousers (to keep you dry while riding in a Zodiac), two pairs of warm gloves (again, one to keep dry when the other pair gets wet) and a wool hat. You will also be lost -- not to mention wet and cold -- without a pair of knee-high rubber boots (for all landings). Several companies team up with Ship to Shore Traveler to allow passengers to rent essential gear such as trousers, boots and walking sticks, so check with your cruise line to see whether that is an option. You'll also need thermal underwear, heavy socks, sweaters and wool pants or sweatpants (to wear under your waterproof layer). If you find that buying all this gear adds up, you can either rent it from a snow-and-ski or adventure store or order it online from Antarctic Equipment in Ushuaia to pick it up before you embark. Even if you are not a keen photographer, it's worth investing in a decent camera to capture what could be the most spectacular scenery and wildlife you will see. And if you have them, take binoculars. You won't need hiking boots, as you will always go to shore in your rubber boots. A waterproof backpack to carry photography gear in the Zodiac is also recommended. (For more ideas, see our Ultimate Guide to Packing for a Cruise). Travel responsibly. IAATO (International Association of Antarctic Tour Operators) is an organization founded to advocate, promote and practice safe and environmentally responsible private-sector travel to the Antarctic. The continent is still unspoiled, and it's vital to keep it that way. So, before you go, clean and examine clothes and equipment thoroughly for dirt and other organic material. --Updated by Ben Lyons, Cruise Critic Contributor>
<urn:uuid:444e32b4-d6c4-4ecc-92c7-c29eb4eb3a87>
CC-MAIN-2016-26
http://www.cruisecritic.com/articles.cfm?ID=1348
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783403825.35/warc/CC-MAIN-20160624155003-00009-ip-10-164-35-72.ec2.internal.warc.gz
en
0.94175
2,940
3.140625
3
I started indulging an interest in ancient history a couple decades ago. This is an example from a larger article I have been working on but can't seem to get complete. The issue is living water. To us water moves because of gravity. It flows downhill. There is nothing special about that. It also had to be incredibly obvious to the ancients that is what was going on although in long rivers like the Nile it might not have been so obvious but even they knew of the cataracts where water flowed downhill. The incredibly accurate slope of the Roman aqueducts over tens of miles shows they not only understood the idea but had mastered everything there was to know about it. Yet moving water was living water and distinct from water that did not move. Living water had a spirit. Living water had a religious significance. Consider baptism can only be done with moving, aka living, water, the water of life. And stagnant water was swamp, dead water than smelled of decay. Stagnant water was undrinkable compared to the moving water of life. It is associated with death and disease. Although our connection is much different as to cause it is the same correct association. If you get your head around this idea you can get to their general idea that things which move are alive or evidence of the action of living things. Clouds, wind, rain, tides, occasionally the earth, lightning, all are alive. To the credit of the ancients the nebulous living things like winds had rather nebulous gods to go with them. Lightning and storms get gods, the gentle breezes not so much. Yet to us moderns living means something entirely different as in breathing, heart beat, green not brown. The issue is not understanding our ancestors. The issue is we cannot look at the world and perceive it as our ancestors. We cannot perceive moving things as living just because they move. Our view of living is much narrower than their view. Thinking is observing and connecting observations and drawing conclusions. We look at non-living moving things and connect them with inanimate causes. Our ancestors would look at the same things and connect them with other living things. We cannot do that. We might think about it and imagine connections but they do not pre-exist in our heads. We cannot think like them. What would be a "perfectly natural" connection for them leaves us scratching our heads on how and why they made the connection. But as with aqueducts and swamps even though the foundational concepts were completely different they lead to general successes. Running water in Roman cities brought life to the cities. It was not a metaphor for them. It was a direct reference to moving, living water. The moving waters of the Nile brought life to the land which then grew food which bought life to people. I don't see the connection but in point of fact farmland today produces more food than at any time in the past. Obviously this quality thing has not mattered at any time in the last 6000 years because the human population has been increasing. Who really believes the pre-industrial global climate was the best of all possible global climates and not one degree warmer? From anyone who claims that, which is all the melters, I am afraid I am going to have to ask for evidence not mere assertion. We can only go by results. IF we were to stop using the fertilizers and fossil fuels we would condemn a billion or more to death by starvation. So we continue as we are and look for solutions before the fuels run out or we stop now and take responsibility for the mass starvation as a matter of choice. Do you have a third choice? And after it is all stopped at huge cost we discover warmer is better. Melters know the best of all possible global climates was in 1850 because it was "natural." Please tell me how you know for a fact and the physical evidence it is based upon that warmer absolutely cannot be better than it was in pre-industrital times. Upon what basis do you declare that to have been the best of all possible climates? 400? What makes numbers with zeroes significant? Why not 412 or 393? A world like the good old days with a temperate climate pole to pole sounds pretty good to me. What is your problem with it? We evolved in the tropics. Tropics are good for us. Ten times and more die in the cold of winter than that heat of summer. I can't help but think of the mixed bag which is Monsanto. It had undoubtedly contributed hugely to feeding the world on the one hand, but it has had an equally huge role in promoting monoculture and the crime (to my mind) of patenting genes and species. Monoculture produces more food. We need more food. What is the problem? The problem is that monocultures are far more vulnerable to disease due to lack of genetic diversity. For example: The current banana, the Cavendish, is a replacement for a previous variety, the Gros Michel which was wiped out by a fungal infection. Right now the Cavendish is in danger of being wiped out in turn (and has been in several Asian countries) by a new strain of fungal infection which it has no resistance against. And since all of the Cavendish plants are genetically identical (a monoculture), it cannot evolve a defense. It is possible that in 10-20 years the banana (Cavendish type that most in Europe and the US are familiar with) will no longer be available, following the Gros Michel into oblivion. That's the problem. That might be a concern to Chiquita and likely a similar case could be made for the pomegranate but neither is a significant food source. Plantains are not bananas. Several grains with dozens of varieties each are the basis for our food supply. I still do not see a problem. This article will give you lots to think about regarding monoculture. Monsanto has gone after farmers, some of them rather small-time, for patent infringement when some of the genes they have developed end up in the farmer's crop across the road or down the road from a field where Monsanto seeds have been placed. I guess you can't sue bees for pollenating or the wind for blowing seed, so they go after the farmer for patent infringement (there are lots of articles to google over this issue). Sadly, the Supremes have sided with Monsanto in several lawsuits, perhaps trapped by prior patent decisions, including their own which allowed for the patenting of the products of genetic engineering. I suspect some on the court are looking back and wishing they had decided differently, but the Supremes seldom reverse themselves, so it might take an entirely changed over court 50 years from now to reverse that deicision, or at least revise it. But still no one will tell me what is wrong about producing more food than we ever have before in human history. Bananas? Who is going bananas over that? Also, when I go to the market, there is a wide variety of apples, which is wonderful: Macintosh, Gala, Fuji, Red and Green Delicious, Granny Smith, and several others. However, they are just the tip of the iceberg. The apple, which hails from Eastern Europe originally, has given birth to a wide variety of choices. Yet, apparently we have to live with just one variety of banana in the grocery store. Should I be happy about that? Maybe I'd choose the type of banana currently being sold if given a choice, but where is the choice? When I get a Wayback machine or a TARDIS I might do something about that. Other than that I have no idea how to change the past. although I doubt very, very strongly that it could have been millions. However I do not like people complaining about paying people in other countries what is a fair wage in those countries. That is the price every country has paid for advancement including Britain and the US. In all cases farm labor is the most dangerous of all even in the US today and there are no child labor laws for US farmers. Why can't people today think in terms of reality instead of causes?
<urn:uuid:ccbfe5ed-efe1-48db-8ae5-3fc5184801de>
CC-MAIN-2016-26
http://www.thinkatheist.com/forum/topics/we-cannot-think-like-our-ancestors
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397842.93/warc/CC-MAIN-20160624154957-00178-ip-10-164-35-72.ec2.internal.warc.gz
en
0.977223
1,694
2.578125
3
Flooding, fog, shipwrecks, thunderstorms and heat top the list of Michigan weather events on this day in history. From the National Weather Service and Storm Prediction Center (SPC) archives here are the events that happened on August 26. 1816 - An unnamed Montreal canoe, while carrying cargo and prisoners, capsized while under sail in a storm in Whitefish Bay in Lake Superior. Some of the lost were reportedly prisoners being transported. 10 people perished. 1870 - The wood schooner Thornton, while carrying ore, sprang a leak in heavy weather in a gale and foundered near the foot of Cockburn Island, Ontario 15 miles southeast of False Detour passage in Lake Huron. Her crew took to the yawl and watched as the schooner broke up due to the release of confined air in the hull and went down. It was claimed that she was very unseaworthy at time of loss. 1875 - The package and bulk freighter Comet, was carrying ores, pig iron and sacks of wool. While trying to pass the Beatty Line steamer Manitoba on a foggy night, signals were misunderstood and Comet veered into the path of Manitoba and was rammed on the port side about 25 feet aft of the stem, cutting her nearly in two. She sank in 5 minutes or less 7 miles southeast of Whitefish Point in Whitefish Bay in Lake Superior and lies in 300 feet of water. Bound Marquette for Cleveland, 11 of 21 perished in this event. 1896 - The wood schooner, 3-mast Phineas S. Marsh, while carrying limestone blocks, was driven in by a gale and struck bottom near Crisp Point, MI in Lake Superior. Her crew took to the rigging as she sank, from whence they were rescued by the Lifesaving Service. She broke up soon after and was declared a total loss Aug 30. 1948 - The record heat of 1948 continues with record highs recorded across the state. Grand Rapids hits 95°, Muskegon 91°, Lansing 96°, Alpena 94°, Detroit 96°, Flint 95°, Houghton Lake 94°, and Sault Ste. Marie 92°. Grand Rapids, Alpena, and Detroit all tied their 1948 records in later years. 1970 - 1-inch hail was reported at 5:15pm from severe thunderstorms passing through Saginaw County. 1986 - Thunderstorms produced wind gusts of 64 mph in Genesee County. 2000 - Heavy rain and high winds produce scattered damage and some flooding. The roof of a bowling alley near Jackson was damaged by an apparent microburst. Roads were closed due to flooding across southern Kalamazoo County. 2003 –A derecho associated with a cluster of severe thunderstorms affected parts of Michigan and states eastward to Washington, D.C. Strong winds left hundreds of thousands of customers without power, just weeks after the Great Blackout of 2003. In West Michigan the strongest storms hit between 2 and 4 AM on the 27th with a gust of 60 mph reported in Vicksburg and numerous trees fall from the wind. Click here for a radar loop of the storms on this day. The attached slideshow has a few severe weather maps for the day. 2004 - Scattered showers and thunderstorms developed over Upper Michigan during the day on the 26th and continued overnight into the 27th. With the approach of a low pressure trough, some of the thunderstorms turned severe during the evening. In Marquette County, one storm dropped golf ball-sized hail just southeast of Harvey. Quarter sized hail (1 inch) was reported in Iron County 9 miles south of Crystal Falls as well as large branches broken off of trees.
<urn:uuid:3093bc7c-9113-41a0-abb7-69abb20a7ee0>
CC-MAIN-2016-26
http://www.examiner.com/article/flooding-fog-shipwrecks-thunderstorms-and-heat
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783392069.78/warc/CC-MAIN-20160624154952-00177-ip-10-164-35-72.ec2.internal.warc.gz
en
0.966025
766
2.65625
3
להיות עם חופשי בארצנו – To be a free people in our land We would suggest that a framing understanding of what Israel means to the Jewish People, boils down to four values as expressed in the penultimate line of Israel’s National Anthem. An exploration of the four elements might be at the heart of every Israel Engagement curriculum, the theme of Yom Ha’atzmaut celebrations, and the basis on which a ‘broad tent’ of Israel advocacy might be built. להיות – To be The way in which the creation of the State of Israel served and serves the survival or the Jewish people. To be in the sense of ‘exist’. It would likewise explore the idea of ‘normality’ that Israel was expected to engender. To be in the sense of ‘let it be’… עם – People The way in which Israel is connected to the Jewish People culturally, historically, religiously. Where Israel expresses its connection to the Jewish world and its meaning. At the same time this sub-theme would address the nature of Jewish collectivity. חופשי – Free The nature of freedom as embodied in the creation of the State. Not simply the freedom of Pesach, which celebrates a freedom from suffering and persecution, but also the very particular form of freedom that Statehood has brought: the freedom to take responsibility for oneself, the freedom to grant or refuse freedoms to others. Freedom would also refer to the freedom to create, to innovate, and to renew. בארצנו – In our land The specificity of Israel as a geographical, political, and historical entity with deep significance to the Jewish People. This sub-theme would also address the question of ownership: the proof of ownership and the expectations and responsibility of ‘owners’. Were we to remove the word People – עם – from this phrase, we would be left with what was the Meretz slogan in favor of the Gay Pride March in Jerusalem 2006. To be free in our land is a worthy aspiration that pays no heed to a shared Jewish collective. Were we to remove the word Free – חופשי – we might sum up the cultural non-military approach of R. Yochanan ben Zachai, establishing Roman protection of Yavneh’s scholars. And removal of In Our Land – בארצנו – would leave our theme with no reference to Israel! To our mind, the other advantage of this four-point organizing theme, is that it can give respect to unresolved questions and concerns. To what extent Israel has ensured the continued survival of the Jewish People (להיות), how far Israel has strayed from or developed its culture (עם), whether Israelis take full responsibility for their collective and individual actions (חופשי), and a Diaspora Jew’s connection to the land (בארצנו) – all these are issues that can be aired and housed within this overall structure. This four-point set of principles can also offer us an effective pathway into rejoicing, reflecting, and defending. For no matter how one chooses to define our current situation, the Jewish People is closer to normality and more equipped to survive and fend for itself than it was before 1948 (להיות), is more capable of acting as a collective (עם), more free than ever in history (חופשי), and living in the land of our forefathers (בארצנו). Looking at Israel through these principles, we can find reason for joy as well as reflection. As the first step in exploring the potential of this theme, we have created chevruta text studies around the 4 values.
<urn:uuid:70df893f-4b8b-4bce-ac18-fa1b7b8d3f8e>
CC-MAIN-2016-26
http://makomisrael.org/conceptual-frames/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393332.57/warc/CC-MAIN-20160624154953-00059-ip-10-164-35-72.ec2.internal.warc.gz
en
0.935414
826
2.921875
3
- Psychology & the public - What we do - Member networks - Careers, education & training Bullied kids affected for life Long-term health consequences are likely to be felt when a child is bullied at a young age. This is the suggestion of new research from the Crime Victims' Institute at Sam Houston State University, which found such victimisation can lead to both general and mental health issues in later life. Entitled The Long-Term Health Consequences of Bullying Victimisation, the study also showed bullying might result in behavioural problems, eating disorders, alcohol use and smoking. Leana Bouffard, director of the Crime Victims' Institute, described these after-effects as significant and substantial, adding they are much more far-reaching than immediate trauma and injury. Ms Bouffard stated: "Understanding these long-term consequences is important to assessing the true toll of crime on its victims and on society as well as responding to victims more effectively." She added addressing these issues might help to reduce the costs borne by the victims, the healthcare system and society in general. Chartered Psychologist Dr Mike Eslea said: "This work adds to a growing body of evidence that bullying has serious effects on the victims in both the short and long term. What’s more, we know that some of these effects can also trigger further bullying, so that victims are caught in a vicious circle of spiralling despair. This highlights the importance of effective anti-bullying intervention at the earliest possible stage.”
<urn:uuid:5350dc63-5d9b-4b07-a592-c094465e32ed>
CC-MAIN-2016-26
http://www.bps.org.uk/news/bullied-kids-affected-life
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395992.75/warc/CC-MAIN-20160624154955-00043-ip-10-164-35-72.ec2.internal.warc.gz
en
0.949905
315
3.171875
3
The eighth generation of a high-voltage LDMOS transistor process delivers high-power devices that are well suited to the needs of Doherty amplifiers for cellular base stations. Doherty amplifiers have risen from obscurity to become the architecture of choice for many wireless networks, from multicarrier GSM to Long Term Evolution (LTE) cellular systems. Most of these amplifiers rely on laterally diffused metal-oxidesemiconductor (LDMOS) field-effect transistors (FETs), which meet the performance, reliability, and cost requirements of this intensely cost-sensitive market. The transistors produced by the eighth-generation, high-voltage (HV8) LDMOS process from Freescale Semiconductor (www.freescale. com) have been optimized for use in Doherty amplifiers. To demonstrate what the process can achieve in gain, efficiency, and RF output power, a Doherty amplifier based on the MRF8S21100 100-W LDMOS FET has been designed and evaluated under typical operating conditions. For those unfamiliar with the Doherty amplifier, it was created in 1936 by W.H. Doherty of Bell Telephone Laboratories when he was trying to find ways to improve traveling-wave-tube-amplifier (TWTA) performance. The result was an architecture that inherently has very high power-added efficiency with input signals that have high peak-to-average ratios (PARs). There wasn't much call for these properties in the ensuing years because the predominant modulation techniques in mobile communication systems, such as frequency modulation (FM), Gaussian minimum shift keying (GMSK), and enhanced data rates for GSM evolution (EDGE), didn't require them. But modern requirements are much different, since every current or emerging wireless system including WCDMA, WiMAX, and LTE produces high-PAR signals. As a result, the Doherty amplifier is appealing to service providers that must increase efficiency and lower operating expenses, since it can deliver efficiency increases of 14 percent or more when compared to parallel Class AB amplifiers. A classic Doherty amplifier (Fig. 1) consists of two amplifiers: a carrier amplifier biased to operate in Class AB mode, and a peaking amplifier biased to operate in Class C mode. A power divider splits the input signal equally to each amplifier with a 90-deg. difference in phase. After amplification, the signals are recombined with a power combiner. When the amplifier's drive level is less than a specific value, only the Class AB carrier amplifier provides amplification and is presented with a load impedance that produces high efficiency and gain. When the input signal peaks (as is the case with high-PAR signals), the Class C peaking amplifier also begins to deliver amplification to handle the highest power output levels, and produces a load impedance that allows both amplifiers to provide the highest possible output power. However, a Doherty amplifier produces slightly less linearity and RF output power than a Class AB amplifier. Digital predistortion (DPD) linearization is typically used to restore linearity. Consequently, some transistor characteristics must also be optimized to maximize the linearity benefits brought by today's digital pre-distortion systems. Finally, in order to simplify the bill of material (BOM) for the amplifier, the same RF power transistor must be able to accommodate the requirements of both the carrier and peaking amplifiers. To optimize the HV8 process for Doherty amplifier service, Freescale focused on improving a variety of parameters, including power density (watts/mm of gate periphery), capacitance reduction (pF/mm of gate periphery), higher efficiency (power-added efficiency at 1-dB gain compression), and improved linearity. Compared to a similar-sized HV7 device, HV8 devices typically offer 15-to-20-percent higher watts/mm. This translates into reduced capacitance/watt and higher impedances, as well as improved broadband performance at a given power level. An HV8 device also has 1-dB gain compression efficiency that is 4-to-5-percent higher than an HV7 device, as well as improved raw and DPD-correctable linearity as reflected in AM/PM phase distortion one third to one half that of HV7 devices. Although HV8 device improvements offer better performance in traditional Class AB high-power amplifiers, the HV8 process has been tailored to dramatically enhance the linear efficiency in a Doherty amplifier configuration, which is the yardstick used by base station manufacturers to benchmark semiconductor vendors. To show how its HV8-based LDMOS FETs can deliver high performance in Doherty applications, Freescale has performed tests using the MRF8S21100H in symmetrical Doherty amplifiers that are typical of those in service in wireless networks. The MRF8S21100H transistor is housed in a standard NI780 package and has a power capability in excess of 100 W at +28 VDC drain voltage. The Doherty amplifier (Fig. 2), which uses two MRF8S21100H FETs, was subjected to a series of tests using multicarrier signals, since this has become the norm in high-data-rate applications, and presents a "worst-case" test scenario. The two 5-MHz carriers are separated with blanking in a "1 0 1" configuration that generates greater amounts of distortion and stresses the DPD circuit to ensure it can correct for nonlinearity. The stimulus signal has a 6.5 dB PAR, which is also realistic of typical crest factor reduction capabilities. Measurements were made with drive levels backed off 8 dB from peak power, since providing 1.5 dB headroom above the 6.5-dB PAR is the desirable operating condition for most DPD systems. At this level, gain of the amplifier across the band, from 2.11 to 2.17 GHz, was 15.5 dB, and amplifier drain efficiency varied from a minimum of 45 percent to a maximum of 47 percent at any point in the band (Fig. 3). The real-time DPD circuit corrects IMD3 products to -55 dBc or better across the band. The amplifier's RF output power is 35 W while maintaining high linearity, as shown in Fig. 4. The tests demonstrate what can be achieved using the MRF8S21100H in a typical Doherty amplifier and how LDMOS technology can be successfully optimized to deliver W-CDMA efficiency figures close to 50 percent without resorting to expensive semiconductor technologies such as GaN. The HV8 process clearly establishes a new performance/ price point and opens the door to additional reductions in power consumption by using more sophisticated Doherty amplifiers such as asymmetric and multistage configurations coupled with advanced DPD systems.
<urn:uuid:459ba8e3-97a7-46d3-a3ca-e1ab09c2d2c0>
CC-MAIN-2016-26
http://mwrf.com/components/ldmos-fets-power-efficient-doherty-amps
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783391519.0/warc/CC-MAIN-20160624154951-00020-ip-10-164-35-72.ec2.internal.warc.gz
en
0.932216
1,414
3.15625
3
Confronting Climate Change: An Early Analysis of Water and Wastewater Adaptation Costs Through 2050 Abstract:Climate change is here now and will likely alter the water cycle; affecting where, when, and how much water is available. Utilities responsible for providing water and wastewater services will clearly be affected by these impacts for their 20- to 40-year infrastructure planning horizons. Climate change impacts include, but are not limited to: (a) increased severe precipitation events (e.g., flood, drought), (b) increased water scarcity; (c) changes in snow melt patterns, and (c) sea level rise. Green and gray infrastructure adaptations to address impacts on water and wastewater management already are available, and will be refined over time. Through 2050, we estimate that the infrastructure and operations and maintenance costs for U.S.-based drinking water and wastewater services to adapt to climate change (above expected replacement costs) will range from 448 billion to 944 billion. Keywords: Climate change; climate adaptation cost impacts; climate adaptation strategies; emergency response and recovery; extreme hydrological events; utilities; wastewater treatment; water cycle; water treatment; wet weather Document Type: Research Article Publication date: January 1, 2011 - Proceedings of the Water Environment Federation is an archive of papers published in the proceedings of the annual Water Environment Federation® Technical Exhibition and Conference (WEFTEC® ) and specialty conferences held since the year 2000. These proceedings are not peer reviewed. WEF Members: Sign in (right panel) with your IngentaConnect user name and password to receive complimentary access. - Subscribe to this Title - Membership Information - About WEF Proceedings - WEFTEC Conference Information - Ingenta Connect is not responsible for the content or availability of external websites
<urn:uuid:266f379b-96a3-476e-bebd-1f93e324c4d8>
CC-MAIN-2016-26
http://www.ingentaconnect.com/content/wef/wefproc/2011/00002011/00000006/art00066
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396224.52/warc/CC-MAIN-20160624154956-00048-ip-10-164-35-72.ec2.internal.warc.gz
en
0.912601
365
2.6875
3
These talks on the Internet of Things (IoT) explore the concept of a connected network of physical objects and devices that are embedded with a variety of technology in order to collect and share data. While IoT enables the smart home and offers consumers more convenience, it also raises some concerns about individual security and artificial intelligence. In last year's CES technology keynote, Samsung CEO BK Yoon discusses the future of tech. He explains how IoT software is able to make consumer electronics more personalized, efficient and forward-thinking. In the realm of graphic design, Josh Clark talks on the Internet of Things and how it relates to user experience. He analyzes how recent advancements in technology paired with design can impact society in a variety of fields. On a more macro level, Jeremy Rifkin gives an innovative keynote on collaborative economics that covers how the Internet changed the capitalist system. 10 Talks on the Internet of Things More Stats +/- Technology as a Tool The Magic of User Experience The Future of Tech Utilizing Smart Materials Get inspired by our collection of 2,000+ keynote speaker videos and 100+ courses of innovative content. From the Magic of User Experience to Collaborative Economies Jan 29, 2016By: Alyson Wyers -
<urn:uuid:e46562c3-4e7b-4f90-b6ce-57f6caf6950e>
CC-MAIN-2016-26
http://www.trendhunter.com/course/talks-on-the-internet
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397795.31/warc/CC-MAIN-20160624154957-00012-ip-10-164-35-72.ec2.internal.warc.gz
en
0.855759
256
2.796875
3
The results of the small study need to be confirmed in bigger trials, though, say the researchers from the University of Birmingham in the U.K. The study team recruited 84 obese adult volunteers through their doctors. Everyone received a weight-management consultation that covered lifestyle changes, better diet choices, and the benefits of more exercise. Then the researchers randomly split the participants into two groups. They asked one group of 41 volunteers to drink 500 milliliters (about 16 ounces) of water half an hour before meals. Sparkling water, carbonated drinks, or sweetened drinks were not allowed. The other 43 participants were just advised to imagine they were full before eating. After being tracked for 12 weeks, with a phone consultation after 2 weeks, the water-before-meals group lost an average of 2.87 pounds more than those who just imagined being full. People who loaded up on water before all three main meals a day lost an average of 9.48 pounds. Doing that just once a day, or not at all, resulted in an average loss of 1.76 pounds. The findings are published in the journal Obesity. "The beauty of these findings is in the simplicity. Just drinking a pint of water, three times a day, before your main meals may help reduce your weight," says Dr. Helen Parretti, one of the study authors, in a statement. "When combined with brief instructions on how to increase your amount of physical activity and [get] on a healthy diet, this seems to help people to achieve some extra weight loss -- at a moderate and healthy rate. It’s something that doesn't take much work to integrate into our busy everyday lives." The study team now wants to carry on the research in a bigger trial with more volunteers.
<urn:uuid:164aed02-abe4-4156-87b6-678ccd8d809e>
CC-MAIN-2016-26
http://www.webmd.com/diet/obesity/20150828/water-weight-meals-obesity
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399428.8/warc/CC-MAIN-20160624154959-00020-ip-10-164-35-72.ec2.internal.warc.gz
en
0.965873
367
2.59375
3
The Ten Most Common Infections - Diarrhoeal diseases - About 4 billion episodes in 1995. - Tuberculosis - About 1.9 billion carry the tuberculosis bacilli; 8.9 million new cases in 1995. - Intestinal worms - About 1.4 billion infected at any given time. - Malaria - Up to 500 million new cases in 1995. - Hepatitis - About 350 million hepatitis B chronic carriers, and about 100 million hepatitis C chronic carriers. - Acute lower respiratory infections - About 395 million episodes in 1995. - Sexually transmitted diseases - At least 330 million new cases in 1995. - Measles - 42 million total cases in 1995. - Whooping cough - 40 million total cases in 1995. - Meningococcal meningitis - About 350 000 new cases in 1995.
<urn:uuid:f9715ae4-6803-4e6f-b423-b92b5726c7b9>
CC-MAIN-2016-26
http://www.who.int/whr/1996/media_centre/press_release/en/index2.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393533.44/warc/CC-MAIN-20160624154953-00038-ip-10-164-35-72.ec2.internal.warc.gz
en
0.673775
177
3.171875
3
757-864-9886, 344-8511 (mobile) NASA Langley to Offer Vision of New Era of Aviation at Suffolk Fly-In HAMPTON, Va. -- NASA will help visitors imagine the future of flight at this weekend's fly-in in Suffolk, May 22-23. Engineers and others from NASA's Langley Research Center in Hampton will be part of a special NASA display at the Virginia Fly-In at the Suffolk Municipal Airport also known as the Suffolk Executive Airport. The exhibit, sponsored by Langley's Aeronautics Research Directorate, is designed to interest students in aviation. It will be near the fly-in's "Youth Area" and will feature hands-on activities including an X-plane flight simulator. Kids and their parents will also be able to check out models of futuristic aircraft and displays that show what NASA engineers predict for the future of flight, including the possibility of personal air vehicles that may some day make flying as common as driving. Speakers from NASA Langley and partner organizations will also be at the display to talk to visitors about NASA and its research, how airplanes fly, how spacecraft work and what's next for air and space travel. NASA's Langley Research Center is the country's first civilian aerospace laboratory, with more than 90 years experience in aerospace innovation. According to aviation experts, the aeronautics industry was essentially built out of NASA Langley, and the U.S. space program also started there, including the initial training of the original Mercury 7 astronauts. Langley remains one of NASA's best-known space, aviation and climate change research facilities. For more information about NASA's Langley Research Center, please go to: For more about the Mid-Atlantic Fly-In and Sport Aviation Convention, visit: NASA Langley press releases are available automatically by sending an e-mail message to email@example.com with the word subscribe in the subject line. You will receive an e-mail asking you to visit a link to confirm the action. To unsubscribe, send an e-mail message to firstname.lastname@example.org with the word unsubscribe in the subject line. - end - text-only version of this release
<urn:uuid:b794e019-6ced-4ebb-b811-e746141fc565>
CC-MAIN-2016-26
http://www.nasa.gov/centers/langley/news/releases/2010/10-040.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396872.10/warc/CC-MAIN-20160624154956-00174-ip-10-164-35-72.ec2.internal.warc.gz
en
0.905618
471
2.65625
3
Science brain teasers require understanding of the physical or biological world and the laws that govern it. When you convert from an English measurement to a Metric measurement, you multiply by a number. For example, to find out how many kilograms are in 10 pounds, you multiply 10 by .454. To find out how many meters are in 10 yards, you multiply 10 by .914. This is the procedure for every conversion except for one. When you convert from Fahrenheit to Celsius, you subtract 32 and multiply by 1/9. Why does the temperature conversion require a subtraction and a multiplication, while all the other conversions require just a multiplication? HintCompare the zeros. For distance, weight, and every other measure, a result of zero is the same no matter what the units are. The temperature scales, however, have arbitrary zeros. This means that 0 degrees Celsius and 0 degrees Fahrenheit are not the same temperature. (As an interesting side note, the Kelvin and Rankine scales both have their 0 degrees set to Absolute Zero, so you can convert from one to the other with a simple multiplication.) Oct 11, 2010 |Well, actually, you subtract because Celsius sets the freezing point of water as 0º and Fahrenheit sets it at 32º. likewise, the boiling point of water is 100º C, 212º F. | The 180 point difference in F as opposed to the 100 point difference in C yeilds the constant - and it's 5/9 from F to C, not 1/9. Conversely, you multiply by 9/5 going form C to F. Jan 06, 2011 |Huh, it's quite obvious when you knoew the answer | Jan 31, 2012 |I didn't get the exact answer, but I do know, if you graph the resulting conversions as linear functions, each line has a unique slope. This means there is a non-linear relationship between the two conversions. Also the two lines intersect at the point (-40,-40) so -40 degrees F= -40 degrees C| Jul 28, 2013 |If you have a decent understanding of the temperature scales, this isn't much of a teaser, just asking an everyday question. But hey, not everyone does have a good understanding of it, so I'm sure some people learned something here | Dec 23, 2014 |An interesting corollary is to ask, Why did Dr Fahrenheit set the zero on his scale where he did? Several answers have been suggested, but the most plausible seems to be that he was an experimental chemist and he set his zero to be the coldest termperature that he could conveniently make in his laboratory. Since he was working before modern methods of refrigeration, this was achieved by mixing ice and salt.| Jan 08, 2015 |I asked my physics teacher a teaser like this before, it was amusing to see him getting frustrated after I told him that the answer was simple, it still took him ten minutes to figure out and then he was embarrassed he didn't get it sooner. Good times.| Back to Top
<urn:uuid:71733aae-6215-4bd2-8612-1a082baf32a0>
CC-MAIN-2016-26
http://www.braingle.com/brainteasers/teaser.php?id=47847&op=2&comm=1
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396106.71/warc/CC-MAIN-20160624154956-00037-ip-10-164-35-72.ec2.internal.warc.gz
en
0.959342
638
3.9375
4
Operation Barbarossa - Holocaust Survivors Remember Chana Weismann was born in 1929 in Kovno, Lithuania to a family of two children. In June 1941, German forces began bombing Kovno and Chana's family fled in the direction of the Vilna Bridge. Discovering that the bridge had been bombed, they had no other choice but to return to Kovno. On their way back to Kovno, the family members separated, in order to draw less attention to themselves. Chana and her father were caught by the Lithuanians and were taken to the Seventh Fort, a fortress in the adjacent city. Chana was separated from her father, but soon after met with her mother, who had arrived at the Seventh Fort after having realized that her husband and daughter had been captured. A few days later, Chana saw a group of men, her father among them, being led in the direction of the killing pits. During the night, Chana heard the echo of shots from the direction of the pits and understood immediately that her father was no longer among the living. A few days later, Chana and her mother were transferred to the Ninth Fort where they were held for two days before being relesed along with the other women and children. In 1941, Chana, along with her mother, brother and their extended family were transferred to the ghetto in the Slovodca neighbourhood. In one of the actions in October 1943, Chana and her family were deported to Estonia, to a camp where they suffered from freezing cold, extreme hunger, and extremely poor sanitary conditions. After half a year the family was transferred to the Kivioli labor camp. During one of the actions in the camp Chana’s mother was taken away, along with many others, and was shot to death in the forest. A few months later, Chana was deported with her brother to the Stutthof camp in Germany. There, Chana managed to survive two children's actions, the first time by escaping and the second time due overcrowding of the crematorium. Following Stutthof, Chana was transferred to several camps, of which the last was Bergen-Belsen, where she remained until the camp was liberated in May 1945. Her brother was sent from Stutthof camp to Steinberg camp, also ending up at Bergen-Belsen, but died shortly before the camp was liberated. In 1947, Chana immigrated to Israel. She is married and has two children and three grandchildren.
<urn:uuid:af1cea47-555d-4da2-9146-3baf20c08a77>
CC-MAIN-2016-26
http://www.yadvashem.org/yv/en/holocaust/barbarossa/weismann.asp
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398873.39/warc/CC-MAIN-20160624154958-00175-ip-10-164-35-72.ec2.internal.warc.gz
en
0.992553
517
3
3
Contact: Paul Quirk, +1-202-572-2879, +1-202-549-5394 (cell), Paul.Quirk@gmmb.com. Edition provides significant contribution to the understanding of rotavirus and focuses needed attention on the most deadly cause of diarrheal disease Seattle, November 5, 2009—The Journal of Infectious Diseases has released a special edition, Global Rotavirus Surveillance: Preparing for the Introduction of Rotavirus Vaccines. This special edition provides a significant contribution to the understanding of rotavirus disease burden and the impact of rotavirus vaccines, which have the potential to save an estimated 228,000 lives annually. As the leading cause of severe diarrheal disease, rotavirus exacts a tremendous toll on health systems, particularly in the world’s poorest countries. In addition to compiling data on rotavirus incidence from around the globe, this collection of scientific articles also covers strain diversity, the need for continued disease surveillance, and vaccine cost-effectiveness. The release of these pivotal data comes on the heels of the World Health Organization’s (WHO) June 2009 recommendation that vaccines preventing rotavirus—the most common and lethal form of diarrheal disease—be included in every country’s national immunization program. Rotavirus is responsible for the death of more than half a million children under age 5 annually and causes approximately 40 percent of diarrhea-related hospitalizations. Nearly every child in the world, regardless of socio-economic status or geographic location, will contract rotavirus by age 3. However, its burden is disproportionally felt in developing countries in Africa and Asia, where rotavirus is often fatal because children cannot access emergency care. “Rotavirus is one of the most deadly diseases children in the developing world face,” said Dr. John Wecker, director of the Vaccine Access and Delivery Global Program at PATH. “Vaccination holds the key to making it one of the most preventable diseases.” Regional surveillance networks have generated rotavirus disease and strain burden data in nearly 60 countries since 2001, demonstrating tremendous burden and supporting the need for widespread rotavirus vaccine use. The WHO has advocated for the global introduction of rotavirus vaccines as a key component of the strategy to reduce child deaths from diarrheal disease—the second leading killer of children today. “As these articles demonstrate, the burden of rotavirus is felt worldwide,” said Marc-Alain Widdowson, epidemiologist at the U.S. Centers for Disease Control and Prevention and lead author of the introductory article in the special edition. “The global health community must work together with public and private sector partners to help every country use available interventions—including vaccines—to stop child diarrheal disease deaths.” Vaccines preventing rotavirus have been licensed in more than 100 countries, many of which are in the industrialized world, and their routine use is dramatically reducing severe infections. The vaccines have not yet reached many of the places where the rotavirus burden is greatest—especially in the developing countries of Africa and Asia. “Vaccines are the best way to prevent rotavirus-related hospitalizations in industrialized countries and to avoid unnecessary child deaths in places where access to medical care and lifesaving interventions may be limited,” said Dr. Duncan Steele, senior technical advisor for PATH’s Vaccine Development Global Program and co-author of the introductory article in the special edition. Steele started his work on the article while at the WHO’s Initiative for Vaccine Research. Today, two orally administered vaccines preventing rotavirus, Rotarix™—produced by GlaxoSmithKline Biologicals, and RotaTeq®, produced by Merck—are available, and new vaccines are in development. The WHO recommendation on global use of these vaccines was based on large-scale clinical trials demonstrating vaccine efficacy in impoverished, high-mortality settings. It builds on a 2006 recommendation to include rotavirus vaccines in the national immunization programs of countries in Europe, Latin America, and North America. Informed by the WHO decision, the GAVI Alliance has committed to providing eligible countries with financial support for rotavirus vaccine introduction and is currently accepting applications.
<urn:uuid:8db9c3cf-b42b-46f0-b330-51a8d69b10dd>
CC-MAIN-2016-26
http://www.path.org/news/press-room/367/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402479.21/warc/CC-MAIN-20160624155002-00177-ip-10-164-35-72.ec2.internal.warc.gz
en
0.9182
893
3.0625
3
Gregory Bateson uses this term to describe progressive differentiation between social groups or individuals. For example, if two groups exhibit symmetrical behaviour patterns towards each other that are different from the patterns they exhibit within their respective groups, they can set up a feedback , or "vicious cycle" relation. For example, if boasting is the way they deal with the other group, and if the other group replies to boasting with more boasting, then each group will drive the other into excessive emphasis on the pattern, leading to more extreme rivalry, and ultimately to hostility and the breakdown of the system. (Steps towards an Ecology of Mind, p. 68) An arms race is another symmetrical form of schismogenesis. Schismogenic patterns can also be complementary, such as responding to assertion with submission, and again will lead to distortions of personality, mutual hostility, and the breakdown of the system.Reciprocity, on the other hand, can be compensated an balanced within itself and does not tend towards schismogenesis. The topic of research in both types of schismogenesis is the mechanism serving to exacerbate or restrain the escalation, in more general terms, it is "the reaction of individuals to the reactions of other individuals." After his exposure to the Macy Conferences, Bateson adopted the language of cybernetics pertaining to circuits of positive or negative feedback. In his first major anthropological study, Bateson studied the Iatmul tribe in New Guinea. From his fieldwork, he concluded that an Iatmul village is nearly perpetually threatened by fission of the community because it is characteristic that intense and growing rivalries occur between two groups. It puzzled Bateson that usually the community does not disintegrate. He found that one elaborate event heading off a blowup is the elaborate "Naven" ceremony which entails tranvestism and buffonery. (S. J. Heims) When Bateson and Margaret Mead studied Balinese culture, they found it strange because nearly all kinds of schismogenesis were absent. According to Bateson, "schismogenic sequences were not found in Bali." (p.112) Instead a "continuing plateau of intensity" was substituted for climax. Unlike most societies, the Balinese seek a "steady state" or "plateau," (a usage adopted by Deleuze and Gauttari in Mille Plateaux) instead of the cumulative experiences of tension and release which Bateson calls schismogenic. Schismogenic behaviors, when put into equations (!) and graphed as curves, are "bounded by phenomena comparable to orgasm." They reflect conscious or unconscioius hopes for release of tension through total involment. (p.111) Bateson sees this basic human characteristic as making man prone to struggle and often as a potent factor for war. (and also for love.) (see also pleasure) D.W. Winnicott describes "transitional phenomena," such as both culture and play, in much the same way as Bateson and Mead. In "The Location of Cultural Experience," he writes that transitional phenomena "have no climax."
<urn:uuid:bef9609d-c2a5-4f09-a786-50cc821acd97>
CC-MAIN-2016-26
http://christianhubert.com/writings/schismogenesis.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783404405.88/warc/CC-MAIN-20160624155004-00025-ip-10-164-35-72.ec2.internal.warc.gz
en
0.956201
639
3.078125
3
Mapping festivals - Explore the global festival scene - How can I use Google Earth to find a place and place-mark its location? - How can Google Earth and Google maps be used to investigate the site and situation of a given festival? - Cultural understanding and diversity How can I use Google Earth to find a place and place-mark its location? Google Earth is a fantastic geographical data tool for locating and exploring different parts of the globe. By typing any destination into the fly to search box, Google Earth will take you to that location. Once there, you can drag the map, zoom in and out and explore the different layers. A place-mark can be attached to the map by clicking the add place-mark icon on the toolbar (a yellow pin). A screen appears, allowing the user to name their place-mark label and type in descriptive detail. The starter activity requires students to find the location of their allocated festival and place a labelled place-mark on the map in the correct place. A suitable scale should be decided upon by zooming in/out until the map shows some detail of the surrounding area (for example, coastline/border, major settlements in the region). A sample map at a suitable scale showing the location of the Rhythm and Vines Festival in New Zealand with a labelled placemark has been provided. Further details on the locations on each of the festivals is detailed below. Further information on Google Earth, including how to download the program, can be obtained from the Google Earth website. How can Google Earth and Google maps be used to investigate the site and situation of a given festival? During the main activity, students are required to use Google Earth, and Google Maps to find the locations of their given festivals, and to use information from these programs to answer questions about the site and situation of their festivals. Each group is provided with a task card to guide them through this activity. There are five festivals in total. These can either be distributed equally throughout the class or given to students in five groups. The following background information is necessary for a teacher to be able to assist the students as they work through the tasks and to check their answers to the questions and their understanding of the site and situation of their festivals. The Rhythm and Vines Festival takes place on the Waiohika Estate Vineyard near Gisborne, New Zealand (North Island). It is marketed as 'a kiwi summer festival experience like no other' and is a three day event held over the end of December/beginning of January to see in the New Year. It was established in 2003. The music is rock, dance, jazz and roots, hosting the best up and coming and established kiwi music. The Waiohika estate is 10.2km from Gisborne airport, which can be seen clearly on the satellite view of Gisborne in Google maps - about two miles to the east of the centre of Gisborne itself. The River Tursngsnui enters the sea at Gisborne in a wide sweeping bay. The settlement itself, the land to the west, and the vineyard to the north-west are all relatively flat. However, a ridge of mountains rises to over 200m fairly steeply to the east, providing a spectacular back-drop to the festival site. This makes an attractive setting for the festival, and zooming in on the map shows Gray's Bush reserve and Exotic/Native forests labelled. Away from Gisborne itself, the population becomes sparse and land-use is predominantly agricultural. Further information about this festival can be obtained from the festival website. Southside Festival takes place about 1.8km to the north-west of Neuhausen Ob Eck (NOE) in south west Germany. The festival has been held every June since 1999, and it hosts mainstream/alternative music. It is held the same weekend as the Hurricane Festival in North Germany, which generally has the same line-up. Although relatively high (800m above sea level) the relief is fairly flat around NOE itself and the festival site, although it becomes more undulating a little further to the north where there is a river valley, making the setting attractive. It's not far from the Bodensee - a large lake on the River Rhine which separates Germany, Switzerland and Austria. Away from the settlement of NOE itself the population is sparse and the land-use is mainly agriculture or forestry. The nearest road to the festival site is the 311. Trains to Tuttlingen are met by a shuttle bus service during the festival, and the 11km journey takes about 13 minutes. Further information about this festival can be obtained from the festival website. Hip Hop KEMP takes place about four kilometres to the north of the settlement of Hradec Kralove in the Czech Republic. As its name suggests, it is a hip hop festival and is held every August. It's one of the largest hip hop festivals in Europe, with around 20,000 people attending each year. The Hip Hop KEMP 05 photograph the students are instructed to find shows that the relief is very flat, and that there is a river on the site. There is also a series of lakes in the immediate area. The photograph was taken looking east from across the other side of the river which runs to the west of the festival site. The land-use is again, largely agricultural and while there are settlements in the locality, they are small and the overall population density is sparse. There is a railway line running close to the river to the west of the site. Further information about this festival can be obtained from the festival website. The EXIT Festival takes place in Novi Sad, Serbia. It is a four day event that has been held every year in July since 2000. It aims to provide "relevant entertainment to Serbian youth while also bringing pertinent social topics to the fore" (quote from Wikipedia) The settlement is located on both sides of a meander bend in the River Danube. Unlike the other festivals which are all located outside of settlements, this one takes place within the settlement itself. However, when examined on the maps closely, students will find that it takes place around the old Turkish Petrovaradin Fort - this is an open area of the city with woodland on the banks of the River Danube. Therefore, it is away from the more densely populated areas of the settlement on the other side of the river. The settlement itself is located on flat land which rises to forested slopes further south, creating a pleasant setting for the festival. As the festival takes place within the settlement itself, communications are good, and the E75 road is the closest main road to the festival site on the map. Further information about this festival can be obtained from the festival website. Benicassim Festival, or the Festival Internacional de Benicàssim (FIB) takes place on a concreted site to the south west of the coastal settlement of Benicassim in Spain (about 25km north along the coast from Castellon de la Palma on the east coast). It is one of the most important summer indie music events in Europe, and has been held annually in July since 1995. The setting for the festival is very attractive - the coast with mountains behind - rising to over 600m (this mountainous area is called ‘Desert De Las Palmes' on the map). However, the settlement itself and the festival site are located on flat land - this can be seen in the photographs the students are asked to look at and describe (they can also see the backdrop of mountains). The festival takes place away from the more densely populated settlement, as the land becomes more agricultural. The festival site is very well located in terms of road communications - the N340 road runs adjacent to the site, and the main AP-7 ‘Autopista Del Mediterrani' expressway is just to the north of the site (this links many of the main settlements on the Mediterranean Coast). Further information about this festival can be obtained from the festival website. Where does my global festival take place? For this activity you will need to work in a small group of four or five. Each group will pick one global festival to investigate. The different options are given on the starter cards. Once you know which festival you will be working on, you need to find its location using Google Earth. There are instructions on how to do this on the activity card for your festival. You will also label it with a placemark. The Google Earth example shows you what your finished placemark might look like. The site and situation of my global festival You will continue studying the same festival for the next activity. The instruction cards give some instructions for you to follow. There are two tasks in this activity: There are also questions on the sheet for you to answer. You should add your answers to the text box attached to your Google Earth placemark. Presentation to the class Each group will present their global festival to the class. When it is your turn, make sure you mention the following things about your global festival: - Which festival you studied - Its location - A summary of your findings about the festival's site and situation - Your Google Earth map and placemark
<urn:uuid:39c65329-05b3-4f70-9283-359816e3d861>
CC-MAIN-2016-26
http://www.rgs.org/OurWork/Schools/Teaching+resources/Key+Stage+3+resources/Mapping+festivals/Explore+the+global+festival+scene.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395546.12/warc/CC-MAIN-20160624154955-00161-ip-10-164-35-72.ec2.internal.warc.gz
en
0.952573
1,906
3.1875
3
What is multiple sclerosis (MS)? Multiple sclerosis is an autoimmune disease that affects the nervous system. Normally, antibodies produced by the immune system help protect the body against viruses, bacteria and other foreign substances. In people who have MS, the immune system destroys the substance that surrounds and protects your nerve cells – the myelin sheath. The job of the nervous system is to send electrical messages back and forth from the brain to different parts of the body. Normally, the brain quickly sends signals through the spinal cord and then through nerves that branch out to all organs and body parts. When myelin around nerves is damaged or destroyed, the nerves can’t function properly to deliver these signals in the right way. This can cause symptoms throughout the body. What is it like living with multiple sclerosis? The most common form of MS is known as relapsing-remitting MS (RRMS). When people who have this kind of MS have flare-ups, the symptoms become noticeably worse. Then there is a period of recovery, when symptoms get better or disappear completely for some time. In RRMS, symptom flare-ups may be triggered by an infection, such as the flu. More than 50% of people who have RRMS develop the secondary progressive type in which there are relapses followed by a gradual worsening of the disease. About 15% to 20% of people who have MS have a form known as primary-progressive MS (PPMS). In this kind of MS, the disease gets steadily worse, without any remissions. A fourth type—progressive relapsing MS—is rare, but the pattern follows a worsening of the disease with sudden, clear relapses. Often MS is mild, but some people lose the ability to write, speak or walk. This information was developed as part of an educational program made possible through support from AstraZeneca. Written by familydoctor.org editorial staff
<urn:uuid:748a91cd-d5c6-4abd-9bd0-b5d923e5be75>
CC-MAIN-2016-26
http://familydoctor.org/familydoctor/en/diseases-conditions/multiple-sclerosis.printerview.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396959.83/warc/CC-MAIN-20160624154956-00078-ip-10-164-35-72.ec2.internal.warc.gz
en
0.956292
393
3.6875
4
Many of us have heard the story of two salesmen from two separate shoe-manufacturing companies who traveled to Africa in early colonial times. As the story goes, one of the salesmen returned home with the report that there was no market in Africa for shoes because Africans do not wear shoes. The second salesman returned home and reported that Africa was a huge market because no one had shoes. The story came to mind when one of my Tai Chi students told me about a specific type of shoe that is prescribed in Europe and North America for arthritis patients and which also is popular among “hip” folks, no pun intended. This is no ordinary shoe, for its construction was inspired by the gait of the Masai people of Kenya. Fittingly, the shoes are called Masai Barefoot Technology, or MBTs, and sell for $250 and up a pair. I have since learned that the sneaker-looking MBTs are soothers of joints, toners of abs and slayers of cellulite. They are said to strengthen and tone muscles in the feet, legs, buttocks, stomach, and back; increase muscle activity and circulation; relieve muscular tension, back and joint problems and lead to a relaxed upright posture and stride. They are all the rage among hikers, walkers and professional athletes, who rely on them “for regeneration, prevention and accelerated healing of injuries and in endurance and coordination training,” according to one Web site. They are also popular among Hollywood celebrities—Heidi Klum, Gwyneth Paltrow, Madonna, Christina Aguilera, the cast from Grey’s Anatomy, are cases in point. Wearing MBTs, proponents say, reestablishes our natural conditions of standing and walking. The developer MBTs were developed in the 1990s by Karl Müller, a Swiss engineer and former athlete who suffered from serious knee, Achilles tendon and back problems. During a visit to Korea, Müller observed that his pain lessened considerably when he walked barefoot on the soft, uneven surfaces of rice paddies, but worsened when he walked in shoes on flat, hard and even surfaces. For further research, he went to Kenya to observe the Masai. Not only is backache unknown among the Masai, he learned, but by walking barefoot on the natural, soft, uneven ground of their homeland, the Masai also activate muscles that atrophy when you walk on hard, even surfaces wearing conventional shoes. Müller returned to Switzerland to develop a shoe that would bring the benefits of walking on soft, natural ground to those who have to walk on hard surfaces. His company, Swiss Masai AG (swissmasai.com), is located in Roggwil, Switzerland. Its U.S. marketing arm, Masai USA Corp., is in Halley, Idaho. Physiological footwear What’s the secret behind this Masai-inspired footwear? Physicians in North America and Europe use MBTs for therapy and rehabilitation. They hail it as a revolutionary, physiological footwear. The shoe’s multi-layered rubber sole curves like the runners of a rocking chair, transforming flat, hard, artificial surfaces into natural, uneven ground. With an embedded spring providing some bounce, wearing MBTs has the effect of walking in sand. The reactive, more supportive muscle action creates good posture and increases shock absorption for all the joints, significantly reducing muscular-skeletal compression. The shoes come with instructions, which should be strictly followed. My student, who has arthritic knees, bought a pair and tried them on her own. “In their booklet they say to start with 15 minutes a day, then increase. I was okay the first day but the second day I wound up with sore balls of my feet, sore knees and slight back ache.” Still praise for MBTs, even from my student, is effusive. “Walking or jogging in MBT footwear engages weakened muscles and burns more calories, thus helping to efficiently tone and strengthen. Even while standing the muscles continue working to gain a center of balance. It’s the world’s smallest gym,” says one reviewer. By Rosalind McLymont
<urn:uuid:413d1a19-d572-4b0c-9004-cbe7680c863f>
CC-MAIN-2016-26
http://www.tnj.com/print/517
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396538.42/warc/CC-MAIN-20160624154956-00053-ip-10-164-35-72.ec2.internal.warc.gz
en
0.961611
870
2.59375
3
Ruskin's conception of wealth is necessarily, and heavily, imbued with moral qualities. As he writes in "The Veins of Wealth" from Unto This Last: It is impossible to conclude, of any given mass of acquired wealth, merely by the fact of its existence, whether it signifies good or evil to the nation in the midst of which it exists. Its real value depends on the moral sign attached to it, just as sternly as that of a mathematical quantity depends on the algebraical sign attached to it... And these are not, observe, merely moral or pathetic attributes of riches, which the seeker of riches may, if he chooses, despise; they are, literally and sternly, material attributes of riches, depreciating or exalting, incalculably, the monetary signification of the sum in question. One mass of money is the outcome of action which has created, — another, of action which has annihilated, — ten times as much in the gathering of it; such and such strong hands have been paralyzed, as if they had been numbed by nightshade: so many strong men's courage broken, so many productive operations hindered; this and the other false direction given to labour, and lying image of prosperity set up, on Dura plains dug into seven-times-heated furnaces. That which seems to be wealth may in verity be only the gilded index of far-reaching ruin; a wrecker's handful of coin gleaned from the beach to which he has beguiled an argosy; a camp-follower's bundle of rags unwrapped from the breasts of goodly soldiers dead; the purchase-pieces of potter's fields, wherein shall be buried together the citizen and the stranger. 1. It seems that this moral codification of wealth implies, as its necessary result, some form of communism or socialism. The capitalist pursuit of wealth, as described in Ruskin's parable of the island community, is "evil." To obtain wealth that is "good," one must pursue the common good, as noted in footnote 35. Is this reading supported elsewhere in Unto This Last? 2. Ruskin's binary of wealth offers no middle ground — either one is equated with Judas (via the "purchase-pieces" reference) or one is not. How realistic is this exclusive system of good and evil? Last modified 4 April 2003
<urn:uuid:333a82a4-068b-436a-8dc9-265a3113b9d4>
CC-MAIN-2016-26
http://www.victorianweb.org/authors/ruskin/egervary7.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398075.47/warc/CC-MAIN-20160624154958-00159-ip-10-164-35-72.ec2.internal.warc.gz
en
0.958846
500
2.828125
3
Victorian floor tiles Floor tiles are common in the hallways and paths of Victorian and Edwardian houses. These are usually of two different types described as encaustic tiles or quarry tiles. Encaustic tiles are decorated with coloured clay inlays. The leather-hard clay was stamped with an impression of the design, which was then filled with a contrasting colour liquid clay 'slip'. Once dried, the excess fill was scraped away to reveal the design. Encaustic tiles may be glazed or unglazed. Quarry tiles are unglazed and often laid in a geometric pattern of contrasting colours. Unglazed tiles have a matt surface that tends to hold the dirt. They have often accumulated a variety of floor polishes, wax, varnish, paint or lino adhesive. Over time, the rich bright colours on the tiles become obscured by such layers. 1. Remove loose dirt and dust by brushing or vacuuming. 2. Use a scalpel to carefully remove hard deposits, paint spots or very thick varnish layers. Take care not to scratch the tile with a scalpel - you will need to judge the safest angle and pressure required. 3. Add a little detergent (one drop of detergent per litre of water) to bowl of warm water. Use a stencil brush or nail brush with natural bristles to apply the water to a small area about 10 sq cm. Using a circular motion, blot the surface with a paper towel to remove the dirt. Repeat this process, then blot dry before moving on to the next area. It may be possible to remove waxy deposits with solvents such as white spirit, methylated spirits or a 50:50 mixture of white spirit and water with a drop or two of detergent. Use the solvent on a small swab and apply to an area about 2 sq cm at a time. Work on one tile at a time and blot clean and dry before you move on. It may seem a bit fussy to work on such a small scale in a large tiled area, but it allows you to limit your exposure to solvent fumes and work in a controllable way. Although it is often easier and quicker to use more aggressive methods, these may damage the tiles, particularly if used repeatedly over the long life of the floor. Proprietary paint stripper can be used to remove paint or varnish. Test a small area first and follow the manufacturer's guidelines for safe usage. This should also be applied following a controlled approach as described above. As a general rule it is best to avoid applying a sealant because they don't allow tiles to 'breathe', thus trapping damp below and encouraging mould growth. A build-up of silicone sealant can be almost impossible to remove. For housekeeping, use a mat at the doorway and vacuum or sweep regularly.
<urn:uuid:8904f13e-26be-4ea8-a3ea-8ee140a81157>
CC-MAIN-2016-26
http://www.vam.ac.uk/users/node/4687
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783403823.74/warc/CC-MAIN-20160624155003-00010-ip-10-164-35-72.ec2.internal.warc.gz
en
0.937363
596
2.75
3
Curious Collections: A Single Dino Toe by AMNH on This specimen from the Museum’s paleontology collection is a single dinosaur toe covered with lichen. Most likely collected in 1912 in Alberta, Canada, the toe is thought to belong to a hadrosaur (duck-billed) or ceratopsian (horned) dinosaur. The toe is the terminal phalanx, or the one that supported the hoof. The lichen growth, which occurred on the two damaged parts of the bone, shows that the bone was exposed on the surface of the ground for many years before being discovered. It also tells scientists that the fossil’s cracks occurred while the bone was in the ground, not during the dino’s life or during the bone’s collection. Don’t miss the Museum’s current exhibition The World’s Largest Dinosaurs, which features cutting-edge research about super-sized sauropods, on now through January 2.
<urn:uuid:b0d2d135-8576-43de-a6ca-fb577ab1338f>
CC-MAIN-2016-26
http://www.amnh.org/explore/news-blogs/news-posts/curious-collections-a-single-dino-toe
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397696.49/warc/CC-MAIN-20160624154957-00154-ip-10-164-35-72.ec2.internal.warc.gz
en
0.945397
214
3.765625
4
This article is Not Ready. The frame element (<frame>) defines one particular window (frame) within a <frameSet>. The <frame> element is obsolete in HTML5. This example uses the frame element to define properties of the frame, including the location of the page loaded by the frame. <frame frameborder=0 scrolling="no" src="sample.htm"> This example shows how to reference an object with FRAME2, from another frame of the same frameset. You can access the frame object's properties (but not its contents) through the object model of the page in which the frame object resides. For example, the syntax for accessing the border style of the frame object is: sBorderValue = document.all.oFrame.style.border; If a user opens a Web folder inside a frame and then clicks something in the Web folder, the file or folder that the user clicks takes over the entire window. For example, suppose that a page contains two frames, one frame pointing to http://www.microsoft.com and the second frame pointing to a network drive. If the user clicks a file or folder in the second frame, that frame takes control of the entire window, including the first frame. For file types that the browser cannot host, such as .txt files, a separate window in the appropriate host application is opened. A Web folder is a part of the file system hierarchy, but it does not necessarily represent anything in the file system. An example is Network Neighborhood. Security Warning: To protect user privacy and safeguard your applications, Windows Internet Explorer restricts some interactions between frames that host Web pages from different domains. For more information about using the Dynamic HTML (DHTML) object model with the frame and iframe objects, see About Cross-Frame Scripting and Security and Security Considerations: Dynamic HTML. Windows Internet Explorer 8 and later. The values of the longDesc and src attributes depend on the current document compatibility mode. Windows Internet Explorer 7 and later. For security reasons, resizing is disabled for frame objects that display content hosted on a domain different from the domain hosting the parent document. If you trust the content you are loading into an frame object, you can enable resizing by specifying values for the minWidth and maxWidth attributes of the frame element in the source of the parent document. You must specify values for both attributes to enable resizing. Microsoft Internet Explorer 5.5 supports transparent content for a frame. The following conditions must be met to define transparent content for a frame. - The allowTransparency attribute, used with the frame element, must be set to VARIANT_TRUE. - In the frame content source document, the backgroundColor or bgColor attribute of the body element must be set to Related pages (MSDN) This article contains content originally from external sources. Portions of this content come from the Microsoft Developer Network: [Windows Internet Explorer API reference Article]
<urn:uuid:0414d6f6-685c-4d0b-9dff-835da561cc3f>
CC-MAIN-2016-26
http://docs.webplatform.org/wiki/html/elements/frame
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395613.65/warc/CC-MAIN-20160624154955-00044-ip-10-164-35-72.ec2.internal.warc.gz
en
0.751327
607
3.1875
3
Columbus -- Public health officials say it's difficult to know the exact size of Ohio's rising tick population after funding cuts to a monitoring program. The Columbus Dispatch reports the bugs and the diseases they carry, such as Lyme disease, become bigger concerns in warm weather. Ohio's incidence of Lyme disease, spread by the black-legged tick, has reached a 20-year high. Recorded cases rose from 44 in 2008 to 93 last year. At the same time, state lawmakers cut funding last year to a program that monitors ticks and other disease-spreading insects. A midterm budget bill passed by the Ohio House restores program funding. The measure still needs Ohio Senate and gubernatorial approval. State entomologist Richard Gary said Ohio relies on education campaigns to limit cases of insect-bourne disease. -- Associated Press
<urn:uuid:4cbde9a2-99e7-47ca-bc33-8c15dd6c95ff>
CC-MAIN-2016-26
http://www.thegatewaynews.com/regional/2014/04/30/tick-population-eyed-as-funding-awaited
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395679.92/warc/CC-MAIN-20160624154955-00161-ip-10-164-35-72.ec2.internal.warc.gz
en
0.947537
165
2.625
3
|Coverage||Partial Great Britain coverage| |Price||Available on request. Subject to number of users, licence fee and data preparation fee. More information about licensing data The Geochemical Baseline Survey of the Environment (G-BASE) project sets out to map and establish the natural geochemical baseline of the British Isles by collecting stream sediment, water, soil and more recently vegetation samples (at drainage sites) throughout the UK. Beginning in the late 1960s, the primary focus was mineral exploration, however the project has now evolved into a multi-media, high-resolution geochemical survey producing baseline data relevant to many environmental issues. The regional geochemical baseline data is important in order to understand our environment and to measure changes, whether they be natural or man-made. This baseline data of the surface environment also allows us to model the migration of elements and provides a reference point against which we can monitor change. Data from this project is available under licence. Contact Digital Data for more information.
<urn:uuid:fed15137-9891-4156-a441-3ba7e3f1c8a5>
CC-MAIN-2016-26
http://www.bgs.ac.uk/products/geochemistry/gBaseUK.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396106.71/warc/CC-MAIN-20160624154956-00015-ip-10-164-35-72.ec2.internal.warc.gz
en
0.886222
208
3.015625
3
Using Graphics in the Classroom To become acquainted with ways of using graphic images in the classroom. To review sample top quality lesson plans which incorporate Internet resources. Graphics for Viewing The simplest use of graphics in the classroom is to illustrate concepts much as pictures in a book Images obtained on the Internet can be modified using graphics software programs. Visualization tools are able to take vast data banks, such as ocean temperatures worldwide on a given day, and present them in the form of images, where temperatures are shown as different colors. Ways in which one can use this capability in the classroom are explored in this section. Graphics and Measurement Graphics visualization packages are able to perform measurements such as length and area on images of earth and the planets. Ways in which one can use this capability in the classroom are explored in this section. Appreciate the quality of a well designed lesson plan using Internet. resources and modern image manipulation software tools. Appreciate the motivational advantages of presenting a telecollaborative project via web pages.
<urn:uuid:237eeebb-f567-4e10-afeb-8e4a0df34693>
CC-MAIN-2016-26
http://lone-eagles.com/courses/rfts/ti6web.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396027.60/warc/CC-MAIN-20160624154956-00080-ip-10-164-35-72.ec2.internal.warc.gz
en
0.907147
213
3.9375
4
Nowadays, especially after the terrorist acts on September 11, 2001 and the war in Iraq, terrorism is a top issue, that turns the attention of the whole world. The reason for that is that the nations are threatened for their security and safety. Constant conflicts and wars keep people in tension. What should the government do for the national security? I would like to analyze on this question by looking at the theories of John Locke and Thomas Hobbes. Thomas Hobbes and John Locke are two political philosophers; their theories were about the formation of the society and what the social contract means. Their theories will help us to understand their views on the role and purpose of the government and how their response will be to acts of terrorism and national security. On the one hand, it is important to keep high level security sanctions and to provide safety for the country, but on the other hand, facing the reality that the war on terrorism is not likely to be a temporary situation of war, the decisions that the government takes, affect and restrict people in their liberty and right of freedom in a long term. Doubtless, both thinkers have different opinions on human nature and state of nature; the state of nature is where people were in before political government came into existence. Hobbes considered that humans, in their nature, are selfish and tend to do everything for their own reason. In the state of nature, people are always at fight with each other, because everybody is acting on self-interest. When everybody is trying to get whatever he wants and the resources, whether it food, money or shelter, are limited, conflict appears between the people. Thus, they have to live with continually fear from each other. People have the instinctive tendency to protect themselves from destructions and may do anything they consider necessary for being secure. Contrary to Hobbes, Locke says that humans know what is r
<urn:uuid:39e55901-549f-4691-8599-857691a83c48>
CC-MAIN-2016-26
http://www.exampleessays.com/viewpaper/52520.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393463.1/warc/CC-MAIN-20160624154953-00157-ip-10-164-35-72.ec2.internal.warc.gz
en
0.974758
382
2.90625
3
|Publication number||US4348888 A| |Application number||US 06/192,938| |Publication date||14 Sep 1982| |Filing date||1 Oct 1980| |Priority date||11 Oct 1979| |Also published as||DE3038361A1| |Publication number||06192938, 192938, US 4348888 A, US 4348888A, US-A-4348888, US4348888 A, US4348888A| |Inventors||Timothy J. Snee| |Original Assignee||National Research Development Corporation| |Export Citation||BiBTeX, EndNote, RefMan| |Patent Citations (2), Referenced by (7), Classifications (8), Legal Events (1)| |External Links: USPTO, USPTO Assignment, Espacenet| This invention relates to a method and apparatus for determining the explosibility of a combustible mixture. A fuel/air mixture is explosible if its concentration lies between the upper and the lower flammability limits. In practical situations any concentrations above the lower limit should be considered dangerous as concentration above the upper limit, while not immediately flammable, are highly likely to mix with air and become flammable. Thus the hazard of a fuel/air mixture can be assessed by measuring the fuel concentration as a percentage of the lower explosive limit. Conventional explosimeters which determine explosibility are usually specific to one gas; combustible gases widely different in chemical structure give different readings at the lower explosive limit. Alternatively, different explosive gases can be sensed by one instrument, but the gas must be identified before testing so that an appropriate instrument setting can be used. Further, such detectors are sensitive only to gases and may give totally misleading readings, on a fail-dangerous basis, if used to sense an explosive mist, aerosol or vapour. Yet another problem is that conventional devices may only operate up to the lower or sometimes the upper explosive limit, and therefore cannot detect potentially dangerous concentrations above the upper explosive limit. It is always convenient and often essential for an explosimeter to be portable. It must therefore be safe for use in explosive atmospheres, which places severe restrictions on its design. In the improved method for sensing explosive atmospheres according to the invention, gases, vapours, mists and aerosols can all be sensed, even up to concentrations well above the upper explosive limit, and the constituents need not be identified. The apparatus is designed with safety requirements in mind. According to the invention, a method of sensing the explosibility of an atmosphere which may contain a combustible gas or vapour or mist or aerosol comprises drawing a known volume of the atmosphere through a filter on which any condensible material condenses and into a container; in as safe environment, establishing a steady flow of oxygen-containing gas through a combustion chamber and past an oxygen sensor, heating the filter and drawing the gas sample from the container through the heated filter as part of the steady gas flow through the combustion chamber so that any combustible material is completely oxidised causing a decrease in oxygen concentration in the gas flow; sensing and integrating any such decrease, and from the integrand determining the explosibility of the known volume. The decrease in oxygen concentration gives a measure of the quantity of oxygen required to oxidise any combustible gas or mist etc., present in the known volume sample. For a stoichiometric fuel concentration Cst the quantity of oxygen required to oxidise the fuel will equal to that in the known volume sample and for actual concentrations Cact greater or less than stoichiometric a proportional quantity of oxygen will be required. Thus by measuring the volume of oxygen consumed it is possible to measure fuel concentration directly in terms of the stoichiometric fuel concentration i.e. where K is a constant. It is known that the ratio of stoichiometric concentration to the concentration at the lower explosive limit Clel is approximately constant and is about 0.5 for most fuels, i.e. Clel /Cst --0.5 Thus the flammability or explosibility can be determined by measuring the ratio of the actual fuel concentration to the stoichiometric fuel concentration, i.e. ##EQU1## The method according to the invention is intended as a warning device and is not required to measure precisely the concentration of combustible material; the approximation is therefore tolerable. However, where the composition of the fuel is known a more accurate comparison can be made between measured fuel concentration and the known limits of flammability. The oxygen-containing gas may be the earth's atmosphere at a safe environment remote from the atmosphere under test and to which the sample container and filter are removed. The oxygen-containing gas in the steady flow preceding arrival of exhaust gas from the sample at the oxygen sensor will be the atmosphere initially contained in the apparatus, i.e in the combustion chamber and connecting tubes. The oxygen-containing gas in the steady flow succeeding arrival of the sample exhaust gas at the oxygen sensor may be the atmosphere of the safe environment which is drawn into and through the sample container as the sample is drawn through the heated filter. To determine the integrand, the output of the oxygen sensor which will be a voltage proportional to oxygen concentration, is converted to a pulse train with frequency proportional to voltage at a first proportional rate, and pulses are counted for a period T during which no exhaust gas from the sample reaches the sensor. For a subsequent, longer period such as 4T, during which all of the sample exhaust gas passes the sensor, the voltage output is converted at a second proportional rate, in this case one quarter of the first rate, and pulses are subtracted from the total. If no fuel is present, the final count is zero. Any count above zero corresponds to the presence of an oxidisable material in the sample. The invention also extends to apparatus for carrying out the method. The invention will now be described with reference to the accompanying drawings in which: FIG. 1 is a schematic diagram of two-part explosimeter according to the invention; FIG. 2 illustrates a suitable electrical circuit for use in the explosimeter of FIG. 1; FIGS. 3 and 4 illustrate the counting mode of the explosimeter in the absence and presence of combustible material; and FIG. 5 shows an alternative form of one part of the explosimeter. In FIG. 1, the apparatus is shown in two parts, a portable sample collecting device indicated generally as reference 10, and a detecting and measuring device indicated generally as reference 12 which will be at a position remote from the possibly explosive atmosphere. The collecting device 10 consists of a filter 14 in the form of a steel tube containing compacted steel wool. One end of the tube is connected to the input end of a cylindrical sample container 16, the output end of which is connected to a spark-free two-way pump 18. In the container 16 is a double-ended piston 20 and at the centre point of the piston traverse there is an air inlet tube 22. The detecting and measuring device 12 consists of a filter heater 24, a catalytic reactor 26, a drying tube 28, a needle valve 30, a pump 32, a sensing head 34 of an oxygen meter 36 and a rotameter 38, connected in series by connecting tubes 40. The filter heater 24 and reactor 26 are formed by adjacent portions of a stainless steel tube 42. The outer, filter heater end is surrounded by a first heating coil 44, and the inner, reactor end is surrounded by a second heating coil 46 and contains a platinised alumina catalyst supported on rock wool. The reactor is insulated. The oxygen meter 34, 36 can be based on a polarographic oxygen sensor, for example a Draeger oxygen meter E12. In use, the collecting device, with the piston 20 fully towards the filter end of the container 16, is taken to the atmosphere to be tested, either the whole device or the filter 14 inserted into the atmosphere, and the pump 18 is operated to draw a sample of the atmosphere through the filter 14 into the container, the piston moving to the left in the Figure. The collecting device is then removed from the vicinity of the suspect atmosphere. With the piston at the left-hand end, the air inlet hole 22 is connected to the part of the container which contains the sample; the size of the inlet 22 is chosen so that diffusion through it is negligible, considering the length of time the sample is to be stored. The collecting device 10 is then taken to the detecting device 12 which is situated at a safe, remote position. The heating coils 44, 46 are switched on and allowed to reach equilibrium, the filter 14 is inserted in the filter heater, and the pump 32 is operated to draw the gas sample from container 16 through the heated filter 14 into the reactor 26, together with condensed material which revapourises from the filter, and air which passes through the inlet 22. The piston 20 remains at the left-hand end of the container 16. The sample plus air is pumped through the reactor, which is designed so that any combustible material is completely oxidised, and the exhaust gases plus excess oxygen pass to the sensing head 34. Flow rate is measured by the rotameter 38. The sample from the collecting device 10 does not pass to the catalytic reactor 26 as a block of gas; due to turbulence and mixing in the container with air drawn through the inlet, the sample is diluted with air. However, if there is any combustible material in the sample, its oxidation will cause a decrease in oxygen concentration, and by integration of the amount of oxygen consumed, the amount of combustible material in the known sample volume can be calculated. A stoichiometric fuel concentration, i.e. the balanced mixture of fuel and oxygen which would give complete combustion with no excess oxygen, gives an integrated oxygen consumption which is approximately independent of the type of combustible material and depends only on sample volume. Thus by drawing in a known sample volume it is possible to obtain a direct measure of the ratio of the actual fuel concentration in the sample to the stoichiometric fuel concentration. As explained above, this ratio is proportional to explosibility. For a known combustible material, a precise conversion factor can be applied, but for any unknown combustible material, the conversion factor will be approximately the same, so that a method according to the invention can be applied to derive the approximate explosibility of an unknown material. Thus a measure of the integral decrease in oxygen over the period during which the combustible material in the sample is passing through the reactor can give a direct measure of the explosibility of the sample. It has already been stated that the object is not a precise measure, but an indication of a dangerous or potentially dangerous atmosphere. Since the sample material does not pass through the reactor 26 as a plug, but is mixed with oxygen and passes over an extended period, measurement of oxygen concentration in the exhaust gases must be made over a period sufficiently long to sense all of the decrease due to combustion. This period must be determined in accordance with sample volume and flow rate. In industrial environments, the actual oxygen concentration in the ambient atmosphere may be less than the normal 21%. It is therefore convenient to provide a correct measure of this concentration at the time of the measurement. In the apparatus according to the invention the atmosphere contained in the reactor 26 and connecting tubes 40 is used to give this measure. Insertion of the filter in the filter heater 24 operates a switch 48 connected to a suitable electronic circuit 50 which is connected to the oxygen meter 36. The ambient concentration of oxygen is thus established before any products of combustion reach the sensing head 34. The circuit 50 is shown in more detail in FIG. 2. The output from the oxygen meter 36 is connected to an operational amplifier 52 which supplies an amplified signal to a voltage-to-frequency converter 54; converter 54 is connected through a series of logic gates to a four digit counter driver 60 connected to a digital display 62. The switch 48 starts the operation of the counting part of the circuit. The precision timer 58 determines the timing periods which are counted by the decade counter 56 which in turn controls the mode of the four digit counter driver and the re-triggering of the precision timer 58. The oxygen meter 36 provides an input voltage proportional to oxygen concentration. The amplified input signal is accepted by the voltage-to-frequency converter (the range being determined by the gain of amplifier 52) and the analogue signal is converted to a pulse train whose frequency is linearly proportional to input voltage. When the switch 48 is operated by insertion of the filter in the filter heater, the counter 60 starts counting the pulses (in the addition or count-up mode). After a precisely determined time T, the precision timer 58 in conjunction with the decade counter 56 causes the frequency from the converter 54 to be divided by 4, and switches the counting circuit to the subtraction or count-down mode. Re-triggering of the precision timer 58 is inhibited after five complete timing periods and this in turn prevents any further pulses reaching the four-digit counter driver 60. If the concentration of oxygen passing the sensor head 34 is constant, the number of pulses counted up in time T at voltage to frequency conversion rate x will equal the number of pulses counted down in time 4T at voltage to frequency conversion rate x/4. The display 62 will reach zero at the end of the fifth cycle. This is illustrated in FIG. 3 in which the dotted line shows oxygen concentration and the full line shows the pulse count. If the concentration of oxygen decreases due to the presence of combustible material, the display will contain a positive count at the end of the fifth cycle; this number is directly related to explosibility of the sample, provided the flow rate is kept constant. This is illustrated in FIG. 4. The drop in oxygen concentration (dotted line) is shown as a sharp change; this will not be the case in practice, but clearly illustrates the principle. Smooth changes in oxygen concentration merely alter the shape of the pulse count curve; the total effect is the same regardless of the mixing of the sample with the atmosphere, so long as the decrease due to all combustible material falls within the period 4T. The final count in the counter 60 can, by suitable adjustment of the gain of amplifier 52, read directly as percentage stoichiometric. If the chemical composition of the fuel is known a switched gain 53 could be incorporated on amplifier 52 to give a direct reading in the display 62 of percentage lel for the particular fuel. When a sample of an atmosphere is taken, the sampling rate must be sufficiently slow to capture large droplets in an aerosol. For example, for a 25 milliliter sample volume, a sampling rate of 75 milliliters per minute is appropriate. It is essential for the reactor to be easily capable of oxidising all combustible material likely to be contained in the sample, remembering that concentrations far in excess of the upper explosive limit may be met. For a 25 milliliter sample, suitable dimensions are as follows; the tube 42 is of 0.6 centimeters internal diameter and the part forming the reactor 26 is 16 centimeters long and heated to 600° C. This provides an enormous oxidation capacity, considering the sample size, and the reactor catalyst is therefore not sensitive to inhibitors or poisons. The filter heater 24 is 7 centimeters long, heated to 300° C. T is 0.5 minutes so that integration takes place over 2.5 minutes at a flow rate of 220 milliliters per minute. The advantages of the method according to the invention are that an unknown explosive gas can be sensed, that explosive mists, aerosols and vapour can be sensed; and that it is unaffected by changes in ambient oxygen concentration. In the inventive circuit, the final count is not seriously affected by electronic drift. A slight variation to the sampling part of the apparatus is shown in FIG. 5. A sample container 64 is connected by a demountable tube 66 to a chamber 68 containing a piston 70. Initially, the piston is at the right-hand end of the chamber 68. The filter 74 connected to sample container 64 is inserted in the suspect atmosphere, the piston 70 is operated manually to draw a sample into container 64 through the filter. The tube 66 is then removed from container 64, and the junction sealed. Since there is no air vent in container 64, the sample can be retained for long periods. When the sample is to be tested, the filter 74 is inserted in the filter heater (see FIG. 1) and the junction for tube 66 is opened so that the sample can be pumped into the reactor 26. This device allows several samples of an atmosphere to be taken and tested later at a safe position. |Cited Patent||Filing date||Publication date||Applicant||Title| |US3447359 *||31 Mar 1966||3 Jun 1969||Standard Oil Co||Air dilution attachment for explosive-gas analyzers| |US3943775 *||24 Mar 1975||16 Mar 1976||Chevron Research Company||Method and apparatus for predicting the explosiveness of a volume containing inert gas and hydrocarbon vapors when mixed with air| |Citing Patent||Filing date||Publication date||Applicant||Title| |US5501112 *||2 Jul 1993||26 Mar 1996||Electric Power Research Institute, Inc.||Retrodictive molecular and particle in-situ snares| |US5789256 *||6 Oct 1995||4 Aug 1998||Mw Technologies, Inc.||Detonation/deflagration precursor detection of gases, vapors, aerosols, and mixtures thereof| |US5895318 *||10 Sep 1996||20 Apr 1999||Smrt; Thomas J.||Apparatus and method for selectively dispensing oxygen from an aerosol container| |US6001308 *||13 Feb 1998||14 Dec 1999||Mw Technologies, Incorporated||Detonation/deflagration precursor detection of gases, vapors, aerosols, and mixtures thereof| |US7513171 *||19 Dec 2005||7 Apr 2009||Sarnoff Corporation||Autonomous rapid facility chemical agent monitor via smith-purcell terahertz spectrometry| |US20080060455 *||19 Dec 2005||13 Mar 2008||Sarnoff Corporation||Autonomous rapid facility chemical agent monitor via smith-purcell terahertz spectrometry| |CN100523807C||3 Jun 2005||5 Aug 2009||中国科学院力学研究所;廊坊中石油科学技术研究院||Device for testing deflagrability of condensed fire detonator under condition of high termerature and high pressure| |U.S. Classification||73/23.31, 422/98| |International Classification||G01N31/12, G01N25/50| |Cooperative Classification||G01N31/12, G01N25/50| |European Classification||G01N25/50, G01N31/12| |16 Mar 1982||AS||Assignment| Owner name: NATIONAL RESEARCH DEVELOPMENT CORPORATION 66-74 VI Free format text: ASSIGNMENT OF ASSIGNORS INTEREST.;ASSIGNOR:SNEE, TIMOTHY J.;REEL/FRAME:003957/0307 Effective date: 19800922
<urn:uuid:c12bc970-eb22-4b4a-a648-30a8af2bb34b>
CC-MAIN-2016-26
http://www.google.ca/patents/US4348888
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395548.53/warc/CC-MAIN-20160624154955-00039-ip-10-164-35-72.ec2.internal.warc.gz
en
0.90047
4,082
2.515625
3
According to the Wall Street Journal Agricultural groups, worried that the swine flu outbreak is scaring consumers away from eating pork, are successfully prodding the federal government to refer to the virus by its scientific name: H1N1. The Agriculture Department, which used the term “swine influenza” as recently as Monday, clung to the anonymous term “H1N1 flu” in a statement Tuesday touting the safeness of U.S. pork. In a briefing Tuesday, Richard Besser, acting director of the federal Centers for Disease Control and Prevention in Atlanta, acknowledged that the agency’s use of the swine flu label was fueling the misconception that people could catch the new respiratory disease from food. “That’s not helpful to pork producers. That’s not helpful to people who eat pork,” Dr. Besser said. “And so we’re discussing: is there a better way to describe this that would not lead to inappropriate action on peoples’ part?” This, of course, misses the point. The article continues: Still, many scientists say the CDC is well within its rights to describe the disease as swine flu even though it seems to have mutated into a unique human virus. Flu viruses tend to be named after the first species in which they are discovered, and H1N1 was discovered in pigs decades ago. The institution of animal agriculture is responsible for many and perhaps most of the pandemics that we have had. The H1N1 virus had its origin in domesticated pigs. That is why it is called the “swine flu.” So the bottom line is clear: however you look at it, eating animal products is dangerous for humans. Gary L. Francione © 2009 Gary L. Francione
<urn:uuid:2bdf1eb5-bc2a-49a6-9d62-12072d124ddf>
CC-MAIN-2016-26
http://www.abolitionistapproach.com/the-pork-lobby-and-swine-flu/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397562.76/warc/CC-MAIN-20160624154957-00126-ip-10-164-35-72.ec2.internal.warc.gz
en
0.971371
385
3.03125
3
Recognizing Usual Variables: Normal Distribution In econometrics, a random variable with a normal distribution has a probability density function that is continuous, symmetrical, and bell-shaped. Although many random variables can have a bell-shaped distribution, the density function of a normal distribution is precisely represents the mean of the normally distributed random variable X, is the standard deviation, and represents the variance of the normally distributed random variable. A shorthand way of indicating that a random variable, X, has a normal distribution is to write A distinctive feature of a normal distribution is the probability (or density) associated with specific segments of the distribution. The normal distribution in the figure is divided into the most common intervals (or segments): one, two, and three standard deviations from the mean. With a normally distributed random variable, approximately 68 percent of the measurements are within one standard deviation of the mean, 95 percent are within two standard deviations, and 99.7 percent are within three standard deviations. Suppose you have data for the entire population of individuals living in retirement homes. You discover that the average age of these individuals is 70, the variance is 9 and the distribution of their age is normal. Using shorthand, you could simply write this information as If you randomly select one person from this population, what are the chances that he or she is more than 76 years of age? Using the density from a normal distribution, you know that approximately 95 percent of the measurements are between 64 and 76 (notice that 6 is equal to two standard deviations). The remaining 5 percent are individuals who are less than 64 years of age or more than 76. Because a normal distribution is symmetrical, you can conclude that you have about a 2.5 percent (5% / 2 = 2.5%) chance that you randomly select somebody who is more than 76 years of age. If a random variable is a linear combination of another normally distributed random variable(s), it also has a normal distribution. Suppose you have two random variables described by these terms: In other words, random variable X has a normal distribution with a mean of and variance of and random variable Y has a normal distribution with a mean of and a variance of If you create a new random variable, W, as the following linear combination of X and Y, W = aX + bY, then W also has a normal distribution. Additionally, using expected value and variance properties, you can describe the new random variable with this shorthand notation:
<urn:uuid:4892fa94-728e-4634-90a1-aa2a764fea7a>
CC-MAIN-2016-26
http://www.dummies.com/how-to/content/recognizing-usual-variables-normal-distribution.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395166.84/warc/CC-MAIN-20160624154955-00099-ip-10-164-35-72.ec2.internal.warc.gz
en
0.930724
521
4.4375
4
Date: 02/22/2002 at 03:06:42 From: Linda Mitchell Subject: Factorial !! Hi Dr Math. Please can you tell me what TWO ! marks mean in factorial questions? For example (1/.2)!! is an expression I have seen, but while I understand that the first ! would mean 5*4*3*2*1, I have no idea what the second ! does to it. Thank you, Linda M. Date: 02/22/2002 at 04:03:35 From: Doctor Pete Subject: Re: Factorial !! Hi Linda, The notation of two factorials, e.g., x!! is a single symbol, called the double factorial. It is the product of every other positive integer less than or equal to x, so for instance, 9!! = 9*7*5*3*1, and 12!! = 12*10*8*6*4*2. This is not to be confused with a repeated factorial, which would be written (x!)!, where we would have for the case x = 5, (5!)! = 120!, a much larger number than 5!! = 15. It is not too difficult to show that if n is even, then n!! = (2^(n/2))(n/2)!, and if n is odd, then n!! = n!/(n-1)!! = n!/(2^((n-1)/2)((n-1)/2)!); thus revealing a relation between the double and single factorial functions. - Doctor Pete, The Math Forum http://mathforum.org/dr.math/ Search the Dr. Math Library: Ask Dr. MathTM © 1994-2015 The Math Forum
<urn:uuid:3fc934b1-2788-4813-a917-e890289040d8>
CC-MAIN-2016-26
http://mathforum.org/library/drmath/view/56085.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396222.11/warc/CC-MAIN-20160624154956-00107-ip-10-164-35-72.ec2.internal.warc.gz
en
0.908572
367
3.15625
3
Sustainable farming systems in Bangladesh and Japan receive global recognition Four new sites designated Globally Important Agricultural Heritage Systems for innovation, sustainability and adaptability Four traditional farming systems in Bangladesh and Japan have been designated today by FAO as "Globally Important Agricultural Heritage Systems." They include Bangladesh's floating gardens, a unique hydroponics production system constructed with natural grasses and plants, which have been developed in flood areas; and a trio of sites in Japan: the sustainable river fisheries utilizing Sato-kawa system in Gifu, the Minabe-Tanabe Ume approach to growing apricots on nutrient-poor slopes in Wakayama; and the Takachihogo-Shiibayama mountainous agriculture and forestry system in Miyazaki which allows agricultural and forestry production in a steep mountainous area. The sites were officially recognized during a joint meeting of the GIAHS Steering and Scientific Committee at FAO headquarters in Rome. These new designations bring the number of Globally Important Agricultural Heritage Systems (GIAHS) systems to a total of 36 sites located in 15 countries in Africa, Latin America, Near East and Asia. "In the context of today's environmental and economic challenges and climate change, small-scale and family farmers, and especially traditional agriculture, can offer real solutions for food security, the conservation of natural resources and sustainable rural development, if adequate policies and investment are directed to them", said FAO Deputy Director-General Maria Helena Semedo. The Globally Important Agricultural Heritage Systems (GIAHS) which was launched by FAO in 2002 during the World Summit on Sustainable Development in Johannesburg, South Africa, has been recently endorsed by member countries, during the 39th Session of the FAO Conference, as an FAO Corporate Programme. About the new GIAHS sites The new GIAHS sites include three in Japan and one in Bangladesh: Japan - Ayu of the Nagara River System The Nagara River is one of the cleanest rivers in Japan that provides a number of ecosystem services. Various components of the system such as river, forests and farmlands are closely linked to each other. The sustainable inland fisheries of a specific type of fish (Ayu) benefit from clean waters of the Nagara River which are maintained through upstream forest management. Local communities have lived within this linked ecosystems and have developed their livelihoods and cultural practices. Japan - Minabe-Tanabe Ume System Minabe-Tanabe Ume System allows for the production of high-quality Ume (Japanese apricots) and various kinds of fruits on nutrient-poor slopes. Local communities have created a thriving Ume fruit production environment by maintaining upper coppice forests for landslide prevention and maintenance of water, and Japanese honeybee for pollinators. By permitting the production of a diverse range of products, the system ensures stable livelihoods and makes communities more resilient to disasters. Japan - Takachihogo-Shiibayama Mountainous Agriculture and Forestry System This site is located in a steep mountainous area where flat land is extremely scarce. In this severe environment, local people have established a distinctive and sustainable system of agriculture and forestry which balances timber production with diverse farming activities -- such as terraced rice growing, shiitake mushroom cultivation, beef cattle raising, or tea cultivation. The forest is maintained as a "mosaic" of conifers and broadleaf trees using traditional practices. Bangladesh - Floating garden Agricultural Practices Farmers in some parts of Bangladesh where flood waters can remain for a prolonged period of time have developed a unique hydroponics system in which plants can be grown on the water on floating organic bed of water hyacinth, algae and other plant residues. This environmentally friendly traditional cultivation technique utilizes the natural resources of wetlands to grow vegetables and other crops almost all year round providing numerous social, economic, agricultural and ecological benefits to the local population.
<urn:uuid:8acdc6c5-8c23-4c5e-a218-97f446272aab>
CC-MAIN-2016-26
http://www.fao.org/asiapacific/news/detail-events/en/c/358454/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396959.83/warc/CC-MAIN-20160624154956-00127-ip-10-164-35-72.ec2.internal.warc.gz
en
0.927762
803
3.109375
3
(rollover to compare with normal) ||What Is It? The Mitral Valve (arrow in diagram) regulates the movement of blood from the left atrium, or left collecting chamber of the heart, into the left ventricle, the main pumping chamber of the heart, which pumps blood to the body. In Mitral Stenosis, the mitral valve is defective in form, with a blockage or narrowing that makes it difficult for blood to enter the left ventricle. Mitral Stenosis, which is 4 times as likely to occur in females as in males, can be congenital or more commonly acquired as a result of scarring from Rheumatic Fever.
<urn:uuid:86649bae-1b20-4b73-a279-970c78a4c8ba>
CC-MAIN-2016-26
http://www.pted.org/?id=mitralstenosis1
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396100.16/warc/CC-MAIN-20160624154956-00115-ip-10-164-35-72.ec2.internal.warc.gz
en
0.935115
143
3.296875
3
hu·mane/hyuˈmeɪn or, often, yu-/ Show Spelled [hyoo-meyn or, often, yoo-] -characterized by tenderness, compassion, and sympathy for people and animals, especially for the suffering or distressed Many think membership in the species "homo sapiens" gives us the right to use other species any way we see fit. For entertainment, for testing beauty products, for food. While it may be a thought shared by the majority, I think many of us have not really thought about it at all. It's just the way it is. Does that make it right? Of all the species that evolved over millions of years, humans have come to see themselves as special. Instead of seeing ourselves as stewards, of our planet and all its inhabitants, our selfish interests lead us to take what we want with no regard for consequences. I lived most of my life without thinking about most of this. Now it's hard not to think about it. We owe it to ourselves and all those with whom we share this earth to know where we get our food. To be fully aware, we should know about the life of a dairy cow, and her male calf. We should know the conditions in which a laying hen spends her life, and what happens to her male offspring. And beyond deplorable conditions is the simple truth that we deprive another of life, for a moment of pleasure. There is another way. Here's a few suggestions to take the first step:
<urn:uuid:5f0722e2-e079-4525-87e4-8b53974fd851>
CC-MAIN-2016-26
http://jeff-road.blogspot.com/2014/04/humane.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398216.41/warc/CC-MAIN-20160624154958-00187-ip-10-164-35-72.ec2.internal.warc.gz
en
0.959323
317
2.625
3
Breaking barriers with canine friends By Heidi Wicks In addition to creating the province’s future educators, Memorial University’s Faculty of Education thinks puppies can help young readers turn pages. Kathryn Cooper, a graduate student in the faculty and a teacher, and Dr. Ursula Kelly, in co-operation with the St. John's Public Libraries, are hoping to establish a Paws to Read program in St. John's and surrounding areas. “Any child who wants to read to a dog can register,” explained Ms. Cooper, adding that there is no cost to register. “Being available at school during school hours would further reduce barriers for children with no transportation to and from a public library. The program is geared towards shy, reluctant or struggling readers – but anyone can participate.” Paws to Read, a registered program of Therapeutic Paws of Canada, is volunteer-based and pairs children and certified therapeutic dogs in a library or school setting to encourage and to enhance reading enjoyment and success. The extraordinary benefits for children have been well-documented in educational and medical research. “Oftentimes, the children who join have not experienced a comfort, joy and success in reading in more traditional settings (such as classrooms),” said Dr. Kelly. “The one-on-one nature of the program, the company of therapeutic dogs and a relaxed, comfortable setting removes some of the barriers to reading success – allowing the child to gain increased confidence and to begin to thrive in reading.” Programs are in place across Canada and the United States. Ms. Cooper and Dr. Kelly are in the very preliminary stages of establishing a program here in Newfoundland and Labrador, but first need to establish a bank of dog owners whose animals may meet the strict requirements for certification to work with children who need encouragement learning to read, or who are below the level of their peers. “There are strict codes of conduct, both for dogs and handlers,” Dr. Kelly explained. “Any organization which certifies therapy dogs has an extensive set of health, hygiene and behaviour standards a dog must meet before certification is granted. This strict code ensures that dogs are properly trained to work with children. As well, a dog must have demonstrated a history of adhering to these high standards before certification is granted. There are high standards for volunteers, including regular police checks.” Ultimately, Dr. Kelly and Ms. Cooper wish to see children experience increased joy and success in reading through the installation of this program. “Research suggests that increased confidence in their own abilities and success in reading will be the case for most participants, but our ties to companion animals, in this case dogs, can remind us of the wonder and power of the natural world. It increases children’s capacity to care for nature and for one another,” Dr. Kelly smiled, adding that such a program will bring education into the community, and the community into education – breaking down barriers among institutions and allowing a focus on the common pursuit of important goals. Ms. Cooper added that in this time of environmental crisis, bonding with an animal will help children see their world as a delicate place and one in need of protection. “For the dogs and handlers, it presents a new opportunity to bond and give something special to the community,” she furthered. If you know of a dog and handler team who may fit the requirements, please contact Dr. Ursula Kelly, firstname.lastname@example.org, or Kathryn Cooper, email@example.com, to inquire. For specific requirements for dogs and handlers, please visit www.tpoc.ca/TherapyDogEvaluation.asp.
<urn:uuid:18fd60fb-caaf-4ddc-9af2-9f05972d97a6>
CC-MAIN-2016-26
http://www.mun.ca/gazette/issues/vol41no10/breaking.php
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397864.87/warc/CC-MAIN-20160624154957-00081-ip-10-164-35-72.ec2.internal.warc.gz
en
0.948275
770
2.5625
3
There are three, well, no, six things you need to make a laminar stream work: - Accelerate the water to high speed without producing a lower-speed boundary layer. After the water exits the nozzle, internal shear will accelerate the boundary layer back up to the speed of the jet, and the shear will then be redistributed through the jet as turbulence, which will then lead to breakup. I know of two ways to minimize the boundary layer: - Large diameter tube ending in a flat plate with a small diameter hole. This design minimizes the distance over which the water is both at high speed and in contact with the wall. There will be a boundary layer, but it'll be really thin. The downside is that you end up with plumbing behind the jet which is really bulky compared to the jet. - Form the jet first, then use a circular knife to cut the boundary layer off the main flow before the boundary re-accelerates. This is how firehose nozzles work. They take the water stripped off and reintroduce it to the stream with a venturi. This nozzle is less bulky but needs a bigger pressure drop and is more difficult to make. - I found that water beads up on my 316 stainless nozzle more than on my PVC pipe. It's possible that the 316 doesn't drag on the water quite as much as PVC would have, although I can't confirm that. - Remove all vorticity from the water. - The problem is that angular momentum is conserved, and angular momentum is (mass)*(tangential velocity)*(radius). When you constrict a flow from 6" diameter to 0.5" diameter, the velocity increases by a factor of 12x, which means the centripetal force increases by 12^3 = 1728x (that's right, v^2/r). If my 6 inch flow starts out at 3 RPM (20 seconds to turn once, barely turning), then the half-inch jet will be rotating at an average of 432 RPM, and the centripetal force at the surface will be 13 m/s^2, which is more than 1 G. Since 1 G will rip drops of water off the underside of a wet object when the water is much less than a half inch thick, it's no surprise that this rotation will rip apart a half-inch diameter stream. - A long, narrow nozzle should take out vorticity through friction with the nozzle walls. The same friction will lead to lots of turbulence. I have no idea why this turbulence is not a problem for the firehose nozzle. I did some experiments with a watering can that we have which features a nozzle about 12" long and 1/3" diameter, and found that the stream would travel about 3 feet before it broke up. - If you do the large-diameter, hole-with-flat-plate nozzle, then you have to remove the vorticity some other way. I did it with layers of twin-wall polycarbonate, cut on a table saw, epoxied into place. In this YouTube video, they do it with soda straws. I've read that the minimum length needs to be 12x diameter. My flow straighteners are 1 foot long, and have channels 7mm across, so the ratio is 43:1. Probably overkill. - Eliminate even minute variations in your water flow. - You'd think a hose bib would give you smooth water flow, but it doesn't. I know because my fountains shot blobs of water with direct pressure from a hose bib, but worked fine once I put an LC filter between the hose and the fountain. The YouTube video mentions the same problem in passing, but doesn't say how to fix it. Directly connecting my pump led to blobs, the LC fixed them too. (My hose bib has 200 feet of 1/2" copper pipe leading to it, so I'm astonished that any flow variations were getting through. My best explanation is that the copper pipe is elastic, and the resulting distributed capacitance combined with the pipe inductance is forming a transmission line.) - The filter is simple: you have a run of smallish diameter pipe (that's your inductor, 20 feet of 4x your jet diameter should do), and a Tee fitting going to a vertical pipe into which the water can expand momentarily (your capacitor). My expansion pipe rises higher than my fountain jets, and is open to the air, so that it acts as a pressure regulator as well. I found that the water from my pump in my 2" PVC pipe would flutter irregularly perhaps 1/4" up and down. You can also do it with a closed pipe that traps air above it, if you can figure out how to ensure there is air up there. So long as you don't introduce bubbles into the stream, the closed pipe should work better because it has a smaller column of water between the pressure source (air) and the flow. That column acts like an inductor which would tend to isolate the capacitor and limit its high-frequency response. - If the source of variation is turbulence in the fountain, then you'd want the capacitor close to the fountain, and the inductor between that and the supply (hose). If the source of variation is the supply, then you'd want the capacitor at the supply, followed by the inductor going to the fountain. When filtering power into sensitive analog electronics, we use "pi" networks, which are just a capacitor at both ends of an inductor, basically because the noise could be coming from both places and we are hedging our bets. - Get rid of all air bubbles. Even tiny bubbles cause major flow disruptions. I have my pumps below grade, so that the water pressure at their intakes should be either above air pressure or very close to it. This should eliminate air leaks past the O ring on the strainer basket cover, which I think was a source of bubbles in my last pool. The strainer baskets always seem to have a little air pocket at the top. - Don't go straight up. I may have screwed this one up. My jet angle is just 12 degrees off vertical (here are my calculations), so that the jets slow from 19.7 feet/second at the nozzle to 4.1 feet/second at the apex. The extra flight time and variation in velocity give the flow more opportunity to glob up. - Filter the water. I may have screwed this one up as well. I wanted to have low power pumps (700 watts total) push a lot of water (200 gallons/minute), which means very low pressure head (10 feet or 4.3 psi). No filter that I know how to buy has ports larger than 2 inches, so any standard filter would have a very high pressure drop. So instead I have 7mm holes in my flow straightener, and .590" holes for my nozzles, and I'm hoping to catch anything even nearly that size in the strainer baskets of the pumps. I also have the ability to backwash my flow straighteners using filtered water from the main pool pump, which can crank up to 3.5 horsepower if needed. Okay, so Jim, here's your problem: those presumably short hose segments are making a big boundary layer in your jet, so when it slows down near the apex there is plenty of time and turbulence to glob up. The problem is worse because the jets are just 1/8" diameter, so the boundary layer may be the entire diameter of the jet. You need to pick a different, bigger nozzle. I can recommend the flat plate nozzle, and the YouTube video above shows you how to do it cheaply. You are also going to need to smooth out the water supply from the hose, and the LC filter described above should do that at low cost. Good luck, and please let me know how it goes! If you can, post pictures of the flow at 1/1000 second exposure or faster (full sunlight with any camera will work great).
<urn:uuid:de95ca5e-dea9-4a9c-b412-4e2dbd7b9a0b>
CC-MAIN-2016-26
http://ambivalentengineer.blogspot.com/2009_02_01_archive.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783400572.45/warc/CC-MAIN-20160624155000-00157-ip-10-164-35-72.ec2.internal.warc.gz
en
0.959045
1,663
2.65625
3
Safety Tip of the Week - Space Heater Sense Space Heater Specifications - Must be electrically powered and must not take more than 110 volts of electricity to operate. Fuel powered space heaters, such as PROPANE and KEROSENE, are not permitted. - Must have a tip-over shutdown feature. If a space heater is knocked over, the unit must automatically shut off. - Must be UL (Underwriters Laboratory), or FM (Factory Mutual) approved, and must be labeled accordingly. - Must have a thermostat that shuts unit off when a certain temperature is reached. - Must be fan driven. - Space heaters with heated coils are not permitted. Specifications for Electric Space Heaters Use - Must be kept at least three (3) feet away from any combustible material. - Turn off and unplug the heater when the area being heated is not occupied. - Nothing should ever be placed on top of or touching a space heater. - Always plug into a wall receptacle. - Need to be located in plain sight and clearly visible. - Hot plates and toaster ovens should never be used for space heating. - Your Building Manager should be contacted if it is felt there is inadequate heat in any work area. - Never plug space heaters into dedicated data receptacles. - Don't use an electric space heater with frayed insulation or broken wires, or one that overheats. - If there is a problem with accessibility to electricity, or electrical outlets, please contact your building manager. Back to Fermilab Today
<urn:uuid:2cfb9e63-4eee-4ca3-b2ab-919659d79b32>
CC-MAIN-2016-26
http://www.fnal.gov/pub/today/safety/spaceheater_specifications.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398216.41/warc/CC-MAIN-20160624154958-00046-ip-10-164-35-72.ec2.internal.warc.gz
en
0.851478
339
2.640625
3
Figure 1. Zones of kelp forests within the Monterey Bay, Gulf of the Farallones, and Cordell Bank National Marine Sanctuaries. [View Larger] Two species account for the bulk of physical structure and kelp biomass in the northern California region: bull kelp, Nereocystis luetkeana, and giant kelp, Macrocystis pyrifera. Bull kelp, which tolerates high wave action, is typical along exposed rocky shores, whereas giant kelp is abundant in all areas except the most exposed sites. Bull kelp is an annual, and giant kelp is a perennial but rarely lives longer than two to three years. Both species recruit in late spring and early summer. In addition to the canopy-forming species, there are several kelp species (e.g., Pterygophora californica, Laminaria spp.) that form an understory below giant and bull kelp. This understory adds a tremendous amount of biomass to the kelp forest and provides additional habitat for fishes and invertebrates. Kelp forests extend from just beyond the breaking waves to depths of usually less than 25 meters throughout most of the Monterey Bay National Marine Sanctuary's nearshore waters. No kelp forests exist in the Gulf of the Farallones or Cordell Bank sanctuaries. Kelp Canopy Maxima Interactive Map Kelp data for the California coastline were collected from aerial surveys in the following years: 1989, 1999, 2002-2006, and 2008-2009. This interactive map includes this dataset, which is a merge of all 9 years of kelp data to represent the canopy maxima. InhabitantsThe thousands of invertebrate species that live in kelp forests help make this system rich and diverse. Bluebanded goby Lythrypnus dalli. McFarland's dorid Chromodoris macfarlandi. The three golden lines are diagnostic. Giant kelp and other algae support large populations of benthic invertebrates, which in turn attract higher-order predators. Some common invertebrate species associated with kelp forests include the ochre sea star, Pisaster ochraceus, purple urchin, Strongylocentrotus purpuratus, and the California sea cucumber, Parastichopus californicus. Kelp forests are considered an important nursery habitat for nearshore rockfishes and serve as a primary foraging area for many southern sea otters, Enhydra lutris nereis. MonitoringWithin the three northern California sanctuaries, kelp forest monitoring efforts currently take place in the Monterey Bay sanctuary only; neither the Gulf of the Farallones nor the Cordell Bank sanctuary has monitoring efforts focused on this habitat. Examples of related monitoring projects:
<urn:uuid:349fc159-025b-4db8-8556-be5f7635a2e0>
CC-MAIN-2016-26
http://www.sanctuarysimon.org/regional_sections/kelpForests/overview.php?sec=kf
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399385.17/warc/CC-MAIN-20160624154959-00018-ip-10-164-35-72.ec2.internal.warc.gz
en
0.879566
598
3.609375
4
Villagers in Higashi-Chichibu, Saitama Prefecture, are riding high. Just one step out of its nearest train station and visitors are clued in to the fledgling celebratory mood that has taken hold of this rather obscure village with a population of about 3,000. There are signs and flags everywhere that read, triumphantly: “Congratulations! Washi paper-making to be added to UNESCO’s Intangible Cultural Heritage list!” “The whole village is in good spirits. We have also seen increasing visits by tourists” since the United Nations Educational, Scientific and Cultural Organization announced last month its plan to put the making of “washi” traditional Japanese paper on the list, said a jovial Eiji Fukushima, 65, general manager of a theme park called Washi no Sato (Village of Japanese Paper) in Higashi-Chichibu. Located about 70 km northeast of Tokyo, Higashi-Chichibu is a sparsely populated village in western Saitama that has long prided itself on its washi craftsmanship. Along with neighboring suburb Ogawamachi, the village has been best known as a producer of what is called “hosokawa-shi” washi. UNESCO is expected to confirm the washi-making technique’s registration late Wednesday or early Thursday. The UNESCO designation itself does not lead to new government subsidies or responsibilities for the village to maintain the tradition, an Agency for Cultural Affairs official said, but it is hoped that localities will gain recognition and momentum to keep their heritage intact. Locals and washi craftsmen here seem by and large hopeful that their centuries-old tradition’s inclusion on the UNESCO list will prove an economic boon by making their village a popular tourist destination. Not all of them, however, are buying that scenario. The very “intangible” nature of the asset, skeptics say, implies that the heritage could easily be forgotten and that unless the villagers do something special, their technique will disappear and their neighborhood will soon revert to the hinterland it has long been. The impending registration follows that of Japan’s “washoku” dietary culture last December. The registration this time is a comprehensive acknowledgement of Japan’s traditional “tesuki” (handmade) paper-making skill that has been passed down in the nation’s three most prominent washi-producing areas. Located in Shimane, Gifu and Saitama prefectures, the three areas have each produced their own indigenous washi, namely “sekishu-banshi,” “honmino-shi” and “hosokawa-shi,” respectively. A paper-making technique specific to Shimane’s sekishu-banshi was tacked onto the intangible heritage list in 2009. This time the government has been pushing for an expansion of the 2009 homage to the Shimane paper to make it an acknowledgment of Japan’s overall washi-making technique. Hosokawa-shi, which takes its name from a village in Wakayama Prefecture where the paper was originally made back in the Edo Period (1603-1867), represents the most exquisite form of washi spawned in the Saitama villages. Its fibers are made solely of domestically produced “kozo” mulberry tree pulp, which makes the paper so strong and resistant to discoloration that it doesn’t grow brittle easily over the years. “In fact, the paper is so sturdy that it was a common practice (in the Edo Period) for people to throw their account books in nearby ponds in the event of a fire. Once the fire subsided, they would retrieve the books from the water and find they were still usable,” said Fukushima, the Washi no Sato theme park manager. Other than account ledgers, hosokawa-shi has traditionally been used to make shoji paper doors and “binsen” letter paper. It has also played a key role in patching up antique documents. But as the popularity of washi has waned in modern Japan, demand for hosokawa-shi has faltered accordingly over the years, said Teizo Takano, who runs a studio in Higashi-Chichibu. Compared with decades before, his studio now gets fewer orders for hosokawa-shi, the costliest washi it produces. The studio instead has seen a rise in orders for cheaper, lower-quality washi that will be used for sake labels and school diplomas. The studio, Takano said, is making ends meet through mixed orders for hosokawa-shi and less high-quality paper. Likewise, washi factories and studios in Higashi-Chichibu have faded into obsolescence. Only a handful remain today, Fukushima said. Perhaps it’s little wonder, then, that young people continue to leave town in search of higher-paying jobs, leaving the local washi business plagued by a chronic lack of successors. Taeko Koyama, a 32-year-old craftswoman who works for Takano’s studio, said young people leave town because they doubt they can turn a profit in the washi business. “Some people here are interested in pursuing a career in the (washi) industry but give up because they aren’t sure if they can make a living,” she said, adding that she has been fortunate to make a living from her paper-making work alone. That view is echoed by 20-year washi-making veteran Hisako Uchimura. “I hope the (UNESCO recognition) will lead to increased global awareness of washi and hopefully push up demand, too, so young people will feel more comfortable joining in,” she said. However, Fukushima seems less optimistic. For his hometown, the scheduled UNESCO recognition represents a now-or-never chance to revive its long-stalled economy, he said. The Oct. 28 announcement of washi’s imminent entry into the heritage list has since left the village reveling in a temporary rise in tourism. But the real challenge for the villagers, he said, is figuring out how to keep public interest in the village and its culture strong in the future. A plan is underway, he said, for his theme park to introduce new, authentic washi-making equipment so tourists can try their hand at making hosokawa-shi themselves. Currently, a similar trial session is available to visitors for ¥280, but they only get to make much cheaper washi than hosokawa-shi because raw materials for the high-end product are too costly. Tourists who want to try out the professional-level equipment will probably be charged ¥1,000, he said, and will be allowed to bring home their own handiwork together with a more sophisticated version by professionals so they can compare them. That way, Fukushima said, they will hopefully feel motivated to frequent the park and hone their washi-making skills. “Being intangible means people are likely to soon forget about (the UNESCO recognition),” he said. “We need to make good use of this opportunity, no matter what.”
<urn:uuid:841eeda7-6dc0-405b-b04a-f34f4a86ed68>
CC-MAIN-2016-26
http://www.japantimes.co.jp/news/2014/11/25/national/washi-paper-making-village-hopes-unesco-designation-will-bring-tailwind/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396100.16/warc/CC-MAIN-20160624154956-00177-ip-10-164-35-72.ec2.internal.warc.gz
en
0.961248
1,542
2.609375
3
Galen Clark 1814–1910 Carleton Watkins (1829–1916) Albumen silver print, c. 1865–66 Drawn to California by the gold rush, Galen Clark instead fell in love with the beauty of the Yosemite Valley and its surrounding forests. He built a cabin there in 1857, hoping to recover from a bout of tuberculosis. While hunting he discovered a large grove of sequoia trees nearby and named it after Mariposa County. In 1864, partially in response to Clark’s promotional efforts to preserve this land, President Abraham Lincoln signed legislation granting the Yosemite Valley and the Mariposa Grove to California as park land. Clark became known at the time as the “Guardian of Yosemite” for his role as a guide and a protector of the valley. San Francisco photographer Carleton Watkins met Clark on one of his many trips to Yosemite and created this mammoth plate image of Clark standing next to the “Grizzly Giant,” one of the famous redwoods in the Mariposa Grove.
<urn:uuid:c3a276bc-13dc-47ce-85d7-56cc8f9e574e>
CC-MAIN-2016-26
http://www.npg.si.edu/exhibit/frontier/pop-ups/01-19.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397744.64/warc/CC-MAIN-20160624154957-00162-ip-10-164-35-72.ec2.internal.warc.gz
en
0.94759
222
3.234375
3
The Rochester Chapter of the Red Cross was formed on this date (3 Oct.) in 1881. Clara Barton is the person who pushed to form the American Red Cross which was organized in her apartment in Washington, DC on May 21, 1881. It was then decided to make local chapters of the Red Cross. The first local chapter was formed in Dansville, NY on August 22, 1881. That also happened to be the other place of residence of Ms. Barton. On Oct. 1, 1881 Ms. Barton came to Rochester and suggested that a local chapter be formed. Then just two days later the Rochester Chapter #2 of the Red Cross was formed by Ms. Barton with the help of Susan B. Anthony. The Rochester Chapter offers first aid and CPR training classes. They have someone go to every house fire in Monroe County to offer aid including help with temporary housing. They collect and distribute blood. They send volunteers to national natural disasters and run shelters during local disasters like the 1991 ice storm. In order to be prepared for any emergency, they need to have food, medicine, etc. stockpiled beforehand. So donations are needed now for the next emergency. You can donate to the Rochester Chapter or if you want you can donate on the American Red Cross site. Also you can text REDCROSS to 90999 to make an automatic donation of $10 to American Red Cross Disaster Relief Fund.
<urn:uuid:a2b82e61-8493-4117-b34b-b8cbca5f8bcf>
CC-MAIN-2016-26
http://rochistory.com/blog/?p=927
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783404382.73/warc/CC-MAIN-20160624155004-00038-ip-10-164-35-72.ec2.internal.warc.gz
en
0.966604
289
2.59375
3
What is the Third Folio of William Shakespeare? Ten years after the publication of the Second Folio, Civil War broke out. The London theatres were closed and after seven years the monarch, who had owned a copy of the Second Folio, was executed by the parliament for the first and last time in English history. When the English monarchy was restored in 1660 in the person of the eldest surviving son of the executed king, London theatrical activities were also resumed and Shakespearean plays, whatever forms they were actually staged in, were among the early repertoires recorded in The London Stage, 1660-1800 (Part 1:1965): Othello, Henry IV Part I, Hamlet, Twelfth Night, The Merry Wives of Windsor and Romeo and Juliet were to be found in the first three years of this new era. This was the time when the Shakespeare Folio was printed for the third time, which was also the first Shakespearean publication since the Restoration. The years of the interregnum, roughly a period of twenty years 1642-1660 saw only three plays and a poem in reprint anew in contrast to twenty nine publications including the First and the Second Folios (re)printed in prewar twenty years 1622-1641 according to `Chronological appendix' in Andrew Murphy's Shakespeare in Print (2003). This source also tells us that the next period of twenty years starting from the Restoration 1661-1680 was to witness seven including two issues of the Third Folio itself and Two Noble Kinsmen in the Second Beaumont and Fletcher Folio. Third Folio, 1663 (MR 1938) Philip Chetwind, the publisher of the Third Folio, had presumably taken over the copyrights covering those plays which belonged to Robert Allot by way of marriage to his widow and the copyrights regarding the other plays were thought to be cleared through negotiation with Ellen Cotes, widow of Richard Cotes, brother of Thomas Cotes (Henry Farr, `Philip Chetwind and the Allott Copyrights', The Library, 4th series, 15 (1934-5): 129-60). The printing of the Third Folio carried out by the shared effort of three printing houses is that of ` page-for-page reprint of the Second Folio so far as the text is concerned' as W.W. Greg describes it. The layout of the preliminaries are changed although the materials are identical: Milton's poem as well as Digges's are laid out so as to occupy one whole page each. In 1664 Chetwind published the second issue of the Third Folio. The Third Folio, Second Issue (MR 733) [Image # 11] In the second issue, Chetwind added to the volume a hundred-page new section that consisted of the seven plays, viz., Pericles, The London Prodigal, Thomas Lord Cromwell, Sir John Oldcastle, The Puritan, A Yorkshire Tragedy, and Locrine to list in the order of appearance. These plays had already been printed earlier in Shakespeare's lifetime with such title page announcements as `Written by William Shakespeare' or `Written by W.S.' Pericles has since been established among Shakespearean cannon while the other six plays are now considered apocryphal. The enlarged publication of play text in the folio is not without examples: The Ben Jonson Folio was first published in 1616 and was enlarged and published in 1640, which in turn was reprinted in 1692. The Beaumont and Fletcher Folio first published in 1642 was to be enlarged and published in 1679. Publication of an enlarged edition would promote purchase even from the owners of the original edition. It is a well-known episode that the Bodleian Library sold a copy of the First Folio to acquire the Third. (The discarded First Folio copy fortunately has since found its way to be restored in the holdings of the Library.) W. Black and Matthias A. Shaaber in their Shakespeare's Seventeenth-Century Editors, 1632-1685 (1937) found ` total of 943 editorial changes' as well as `an equal number of corrections of obvious typographical errors and of improvements of the punctuation' and fairly consistent spelling modernization (p. 50). In order to illustrate a little about the Third Folio's editorial work, let us quote two examples from their findings, both happened to be from As You Like It. One is from Act IV Scene iii where Ganymede/Rosalind swoons seeing the `apkin, / Dyed in [Orlando's] blood'. Aliena/Celia cries out: |F1,F2|| There is more in it; Cosen Ganimed. |F3 || There is no more in it; Cosen Ganimed. This change, though not retained after Theobald's edition in 1733, is nonetheless defendable, Black and Shaaber write, because it is done "on the supposition, presumably, that it is dramatically inappropriate for Celia to excite suspicions in Oliver's mind, that she should, on the contrary, protect Rosalind's disguise and try to allay them" (p. 55). Arden 3 (2006) edited by Juliet Dusinberre reproducing F1 reading cites Dr Johnson's note here: "Celia's agitation leads her to forget to act the part of Ganymede's sister." The other is from toward the end of the play. Hymen brings to the Duke Senior Rosalind and Celia presumably undisguised and says in the last two lines of his first speech: |F1,F2|| That thou mightst ioyne his hand with his, | Whose heart within his bosome is. |F3|| That thou mightst joyne her hand with his, | Whose heart within his bosome is. This is adopted by the subsequent editors and Arden 3 cites the Third Folio in its critical apparatus although Dusinberre is cautious enough to cite Jeffrey Masten's argument `that [the First Folio's] `his' is a deliberate recognition of the `joining' of Orlando with a boy actor, which would suggest that Rosalind is not wearing wedding clothes' in her foot notes. August 31, 2007
<urn:uuid:03134a7d-a2e6-4499-bb4d-b5b50b69495c>
CC-MAIN-2016-26
http://shakes.meisei-u.ac.jp/e-third.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395346.72/warc/CC-MAIN-20160624154955-00155-ip-10-164-35-72.ec2.internal.warc.gz
en
0.94416
1,418
3.0625
3
PROCSection: Linux Programmer's Manual (5) Index Return to Main Contents NAMEproc - process information pseudo-filesystem DESCRIPTIONThe proc filesystem is a pseudo-filesystem which is used as an interface to kernel data structures. It is commonly mounted at /proc. Most of it is read-only, but some files allow kernel variables to be changed. The following outline gives a quick tour through the /proc hierarchy. - There is a numerical subdirectory for each running process; the subdirectory is named by the process ID. Each such subdirectory contains the following pseudo-files and directories. - /proc/[number]/auxv (since 2.6.0-test7) - This contains the contents of the ELF interpreter information passed to the process at exec time. The format is one unsigned long ID plus one unsigned long value for each entry. The last entry contains two zeros. - This holds the complete command line for the process, unless the whole process has been swapped out or the process is a zombie. In either of these latter cases, there is nothing in this file: i.e. a read on this file will return 0 characters. The command line arguments appear in this file as a set of null-separated strings, with a further null byte after the last string. This is a symbolic link to the current working directory of the process. To find out the cwd of process 20, for instance, you can do this: cd /proc/20/cwd; /bin/pwd Note that the pwd command is often a shell builtin, and might not work properly. In bash, you may use pwd -P. In a multithreaded process, the contents of this symbolic link are not available if the main thread has already terminated (typically by calling pthread_exit(3). This file contains the environment for the process. The entries are separated by null bytes ('\0'), and there may be a null bytes at the end. Thus, to print out the environment of process 1, you would do: (cat /proc/1/environ; echo) | tr "\000" "\n" (For a reason why one should want to do this, see lilo(8).) Under Linux 2.2 and later, this file is a symbolic link containing the actual pathname of the executed command. This symbolic link can be dereferenced normally; attempting to open it will open the executable. You can even type to run another copy of the same executable as is being run by In a multithreaded process, the contents of this symbolic link are not available if the main thread has already terminated (typically by calling Under Linux 2.0 and earlier /proc/[number]/exe is a pointer to the binary which was executed, and appears as a symbolic link. A readlink(2) call on this file under Linux 2.0 returns a string in the format: For example, :1502 would be inode 1502 on device major 03 (IDE, MFM, etc. drives) minor 01 (first partition on the first drive). find(1) with the -inum option can be used to locate the file. This is a subdirectory containing one entry for each file which the process has open, named by its file descriptor, and which is a symbolic link to the actual file. Thus, 0 is standard input, 1 standard output, 2 standard error, etc. In a multithreaded process, the contents of this directory are not available if the main thread has already terminated (typically by calling pthread_exit(3)). Programs that will take a filename, but will not take the standard input, and which write to a file, but will not send their output to standard output, can be effectively foiled this way, assuming that -i is the flag designating an input file and -o is the flag designating an output file: foobar -i /proc/self/fd/0 -o /proc/self/fd/1 ... and you have a working filter. /proc/self/fd/N is approximately the same as /dev/fd/N in some UNIX and UNIX-like systems. Most Linux MAKEDEV scripts symbolically link /dev/fd to /proc/self/fd, in fact. A file containing the currently mapped memory regions and their access The format is: address perms offset dev inode pathname 08048000-08056000 r-xp 00000000 03:0c 64593 /usr/sbin/gpm 08056000-08058000 rw-p 0000d000 03:0c 64593 /usr/sbin/gpm 08058000-0805b000 rwxp 00000000 00:00 0 40000000-40013000 r-xp 00000000 03:0c 4165 /lib/ld-2.2.4.so 40013000-40015000 rw-p 00012000 03:0c 4165 /lib/ld-2.2.4.so 4001f000-40135000 r-xp 00000000 03:0c 45494 /lib/libc-2.2.4.so 40135000-4013e000 rw-p 00115000 03:0c 45494 /lib/libc-2.2.4.so 4013e000-40142000 rw-p 00000000 00:00 0 bffff000-c0000000 rwxp 00000000 00:00 0 where address is the address space in the process that it occupies, perms is a set of permissions: r = read w = write x = execute s = shared p = private (copy on write) offset is the offset into the file/whatever, dev is the device (major:minor), and inode is the inode on that device. 0 indicates that no inode is associated with the memory region, as the case would be with bss. Under Linux 2.0 there is no field giving pathname. - This file can be used to access the pages of a process's memory through open(2), read(2), and lseek(2). Unix and Linux support the idea of a per-process root of the filesystem, set by the This file is a symbolic link that points to the process's root directory, and behaves as exe, fd/*, etc. do. In a multithreaded process, the contents of this symbolic link are not available if the main thread has already terminated (typically by calling pthread_exit(3)). - /proc/[number]/smaps (since Linux 2.6.14) This file shows memory consumption for each of the process's mappings. For each of mappings there is a series of lines as follows: 08048000-080bc000 r-xp 00000000 03:02 13130 /bin/bash Size: 464 kB Rss: 424 kB Shared_Clean: 424 kB Shared_Dirty: 0 kB Private_Clean: 0 kB Private_Dirty: 0 kBThe first of these lines shows the same information as is displayed for the mapping in /proc/[number]/maps. The remaining lines show the size of the mapping, the amount of the mapping that is currently resident in RAM, the number clean and dirty shared pages in the mapping, and the number clean and dirty private pages in the mapping. This file is only present if the CONFIG_MMU kernel configuration option is enabled. Status information about the process. This is used by It is defined in The fields, in order, with their proper scanf(3) format specifiers, are: - pid %d - The process ID. - comm %s - The filename of the executable, in parentheses. This is visible whether or not the executable is swapped out. - state %c - One character from the string "RSDZTW" where R is running, S is sleeping in an interruptible wait, D is waiting in uninterruptible disk sleep, Z is zombie, T is traced or stopped (on a signal), and W is paging. - ppid %d - The PID of the parent. - pgrp %d - The process group ID of the process. - session %d - The session ID of the process. - tty_nr %d The tty the process uses. - tpgid %d - The process group ID of the process which currently owns the tty that the process is connected to. - flags %lu - The kernel flags word of the process. For bit meanings, see the PF_* defines in <linux/sched.h>. Details depend on the kernel version. - minflt %lu - The number of minor faults the process has made which have not required loading a memory page from disk. - cminflt %lu - The number of minor faults that the process's waited-for children have made. - majflt %lu - The number of major faults the process has made which have required loading a memory page from disk. - cmajflt %lu - The number of major faults that the process's waited-for children have made. - utime %lu - The number of jiffies that this process has been scheduled in user mode. - stime %lu - The number of jiffies that this process has been scheduled in kernel mode. - cutime %ld - The number of jiffies that this process's waited-for children have been scheduled in user mode. (See also times(2).) - cstime %ld - The number of jiffies that this process's waited-for children have been scheduled in kernel mode. - priority %ld - The standard nice value, plus fifteen. The value is never negative in the kernel. - nice %ld - The nice value ranges from 19 (nicest) to -19 (not nice to others). - 0 %ld This value is hard coded to 0 as a placeholder for a removed field. - itrealvalue %ld - The time in jiffies before the next SIGALRM is sent to the process due to an interval timer. - starttime %lu - The time in jiffies the process started after system boot. - vsize %lu - Virtual memory size in bytes. - rss %ld - Resident Set Size: number of pages the process has in real memory, minus 3 for administrative purposes. This is just the pages which count towards text, data, or stack space. This does not include pages which have not been demand-loaded in, or which are swapped out. - rlim %lu - Current limit in bytes on the rss of the process (usually 4294967295 on i386). - startcode %lu - The address above which program text can run. - endcode %lu - The address below which program text can run. - startstack %lu - The address of the start of the stack. - kstkesp %lu - The current value of esp (stack pointer), as found in the kernel stack page for the process. - kstkeip %lu - The current EIP (instruction pointer). - signal %lu - The bitmap of pending signals. - blocked %lu - The bitmap of blocked signals. - sigignore %lu - The bitmap of ignored signals. - sigcatch %lu - The bitmap of caught signals. - wchan %lu - This is the "channel" in which the process is waiting. It is the address of a system call, and can be looked up in a namelist if you need a textual name. (If you have an up-to-date /etc/psdatabase, then try ps -l to see the WCHAN field in action.) - nswap %lu - Number of pages swapped (not maintained). - cnswap %lu - Cumulative nswap for child processes (not maintained). - exit_signal %d - Signal to be sent to parent when we die. - processor %d - CPU number last executed on. - rt_priority %lu (since kernel 2.5.19) - Real-time scheduling priority (see sched_setscheduler(2)). - policy %lu (since kernel 2.5.19) - Scheduling policy (see sched_setscheduler(2)). - delayacct_blkio_ticks (since kernel 2.6.18) - Aggregated block I/O delays (measured in clock ticks (centiseconds)). Provides information about memory status in pages. The columns are: size total program size resident resident set size share shared pages text text (code) dt dirty pages (unused in Linux 2.6) - Provides much of the information in /proc/[number]/stat and /proc/[number]/statm in a format that's easier for humans to parse. - /proc/[number]/task (since kernel 2.6.0-test6) This is a directory that contains one subdirectory for each thread in the process. The name of each subdirectory is the numerical thread ID of the Within each of these subdirectories, there is a set of files with the same names and contents as under the For attributes that are shared by all threads, the contents for each of the files under the subdirectories will be the same as in the corresponding file in the parent (e.g., in a multithreaded process, all of the files will have the same value as the file in the parent directory, since all of the threads in a process share a working directory). For attributes that are distinct for each thread, the corresponding files under may have different values (e.g., various fields in each of the files may be different for each thread). In a multithreaded process, the contents of the /proc/[number]/task directory are not available if the main thread has already terminated (typically by calling pthread_exit(3)). - Advanced power management version and battery information when CONFIG_APM is defined at kernel compilation time. - Contains subdirectories for installed busses. - Subdirectory for pcmcia devices when CONFIG_PCMCIA is set at kernel compilation time. - Contains various bus subdirectories and pseudo-files containing information about pci busses, installed devices, and device drivers. Some of these files are not ASCII. - Information about pci devices. They may be accessed through lspci(8) and setpci(8). - Arguments passed to the Linux kernel at boot time. Often done via a boot manager such as lilo(1). - This is a collection of CPU and system architecture dependent items, for each supported architecture a different list. Two common entries are processor which gives CPU number and bogomips; a system constant that is calculated during kernel initialization. SMP machines have information for each CPU. - Text listing of major numbers and device groups. This can be used by MAKEDEV scripts for consistency with the kernel. - /proc/diskstats (since Linux 2.5.69) - This file contains disk I/O statistics for each disk device. See the kernel source file Documentation/iostats.txt for further information. - This is a list of the registered ISA DMA (direct memory access) channels in use. - Empty subdirectory. - List of the execution domains (ABI personalities). - Frame buffer information when CONFIG_FB is defined during kernel compilation. - A text listing of the filesystems which were compiled into the kernel. Incidentally, this is used by mount(1) to cycle through different filesystems when none is specified. - Empty subdirectory. exists on systems with the ide bus. There are directories for each ide channel and attached device. cache buffer size in KB capacity number of sectors driver driver version geometry physical and logical geometry identify in hexadecimal media media type model manufacturer's model number settings drive settings smart_thresholds in hexadecimal smart_values in hexadecimal The hdparm(8) utility provides access to this information in a friendly format. - This is used to record the number of interrupts per each IRQ on (at least) the i386 architecture. Very easy to read formatting, done in ASCII. - I/O memory map in Linux 2.4. - This is a list of currently registered Input-Output port regions that are in use. - /proc/kallsyms (since Linux 2.5.71) - This holds the kernel exported symbol definitions used by the modules(X) tools to dynamically link and bind loadable modules. In Linux 2.5.47 and earlier, a similar file with slightly different syntax was named ksyms. This file represents the physical memory of the system and is stored in the ELF core file format. With this pseudo-file, and an unstripped kernel (/usr/src/linux/vmlinux) binary, GDB can be used to examine the current state of any kernel data structures. The total length of the file is the size of physical memory (RAM) plus 4KB. This file can be used instead of the system call to read kernel messages. A process must have superuser privileges to read this file, and only one process should read this This file should not be read if a syslog process is running which uses the system call facility to log kernel messages. Information in this file is retrieved with the dmesg(8) program. - /proc/ksyms (Linux 1.1.23-2.5.47) - See /proc/kallsyms. - The first three fields in this file are load average figures giving the number of jobs in the run queue (state R) or waiting for disk I/O (state D) averaged over 1, 5, and 15 minutes. They are the same as the load average numbers given by uptime(1) and other programs. The fourth field consists of two numbers separated by a slash (/). The first of these is the number of currently executing kernel scheduling entities (processes, threads); this will be less than or equal to the number of CPUs. The value after the slash is the number of kernel scheduling entities that currently exist on the system. The fifth field is the PID of the process that was most recently created on the system. - This file shows current file locks (flock(2) and fcntl(2)) and leases (fcntl(2)). - This file is only present if CONFIGDEBUGMALLOC was defined during compilation. This is used by to report the amount of free and used memory (both physical and swap) on the system as well as the shared memory and buffers used by the It is in the same format as free(1), except in bytes rather than KB. - This is a list of all the file systems currently mounted on the system. The format of this file is documented in fstab(5). Since kernel version 2.6.15, this file is pollable: after opening the file for reading, a change in this file (i.e., a file system mount or unmount) causes select(2) to mark the file descriptor as readable, and poll(2) and epoll_wait(2) mark the file as having an error condition. - A text list of the modules that have been loaded by the system. See also lsmod(8). - Memory Type Range Registers. See /usr/src/linux/Documentation/mtrr.txt for details. - various net pseudo-files, all of which give the status of some part of the networking layer. These files contain ASCII structures and are, therefore, readable with cat. However, the standard netstat(8) suite provides much cleaner access to these files. This holds an ASCII readable dump of the kernel ARP table used for It will show both dynamically learned and pre-programmed ARP entries. The format is: IP address HW type Flags HW address Mask Device 192.168.0.50 0x1 0x2 00:50:BF:25:68:F3 * eth0 192.168.0.250 0x1 0xc 00:00:00:00:00:00 * eth0 Here 'IP address' is the IPv4 address of the machine and the 'HW type' is the hardware type of the address from RFC 826. The flags are the internal flags of the ARP structure (as defined in /usr/include/linux/if_arp.h) and the 'HW address' is the data link layer mapping for that IP address if it is known. The dev pseudo-file contains network device status information. the number of received and sent packets, the number of errors and and other basic statistics. These are used by the program to report device status. The format is: Inter-| Receive | Transmit face |bytes packets errs drop fifo frame compressed multicast|bytes packets errs drop fifo colls carrier compressed lo: 2776770 11307 0 0 0 0 0 0 2776770 11307 0 0 0 0 0 0 eth0: 1215645 2751 0 0 0 0 0 0 1782404 4324 0 0 0 427 0 0 ppp0: 1622270 5552 1 0 0 0 0 0 354130 5669 0 0 0 0 0 0 tap0: 7714 81 0 0 0 0 0 0 7714 81 0 0 0 0 0 0 indx interface_name dmi_u dmi_g dmi_address 2 eth0 1 0 01005e000001 3 eth1 1 0 01005e000001 4 eth2 1 0 01005e000001 - Internet Group Management Protocol. Defined in /usr/src/linux/net/core/igmp.c. - This file uses the same format as the arp file and contains the current reverse mapping database used to provide rarp(8) reverse address lookup services. If RARP is not configured into the kernel, this file will not be present. - Holds a dump of the RAW socket table. Much of the information is not of use apart from debugging. The 'sl' value is the kernel hash slot for the socket, the 'local address' is the local address and protocol number pair."St" is the internal status of the socket. The "tx_queue" and "rx_queue" are the outgoing and incoming data queue in terms of kernel memory usage. The "tr", "tm->when", and "rexmits" fields are not used by RAW. The "uid" field holds the effective UID of the creator of the socket. - This file holds the ASCII data needed for the IP, ICMP, TCP, and UDP management information bases for an snmp agent. - Holds a dump of the TCP socket table. Much of the information is not of use apart from debugging. The "sl" value is the kernel hash slot for the socket, the "local address" is the local address and port number pair. The "remote address" is the remote address and port number pair (if connected). 'St' is the internal status of the socket. The 'tx_queue' and 'rx_queue' are the outgoing and incoming data queue in terms of kernel memory usage. The "tr", "tm->when", and "rexmits" fields hold internal information of the kernel socket state and are only useful for debugging. The "uid" field holds the effective UID of the creator of the socket. Holds a dump of the UDP socket table. Much of the information is not of use apart from debugging. The "sl" value is the kernel hash slot for the socket, the "local address" is the local address and port number pair. The "remote address" is the remote address and port number pair (if connected). "St" is the internal status of the socket. The "tx_queue" and "rx_queue" are the outgoing and incoming data queue in terms of kernel memory usage. The "tr", "tm->when", and "rexmits" fields are not used by UDP. field holds the effective UID of the creator of the socket. The format is: sl local_address rem_address st tx_queue rx_queue tr rexmits tm->when uid 1: 01642C89:0201 0C642C89:03FF 01 00000000:00000001 01:000071BA 00000000 0 1: 00000000:0801 00000000:0000 0A 00000000:00000000 00:00000000 6F000100 0 1: 00000000:0201 00000000:0000 0A 00000000:00000000 00:00000000 00000000 0 Lists the UNIX domain sockets present within the system and their The format is: Num RefCount Protocol Flags Type St Path 0: 00000002 00000000 00000000 0001 03 1: 00000001 00000000 00010000 0001 01 /dev/printer Here 'Num' is the kernel table slot number, 'RefCount' is the number of users of the socket, 'Protocol' is currently always 0, 'Flags' represent the internal kernel flags holding the status of the socket. Currently, type is always '1' (Unix domain datagram sockets are not yet supported in the kernel). 'St' is the internal state of the socket and Path is the bound path (if any) of the socket. - Contains major and minor numbers of each partition as well as number of blocks and partition name. - This is a listing of all PCI devices found during kernel initialization and their configuration. A directory with the scsi mid-level pseudo-file and various SCSI lowlevel directories, which contain a file for each SCSI host in this system, all which give the status of some part of the SCSI IO subsystem. These files contain ASCII structures and are, therefore, readable with You can also write to some of the files to reconfigure the subsystem or switch certain features on or off. This is a listing of all SCSI devices known to the kernel. The listing is similar to the one seen during bootup. scsi currently supports only the add-single-device command which root to add a hotplugged device to the list of known devices. An echo 'scsi add-single-device 1 0 5 0' > /proc/scsi/scsi will cause host scsi1 to scan on SCSI channel 0 for a device on ID 5 LUN 0. If there is already a device known on this address or the address is invalid, an error will be returned. [drivername] can currently be NCR53c7xx, aha152x, aha1542, aha1740, aic7xxx, buslogic, eata_dma, eata_pio, fdomain, in2000, pas16, qlogic, scsi_debug, seagate, t128, u15-24f, ultrastore, or wd7000. These directories show up for all drivers that registered at least one Every directory contains one file per registered host. host-file is named after the number the host was assigned during Reading these files will usually show driver and host configuration, statistics etc. Writing to these files allows different things on different hosts. For example, with the latency and nolatency commands, root can switch on and off command latency measurement code in the eata_dma driver. With the lockup and unlock commands, root can control bus lockups simulated by the scsi_debug driver. - This directory refers to the process accessing the /proc filesystem, and is identical to the /proc directory named by the process ID of the same process. Information about kernel caches. The columns are: cache-name num-active-objs total-objs object-size num-active-slabs total-slabs num-pages-per-slabSee slabinfo(5) for details. Varies with architecture. - cpu 3357 0 4313 1362393 The amount of time, measured in units of USER_HZ (1/100ths of a second on most architectures), that the system spent in user mode, user mode with low priority (nice), system mode, and the idle task, respectively. The last value should be USER_HZ times the second entry in the uptime pseudo-file. In Linux 2.6 this line includes three additional columns: iowait - time waiting for I/O to complete (since 2.5.41); irq - time servicing interrupts (since 2.6.0-test4); softirq - time servicing softirqs (since 2.6.0-test4). - page 5741 1808 - The number of pages the system paged in and the number that were paged out (from disk). - swap 1 0 - The number of swap pages that have been brought in and out. - intr 1462898 This line shows counts of interrupts serviced since boot time, for each of the possible system interrupts. The first column is the total of all interrupts serviced; each subsequent column is the total for a particular interrupt. - disk_io: (2,0):(31,30,5764,1,2) (3,0):... (major,minor):(noinfo, read_io_ops, blks_read, write_io_ops, blks_written) (Linux 2.4 only) - ctxt 115315 - The number of context switches that the system underwent. - btime 769041601 - boot time, in seconds since the epoch (January 1, 1970). - processes 86031 - Number of forks since boot. - procs_running 6 - Number of processes in runnable state. (Linux 2.5.45 onwards.) - procs_blocked 2 - Number of processes blocked waiting for I/O to complete. (Linux 2.5.45 onwards.) - Swap areas in use. See also swapon(8). - This directory (present since 1.3.57) contains a number of files and subdirectories corresponding to kernel variables. These variables can be read and sometimes modified using the proc file system, and the sysctl(2) system call. Presently, there are subdirectories abi, debug, dev, fs, kernel, net, proc, rxrpc, sunrpc and vm that each contain more files and subdirectories. - This directory may contain files with application binary information. On some systems, it is not present. - This directory may be empty. - This directory contains device specific information (eg dev/cdrom/info). On some systems, it may be empty. - This contains the subdirectories binfmt_misc, inotify, and mqueue, and files dentry-state, dir-notify-enable, dquot-nr, file-max, file-nr, inode-max, inode-nr, inode-state, lease-break-time, leases-enable, overflowgid, overflowuid, suid_dumpable, super-max, and super-nr. - Documentation for files in this directory can be found in the kernel sources in Documentation/binfmt_misc.txt. - This file contains six numbers, nr_dentry, nr_unused, age_limit (age in seconds), want_pages (pages requested by system) and two dummy values. nr_dentry seems to be 0 all the time. nr_unused seems to be the number of unused dentries. age_limit is the age in seconds after which dcache entries can be reclaimed when memory is short and want_pages is non-zero when the kernel has called shrink_dcache_pages() and the dcache isn't pruned yet. - This file can be used to disable or enable the dnotify interface described in fcntl(2) on a system-wide basis. A value of 0 in this file disables the interface, and a value of 1 enables it. - This file shows the maximum number of cached disk quota entries. On some (2.4) systems, it is not present. If the number of free cached disk quota entries is very low and you have some awesome number of simultaneous system users, you might want to raise the limit. - This file shows the number of allocated disk quota entries and the number of free disk quota entries. This file defines a system-wide limit on the number of open files for all processes. which can be used by a process to set the per-process limit, on the number of files it may open.) If you get lots of error messages about running out of file handles, try increasing this value: echo 100000 > /proc/sys/fs/file-max The kernel constant NR_OPEN imposes an upper limit on the value that may be placed in file-max. If you increase /proc/sys/fs/file-max, be sure to increase /proc/sys/fs/inode-max to 3-4 times the new value of /proc/sys/fs/file-max, or you will run out of inodes. This (read-only) file gives the number of files presently opened. It contains three numbers: The number of allocated file handles, the number of free file handles and the maximum number of file handles. The kernel allocates file handles dynamically, but it doesn't free them again. If the number of allocated files is close to the maximum, you should consider increasing the maximum. When the number of free file handles is large, you've encountered a peak in your usage of file handles and you probably don't need to increase the maximum. - This file contains the maximum number of in-memory inodes. On some (2.4) systems, it may not be present. This value should be 3-4 times larger than the value in file-max, since stdin, stdout and network sockets also need an inode to handle them. When you regularly run out of inodes, you need to increase this value. - This file contains the first two values from inode-state. - This file contains seven numbers: nr_inodes, nr_free_inodes, preshrink and four dummy values. nr_inodes is the number of inodes the system has allocated. This can be slightly more than inode-max because Linux allocates them one page full at a time. nr_free_inodes represents the number of free inodes. preshrink is non-zero when the nr_inodes > inode-max and the system needs to prune the inode list instead of allocating more. - /proc/sys/fs/inotify (since Linux 2.6.13) - This directory contains files max_queued_events, max_user_instances, and max_user_watches, that can be used to limit the amount of kernel memory consumed by the inotify interface. For further details, see inotify(7). - This file specifies the grace period that the kernel grants to a process holding a file lease (fcntl(2)) after it has sent a signal to that process notifying it that another process is waiting to open the file. If the lease holder does not remove or downgrade the lease within this grace period, the kernel forcibly breaks the lease. - This file can be used to enable or disable file leases (fcntl(2)) on a system-wide basis. If this file contains the value 0, leases are disabled. A non-zero value enables leases. - /proc/sys/fs/mqueue (since Linux 2.6.6) - This directory contains files msg_max, msgsize_max, and queues_max, controlling the resources used by POSIX message queues. See mq_overview(7) for details. - /proc/sys/fs/overflowgid and /proc/sys/fs/overflowuid - These files allow you to change the value of the fixed UID and GID. The default is 65534. Some filesystems only support 16-bit UIDs and GIDs, although in Linux UIDs and GIDs are 32 bits. When one of these filesystems is mounted with writes enabled, any UID or GID that would exceed 65535 is translated to the overflow value before being written to disk. - /proc/sys/fs/suid_dumpable (since Linux 2.6.13) The value in this file determines whether core dump files are produced for set-user-ID or otherwise protected/tainted binaries. Three different integer values can be specified: 0 (default) This provides the traditional (pre-Linux 2.6.13) behaviour. A core dump will not be produced for a process which has changed credentials (by calling seteuid(2), setgid(2), or similar, or by executing a set-user-ID or set-group-ID program) or whose binary does not have read permission enabled. 1 ("debug") All processes dump core when possible. The core dump is owned by the file system user ID of the dumping process and no security is applied. This is intended for system debugging situations only. Ptrace is unchecked. 2 ("suidsafe") Any binary which normally would not be dumped (see "0" above) is dumped readable by root only. This allows the user to remove the core dump file but not to read it. For security reasons core dumps in this mode will not overwrite one another or other files. This mode is appropriate when administrators are attempting to debug problems in a normal environment. - This file controls the maximum number of superblocks, and thus the maximum number of mounted filesystems the kernel can have. You only need to increase super-max if you need to mount more filesystems than the current value in super-max allows you to. - This file contains the number of filesystems currently mounted. - This directory contains files acct, cad_pid, cap-bound, core_pattern, core_uses_pid, ctrl-alt-del, dentry-state, domainname, hotplug, hostname, htab-reclaim (PowerPC only), java-appletviewer (binfmt_java, obsolete), java-interpreter (binfmt_java, obsolete), l2cr (PowerPC only), modprobe, msgmax, msgmnb, msgmni, osrelease, ostype, overflowgid, overflowuid, panic, panic_on_oops, pid_max, powersave-nap (PowerPC only), printk, pty, random, real-root-dev, reboot-cmd (SPARC only), rtsig-max, rtsig-nr, sem, sg-big-buff, shmall, shmmax, shmmni, sysrq, tainted, threads-max, version, and zero-paged (PowerPC only). - This file contains three numbers: highwater, lowwater and frequency. If BSD-style process accounting is enabled these values control its behaviour. If free space on filesystem where the log lives goes below lowwater percent accounting suspends. If free space gets above highwater percent accounting resumes. Frequency determines how often the kernel checks the amount of free space (value is in seconds). Default values are 4, 2 and 30. That is, suspend accounting if <= 2% of space is free; resume it if >= 4% of space is free; consider information about amount of free space valid for 30 seconds. - This file holds the value of the kernel capability bounding set (expressed as a signed decimal number). This set is ANDed against the capabilities permitted to a process during execve(2). - See core(5). /proc/sys/kernel/core_uses_pid See core(5). - This file controls the handling of Ctrl-Alt-Del from the keyboard. When the value in this file is 0, Ctrl-Alt-Del is trapped and sent to the init(1) program to handle a graceful restart. When the value is > 0, Linux's reaction to a Vulcan Nerve Pinch (tm) will be an immediate reboot, without even syncing its dirty buffers. Note: when a program (like dosemu) has the keyboard in 'raw' mode, the ctrl-alt-del is intercepted by the program before it ever reaches the kernel tty layer, and it's up to the program to decide what to do with it. - This file contains the path for the hotplug policy agent. The default value in this file "/sbin/hotplug". - /proc/sys/kernel/domainname and /proc/sys/kernel/hostname can be used to set the NIS/YP domainname and the hostname of your box in exactly the same way as the commands domainname and hostname, i.e.: # echo "darkstar" > /proc/sys/kernel/hostname # echo "mydomain" > /proc/sys/kernel/domainname has the same effect as # hostname "darkstar" # domainname "mydomain" Note, however, that the classic darkstar.frop.org has the hostname "darkstar" and DNS (Internet Domain Name Server) domainname "frop.org", not to be confused with the NIS (Network Information Service) or YP (Yellow Pages) domainname. These two domain names are in general different. For a detailed discussion see the hostname(1) man page. - (PowerPC only) If this file is set to a non-zero value, the PowerPC htab (see kernel file Documentation/powerpc/ppc_htab.txt) is pruned each time the system hits the idle loop. - (PowerPC only) This file contains a flag that controls the L2 cache of G3 processor boards. If 0, the cache is disabled. Enabled if non-zero. - This file is described by the kernel source file Documentation/kmod.txt. - This file defines a system-wide limit specifying the maximum number of bytes in a single message written on a System V message queue. - This file defines the system-wide limit on the number of message queue identifiers. (This file is only present in Linux 2.4 onwards.) - This file defines a system-wide parameter used to initialise the msg_qbytes setting for subsequently created message queues. The msg_qbytes setting specifies the maximum number of bytes that may be written to the message queue. - /proc/sys/kernel/ostype and /proc/sys/kernel/osrelease - These files give substrings of /proc/version. - /proc/sys/kernel/overflowgid and /proc/sys/kernel/overflowuid - These files duplicate the files /proc/sys/fs/overflowgid and /proc/sys/fs/overflowuid. - gives read/write access to the kernel variable panic_timeout. If this is zero, the kernel will loop on a panic; if non-zero it indicates that the kernel should autoreboot after this number of seconds. When you use the software watchdog device driver, the recommended setting is 60. - This file (new in Linux 2.5) controls the kernel's behaviour when an oops or BUG is encountered. If this file contains 0, then the system tries to continue operation. If it contains 1, then the system delays a few seconds (to give klogd time to record the oops output) and then panics. If the /proc/sys/kernel/panic file is also non-zero then the machine will be rebooted. - This file (new in Linux 2.5) specifies the value at which PIDs wrap around (i.e., the value in this file is one greater than the maximum PID). The default value for this file, 32768, results in the same range of PIDs as on earlier kernels. On 32-bit platforms, 32768 is the maximum value for pid_max. On 64-bit systems, pid_max can be set to any value up to 2^22 (PID_MAX_LIMIT, approximately 4 million). - /proc/sys/kernel/powersave-nap (PowerPC only) - This file contains a flag. If set, Linux-PPC will use the 'nap' mode of powersaving, otherwise the 'doze' mode will be used. - The four values in this file are console_loglevel, default_message_loglevel, minimum_console_level and default_console_loglevel. These values influence printk() behavior when printing or logging error messages. See syslog(2) for more info on the different loglevels. Messages with a higher priority than console_loglevel will be printed to the console. Messages without an explicit priority will be printed with priority default_message_level. minimum_console_loglevel is the minimum (highest) value to which console_loglevel can be set. default_console_loglevel is the default value for console_loglevel. - /proc/sys/kernel/pty (since Linux 2.6.4) - This directory contains two files relating to the number of Unix 98 pseudo-terminals (see pts(4)) on the system. - This file defines the maximum number of pseudo-terminals. - This read-only file indicates how many pseudo-terminals are currently in use. - This directory contains various parameters controlling the operation of the file /dev/random. See random(4) for further information. - This file is documented in the kernel source file Documentation/initrd.txt. - /proc/sys/kernel/reboot-cmd (Sparc only) - This file seems to be a way to give an argument to the SPARC ROM/Flash boot loader. Maybe to tell it what to do after rebooting? - (Only in kernels up to and including 2.6.7; see setrlimit(2)) This file can be used to tune the maximum number of POSIX realtime (queued) signals that can be outstanding in the system. - (Only in kernels up to and including 2.6.7.) This file shows the number POSIX realtime signals currently queued. - /proc/sys/kernel/sem (since Linux 2.4) This file contains 4 numbers defining limits for System V IPC semaphores. These fields are, in order: - The maximum semaphores per semaphore set. - A system-wide limit on the number of semaphores in all semaphore sets. - The maximum number of operations that may be specified in a semop(2) call. - A system-wide limit on the maximum number of semaphore identifiers. - This file shows the size of the generic SCSI device (sg) buffer. You can't tune it just yet, but you could change it on compile time by editing include/scsi/sg.h and changing the value of SG_BIG_BUFF. However, there shouldn't be any reason to change this value. - This file contains the system-wide limit on the total number of pages of System V shared memory. - This file can be used to query and set the run time limit on the maximum (System V IPC) shared memory segment size that can be created. Shared memory segments up to 1Gb are now supported in the kernel. This value defaults to SHMMAX. - (available in Linux 2.4 and onwards) This file specifies the system-wide maximum number of System V shared memory segments that can be created. contains a string like: #5 Wed Feb 25 21:49:24 MET 1998.TP The '#5' means that this is the fifth kernel built from this source base and the date behind it indicates the time the kernel was built. - /proc/sys/kernel/zero-paged (PowerPC only) - This file contains a flag. When enabled (non-zero), Linux-PPC will pre-zero pages in the idle loop, possibly speeding up get_free_pages. - This directory contains networking stuff. Explanations for some of the files under this directory can be found in tcp(7) and ip(7). - This directory may be empty. - This directory supports Sun remote procedure call for network file system (NFS). On some systems, it is not present. - This directory contains files for memory management tuning, buffer and cache management. - /proc/sys/vm/drop_caches (since Linux 2.6.16) Writing to this file causes the kernel to drop clean caches, dentries and inodes from memory, causing that memory to become free. To free pagecache, use echo 1 > /proc/sys/vm/drop_caches; to free dentries and inodes, use echo 2 > /proc/sys/vm/drop_caches; to free pagecache, dentries and inodes, use echo 3 > /proc/sys/vm/drop_caches. Because this is a non-destructive operation and dirty objects are not freeable, the user should run sync(8) first. - /proc/sys/vm/legacy_va_layout (since Linux 2.6.9) - If non-zero, this disable the new 32-bit memory-mapping layout; the kernel will use the legacy (2.4) layout for all processes. This file contains the kernel virtual memory accounting mode. 0: heuristic overcommit (this is the default) 1: always overcommit, never check 2: always check, never overcommit In mode 0, calls of mmap(2) with MAP_NORESERVE set are not checked, and the default check is very weak, leading to the risk of getting a process "OOM-killed". Under Linux 2.4 any non-zero value implies mode 1. In mode 2 (available since Linux 2.6), the total virtual address space on the system is limited to (SS + RAM*(r/100)), where SS is the size of the swap space, and RAM is the size of the physical memory, and r is the contents of the file /proc/sys/vm/overcommit_ratio. - See the description of /proc/sys/vm/overcommit_memory. - Subdirectory containing the pseudo-files msg, sem and shm. These files list the System V Interprocess Communication (IPC) objects (respectively: message queues, semaphores, and shared memory) that currently exist on the system, providing similar information to that available via ipcs(1). These files have headers and are formatted (one IPC object per line) for easy understanding. svipc(7) provides further background on the information shown by these files. - Subdirectory containing the pseudo-files and subdirectories for tty drivers and line disciplines. - This file contains two numbers: the uptime of the system (seconds), and the amount of time spent in idle process (seconds). This string identifies the kernel version that is currently running. It includes the contents of /proc/sys/ostype, /proc/sys/osrelease and Linux version 1.0.9 (quinlan@phaze) #1 Sat May 14 01:51:54 EDT 1994 - /proc/vmstat (since Linux 2.6) - This file displays various virtual memory statistics. - /proc/zoneinfo (since Linux 2.6.13) - This file display information about memory zones. This is useful for analysing virtual memory behaviour. NOTESMany strings (i.e., the environment and command line) are in the internal format, with sub-fields terminated by null bytes ('\0'), so you may find that things are more readable if you use od -c or tr "\000" "\n" to read them. Alternatively, echo `cat <file>` works well. SEE ALSOcat(1), find(1), free(1), mount(1), ps(1), tr(1), uptime(1), chroot(2), mmap(2), readlink(2), syslog(2), slabinfo(5), hier(7), arp(8), dmesg(8), hdparm(8), ifconfig(8), init(8), lsmod(8), lspci(8), netstat(8), procinfo(8), route(8) examples of using proc CPU Flags and Meanings
<urn:uuid:e4df00ba-a2fb-4585-ab56-44f99698ce4c>
CC-MAIN-2016-26
http://www.thelinuxblog.com/linux-man-pages/5/proc
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393332.57/warc/CC-MAIN-20160624154953-00124-ip-10-164-35-72.ec2.internal.warc.gz
en
0.813291
11,460
3.09375
3
The internet is a great way to get information. If you want to use the internet display your own information, you need to learn how to create a website. These are instructions on how to use simple HTML to create a website. Step 1: Create a new file 1. Go to http://notepad-plus-plus.org/download/v6.5.html to download notepad++ and then install it . Create a new file in a text editor by clicking file->new after you have installed notepad++.
<urn:uuid:a5a10242-2be9-4e3c-a595-04c04cc1f190>
CC-MAIN-2016-26
http://www.instructables.com/id/How-to-Create-a-Website-2013/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396027.60/warc/CC-MAIN-20160624154956-00096-ip-10-164-35-72.ec2.internal.warc.gz
en
0.774022
109
2.828125
3
|Conservation and Development in Northern Thailand. Proceedings of a Programmatic Workshop on Agro-forestry and Highland-Lowland Interactive Systems, Held at Chiang Mai, Thailand, 13-17 November 1978 (UNU, 1980, 114 pages)| |Subcommittee reports, plenary discussion, and recommendations| Very important aspects for a study of highland-lowland interactions in Northern Thailand are climate, soils. and soil erosion, in association with mapping of cover types and land-use patterns. For climatic conditions, rainfall characteristics are particularly important; soil properties must be detailed; and soil erosion and sediment transport must be determined. Climatic observations have been carried out at the following stations that are located in the vicinity of the Huai Thung Choa field area: (a) the station itself (alt. 1,200 m); (b) Huai Kok Ma (1,100 m); (c) Doi Chiang Dao (above 1,000 m); (d) Royal Ang Kang Research Station (1.400 m): (e) Chiang Mai University Geography Department and Multi-cropping Project, Department of Agriculture. and Weather Station at Chiang Mai Airport (354 m). (f) Mae Sa Watershed Project (about 800 m); and (9) Chang Kien Station (200 m). Some of these localities have climatic data over a period of more than 10 years. A very general soil survey may be available from the Land Development Department, Ministry of Agriculture. Geological maps at 1:1,000,000 and 1250,000 should be available. but these will be of limited value. Available Data-Soil Erosion There are very few studies concerning soil erosion. Run-off amounts. together with transported materials are observed at several stations but there is nothing available for the immediate research area (cf. Kunstadter et al. eds., 1978, chaps. 7 and 8). Daily values for rainfall as well as humidity must be collected for as long a period as possible. Also there is critical need for detailed knowledge of distribution of rainfall intensities and standard climatological observations throughout the Huai Thung Choa field area as a basis for establishment of an applied topoclimatology. This should lead to statistical analysis of occurrences. frequencies, return periods, lapse rates, and secular changes. A minimum of 10 rainfall recorders and thermographs should be distributed throughout the field area, and a full topoclimatological unit should be established at the station itself. Investigation of soil types. chemical and physical characteristics should be undertaken as a basis for soils mapping and soil erosion studies. This will also provide data for vegetation regeneration studies and productivity. Research Needs-Soil Erosion A series of observations on actual soil erosion processes must be made through a range of slopes, aspects, and soil and vegetation cover types. Water discharge, erosion rates, and sediment transport must be observed for the local watershed. Differentiation between natural and man-made, or man-augmented, processes should be attempted. Two to three months are required for training observers in each of the three categories-climate. soils, and soil erosion. It will probably be necessary to make provision for adding two scientist-consultants to the project for a period of two or three months. The cost of climatological instrumentation may be supported by certain Japanese foundations. A minimum of one year is required for the topoclimatologicai study and it should begin during 1979. The soil mapping may need three years. Soil erosion studies should be carried on for three to five years and preferably on a permanent basis. After establishment through the central UNU project this could possibly be taken over by the Royal Forestry Department. We expect that support can be obtained through collaboration with local (Chiang Mai and Government) agencies and institutions. Much of the effectiveness of these proposals, through the opportunity for their wider applications, will depend upon provision of a good topographic and thematic map base (see the report on mapping and cover type data requirements).
<urn:uuid:85c48a4c-f403-4c50-85c6-49fcb050220a>
CC-MAIN-2016-26
http://www.nzdl.org/gsdlmod?e=d-00000-00---off-0ccgi--00-0----0-10-0---0---0direct-10---4-------0-1l--11-en-50---20-preferences---00-0-1-00-0-0-11-1-0utfZz-8-00-0-0-11-10-0utfZz-8-10&a=d&cl=CL2.2&d=HASHf2e1bb72fb08c9f1d6624b.7.3
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396538.42/warc/CC-MAIN-20160624154956-00076-ip-10-164-35-72.ec2.internal.warc.gz
en
0.906547
840
2.921875
3
Stanford scientists build a 'brain stethoscope' to turn seizures into music When Chris Chafe and Josef Parvizi began transforming recordings of brain activity into music, they did so with artistic aspirations. The professors soon realized, though, that the work could lead to a powerful biofeedback tool for identifying brain patterns associated with seizures. Josef Parvizi was enjoying a performance by the Kronos Quartet when the idea struck. The musical troupe was midway through a piece in which the melodies were based on radio signals from outer space, and Parvizi, a neurologist at Stanford Medical Center, began wondering what the brain's electrical activity might sound like set to music. He didn't have to look far for help. Chris Chafe, a professor of music research at Stanford, is one of the world's foremost experts in "musification," the process of converting natural signals into music. One of his previous works involved measuring the changing carbon dioxide levels near ripening tomatoes and converting those changing levels into electronic performances. Parvizi, an associate professor, specializes in treating patients suffering from intractable seizures. To locate the source of a seizure, he places electrodes in patients' brains to create electroencephalogram (EEG) recordings of both normal brain activity and a seizure state. He shared a consenting patient's EEG data with Chafe, who began setting the electrical spikes of the rapidly firing neurons to music. Chafe used a tone close to a human's voice, in hopes of giving the listener an empathetic and intuitive understanding of the neural activity. Upon a first listen, the duo realized they had done more than create an interesting piece of music. [Listen to the audio here] "My initial interest was an artistic one at heart, but, surprisingly, we could instantly differentiate seizure activity from non-seizure states with just our ears," Chafe said. "It was like turning a radio dial from a static-filled station to a clear one." If they could achieve the same result with real-time brain activity data, they might be able to develop a tool to allow caregivers for people with epilepsy to quickly listen to the patient's brain waves to hear whether an undetected seizure might be occurring. Parvizi and Chafe dubbed the device a "brain stethoscope." The sound of a seizure The EEGs Parvizi conducts register brain activity from more than 100 electrodes placed inside the brain; Chafe selects certain electrode/neuron pairings and allows them to modulate notes sung by a female singer. As the electrode captures increased activity, it changes the pitch and inflection of the singer's voice. Before the seizure begins – during the so-called pre-ictal stage – the peeps and pops from each "singer" almost synchronize and fall into a clear rhythm, as if they're following a conductor, Chafe said. In the moments leading up to the seizure event, though, each of the singers begins to improvise. The notes become progressively louder and more scattered, as the full seizure event occurs (the ictal state). The way Chafe has orchestrated his singers, one can hear the electrical storm originate on one side of the brain and eventually cross over into the other hemisphere, creating a sort of sing-off between the two sides of the brain. After about 30 seconds of full-on chaos, the singers begin to calm, trailing off into their post-ictal rhythm. Occasionally, one or two will pipe up erratically, but on the whole, the choir sounds extremely fatigued. It's the perfect representation of the three phases of a seizure event, Parvizi said. Part art exhibit, part experiment Caring for a person with seizures can be very difficult, as not all seizure activity manifests itself with behavioral cues. It's often impossible to know whether a person with epilepsy is acting confused because they are having a seizure, or if they are experiencing the type of confusion that is a marker of the post-ictal seizure phase. To that end, Parvizi and Chafe hope to apply their work to develop a device that listens for the telltale brain patterns of an ongoing seizure or a post-ictal fatigued brain state. "Someone – perhaps a mother caring for a child – who hasn't received training in interpreting visual EEGs can hear the seizure rhythms and easily appreciate that there is a pathological brain phenomenon taking place," Parvizi said. The device can also offer biofeedback to non-epileptic patients who want to hear the music their own brain waves create. The effort to build this device is funded by Stanford's Bio-X Interdisciplinary Initiatives Program (Bio-X IIP), which provides money for interdisciplinary projects that have potential to improve human health in innovative ways. Bio-X seed grants have funded 141 research collaborations connecting hundreds of faculty since 2000. The proof-of-concept projects have produced hundreds of publications, dozens of patents, and more than a tenfold return on research funds to Stanford. From a clinical perspective, the work is still very experimental. "We've really just stuck our finger in there," Chafe said. "We know that the music is fascinating and that we can hear important dynamics, but there are still wonderful revelations to be made." Next year, Chafe and Parvizi plan to unveil a version of the system at Stanford's Cantor Arts Center. Visitors will don a headset that will transmit an EEG of their brain activity to their handheld device, which will convert it into music in real time. "This is what I like about Stanford," Parvizi said. "It nurtures collaboration between fields that are seemingly light-years apart – we're neurology and music professors! – and our work together will hopefully make a positive impact on the world we live in." Bjorn Carey, Stanford News Service: (650) 725-1944, email@example.com
<urn:uuid:920c4f8c-4a44-4f37-a5b4-685a5cd18f6f>
CC-MAIN-2016-26
http://news.stanford.edu/news/2013/september/seizure-music-research-092413.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783403826.29/warc/CC-MAIN-20160624155003-00167-ip-10-164-35-72.ec2.internal.warc.gz
en
0.946899
1,245
3.484375
3
Simple Definition of sully : to damage or ruin the good quality of (something) Full Definition of sully : to make soiled or tarnished : defile Examples of sully in a sentence <people that sully our state parks with their trash> <a once-gleaming marble interior sullied by decades of exposure to cigarette smoke> Did You Know? The spelling of sully has shifted several times since it was sylian in Old-English, but its meaning has remained essentially the same: "to soil." If you're looking for other words that mean "to soil," you can try out befoul, besmirch, blacken, foul, grime, stain, or simply dirty. You might wonder if the English word sullen (meaning "gloomy or morose") is a relative of sully, and the answer is no. Sullen traces back by way of Anglo- and Old French to Latin solus, meaning "alone." Origin and Etymology of sully Middle English *sullien, probably alteration (influenced by Anglo-French suillier, soiller to soil) of sulen to soil, from Old English sylian First Known Use: 15th century Definition of Sully Thomas 1783–1872 Am. (Eng.-born) painter Seen and Heard What made you want to look up sully? Please tell us where you read or heard it (including the quote, if possible).
<urn:uuid:e5eec197-a1b3-40e3-b9f8-05e5c2508425>
CC-MAIN-2016-26
http://www.merriam-webster.com/dictionary/sullies
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783404382.73/warc/CC-MAIN-20160624155004-00000-ip-10-164-35-72.ec2.internal.warc.gz
en
0.941052
319
2.8125
3
Eating Well As You Get Older Frequently Asked Questions 7. How many vegetables should I aim for every day? Which ones should I have? A person who eats 2,000 calories daily should have 2 ½ cups of vegetables a day. This might include a half-cup each of broccoli, tomatoes, cauliflower, and a sweet potato. Aim for lots of color on your plate as a way to get a variety of vegetables each day. Vegetables contain lots of vitamins, minerals, fiber, and other substances important for good health. Plus, most are low in fat and calories. Broccoli, spinach, turnip and collard greens, and other dark leafy greens are good choices. You might also choose red and orange vegetables, such as tomatoes, carrots, sweet potatoes, pumpkin,red peppers or winter squash. Vegetables may be purchased raw or cooked, frozen, canned, or dried/dehydrated. They may be eaten whole, cut-up, or mashed.
<urn:uuid:3c330bc1-202b-4823-a56e-8e53398d1286>
CC-MAIN-2016-26
http://nihseniorhealth.gov/eatingwellasyougetolder/faq/faq7.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396100.16/warc/CC-MAIN-20160624154956-00172-ip-10-164-35-72.ec2.internal.warc.gz
en
0.939439
204
3.078125
3
- Order: Passeriformes - Family: Tyrannidae Amazonia Lodge, Kosñipata Valley, Madre de Dios, Peru; 27 October 2014 © Ken Simonite The Little Ground-Tyrant is a small terrestrial flycatcher of western Amazonia in South America. Found in Amazonian lowlands of Colombia, Ecuador, Peru, Bolivia, and Brazil below 800 meters in elevation, the species inhabits open bars on river islands as well as flat, open grassy areas. It is sandy gray-brown above with darker wings edged in buff-rust, a blackish tail, white superciliary, thin blackish bill, and off-white underparts. Little Ground-Tyrant often perches conspicuously on the ground and rarely calls. It is the only Muscisaxicola ground-tyrant found within its Amazonian range. . 2010. Little Ground-Tyrant (Muscisaxicola fluviatilis), Neotropical Birds Online (T. S. Schulenberg, Editor). Ithaca: Cornell Lab of Ornithology; retrieved from Neotropical Birds Online: http://neotropical.birds.cornell.edu/portal/species/overview?p_p_spp=462796
<urn:uuid:729b7674-4557-4ebc-8b6f-3114b076b866>
CC-MAIN-2016-26
http://neotropical.birds.cornell.edu/portal/species/overview?p_p_spp=462796
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398628.62/warc/CC-MAIN-20160624154958-00121-ip-10-164-35-72.ec2.internal.warc.gz
en
0.821211
270
2.546875
3
UNIVERSITY PARK, Pa. — A quick Google search for “mobile device” and “germs” lists pages of reports about how your smart phone is likely dirtier than a toilet seat and how you’d be terrified if you knew all the germs and bacteria it collects in a single day. That’s to say nothing of the tablets and touch screens you use everywhere from the gas pump to the grocery checkout. “You’re going to find a lot of germs, such as bacteria and viruses, on anything that gets touched by a lot of people,” he said. “This is not new information. It’s why we should be careful about door knobs and why we should wash our hands after we use a bathroom.” Link not proven He said some articles suggest the glass surfaces of touch screens are more prone to having germs adhere to them, however that doesn’t prove a link between the presence of bacteria on the devices and illnesses produced in the users. “Yes, there is evidence the flu virus can persist on surfaces for several hours — and the MRSA bacteria for many days — but ultimately, those things have to get to someone’s hand and then into their body to cause a problem,” he said. “So you need to balance concern with common sense.” Katzman said the skin is a natural protective barrier to prevent infection, but places like the mouth, the lining of the nose and the moist part of the eyes don’t have that barrier. Nor do open cuts or wounds, or inflamed areas around the fingernails. Staying healthy is a matter of using the same precautions we’ve known for years and applying them to the new technology. Wash your hands after shaking hands, coughing or sneezing, and especially before touching your eyes and nose or before eating. In a world with hand sanitizer around every corner, Katzman reminds us that washing with soap and water is still an excellent way to stay germ-free. “An often overlooked point by the community is that alcohol-based sanitizers do not work if your hands are visibly soiled,” he said. “You have to physically remove dirt and have fairly clean hands for them to be effective.” Several companies sell products to remove physical residue and fingerprints from electronic devices, but Katzman said a simple microfiber cloth — dry or with a bit of water on it — would help significantly, even though it won’t sterilize a screen. If you are still intent on trying to sterilize a device’s screen, be cautious before using cleaners that could damage a touch screen or seep into cracks of electronic devices and ruin them.
<urn:uuid:c27308cf-cd04-4bbf-b09f-5309cd4f6c24>
CC-MAIN-2016-26
http://www.farmanddairy.com/news/cellphones-really-covered-germs/195389.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397842.93/warc/CC-MAIN-20160624154957-00046-ip-10-164-35-72.ec2.internal.warc.gz
en
0.947663
584
2.859375
3
Of the 5.8 million elevators in the world, 760,000, or 13 percent, are in North America, according to the industry publication Elevator World. The majority of the world's elevators are traction-type, which are usually found in taller buildings. Traction elevators traditionally use steel cables that wrap around a sheave and connect both to counterweights and to the elevator car. However, 85 percent of elevators in North America are hydraulic, which are usually found in low-rise buildings. These are operated by oil, which is pumped by a power unit that is typically below grade. As the oil is pumped, it lifts the elevator. The elevator industry is somewhat insulated from the current economic downturn in part because of the Americans with Disabilities Act (ADA), which requires that facilities be accessible, according to Rory Smith, ThyssenKrupp's vice president of product planning. Smith says that without the ADA, many small, low-rise buildings in the United States would not have elevators. New technologies have resulted in another industry trend: elevators that do not require machine rooms. These place all machinery within the elevator shaft itself, leaving more usable space in the building for other systems. New technology for these machines includes synchronous electric motors that are smaller than traditional motors and have higher efficiencies and improved suspension systems that reduce torque. Machine room-less elevators use special traction belts that utilize smaller motors with higher efficiencies and improved suspension systems. This significantly reduces the size of equipment, and therefore, the installation costs as well.
<urn:uuid:d23ffeab-ad98-47f3-9704-5f48d8be65f0>
CC-MAIN-2016-26
http://www.bdcnetwork.com/ada-helps-keep-us-elevator-market-strong
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398873.39/warc/CC-MAIN-20160624154958-00199-ip-10-164-35-72.ec2.internal.warc.gz
en
0.956028
321
3.0625
3
Beauty in Stone: The Industrial Films of the Georgia Marble Company - Coverage Dates: 1950/1969 Beauty in Stone: The Industrial Films of the Georgia Marble Company consists of two short industrial films made by the Georgia Marble Company in the 1950s-1960s that document the company's history, operations, skilled laborers and craftspeople, and the widespread use of their marble, limestone and serpentine products. Georgia Marble Company's use of the industrial film medium served to promote its products by capturing in live action the skill and industry required to create "beauty in stone." The first film, New Face on Capitol Hill, depicts Georgia Marble Company's role in the reconstruction of the east façade of the U.S. Capitol building prior to John F. Kennedy's inauguration, and includes footage of president John F. Kennedy at his 1961 inauguration, the former vice president Richard M. Nixon, and Architect of the Capitol J. George Stewart. The second film, Producing America's Buried Treasures, focuses more closely on the company's overall history, its quarrying and finishing facilities in Georgia, Tennessee and Vermont, the breadth of applications for Georgia marble products and related limestone and serpentine industries in Alabama and Virginia. Unique to this film are its highlights of uses for processed marble in products that include roofing material, and turf marking for athletic fields. Both Producing America's Buried Treasure and the New Face on Capitol Hill feature the company's marble quarrying and finishing operations in Pickens County, Georgia; both include pictorial examples of marble-quarrying and marble-shaping machinery, of stone cutters working in the quarry, and of craftsmen sculpting the marble. Many beautiful high-quality products were produced by the Georgia Marble Company, and a number of well-known structures comprised of Georgia marble are interspersed throughout both films. Most notable are the statue Abraham Lincoln in the Lincoln Memorial, and the façade of the U.S. Capitol Building, the centerpiece of New Face on Capitol Hill. - Database Provider: Digital Library of Georgia. Express Link (bookmark): http://www.galileo.usg.edu/express?link=gmrb
<urn:uuid:fa552d24-3d50-40cf-b2c4-ae642df09b3d>
CC-MAIN-2016-26
http://www.galileo.usg.edu/high-school/databases/gmrb/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395620.56/warc/CC-MAIN-20160624154955-00083-ip-10-164-35-72.ec2.internal.warc.gz
en
0.930743
451
2.703125
3
Benefits of Organized Sports For Children Doctors recommend that children aged between 5 to 18 years old should be involved in sporting activities to develop adequate physical fitness and mental strength. The psychological and social benefits of organized sports help children to learn to handle strenuous situations, and improve self-esteem and interpersonal relationships. The benefits obtained from involvement in sports remain with the child well into their adult life. It is therefore something that parents must take very seriously. The exercising of reflexes and continuous stretch on their ability that sports bring ensure the child grows healthily. The discipline of organized sports is often cited as one of the most effective ways of preventing obesity among children. The often-quoted cliché that ‘All work and no play makes Jack a dull boy' could never be more true as concerns children. Focus on academic excellence only is bound to not only lead to feature problems in forging long lasting relationships but worst case, the child may end up channeling the excess energy into something harmful. What is remarkable in this regard is that children that are involved in organized sports on average perform better than those who shun games. That is, assuming both children are subjected to the same number of study hours each week. Organized sports are one way of teaching children that life is multifaceted. Each person is not a sum total of only one talent. Sport also teaches them that development and success is indeed possible when you apply yourself to something. It is a great way to inculcate a strong work ethic in children that they will not lose in their adult life. Sport also provides an important channel through which children start to be introduced to the realities of life: You win some, you lose some. It sometimes does not matter how hard you prepare; you can actually lose a match regardless of how well you prepared. This vital lesson starts to build the foundations of emotional maturity that they will need in later life. The child starts to understand that there will be times when someone else will be on the podium and the best one can do is congratulate the winner and work hard to be the one there next time. Losing is not the end of the world. The child learns how to deal with adversity. When they lose a game, they know how to control themselves because they know that they will play many other games in the future and that they might win in one of those games. When children start to get involved in drug and alcohol abuse, often it stems from the absence of a recreational substitute. This is one void that organized sports can start to fill especially if started early enough. Of course, this does not mean that sports are the panacea for controlling drug abuse; the point is that it reduces the likelihood of this happening among children and teens. Finally, organized sport has been the training ground of many of the world's greatest leaders of our time. The child sees the effect of organization and teamwork and if they do serve as a captain, start to understand the people dynamics that are at play in team environments. Rhonda Reyes is a writer for My Baby Bedding Shop and is the loving parent of two. One boy and one girl. Her children are all grown up now but she loves writing about children and giving tips on certain scenarios that parents are faced with along the way. Rhonda sure hopes that you have found this article helpful.
<urn:uuid:5e59c210-e8b3-4bb2-9188-0492b59c3dff>
CC-MAIN-2016-26
http://www.teaching-tiny-tots.com/benefits-of-organized-sports-for-children.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783391519.0/warc/CC-MAIN-20160624154951-00132-ip-10-164-35-72.ec2.internal.warc.gz
en
0.970118
677
3.015625
3
Lesson 1 (from Chapters 1-3) "Laughter in the Dark" was originally written in Russian, the author's mother tongue. Later, when the novel was translated into English by another author, Nabokov took it upon himself to translate it more accurately, as Nabokov was a multi-lingual writer. Perhaps, the work he is most known for is "Lolita." This lesson discusses the author of "Laughter in the Dark," Vladimir Nabokov. 1) Library Research: Have the students research Vladimir Nabokov. Explore the other works he has written, as well as his background. Take a look at critical essays and other documentation to gain information on his writing and where "Laughter in the Dark" fits in with his other novels. 2) Presentation: Have students get into pairs and prepare a presentation, using their research, on Nabokov and his canon. Have each group read an excerpt from different novels written by Nabokov during their presentation. At... This section contains 8,521 words (approx. 29 pages at 300 words per page)
<urn:uuid:85a463be-3d32-416b-9059-b0ccaa522c58>
CC-MAIN-2016-26
http://www.bookrags.com/lessonplan/laughter-in-the-dark/lessons.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396100.16/warc/CC-MAIN-20160624154956-00020-ip-10-164-35-72.ec2.internal.warc.gz
en
0.976497
231
3.703125
4
The latest results of the National Assessment of Educational Progress (NAEP) in science are out, and they provide compelling evidence that accountability works. The old saying goes that "what gets tested gets taught." That's not quite right; what schools are held accountable for gets taught-and learned. Take a look at the five "gold star" states that posted statistically significant gains since 2000 at both the fourth-grade and eighth-grade levels: California, Hawaii, Kentucky, South Carolina, and Virginia. Now take a gander at three states among the few in the nation that currently include science as part of their school accountability system: Kentucky, South Carolina, and Virginia. Spot a pattern Much is made of the fact that No Child Left Behind will require all states to test students in science starting in 2007-2008. By our count, 31 states already have at least one science test in place. But it is these three states-where results on a science test count when determining a school's rating or accreditation-that are showing big gains. (True, that doesn't explain California or Hawaii, though perhaps the former's best-in-the-nation science standards [see here] deserve some credit.) What's the lesson for policymakers, especially members of Congress? Simple: if they worry about achievement in science and want schools to focus on the subject, they need to add it to the accountability mix. As it currently stands, science won't "count" under NCLB-in terms of determining whether schools make Adequate Yearly Progress (AYP)-even when testing commences in that subject. A few months ago, the Administration quietly floated a proposal to change that. To date, Congress has shown scant interest in the idea, working instead to add myriad new programs and initiatives to train teachers and boost achievement in science in the name of "competitiveness." We don't need more programs or symbolic efforts at "professional development." For the many middle- and high-school science teachers who didn't study science in college, a summer workshop is not going to do much good. What we need is to make science matter as much for schools as it matters for the nation, to provide incentives for schools to do whatever it takes to improve student learning in the subject. (In response, schools might even decide to pay physics teachers more than phys ed. teachers, in line with good science, a.k.a. the law of supply and demand.) The best news of the week, then, is that a bipartisan group of Congressmen, led by physicist Vernon Ehlers (R-Mich), has floated a bill (H.R. 5442) that would add science to the AYP formula. Kentucky, South Carolina, and Virginia performed a valuable service by experimenting with accountability for science. Now that their strong results are in, let's take their approach nationwide.
<urn:uuid:3450f2c5-b350-4e39-beaf-50541434b2c2>
CC-MAIN-2016-26
http://www.edexcellence.net/commentary/education-gadfly-weekly/2006/may-25/science-experiment.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396106.71/warc/CC-MAIN-20160624154956-00006-ip-10-164-35-72.ec2.internal.warc.gz
en
0.961863
585
3.078125
3
The Warburton Website The Warburton Society Join Page The Guild of One Name Studies The text of this section, together with the results chart, and the text of the following section About DNA Testing is available as a PDF document called The Warburton Surname DNA Project. DNA testing has recently begun to play an important role in genealogical research, as an addition to traditional methods. A Y-chromosome DNA test will determine the probability that the testee shares a common ancestor with any other Warburton who as taken the test. This common ancestor will have lived within the last 700 years i.e. the period during which the name has been in use. Therefore I intend it should play a central role in my One-name Study. For each Warburton clan identified by the study I plan to identify the typical Y-chromosome profile of that clan. This requires the identification of 2 similar profiles from descendants of the clan's oldest At this stage the project is only seeking holders of the Warburton surname. However, if you believe your name is derived from Warburton, and you wish to test your assumption, you will be welcome to Before contributing you may want to learn more about DNA testing. My own explanation can be found in the About DNA Testing section of this site. You will also find some references. The project will aim to provide other information: Each DNA includes a predicted haplotype. The historical background for each distinct Warburton haplotype will be documented. Some DNA profiles may be associated with specific localities. This could be particularly useful in helping New World Warburtons trace their The degree of variation between the profiles in a clan will give an indication of the time since the clan’s common ancestor lived. This will indicate whether there were multiple adopters of the Warburton name in the Middle Ages, or if most distinct clans originate from later, non-paternal events. I discuss ‘non-parental events ‘ in The Significance of Distinct Profiles below. The success of the project depends on numbers of Warburtons participating. Because it tests the Y-chromosome, only males can be tested. However female genealogists can get involved by testing a male relative. Also because a change in a 43 marker DNA profile will only occur on average once every 12 generations it is only necessary to test one male from each family. I would recommend you chose the oldest available male. In fact where a relationship is already known, it is unnecessary for anyone closer than 3rd cousins to take the test as it would yield little information, but runs the risk of finding an unknown break in the Enrolment in the DNA Project is now possible without taking a test and brings with it membership of the Warburton Society. Just click here to go to the DNA Heritage join page, or if you have a query or comment click here to send me an email. If you would wish to take the test simply select to enrol with a test. The project uses the full 43-marker test. Because this project is part of the Advantage program at DNA Heritage a Y-chromosome DNA test taken as part of this project costs $149 US (a $50 discount on the standard price). As an currently offer a DNA test at just $79 for 37 markers for subscribers. If you already subscribe to Ancestry this may be a cheaper option. You can enrol without a test and send me your results and I will include them in the project However, before proceeding we should explore your known Warburton ancestors to see if a link can be established with a known family. This might obviate the need for a test as I may already have a profile for your family. The process of testing, payment, and notification of individual results is being run by DNA Heritage. DNA Heritage will confirm your enrolment by email, and issue an invoice which can be paid online by credit or debit card. On receipt of payment they will send a test kit to your home. When the test kit arrives you simply perform the test, which involves taking a swab from inside your cheek, and mail the kit back. There are two options. You can either mail the kit direct to the laboratory in Utah, or mail it to the UK office in Wiltshire for onward dispatch. There will be addressed envelopes for each.. You will then be informed when the result is available, and how to access it. I get copies of all DNA I may also place the results on 2 databases for comparison purposes. These are Ybase, free, open global genealogical resource that is closely linked to DNA Heritage, a similar resource from Family Tree DNA. In each case the DNA result will only be identified by a code and place of origin, and of course that it is a participation signifies your agreement to me using your result in this way. I have established a Project Fund so I can invite anyone to take a test whose profile is of more interest to the project than to themselves. I can also offer a Warburton Y-chromosome DNA test (normally $189) to anyone who donates $150 to the fund. Just click here to go to the Project Page at DNA Heritage, and click the 'Make a Donation' button. Then send me an email by clicking here stating the name, postal address, and optionally email address of the person to be tested and I will get a test kit sent, and when the time comes, pay the invoice from the Project Fund. If a group of you wish to pool donations to fund a test that's fine. simple donations are welcome. Every little helps. If you would like to support the project by making a donation to the fund please click here. This will take you to the appropriate page at DNA Heritage where you can make your donation via credit card, or PayPal. Heritage has been chosen as the testing site for the Warburton Surname DNA Project for the following reasons: They offer a very comprehensive 43-marker test at a reasonable price. If the project administrator is a typical Warburton it is possible that many participants will conform to the most common Western European DNA profile (called the Atlantic Modal Haplotype). It is therefore important to start with a high-resolution test that will differentiate participants At $199 for the 43-marker test (reduced to $149 for participants in the Warburton surname project), they offer a competitive price. They provide a service for administrating and reporting on a 4. They are a British company, but conduct all their testing in the USA. Each participant will receive his own results in a report from DNA Heritage. As Project Administrator I will also see their results and will be able to compare them with other results. A table of results can be The following commentary assumes knowledge of some DNA concepts. These are explained on the About DNA page of this site. now have results from 16 participants, plus a few possibly related profiles from other sources. These results have produced 10 different profiles. There are also four different haplotypes. In addition I have the results of two possible Warburtons, one from Ysearch, and one supplied independently. The owner of the Ysearch Y-chromosome has a family legend that that his ancestor was a Warburton who used his mother’s maiden name to escape certain lady problems when emigrating to America. As yet this profile has no match so further genealogical research and/or a genetic match with a genuine Warburton are needed to confirm this. The second profile from a man who is believed to be descended from the brother of a man who adopted the Warburton name, and so his profile is potentially the profile of the Warburton descendants (see The Mongan Warburtons in Warburton Clans). To understand the significance of these results I will describe my approach to analysing the results, before discussing the significance of distinct profiles, and describing matched profiles. There is also a section explaining the various haplotypes, and one on my mitochondria The first task in analysing the results is to group matching results. A match occurs when the number of individual marker mismatches is low enough to have occurred in the 750 years, or 20 generations, since the first Warburton, based on known marker mutation rates. The A Most Recent Common Ancestor (MRCA) Calculator is then used to assess the number of generations back to the common ancestor. I use two calculators that are available on the Internet. The first uses formulae developed by Bruce Walsh and presented in a paper in Genetics to determine the probability of the common ancestor being within any number of generations, given the number of markers, the mutation rate, and the number of mutations. The second,, by Ann Turner, uses a Poisson distribution to determine the probability for any number of mutations given the number of markers, the mutation rate, and the number of transmission events from father to son. As these calculators don’t use identical distributions the results are not identical though they are similar. Also note a generation involves two transmissions. A grandson is two generations from his grandfather, but there are four transmission events between two cousins who share a grandfather. These calculators need a mutation rate as input. A paper by John F Chandler in 2006 and documented on Wikipedia states that different markers have been observed to have different mutation rates, varying from 0.055% to 0.8%. However not all the markers from the DNA Heritage test are covered though there are figures for some other markers in the work of Doug MacDonald from 2004. An average of the mutation rates is 0.28%. However DNA Heritage use a rate of 0.3%, and the MRCA calculator at moseswalker.com is saying that the latest research points to a rate of 0.43%. Based on these rates, the probability of a match given 1 - 5 mismatches in a 43 marker test is as follows. The likely number of generations quoted represent the range from a 40% probability to a 60% probability of the common ancestor being that number of generations back: Six to eight mismatches combined this with a shared surname might a common ancestor, but more than that would indicate the participants are probably not related. An apparent match, but where the surnames are different, could be evidence of an illegitimate birth where the father was a Warburton, but because mutations occur in both directions it is possible for a match to be purely random. Additional evidence would be needed to confirm a link. next step is to analyse each group, or clan of matching profiles in conjunction with known genealogy. The two objectives of this analysis will be to estimate how long ago this clan adopted the Warburton name, and to build a tool that will aid genealogical research.Both these objectives will require many more results than are currently Estimates of the time of adoption will be based primarily on the amount of variability and genetic distance evidenced amongst the matched profiles. Greater variability and genetic distance implies an earlier adoption. Results will be cross checked with known genealogy where The aid to genealogical research will be in the form of a phylogenetic tree for each clan. This is a form of family tree which shows where and when individual marker mutations can have occurred. In this way new results can be matched to specific parts of the tree, rather than the tree as a whole, giving a more precise indication where common ancestors may be found. Finally I would hope to determine if there is truth in the premise that Sir Peter de Dutton was the only original adopter of the Warburton name. It is inevitable that over the last 750 years events such as adoptions or illegitimate births will mean many Warburtons no longer carry the Y-chromosome of Peter de Dutton, even if such events do not deny their link to the original family. But if a significant proportion (circa 50%) of modern Warburtons show they have a good probability of sharing a common ancestor around 750 years ago, and no other strong clans of similar age emerge, then this would support the premise of Norman Warburton’s book. significance of 10 un-matched profiles is that 9 separate individuals have adopted the Warburton name at some point in the last 750 years. It is worth reviewing the situations by which such adoptions might occur (the earliest ancestor of one participant is known to be illegitimate). Initially when surnames were first being required to aid feudal record keeping, around the time when Sir Peter de Dutton changed his name, it is quite conceivable that others from the Warburton estates, or the village of Warburton also decided to adopt the name of their place of birth. others may have taken the Warburton name rather than their father’s. Such an occasion is referred to as a 'non-parental event'. Examples include both adoption and illegitimacy. Another example is Charles Mongan Warburton, Bishop of Cloyne in Ireland, who started his life as a Mongan and changed his name to Warburton( the name of his maternal cousins) in 1792 (see The Mongan Warburtons in Warburton Clans). It is estimated that in each generation the rate of ‘non-paternity events’ is 1-2%. Since the Warburton name is 750 years old, if we assume a generation every 30 years, there have been 25 generations of Warburtons. Therefore it is possible that 50% of modern Warburtons have a non-paternity event somewhere in their history. The Warburton Profiles far I have uncovered 9 different Warburton profiles, including my own, that have no chance of sharing a common male ancestor in the last 750 years, or even 7500 years, with either me or each other. I also have a 10th profile that may also prove to belong to a Warburton clan. Only two of the profiles have been encountered more than once. These profiles and the Warburton clans to which they relate are as follows: results are from The Warburtons of Garryhinch. This clan consists of the descendants of three brothers who were present in Ireland in the second half of the 17th century. The results come from descendants of two of the three brothers, so their common ancestor is about 9 generations back. There were 4 mismatches over 43 markers (2 in the same multi-copy marker). I use a mutation rate of .0028, which means that whilst 4 mutations is slightly up on what one might expect, it would still occur in 10% of such situations, so I believe this profile is proved to be a marker for the whole of the clan. Furthermore the family claims kinship with the Warburtons of Arley and although there is nothing to corroborate this, the claim has at times been accepted by the family at Arley. Therefore it is possible that this profile is that of the Warburtons of Arley. It would take matches with subjects outside the Garryhinch clan to increase this possibility. The predicted haplotype of this profile is J2. 2. My own profile, from The Warburtons of Hale Barns is matched with several others. My research into possible links is documented in My Genetic Links under My Genealogy. I have also produced a Phylogenetic Tree for the clan. The haplotype of this clan is R1b1b2. The matched profiles are found in the following clans (letters refer to the Phylogenetic Tree): results are from The Warburtons of Warburton. Of these 2 match. Their common ancestor is William Warburton (1733-1822), who is 6 generations back from the participants. One of these participants is related to Norman Warburton, author of Warburton: The Village and the Family, in which he also published his own tree back to the 16th century in Warburton village. The predicted haplotype is I1a -AS13 which is typical of the Anglo Saxons. The third result is a mismatch, and is haplotype R1b. The identified common ancestor of all three participants is 8 generations back, and is the grandfather of William (1733-1822). The mismatch implies either an error in the tree, or the mismatched profile was introduced by an unrecorded non-paternal event in one of the 10 links from William (1733-1822), up to his grandfather, and down to the third participant. It is still not certain which profile is the original clan profile. A result from The Warburtons of Bowdon and Timperley relates to a family who, like my own ancestors, have an association with Bowdon Parish dating back to before 1600. Current on-line haplotype predictors identify the haplotype as I2b1 Continental with a 69% chance of being Continental 1. result from The Warburtons of Sandbach relates to the family of Ralph Warburton who was born circa 1817 in Sandbach, Cheshire to a father named Joseph. The predicted haplotype is R1b. One result comes from a participant in Australia whose earliest known ancestor was born in the Rochdale, Lancashire area circa 1770. This clan has not yet been documented. The predicted haplotype is R1b. One result comes from a participant whose earliest known ancestor was born in 1820 in Stockport to a father named Josiah. This clan has not yet been documented. The predicted haplotype is R1b. There is some evidence that this might come from an illegitimacy and father Josiah is a face saving white lie. One result comes from a line which appeared in Nottinghamshire in the 19th century, with the father said to be born in 1809. There is no earlier evidence of the family in Nottinghamshire, and they probably moved there to work in the coal mines. Their origin is uncertain. The predicted haplotype is R1b. One result comes from a descendant of John Charles Warburton born in 1808 in Wilmslow, Cheshire, the illegitimate son of Alice, the daughter on Peter Warburton and Alice Holt. It is not surprisingly unique. In due course traditional genealogical research may determine which clan Peter belongs to. The Mongan profile provided by the Mongans of Australia may in due course be proved to be the profile of the descendants of Charles Terence Mongan Warburton, the Bishop of Cloyne. Even if a non-paternity rate of 2% were to mean that 50% of modern Warburtons have such an event in their ancestry, the number of unmatched profiles, compared with matched ones, is beginning to suggest that more than one person adopted the Warburton name about 750 years ago. This suggestion is supported by the depth of some of the associated family trees. However it will only be when matches are found to the documentary evidence that we will have a better understanding of the origin of these profiles. Over recent years researchers have used a Single Nucleotide Polymorphism (SNP) test on either mitochondria or the Y-chromosome to divide the world’s population into a relatively small number of clans, defined by haplotypes. The clans are sometimes called haplogroups. By studying very slowly changing elements of DNA they have determined sequences of change, and the age of specific changes. By combining this data with the archaeological record they have determined sequences of human migration around the world since the first modern humans left Africa 50-80,000 years ago (depending on who you read). A number of popular books have appeared on this subject in recent years by writers such as Brian Sykes (‘Seven Daughters of Eve’, and ‘‘Blood of the Isles’) and Stephen Oppenheimer (‘Out of Eden’ and ‘The Origins of the British’). See References. To try and help, Sykes and Oppenheimer give the clans, or haplogroups names but they are inconsistent so I will ignore them. Although the Series Tandem Repeat (STR) test we use for this project is different from the SNP test, it provides a prediction for your most likely haplotype. I have had a Single Nucleotide Polymorphism (SNP) test and determined that my haplotype is R1b1b2. The designation of some of the haplotypes has changed over time so I am using the most recent designation. R1b1b2 is a large subcategory of R1b. This covers 40-70% of the population of continental Western Europe rising to 82% in Ireland. There are some small sub-groups of R1b3, but the majority are not further delineated and are identified by the star. Hopefully the future will produce defining mutations to further differentiate them. the meantime Stephen Oppenheimer, in The Origins of the British, uses STR results to further subdivide haplotypes, though he doesn’t publish the actual numbers so you can categorise yourself. That’s available as a chargeable service. It should be noted that the underlying theme of Stephen Oppenheimer’s book is that most British Y-chromosome lines have been present since the Stone Age, and later invasions, even that of the Anglo-Saxons had relatively limited genetic impact. The Celtic ‘invasion’ he sees as merely a cultural migration. He hasn’t identified any specific Norman markers that link back to Normandy, but suggests that due to intermarriage they may not be entirely Norwegian. Due to the work of Dr Ken Nordtvedt haplotype I can be subdivided based on the STR result. There is a haplogroup predictor which will further predict the subgroup (subclade) of anyone in haplogroup I. following discussions of the origins of the Warburton haplotypes are primarily based on Oppenheimer and Nordtvedt. The various haplotypes are also discussed in some detail on Wikepedia, (google "haplotype nn", where nn is the haplotype you wish to view) and at eupedia.com, though the latter embodies a controversial theory on R1b (see below). Members of the R1b haplogroup, are believed to be descendants of the first modern human migrants into Europe some 35-40,000 years ago. This is known as the Upper Palaeolithic migration and was characterised by the Aurignacian culture. During the last Ice Age they retreated to a number of refuges in southern Europe. The mutation that defines R1b occurred in the Iberian refuge. As the Ice Age retreated groups from the refuges began to repopulate Europe, though the process was interrupted by a fifteen hundred year cold period called the Younger Dryas. which ended 11,500 years ago. R1b1b2 includes the major proportion of the R1b haplogroup. This sub-group of R1b originates from the Iberian refuge. The first post Ice Age settlers remained in Britain (which was attached to the continent at the time) during the Younger Dryas, but when a warmer climate returned a new wave moved north from the Iberian refuge. It was this wave that included the people identified by the AMH. The sub-group is still most common in the Basque country but it is frequent all along the coast of Western Europe including Western Britain and the Channel coasts. It is present to a lesser extent in Scandinavia. I originated in Trans-Caucasus and entered Europe before the last Ice Age, and is associated with the Upper Palaeolithic Gravettian culture. During the last Ice Age members of this haplogoup retreated to the Balkan and Ukrainian refuges. Here a number of sub groups evolved. Modern day similarities between the incidence of various haplotype I sub groups in Britain and in Scandinavia and Germany have been cited as evidence of recent invasions of Viking and Anglo-Saxon elites. However although some intrusions can be identified, especially when I sub groups are further divided using STR analysis, the majority of the I haplogroup migration into Britain occurred in Neolithic, and The traditional view was that I1a evolved in the Balkan refuge, and following the Younger Dryas they migrated into North West Europe. Oppenheimer defines seven sub-groups based on STRs with different concentrations in Northern Germany and Scandinavia. He is able to identify groups within Britain who arrived in Neolithic times (or earlier) as part of the original north-western migration of I1a, and groups that represent invasions of Vikings or Anglo-Saxons in historic times. It makes up about 11% of the British population, mainly in England and Scotland. However recent research, including that of Ken Nordtvedt, suggests that I1 evolved much more recently in northern Europe, maybe 4-6,000 years ago, and therefore its origin during and before the last Ice Age is uncertain. I1a - AS13 is a subgroup that originates in Denmark or North Germany and therefore was introduced into Britain by the Anglo-Saxons. profile originally reported as I1c was judged to be I2b1-Cont (Continental) by the Haplotype Predictor with a 69% chance of being Continental 1. The area of its most dense presence is Northwest Germany and Netherlands, then up into Denmark, and even Southern Sweden and Norway. A good amount is also found in the British Isles, perhaps brought there by the Germanic and Scandinavian invader/immigrants in the historic era. J2 is the most predominant sub-group of the J haplotype in Europe. It may have originated in the Levant before the last Ice Age. After the ice retreated it spread into Europe along the Mediterranean, around Spain and to the British Isles where it is most common in Southern England and Central Scotland. It is considered to be a marker of the Neolithic expansion which brought farming to Europe. This began about 10,000 years ago but reached Britain only about 6,000 years ago. It is virtually absent from Scandinavia, and both Wales and Ireland, but is present across from Southern England in France. Significance of Haplotypes Before considering the significance of the haplotypes it should be noted that only one, mine, has been tested. The others are predicted from the STR results and might therefore turn out to be wrong. However by comparing the STR results with near matches on the Ysearch, Ybase, and YHRD databases that have also been tested for SNPs, it is possible to have reasonable confidence in the predictions. Near matches with all the Warburton Rb1 profiles are tested as R1b3, though this is unsurprising since this is such a large Because R1b is so common throughout Western Europe, it is the I haplotypes that are most commonly used as a marker for various continental invasions, including from Norway the original home of the Normans. I found some work by Ken Nordtvedt that identifies typical profiles of various I haplotype sub-groups. For example there are some subgroups which are specific to the British Isles and others that are specific to the continent. The Warburton I1c profile is matched most closely with a continental profile that has its highest frequency in the Netherlands, northwest Germany, and Denmark. This covers the sources of both the Saxon and Danish Viking invasions. There are 7 mismatches, which is the average number of mismatches you would expect for a common ancestor 1000 years ago assuming 30 years per generation. The chances are still good of a common ancestor 1200 years ago (typical for the Danish invasion), but are less for a common ancestor 1500 years ago (typical for the The Warburton I1a profile was an even closer match, just 5 mismatches, from a sub-group that shows a number of hits from Switzerland and southern Germany. This is the number of mismatches most typical of a common ancestor 700 years ago. The Warburton J2 profile has no close matches, though the nearest on Ysearch, with seven mismatches in 32 markers, has tested as J2a. The participant with this profile has documented links to Odard the Norman invader. J2 is absent from Norway. In fact if you plot the journey of the participant's ancestors from Norway to Normandy, and then to north west England, where Odard and his family settled, and finally to Ireland, it is only in Normandy that there is any presence of the J2 haplotype. So the most likely place the profile was picked up was through intermarriage or inter breeding during the 200 years sojourn in Normandy prior to the invasion of Britain. However while J2s may be rare in the Norse country an individual J2 may well have migrated, or been taken there, so it cannot be certain where it originated. Indeed matching J2 results are needed to discount a much more recent origin. The various identified Warburton haplotypes have been present in Britain and areas of the near continent for thousands of years. Whilst they may be useful markers for tracking the impact of invasions or migrations they can tell us nothing of individual movements. For example who knows where a mercenary legionnaire in the Roman army may have chosen to retire to. Haplotypes bring an interesting story of ancient origins but have little to say about more recent genealogy. An individual I1a, J2, or R1b might have British, Viking, Saxon or Norman ancestry. In the same way that the Y-chromosome can be used to identify paternal haplotypes, mitochondria can be used to identify maternal haplotypes. Unlike Y-chromosomes which are found only in males, we all have mitochondria, although the DNA is passed only down the female line. Mitochondria are quite small sequences of DNA relative to a complete chromosome. They contain about 16,500 elements or bases. Two sections of “junk” DNA are used for phylogenetic purposes. These are labelled hyper variable segments 1 (HSV1) and 2 (HSV2). HSV1 looks at 4-500 bases starting at position 16001, and is the least volatile of the two sections. HSV2 is typically used to fine tune results from HSV1, and it was used to help classify the world’s population into 36 clans, and link those clans in the currently accepted phylogenetic tree. The scientific term for a clan is haplogroup. Of the 36 world clans, seven account for about 95% of the population Mitochondrial DNA test results are presented in terms of differences from the Cambridge Reference Model (CRS). The CRS defines a member of haplotype H. Haplotype H is called Helena in Bryan Sykes’ book, ‘The Seven Daughters of Eve’, and is the most common type in Europe. The use of girl’s names for the clans derives from the fact that there must have been a single woman who first had this specific mutation, and from whom all modern bearers of that mutation are descended. Ancestors test that I had done looks at positions 1-400 in HSV1 and this is sufficient to classify a person in the existing tree. Just two differences from the CRS classify me in haplotype J or Jasmine. These are at positions 069 (actually 16069 but the 16000 is dropped for simplicity), and 126. I have one other mutation at 366 but this merely an extension of my Jasmine identity. Jasmine is a complex haplotype with several defined sub-groups. The other six main halogroups found in Europe are all believed to have existed, or derived from groups that existed in Europe before the last Ice Age. Jasmine, however originated in the Near Middle East (possibly the Caucasus) and only moved into Europe when Neolithic farmers began to move into Europe 10,000 years ago. In fact the presence of Jasmine in Europe, but in relatively small numbers (10% of the population) alongside the descendants of the earlier hunter-gatherer population of Europe answers an old historical argument. Did the gradual adoption of farming across Europe represent the migration of an idea, or the migration of farming peoples who replaced the indigenous population? The answer lies between the two. There was a migration of people, but they did not replace the existing population and the idea of farming spread into the I found an interesting MSc paper on the Jasmine haplotype by an Estonian called Piia Serk. This paper suggests that the haplotype originated much earlier than Bryan Sykes’ book stated, maybe 25,000 years ago. It found the major Jasmine subtypes present in the Near East as well as Europe. My additional #366 mutation was not found in the Near East, but was present in 7 samples in Eastern Europe (5 of them in Albania). The Oxford Ancestors database shows 6 Jasmines with the #366 mutation in the England, and 3 in the USA. Unfortunately the Oxford Ancestors database only allows exact searches so I cannot see how many people have the #366 mutation and something else. I was however contacted by a lady who originated in Scotland who has the #366 and #325 mutations, and she pointed me to a paper that identified 3 more #366, #325s mutations in Ireland. To complicate things even more there is a #366mutation in the Helena There are two possible scenarios to explain the presence of the #366 mutation in Eastern Europe and the British Isles. Firstly the #366 mutation occurred soon after the Jasmines moved into Europe and so they are spread all across Europe. This would be confirmed if #366s mutations are found elsewhere in Europe. It is just possible there was a direct migration from Eastern Europe to the British Isles (the wife of a Roman legionnaire? – or is my imagination getting the better on me?). The second explanation is that there was a second #366 mutation in the British Isles. The #366 mutation in the Helena clan does suggest that #366 may be a hot spot more liable to mutation than other locations. LinksThere are a number of links scattered through the text on the various pages. They are listed here for quick access. Warburton: The Village and the Family by Norman Warburton UK National Health Service Register US 1990 census National Trust website Census Records | Vital Records | Family Trees & Communities | Immigration Records | Military Records Directories & Member Lists | Family & Local Histories | Newspapers & Periodicals | Court, Land & Probate | Finding Aids
<urn:uuid:d3576c51-2bba-4465-962f-21d03b5d47f8>
CC-MAIN-2016-26
http://freepages.folklore.rootsweb.ancestry.com/~warburton/page5.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398075.47/warc/CC-MAIN-20160624154958-00141-ip-10-164-35-72.ec2.internal.warc.gz
en
0.93269
7,605
2.71875
3
How long can you hold your breath? With or without air? In terms of producing energy, that is the key question. Can cellular respiration occur without air? It can, but it does have limitations. The Presence of Oxygen There are two types of cellular respiration (see "Cellular Respiration I: Introduction" concept): aerobic and anaerobic. One occurs in the presence of oxygen (aerobic), and one occurs in the absence of oxygen (anaerobic). Both begin with glycolysis - the splitting of glucose. Glycolysis (see "Cellular Respiration II: Glycolysis" concept) is an anaerobic process - it does not need oxygen to proceed. This process produces a minimal amount of ATP. The Krebs cycle and electron transport do need oxygen to proceed, and in the presence of oxygen, these process produce much more ATP than glycolysis alone. Scientists think that glycolysis evolved before the other stages of cellular respiration. This is because the other stages need oxygen, whereas glycolysis does not, and there was no oxygen in Earth’s atmosphere when life first evolved about 3.5 to 4 billion years ago. Cellular respiration that proceeds without oxygen is called anaerobic respiration. Then, about 2 or 3 billion years ago, oxygen was gradually added to the atmosphere by early photosynthetic bacteria. After that, living things could use oxygen to break down glucose and make ATP. Today, most organisms make ATP with oxygen. They follow glycolysis with the Krebs cycle and electron transport to make more ATP than by glycolysis alone. Cellular respiration that proceeds in the presence of oxygen is called aerobic respiration. - Cellular respiration always begins with glycolysis, which can occur either in the absence or presence of oxygen. - Cellular respiration that proceeds in the absence of oxygen is anaerobic respiration. - Cellular respiration that proceeds in the presence of oxygen is aerobic respiration. - Anaerobic respiration evolved prior to aerobic respiration. Use this resource to answer the questions that follow. - What is the role of oxygen in aerobic metabolism? - What is the role of oxygen in anaerobic metabolism? - Aerobic metabolism involves what processes? - Anaerobic metabolism is also known by what name? - How is water formed in the presence of oxygen? - Which form of metabolism produces more energy? 1. Define aerobic and anaerobic respiration. 2. Why do scientists think that glycolysis evolved before the other stages of cellular respiration?
<urn:uuid:c653d085-decb-4d2a-a8b1-93ecb74a658e>
CC-MAIN-2016-26
http://www.ck12.org/book/CK-12-Biology-Concepts/r18/section/2.24/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783403823.74/warc/CC-MAIN-20160624155003-00064-ip-10-164-35-72.ec2.internal.warc.gz
en
0.904922
551
3.890625
4
New research out today suggests that for every person who receives unnecessary breast cancer treatment from screening, two other women's lives are saved. The research, partly funded by Cancer Research UK is published in the Journal of Medical Screening. This contradicts findings from Denmark which indicate that some women may be being overdiagnosed and overtreated. Interviewed on the programme, Cancer Research UK's Professor Stephen Duffy said that the new research, which involved 80,000 women, indicated that rather than overdiagnosing patients, "we were early diagnosing them". But Karsten Jorgensen, of the Nordic Cochrane Centre (NCC) in Copenhagen, argued that the case for screening was not so clear-cut and that money used to provide screening "could have been spent better". More than 45,000 women are diagnosed with breast cancer each year in the UK, and more than 12,000 die from the disease. Women aged 50 to 70 are invited for NHS breast screening every three years across the UK. In England from 2012 screening will be extended to women aged from 47 to 73.
<urn:uuid:d904d7af-57a0-4747-a8bd-b78fb775fd1b>
CC-MAIN-2016-26
http://news.bbc.co.uk/today/hi/today/newsid_8596000/8596225.stm
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399385.17/warc/CC-MAIN-20160624154959-00149-ip-10-164-35-72.ec2.internal.warc.gz
en
0.968737
219
2.859375
3
From 11:00PM PDT on Friday, July 1 until 5:00AM PDT on Saturday, July 2, the Shmoop engineering elves will be making tweaks and improvements to the site. That means Shmoop will be unavailable for use during that time. Thanks for your patience! In Act One, after Claudius asks Ros and Guil to find out what is wrong with Hamlet, Polonius appears and announces that the ambassadors from Norway are returned. He pledges his duty to the King and says he thinks he knows why Hamlet is acting mad (we later find Polonius thinks Hamlet is in love with Ophelia). At the close of Hamlet's conversation with Ros and Guil, Polonius appears to tell him that the actors have appeared. When Claudius and Gertrude are checking in on whether or not Ros and Guil know anything about Hamlet, Polonius buts in to announce that he is supposed to invite the King and Queen to the Tragedians' performance. Polonius is killed off-stage by Hamlet because he was listening in while Hamlet was arguing with his mother. All we see of him after this is his body as Hamlet drags it across the stage. His death sets off the chaotic and tragic whirlwind of events that lead to the end of the play.
<urn:uuid:f31d5a64-2bad-4ce1-922e-1ff52f6547b6>
CC-MAIN-2016-26
http://www.shmoop.com/rosencrantz-and-guildenstern-are-dead/polonius-timeline.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783400031.51/warc/CC-MAIN-20160624155000-00077-ip-10-164-35-72.ec2.internal.warc.gz
en
0.977523
278
2.703125
3
This document walks you through the steps required to alleviate problems that can occur with the fragmentation of a packet. An example of a fragmentation problems is the ability to ping a networked resource but the inability to connect to that same resource with a specific application, such as E-mail or databases. Ensure that you meet these requirements before you attempt this configuration: This document is not restricted to specific software and hardware versions. This document uses this network setup: This configuration can also be used with these hardware and software versions: PIX/ASA security devices Refer to the Cisco Technical Tips Conventions for more information on document conventions. IP supports a maximum length of 65,536 bytes for an IP packet, but most data-link layer protocols support a much smaller length, called a maximum transmission unit (MTU). Based on the supported MTU, it can be necessary to break up (fragment) an IP packet to transmit it across a particular data-link layer media type. The destination then has to reassemble the fragments back into the original, complete IP packet. When you use a VPN to protect data between two VPN peers, additional overhead is added to the original data, which can require that fragmentation occur. This table list fields that potentially have to be added to the protected data in order to support a VPN connection. Note that multiple protocols can be necessary, which increases the size of the original packet. For example, if you use a L2L DMVPN IPSEC connection between two Cisco routers, where you have implemented a GRE tunnel, you need this additional overhead: ESP, GRE, and the outer IP header. If you have an IPSec software client connection to a VPN gateway when the traffic goes through an address device, you need this additional overhead for Network Address Translation- Traversal (NAT-T), as well as the outer IP header for the tunnel mode connection. When the source sends a packet to a destination, it places a value in the control flags field of the IP headers that affects fragmentation of the packet by intermediate devices. The control flag is three bits long, but only the first two are used in fragmentation. If the second bit is set to 0, the packet is allowed to be fragmented; if it is set to 1, the packet is not allowed to be fragmented. The second bit is commonly called the don't fragment (DF) bit. The third bit specifies when the fragmentation occurs, whether or not this fragmented packet is the last fragment (set to 0), or if there are more fragments (set to 1) that make up the packet. There are four areas that can create problems when fragmentation is required: Additional overhead in CPU cycles and memory is required by the two devices that perform fragmentation and reassembly. If one fragment is dropped on the way to the destination, the packet cannot be reassembled and the entire packet must be fragmented and sent again. This creates additional throughput problems, especially in situations where the traffic in question is rate-limited, and the source sends traffic above the allowable limit. Packet filtering and stateful firewalls can have difficulty processing the fragments. When fragmentation occurs, the first fragment contains an outer IP header, the inner header, such as TCP, UDP, ESP and others, and part of the payload. Subsequent fragments of the original packet contract an outer IP header and the continuation of the payload. The problem with this process is that certain firewalls need to see the inner header information in every packet in order to make intelligent filtering decisions; if that information is missing, they inadvertently can drop all fragments, except for the first one. The source in the IP header of the packet can set the third control bit to don't fragment, which means that, if an intermediate device receives the packet and must fragment it, the intermediate device cannot fragment it. Instead, the intermediate device drops the packet. Most networks use Ethernet, with a default MTU value of 1,500 bytes, that is typically used for IP packets. In order to find out if fragmentation occurs or is needed but cannot be done (DF bit is set), first bring your VPN session up. Then you can use any one of these four procedures to discover fragmentation. Ping a device located at the other end. This is under the assumption that pinging is allowed across the tunnel. If this is successful, try to access an application across the same device; for example, if a Microsoft E-mail or Remote Desktop server is across the tunnel, open Outlook and try to download your E-mail, or try to Remote Desktop to the server. If this does not work, and you have the correct name resolution, there is a good chance that fragmentation is the issue. From a Windows device use this: C:\> ping -f -l packet_size_in_bytes destination_IP_address. The -f option is used to specify that the packet cannot be fragmented. The -l option is used to specify the length of the packet. First try this with a packet size of 1,500. For example, ping -f -l 1500 192.168.100. If fragmentation is required but cannot be performed, you receive a message such as this: Packets need to be fragmented but DF set. On Cisco routers, execute the debug ip icmp command and use the extended ping command. If you see ICMP:dst (x.x.x.x) fragmentation needed and DF set, unreachable sent to y.y.y.y, where x.x.x.x is a destination device, and y.y.y.y is your router, an intermediate device tells you that fragmentation is needed, but because you set the DF bit in the echo request, an intermediate device cannot fragment it in order to forward it to the next hop. In this case, gradually decrease the MTU size of the pings until you find one that works. On Cisco Security Appliances, use a capture filter. ciscoasa(config)#access-list outside_test permit tcp any host 172.22.1.1 eq 80 Note: When you leave the source as any, it allows the administrator to monitor any network address translations (NAT). ciscoasa(config)#access-list outside_test permit tcp host 172.22.1.1 eq 80 any Note: When you reverse the source and destination information, it allows return traffic to be captured. ciscoasa(config)# capture outside_interface access-list outside_test interface outside The user needs to initiate a new session with application X. After the user has initiated a new application X session, the ASA administrator needs to issue the show capture outside_interface command. There are different ways that you can solve issues with fragmentation. These are discussed in this section. The static MTU setting can solve issues with fragmentation. MTU Change on the Router: Note that if you manually set the MTU on the device, it tells the device, which acts as a VPN gateway, to fragment received packets before it protects and sends them across the tunnel. This is preferable to having the router protect the traffic and then fragment it, but the device fragments it. Warning: If you change the MTU size on any device interface, it causes all tunnels terminated on that interface to be torn down and rebuilt. On Cisco routers, use the ip mtucommand to adjust the MTU size on the interface where the VPN is terminated: router (config)# interface type [slot_#/] port_# router (config-if)# ip mtu MTU_size_in_bytes MTU Change on the ASA/PIX: On ASA/PIX devices, use the mtucommand to adjust the MTU size in global config mode. By default, the MTU is set to 1500. For example, if you had an interface on your security appliance that was named Outside (where the VPN is terminated), and you determined (through the measures listed in the Discover Fragmentation section) that you wanted to use 1380 as the fragment size, use this command: security appliance (config)# mtu Outside 1380 The TCP maximum segment size can solve issues with fragmentation. Note: This feature only works with TCP; other IP protocols have to use another solution to solve IP fragmentation problems. Even if you set the ip mtu on the router , it does not affect what the two end hosts negotiate within the TCP three-way handshake with TCP MSS. MSS Change on the Router: Fragmentation occurs with TCP traffic because TCP traffic is normally used to transport large amounts of data. TCP supports a feature called TCP maximum segment size (MSS) that allows the two devices to negotiate a suitable size for TCP traffic. The MSS value is configured statically on each device and represents the buffer size to use for an expected packet. When two devices establish TCP connections they compare the local MSS value with the local MTU value within the three-way handshake; whichever is lower is sent to the remote peer. The two peers then use the lower of the two exchanged values. In order to configure this feature, do this: On Cisco routers, use the tcp adjust-mss command on the interface on which the VPN is terminated. router (config)# interface type [slot_#/] port_# router (config-if)# ip tcp adjust-mss MSS_Size_in_bytes MSS Change on the ASA/PIX: In order to ensure that the maximum TCP segment size does not exceed the value you set and that the maximum is not less than a specified size, use the sysopt connection command in global config mode. In order to restore the default setting, use theno form of this command. The default maximum value is 1380 bytes. The minimum feature is disabled by default (set to 0). In order to change the default maximum MSS limit, do this: security appliance (config)# sysopt connection tcp-mss MSS_size_in_bytes Note: If you set the maximum size to be greater than 1380, packets can become fragmented, dependent upon the MTU size (which is 1500 by default). Large numbers of fragments can impact the performance of the security appliance when it uses the Frag Guard feature. If you set the minimum size, it prevents the TCP server from sending many small TCP data packets to the client and impacting the performance of the server and the network. In order to change the minimum MSS limit, do this: security appliance (config)# sysopt connection tcp-mss minimum MSS_size_in_bytes security appliance (config)# sysopt connection tcp-mss minimum MSS_size_in_bytes Note: Refer to the MPF Configuration to Allow Packets that Exceed MSS section of the document PIX/ASA 7.X Issue: MSS Exceeded - HTTP Clients Cannot Browse to Some Web Sites for more information in order to allow the exceeded MSS packets another method. PMTUD can solve issues with fragmentation. The main problem with TCP MSS is that the administrator has to know what value to configure on your router to prevent the occurrence of fragmentation. This can be a problem if more than one path exists between you and the remote VPN location, or, when you do your initial query, you find that the second-or third-smaller MTU, instead of the smallest, is based on the routing decision used within your initial query. With PMTUD, you can determine an MTU value for IP packets that avoids fragmentation. If ICMP messages are blocked by a router, the path MTU is broken, and packets with the DF bit set are discarded. Use the set ip df command to clear the DF bit and allow the packet to be fragmented and sent. Fragmentation can slow the speed of packet forwarding on the network, but access lists can be used to limit the number of packets on which the DF bit is cleared. Three issues can cause PMTUD not to function: An intermediate router can drop the packet and not respond with an ICMP message. This is not very common on the Internet, but can be common inside a network where routers are configured to not respond with ICMP unreachable messages. An intermediate router can respond with an ICMP unreachable message, but, on the return flow, a firewall blocks this message. This is a more common occurrence. The ICMP unreachable message makes its way back to the source, but the source ignores the fragmentation message. This is the most uncommon of the three issues. If you experience the first issue, you could either clear the DF bit in the IP header that the source placed there or manually adjust the TCP MSS size. In order to clear the DF bit, an intermediate router has to change the value from 1 to 0. Normally this is done by a router in your network before the packet leaves the network. This is a simple code configuration that does this on an IOS-based router: Router (config) # access-list ACL_# permit tcp any any Router (config) # route-map route_map_name permit seq# Router (config-route-map) # match ip address ACL_# Router (config-route-map) # set ip df 0 Router (config-route-map) # exit Router (config) # interface type [slot#/]port # Router (config-if) # ip policy router-map route_map_name PMTUD and GRE Tunnels By default, a router does not perform PMTUD on GRE tunnel packets that it generates itself. In order to enable PMTUD on GRE tunnel interfaces and have the router participate in the MTU tuning process for source/destination devices for traffic that traverses the tunnel, use this configuration: Router (config) # interface tunnel tunnel_# Router (config-if) # tunnel path-mtu-discovery The tunnel path-mtu-discovery command enables PMTUD for the GRE tunnel interface of a router. The optional age-timer parameter specifies the number of minutes after which the tunnel interface resets the maximum MTU size discovered, minus 24 bytes for the GRE header. If you specify infinite for the timer, the timer is not used. The min-mtu parameter specifies the minimum number of bytes that comprises the MTU value. PIX/ASA 7.x - Clear Don't Fragment (DF) or handling large files or packets. You are still unable to properly access the Internet, large files, or applications through the tunnel because it gives this MTU size-error message: PMTU-D packet 1440 bytes greater than effective mtu 1434, dest_addr=10.70.25.1, src_addr=10.10.97.55, prot=TCP In order to resolve this, be sure to clear the DF bit from the outside interface of the device. Configure the DF-bit policy for IPSec packets with the crypto ipsec df-bit command in global configuration mode. pix(config)# crypto ipsec df-bit clear-df outside The DF bit with IPSec tunnels feature lets you specify whether the security appliance can clear, set, or copy the Don't Fragment (DF) bit from the encapsulated header. The DF bit within the IP header determines whether a device is allowed to fragment a packet. Use the crypto ipsec df-bit command in global configuration mode to configure the security appliance to specify the DF bit in an encapsulated header. When you encapsulate tunnel mode IPSec traffic, use the clear-df setting for the DF bit. This setting lets the device send packets larger than the available MTU size. Also this setting is appropriate if you do not know the available MTU size. Note: If you still experience fragmentation issues and dropped packets, optionally, you can manually adjust the MTU size with the ip mtu tunnel interface command. In this case, the router fragments the packet before it protects it. This command can be used in conjunction with PMTUD and/or TCP MSS. There is currently no verification procedure available for this configuration. The Output Interpreter Tool (registered customers only) (OIT) supports certain show commands. Use the OIT to view an analysis of show command output. Assume that the IPSec Tunnel has established between the router and PIX. If you see encryption error messages that packets are dropped, complete these steps to resolve the issue: Perform a sniffer trace from the client to the server side to find out which is the best MTU to use. You can also use the ping test: ping -l 1400 192.168.1.1 -f 192.168.1.1 is the IP address of the remote machine. Continue to reduce the value of 1400 by 20 until there is a reply. Note: The magical value, which works in most instances, is 1300. After the appropriate maximum segment size is achieved, adjust it appropriately for the devices in use: On the PIX Firewall: sysopt connection tcpmss 1300 On the router: ip tcp adjust-mss 1300 You can ping between the VPN networks, but Remote Desktop Protocol (RDP) and Citrix connections cannot be established across the tunnel. The problem can be the MTU size on the PC behind the PIX/ASA. Set the MTU size as 1300 for the client machine and try to establish the Citrix connection across the VPN tunnel.
<urn:uuid:cabe6d95-6bb8-4b8e-9a8a-360c7c058c09>
CC-MAIN-2016-26
http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/82444-fragmentation.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396106.25/warc/CC-MAIN-20160624154956-00155-ip-10-164-35-72.ec2.internal.warc.gz
en
0.862773
3,677
2.546875
3
MUSEUM OF SOUTHERN The Henrietta Marie in Perspective by Dinizulu Gene Tinnie Perhaps the most challenging aspect of studying a phenomenon like the Atlantic "slave trade," as it was known, is the realization that such developments are not as monolithic and constant as even their vast scope, verifiable statistics, and widely recognized patterns might suggest. It can be easily overlooked, in examining a phenomenon that endured for more than four centuries, involving tens of millions of individuals, that it is in fact a story of individuals: each person, each voyage, each ship has a different story to tell, a different - but definite - impact on history. Indeed it is because of this realization that the term "slave trade" is placed in quotation marks above. Despite the wishful thinking and rhetoric of its practitioners, despite the numerous cargo manifests attesting to the non-human nature of the chained captives packed into the ships' holds, this was not a commerce in passive, docile "slaves" but in living human beings, with families, knowledge, skills, responsibilities, dreams and aspirations no less legitimate than those of any other human beings. Nor could such a commerce, which could only be carried out through routine aggression, systematic murder and kidnapping, rampant destruction and corruption, be called "trade" in any legitimate sense of that term, which suggests a fair and equal exchange. And this same appreciation of the individuality and humanity of each African woman, man and child that was swept into the vortex of the Middle Passage, must extend to the non-African participants as well: the coastal slave dealers and officials, the builders and garrisons of the trading forts, the crews and officers of the ships, the outfitters and makers of the shackles, chains and instruments of torture, the buyers in the Americas, the shipowners and financiers, the opponents and voices of abolitionism - ultimately whole nations of individuals being transformed economically, socially and spiritually by the products, profits and demands of the lucrative enslavement enterprise. It is therefore too simple to indict "the British," the French," "the Dutch," "the Spaniards," "the Jews," "the Muslims," "the Africans," or anyone else as a single nation or "race" for this massive violation of humanity in the name of profit. Rather, this enterprise was the doing of individuals, each accountable for his or her part within it, just as we are each individually accountable for our part in maintaining or destroying the negative legacy that this horrific chapter of our shared history has bequeathed us. It is our need to understand the Middle Passage in such human terms, rather than as mere diagrams, words and numbers, that makes the artifacts from the wreck of the Henrietta Marie so valuable and important. For here, through the mute evidence of iron shackles, weaponry, beads and other trade items, pewter ware still with knife marks made by the crew, parts of the ship herself, we not only make tangible contact with an actual ship and with actual people whose lives and destinies were indelibly altered by this one specific voyage across the Atlantic, but we are also led into the complete story of a single vessel that, while unique, was also typical and revealing in so many respects of the times and historical forces that dictated her - and the world's - fate. Dinizulu Gene Tinnie is Adjunct Professor, MDCC, and President of the African American Caribbean Cultural Arts Commission, Inc.
<urn:uuid:2d5b9cf2-a685-4d24-802d-3a3570c17a84>
CC-MAIN-2016-26
http://historical-museum.org/exhibits/hm/perspect.htm
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402479.21/warc/CC-MAIN-20160624155002-00135-ip-10-164-35-72.ec2.internal.warc.gz
en
0.963225
712
3.46875
3
The art of musical composition Dr. Heinemann plays the clarinet but says it isn’t necessary to play an instrument to compose parts for it. By Jacqueline Kelly For three Bradley professors, composing music is a personal outlet for creativity and provides valuable classroom lessons for students. Inspiration doesn’t come naturally to music professor and composer Dr. Stephen Heinemann. Instead, inspiration comes from putting pencil to paper for months at a time. “Most artists, unless they’re working in a form that provides instant gratification, like photography, are more inclined to believe that inspiration comes from work,” Dr. Heinemann says. “A composition takes months and months to put together.” Dr. Heinemann is one of a handful of Bradley music professors who not only teach, but also put together musical notes that eventually become the melodies and harmonies of a composition. For Dr. Heinemann, the composing process imitates the writing process used by authors. He never begins with the introduction to any piece. That, he says, would be akin to writing the table of contents of a book before writing a chapter. Instead, he gets notes down on paper, often hearing what they’ll sound like in his head. The beginning of composing consists mainly of sketching or generating ideas and getting them in writing. From there, he decides what the various instruments will need to do, such as play a solo or provide harmony. Once he has the different parts in place, he arranges the music in sections and decides where each sounds best. Throughout the writing process, he has an idea of how the piece will end. “The ending should be surprising — but not to the author,” Dr. Heinemann says, comparing composing to writing. But even after he writes the ending and fits each section in its place, the piece may not be complete. “You print it out; it has the double bar signifying the ending. The parts are each printed out and it looks done,” he says. “I would be done if it were perfect. But it’s never perfect. There are no finished pieces. There are just pieces you stop working on.” Take, for example, Dr. Heinemann’s composition Spirals. He wrote the piece several years ago but revisited it when he was asked to add an orchestral composition. In the process, he changed a few details and pushed the creative possibilities of the piece further. Though computers now allow for composing without using pencils and paper, Dr. Heinemann prefers the traditional method. Music notation programs are useful, he says, for separating parts of a composition and proofreading his work. But the music emerging from the computer is synthesized and doesn’t quite sound like the actual piece eventually will. “It’s the difference between seeing a picture of a painting on TV and seeing the painting in person,” he says. “As a composer, one of the most valuable things I have is a fragile sense of how I want a piece to sound. You have to be careful not to let the synthesized sound substitute for your own sense of sound.” Dr. Heinemann plays the clarinet and saxophone and says it isn’t necessary to play other instruments to compose parts for them. He does, however, use his cursory knowledge of the piano to plunk out a tune while composing. “You do have to know what each instrument is capable of, what is idiomatic about each instrument,” Dr. Heinemann says. Part of composing well is being able to play at least one instrument masterfully. “It’s very important to know how to play something very well, or you can’t relate to the best musicians or how to write successfully for them,” he says. His primary instruments influence the way he composes. The clarinet and saxophone are single-line instruments and are predominantly used to play melodies. So his work has fewer harmonies than other composers. While composing, Dr. Heinemann rarely thinks about the audience. He realizes some people will like his work and some will not. “It’s the people who like it you were writing for all along,” he says. He considers his first audience to be the musicians who will play the piece, and he finds it especially gratifying when the performers say they enjoyed his work. As a young composer, Dr. Heinemann often found himself nervous before hearing his compositions performed live for the first time. “It was the biggest thing in my life, and it was in the hands of someone else,” he says. “Now I know what the piece is going to sound like, so there are very few surprises along the way.” Dr. Heinemann benefits from teaching composition to his students. “Teaching composing is such a great way to clarify your thinking on composition,” he says. Nine of his students won the Slane College of Communication and Fine Arts Dean’s Award at Bradley’s annual student scholarship exposition for their project titled Enneapropaedeudodecaphonia, which means nine pieces for the purpose of teaching twelve-tone composition. For Dr. Todd Kelly, a professor of music who heads Bradley’s jazz band and performs in a jazz quintet, inspiration comes after listening to music. “I’ll get a groove in my mind, and then I sort of fill in the blanks from there,” Dr. Kelly says. Because he is not a full-time composer, Dr. Kelly works in bursts. But composing affects all aspects of his life, including his teaching. “Composing has deepened my understanding of harmony, made me appreciate the difficulty of creating a memorable melody and tapped into a side of my creativity that would otherwise be untouched,” says Dr. Kelly, who plays trumpet and uses the piano when composing. “I feel that composing makes me a more complete musician, and while I often find the process grueling at times, it is ultimately rewarding.” Dr. John Orfe, assistant professor of music, has been called a “virtuoso pianist” by some of his colleagues, and playing the piano has a large influence on his composing. “I learn through practicing, performing, and making music with others,” Dr. Orfe says. “As long as one does not allow one’s musical ideas to be shaped exclusively by one’s instrument, performing is a wonderful complement to composing.” However, “creating something from nothing” is always challenging, he adds. “I find the initial stages of composition the most difficult because possibility is infinite. Once those initial choices are determined and settled, they usually inspire other choices, sometimes to the point where a piece seems to ‘write itself.’ But this varies from piece to piece.” Like Dr. Heinemann and Dr. Kelly, Dr. Orfe wants his students to benefit from his experiences. “I see all of my musical work as being part of living cultural traditions — American, European and increasingly, global. I get to share lots of wonderful music with my students, and that’s exciting.”
<urn:uuid:9aef4b55-e047-4b2a-981f-b85fd28df249>
CC-MAIN-2016-26
http://bradley.edu/about/publications/bradleyworks/2013/art/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783394987.40/warc/CC-MAIN-20160624154954-00194-ip-10-164-35-72.ec2.internal.warc.gz
en
0.967904
1,554
3.34375
3
People often follow low-fat diets to lose weight and slim down. This is a good start, but you should not cut back on fats entirely, as they make up a vital part of the human diet. Consuming most of your fat intake from unsaturated fats helps you take in the proper amount of fat while maintaining a healthy diet and limiting the risk for heart disease. Along with protein and carbohydrates, fat is one of three macronutrients the human body needs to survive. These macronutrients enable growth and basic body functions. Fat provides energy, cushions your organs and allows your body to absorb necessary nutrients, such as vitamins A, D, E and K. Fats also give foods flavor and consistency. Three basic types of fats exist in your body -- saturated, unsaturated and trans fat. Doctors view saturated and trans fats as “bad fats” because they can increase your risk for coronary heart disease. Saturated fat is in meat, butter and cream, including fast and junk food, like hamburgers and ice cream. Trans fat is in processed, fried foods and snacks, such as doughnuts, potato chips and cheese sticks. Nutrition experts consider unsaturated fat a “good fat.” You can lower your blood cholesterol and decrease your risk of heart disease by adjusting your diet to limit saturated and trans fat, while increasing unsaturated fat. Olive and canola oil represent good sources of monounsaturated fatty acids. Other examples of unsaturated fat include nuts, avocado, tuna and salmon. How Much Fat Fat packs a large caloric punch of 9 calories per gram, compared to 4 calories per gram of carbohydrates or protein. According to the Institute of Medicine, adults should take in between 20 and 35 percent of their total calories from fats. For a 2,000-calorie diet, you should consume fewer than 20 grams of saturated fat per day. More than 500,000 people die each year from coronary heart disease, so take care to monitor your intake of bad fats. The Food and Drug Administration began requiring food labels to list the amount of trans fat in 2006. Avoid restricting your fat intake beyond the recommended allowance. Children, especially, need fats to ensure proper growth and development of the brain and nervous system. - fat chicken sandwich image by Karin Lau from Fotolia.com This article reflects the views of the writer and does not necessarily reflect the views of Jillian Michaels or JillianMichaels.com.
<urn:uuid:29fb3eb7-fded-4098-9dab-f3ac2eabc8d3>
CC-MAIN-2016-26
http://getfit.jillianmichaels.com/need-fats-diets-1287.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397696.49/warc/CC-MAIN-20160624154957-00018-ip-10-164-35-72.ec2.internal.warc.gz
en
0.915081
506
3.453125
3
An important comb type, little publicised and infrequently encountered, is a notable feature of the orthodox Sikh community whose peoples, now dispersed throughout the world, originated mainly from the Punjab State of north-west India, bordering on Pakistan. This is a territory through which the 5 tributaries of the river Indus flow – the word Punjab signifies “the land of the 5 rivers”. Amritsar is the state capital, their language is Punjabi. The term Sikh is derived from the Sanskrit word Shiksh meaning “to learn”; in Punjabi, it is translated as Disciple. A Sikh initiated into the Khalsa is regarded as an “orthodox” Sikh, belonging to the community of Amritdhari. Founded by Guru Gobind Singh in 1699, he gave Khalsa Sikhs five distinguishing marks of identity, the five sacred K’s or Panj Kakke, and a code of conduct setting them apart from other groups and requiring them to live pure lives. Men are barred from cutting any body hair or beard – Kesh – and expected to wear a turban; to wear a Kachh, a pair of shorts (underpants), as part of the required clothing; a Kara, a bangle of steel or iron, to be worn on the right wrist and a Kirpan – a short dagger, a sword with curved blade, or a knife of similar shape – always to be carried on the body; a Khanga (Kanga) comb worn in the hair under the turban to hold the topknot of the Kesh in place, symbolising personal hygiene and cleanliness in body and spirit. Before putting on his turban, the Sikh plaits his hair into one long braid, winding it up and securing it on the top of the head. Into this the comb is inserted for safe keeping. Women are expected to observe a similar but modified code and may have a Khanga attached with a black cord tucked under a bun. The tradition is, however, tending to die out in recent generations. A Khanga comb is a small grooming tool having a distinctive shape with the ‘shoulders’ usually sloping sharply downwards from a rounded or squared top edge. The small teeth are fine cut or sawn, mostly by hand. In many cases, the guard teeth are angled outward at the lower tip. These combs were made in wood, ivory and rhino tusk or in buffalo horn but not cattle horn. The combs measure between 1 ½ -2 ¾ ins (4-7 cm) in width and 1 ¼ -1 ¾ ins (3.5-4.3 cm) in depth. The illustrated combs are all dating to the later 20th C although the 3 small ivory examples are much earlier. 1. Srinivasan, Radhika. Cultures of the World: India. Times Books International, Singapore. 1994 [p.72] 2. A Popular Dictionary of Sikhism: Sikh Religion and Philosophy (Popular Dictionaries of Religion) 1 New edition by Cole, W. Owen, Sambhi, Piara Singh (1997) Paperback Cole, W.Owen. and Sambhi, Piara Singh. Curzon Press, Richmond, Surrey. 1990/1997 [p.90] Jen Cruse is author of the authoritative reference The Comb: Its History and Development
<urn:uuid:8eb5c5fd-9017-4edf-b978-817511df9cc0>
CC-MAIN-2016-26
http://barbaraanneshaircombblog.com/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398873.39/warc/CC-MAIN-20160624154958-00078-ip-10-164-35-72.ec2.internal.warc.gz
en
0.935327
707
3.5625
4
Posted: 10/06/2013 at 09:07 There's some good sensible advice in that link, Sue. I particularly like the caution against overwatering. I'd extend it to overfertilising, too. There's an old tomato saying: "More plants are killed by pampering than neglect". The Blossom End Rot (BER) problem is an interesting one. It used to be tomato lore that it was caused simply by a lack of calcium and was remedied by digging the stuff into the soil. Science now tells us that BER is certainly calcium-related but in terms of the plant being unable to distribute the calcium through its internal system to the fruit. You can have all the calcium in the world in the soil but the plant is unable to use it. Unfortunately science can't tell us exactly why. The best guess is that it's stress-related, with the plant's physiology under duress and affected. There are potentially plenty of causes of plant stress - climate, culture, etc - so there's no simple answer. The real mystery, though, is why some varieties are more prone to it than others. The link suggests larger-fruited varieties are more prone, but, in fact, it's the plum or egg shapes - San Marzano, etc - that are most vulnerable. I've had plum/egg varieties in the ground growing right beside beefsteaks and oblates. The plum or egg shapes have been riddled with BER, their immediate neighbours totally BER-free. Who would be a tomato grower?
<urn:uuid:6e3761ce-afae-4a9c-8321-b9da08cc278f>
CC-MAIN-2016-26
http://www.gardenersworld.com/members/italophile/chat/page/88/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783403825.35/warc/CC-MAIN-20160624155003-00063-ip-10-164-35-72.ec2.internal.warc.gz
en
0.974195
325
2.59375
3
Deep in the western Amazon rainforest, salt is especially scarce. It's far from the Atlantic ocean and cut off from windborne minerals by the Andes Mountains. Carnivorous animals, like turtles, have little trouble getting enough sodium because meat contains plenty of salt. But herbivores can have a harder time. Monkeys, for example, eat dirt while parrots lick clay. Geoff Gallice, a graduate student of entomology at the Florida Museum of Natural History, says the butterflies can also get salt from animal urine, sweaty clothes and even sweaty people. Scientists aren't clear whether the drinking butterflies help or harm the turtles, saying their vision could be impeded, but noting that they don't seem to mind. Bees also like to drink turtle tears, but bees seem to annoy the turtles more than butterflies with all their buzzing. Scientists plan to test the turtle tears to see if there are any other minerals and nutrients the butterflies are lapping up.
<urn:uuid:ef24be76-ff51-49a9-9325-30aa42eda933>
CC-MAIN-2016-26
http://www.upi.com/Science_News/Blog/2013/09/16/Butterflies-drink-turtle-tears-in-the-Amazon/3971379336737/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397695.90/warc/CC-MAIN-20160624154957-00001-ip-10-164-35-72.ec2.internal.warc.gz
en
0.941444
202
3.140625
3
MONDAY, July 6 (HealthDay News) — Beyond the already well-known “BlackBerry thumb,” avid texting may also cause pain to the hand, arm and neck, new research shows. But there may be ways to avoid this discomfort, the study found. Young adults who texted while hunched over and typed using only one thumb had more problems with their arms, neck and hands than those who sat straighter and used more than one digit. “Considering how much we use the small mobile phone keypads, it is important that we learn how they affect our bodies,” said study author Ewa Gustafsson, an ergonomist at the Sahlgrenska Academy in Sweden. “We need to identify factors related to mobile-phone usage that may affect our health and ability to work.” Modern communications devices are associated with several painful repetitive stress and nerve compression injuries. Cell phone elbow, otherwise known as cubital tunnel syndrome, is a tingling or numbness in the hands caused by a compression of the ulnar nerve when the elbow is flexed during lengthy gab sessions, and Guitar Hero wrist is a tendinitis of the wrist brought on by overly vigorous strumming. Then there’s so-called BlackBerry thumb, which strikes those who spend a lot of time sending rapid-fire missives from their mobile devices. “The difference between the computer age and the typewriter age is that people don’t stop,” said Dr. David Edelstein, orthopedic and hand surgeon at Maimonides Medical Center in Brooklyn, N.Y. “They are typing all day. During their lunch break they are using a mouse or texting, and they may go home and do more.” In the most serious cases, excessive wear and tear and inflammation of the basal joint at the base of the thumb can lead to arthritis, Edelstein said. Thumb arthritis can cause hand pain, swelling, decreased strength and range of motion. “For every pound of pressure that you push at the tip of your thumb, it’s magnified at the base of your thumb,” Edelstein said. “Over time, this can lead to problems.” And it’s not just the thumb that can get sore. According to the Swedish researchers, excessive texting can also lead to neck and back pain. The researchers analyzed texting technique, muscular electrical activity and thumb movement using an electrogoniometer, an electrical device that measures flexibility, in 56 young adults. Half complained of neck, arm or hand symptoms; half had no symptoms. Those with pain tended to text while hunched over, a position that puts strain on the neck and upper back muscles, according to the yet-to-be-published study. “I think it definitely does matter what position you stay in,” Edelstein said. “Hunching over is not a physiologically proper position.” Study participants with pain were more likely to use one thumb to text instead of both thumbs. Heather Turkopp, a certified hand specialist and occupational therapist at William Beaumont Hospital in Royal Oak, Mich., said she rarely sees patients whose sole complaint is texting-related, though that may change in the years to come. Repetitive stress injuries can take years to develop. “If you do something repetitive, it will irritate the tissues, inflame them and create pain,” Turkopp said. “Employers are asking for more and more in less and less time. I would not be surprised if we started seeing more of it.” To prevent pain from texting, experts recommend: - Avoid sitting in the same position for extended periods. Get up and take breaks. - Pay attention to posture. When seated at a desk, your monitor should be at eye level, your arms should be bent at a 90-degree angle, your knees should be bent at 90 degrees and your feet should rest on the floor. - Many people hunch over when texting because they’re trying to see the tiny keyboard. To keep from putting added pressure on your neck and upper back, rest the mobile device on your desk and lean against the chair’s backrest. - Use both thumbs and give your thumbs a break when typing long messages. - Stay active. “People who are more active outside of work and have good circulation will heal better than those who are less active and have poorer circulation,” Turkopp said. - If you experience soreness, stop texting. Anti-inflammatory medications such as Advil or Motrin can also help. Harvard University’s RSI Action has more on preventing repetitive stress injuries related to computers. By Jennifer Thomas SOURCES: David Edelstein, M.D., orthopedic and hand surgeon at Maimonides Medical Center, Brooklyn, N.Y.; Heather Turkopp, OTR, CHT, William Beaumont Hospital, Royal Oak, Mich.; a report by researchers at Sahlgrenska Academy, Gothenburg, Sweden Last Updated: July 06, 2009 Copyright © 2009 ScoutNews, LLC. All rights reserved.
<urn:uuid:4351d2ea-501f-4400-ba27-e9381f1b651a>
CC-MAIN-2016-26
http://news.health.com/2009/07/06/too-much-texting-can-spell-neck-arm-pain/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398209.20/warc/CC-MAIN-20160624154958-00084-ip-10-164-35-72.ec2.internal.warc.gz
en
0.93551
1,098
2.859375
3
I read an interesting article in UK Newspaper The Guardian about the threatened and fading glaciers on the Rwenzori mountains in Uganda and the Democratic Republic of the Congo. Up until now little was known about the condition of many of the tropical glaciers, but London-based Danish photographer Klaus Thymann recently came back from a micro-expedition in Uganda with the evidence that the 43 glaciers found and named in 1906 are in dire condition AND he predicts that not much time is left before the glaciers will disappear as a result of increased air temperature. Project Pressure, which is headed by Thymann, is now working with the World Glacier Monitoring Service (WGMS) and the Nasa in the US to create the first photographic, interactive “glacier atlas” to capture what the world looked like before the glaciers are gone forever, “We know the Rwenzori glaciers are not going to last long. They are clearly disappearing fast and may be not much more than accumulated blocks of ice slowly atrophying. I can’t see anything that will stop them disappearing, so what Project Pressure is doing is documenting what is there now,” says hydrogeologist Richard Taylor of University College London, who has studied the Rwenzori icefield and visited the mountains six times. “This is a last chance to see them. In years to come, the ice up there will be a fairy tale for the people who live [near Rwenzori]. This is the evidence of what was there, the proof. It is very helpful.” Via: The Guardian
<urn:uuid:6ba46098-e6e5-4e81-814f-4c6abfefb024>
CC-MAIN-2016-26
http://www.flyladylori.com/2012/06/the-rwenzori-mountains%E2%80%99-melting-glaciers/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393518.22/warc/CC-MAIN-20160624154953-00082-ip-10-164-35-72.ec2.internal.warc.gz
en
0.963054
323
3.15625
3
Fine Art - Native American Paintings: Paintings +Add category to My Preferences The gallery carries both traditional and contemporary Native American Paintings. Traditional paintings are those influenced by Dorothy Dunn, founder of the art program and teacher at the Santa Fe Indian School in the 1930s. This style is used to give a visual narrative of daily experiences and special ceremonies. Contemporary paintings break away from traditional forms and styles, freeing artists to discover new and individualized techniques for interpreting their experiences and creative expressions. In traditional pueblo art style, there are no background figures or ground plane.
<urn:uuid:9e109174-f066-4824-a011-08f71da29353>
CC-MAIN-2016-26
http://www.adobegallery.com/art/category-Paintings
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395160.19/warc/CC-MAIN-20160624154955-00029-ip-10-164-35-72.ec2.internal.warc.gz
en
0.929259
117
2.953125
3
Track topics on Twitter Track topics that are important to you Brain abnormalities have been documented by neuropsychological assessment as well as a variety of neuroimaging techniques in patients with systemic lupus erythematosus (SLE). Conventional neuroimaging in patients with neuropsychiatric disease (NPSLE) typically discloses periventricular white matter (WM) hyperintensities, infarcts, hemorrhages, and cerebral atrophy. In SLE patients with none of these findings, sophisticated neuroimaging techniques have recently supported associations between microstructural WM abnormalities and abnormal attention, executive function, and processing speed. This mild cognitive dysfunction in SLE (MCD-SLE), which may result from early myelinopathy, precedes the more severe cognitive dysfunction of NPSLE, related to more obvious WM and neuronal damage. (JINS, 2011, 17, 1-8). 1National Jewish Health, Denver, Colorado. This article was published in the following journal. Name: Journal of the International Neuropsychological Society : JINS Cognitive dysfunction has been reported in 20-80% of SLE patients. Converging evidence has indicated the importance of vitamin D as a neuroimmunomodulator for cognitive function. In this study, we eva... Children with neurofibromatosis type 1 (NF1) are predisposed to both brain tumors and cognitive deficits. While changes in white matter integrity after multimodal therapy are associated with cognitive... Chorea is well described in a group of patients with Systemic Lupus Erythematosus (SLE). There is less information, however, on other movement disorders as well as non-motor neuropsychiatric features ... Systemic lupus erythematosus (SLE) is a prototypical autoimmune disease marked by both B and T cell hyperactivity which commonly affects the joints, skin, kidneys, and brain. Neuropsychiatric disease ... Racial disparities in the clinical outcomes of systemic lupus erythematosus (SLE) exist. Perceived racial discrimination may contribute to disparities in health. Systemic lupus erythematosus (SLE) is an independent risk factor for atherosclerosis. Endothelial dysfunction is the earliest marker of atherosclerosis and is measured by flow mediated dil... Systemic lupus erythematosus is an often devastating autoimmune disease which affects 1 in 2,000 women in the United States. Recently, several research laboratories have reported that a pr... Lupus is a systemic autoimmune disease that can present with many varied symptoms, including joint pain, fevers, kidney disease, and rashes. Lupus can affect anyone, but it is most common... Lupus flares and other symptoms associated with systemic lupus erythematosus (SLE) may be caused by a deficiency of dehydroepiandrosterone (DHEA). GL701 is an investigational new drug mea... Previous experimental data strongly suggest that B lymphocytes have intrinsic abnormalities during lupus in mice spontaneously affected by the disease. This study tries to define these abn... A form of lupus erythematosus in which the skin may be the only organ involved or in which skin involvement precedes the spread into other body systems. It has been classified into three forms - acute (= LUPUS ERYTHEMATOSUS, SYSTEMIC with skin lesions), subacute, and chronic (= LUPUS ERYTHEMATOSUS, DISCOID). A chronic form of cutaneous lupus erythematosus (LUPUS ERYTHEMATOSUS, CUTANEOUS) in which the skin lesions mimic those of the systemic form but in which systemic signs are rare. It is characterized by the presence of discoid skin plaques showing varying degrees of edema, erythema, scaliness, follicular plugging, and skin atrophy. Lesions are surrounded by an elevated erythematous border. The condition typically involves the face and scalp, but widespread dissemination may occur. Antiphospholipid antibodies found in association with systemic lupus erythematosus (LUPUS ERYTHEMATOSUS, SYSTEMIC;), ANTIPHOSPHOLIPID SYNDROME; and in a variety of other diseases as well as in healthy individuals. The antibodies are detected by solid-phase IMMUNOASSAY employing the purified phospholipid antigen CARDIOLIPIN. An antiphospholipid antibody found in association with systemic lupus erythematosus (LUPUS ERYTHEMATOSUS, SYSTEMIC;), ANTIPHOSPHOLIPID SYNDROME; and in a variety of other diseases as well as in healthy individuals. In vitro, the antibody interferes with the conversion of prothrombin to thrombin and prolongs the partial thromboplastin time. In vivo, it exerts a procoagulant effect resulting in thrombosis mainly in the larger veins and arteries. It further causes obstetrical complications, including fetal death and spontaneous abortion, as well as a variety of hematologic and neurologic complications. Autoantibodies directed against phospholipids. These antibodies are characteristically found in patients with systemic lupus erythematosus (LUPUS ERYTHEMATOSUS, SYSTEMIC;), ANTIPHOSPHOLIPID SYNDROME; related autoimmune diseases, some non-autoimmune diseases, and also in healthy individuals. Benign Prostatic Hyperplasia (BPH) Erectile Dysfunction Urology Urology is the branch of medicine concerned with the urinary tract and diseases that affect it. Examples include urethritis, urethrostenosis and incontinence. Urology is a su... Lupus is a complex and poorly understood condition that affects many parts of the body and causes symptoms ranging from mild to life-threatening. There are several types of lupus. The main types are: discoid lupus erythematosus drug-induced lu... white matter on brain ct from lupuswhite matter hyperintensity and lupuswhite matter neuropathology and brain lupuswhite matter disease lupuswhite matter disease lupusWhen Lupus Attacks The Brain white massnonspecific white matter changes and lupuswhite matter lesions in lupuslupus brain white matterdoes lupus cause white matter on braindoes lupus cause white matter on braincontent
<urn:uuid:e09812e3-5c82-4552-8681-30dc3e36cf74>
CC-MAIN-2016-26
http://www.bioportfolio.com/resources/pmarticle/148625/Cognitive-Dysfunction-And-White-Matter-Abnormalities-In-Systemic-Lupus-Erythematosus.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397873.63/warc/CC-MAIN-20160624154957-00040-ip-10-164-35-72.ec2.internal.warc.gz
en
0.906562
1,407
2.515625
3
The achievements of ancient Mesopotamia The world of mathematics and astronomy owes much to the Babylonians--for instance, the sexagesimal system for the calculation of time and angles, which is still practical because of the multiple divisibility of the number 60; the Greek day of 12 "double-hours"; and the zodiac and its signs. In many cases, however, the origins and routes of borrowings are obscure, as in the problem of the survival of ancient Mesopotamian legal theory. The achievement of the civilization itself may be expressed in terms of its best points--moral, aesthetic, scientific, and, not least, literary. Legal theory flourished and was sophisticated early on, being expressed in several collections of legal decisions, the so-called codes, of which the best-known is the Code of Hammurabi. Throughout these codes recurs the concern of the ruler for the weak, the widow, and the orphan--even if, sometimes, the phrases were regrettably only literary clichés. The aesthetics of art are too much governed by subjective values to be assessed in absolute terms, yet certain peaks stand out above the rest, notably the art of Uruk IV, the seal engraving of the Akkad period, and the relief sculpture of Ashurbanipal . Science the Mesopotamians had, of a kind, though not in the sense of Greek science. From its beginnings in Sumer before the middle of the 3rd millennium BC, Mesopotamian science was characterized by endless, meticulous enumeration and ordering into columns and series, with the ultimate ideal of including all things in the world but without the wish or ability to synthesize and reduce the material to a system. Not a single general scientific law has been found, and only rarely has the use of analogy been found. Nevertheless, it remains a highly commendable achievement that Pythagoras' law (that the sum of the squares on the two shorter sides of a right-angled triangle equals the square on the longest side), even though it was never formulated, was being applied as early as the 18th century BC. Technical accomplishments were perfected in the building of the ziggurats (temple towers resembling pyramids), with their huge bulk, and in irrigation, both in practical execution and in theoretical calculations . At the beginning of the 3rd millennium BC, an artificial stone often regarded as a forerunner of concrete was in use at Uruk (160 miles south-southeast of modern Baghdad), but the secret of its manufacture apparently was lost in subsequent years. Writing pervaded all aspects of life and gave rise to a highly developed bureaucracy--one of the most tenacious legacies of the ancient Middle East. Remarkable organizing ability was required to administer huge estates, in which, under the 3rd dynasty of Ur, for example, it was not unusual to prepare accounts for thousands of cattle or tens of thousands of bundles of reeds. Similar figures are attested at Ebla, three centuries earlier. Above all, the literature of Mesopotamia is one of its finest cultural achievements. Though there are many modern anthologies and chrestomathies (compilations of useful learning), with translations and paraphrases of Mesopotamian literature, as well as attempts to write its history, it cannot truly be said that "cuneiform literature" has been resurrected to the extent that it deserves. There are partly material reasons for this: many clay tablets survive only in a fragmentary condition, and duplicates that would restore the texts have not yet been discovered, so that there are still large gaps. A further reason is the inadequate knowledge of the languages: insufficient acquaintance with the vocabulary and, in Sumerian, major difficulties with the grammar. Consequently, another generation of Assyriologists will pass before the great myths, epics, lamentations, hymns, "law codes," wisdom literature, and pedagogical treatises can be presented to the reader in such a way that he can fully appreciate the high level of literary creativity of those times. back to the History page
<urn:uuid:67e5c5dc-cf4c-4878-9e9c-e70c2c740874>
CC-MAIN-2016-26
http://www.angelfire.com/nt/Gilgamesh/achieve.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396538.42/warc/CC-MAIN-20160624154956-00068-ip-10-164-35-72.ec2.internal.warc.gz
en
0.959019
836
3.6875
4
Easter Island, also known as Rapa Nui, is a small triangular multi - volcanoed mound, roughly 14 miles long by seven miles wide. In total, Easter Island is only 69 square miles. Easter Island lies 2,400 miles West of the coast of Chile and 2,500 miles East of Tahiti. Easter Islands' closest human neighbors are 1,400 miles to the West on Pitcairn Island. The 2500 permanent inhabitants of Easter Island have the honor of being the remotest population on the planet. Whilst I have tried to be historically accurate, I realise that errors can creep in. I welcome constructive criticism of my personal views and of the objective overview of Easter Island that precedes it so that I can work towards making this an informed and inspiring document. |This website is a part of the APJ domain. Other sites include:| |A Profound Journey Travel and Technology Modern Jive partner dancing in London |I hate my cube Humorous interlude. My one man protest against working in a cubicle |Boston PDA user group Premier PDA user group. Information about PDAs and wireless technology. We meet at MIT in Cambridge, MA, USA |I love marmite I hate marmite My homage to Marmite. You either love it, or you hate it |Walker Mouldings Ltd If you want replica oak beams for your house or office, have a look here Huge online magazine about Management issues in the workplace. Created, maintained and powered by the SedaSoft SiteEngine The SedaSoft SiteEngine is an incredibly powerfull Content Management System (CMS) and website engine. Website created for Lambeth Borough Council, using the SedaSoft SiteEngine, to make publicly available their image archives. (Getty Images, eat your heart out ;-) |Copyright © 1995 - 2005 Seamus Waldron. All rights reserved.|
<urn:uuid:b72d0b6d-39a9-4633-96d9-7a0c751ab1b0>
CC-MAIN-2016-26
http://www.apj.co.uk/rapanui_primer/default.asp
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396538.42/warc/CC-MAIN-20160624154956-00004-ip-10-164-35-72.ec2.internal.warc.gz
en
0.883809
400
2.609375
3
In her Designing for Everyone, Anywhere, at Anytime presentation at EuroIA in Prague, Anna Dahlström talked about today's diverse device landscape and the implications for information architects. Here's my notes from her talk: - Before Facebook, iPhone, Twitter, etc. came along we could assume people had a certain screen size, a basic set of devices. But today the environment is much more diverse: many different devices and many different channels. - We know very little about them and the paths they take. As a result, we need to consider how we can design for everyone and everywhere. - Lots of Web sites drop you in assuming you know what you need. But in many cases you don’t. - Everyone: knowing your target audience is more important than ever. When you decide how to target, make sure you don’t opt for easy conversion at the expense of broader reach. - Content: many people are experiencing the Web one to one. A tailored experience delivers the right information to the right person. We need to know the priority and importance of content so that it finds the right audience. - Devices: behavior isn’t determined by location. Physical context doesn’t equal task. There is an equal expectation of increased and continuous access across devices. - Wireframes allow you to identify key pages and develop a modular system that can adapt across different device experiences. - Though inclusive design can take more time up front, the longer effects of continuous redesigns can actually add up to higher costs.
<urn:uuid:29521b73-063a-497f-b826-cbe23120a936>
CC-MAIN-2016-26
http://www.lukew.com/ff/entry.asp?1411
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395560.69/warc/CC-MAIN-20160624154955-00091-ip-10-164-35-72.ec2.internal.warc.gz
en
0.936293
318
2.546875
3
NASA has repeatedly said there is only a "very remote" risk to the public from the 26 fragments of the Upper Atmosphere Research Satellite (UARS) which were expected to survive the fiery re-entry into the atmosphere. The satellite fell back to earth today but the precise re-entry time and location "are not yet known with certainty", NASA said. "The satellite was passing eastward over Canada and Africa as well as vast portions of the Pacific, Atlantic and Indian oceans during that period," the space agency said in its latest update. On its Twitter feed, NASA said that if debris fell on land Canada was the most likely area. The two dozen parts of the UARS that may have survived re-entry could weigh anything from one to 158 kilograms, the space agency said, and the debris field is expected to span 800 kilometres. The tumbling motion of the satellite has made it difficult to narrow down the location. And given that the world is 70 per cent water, an ocean landing was considered likely. "In the entire 50-plus-year history of the space program, no person has ever been injured by a piece of re-entering space debris," said Mark Matney, an orbital debris scientist at NASA. "Keep in mind we have bits of debris re-entering the atmosphere every single day." On Friday, a NASA spokeswoman said the US Department of Defence and the space agency were busy tracking the debris and keeping all federal disaster agencies informed. The Federal Aviation Administration issued a notice on Thursday to pilots and flight crews of the potential hazard and urged them to report any falling space debris and take note of its position and time. Also on Friday, Italy's civil protection agency warned that the probability of a crash in its northern territory had risen from 0.6 to 1.5 per cent, and urged residents to stay indoors, on lower floors, preferably near load-bearing walls. Orbital debris experts say space junk of this size from broken-down satellites and spent rockets tends to fall back to earth about once a year, although this is the biggest NASA satellite to fall in three decades. NASA's 85-tonne Skylab crashed into Western Australia in 1979. The surviving chunks of the tour-bus-sized UARS, which was launched in 1991 and was decommissioned in 2005, will likely include titanium fuel tanks, beryllium housing and stainless-steel batteries and wheel rims. "No consideration ever was given to shooting it down," a NASA spokeswoman said. The craft contains no fuel and so is not expected to explode on impact, and NASA also said on Twitter that talk of "flaming space debris" was a "myth". "Pieces of UARS landing on earth will not be very hot. Heating stops 36km up, cools after that," NASA said, adding that UARS contains nothing radioactive but its metal fragments could be sharp. The US space agency has warned anyone who comes across what they believe may be UARS debris not to touch it but to contact authorities for assistance. Space law professor Frans von der Dunk from the University of Nebraska-Lincoln told AFP that the US would likely have to pay damages to any country where the debris falls. "The damage to be compensated is essentially without limit," von der Dunk said, referring to the 1972 Liability Convention to which the US is one of 80 state signatories.
<urn:uuid:9a41e436-c7bb-426f-82ff-b062935624c5>
CC-MAIN-2016-26
http://corpau.blogspot.com/2011/09/space-junk-crash-lands-on-earth.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783403823.74/warc/CC-MAIN-20160624155003-00048-ip-10-164-35-72.ec2.internal.warc.gz
en
0.966813
705
3.265625
3
Increasingly, businesses are investing in leadership development (Industrial Relations Services, 1992). Unfortunately, the expansion in provision has not been matched by sufficient empirical evidence to explain how transfer of learning may be optimally achieved (Williams et al., 2003; Burke et al., 2002). The terms leadership education and leadership development are often used interchangeably (Drew-Smith et al., 1989), with consequent confusion for clients and providers alike. Leadership education is characterised by structured university or college-based programmes, while leadership development is likely to include a broader spectrum of learning activities such as seminars, executive coaching or mentoring interventions. As referred to here, the term “leadership development” is a process whereby facilitators lead participants through a series of activities or mental exercises, encouraging them to reflect on learning experiences in order to promote transfer of knowledge and skills to work contexts. Hence rather than covering technical job skills, such programmes focus on self- awareness, changing attitudes, building teams and improving interpersonal interactions. Common objectives include, for example, development of leadership skills such as team-working and communication – competencies believed to be instrumental keys to organisational performance and productivity. Indeed, given the rapid expansion in course provision, it is worth asking questions about what these programmes expect to achieve and how the training interventions are linked to relevant and transferable Focusing on this context, this paper offers a framework to represent the conduct and implementation of programmes (see Figure 1). It suggests that the framework could be used as an evaluation tool for particular methodologies or course designs and that this may help to maximise the promotion of focused learning and subsequent skills transfer. To exemplify this process, the discussion will consider the development of skills related to conflict handling – an important component of effective leadership and management and a domain frequently addressed by leadership development interventions (Beer and Walton, 1990). Organisational conflict takes many forms – grievances, boycotts, or moves to replace particular managers with others (Deutsch, 1994). Consequently, individuals working in leadership positions require skills of a trained negotiator to effectively handle conflict (Clements et al., 1995). Such skills involve (for example), abilities which enable trust of opponents during interaction, co-operative approaches which allow parties to explore their options for resolving the conflict, empathy, and taking responsibility for one’s own actions (Arak, 1990). However, skills practice on its own is likely to be insufficient to enable individuals to intervene constructively either as third parties, or on an individual basis when they are, themselves on one side of the dispute. Following this logic, individuals in leadership roles require knowledge as well as skills practice to become competent at conflict handling (Deutsch, 1994). A framework for a comprehensive and sound design is suggested that represents a decision making chain comprised of two distinct (but not mutually exclusive) design pathways, namely “procedural – tactical – high fidelity” and “declarative – strategic – low fidelity” (see Figure 1). In order to provide a structure for these design pathways, the decision making chain is related to three main features of programme design, i.e. the knowledge base, the learning approach and the practice setting. The knowledge base Anderson (1982) offers a structure built on three types of knowledge, two of which are well documented. Procedural knowledge concerns knowing how to perform something Figure 1. A framework for analysing the learning and transfer of conflict handling skills via leadership development programmes (Anderson, 1982). This is where the learning is automised into a series of “productions” which are acts of cognition that make things happen. The aim of this process is to gradually reduce the number of productions required for a particular outcome so that application of the knowledge becomes automatic. To clarify this idea the learner would follow a set of “if . . . then” procedures which move them progressively towards the desired outcome. If this type of knowledge were to feature as an aspect of programme design, participants would be offered opportunities to solve conflict problems by working through influencing techniques specific to The second category, “Declarative knowledge” concerns “schemata, frames, scripts or knowledge structures” (Starkes and Allard, 1993, p. 110) and refers to the network of facts which take up our working memory. It has been argued that declarative knowledge has an important contribution to make in promoting “learning by understanding” (Pennington et al., 1995). So, in terms of conflict handling, declarative knowledge would be apparent where participants were required to compile facts about the underlying conflict issues, the parties involved and the consequences associated with various courses of action. This context would provide a foundation for a process whereby participants uncover some general rules and constructs to guide their behaviour in conflict interactions. The learning approach The second component of the decision-making chain relates to the learning approach. The framework suggests that procedural knowledge is likely to be utilised in tactical approaches to conflict handling that are specific to the situation. Under these circumstances, participants would be encouraged to decide the conditions under which knowledge could be applied and engage in appropriate actions, depending on the particular conflict scenario. The emphasis here is therefore on knowledge of procedures pertaining to the conflict situation and consistent with messages in the conflict literature which recommend matching styles to situations (Hart, 1991; Thomas, 1992). Alternatively, declarative knowledge is likely to be used in strategic approaches, which are applied generically across a range of conflict scenarios such as accommodating, competing or avoiding techniques (Thomas and Kilmann, 1974). This approach is represented in research that identifies broad strategies for dealing with conflict such as contending, yielding, problem solving or avoidance (De Dreu, 1997). Thus, declarative knowledge would provide the foundation for development of general constructs underlying the process of conflict handling and the development of knowledge and skills applicable across a range of conflict situations. The practice setting The decision about what balance of “learning approach” to use is not the only concern for providers of leadership development. This component of the decision making chain links the role of knowledge in skill acquisition to the issue of learning transfer – i.e. the use of knowledge or skill acquired in one situation in the performance of a new, novel task (Pennington et al., 1995). Hence the “practice setting” refers to the nature of the environment utilised for skills development and practice (see Figure 1). Indeed, given the differences between the training environment where the skills are learned and the business settings in which they are applied, transfer is arguably the Debates about the transfer of cognitive skills have hitherto focused around the issue of “fidelity” i.e. the extent to which tasks in the learning domain are similar to those in the real life situation where the learning is to be applied. Once again, these considerations hold considerable importance for providers of leadership development, especially since contrasting approaches, both apparent in the commercial sector, may either emphasise or consciously minimise the contrast between the learning domain and the business application setting. Transfer of learning has been considered from two theoretical perspectives, both of which have implications for the design and potential outcomes of leadership development programmes. Anderson (1982) has proposed that, in order for learning to be optimally transferred from one situation to another, the tasks must closely replicate reality. Under this approach, the knowledge acquired while learning a skill is encapsulated into procedures called production rules. Transfer of learning is said to occur when the tasks share similar production rules. This is in fact an argument for high fidelity, where there is a close match between the tasks in the learning domain and the tasks required in the real life setting. This idea is represented in research emphasising “specificity of knowledge” – i.e. it is not the knowledge acquired through training and practice but a particular use of knowledge that must be emphasised. In short, this method fits this In contrast, Bransford et al. (1979) maintain that low fidelity is needed for transfer. In this view, transfer may occur by increasing the degree of similarity between the cognitive processing requirements of the tasks in each situation. What is important therefore, are the cognitive processes involved in the tasks, not the tasks themselves. This perspective is consistent with the proposals of Pennington et al. (1995) and other Gestalt psychologists, in which the role of declarative knowledge in skill acquisition is emphasised – an approach which could be summarised as these principles can be modified to meet this problem in this way, or that problem in that way. If these ideas were applied to the design of leadership development programmes, methodologies that emphasise knowledge of procedures pertaining to specific conflict scenarios (i.e. tactical approaches) would be expected to maintain high fidelity. Thus, in the learning activities, explicit links would be made with conflicts at work in order to promote transfer of learning and the elements of the tasks undertaken by managers would be similar to those they would undertake in organisational contexts. This type of design would appear to optimise benefit through training intact units from one company in order to maximise opportunities for transfer of procedures learned to the workplace (see the left hand design pathway in Figure 1). Conversely, one might expect programmes that focus on the use of declarative knowledge (i.e. reflective of a strategic approach to conflict handling) to sustain low fidelity. In this type of design, the aim would be to achieve transfer via activities in which the cognitive processing requirements but not the task elements) share similarity with conflict scenarios in organisations. Training providers who ubscribe to this philosophy may prefer to work with participants drawn from a variety of different organisations in order to facilitate the application of broad constructs applied to diverse settings (see the right hand design pathway in The tactical and strategic approaches to conflict handling described above are not mutually exclusive and it is probable that managers will use a combination of procedural and declarative knowledge in skills application. Indeed, many conflict problems require a combination of “fit for purpose” skills driven by knowledge of underlying principles concerning the process of conflict handling. However, since these types of knowledge may be differentially developed via different types of learning approach, it seems crucial that providers and clients should at least understand the balance and its implications for the types of activities offered. Initial support for the model While a series of more comprehensive studies are planned, preliminary testing has shown support for the model. This work was conducted in three stages. The first study (content analysis of leadership development brochures) was designed to assess the initial applicability of the framework in relation to leadership development provision. In order to check for consistency from the perspective of both potential clients and established providers, two further studies were completed. The second phase (semi- structured interviews with managers) investigated the broad types of knowledge and skills used by managers to deal with conflict in business and the third (semi-structured interviews with leadership development providers) was designed to elicit data about perceived approaches to the learning and transfer of leadership skills. Content analysis of leadership development brochures A content analysis of brochures produced by providers of leadership development in the UK was conducted to assess the extent to which procedural and declarative designs were evident. A request for information was sent to 30 providers of management development selected from the Management Development Yearbook (Addico, 1995). The sample included large providers as well as the smaller, less well-established organisations. Requests were sent to 15 providers with a record of contracted services to large organisations (category 1) and 15 others, with a less well-established client base (category 2). In order to qualify for category 1, providers must have been in the business for more then two years, have a minimum of five employees working for them on a regular basis and possess a track record of contracted services to a range of organisations. All other providers were assigned to category 2. Content analysis was completed on 22 courses. The course content revealed the use of both procedural and declarative designs, with some providers using a combination. A final category included courses that did not appear to employ any particular focus in respect of the design framework. Hence there was no evidence of an orientation towards the development of either specific or generic skills, despite a course rationale suggesting skills development. Procedural designs were evident in descriptions that emphasised progressive approaches, moving participants towards focused outcomes. A programme offered by Guardian Business Services (1992-1993, p. 1) offered the following rationale: This 2 day course identifies the steps involved in making swift and informed choices, Delegates will be presented with a 5 stage model which will help them to analyse the situation, develop appropriate selection criteria, choose between people, assess the match and mismatch between the chosen person and the task and anticipate the consequences of their choice. This example was extracted because it was orientated towards particular skills or functions. Hence the approach was deemed to be representative of practical skills training that was situation specific. In contrast, declarative approaches were highlighted in descriptions offering help with broader issues and the development of generic skills applicable across different situations. A course from Sundridge Park offered the The programme is highly appropriate for male and female executives who have moved or wish to move into general management. It is of equal benefit to those functional managers who realise the imperative of a broader understanding beyond their own specialism (Sundridge Park Executive Development, 1994, p. 6). This (and other) examples were extracted from descriptions offering broader, process based skills, such as listening, questioning, self-disclosure and giving feedback. Hence the material aimed to develop behavioural skills and strategies that supported future learning and facilitated greater Combinations of procedural and declarative designs There were a number of examples where both approaches were used in combination. In these instances, courses appeared to offer opportunities for both specific and generic skills application: On completion you should have improved your skills in managing the relationship between yourself and your primary work group and how you and they interact with other groups. The individuals and the groups you manage will be better able to develop to their full potential and contribute to a culture in which positive influencing facilitates the delivery of desired results (Civil Service College, 1999-2000, p. 37). In this example, the learning involved both specific and generic skills application, whereby general competencies were included alongside more focused skill areas. Courses not offering declarative or procedural designs A course titled “How to lead a team” promised participants the opportunity to “learn the skills considered most critical by team leaders”. This included skills such as “starting off on the right foot with a new team”, “making sure team meetings are worthwhile – and not just a time wasting experience” and “knowing the best places to invest your time for the biggest reward” (CareerTrack International, 1999, p. 2). In these examples, it was difficult to glean the underlying rationale for knowledge and skills development. Such courses did not appear to have any notable design characteristics, and thus it was difficult to determine the overall philosophical approach from the descriptions provided. From this initial analysis, it appears that managers were offered a variety of leadership development opportunities based around programme designs supporting the development of either procedural or declarative knowledge, or both. The findings also revealed a number of programme designs that did not appear to be orientated towards any of these Semi-structured interviews with managers acting in leadership roles Further work appeared to offer support for the use of procedural and declarative knowledge in tactical and strategic approaches to conflict handling. A sample of 18 managers (12 male, six female) acting in leadership roles were interviewed about the skills they used to deal with conflict at work. They came from a variety of business sectors including travel, education and construction and ranged in age from 25 to 71 years (median age = 42 years). They were recruited through personal contact and purposefully sampled to represent the full cross section of business type, size and structure (Sunderland and Nelson, 1995). The interviews lasted between 45 and 60 minutes and were recorded and transcribed verbatim. Subsequently, the text was analysed using the procedures and techniques of grounded theory (see Glaser and Strauss, 1967; Gould et al., 1993). The responses revealed a variety of approaches, including both tactical (n = 5), and strategic (n = 4) skills. A combination of both tactical and strategic approaches was cited by half the managers in the sample (n One respondent demonstrated the use of a tactical approach involving attempts to regulate conflict in a manner specific to particular It’s no good using the same approach across the board. The approach must be adjusted, depending. In a similar vein, another respondent commented: If the conflict is due to a lack of understanding, I try to anticipate it and develop understanding. If this can be achieved, a mutually satisfactory compromise can usually be found. If the conflict is due to different priorities between departments, these have to be tackled “head on”. When the conflict is over personal factors, it’s better to skirt ’round them, to The use of strategic methods was abstracted from comments such as “all conflicts must finish up beat and with a feel-good factor” and similarly: My strengths lie in my lobbying – influencing, persuading and motivating. I can get myself out (or round) of most conflicts by talking and listening. I try and be conciliatory, to involve people in what they are doing, to encourage them to own up to their role in things and take responsibility. A combination of both tactical and strategic approaches were cited by nine respondents. Hence in some circumstances, the skills were adjusted to fit the situation, while in others the general approach was the same. These data suggest that, for this sample at least, managers applied their skills in one of three ways, namely tactically, strategically, or in combination. Additionally, these groupings are not inconsistent with the skills categories of “procedural”, “declarative”, “both” and “neither” highlighted as a result of the content analysis. Semi-structured interviews with leadership development providers Finally, in order to explore the veracity of the framework from both a learning (how it might happen) and a real life (how providers think it works) perspective, data were gathered about the methodologies used to develop the acquisition and transfer of conflict handling skills from ten major providers of leadership development. The criteria for selection of providers were as follows, each provider must have: . • worked in leadership development for a minimum of two years; . • run this area of work as their full-time main line of business; . • employed a minimum of five employees on a regular basis; and • hold a record of regular contracted services to a range of clients. Half of the sample had a substantial international client base. Each of the providers meeting the criteria for selection was assigned a number which was subsequently entered onto the SPSS for Windows 9.0 file (Chicago, USA). A random sampling of these data produced the final ten providers, who, when approached, all consented to participate. Development of the conflict video and interview guide A video of four conflict scenarios was developed to facilitate and standardise the acquisition of data and to provide a methodological link between participant’s responses to different conflict situations (see Patton, 1987). The content was derived from training videos and intended to represent the types of conflict encountered by managers in business, namely inter-organisational, inter-group, intra-group and inter-individual (Tjosvold and Chia, 1989). All participants received a copy of the video and a covering letter two weeks prior to the start of the investigation. An interview was then conducted with each participant after they had watched the video twice. Based on the model structure presented in Figure 1, the interview guide included questions pertaining to how programmes would be designed to equip clients with the knowledge and skills to deal with the conflicts portrayed, the underlying rationale for such approaches, and questions relating to learning transfer. The schedule included standardised probes to ensure that responses from all participants were explored in equal complexity and depth (Torrington, 1991). As per the objectives set for the investigation, no structure or system was offered to participants, in order to test for the existence and veracity of the decision-making structure in real All interviews were conducted by the first author, recorded and later transcribed verbatim. Subsequently, the interview text was content analysed by three researchers, employing a deductive approach and using consensus validation procedures to identify common themes from the raw data (Scanlan et al., 1989). Those of highest abstraction were labelled “dimensions”, second order categories were characterised as “higher order themes” and raw data themes comprised the most specific forms of The knowledge base Overall, 46 raw data themes were extracted from the transcriptions regarding the perceived role of knowledge in skills development. Subsequently, these raw data themes were compiled into three higher order themes from which the general dimension of “Knowledge” was constructed. The three higher order themes were: (2) specific; and All of the providers sampled (n ¼ 10) reported knowledge development to One provider made comments subsequently conceptualised exclusively under the theme of “specific knowledge”, which comprised 17 raw data themes. This category referred to knowledge applied to particular situations or workplace conflicts: It’s all very specific to that person or that team, that organisation, that business. We use project work to recreate a specific business problem that we know is happening in their organisation. We try to make it very specific to In contrast, five providers reported “generic knowledge” or understanding to be an important foundation for conflict handling skills. Under these circumstances, respondents cited broad understanding of conflict issues as being important: I guess the knowledge that we develop is generic knowledge if you like. The knowledge I would say is self-awareness about individuals, awareness about teams, creating knowledge about themselves but also business knowledge. In addition, four providers perceived a combination of specific and generic knowledge as essential features of programme design. Hence these findings suggest the likely use of both procedural (specific) and declarative (generic) knowledge to underpin skills development. Finally, eight providers made comments conceptualised under the higher order theme of “theoretical” This category represented theoretical models or tools used to promote skills learning, such as psychometric tests or experiential approaches. The learning approach A total of 91 raw data themes were extracted from the transcriptions pertaining to how programmes would be designed to develop skills to deal with the four conflicts portrayed in the video. All of the respondents reported the development of interpersonal skills to be useful in dealing with conflict. Within this category, one provider made comments conceptualised exclusively under the theme of “tactics”, which included the application skills adjusted to fit the situation: We look at building skills in quite a positive way, so by getting people to work together on small projects and taking out of these what works well and always as a cycle making the transfer of what happens there and what goes on at work. Five providers emphasised the use of strategic approaches, which referred to the acquisition of generic skills applicable across a range of conflict scenarios. One respondent said: We would develop systems for managing people’s objections. I might give them steps to assertiveness but the real knowledge they would have gained is about themselves, how they react, how they can do things. Overall, four providers reported the utilisation of both tactical and strategic skills as aspects of programme design. Under these circumstances, some of the skills were applied generically while others were deemed to be contingent upon the situation. Reassuringly for the framework, these three groups of participants demonstrated a consistent and coherent link between the knowledge base and consequent learning approach used, albeit that the logic of, or reasons underpinning this link were not explicitly The practice setting A total of 66 raw data themes were extracted from the interview transcripts for questions pertaining to learning transfer. In the category of “approaches to learning transfer”, six providers were able to articulate the rationale underpinning the use of particular methodologies. One example included the following: On a face level, some of the insights gained from the activities have nothing to do with work because the transfer is emotional, intellectual and at a “team understanding” level. We’re not talking about personality change here (I make this distinction) and it has to be a very careful process that is caring of the individual. Another respondent said: I would say that the main thrust of our programmes has to do with developing skilled behaviour. The biggest skill that we pass on is the skills where you can feedback to people. The approach to conflict management is about working through your differences. The remaining four failed to offer any link. When probed, these participants merely reiterated the operational aspects of their chosen approach, rather than the reasons underpinning it. For example, one respondent said: What we know about the experience is that it enhances self-confidence over and above everything else that it does. What else it does is very, very, specific to the individual. Hence with regard to the final stage of the decision making chain, results were mixed. Some providers mentioned the logical chain evidenced in stages 1 and 2, reporting the use of methodologies that fitted consistently with their chosen approach. Others were less consistent however, or even failed to show any logic in the decisions made. Specifically, the ten providers sampled in this investigation indicated the use of four basic designs to facilitate skills transfer. These were low fidelity (n = 1), high fidelity (n = 3), a combination of both (n = 4), and designs in which neither approach was utilised (n = 2). An example of a high fidelity approach (i.e. in which where was a close match between elements of the tasks in the learning domain and those in the work environment) was abstracted as follows: What we can do for a client is to have an exercise that somehow replicates what is going on at work. It works extremely well for them because they were able to make those direct links. It can really make the experience more transferable for them. In respect of low fidelity designs (i.e. where the emphasis was on matching the cognitive processing requirements of the tasks with workplace scenarios), one provider commented: It is more about seeing yourself from different perspectives and then thinking about how you might manage things in a different way. People will pick and choose the skills depending on where they are. I don’t believe in teaching specific skills to people anyway. Interestingly, two providers reported little or no follow up to facilitate skills transfer, although this factor was acknowledged by them as being We only get transfer via manager’s abilities to pick up the skills while they are on the course. There’s no follow up. We should, but we don’t. The findings also revealed a high degree of variance concerning the linkage between the stated programme objectives, the chosen methodology and the learning outcomes. Given this situation, it is unlikely to be clear to the clients that such processes/methodologies will result in these outcomes. In short, even if the provider has demonstrated explicit awareness of the fidelity issue, they don’t necessarily know how to manipulate this variable to maximise desired effect. The initial fieldwork broadly supported the use of procedural and declarative knowledge as a basis for deployment of tactical and strategic approaches to conflict handling, insofar as providers of leadership development reportedly utilise procedural and declarative designs, and in respect of both approaches as utilised by practicing managers in business. The data also suggest the use of high and low fidelity designs to facilitate learning transfer and hence the results broadly confirm the concepts outlined in the framework. Crucially however, the results do not appear to suggest a clear philosophical rationale for adoption of these designs, nor offer users any structured means by which to evaluate the potential efficacy of course content or method. The distinctions highlighted above demonstrate that there may be very different design philosophies in operation, each of which has implications for the learning and consequent efficacy of leadership development programmes. The choice of leadership development provider may therefore be mediated by the need to ascertain how their particular methodology fits with the organisation’s current and future needs, and the balance between these and its approach to leadership development. There are several issues to consider which tend to favour the declarative model for long-term benefit and the procedural model for short-term objectives. Indeed, course designs emphasizing broad-based approaches to conflict handing may offer greater development potential in the longer term because of the emphasis on skills application across different settings. Therefore, procedural designs may be more appropriate for training intact units from one company whereas declarative approaches may be more suited to open programmes involving delegates from a variety of organisations. Notably, courses incorporating a mix of “fit for purpose skills” (tactical) as well as those driven by knowledge of underlying principles (strategic) may offer distinct advantages in terms of minimizing this short-term/long-term trade off and this may prove to be especially pertinent, give the fluid nature of business in the current global We also recommend that client organisations give consideration to the circumstances under which transfer may be optimised. Relevant issues include the degree of post-course follow up that is provided to reinforce skills transfer, the extent to which pre-course audits are utilised, the competence of the course team to provide relevant and focused learning and the congruence between the activities and the skills requirements of the work setting. We also suggest that organisations consider in-house provision for quality skills practice. The use of a sound structural framework both informs and facilitates these decisions. The framework remains to be tested further with a larger sample of managers and providers. We also suggest that large scale longitudinal research to assess the extent to which procedural versus declarative designs are utilised in leadership development programmes would offer a useful foundation for further work to assess the efficacy of provision. Given the lack of empirical work to support an expressed link between design and outcome to maximise effect, a methodology examining both approach and rationale would be essential. Addico (1995), The Management Development Yearbook, Addico, London. Anderson, J.R. (1982), “Acquisition of cognitive skill”, Psychological Review, Vol. 89 No. 4, pp. 369-406. Arak, C. (1990), “Dispute Management in Schools”, Mediation Quarterly, Vol. 8, pp. Beer, M. and Walton, E. (1990), “Developing the competitive organisation: interventions and strategies”, American Psychologist, February, pp. 154-61. Bransford, J.D., Franks, J.J., Morris, C.D. and Stein, B.S. (1979), “Some general constraints on learning and memory research”, in Cermack, L.S. and Craik, F.I.M. (Eds), Levels of Processing in Human Memory, Erlbaum, Hillsdale NJ, pp. Burke, V., Collins, D. and Earle, M. (2002), “Using the outdoors to promote the learning of managerial skills: analysing the process of learning transfer”, in Berridge, G. and McFee, G. (Eds), Partnerships in Leisure, Sport Tourism and Management, Leisure Studies Association, Brighton, pp. 137-60. CareerTrack International (1999), How to Discipline Employees and Correct Performance Problems – Seminar Information, CareerTrack International, Redhill. Civil Service College (1999-2000), Development Directory, Civil Service College, Sunningdale Park, Ascot. Clements, C., Wagner, R.J. and Roland, C. (1995), “The ins and outs of experimental training”, Training and Development, Vol. 49 No. 2, pp. 52-6. De Dreu, C.K.W. (1997), “Productive conflict: the importance of conflict management and conflict issue”, in De Dreu, C.K.W. and Van di Vliert, E. (Eds), Using Conflict in Organizations, Sage, London, pp. 9-23. Deutsch, M. (1994), “Constructive conflict resolution: principles, training and research”, Journal of Social Issues, Vol. 50 No. 1, pp. 13-32. Drew-Smith, S., Chas Pell, S.C., Jones, P., Sloman, M. and Blacknell, A. (1990s), Management Challenge for the 1990s, Training Agency, July. Glaser, B.F. and Strauss, A.L. (1967), The Discovery of Grounded Theory: Strategies for Qualitative Research, Aldine, New York, NY. Gould, D., Finch, L.M. and Jackson, S.A. (1993), “Coping strategies used by national champion figure skaters”, Research Quarterly for Exercise and Sport, Vol. 64 No. 4, pp. 453-68. Guardian Business Services (1992-1993), Course Descriptions, Guardian Business Hart, L.B. (1991), Learning from Conflict: A Handbook for Trainers and Group Leaders, 2nd ed., Human Resource Development, Amhurst, MA. Industrial Relations Services (1992), “Training evaluation: an IRS survey”, Industrial Relations Review and Report, Vol. 512, pp. 2-12. Patton, M.Q. (1987), How to Use Qualitative Methods in Evaluation, Sage, Newbury Park, CA. Pennington, N., Nicholich, R. and Rahm, J. (1995), “Transfer of training between cognitive sub-skills: is knowledge use specific?”, Cognitive Psychology, Vol. 28 No. 2, pp. Scanlan, T.K., Ravizza, K. and Stein, G.L. (1989), “An in depth study of former figure skaters: introduction to the project”, Journal of Sport and Exercise Psychology, Vol. 11, pp. 54-64. Starkes, J.L. and Allard, F. (Eds) (1993), Cognitive Issues in Motor Expertise, North- Sunderland, S. and Nelson, R. (1995), Norms Reference Manual 3, General Sundridge Park Executive Development (1994), Guide to Open Programmes, Sundridge Park Executive Development, Bromley. Thomas, K.W. (1992), “Conflict and negotiation processes in organizations”, in Dunnette, M.D. and Hough, L.M. (Eds), Handbook of Industrial and Organizational Psychology, 2nd ed., Consulting Psychologists Press, Palo Alto CA, pp. 651-717. Thomas, K.W. and Kilmann, R.H. (1974), Thomas-Kilmann MODE Instrument, Xicom, Tjosvold, D. and Chia, L.C. (1989), “Conflict between managers and workers: the role of co-operation and competition”, Journal of Social Psychology, Vol. 129 No. 2, pp. 235-47. Torrington, D. (1991), Management Face to Face, Prentice-Hall, London. Williams, S.D., Graham, T.S. and Baker, B. (2003), “Evaluating outdoor experiential training for leadership and teambuilding”, Journal of Management Development, Vol. 22 No. 1, pp. 45-59. Weaver, M.J. (1999), “Beyond the ropes: guidelines for selecting experiential training”, Corporate University Review, p. 1.
<urn:uuid:42097af4-00e0-486c-a1a0-b45f7df5d100>
CC-MAIN-2016-26
http://www.slideshare.net/guest3aed2bc/seminarku
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395346.6/warc/CC-MAIN-20160624154955-00192-ip-10-164-35-72.ec2.internal.warc.gz
en
0.928284
8,062
2.65625
3
Chemistry and isotope information from snow pits dug at the Summit area of Greenland, 1989-1993 includes major ions (Na, K, Mg, Ca, Cl, NO3, SO4), oxygen isotopes (18O) and H2O2. Four snow pits were dug and sampled in 1989, three snow pits in 1990, two in 1991, one in 1992 and one in 1993. All snow pits had a 3 cm sampling interval except the snow pits in 1990, which had either a 3 cm or 5 cm sampling interval. Chemistry and isotope information were obtained from each of the snow pits. The pits and surface snow samples were collected by the Glacier Research Group (GRG), using established protocols to prevent contamination. The samples collected in 1991 were analyzed at the Greenland Ice Sheet Project Two (GISP2) drilling camp. All data except the oxygen isotope data, which is from the University of Washington, were generated by GRG at the University of New Hampshire.
<urn:uuid:47fb7d02-c454-4b51-a28e-42c26dec4d23>
CC-MAIN-2016-26
http://data.eol.ucar.edu/codiac/dss/id=106.arcss049/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395679.18/warc/CC-MAIN-20160624154955-00055-ip-10-164-35-72.ec2.internal.warc.gz
en
0.948655
200
2.796875
3
This tool version is unpublished and cannot be run. If you would like to have this version staged, you can put a request through HUB Support. We present a simple genetic algorithm based on cut-paste-mutation operations to solve problems with complexity scales as 2^N, where N is the size of the system. Entertaining examples of evolving to nice 2D pictures are chosen for illustration, where the complexity increases exponentially with the number of pixels. Interesting academic questions, like how the population size, number of parents for each generation, mutation rate, and probability the fitness criteria will affect the efficiency of evolution, can be studied. Cite this work Researchers should cite this work as follows:
<urn:uuid:eee27948-5e7c-4dbf-b57c-f6175b61f972>
CC-MAIN-2016-26
http://nanohub.org/resources/11773?rev=11
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397842.93/warc/CC-MAIN-20160624154957-00029-ip-10-164-35-72.ec2.internal.warc.gz
en
0.927291
142
2.578125
3
- Clements, J. F., T. S. Schulenberg, M. J. Iliff, D. Roberson, T. A. Fredericks, B. L. Sullivan, and C. L. Wood. 2014. The eBird/Clements checklist of birds of the world: Version 6.9. Downloaded from http://www.birds.cornell.edu/clementschecklist/download/ Habitat and Ecology IUCN Red List Assessment Red List Category Red List Criteria Little crow (bird) The little crow (Corvus bennetti) is an Australian species of crow, very similar to the Torresian crow in having white bases to the neck and head feathers (shown when ruffled in strong wind) but slightly smaller (38–45 cm in length) and with a slightly smaller bill. It has the same white iris that distinguish the Australian species from all other Corvus except a few island species to the north of Australia, and one from Eurasia, the jackdaw (Corvus monedula). Like the Australian raven, this species has a blue ring around the pupil. Distribution and habitat It ranges over western and central Australia, often inhabiting very dry, near desert areas. It frequents small country towns and cultivated areas, where its flocks have reminded people of the European Rook. It usually nests in small, loose colonies, building stick nests lined with mud (the only Australian species of Corvid to do this). The Little Crow's calls ranges from a harsh "'hark-hark-hark-hark'" to a more raven like "'ah-ah-ah'".
<urn:uuid:ea3782e8-d0f6-4885-8093-6cb510a44045>
CC-MAIN-2016-26
http://www.eol.org/pages/917345/details
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393146.70/warc/CC-MAIN-20160624154953-00108-ip-10-164-35-72.ec2.internal.warc.gz
en
0.810074
354
3.359375
3
Farmers could improve the efficiency of phosphorus in crop production by coupling plants with complementary traits, which would allow them to harness the ‘phosphorus bank’ already present in soils. Exploring the potential of ‘collaborative roots’ to make organic phosphorus available to plants is the objective of a new £1.2 million, three-year project undertaken by a scientific consortium including the James Hutton Institute, Rothamsted Research and led by Lancaster University. Phosphorus is a non-renewable resource, essential for crop and food production. Due to inefficient use and limited global reserves, inorganic phosphorus fertilizers will become less economically viable and there are concerns about future supplies. Without action, this situation could undermine agricultural productivity. A large proportion of phosphorus already present in soils is found in organic forms, which are generally unavailable to plants for two reasons: firstly organic phosphorus is often tightly bound to soil surfaces, and secondly, it must be transformed into inorganic compounds before it can be taken up by plants. Tim George, Ph.D., rhizosphere scientist at the James Hutton Institute and lead investigator on the project, said: “Some plants help mobilise organic phosphorus in soils by producing organic acids from their roots, whilst others exude enzymes that mineralize this phosphorus into forms available to plants. “We are investigating bi-cropping systems that combine plants with these individual traits to determine if such systems can improve the utilization of organic phosphorus and help transform organic phosphorus into a viable, sustainable nutrient source for agricultural production. “Outputs from the project will have impact for many individuals involved in crop production from agricultural research scientists, fertilizer suppliers, crop breeders and land managers through to policy makers. Professor Phil Haygarth of Lancaster University said: “By increasing the amount of phosphorus utilized from the ‘phosphorus bank’ stored in soils we can reduce the reliance on inorganic fertilizers, increasing agricultural sustainability and improving our ability to deliver food security in coming decades. “It is exciting to be starting this collaborative project with such a strong team, we have potential to make a real difference to the future of food production.” The results of the study could influence the way in which cropping systems are considered in the future both nationally and internationally, by providing fundamental science to support crop development, based on more than just yield and productivity, but also on the specific soil/plant processes involved.
<urn:uuid:478775f7-5efc-4bf7-8270-5f86d209fd94>
CC-MAIN-2016-26
http://www.agprofessional.com/news/Collaborative-roots-could-reduce-reliance-on-P-fertilizers-258172301.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783391519.0/warc/CC-MAIN-20160624154951-00175-ip-10-164-35-72.ec2.internal.warc.gz
en
0.932631
505
3.828125
4
Home » Bran 1. The broken coat of the seed of wheat, rye, or other cereal grain, separated from the flour or meal by sifting or bolting; the coarse, chaffy part of ground grain. 2. (Science: zoology) The European carrion crow. Origin: oe. Bren, bran, OF. Bren, f. Bran, from Celtic; cf. Armor. Brenn, ir. Bran, bran, chaff.
<urn:uuid:c6c4cd04-c9ff-46c0-a2af-5276afc3b54a>
CC-MAIN-2016-26
http://www.biology-online.org/dictionary/Bran
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397695.90/warc/CC-MAIN-20160624154957-00112-ip-10-164-35-72.ec2.internal.warc.gz
en
0.806883
101
2.609375
3
More than 30,000 people with men tal health problems are dying needlessly every year from causes other than suicide, according to new figures. The Government estimates around 100,000 people under 75 die every year from illnesses that could have been prevented through better medical treatment or interventions like stop smoking campaigns. A new report from the charity Rethink Mental Illness has found around a third of these deaths are among people with mental health problems. They are more likely to die from preventable illness - such as cancer or heart disease - than the rest of the population. The study, Lethal Discrimination, calls on the Government to do more to target this group, who have higher rates of illness through side-effects of medication, smoking, a lack of basic health checks on the NHS and professionals not taking their concerns seriously. Figures show that people with mental illness are three times more likely to develop diabetes and twice as likely to die from heart disease. More than 40% of all cigarettes are also smoked by people with mental illness, but research suggests they are less likely to receive support to quit. Fewer than 30% of people with severe mental illness receive a basic annual physical health check. Earlier this year, Health Secretary Jeremy Hunt issued a call to action to reduce premature death in England, mainly from the five biggest killers: cancer, stroke, heart, liver and respiratory disease. Paul Jenkins, chief executive of Rethink Mental Illness, said: "If Jeremy Hunt is serious about wanting to reduce the number of people dying needlessly every year, he can't afford to ignore people with mental illness. "We know this group is at a much higher risk of early death. "We also know that there are simple solutions like targeted support to give up smoking and regular physical health checks, which could save thousands of lives. "While there are some pockets of good practice in the system, most people with mental illness are being badly let down when it comes to their physical health. "This means tens of thousands of people are dying needlessly every year and many more are left struggling with long-term conditions such as diabetes. "By not acting, the Government is allowing some of the most vulnerable people in our society to be treated as second class citizens. "We know what the solutions are and they are not complex or expensive. "All we need now is the political will to make change happen." Key recommendations in the report include more specialist support to quit smoking, closer monitoring of patients for side-effects of medication and for clear guidelines on who is responsible for the physical health of people with mental health problems. Professor Sue Bailey, president of the Royal College of Psychiatrists, who wrote the foreword for report, said: "The fact that people with serious mental illness die an average of 20 years earlier than the rest of the population is one of the biggest health scandals of our time, but it is being ignored. "If this statistic applied to any other group of people, such as residents of a particular town, there would be public outcry. "Questions would be asked about why these people are being so badly let down by health services and politicians would call for targeted support. "But this simply isn't happening for people with mental illness. "Failure to address this issue amounts to a form of lethal discrimination which is costing lives." Care and support minister, Norman Lamb said: "This Government has made improving the overall health of people with mental health problems a bigger priority than ever before, and we're determined that mental health is treated with as much importance as physical health in the NHS. "We have made it clear that we expect the NHS to reduce the number of premature deaths in people with mental health problems. "Later this year, we will also be publishing a five year action plan on how to reduce avoidable deaths, including for people with mental health problems."
<urn:uuid:2a82f0c4-a43f-4950-9b5b-3ed0c8729d9a>
CC-MAIN-2016-26
http://www.hampshirechronicle.co.uk/uk_national_news/10699333.Vulnerable_group__dying_needlessly_/?ref=rss
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783404405.88/warc/CC-MAIN-20160624155004-00152-ip-10-164-35-72.ec2.internal.warc.gz
en
0.973741
798
2.796875
3
Teaching ASMD of Fractions to Elementary School Students The goal in teaching ASMD of fractions with Fraction Circles is to teach students that they can figure out the rules themselves so they don’t have to rely on remembering them if they are not sure of one. All they have to remember is that they figured it out before, so they should be able to figure it out again. The teaching strategy for all four operations is the same: • Students ASMD fractions with Fraction Circles to obtain answers that they know are correct because they can see that they are. • They then examine the numbers in the problems they solved and the numbers in their answers to find a rule to get their answers using just the numbers in the problems. Usually, they can do this because the problems in the lessons are sequenced to make the rule stand out. To “remember after forgetting,” students replicate these steps except with pictures they draw of Fraction Circles. An example of doing so for the “Ours is not to reason why ...” rule at the start of this key will be given later. Adding and Subtracting Fractions with Fraction Circles Adding or subtracting fractions is easy if the denominators are the same: just add or subtract the numerators. For example, 1/3+1/3=2/3 and 4/5-1/5=3/5. When the denominators aren’t the same, then they must be made the same, which gets us back to “easy.” However, how to make them the same requires thinking. The “ideal” denominator for adding or subtracting fractions is called the “least common denominator” (LCD). It’s the smallest denominator that can be used. It is the “best” in terms of keeping the numbers small and maybe not having to reduce an answer, but it is the worst if required. Requiring it adds needless and debilitating stress. If students stumble across it, fine, but any common denominator will yield the same answer, so there is no need to insist on the LCD in adding and subtracting fractions. The following lessons for adding and subtracting fractions are sequenced from “easy” to “thoughtful” to “doubly thoughtful.” They are self-explanatory and thus reasonably easy to direct. Use your judgment on how many problems students must work with the Fraction Circles before using just the numbers. Adding Fractions with Fraction Circles Subtracting Fractions with Fraction Circles is a derivative of “cross” multiplication for adding and subtracting fractions. It is easy to use and, because of the goofy picture that it is based on, easy to remember. Depending on the age of the students, it may be taught before the work with the Fraction Circles. For older students about to be tested on fractions with some standardized test, it is a good thing for them to know before the test to avoid being humiliated. Afterwards, though, they should complete the lessons for adding and subtracting fractions with Fraction Circles so they learn how to think about fractions.
<urn:uuid:336b1816-fa96-429a-804c-9b30bd7aa13a>
CC-MAIN-2016-26
http://moveitmaththesource.com/realfractions/realfractionspd.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783394987.40/warc/CC-MAIN-20160624154954-00113-ip-10-164-35-72.ec2.internal.warc.gz
en
0.952311
674
4.5625
5
By Liz Seward Science reporter, York The mystery of how we read a sentence has been unlocked by scientists. Reading is not as simple as scientists once thought Previously, researchers thought that, when reading, both eyes focused on the same letter of a word. But a UK team has found this is not always the case. In fact, almost 50% of the time, each of our eyes locks on to different letters simultaneously. At the BA Festival of Science in York, the researchers also revealed that our brain can fuse two separate images to obtain a clear view of a page. Sophisticated eye-tracking equipment allowed the team to pinpoint which letter a volunteer's eyes focused on, when reading 14-point font from one metre away. Rather than the eyes moving smoothly over text, they make small jerky movements, focusing on a particular word for an instant and then moving along the sentence. Periods when the eyes are still are called fixations. Professor Simon Liversedge, from the University of Southampton, said: "We found that in a very substantial number of fixations that people make when they read, they aren't looking at the same letter." Instead, the eyes often focussed on different letters in the same word, about two characters apart, he said. "They could be uncrossed, in the sense that the two lines of sight are not crossed when you look at a word, or alternatively the two lines of sight may be crossed," he added. The team's results demonstrated that both eyes lock on to the same letter 53% of the time; for 39% of the time they see different letters with uncrossed eyes; and for 8% of the time the eyes are crossing to focus on different letters. A follow-up experiment with the eye-tracking equipment showed that we only see one clear image when reading because our brain fuses the different images from our eyes together. The tests showed that we use the information from both eyes, rather than our brain suppressing one image and only processing the other. Professor Liversedge said: "A comprehensive understanding of the psychological processes underlying reading is vital if we are to develop better methods of teaching children to read and offer remedial treatments for those with reading disorders such as dyslexia."
<urn:uuid:c79baf76-d885-4148-bb97-50761a127fc6>
CC-MAIN-2016-26
http://news.bbc.co.uk/2/hi/science/nature/6983176.stm
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396945.81/warc/CC-MAIN-20160624154956-00058-ip-10-164-35-72.ec2.internal.warc.gz
en
0.949932
470
3.5
4
The social history of the Balkans as a whole Hartford Web Publishing is not the author of the documents in World History Archives and does not presume to validate their accuracy or authenticity nor to release their copyright. - Southern Discomfort - Majorities despise minorities, and the hatred is often mutual. By Panayote Elias Dimitras, War Report, January/February 1997. Statistical data on feelings among ethnic groups in the Balkans. - War in The Balkans—Another 30,000 join - By Richard Lloyd Parry at Blace, The Independent (London), 16 April 1999. Large numbers of homeless Kosovars—as many as 30,000—were moving towards the border with Macedonia yesterday trying to escape the misery of Serbian ethnic cleansers, according to the United Nations High Commission for Refugees. - Western officials ‘colluding with - By Rory Carroll, Rome, The Guardian, 23 July 2002. Some western officials are undermining the fight against human trafficking by becoming cronies of Balkan pimps and having sex with the prostitutes they are supposed - Winners and losers among the minority groups in former Yugoslavia - By Jean-Arnault Dérens, Le Monde diplomatique, August 2003. The biggest losers have been those ‘minorities‘ who were never directly part of the main conflicts of identity, but were often forced to choose sides.
<urn:uuid:31e37fcc-7ebf-4be1-bf00-219518a6615c>
CC-MAIN-2016-26
http://www.hartford-hwp.com/archives/62/index-ce.html
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783394605.61/warc/CC-MAIN-20160624154954-00031-ip-10-164-35-72.ec2.internal.warc.gz
en
0.918963
309
2.609375
3
Blackcurrants add an exceptional flavour to many culinary dishes and are common ingredients in jams, yoghurt’s, sorbets, summer puddings and many more. If you have any blackcurrant recipes we would love to see them! TOP TIP: Net your bushes during the summer to protect the fruits from birds. Planting Blackcurrant Bushes Make sure your site is well prepared for your new bush to allow the best conditions for healthy growth. Remove all the weeds in the area and dig in plenty of manure before planting. Blackcurrant bushes need to be placed in a sunny position, but some varieties can tolerate partial shade. If you are growing blackcurrant bushes in containers, then make sure you re-pot them every 2-3 years. Watering Blackcurrant Bushes Blackcurrants thrive in a well drained and moist soil. Try to maintain a consistently moist soil – this is particularly important for container grown plants which are more prone to suffer from drought. However, avoid over watering especially when the fruits ripen as this can cause the skins to split. How to Prune Blackcurrant Bushes Blackcurrant bushes flower early in the season, April – May, this means that they are susceptible to any late frost, so it is important to look after them if frost occurs. Only prune blackcurrant bushes in winter months during their dormant season. This will avoid any damage to the stems or fruit. Blackcurrant bushes require annual pruning. Once planted, cut the stems back to one bud above the ground level or to a strong shoot. After the first season, prune out any thin or weak shoots. In the following years, prune out any damaged or weak shoots before removing 20% of the remaining stems to create an open bush, and encourage fresh new shoots to develop. If your bush is healthy but struggling to produce many shoots, cut down the whole plant to ground level. Blackcurrant bushes generally rejuvenate well if fed and mulched. Our top picks Blackcurrant ‘Big Ben‘ is the largest blackcurrant we have ever seen – and with a lovely sweet flavour too. The large, glossy, strong-skinned fruits weigh on average 2.9g each, compared to a weight of 1.1g in standard varieties! The fruits are borne on naturally arching stems for easy picking and are sweet enough to be eaten fresh or used in cakes, jams and crumbles. Also has excellent mildew resistance! Blackcurrant ‘Ebony’ is the sweetest blackcurrant! This outstanding dessert variety is so exceptionally sweet that it can be eaten straight from the bush when fully ripe. Heavy crops of large, firm currants – each one up to twice the size of a normal blackcurrant – are produced for harvesting from early to mid July. The bushy plants have a slightly open, spreading habit which makes harvesting so easy. Blackcurrant ‘Ben Connan’ is early cropping, from the beginning of July, and continues to produce fruit over a long cropping period. From the second season onwards each plant will produce over 3.5kg (over 7lb) of fruit and will keep producing for up to 10 years. With excellent mildew resistance and good frost tolerance, this RHS AGM variety really has it all! Please send your blackcurrant recipes to firstname.lastname@example.org we cant wait to give them a try 🙂 Cheese, Sage and Onion Savoury Scones I realise these scones sound a little odd and festive but they are really tasty! Good for a snack hot with salted butter or instead of a sandwich for a lunchbox – add a little chutney and cheese in-between and it makes lunch a little more interesting! - 1 heaped teaspoon of baking powder - ½ a teaspoon of salt - 350g self-raising flour - 150g cheddar cheese - 190ml milk - 100g butter - 1 egg - 1 onion (very finely sliced and diced) - About 5 or 6 Sage leaves (washed and thinly shredded) - Heat your oven to 180C - Mix all the dry ingredients together - Cut the butter into cubes then rub it into the dry mixture - Grate the cheese and add that and all the remaining ingredients to the bowl - Mix all of these together to form a dough - Tip the dough onto a floured surface and cut out 3 cm deep discs with a cutter. Place these scone discs on an oiled baking tray - Place in the oven and bake for approximately 25 minutes. Check regularly to ensure the scones do not burn or brown too fast. More details on Katy’s smallholding blog Guest blogger Carole Patilla writes about her love of all things artichoke! Giants of the garden “What’s that huge, gorgeous silver-leafed thing?” is one of the most frequently asked questions by visitors to my garden. The answer, surprisingly for many, is a globe artichoke. Globe artichoke – the giant of the garden Striking for their architectural foliage alone, I wouldn’t be without them as they add height and drama to the flower border. Their muted greys and jagged, arching shape make them a superb plant to grow at the back of the border to set off dark coloured flowers. Superb border plants And if that is not enough to earn these would-be six-footers a place in your flower bed, in addition to producing delicately flavoured, delicious edible flowers in July and August, they are loved by visiting bees (who need all the help gardeners can give them at present). If you choose not to harvest the immature flowerheads for the table, they open to reveal spiky purple hearts resembling thistles on steroids, which have a lengthy vase life as a stunning cut flower. The leaves also are a revelation when used as filler foliage in vase arrangements. Artichoke flowers – bees love them! If I have now persuaded you to put these on your gardening wish list, there is still better news to come – they’re one of the few items of perennial ‘veg’ (though technically, the globes are flowers, not veg) AND they are easy to grow. I always sow globe artichoke from seed, starting them off indoors in a propagator in late January or early February. (If you don’t own a propagator, a sunny, bright windowsill and a plastic bag, secured with an elastic band, to cover the pot will do). You can sow the seed either singly or two per 7.5 cm pot, just in case one seed does not germinate. If both seeds sprout, you’ll need to transplant one as soon as they are large enough to handle. Take them out of the propagator when the shoots have emerged and keep the seedlings indoors to grow on in slightly cooler conditions for a couple of weeks. I usually start to usher my babies towards the outdoors in stages – putting them in my unheated porch during the daytime only at first, then they get to stay out for night too. When the stems have started to harden off (you can tell this just by feeling them), I release them into my unheated greenhouse but during the colder weather, tuck them up at night in horticultural fleece until they are really growing strongly. Look after them well and they will reward you. When the roots are visible at the bottom of the pot, don’t forget to pot them on to keep them nice and vigorous until late March when they can be planted out into the garden. If this all sounds far too complicated, and (unlike me) you are able to restrain your gardening urges until the gardening season proper begins, you can sow them outdoors between March and April. Prepare a seed bed and mark out rows 30 cm apart, then sow two or three seeds every 25-30cm along the row. You will need to thin them out later, leaving only the strongest seedling in each group to develop further. Once you have established plants dotted around your plot, it is also easy to propagate new ones by division in early spring. Using a sharp knife, separate a cluster (at least two growing points) of emerging shoots from the edge of the foliage clump and ensure you also get some of the attached roots. Grow them on until established in pot of multipurpose compost and then plant them out into their final positions. They need plenty of room (about a square metre) but will earn every centimetre of it with a glorious display from spring onwards. If you leave the dried stems standing, they even provide a dramatic focal point in the winter garden. Artichokes are a little fiddly to prepare as the tough outer leaves and stem have to be removed. When you have peeled them away and are left with the lighter coloured middle of the flower, scrape away the thistly bit and the pale green heart coveted by chefs is finally revealed! Artichokes do discolour after peeling, so if you don’t want them to brown for aesthetic reasons, rub them with a cut lemon. They still taste great even if they do! Fried slivers of artichoke with oil, fresh herbs and garlic - 4 fresh artichoke hearts, sliced into sixths - 3 tablespoons olive oil - 2 chopped garlic cloves - 1 tablespoon fresh mint (chopped) - 1 tablespoon fresh parsley (chopped) - salt and pepper - 2 crumbled dry chillies (optional) Heat the oil until smoking hot and add the sliced artichokes. Keep stirring them until they change to a light brown colour, which should take about 5 minutes. Turn down the heat, then add the garlic. Lower the heat to medium and when the garlic starts to colour, add 3 tablespoons of water, then add salt and pepper. Cover with a lid and cook until the water has evaporated. Add the chopped herbs and chilli if using. Check the seasoning – add a little lemon juice to suit your taste. Read Carole’s blog at Tuckshop Gardener
<urn:uuid:8af88559-fd84-423c-afe1-d994f7c83e94>
CC-MAIN-2016-26
http://blog.thompson-morgan.com/tag/recipes/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393997.50/warc/CC-MAIN-20160624154953-00189-ip-10-164-35-72.ec2.internal.warc.gz
en
0.937929
2,139
2.921875
3
Fire Damage Restoration Smoke particles not only rest on surfaces, but they cam actually embed themselves within structures and materials if not professionally treated , smoke odor and discoloration can cause permanent damage. Smokes particles can become acidic and begin to eat through surfaces and materials, eventually even etching glass. We use state-the-art equipment and methods to carefully clean smoke from all contents and surfaces. An ozone machine purifies airborne odor and thermal foggers allow heated neutralizing chemicals to penetrate contaminated surfaces and reduce embedded smoke and airborne odor particles. As needed, we can "Pack-out" contents to clean and store them in our secure, climate-controlled facilities.
<urn:uuid:8b233e07-b8ea-4027-b5af-82c87146e8f3>
CC-MAIN-2016-26
http://www.asaprestorationinc.com/fire_damage_restoration.php
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399425.79/warc/CC-MAIN-20160624154959-00086-ip-10-164-35-72.ec2.internal.warc.gz
en
0.905747
136
2.5625
3
It’s one of the last things we think about affecting our children, but high blood pressure may be a health issue for children exposed to phthalates in food packaging, says a study published in the recent issue of The Journal of Pediatrics. According to the research, which was conducted by New York University’s Langone Medical Centre on close to 3,000 children, chemicals known as phthalates once thought be harmless—found in a number of everyday household products children are exposed to including certain types of flooring, plastic food and beverage packaging, plastic cups, plates and forks, and toys such as beach balls—appear to be causing a rise in the number of cases of juvenile high blood pressure. While most common in people over age 50, 14 percent of obese teenagers now have high blood pressure (as defined as a systolic blood-pressure reading above 140 mm Hg). Largely connected with rising obesity rates related to diet, chemicals known to disrupt endocrine function, such as phthalates are also playing a significant role, cite the researchers. “Phthalates can inhibit the function of cardiac cells and cause oxidative stress that compromises the health of arteries. But no one has explored the relationship between phthalate exposure and heart health in children” says lead author Leonardo Trasande, MD, MPP, associate professor of pediatrics, environmental medicine and population health at NYU Langone Medical Center. “We wanted to examine the link between phthalates and childhood blood pressure in particular given the increase in elevated blood pressure in children and the increasing evidence implicating exposure to environmental exposures in early development of disease.” Keep in touch with Jill on Twitter @jillettinger Image: thomas hawk
<urn:uuid:2695d00b-5bd0-415c-971e-cc921f23c815>
CC-MAIN-2016-26
http://www.organicauthority.com/blog/organic/childhood-high-blood-pressure-on-the-rise-thanks-to-plastic/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397111.67/warc/CC-MAIN-20160624154957-00071-ip-10-164-35-72.ec2.internal.warc.gz
en
0.947179
357
3.25
3
The subject area of land surveying is very interesting and to become a licensed land surveyor you need to understand and be able to put into practice a wide range of land survey formulas as the majority of land surveying is based around mathematics and physics. In today's guide we shall look at land survey formulas in more detail. Origin and History of Land Survey Formulas The wonderful thing about land surveying is that even though it has been around since records first began, the methods and formulas have barely changed. Land survey formulas have always been based around mathematics and physics and use fundamental rules of each of these subject areas to create land surveys. Back in the times of the ancient Egyptians land survey formulas were much more basic and used simple rules of geometry to conduct their surveys. While the basics are still the same today, thanks to increased knowledge in the field of mathematics land survey formulas have become a lot more advanced and have allowed for increased accuracy in land surveys. Below we shall look at some of the main land survey formulas that are used around the world. Types of Land Survey Formulas There are hundreds of different land survey formulas, and each one serves its own purpose. Whenever a land surveyor is required to do a land survey they must first establish which land survey formulas are most appropriate for the type of land they are working with. The type of land survey formula they use also depends on the type of survey that is being done. There are dozens of different types of land surveys, some of which are more complex than others. For land surveys that cover huge areas of land, the land surveyor will usually use a land survey formula that takes into account the curvature of the Earth to ensure a more accurate land survey. However, for smaller areas of land the land surveyor will tend to use a land survey formula that assumes the land is on a flat plane as the curvature of the Earth has such minimal effect. Some land surveys only require the boundaries of the land to be measured, whereas others require the height and contours of the land to be mapped as well. The chosen land survey formulas will suit the type of survey. Algebra and Trigonometry Land Survey Formulas Algebra and trigonometry make up a large number of the most commonly used land survey formulas. Trigonometry land survey formulas are typically used when measuring the height and angle of the land. In fact, land surveyors are one of the most prominent users of trigonometry formulas. Basic algebra is incredibly useful for land survey formulas as it is used to establish length, area, volume and more - which are essential for land surveys. Other land survey formulas include quadratic equations, spherical trigonometry and spherical coordinates. Land surveyors must have a strong and thorough understanding of all of these land survey formulas and they form a huge part of any land surveying college courses. Probability and Statistics Land Survey Formulas Probability and statistics are two other types of land survey formulas that are well utilized within the profession. These two areas are important when it comes to data collection and interpretation - a major part of land surveying. Areas of probability and statistics that are most commonly used in land survey formulas include: standard deviation, variance, test of significance, error ellipses, data distribution and histograms. Geodesy Land Survey Formulas We mentioned earlier how many land surveyors need to take into account the curvature of the Earth to allow for the most accurate land surveys of large areas. Geodesy land survey formulas can be quite complex and are similar formulas as those that are used by astronomers. Some of the geodesy land survey formulas include: geodetic data, gravity fields, reference ellipsoids, conversion from geodetic heights to elevation and orbit determination and tracking. Geodesy land survey formulas are some of the most complicated used by land surveyors and it requires intense levels of knowledge and study before they can be perfected and used. Continue browsing our website by clicking on the related articles below for more information...Top Leave Comments
<urn:uuid:2a264f1f-edbb-445a-a3fd-2773a5ebd19a>
CC-MAIN-2016-26
http://www.surveyors.com/land-surveyors/land-survey-formulas/
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783408828.55/warc/CC-MAIN-20160624155008-00004-ip-10-164-35-72.ec2.internal.warc.gz
en
0.92686
836
3.453125
3
From Douglass’s fight with Covey through end of Chapter X In coming to a fixed determination to run away, we did more than Patrick Henry, when he resolved upon liberty or death. The fight with Covey causes Douglass to regain his spirit and defiance, as well as his resolve to be free. He never receieves a whipping from anyone during his remaining four years as a slave. Douglass’s year with Covey ends on Christmas Day, 1833. It is customary for slaves to enjoy a holiday from Christmas to New Year’s. Slaveholders typically encourage slaves to spend the holiday drinking, rather than resting or working industriously for themselves. Douglass explains that this strategy helps keep blacks enslaved. By giving slaves a brief span of time each year to release their rebellious spirit, slaveholders keep them manageable for the rest of the year. By encouraging them to spend the holiday riotously drunk, slaveholders ensure that freedom comes to seem unappealing. On January 1, 1834, Douglass is sent to live with Mr. William Freeland. Mr. Freeland, though quick‑tempered, is more consistently fair than Covey. Douglass is grateful that Mr. Freeland is not a hypocritically religious man. Many men in the community profess to be religious, but merely use their religion as justification for their cruelty to their slaves. Freeland works his slaves hard, but treats them fairly. Douglass meets and befriends other slaves on Freeland’s property, including the intelligent brothers Henry and John Harris. Sandy Jenkins also lives at Freeland’s at this time, and Douglass reminds readers about Sandy’s root and reports that Sandy’s superstition is common among the more ignorant slaves. Douglass soon succeeds in getting some of his fellow slaves interested in learning how to read. Word soon spreads, and Douglass surreptitiously begins to hold a Sabbath school in the cabin of a free black. This is a dangerous undertaking, as educating slaves is forbidden; the community violently shuts down a similar school run by a white man. Yet the slaves value their education so highly that they attend Douglass’s school despite the threat of punishment. Douglass’s first year with Freeland passes smoothly. Douglass remembers Freeland as the best master he ever had. Douglass also attributes the comfort of the year to his solidarity with the other slaves. Douglass recalls that he loved them and that they operated together as a single community. Though Douglass remains with Freeland for another year in 1835, by this time he desires his freedom more strongly than ever. Here Douglass puns on the comfort of living with “Freeland” as his master and his stronger desire to live on “free land.” Douglass, resolving to attempt an escape sometime during the year, sets about offering his fellow slaves the chance to join him. Douglass recalls how daunting the odds were for them. He describes their position as facing the bloody figure of slavery and glimpsing the doubtful, beckoning figure of freedom in the distance, with the intervening path full of hardship and death. Douglass points out that their decision was far more difficult than that of Patrick Henry, whose choice between death and an oppressed life—“Give me liberty or give me death”—was merely rhetorical. As slaves, Douglass and his companions had to choose doubtful liberty over nearly certain death. The title Narrative of the Life of Frederick Douglass is suggested by the CCSS Initiative as an Exemplar Text for middle school. 9 out of 16 people found this helpful No doubt, I thought it was gonna be super boring and I was gonna hate it, but to the contrary, I actually REALLY liked it. It's something I can read, and it doesn't take too long to read either. If you actually like history, and like to read about the stuff you won't find in a textbook, then this narrative is worthwhile. 7 out of 10 people found this helpful I LOVE reading books but I am particular. When it comes to pleasure reading I prefer nonfiction. I am weary of fictionalized history. This was refreshing. Since this was over 100 years ago, I don’t entirely relate to it but I can say that human nature hasn’t changed. Slavery is not an American phenomena. It has always existed. A good world history course will demonstrate that. Wanting to enslave someone is a mindset that needs to be changed. Too many by people only associate it with race and that is not accurate. 1 out of 1 people found this helpful
<urn:uuid:7affa1ac-bf69-49e6-b5e9-4ffeb452744f>
CC-MAIN-2016-26
http://www.sparknotes.com/lit/narrative/section7.rhtml
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399117.38/warc/CC-MAIN-20160624154959-00128-ip-10-164-35-72.ec2.internal.warc.gz
en
0.973554
959
3.8125
4
versión On-line ISSN 0378-4738 The first hydroinformatic system in Thailand originated from the National Water Resource Strategy of 2007. In order to manage different hydrological data format in text file, html file, access file and spreadsheet file from different institutes, an interactive data assimilation system was introduced. Acquisitive data from 1 150 major hydrological stations were inspected, verified, reformatted and statistically analysed. This research performs processes of two successful versions of the Thailand Hydroinformatic System. Virtual mechanism can, however, increase public participation to attain and utilise both information and metadata under open source licence. At the time of publication, the effective utilisation of the international standard format (ISO19115) is implemented through the public domain system. This hydroinformatic system enlarges potentiality of national communities to truly realise the potential of their natural water resources and tangibly understand their water environment. This system is regarded as a nationally sustainable prototype system to improve water resource management capability. Palabras clave : hydroinformatic system; public domain model; virtual system.
<urn:uuid:4cf3fbfb-ec98-4524-8486-61bb0b677329>
CC-MAIN-2016-26
http://www.scielo.org.za/scielo.php?script=sci_abstract&pid=S1816-79502008000600009&lng=es&nrm=iso&tlng=en
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396945.81/warc/CC-MAIN-20160624154956-00071-ip-10-164-35-72.ec2.internal.warc.gz
en
0.867137
228
2.703125
3
In August 2007, the NSF announced that it had awarded WHOI and its partners at Oregon State University and Scripps Institution of Oceanography the contract to design and deploy the coastal and global observatories that are to be designed, built, and deployed under this initiative. Thus, WHOI took the lead on these OOI “Coastal and Global Scale Nodes” or CGSN component. The planned start for the effort is September 1, 2009. Coastal and Global Scale Nodes The CGSN component will consist of two coastal and four global “arrays” (Fig 1) – constellations of instruments measuring a variety of ocean properties – placed in specific locations in the ocean. The designs for the CGSN arrays matured in 2008 and were presented at a Final Design Review in November. Additional changes directed by the NSF lead to the present plan. All the CGSN sites use a combination of fixed sampling platforms (moorings), and mobile platforms (gliders and, when possible, AUVs) to carry the instruments and sample across space and time scales of interest. Observations will be made from the sea surface to the sea floor using vertical profilers – assemblies of sensors, or instruments that measure specific properties while moving up and down along a wire or winching themselves up and down. Key to this new observing initiative is an emphasis on fielding multidisciplinary sensors, making data available to all as quickly as possible – often in real time by various telemetry methods, increasing the power available to the sensors and the power for data communication, and involving the community as users of the sampling infrastructure and as providers of additional sensors and instruments. WHOI engineers are already working to develop new power systems for surface buoys that combine fuel cells, solar panels, and wind-driven generators. Closest to WHOI is the coastal array in the mid-Atlantic Bight known as the Pioneer Array (Fig. 2); this array will be operated for about 5 years and then, as guided by community input, be deployed at a new location. The Pioneer Array includes moorings, ocean gliders, and AUVs. Power generated by surface buoys in the Pioneer Array will be available to recharge the AUVs at docking stations on the sea floor; the AUVs will also be able to download their data at these docking stations for transmission to shore by telemetry systems on the surface buoys. The Endurance Array (Fig 3), in the Pacific Northwest, will have a line of three moorings off Newport, Oregon. The subsurface moorings will be attached to a seafloor cable providing power and data communication, a line of mooring off Grays Harbor, Washington, and ocean gliders. The four global arrays will each use four moorings to define a triangular array together with three ocean gliders to sample in and around the array (Fig. 4). They will be located in the Gulf of Alaska (50°N, 145°W), in the Irminger Sea (60°N, 39°W), off the southwestern tip of Chile (55°S, 90°W), and in the Argentine Basin (42°S, 42°W). Initial work on arrays has already begun under pilot funding. Full funding is anticipated in late 2009. The first part of the effort will focus on design and construction. Deployments of the arrays would begin in 2013 and continue through 2015. NSF plans for 25 to 30 years of operation for each of the sites, with periodic competition forthe contract to carry out the operation and maintenance. WHOI’s initial contract will cover the design and build period as well as the first two years of operations and maintenance. Other OOI Components In addition to the CGSN component, there will be a seafloor cabled observatory off Washington under a Regional Scale Node (RSN) led by the University of Washington, and a Cyberinfrastructure or CI component led by the University of California at San Diego. The Consortium for Ocean Leadership in Washington DC directs the program under contract to the NSF. —Robert Weller, OOI Principal Investigator
<urn:uuid:b3423ddd-0855-4a47-a73e-6256b826b2a8>
CC-MAIN-2016-26
http://www.whoi.edu/page.do?pid=33051
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396872.10/warc/CC-MAIN-20160624154956-00095-ip-10-164-35-72.ec2.internal.warc.gz
en
0.938284
859
2.796875
3
Sava was the son of Stephen I, founder of the Nemanydes dynasty, and also known as Sabas. He became a monk on Mount Athos in Greece when he was seventeen. With his father, who abdicated in 1196, he founded Khilandrai Monastery on Mount Athos for Serbian monks and became Abbot. He returned home in 1207 when his brothers, Stephen II and Vulkan, began to quarrel, and civil war broke out. Sava brought many of his monks with him, and from the headquarters he established at Studenitsa Monastery, he founded several monasteries and began the reformation and education of the country, where religion and education had fallen to a low estate. He was named metropolitan of a new Serbian hierarchy by Emperor Theodore II Laskaris at Nicaea; was consecrated, though for political reasons unwillingly, by Patriarch Manuel I in 1219; returned home bringing more monks from Mount Athos; and in 1222 crowned his brother Stephen II King of Serbia. Through his efforts, he finished the uniting of his people that had been begun by his father, translated religious works into Serbian, and gave his people a native clergy and hierarchy. He made a pilgrimage to the Holy Land, was later sent on a second visit there on an ecclesiastical mission, and died on the way back at Tirnovo, Bulgaria, on January 14. He is the patron of Serbia. His feast day is January 14th. John the Baptist was a contemporary of Christ who was known for evangelization and his baptizing of Jesus Christ. John the Baptist was born through the intercession of God to Zachariah and ... continue readingMore Saint of the Day St. Frances Xavier Cabrini, Virgin (Feast day November 13) St. Frances was born in Lombardi, Italy in 1850, one of thirteen children. At eighteen, she desired to become a Nun, but poor health stood in her way. She helped her parents until their death, and then worked ... continue readingMore Female Saints Saint Michael the Archangel isn't a saint, but rather he is an angel, and the leader of all angels and of the army of God. This is what the title "Archangel" means, that he is above all the others in rank. St. Michael has four main responsibilities or offices, as we ... continue reading Alvarez was born in either Lisbon, Portugal, or Cordova, Spain. He entered the Dominican convent at Cordova in 1368. He became known for his preaching prowess in Spain and Italy, was confessor and adviser of Queen Catherine, John of Gaunt's daughter, and tutor of King ... continue reading Paul was the son of a Japanese military leader. He was born at Tounucumada, Japan, was educated at the Jesuit college of Anziquiama, joined the Jesuits in 1580, and became known for his eloquent preaching. He was crucified on Februay 5 with twenty-five other Catholics ... continue reading By Marshall Connolly (CALIFORNIA NETWORK) On September 4, 2016, Pope Francis will canonize Mother Teresa as a saint of the Roman Catholic Church. Her canonization is an important event for Catholics and all people around the world. Here's 3 reasons why. LOS ANGELES, CA (Catholic Online) - When Mother Teresa is ... continue readingMore Christian Saints & Heroes
<urn:uuid:9f0ae06c-3728-42ec-8684-54b8b7ee9ad8>
CC-MAIN-2016-26
http://www.catholic.org/saints/saint.php?saint_id=755&wf=rsscol
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783391634.7/warc/CC-MAIN-20160624154951-00068-ip-10-164-35-72.ec2.internal.warc.gz
en
0.988428
702
2.515625
3
Opportunities For Participation in the United States Antarctic Program Each year the United States deploys to Antarctica about 700 people to perform scientific research and about 2,500 people to operate and maintain year-round research stations and provide logistics in support of this research. These persons include research teams from academia, industry, and government, military personnel, and contractor employees. The National Science Foundation is the federal agency responsible for funding and managing U.S. activities in Antarctica, but the Foundation does not directly hire individuals for this work. Most are selected by participating organizations and institutions as described below. Successful applicants will have been prepared through specialized study, training, or experience in polar-related topics. Opportunities fall into these categories: Scientific opportunities in Antarctica center on terrestrial and marine biology, medical research, meteorology, glaciology, the earth sciences, the ocean sciences, atmospheric physics, and astronomy. Eligibility generally is limited to U.S. scientists with advanced degrees, who initiate proposals that are submitted by their employing organizations. Graduate students are not encouraged to submit research proposals, but are welcome as members of research teams. The procedure for preparing and submitting proposals is described in the Foundation's Grant Proposal Guide (publication GPG 16-001) and Antarctic Research Solicitation (NSF 16-541). The scientist who submits a successful proposal typically is authorized to assemble a research team to help implement his or her project in the field. Preference is given to graduate and undergraduate students in the pertinent scientific discipline. Although assistants usually are chosen from within the scientist's organization, a well-qualified individual may be successful in joining the team. The Foundation encourages investigators to include qualified young people (high school graduates and beyond) in their field projects and offers several programs to fund such participation. The Foundation's web site lists recent awardees and provides descriptions of their research. Annual science project summaries are issued. These can be found on the U.S. Antarctic Program science summaries list web page at https://www.nsf.gov/geo/plr/antarct/treaty/usap_sumry_list.jsp. Inquiries should be directed to the awardee, not to the Foundation. Because of the far flung and difficult environment of Antarctica, the program has many people in support roles. These people operate stations, laboratories, machinery, helicopters, and research ships, build or renovate facilities, maintain vehicles, outfit field parties, and manage camps. Many trades and levels of skill are involved. Contractors to the Foundation hire individuals and award subcontracts for performance of these tasks. The prime support contractor is the Lockheed-Martin Antarctic Support Contract. Employment inquiries should be directed to Lockheed-Martin Antarctic Support Contract. Direct inquiries to the contractors, not the Foundation. ACTIVE OR RESERVE DUTY MILITARY The New York Air National Guard operates LC-130 (ski-equipped) airplanes in the Antarctic Program. The Coast Guard operates icebreakers in Antarctica to escort supply ships and to support science. Employment with these organizations generally is limited to active duty and reserve service personnel. Direct inquiries to an Air Force recruiter or the Coast Guard, Department of Transportation, Washington, D.C. 20590. PUBLIC INFORMATION REPRESENTATIVE Each year the Foundation endeavors to host in Antarctica members of the press and radio or television crews to observe and report on U.S. activities. Selection is based on ability to understand and present scientific subjects, written commitment from employing organization, and expected size of audience. NSF's Office of Legislative and Public Affairs administers this program, which has an annual application deadline several months before the austral summer season begins. For information about applications for participation during a field season, please contact the Media and Public Information Section (703-292-8070) or Peter West at firstname.lastname@example.org ARTIST OR WRITER To enable interpretation and presentation of the Nation's Antarctic heritage, the Foundation's Antarctic Artists & Writers Program considers requests from particularly well qualified writers, historians, artists, and other scholars in the liberal arts to work in Antarctica. This opportunity provides field support, but no direct award of funds. The successful candidate will be well-established and working full-time in the appropriate field and will have a means of presenting his or her work to the public. A program solicitation, revised annually in March, describes the opportunity, provides application instructions, and lists prior participants. The annual application deadline is the first Wednesday in June for the field season beginning about 15 months later. The past participants page provides information about earlier projects. Because some types of activities are not considered to contribute to the U.S. mission for Antarctica, NSF will not consider or approve applications for participation in the program in these categories: private expeditions by mountain climbers or adventurers, visits to promote commercial products, photography (except as in one of the above categories), "space-available" passage on support aircraft flights, and sightseeing or other superficial visits. The support organizations are also bound by this National policy. The Government does not provide support to private expeditions, but does not discourage citizens from participating in such expeditions if they are self-sufficient and meet environmental standards. The National Science Foundation and its contractors and grantees are equal opportunity employers. Women and members of minority groups are encouraged to apply for participation in all aspects of the U.S. Antarctic Program. A number of NSF programs specifically encourage such participation and can be found on the the Foundation's web site by searching the funding database at https://www.nsf.gov/funding/advanced_funding_search.jsp or on the Guide to Programs/Browse Funding Opportunities page. Last updated: 20 May 2013
<urn:uuid:e48c0e17-c39d-430d-b067-6e470902e339>
CC-MAIN-2016-26
https://www.nsf.gov/geo/plr/opportun.jsp
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396106.71/warc/CC-MAIN-20160624154956-00042-ip-10-164-35-72.ec2.internal.warc.gz
en
0.923961
1,179
2.671875
3