text
stringlengths 199
648k
| id
stringlengths 47
47
| dump
stringclasses 1
value | url
stringlengths 14
419
| file_path
stringlengths 139
140
| language
stringclasses 1
value | language_score
float64 0.65
1
| token_count
int64 50
235k
| score
float64 2.52
5.34
| int_score
int64 3
5
|
|---|---|---|---|---|---|---|---|---|---|
A recent public meeting about a proposed dairy expansion in Wisconsin included the usual queries about odor, water quality and manure management. However, it also featured a question that’s cropped up with increasing frequency: “How much water is the dairy going to use and will it affect my (neighboring) well?”
The issue of water usage has graduated from a regional issue in the arid west, where it remains a significant concern, to one that potentially affects dairies from coast to coast — especially as dairies increase in size. No longer do you need to solely focus on how much water you must have to ensure an adequate water supply for your herd; you must also contemplate how your water use affects your neighbors.
Here’s what you need to know about the latest trends and research regarding water use on dairies.
Reduce, re-use, recycle
Like most dairies, Sierra Vista Dairy in central California wrings as much as possible from every drop of its well water. In the midst of a severe water crisis, water use in California receives lots of attention these days as surface water is being shifted away from agriculture for urban needs.
“Water (on this dairy) is used two, three or more times before it’s used to irrigate crops,” says Wes Nelson, dairy manager. For example, as on many operations, water from the plate cooler is used to flush the parlor and then to flush the free-stalls.
Dairies have honed their water efficiency and recycling skills for years. As a result, modern dairy farms use only 35 percent of the water required to produce the same amount of milk that they did in 1944, according to Cornell University research published in the JuneJournal of Animal Science.
The efficiency of water use on dairies is amazing, says Todd Bilby, Texas AgriLife extension dairy specialist. “Consumers need to keep in mind that most of the water that actually leaves a dairy (and not recycled) leaves in the form of an edible product — milk.”
Not diverting water
Still, perceptions persist that dairies must be using lots of water, possibly diverting it from other uses.
For example, to find out if West Texas dairies drew more than their share of water from the environmentally sensitive Ogallala Aquifer, Texas and New Mexico dairy extension specialists recently calculated daily water needs for cows, dry-cows, heifers and facility cleanup.
They estimated that a typical 2,000-cow dairy in the area sits on 160 acres, milks three times daily, does not have wash pens, and uses minimal water for cow-prep procedures. The researchers concluded that under these assumptions, the dairy would use about 123 acre-feet of water annually or 9.25 acre-inches per acre per year. (An acre-foot is about 326,000 gallons, or about enough water to cover a football field approximately 1-foot deep.)
Meanwhile, cotton crops drink 12 inches of water per acre per year; wheat production requires 15 inches per acre per year, and corn needs 22 inches per acre per year.
The dairy, in this case, uses less water — on an inches-per-acre-per-year basis — than the crops do, but it really not a matter of saying one is right and the others are wrong.
“We’re all in agriculture together,” says Bilby. “We don’t need to be fighting amongst ourselves, but need to work together. Dairies provide a niche market for crop producers and dairies need the feed produced by crop farmers.”
More research under way
If there is a silver lining, it’s the fact we are paying closer attention to how much water cows actually need.
Using water meters, a two-year study on a northwest Ohio dairy found that the average cow used 29.9 gallons of water per day. If you add in water included in the ration, consumption reached as high as 39.8 gallons per day.
The cows on the farm studied averaged 80 pounds of milk daily, meaning it took about 4.5 gallons of water for each gallon of milk produced — at the use rate of 29.9 gallons of water per day.
Meanwhile, USDA’s Agricultural Research Service is beginning a new study on dairy groundwater use in Idaho. At issue are differing estimates of dairy cow water needs used to develop a mitigation plan for several Magic Valley wells and their impact on aquaculture in the area.
At press time, negotiations were under way regarding the possible shut-off of wells used by dairies and businesses in Idaho’s Magic Valley.
Currently, six dairies have signed onto the project, which is expected to be completed by the end of next year. Researchers would like to add another six operations.
“We’re just getting started,” says Dave Bjorneberg, Northwest Irrigation and Soils Research Laboratory director. “But our aim is to measure the amount of groundwater pumped, as well as measure the amount for wastewater produced, to give the net consumptive water use on a per-cow basis for each farm.”
If you’re using water to irrigate crops and the wells are shut off, you lose that crop year, which is bad enough,” Bjorneberg explains. “But you can’t go without water on a dairy. Hopefully this research will help dairymen, farmers and others to have a plan for how to deal with water rights in the future.”
At the end of the day, knowing how much water you use comes in handy for a variety of reasons, no matter where you live. For more resources on calculating water needs and water-use tabulations, go to: www.dairyherd.com/management
California groundwater concerns
A new report by the U.S. Geological Survey shows that the current drought, combined with groundwater pumping, is causing problems for the San Joaquin Valley aquifer, especially in the southern part of the valley. This situation could make water use even dicier in the future.
To read the full USGS report, go to: www.dairyherd.com/environment
Keep tabs on groundwater draws
Even in areas where water is abundant, farmers are increasingly asked to keep tabs on groundwater draws.
For example, in Pennsylvania, if you draw more than 10,000 gallons of water a day, you must report this use to state authorities. This purely a reporting requirement, with no regulations attached.
In Michigan, the mandatory reporting requirement jumps to operations that use 100,000 gallons of water a day. “That equates to dairies with about 300 cows or more,” explains Scott Piggott, manager of Michigan Farm Bureau’s ecology department. In addition to reporting requirements, Michigan has implemented a Web-based water withdrawal assessment tool to help new water users with greater than 100,000 withdrawal capacities determine if their use will adversely impact natural resources.
The tool and related process is based on 28 years of data on fish habitat and is designed to protect streams from large water withdrawals.
“We have a lot of water in Michigan,” he adds. “Of course, there are pockets where groundwater is hard to come by, but we expect Michigan agribusiness to be able to use our abundant water to continue to grow. We expect 90 percent or more of new uses in all sectors to move forward without permitting.”
|
<urn:uuid:22811fcd-6cd4-4d38-873d-9d5ca7a3d872>
|
CC-MAIN-2016-26
|
http://www.dairyherd.com/dairy-herd/features/dairies-can-defend-their-water-use-114029864.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783391519.2/warc/CC-MAIN-20160624154951-00065-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.955176
| 1,571
| 3.140625
| 3
|
University of Washington campus planner Jeffrey Lin created a map of what Seattle will look like under 240 feet of water. Check out this story from the Seattle Weekly.
How Would Seattle Look If All The Ice Caps Melted? UW’s ‘Seattle Islands’ Map Shows You
By Kelton Sears
Denny Way turns into Denny Reef. The U District morphs into University Shoal. The Space Needle becomes the Sea Needle.
Jeffrey Lin, a campus planner at University of Washington with a background in geography, wondered what Seattle would look like if all the Earth’s ice sheets melted in a catastrophic global warming event. So he did some calculations and drew up a map of the city under 240 feet of water.
Turns out, the Emerald City becomes the Emerald Isles, straight out of 1995’s Waterworld.
Capitol Hill turns into Capitol Island, where the stranded denizens would have nowhere to bike after brunch but straight into the Sound. All of the city’s frat houses would be isolated on “Greek Island,” a place that would likely put Ibiza to shame. Mercer Island is… well it’s still an island.
Explore our post-apocalyptic city below, and click on the picture for a larger, hi-res version you can zoom in on. Did your house make it through the melt?
|
<urn:uuid:655238b4-ba05-403d-96e4-a495f15ecebe>
|
CC-MAIN-2016-26
|
http://www.udistrictdaily.com/2014/01/17/sink-or-swim-what-will-seattle-look-like-if-the-ice-caps-melt/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398873.39/warc/CC-MAIN-20160624154958-00180-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.889433
| 285
| 2.625
| 3
|
Photo: Cornu (Wikimedia Commons)
In the domain of infectious disease, pathogens come in five basic varieties. Four of these—viruses, bacteria, funguses and parasites — are quite familiar. They are responsible for things like influenza, strep throat, thrush and malaria respectively.
Members of the fifth group, however, are not so well known. They are the prions, and, according to the Center for Disease Control and Prevention (CDC), the maladies they cause “are usually rapidly progressive and always fatal.”
Mad Cow and More
Believe it or not, prion diseases have an even more abstruse label, Transmissible Spongiform Encephalopathies (TSEs).
Basically this means that not only are these illnesses contagious, they also drill microscopic holes into their victims’ brain tissue. (Just thinking about it kind of makes me want to curl up into a ball and die preemptively.)
Examples of TSEs include the more famous Chronic Wasting, Mad Cow and Creutzfeldt-Jakob diseases, as well as the lesser known Gerstmann–Sträussler–Scheinker syndrome and Kuru disease of Papua New Guinea.
Each is a modification to the same general theme. Subtle personality shifts give way to more severe psychological changes, slurred speech and declines in coordination. Eventually, patients’ become so brain-damaged, they cannot move on their own, understand what others are saying, or even swallow. Death ensues.
One extremely rare variant, Fatal Insomnia, starves its host of sleep for months on top of everything else.
Prions are unlike other sorts of disease agents in that they don’t technically reproduce themselves.
Instead, they are misshapen (or ‘crinkled’) proteins that, through a bizarre act of molecular peer pressure, ‘convince’ other normal proteins to assume the same deformity. New converts, in turn, will induce changes in more normal proteins.
The spread is exponential and, as we just learned, catastrophic.
And if all this weren’t scary enough, since these proteins aren’t really alive, they’re extremely difficult to get rid of. Whereas cooking and radiation might destroy the bacteria in the beef you’re preparing for dinner tonight, the prions will emerge unscathed.
Thankfully, these molecular mutations are very unlikely. You’re probably okay.
|
<urn:uuid:b9efd8c1-a2fd-468d-844d-b35d2e702f6a>
|
CC-MAIN-2016-26
|
http://indianapublicmedia.org/amomentofscience/good-proteins-bad/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395346.6/warc/CC-MAIN-20160624154955-00143-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.934259
| 510
| 3.40625
| 3
|
Polska / mazowieckie
|Synagogues, prayer houses and others||Cemeteries||Sites of martyrdom||Judaica in museums||Andere|
|Province:||mazowieckie / warszawskie (before 1939)|
|County:||sochaczewski / sochaczewski (before 1939)|
|Community:||Sochaczew / Sochaczew (before 1939)|
|Other names:||סאכאטשעוו [j. jidysz]; סוכצ'ב [j. hebrajski]; Сохачев [j. rosyjski]|
Sochaczew – a city with county rights in central Poland, in the Mazowieckie Province. It lies 55 km west of Warsaw, by the Bzura River.
Tomasz Kawski /
Jewish presence in Sochaczew dates back to the 15th century. In the years 1426-1455, the duke of Mazowsze Władysław issued to the Jews of the Sochaczew region a privilege which regulated the legal way of dealing with Christian land owners who were in debt to Jews. It is possible that Jews lived exclusively in the town at that time. They appear in the sources as early as 1463, when a Jewish doctor named Feliks is reported to live and work there. In 1507, the Jews of Sochaczew paid 6 zlotys of coronation tax. The information on Mojżesz and Michał, who were tax collectors in Sochaczew and Kłodawa, dates back to the beginning of the 16th century.
In the second half of the 16th century, anti-Jewish riot became more frequent in Mazowsze. With the Reformation and the Counter-Reformation in the background, many accusations against Jews were spread. One of charges considered desecration of the Host and pressing blood out of it. A case of this kind ended up in Płock. In April 1556, a group of townsmen from Sochaczew accused the local Jews that they had bought a consecrated host from Dorota Łazęcka and pressed blood from it. The district governor of Sochaczew, Stanisław Borek from Trzecieniec, punished Dorota Łazęcka and the rabbi of Sochaczew Beniasz with death penalty, wich was carried out on 23 April 1556. The remaining three accused Jews were taken to the provincial governor of Rawa Andrzej Sierpski and after being subjected to torture, they confessed. On 1 June 1556, they were hanged on the hooks at the three gates to Płock. The Jews of Płock feared similar incidents and asked King Zygmunt August to issue a safe conduct for them and help establishing the truth. The king gave his protection to all Jews in Rzeczpospolita, especially those in Płock, until the case was resolved. The safe conduct gave them right to trade and prove their innocence. After half a year (on 14 January 1557), Zygmunt August ordered to take the victims of the hooks and allowed the families to bury them.
In 1564 and 1570, the Jews owned 7 houses, including a synagogue. The poll tax was paid by 24 Jews in 1578. The local municipality was growing fast. In 1599, already 20 houses belonged to Jews. Addiionaly, sixteen tax collectors lived there. In 1602, the Jews had also a hospital, a house of prayer, and the number of tax collectors dropped to 4.
The castellan’s town was first mentioned in 1138. Bolesław Krzywousty, the King of Poland, died here. Sochaczew was a very important fortified town of Masovia at that time.
In 1286 it was besieged during the Lithuanian invasion. In 1294 the Duke Kazimierz II died in the battle against the Lithuanians here. From the 14th to 15th century the town seated the Dukes of Masovia. In 1368 Sochaczew obtained its town charter.
In 1410 the Polish Army heading for the Battle of Grunwald against Teutonic Knights crossed Sochaczew. In 1476 Sochaczew along with Masovia joined The Crown. In the 15th and 16th centuries the town was a very important centre of commerce and craft.
In the mid-16th century Sochaczew was destroyed by the Swede and Rakoczy’s Army.
Since 1795 Sochaczew was under Prussian rule, since 1807 it transferred to the Duchy of Warsaw and since 1815, it belonged to the Kingdom of Poland (Congress Poland). During World War I , from December 1914 to July 1915 a German-Russian front line crossed Sochaczew. The town was deserted by its inhabitants and seriously damaged at that time.
During World War II, in September 1939, there was a lot of heavy fighting between the Polish and German Armies near Sochaczew. It was the final stage of the battle of Bzura.
Polish guerrilla groups were active near Sochaczew at that time. In January 1945 Sochaczew was liberated by the Soviet Army.
|
<urn:uuid:daec453c-42cc-4bba-b25f-e89eabe6bf7d>
|
CC-MAIN-2016-26
|
http://www.sztetl.org.pl/en/city/sochaczew/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395620.9/warc/CC-MAIN-20160624154955-00087-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.965385
| 1,176
| 2.734375
| 3
|
KwaZulu-Natal – SA’s top water research body has warned the government to think carefully about the serious risk of water pollution from cancer-causing chemicals and radioactive compounds from future underground “fracking” operations across huge swathes of the country.
A new report by the state-funded Water Research Commission says shale gas rock-fracturing (fracking) will not only happen in remote sections of the Karoo. In fact, the government had already issued fracking exploration permits in six of the nine provinces, including a massive chunk of southern KwaZulu-Natal stretching almost as far north as Pietermaritzburg.
The scientists note that future fracking, at depths 4km below the earth’s surface, could be over a much wider area of the country – including most of the high-lying areas south of latitude 29°C in KZN (a line which starts at Mtunzini in the east and stretches inland past Estcourt towards Bloemfontein and Kimberley).
The report also identifies a number of risks to human health, water and the natural environment from fracking wells. These risks included:
– Widespread pollution of groundwater, rivers and lakes with dozens of cancer-causing fracking compounds and other “highly toxic” pollutants such as benzene, hydrochloric acid and isopropanol.
– Accidental release of underground uranium and other radioactive elements into the water and soil.
– Underground mini-earthquakes, cave-ins and land subsidence.
– Privatisation of parks and other state land where the public is excluded from fracking land and gas fields for safety reasons.
– Above-ground air pollution from methane and other shale gas wells.
– Lower property values.
However, water pollution is the main emphasis of the 84-page Water Research Commission report by Gideon Steyl (University of the Free State chemistry department), Gerrit van Tonder (University of the Free State Institute for Groundwater Studies) and Luc Chevallier (Council for Geoscience).
The scientists note that gas-drilling companies in the US have been trying to hide the toxic nature of many fracking chemicals.
However, the commission cites a report from the US House of Representatives last year which identified at least 29 commonly used fracking chemicals that were known or probable cancer-causing agents, or were regulated as hazardous to drinking water and air.
These chemicals are mixed with water and pumped underground at very high pressure to fracture and crack the rock formations to release buried pockets of methane and other gas formed millions of years ago from rotting mounds of mud, vegetation, algae and other organic matter.
Some chemicals included benzene (a known cancer-causing chemical) along with a variety of acids and petroleum products.
A study by the University of Buffalo in the US last year also raised concern about the possible release of underground uranium and other radioactive compounds when rocks are cracked up with hydrochloric acid.
Another US study published last year showed that the methane gas level in underground drinking water was generally 17 times higher in fracking areas compared with well water where no fracking took place.
However, Steyl and his colleagues voiced dismay over the difficulty in tracking down truly unbiased international studies on the impacts of fracking, since most were done by industry and private interests.
Even official US government reports claiming no damage to public health or the environment stood in contradiction to numerous adverse reports by US citizens and the US Environmental Protection Agency.
The commission researchers note that a single fracking event in a single well used the same amount of water needed to irrigate eight to 10ha of maize during a growing season.
Every time a well was fracked, large volumes of chemicals were added to the water-pressure mixture. Although chemicals only made up between 0.5 and 2 percent of the mixture, the volume of hazardous chemicals in a single fracking event could total between 34 000 and 136 000 litres.
Even if just 1 percent of dangerous fracking chemicals leaked out of the concrete well drillings during a single fracking, Steyl estimated that 490 litres of hazardous chemicals could contaminate underground water. This could pose “serious hazards” to the environment and to underground water drunk by people and livestock.
Despite these concerns, the scientists appear to recognise that fracking is a fait accompli and they have listed a set of 10 recommendations to limit harm. They include compulsory “full disclosure” of every chemical used. Any fracking well should be at least 10km away from residential areas to reduce chemical exposure risks.
All drilling records should be freely available to the public, and a thorough baseline study should be done to measure pre-fracking quality of water, soil and air by an “unbiased” body such as a university.
Legal action should also be taken against any drilling company after a first offence. They should be forced to clean up damage, and be banned from future fracking in SA. However, even in the US, there were fewer than 10 inspectors to monitor more than 3 500 fracking wells in Pennsylvania. – The Mercury
|
<urn:uuid:4400424c-4db9-4833-9b2e-a3bc87d92efc>
|
CC-MAIN-2016-26
|
http://mycradock.co.za/09/fracking-cancer-risk/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783391519.2/warc/CC-MAIN-20160624154951-00175-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.948407
| 1,041
| 2.859375
| 3
|
Help scientists untangle the complex relationships between caterpillars, the plants they eat, the parasitoids that eat them, and the changes in climate that will reshape the rain forest.
On this Earthwatch Expedition, you’ll search the forests of Costa Rica for caterpillars and take specimens to the lab for state-of-the-art chemical analysis and observation. Prepare to be dazzled by the array of shapes and colors that caterpillars come in, most of which serve as natural defenses against their predators. You may even find a new species—it’s happened before.
Project scientists have data on over 9,500 species of both caterpillars and the wasps and flies, called parasitoids, that kill the caterpillars by laying eggs in them (this gives their offspring a safe, food-rich place to grow). Caterpillars and parasitoids live in a delicate balance, one that climate change could destroy. For one thing, this research has shown that warmer temperatures speed up caterpillar growth. This means that parasitoids can’t use them as hosts because their life cycles are out of synch, and the parasitoids die off. With fewer parasitoids to keep them in check, caterpillars breed like crazy and decimate their food plants.
Loss of biodiversity—the variety of living things on Earth—is the ultimate price of such imbalances. On this expedition, you will help preserve the complex, wondrous variety of plant and animal life while working with some surprisingly fascinating creatures.
|
<urn:uuid:31f09c5e-47cc-4cfb-b70c-91920ea66069>
|
CC-MAIN-2016-26
|
http://eu.earthwatch.org/expeditions/climate-change-and-caterpillars-in-costa-rica
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393533.44/warc/CC-MAIN-20160624154953-00182-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.935462
| 321
| 3.859375
| 4
|
The World Bank’s First Foray Into Serious Gaming
The gaming industry has been growing faster than the movie industry in the past number of years and is occupying an increasing number of hours of time in a young person’s day. Many have argued that educational games have the potential to reach students outside of the classroom where some traditional educational methodologies are failing. Indeed, this genre of “serious games” has mushroomed over the past number of years. In order to better understand the impact and potential of such games, earlier this year, the World Bank decided to develop and evaluate an educational game focused on youth social innovation and development – Evoke: a crash course in changing the world.
Evoke emerged from discussions with universities in Africa who increasingly wanted to find avenues to encourage their students to works with local communities and develop innovative solutions to local development challenges. The universities were searching for ways to engage students in real world problems and to develop capacities for creativity, innovation, and entrepreneurial action that many believe will be the engine for job creation now and in the future.
Working with leading designers, Evoke was created to empower young people all over the world, and especially in Africa, to start solving urgent social problems like hunger, poverty, disease, conflict, climate change, sustainable energy, health care, education, and human rights; to collaborate with others globally; and to develop real world ideas to address these challenges.
Players were challenged to complete a series of ten missions and ten quests — one per week, over the course of the ten-week game. The “text book” for this course was an online graphic novel written by Emmy-award nominated producer Kiyash Monsef with the art done by Jacob Glaser.
Set in the year 2020, the story follows the efforts of a mysterious network of Africa’s best problem-solvers. Each week, as players unravel the mystery of the Evoke network, they will form their own innovation networks: brainstorming creative solutions to real-world development challenges, learning more about what it takes to be a successful social innovator, and finding ways to make a difference in the world.
By the time the EVOKE adventure ended, 19,324 people from over 150 countries registered to play, far exceeding expectations. Players submitted over 23,500 blog posts (about 335 each day), 4,700 photos and over 1,500 videos. The site received over 178,000 unique visitors and 2,345,000 page views with time per visit averaging over eight minutes. For the month of March, EVOKE generated just under 10% of what the World Bank’s entire external website generated with regard to page views (1.1 million versus 12.1 million). In fact, visitors to EVOKE demonstrated substantially higher levels of engagement than those visiting WorldBank.org, Kiva.org, or Unesco.org. Phenomenal numbers.
Over the course of the 10 weeks, players posted ideas, found friends, commented on projects, shared information, rated the quality of the information shared, discussed, argued, created and acted.
Librarians donated time to do research. Someone developed a wiki for the game. Teachers created their own online community within the game. Some players developed an online conference for sharing the best ideas. One player wrote a song about EVOKE. Others planted gardens.
“I got to see things I would not have unless I went out actively searching for them. A lot of knowledge has been imprinted in my mind from some of the activities. Now I can delve deeper into certain topics, talk about them and do something about them, which I couldn’t have before.” — EVOKE player
Based on the evaluation of the program, 60% of sub-Saharan Africans report that the game had a strong effect on “thinking big thoughts about the future” and 60% reported that the game influenced them to “start something new”.
At the end of the game, 74 project ideas (known as ‘evokations’) were submitted and the top 25 projects qualified for a month long on-line challenge with Global Giving resulting in US$30,000 in additional funds raised.
As an innovation and skills development tool, EVOKE has demonstrated enormous potential to create ideas; provide the social capital to move those ideas form concepts to reality; provide skills to execute those ideas; and link innovators to essential partnerships needed to grow those ideas.
As a first foray into serious gaming, we were thrilled with the response, and we look forward to new ways to engage learners to improve their communities around the world.
|
<urn:uuid:6c0fbdf4-83d2-4a84-b283-52ef783648bf>
|
CC-MAIN-2016-26
|
http://edutechdebate.org/games-and-education/world-bank-first-foray-serious-gaming/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783400572.45/warc/CC-MAIN-20160624155000-00156-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.950537
| 957
| 2.921875
| 3
|
Adenostoma fasciculatum Hook. & Arn.
Chamise, Common chamise, Greasewood
Rosaceae (Rose Family)
USDA Symbol: ADFA
An erect evergreen shrub with alternating clusters of tiny needlelike leaves and large basal burl. 6-10 ft., wide-spreading shrub, with small, linear leaves and reddish bark becoming shreddy with age. Tiny, tubular, white flowers are grouped in showy, terminal clusters.
This is the dominant chaparral plant throughout most of California, often forming pure, impenetrable stands. Also known as Greasewood, the shrub contains highly flammable resins, which cause it to burn rapidly when ignited. Following a fire, Chamise sprouts rapidly from its basal burl (root crown) and soon outgrows most competitors. Chamise further reduces competition by releasing toxins into the soil that inhibit or prevent the growth of most other plants. Chamise becomes dormant during the hottest, driest period of summer, and sheds both branches and bark in an effort to reduce the amount of tissue requiring moisture. These sloughed materials then serve as fuel for the next fire.
From the Image Gallery
No images of this plant
Plant CharacteristicsDuration: Perennial
Leaf Retention: Evergreen
Leaf Arrangement: Alternate , Fascicled
Leaf Complexity: Simple
Leaf Shape: Linear
Leaf Pubescence: Glabrous
Leaf Apex: Acute
Breeding System: Flowers Bisexual
Size Notes: Height 2-10 feet, spread to 5 feet.
Leaf: Dark olive-green
Size Class: 6-12 ft.
Bloom InformationBloom Color: White , Yellow
Bloom Time: Feb , Mar , Apr , May , Jun , Jul
Bloom Notes: White with pale yellow stamens.
DistributionUSA: CA , NV
Native Distribution: Coast Ranges in CA from Mendocino Co. s.; also foothills of Sierra Nevada
Native Habitat: Dry slopes & ridges; chaparral & mesas below 5,000 ft.
Growing ConditionsWater Use: Medium
Light Requirement: Sun
Soil Moisture: Dry
CaCO3 Tolerance: Low
Heat Tolerant: yes
Soil Description: Well-drained sand, clay or gravel.
Conditions Comments: Used as a screen or windbreak and as erosion control. This shrub can constitute an extreme fire hazard. Fire resistance is enhanced with a once/month, indirect watering.
BenefitUse Ornamental: Can be hedged.
Use Wildlife: Its principal value to wildlife lies in providing cover, for the tough, resinous foliage is unpalatable.
Interesting Foliage: yes
Fragrant Foliage: yes
Value to Beneficial InsectsSpecial Value to Native Bees
This information was provided by the Pollinator Program at The Xerces Society for Invertebrate Conservation.
PropagationPropagation Material: Seeds , Softwood Cuttings
Description: Can be propagated by seed.
Seed Treatment: Hard seed coats require scarification. Soak in H2SO4 for 15 minutes or sow seeds in soil in flats and burn pine needles on the soil surface.
Commercially Avail: yes
Find Seed or Plants
Find seed sources for this species at the Native Seed Network.
From the National Organizations DirectoryAccording to the species list provided by Affiliate Organizations, this plant is on display at the following locations:
Santa Barbara Botanic Garden - Santa Barbara, CA
Native Seed Network - Corvallis, OR
BibliographyBibref 995 - Native Landscaping from El Paso to L.A. (2000) Wasowski, S. and A. Wasowski
Bibref 698 - Native Plants for Use in the California Landscape (1978) Labadie, E. L.
Search More Titles in Bibliography
Additional resourcesUSDA: Find Adenostoma fasciculatum in USDA Plants
FNA: Find Adenostoma fasciculatum in the Flora of North America (if available)
Google: Search Google for Adenostoma fasciculatum
MetadataRecord Modified: 2009-02-20
Research By: TWC Staff
|
<urn:uuid:0d2f00ad-9176-4b25-8517-c176c66d4fca>
|
CC-MAIN-2016-26
|
http://www.wildflower.org/plants/result.php?id_plant=ADFA
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783400031.51/warc/CC-MAIN-20160624155000-00101-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.811602
| 909
| 2.59375
| 3
|
Egypt has unearthed further evidence that a secret chamber, believed by some to be the lost burial site of Queen Nefertiti, may lie behind King Tutankhamun’s tomb, Egypt’s antiquities minister said on Thursday.
There is huge international interest in Nefertiti, who died in the 14th century BC and is thought to be Tutankhamun’s stepmother, and confirmation of her final resting place would be the most remarkable Egyptian archaeological find this century.
An analysis of radar scans done on the site last November has revealed the presence of two empty spaces behind two walls in King Tut’s chamber, Damaty told a news conference.
“(The scans point to) different things behind the walls, different material that could be metal, could be organic,” he said.
Damaty said in November there was a 90 percent chance that “something” was behind the walls of King Tut’s chamber following an initial radar scan that had been sent to Japan for analysis.
A more advanced scan will be conducted at the end of this month with an international research team to confirm whether the empty spaces are in fact chambers. Only then, Damaty said, can he discuss the possibility of how and when a team could enter the rooms.
“We can say more than 90 percent that the chambers are there. But I never start the next step until I’m 100 percent.”
The find could be a boon for Egypt’s ailing tourism industry, which has suffered endless setbacks since an uprising that toppled autocrat Hosni Mubarak in 2011 but remains a vital source of foreign currency.
British Egyptologist Nicholas Reeves, who is leading the investigation, believes that Tutankhamun’s mausoleum was originally occupied by Nefertiti and that she lies undisturbed behind what he believes is a partition wall.
The discovery of Nefertiti, whose chiseled cheek-bones and regal beauty were immortalized in a 3,300-year old bust now on display in a Berlin museum, would shed fresh light on what remains a mysterious period of Egyptian history.
“It can be the discovery of the century. It’s very important for Egyptian history and the history of the world,” said Damaty.
|
<urn:uuid:8bcf579f-fd7b-49db-961f-e5790b248485>
|
CC-MAIN-2016-26
|
http://tribune.com.pk/story/1067603/egypt-finds-new-clues-that-queen-nefertiti-may-lie-buried-behind-tuts-tomb/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395346.72/warc/CC-MAIN-20160624154955-00068-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.946701
| 486
| 2.953125
| 3
|
In Greek mythology, merely glancing at the ugly head of Medusa could turn the looker into stone. For wood, the process is not so fast.
Petrified wood forms when fallen trees get washed down a river and buried under layers of mud, ash from volcanoes and other materials. Sealed beneath this muck deprives the rotting wood from oxygen — the necessary ingredient for decay. As the wood's organic tissues slowly break down, the resulting voids in the tree are filled with minerals such as silica — the stuff of rocks.
Over millions of years, these minerals crystallize within the wood's cellular structure forming the stone-like material known as petrified wood. The wood, no longer wood at this point, takes on the hues of the minerals that fill its pores. Minerals such as copper, cobalt, and chromium give off a green-blue color, while manganese presents a pink hue.
|
<urn:uuid:4c89b705-4121-4b46-b53c-835b579eb299>
|
CC-MAIN-2016-26
|
http://www.livescience.com/32316-how-long-does-it-take-to-make-petrified-wood.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396029.85/warc/CC-MAIN-20160624154956-00176-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.924199
| 192
| 3.703125
| 4
|
Editor's Note: In this weekly series, SPACE.com explores how technology drives space exploration and discovery.
The vast amount of manmade debris in orbit around Earth is untenable, but emerging and currently available technologies could be used to get these objects under control.
Humanity is generating space junk more quickly than the debris can fall back toward Earth naturally, putting satellites and spacecraft at risk of colliding with speeding pieces of debris. Unless something is done, the problem could get worse, said Donald Kessler, retired head of NASA's Orbital Debris Program Office.
"In the long term, everything will eventually break up due to collisions," Kessler told SPACE.com. "Even if you don't add anything else to the environment, the collision frequency due to random collisions will create more debris than will re-enter naturally." [How Space Junk Threatens Future of Spaceflight (Infographic )]
At the moment, NASA officials estimate that about 500,000 pieces of debris larger than a marble orbit the planet. There are 22,000 bits of junk as big as a softball, and there could be more than 100 million tiny fragments at least 1 millimeter across racing around Earth.
But how can mission controllers on the ground remove those troublesome pieces of space junk — including defunct satellites, spent rocket stages and other pieces of manmade debris — from their dangerous orbits?
The "old-fashioned" method
Technology readily available today could mitigate the space junk threat, Kessler said. By taking only five satellites out of orbit each year for the next 100 years, while adhering to an international understanding called the 25-year rule, space agencies could stabilize the orbital environment, according to a NASA study. The 25-year rule stipulates that nations should not launch objects whose lifetime in space will exceed 25 years after the completion of their missions.
Space agencies could also rely on a somewhat basic method to remove the debris, Kessler said. Engineers would need to develop some kind of technology to grapple the target piece of debris and pull it into a part of space where it could quickly to burn up in Earth's atmosphere.
"Technologically speaking, the easiest way to do it is what I've been referring to as the old-fashioned way," Kessler said. "You just design a spacecraft to go up and get it, attach a rocket to it and send it on its way or wherever you want to put it."
On the horizon
There are other, more high-tech options on the horizon for space cleanup as well.
The Defense Advanced Research Projects Agency's (DARPA) Phoenix spacecraft project would use old, but functioning pieces of defunct satellites to create new space-based systems — instead of adding completely new satellites. Officials working with the program would launch a "tender" vehicle that would make use of small "satlets" launched without an expensive antenna needed to make satellites function.
Once in space, the tender would move a relatively inexpensive satlet to a defunct geosynchronous satellite. There, the old satellite's antenna could be recycled and incorporated into the tiny satellite, effectively creating a new communications system without necessarily producing more space junk.
Scientists could also use lasers to mitigate the risks posed by orbital debris.
"There are two ways that a laser works" to get rid of a piece of space debris, Kessler said. "One is using what they call photon power — just letting light waves slow it down until it re-enters [Earth's atmosphere], but that works really well on small stuff.
"To get a big force out of it, you need to vaporize part of the surface and essentially form a jet … but when you're doing that, you don't know what might happen, so there's some uncertainty there," Kessler added. "You would hate to cause it to blow up for example." [Photos: Space Debris Images & Clean Up]
Space junk-targeting lasers probably won't be built anytime soon, however, because the national security implications of such a tool could make it a non-starter, Kessler said. That is, the possibility of weaponizing a powerful space or ground-based laser could make building such a device politically difficult.
Another mission — expected to launch to space in 2015 or 2016 — will aim to rendezvous with and grapple obsolete satellites. CleanSpace One, a project of the Swiss Space Center, is designed to be the first satellite capable of grappling a piece of space junk in orbit and plunging with it into Earth's atmosphere, disintegrating both spacecraft.
Space junk in fiction
In trailers for the film "Gravity," opening Oct. 4, a huge cloud of debris can be seen hurtling through space, destroying or damaging a space shuttle, the International Space Station and the Hubble Space Telescope.
While the movie depicts an extreme example of a space junk catastrophe, the scenario is not impossible, Kessler said.
"I suppose all of that is possible, [but] it's not very probable," Kessler said. "The object that broke up could have been in a slightly elliptical orbit because Hubble is higher than the space station, and if it were to break up in an elliptical orbit, it could go through the Hubble altitude and the debris could orbit down to the space station altitude."
And if the space station "happened to be in the right spot, it would go through the same cloud," Kessler said.
|
<urn:uuid:fa708521-9a38-4035-9cdf-dc4407a4118a>
|
CC-MAIN-2016-26
|
http://www.space.com/22969-space-junk-clean-up-ideas-incredible-technology.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396875.58/warc/CC-MAIN-20160624154956-00107-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.942733
| 1,099
| 3.8125
| 4
|
The Mathematica® Journal
In the middle of the last century, J.J. Sylvester tried to calculate the expectation value of the convex hull of randomly chosen points in a plane square. As he discovered, for the problem is trivial. For the question is relatively easy to answer using Mathematica:
But starting for the problem becomes extremely difficult due to the multiple integrals to be evaluated. In 1885, M. W. Crofton came up with an ingenious idea to solve special cases of this problem. His formulae are today called Crofton's theorem. At that time he remarked:
The intricacy and difficulty to be encountered in dealing with such multiple integrals and their limits is so great that little success could be expected in attacking such questions directly by this method [direct integration]; and most what has been done in the matter consists in turning the difficulty by various considerations, and arriving at the result by evading or simplifying the integration.
The general setting of the problem is to calculate the expectation value of the -dimensional volume of the convex hull of points in dimensions; for instance, the volume of a random tetrahedron formed by four randomly choosen points in (an unsolved problem).
In the following we will show that, using the stunning integration capabilities of Mathematica, it is now possible to tackle such problems directly.
In the following, let the plane polygon be a unit square, and let us calculate the expectation value of the area of a random triangle within the unit square.
Here is a sketch of the situation at hand:
Let , , and be the vertices of the triangle. Then the area of the triangle is given by the absolute value of the determinant:
This means the integral to be calculated is:
The determinant changes sign, depending on the orientation of the triangle, and there are two possible ways to deal with this issue. The first would be to use as the integrand, and the second would be to divide the six-dimensional integration region into subregions, such that inside each the expression does not change sign. Because the first approach soon leads to intractable integrals, we will follow this second approach here.
This is the expression for the area (still containing the sign ambiguity):
We must now recursively (with respect to each coordinate ; ; ) determine the boundaries where the expression ÷p and its "lifted" expressions (lifted in the sense that a few coordinate values are viewed as fixed) change sign. Furthermore, we must take into account that all coordinates are restricted to the interval ; this condition also restricts the ranges of coordinates other than the current one. A sign change for an expression containing ÷p or its lifted variants can occur if the numerator of the expression is zero or the denominator has a pole of odd order. The function calculates all potential new points of sign changes of the expression sols with respect to the variable x.
To divide the volume of integration--the six dimensional unit cube--uniquely into subregions of constant sign, we also must take care about the points where two expressions become equal. The function calculates all potential new points of sign changes of the expression sols with respect to the variable x.
For each of the coordinates ; ; , we now have to look for all points calculated by the routines and to get all points of a potential sign change.
Starting now with the expression ÷p and the coordinate and calculating all internal points of potential sign changes, we get the following.
Adding the interval boundaries 0 and 1 to the points of potential sign changes (as well as the iterator variable the intervals refer to) shows the following hyperplane divisions of our six-dimensional integration region:
Next we must sort the points of according to their position between 0 and 1. To do this, starting with the two intervals and , we calculate recursively one rational internal point of the intervals. The function sort sorts the points points taking into account the already calculated rational interval representatives. This sorting is necessary to divide each hyperplane into succesive stripes and to make sure that we take into account only those intervals which are inside the interval .
The function lift calculates the sorted intervals of the coordinate x with the potential sign-changing points points, using the already calculated intervals oldIntervals and the representatives oldRealizations of these intervals.
Now we repeatedly apply the function lift, starting with the intervals and we obtain a complete subdivision of the integration space together with sample points of the regions.
We have 496 regions all together.
Here the first and last one are explicitly shown. The regions are not bounded by hyperplanes but generically have curved bounding surfaces:
Inside each of these 496 regions ÷p does not change sign.
Now, inside each of the 496 six-dimensional polytopes we have to integrate ÷p. ÷p itself is only a (multi-)linear polynomial in each of the six (integration) variables ; ; which at first might give the wrong impression that the integration is easy. However, because the limits of the integrations are themselves rational functions of the outer integration variables, the integrals we have to deal with typically will be quite complicated and will contain rational functions, logarithms, and polylogarithms in the result. (See the example below.)
We will not use Mathematica's definite integration capabilities because they are "too advanced" for our purposes. I mean "too advanced" in the following sense: if a definite integral contains parameters, Mathematica tries to determine if the integral exists for all parameters and if the integrand contains singular points. Because the integrals involved possess up to five parameters (the outer integration variables) this is quite a stunning task. On the other hand, by the construction of the integration regions regions and by the nature of ÷p, we do not have to worry about any of these problems--inside each of the integration regions the integrand is a smooth, not sign-changing, function. So we use the much faster indefinite integration capabilities of Mathematica and calculate the definite integrals from the indefinite ones. If we are lucky, we just have to substitute the integration limits into the indefinite integral to obtain the definite integral. But sometimes this process may yield indeterminate expressions. In such a situation we must be more careful and must calculate the needed limits by using a series expansion around the integration endpoints.
Now let us implement the aboves described integration: the function multiIntegrate is our own multidimensional definite integration function, and myIntegrate is our one-dimensional integrator.
The function limitsNeededQ tests to see if limits are needed for substituting the integration limits.
To speed up the indefinite integration and the calculation of the limits, we apply some transformation rules implemented in ÷‚ to the expressions of interest. Because we know that the integrals we are calculating are real quantities, we do not have to worry about branch cut problems associated with the logarithm function, and we drop all imaginary parts at the end. (Again, because this fact is not known to the built-in indefinite integration routines, this transformation speeds up the calculation considerably.)
The function myIntegrate is finally doing the univariate indefinite integration. myIntegrate first calculates the indefinite integral, then simplifies the result. After this the integration limits are substituted. If the above procedure was successful, our work is done. If our process failed (if Indeterminate was returned or some flavor of DirectedInfinity turned up in the result) we calculate explicit limit values.
Now everything is in place for us to actually carry out the integration. To get an idea of the complexity of the expressions involved, let us look at the individual integration results of the first region. The indefinite integrals are typically quite a bit larger than the definite ones shown in the following results, and for some of the 496 regions the intermediate indefinite integrals can be as large as 50 KB. (In the following we suppress some of the messages generated when direct substitution of the limits fails.)
So we have as the contribution from the first region
Using Mathematica's numerical integration capabilities, we can calculate an approximate value of this integral, too.
This value agrees reasonably well with the symbolic result.
As a test of our integration routine, we can calculate the volume of all 496 individual regions. In total, they have the volume 1 of the unit cube.
Finally, we can now carry out all 496 six-dimensional integrations to obtain the expectation value (11/144) for the area of the triangle. Be aware that the following calculation will take about 5 hours on a 200Mhz Pentium Pro.
Again we can use NIntegrate to numerically check the result.
V. S. Alagar, Journal of Applied Probability 14 (1977) p. 284.
C. Buchta in A. Dold, B. Eckmann (eds.), Zahlentheoretische Analysis, Springer, Berlin, 1983.
C. Buchta, Journal for Reine und Angewandbe 347 (1984) p. 212.
N. Henze, Journal of Applied Probability 20 (1983) p. 111.
V. Klee, American Mathematical Monthly 76 (1969) p. 286.
R. Pfiffe, Math. Magazine 62 (1989) p. 309.
|
<urn:uuid:81d24d67-0900-4ca4-9cb3-a08b48523a6d>
|
CC-MAIN-2016-26
|
http://www.mathematica-journal.com/issue/v7i2/articles/contents/trott/html/index.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395620.56/warc/CC-MAIN-20160624154955-00035-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.889815
| 1,944
| 2.734375
| 3
|
Achondroplasia is the most common form of chondrodysplasia, characterized by rhizomelia, exaggerated lumbar lordosis, brachydactyly, and macrocephaly with frontal bossing and midface hypoplasia.
Estimated incidence is at about 1/25,000 live births worldwide.
Characteristic clinical features (short limbs with rhizomelia, long and narrow trunk and macrocephaly with frontal bossing and midfacial hypoplasia with depressed nasal bridge) are visible at birth. Achievement of gross motor skills is slower than typical due to short limbs, short neck, and large head, in addition to hypotonia. Midface hypoplasia in combination with adenoid and tonsil hypertrophy can lead to obstructive sleep apnea. Chronic otitis media can lead to hearing problems. Dental crowding is common. Thoracolumbar kyphosis is very common in infancy. Most joints can be hyperextensible and hands are broad, short and trident shaped. Cord compression at the level of the foramen magnum can be encountered in infancy and early childhood causing central apnea, developmental delay, and long-track signs. Genu varum often occurs in childhood. There is also a small risk of hydrocephalus, with raised intracranial venous pressure. Lower lumbar spinal stenosis with accompanying neurological deficits, has an increased frequency in adulthood, as does cardiovascular disease. Obesity is a common issue. Adults reach a height of 131±5.6 cm (men) and 124±5.9 cm (women). Affected women must deliver by caesarian section due to small pelvis size.
Achondroplasia is due to mutations in the fibroblast growth factor receptor 3 (FGFR3) gene, encoding a transmembrane receptor that is important in regulating linear bone growth, among other functions.
Diagnosis is based on the presence of characteristic clinical and radiological findings. Skeletal X-rays demonstrate rhizomelia, generalized metaphyseal irregularities, narrowing of the interpediculate distance of the lower lumbar vertebrae and an abnormal pelvis with small square iliac wings and narrow sacrosciatic notch. Molecular genetic testing can confirm a diagnosis by the presence of a FGFR3 mutation.
Differential diagnoses include hypochondroplasia, thanatophoric dwarfism (types I and II), and SADDAN (see these terms).
Prenatal diagnosis can occur incidentally during routine prenatal ultrasound examination in the 3rd trimester. In high risk pregnancies, or in those where achondroplasia is suspected after an ultrasound, fetal DNA can be tested for the FGFR3 mutation to confirm diagnosis. Pre-implantation genetic diagnosis is possible in specialized laboratories.
Inheritance is autosomal dominant so genetic counseling is warranted. If one parent has achondroplasia there is a 50% chance of passing it on to offspring. In 80% of cases, it is due to a de novo mutation in children with parents of average stature. Homozygous achondroplasia is a lethal condition.
Management is multidisciplinary and anticipatory care is essential. Infants may require surgical decompression of the foramen magnum, and/or shunting for hydrocephalus. Some may choose controversial limb lengthening procedures. Treatment of ear infections and serous otitis media, along with assessment of any hearing problems is needed. Speech therapy can be offered if concerns arise. Treatment of obstructed sleep apnea may include adenotonsillectomy, weight loss, and/or continuous positive airway pressure. Surgical correction can re-align bowing of legs. Adult patients may require a lumbar laminectomy to treat spinal stenosis. Weight gain should be monitored in childhood to avoid later complications. Activities which lead to a risk of injury to the craniocervical junction should be avoided. Social and psychological support should be offered.
There is only a slight decrease in life expectancy compared to the general population, potentially due to cardiovascular disease.
Last update: April 2013
- Dr Michael BOBER
- Angela DUKER
|
<urn:uuid:848acaa7-5fa4-4d80-a80f-e4850b29c01d>
|
CC-MAIN-2016-26
|
http://www.orpha.net/consor/cgi-bin/OC_Exp.php?lng=EN&Expert=15
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783403508.34/warc/CC-MAIN-20160624155003-00108-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.913491
| 880
| 3.375
| 3
|
Enabling behaviors and addiction
Enabling behaviors in families
Statistics show that one in four adults struggle with addiction, impacting millions of family members. This is why addiction is often called a “family disease”. And why codependent relationships and addictions are closely related. But what does codependent mean?
It is difficult to be in a relationship with an addict and not get sucked into enabling behavior. When somebody you love is suffering with an illness or a disease you naturally want to help. As a result, loved ones often step in to save the addict from the devastating consequences of their actions. Family members believe they are doing the right things when they help to save the addict’s job, help him or her to stay out of jail, help to pay their overdue bills, or save them from whatever horrific thing is getting ready to happen. But these actions are making it easier for the addict to continue drinking or using drugs, because the consequences aren’t bad enough to convince him or her to stop.
Over time, those closest to an active addict may take on enabling behaviors. As a result, the person enabling the addict is playing a part in the addiction. While enabling behaviors typically come from a desire to help, they are actually hurting. Many times, family members and loved ones become consumed with the addict and the problems surrounding the addiction. This can cause their physical and emotional health to suffer.
Signs of an enabler
Following are some of the signs that a person is taking on the enabling role. An enabler typically:
- avoids doing things away from the home because they want to keep an eye on the addict.
- falls for the same lies over and over again.
- fantasizes about something bad happening to the addict, and then feels guilty for having such terrible thoughts.
- feels as though the weight of the world is on your shoulders.
- feels tired and drained much of the time.
- has difficulty sleeping because of worry about the addict.
- suffers financial problems due to the addiction.
- takes on the addict’s responsibilities.
How to avoid enabling an addict
So how do you love an addict without stepping in and enabling the addiction? You do this by treating the addict with dignity and respect (putting a stop to arguing), learning about addiction so that you understand the disease, and offering words of encouragement. Here are some ideas.
1. Allow the addict to take responsibility for their own choices.
Stop codependent thinking and acting. In a loving way you can explain to the addict, “I care about you, but I cannot take on your responsibilities.” As difficult as it might be, family members must learn to let the addict feel the pain of their choices. By facing the consequences of their actions, the struggling addict may be inspired to seek or accept help.
2. Communicate clearly but kindly.
Furthermore, if yelling, berating, and blaming have become normal in the household, it is important to stop this pattern. Feelings of guilt and shame are triggers for an active addict. Many times, getting drunk or high is their way of covering up these emotions. Family members may feel the need to remind the addict, over and over again, how hurtful their behavior is. In reality, the addict is typically harder on themselves then anyone around them.
3. Take care of yourself.
Finally, each family member should place a focus on their own physical and emotional health. This is not a selfish act. This is setting a positive example for everybody involved — including the addict. One of the best sources of help available for families is Al-Anon. By attending Al-Anon meetings regularly, family members can gain the extra support needed to follow through on making healthy changes in their family dynamic.
Enabling behaviors and addiction questions
Are you acting as an enabler to an addict in your family? Do you still have questions about how to stop enabling? Or perhaps maybe you’d like to share more about your struggles, experiences and successes. Please leave us your comments about enabling below. We try our best to respond to all comments PROMPTLY and will provide you with a personal, kind and supportive reply.
Photo credit: wackystuff
|
<urn:uuid:ceac89f9-4afb-44e2-bc32-17a806cd9c22>
|
CC-MAIN-2016-26
|
http://alcohol.addictionblog.org/enabling-behaviors-and-addiction/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393997.50/warc/CC-MAIN-20160624154953-00136-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.958336
| 875
| 2.671875
| 3
|
Self-esteem is your sense of personal worth. It encompasses both self-confidence and self-acceptance. In part, healthy self-esteem comes from your awareness of the value you add to your family and the community. In Building Your Child's Self-Esteem, author Yvonne Brooks provides a step-by-step guide for improving children's self-esteem.
Practical and hands-on, with clear and concise instructions, Building Your Child's Self-Esteem shows parents how to identify healthy and low self-esteem behaviors in their children. Parents will also learn how to overcome and correct unproductive habits that limit their child's performance.
From developing a series of ideas for empowering children toward self-responsibility and awareness, parents will get the information needed to activate their child's potential for maximum success. Parents will learn how self-esteem manifests in children, how children with healthy and low self-esteem communicate, and how healthy and low self-esteem characteristics affect parenting skills.
Building Your Child's Self-Esteem provides guidance to help parents manifest and produce healthy, confident, courageous children.
|
<urn:uuid:2e4f18a6-155c-404a-a334-3ab3345d9095>
|
CC-MAIN-2016-26
|
http://www.ebookmall.com/ebook/building-your-child-s-self-esteem-9-secrets-every-parent-needs-to-know/yvonne-brooks/9781469746753
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783408840.13/warc/CC-MAIN-20160624155008-00160-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.939503
| 229
| 3.546875
| 4
|
PEDIATRIC OPTHAMOLOGIST | PEDIATRIC OPHTHALMOLOGY
What is a Pediatric Opthamologist and where can I find one ?
A Pediatric Opthamologist is a speciality of ophthalmology concerned withthe eye diseases and development of the eye of children. In the US, pediatric opthamologists (ophthalmologists) must complete medical school, plus a 1-year internship, followed by a 3-year residency in ophthalmology, and a 1-2 year fellowship in pediatric ophthalmology. Frank D. Costenbader was an American physician frequently credited as the world’s first pediatric ophthalmologist. Pediatric Opthamologists in the USA are accredited by the American Association for Pediatric Ophthalmology and Strabismus.
What does a Pediatric Opthamologist do?
Pediatric ophthalmologists are trained in the development of the visual system of children. Pediatric Opthamologists are also experts in the the various ocular diseases in children. Pediatric ophthalmologists are fully qualified to perform eye surgery of all kinds. Also, children with head tilts, squinting of the eyes, or with preferred head postures (torticollis) are also often referred to a pediatric ophthalmologist for specialist evaluation.
GLOSSARY OF CHILDRENS’ EYE PROBLEMS:
A Pediatric Opthamologist must be able to deal with the most common eye diseases in children. These include:
Infections (‘Pink Eye’, conjunctivitis).
Amblyopia (aka lazy eye) occurs when the vision of one eye is significantly better than the other eye, and the brain begins to rely on the better eye and ignore the weaker one. Amblyopia affects 4% of the population and is clinically diagnosed when the refractive error of one eye is more than 1.5 diopters different than the other eye. The management of amblyopia involves correcting of significant refractive errors and using techniques that encourage the brain to pay attention to the weaker eye such as patching the stronger eye.(occlusion therapy)
Blocked tear ducts.
Strabismus is a misalignment of the eyes that affects 2-4% of the population; it is often associated with amblyopia. The inward turning gaze commonly referred to as “crossed-eyes” is an example of strabismus. The term strabismus applies to other types of misalignments, including an upward, downward, or outward turning eye.
Retinopathy of prematurity.
Abnormal vision development.
Refractive errors such as myopia (near-sightedness) and astigmatism can often be corrected with prescriptions for glasses or contacts.
Genetic eye disorders. Since approximately 30% of genetic syndromes affect the eyes, examination by a pediatric ophthalmologist can help with the diagnosis of genetic conditions. Many pediatric ophthalmologists participate with multi-disciplinary medical teams that treat children with genetic syndromes.
Congenital malformations affecting vision or the tear drainage duct system can be evaluated and possibly surgically corrected by a pediatric ophthalmologist.
Convergence insufficiency and asthenopia.
Evaluation of visual issues in education, including dyslexia and attention deficit disorder.
– If you can recommend a Pediatric Opthalmologist, or if you have questions about Pediatric Ophthalmology, Amblyopia in children or other eye problems in children, then please add your input in comment section.
|
<urn:uuid:a152b3fd-3402-4996-a0e1-04f23af04d85>
|
CC-MAIN-2016-26
|
http://opthamologists-online.com/pediatric-opthamologist
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397748.48/warc/CC-MAIN-20160624154957-00176-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.91408
| 759
| 2.921875
| 3
|
During the commissioning phase of a chemical plant in Texas, technicians found a 4-20 mA pressure transducer calibrated for 60 psi at 20 mA in a location that called for 300 psi. All of the field devices had been preconfigured and calibrated before installation. What was the cause of such an error?
The simplest explanation is that it was a case of mistaken identity. Because multiple devices of the same type are common at plants, this device might have been placed at the wrong location. That would mean that the unit configured for 300 psi is installed at another, unknown location. Or, perhaps, the device was set up incorrectly by the factory or installation crew. Regardless, it would take further investigation to pinpoint the cause — and additional commissioning time.
In a second scenario, the device comes preconfigured and calibrated. The configuration is valid but an “as found” test reveals the device is out of tolerance and requires calibration. This shift in calibration may have occurred during shipment or installation. During installation, the most common causes for such a problem are over-tightening, simply dropping the device or, in some cases, incorrect orientation.
HART-enabled 4-20-mA field devices can prevent errors like these. In such devices, the 4-20 mA analog channel is supplemented by a digital channel supporting read/write access of all device data. With HART-enabled software, field devices are configured and calibrated after installation, minimizing errors and commissioning time.
The power of HART
But how can you justify the extra cost of HART? Certainly take reduction in commissioning time into account in return-on-investment calculations. The abundance of data available in every HART device also can minimize installation, operations and maintenance costs; this alone can provide a payback of less than one year. In addition, consider other potential benefits. Online HART systems:
• are simple, high-value, low-risk propositions that are easy to use and maintain.
• allow diagnosis of problems in real-time and prediction of maintenance cycles based, for example, on valve closures rather than the calendar.
• can keep accurate records that meet the compliance and traceability requirements of OSHA and the FDA.
• can help optimize raw material use by enabling tighter process formula control.
• can check for faulty equipment. Every output from a HART device includes diagnostic information. An indication of a problem can prompt action, either automatic or manual, depending upon the criticality of the device. For instance, the device may be monitored at a higher rate to gather trending information or linked to annunciators or predictive maintenance algorithms.
• enable, in batch operations, the rescaling of field devices remotely as process needs change, while confirming the change to the host system to ensure a closed-loop quality control system. Conventional and proprietary systems usually lack this feature.
Quite simply, integration of HART field devices with existing plant control, safety and asset management software leads to increased productivity at lower costs.
According to the ARC Advisory Group, Dedham, Mass., 40-45 million field devices are now installed worldwide — approximately one-half are analog and another one-fourth are HART (Figure 1). So, there is a pre-existing knowledge base among operations and maintenance personnel when upgrading 4-20-mA devices to HART. And these are the people who would use the hardware and software tools, such as handheld communicators and plant asset management software, for communicating with HART devices.
However, there is one overwhelming reason to consider HART for plant retrofits or expansions: the investment in copper wiring already in place. Using a rule-of-thumb of $1 per foot of copper wiring in conduit and assuming 5,000 devices at an average distance of 300 feet, the investment in wiring is $1.5 million. With those same wires used for analog control, you can have read/write access to all HART device data over the existing infrastructure.
The place to start
Implementing a HART strategy begins with the field devices. You must identify the critical areas in the process and decide whether to layer a HART communication channel over the analog channel or combine a HART bus with other field buses.
In a system consisting of thousands of devices, a relative few will be deemed critical. These devices are necessary for controlling the product quality and should have higher reliability and, usually, better accuracy than others. (In the last five years, a new measure of reliability has emerged, the Safety-Integrity-Level (SIL) rating; in general, the higher the SIL rating, the greater the reliability.) These devices may also have a higher level of diagnostics, which can provide more information about the status of a device if monitored.
You probably already have an inventory of field devices. So, first, determine which are HART-capable or could be retrofit with HART devices. Then, identify what HART information is available and what advantages having that information can bring. Every HART device provides 35-40 data items, such as its serial number, calibration date, secondary measurement values or error conditions. In addition, there are device-dependent variables like the totalized values in a flow meter that could be cleared between batches.
At the same time, determine which measurement functions could be combined into one device. Some HART devices, for example, are capable of measuring temperature and pressure. This reduction in the number of field devices provides initial and continuing costs savings.
Making the most of the data
Having HART device data available in the field is advantageous for technicians with handheld communicators and calibrators. Perhaps more importantly, bringing those data into the control room gives operators the ability to monitor and address malfunctions and alarm conditions <em dash>— and minimizes trips to the field and their associated costs. The data are also useful when creating maintenance schedules with audit trails for the devices.
There are two methods to acquire HART data from field devices: a HART multiplexer-and-host combination that monitors hundreds of devices, and a HART input/output module that teams an analog I/O module with a HART interface.
HART’s digital communication is intended for process control. The digital signal can be slow, especially when handled via old multiplexers. Where faster response times are necessary, the analog signal is used to read measurement values. Machinery control and programmable logic controller applications that require millisecond response times call for higher-speed digital buses.
Accumulating, storing and accessing the data of hundreds of field devices require an application server running a database program known as asset or device management software. That program manages and documents device configurations and calibrations, stores device history and provides audit trail information. Here are some key features to look for in this type of software:
• support for the complete service life of a device, from installation/commissioning and maintenance through decommissioning.
• support for all HART or conventional field devices so you can continue to purchase the best devices regardless of manufacturer.
• the ability to track, record and maintain all activity with field devices so you have an audit trail for compliance with corporate policy and agency rules, such as FDA’s 21 CFR Part 11. The software should provide the necessary documentation and security. It should document when devices are put in service and when devices are retired from service; it should provide an audit trail that lists all changes in configuration and calibration to field devices. Password protection should ensure that only qualified technicians work on devices and also the authenticity of signatures for calibration signoff.
• support for OPC for exchanging data.
• integration with a maintenance, repair and operation (MRO) system to schedule work, needed resources and paperwork such as work orders.
• integration with handheld communicators and calibrators to eliminate “clipboard” commissioning and maintenance. This can reduce labor costs by as much as 50%.
Of course, the software should have the ability to grow as your plant adds product lines and as manufacturers introduce new field devices.
Getting up and running
In a plant with device management software, HART devices are installed in a preconfigured state. Once communication is established, nonconfigurable data, like serial number and firmware revision, are uploaded from the devices while user-configurable data, like zero and span, are downloaded to the devices.
This streamlined installation procedure is especially useful when duplicating a production line. Duplication or cloning can extend right down to the device configurations and those data can be downloaded to the field devices. This can cut the commissioning time in half.
However, because of their extreme flexibility in configuration to allow for the best fit, HART devices are complex to configure. The ultimate configuration of options needs a close review to ensure the devices will handle operating conditions properly and, in the event of a failure, do so in a safe and predictable manner.
The 80/20 rule applies to a plant’s lifetime costs: 80% of the total costs are associated with operations and maintenance and 20% relate to installation and commissioning. The benefits of integrating HART field devices with device management software are even more apparent over the life of the plant.
The greatest impact comes from reduced labor for the repetitive task of configurations. These are performed remotely from the control room or maintenance shop and do not require a visit to the field device, which may be installed in a difficult-to-reach or hazardous location.
Maintenance schedules become more predictive as device lifecycle management software tracks historical data of the devices. Examining trends of equipment performance and scheduling repairs before a problem occurs lead to less downtime. However, this requires a change in the maintenance mindset from being driven by the calendar to being driven by device information. Operators and technicians will require training on how to properly analyze the data, plus management must make a commitment to follow through on the preventive or predictive maintenance needed.
Troubleshooting can be done remotely. When a field inspection is necessary, the technician already will have performed remote diagnostics. And when a device needs replacement, its configuration can be cloned into a new one.
Many field devices remain in service for years. Replacement can pose a configuration issue. Devices having the same model numbers from the 1990s and today have different firmware as HART has evolved from Revision 4 through Revision 6 and manufacturers have added features and capabilities. As a result, the old configuration will result in a “device mismatch” with the new device. “Map” features enable automatic mapping of the old configuration to the new device. The user can update devices with minimal downtime, which can be especially important for device failures and unexpected shutdowns.
Extending the benefits
There is a wealth of information about plant operations in the database created by device management software. Sharing that information with an MRO system is only the beginning. Figure 2 shows how a common database with open standards can link all the software tools of the plant, integrating operations and maintenance with enterprise tools. This leads, for example, to efficiencies for data backup and device ordering.
The software applications that can be linked together include:
• the device management system. It configures and calibrates field devices and tracks/documents changes.
• valve management. This software exercises valves, tracks closures and gets valve signatures.
• the plant automation system. This is the actual control system and acts as supervisor and watches for device failures and error flags.
• MRO software. It communicates with business management software and issues work and purchase orders.
• engineering tools. This is the software used to design control systems.
• the human-machine interface. It provides the operator interface to the monitoring and control software.
• batch historian. It keeps process formulas constant and tracks changes.
Integrating HART device-management software into the enterprise provides benefits to plant operators, technicians, engineers and managers. A fully integrated HART plant allows commissioning of field devices and upload/download of parameters to calibrate and troubleshoot devices, either remotely or locally; all of this is documented to show compliance with company and regulatory requirements.
HART integration pays for itself with productivity gains, maintenance savings and more efficient and accurate recordkeeping.
Dan Prugar is director of marketing and sales for Meriam Process Technologies, Cleveland. E-mail him at email@example.com.
|
<urn:uuid:bfdf0710-8c93-495c-b616-441aea73270a>
|
CC-MAIN-2016-26
|
http://www.chemicalprocessing.com/articles/2005/522/?show=all
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395679.18/warc/CC-MAIN-20160624154955-00087-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.92562
| 2,548
| 2.5625
| 3
|
Workers with access to paid sick leave are 28 percent less likely overall to suffer nonfatal work-related injuries than workers without access to paid sick leave, according to a study by the Centers for Disease Control and Prevention (CDC).
The study found that workers in high-risk occupations and industry sectors, such as construction, manufacturing, agriculture, and healthcare and social assistance, appeared to benefit most from access to paid sick leave. Workers in these sectors commonly experience muscle soreness, pain, sprains, strains and tears; fractures; cuts and lacerations; or more chronic injuries including herniated discs, cartilage damage and spinal cord injuries.
The study is the first U.S. research that examines the issue and attempts to quantify some of the benefits of paid sick leave. Researchers analyzed data from 2005-2008 collected by the National Health Interview Survey, that gave them the ability to examine the potential safety benefits associated with paid sick leave. The study considered 38,000 private sector workers only; most full-time public sector workers have access to paid sick leave. The report by CDC’s National Institute for Occupational Safety and Health (NIOSH), appears in the American Journal of Public Health.
Healthcare practitioners and technicians without access to paid sick leave were 18 percent more likely to suffer a non-fatal work-related injury than those same workers with access to paid sick leave. Also, a construction worker without access to paid sick leave was 21 percent more likely to suffer a non-fatal work related injury than a construction worker with access to paid sick leave.
“This study highlights how our work lives and our personal health are intertwined,” says John Howard, MD, director of CDC’s National Institute for Occupational Safety and Health. “This concept of total worker health, which involves creating an environment of well-being both at home and at work, is an important aspect of the American economy as we depend on able and productive workers.”
In addition to illness, the study cites previous research that identified factors that are potential contributors to nonfatal work-place injuries, including sleep deprivation, fatigue and consumption of medications that may cause drowsiness.
The study cautions that sick or stressed workers who continue to work may be at risk if they have problems with sleep, fatigue or are taking medications that cause drowsiness. These factors may in turn impair their concentration or ability to make sound decisions and increase the likelihood of suffering an additional illness or sustaining a workplace injury.
“Many workers may feel pressured to work while they are sick, out of fear of losing their income,” says Abay Asfaw, PhD, lead researcher. “If fewer people work while they are sick, this could lead to safer operations and fewer injuries in the work place.”
These findings add to previous research that found that access to paid sick leave is associated with shorter worker recovery times and reduced complications from minor health problems. Access to paid sick leave may also help prevent the spread of contagious diseases in daycare facilities and schools and would enable private sector companies to comply with recommendations by health officials on ways to reduce the spread of infectious disease including pandemic influenza, according to the study.
Paid sick leave is one of the non-wage benefits optionally offered by U.S. employers. The 1993 Family and Medical Leave Act requires public agencies and private-sector establishments to provide up to 12 weeks of leave to eligible workers, although this leave can be paid or unpaid. Despite the demonstrated advantages of paid sick leave for workers and employers, only 40 million U.S. private sector workers had access to paid sick leave in 2010.
The researchers said that employers may benefit from improved productivity if access to paid sick leave helps reduce absenteeism, or unscheduled leave, or the problem of sick workers continuing to work while not fully productive, also known as “presenteeism.” This study, along with previous research, indicates that more integrated development of programs that both prevent occupational injury and illness and improve other aspects of worker health may provide the greatest benefit.
The authors said additional research could assist in understanding the potential impact of access to paid sick leave for entire communities, especially in the case of contagious diseases, and might identify additional opportunities for prevention of disease.
|
<urn:uuid:630f1559-fa36-4bcd-9cc3-6273ae473746>
|
CC-MAIN-2016-26
|
http://www.infectioncontroltoday.com/news/2012/07/new-cdc-research-examines-link-between-paid-sick-leave-and-healthier-workers.aspx
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402479.21/warc/CC-MAIN-20160624155002-00006-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.968796
| 878
| 2.828125
| 3
|
Safe Kids USA and SANUS recently released a new research report entitled “A Report to The Nation on Home Safety: The Dangers of TV Tip-Overs” revealing from 2000 to 2010, on average, every three weeks, a child dies from a television tipping over. To put that into perspective, that means every 45 minutes, or less than the length of a Sesame Street episode, a child is sent to the emergency department due to a TV tip-over. Nearly 13,000 children aged 19 and under are injured in the U.S. each year by a television tipping over – a 31 percent increase over the last ten years.
I did a little digging into Dayton Children’s emergency numbers at in 2011; thirty-five children visited the Soin Pediatric Trauma and Emergency Center due to a television tip over. That same year, 75 children visited the emergency department for injuries resulting from a large object, in most cases a large piece of furniture, falling on the child. Nationwide, 7 out of 10 kids injured by TV tip-overs are 5 years-old or younger. This age group also accounts for 9 out of 10 serious injuries requiring hospitalization, including head injuries which are among the most severe.
These injuries can be devastating and sometime deadly. Take a few minutes to scan your home for these dangers.
Here are some tips from Safe Kids USA
- Assess the stability of the TVs in your home.
– Remember, a curious, determined child can topple a TV.
– Children playing with friends or pets could knock a TV over.
– Other kids might be tempted to climb up to reach items placed on or near a TV, such as remote controls or candy.
- Secure TVs
– Mount flat screen TVs to the wall to reduce the risk of TVs toppling off stands. Follow the manufacturer’s instructions to ensure you protect your wall and have a secure fit.
– If you have a large, heavy, old-style cathode ray tube (CRT) TV, place it on a low, stable piece of furniture.
- Secure Furniture
- Use brackets, braces or wall straps to secure unstable or top-heavy furniture to the wall.
- Install stops on dresser drawers to prevent them from being pulled all the way out. Multiple open drawers can cause the weight to shift, making it easier for a dresser to fall.
- Rearrange Household Items
- Keep heavier items on lower shelves or in lower drawers.
- Avoid placing remote controls, food, toys or other items in places where kids might be tempted to climb up or reach for them.
Shortly before this research report came out, securing some furniture to the wall was on my honey-do list! I hope it’s on yours as well!
|
<urn:uuid:c722c4df-ee9e-4882-8fb0-1bcb522ad1f0>
|
CC-MAIN-2016-26
|
http://blog.childrensdayton.org/honey-do-list-securing-the-television/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402699.36/warc/CC-MAIN-20160624155002-00006-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.940182
| 576
| 2.953125
| 3
|
What does it mean to be a man? Anatomically speaking, not much is different among the sexes. Genetically, people of various ethnicities and backgrounds are nearly identical. Three hundred years ago, a man shaved his face much in the same way he does today. So, what does it mean to be a ‘man’ by today’s standards?
A man is what he does, and traits determine behavior and associated thought. Here are traits of a man:
There are multiple intelligences, and today’s man knows how to exact tangents of intelligence at apropos times. For example, decades ago, it was custom for young men to attend university, and then seek employment in associated lines of business.
Today’s entrepreneurs take samples from a number of classes to create an original business. Others, drop college classes or don’t attend university altogether, opting for immediate access in the business world. Today, being ‘smart’ means succeeding regardless of GPA and diplomas.
Americans are no stranger to disappointment, especially the 99-percenters, the lower classes who struggle in the wake of the recession. Today’s man is tenacious, especially in the face of impending economic disasters. In the last decade, young people lost jobs and homes but not hope for a return to better days.
Today’s man is versatile and doesn’t quit, finding alternate paths to goals despite fierce odds and impending hurdles.
Sports are for yesterday’s prim and proper athletes who wore (wait for it) uniforms! Today’s men barely wear anything at all while engaging in MMA activities, whether it be jiu-jitsu, karate, muay thai and other mixed martial arts. Read more about MMA and related matters at this manly blog site. Yesterday’s exercisers targeted ‘looking fit,’ but today’s warriors’ bodies are lean and mean but because of gritty contact sports.
Today, you have to be smart with your dollar regardless of how many you have coming in the bank at any given time. Today’s dollar does not go as far as it used to, especially in the wake of difficult times; brands and major suppliers are feeling the effects too, subsequently raising prices. Today’s man visits the coupon pages and online sites that host a number of discounts on a range of brand names. Being frugal is smart – as you already know!
You need to know how to clean the scum rings around the tub (and which cleaning products are ‘green.’) Moreover, today’s guys know how to clean and cook while paying for their own living spaces…with a dog or cat possibly thrown in for good domestic measure.
Today’s man knows how to cut coupons, shut off all the lights before locking the door, drive an environmentally friendly car to the grocer, gather discounted coupon items, return home in time for Oprah and make a delicious (and healthy) meal. Does it sound like a lot? This is only the drive home from work.
Do you know how to download YouTube clips, transfer the file to a desire extension and place all her favorite ballads on your girlfriend’s iPad? Today’s man knows his way around the kitchen as well as a laptop device, understanding how to troubleshoot when partner vexed by an easy-to-fix Internet connection problem.
Do you know what book the line, “Call me Ishmael” originates? It’s likely you’re potential mate does if they graduated from grammar school. You don’t need a PhD to survive in today’s world but you need to be well-rounded, having read some of the classics in the least. Aside from Moby Dick, checkout plays (not books) by Shakespeare and contemporaries.
Aside from text, visit records, works of visual art, opera, and a number of other cultural elements of the finer arts. You’ll be amazed at the priceless look on the faces of ex girlfriends when they see you along with another strolling the halls of local museums and opera houses.
Peruse some of the ‘world’s sexiest’ candidates of the last few years and see many double as comedians and personalities in sitcom or big-screen humor. They say laughter is the best medicine and it seems no one’s arguing.
Today’s man can trip up the stairs, drop quinoa on his shirt, and take a cut in pay, all with a smile knowing that things will get better and not to sweat the small stuff. Potential mates love confidence and hate cockiness often associated with bravado. Just be yourself, which is bound to make her laugh if you’re like the rest of us guys.
Michael Hogue enjoys exploring the modern man’s domain. He rejects political correctness, is a bit of a survivalist and enjoys outdoor and mountaineering activities. His articles mainly appear on men’s lifestyle blogs.
|
<urn:uuid:0b8c523f-4a19-49dc-a616-4471a0486ec9>
|
CC-MAIN-2016-26
|
http://blog.bullz-eye.com/2014/05/22/8-survival-traits-of-the-modern-man/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395992.75/warc/CC-MAIN-20160624154955-00018-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.940431
| 1,048
| 2.609375
| 3
|
The Waistmakers' Revolt
by Alexandra Hanson-Harding
In the early 1900s, women and girls worked under dreadful conditions, making
clothes in sweatshops. In 1909, they took action.
*Fictional character; all others were real people.
*Malka, a factory worker
*Foreman at a factory
*Chaya, a factory worker
*Pinna, a factory worker
*Police officer #1
Clara Lemlich, a factory worker and union organizer
Benjamin Feigenbaum, chairman of a union meeting
Crowd, people at a union meeting
Mary Dreier, a wealthy woman and union leader
Anne Morgan, a rich heiress
Pauline Newman, a union organizer
Violet Pike, a college student
*Owner of a factory
*Thug, hired by factory owner
*Police officer #2
*Protester, woman in a picket line
"We wore cheap clothes, lived in cheap tenements, ate cheap food. There
was nothing to look forward to, nothing to expect the next day to be better."
That is what Pauline Newman said about her days as a worker in a New York City
In the early 1900s, many Jewish and Italian women worked in
U.S. factories making shirtwaists, a popular kind of women's garment. More than
500 shirtwaist factories in New York City employed about 30,000 workers, most
of them young women aged 16-21.
Working conditions were horrible: Women spent long hours bent
over sewing machines. Their salaries, which averaged about $6 a week, were barely
enough to feed and house them. Their pay was half that of men doing the same
kind of work.
Some people said that the women should organize themselves
into a union, so that they could fight together for better working conditions.
In 1903, women founded the Women's Trade Union League. Three years later, Local
No. 25 of the International Ladies Garment Workers Union (ILGWU) was founded.
The two groups worked together. Few male union leaders took female workers seriously.
In 1909, however, that began to change.
Top of Page
Narrator A: A shirtwaist factory, fall of 1909. Three
17-year-old girls, recent Jewish immigrants from Russia, are standing in line
Malka (crying): What am I going to do? I lost two of
my work tickets. If I don't get paid, my family doesn't eat.
Foreman: No tickets, no pay.
Chaya: It isn't fair! You give us these little tickets
for doing piecework. You know how easy it is to lose them! Malka did the work!
It's just a trick to cheat us out of our wages.
Foreman: I don't make the rules. If you don't like it,
tell the union.
Pinna: You know that we don't have a union here! Maybe
if we did, we wouldn't have to pay for the thread and electricity we use!
Chaya: Or rent the boxes we sit on!
Pinna: Or have to work till late at night with no overtime
Chaya: Or get paid so little that we can barely survive!
Foreman: Are you girls going to be troublemakers? If
so, get out!
Malka (wiping her eyes): They didn't mean it, sir. They're
just upset for me.
Foreman: Well, you'd better be careful! There are plenty
of other people to take your jobs if you don't want 'em.
Narrator A: That night, the three young women walk home
Chaya: Malka, I can help you out.
Pinna: Me, too.
Malka: My pride says not to accept but I promise I'll
pay you back.
Pinna: It makes me so mad: We're paid less than men,
but our families need our paychecks just as much!
Chaya: Something has to change!
Top of Page
Narrator B: In the fall of 1909, workers in several
factories go on strike. On November 4, Mary Dreier, head of the Women's Trade
Union League, is arrested for speaking to a striker. The police quickly release
Dreier when they learn who she is.
Police officer #1: Why didn't you tell me you was a rich lady? I'd
never have arrested you in the world.
Narrator B: The officer's remark is widely reported
in newspapers. Many workers are outraged that wealth can make such a difference
in how the police treat people. On November 22, the Women's Trade Union League
and the ILGWU hold a joint meeting to talk about a general strike a strike of the workers of an entire industry, not just one factory. Many speakers
urge the workers to be cautious. Then, a 19-year-old worker who is barely five
feet tall climbs onto the stage.
Clara Lemlich: I have listened to all of these speakers,
and I have no further patience for more talk. I say that we go on a general
Narrator B: The crowd jumps to its feet as people cheer,
stamp, and wave handkerchiefs in agreement.
Benjamin Feigenbaum: Will you take the old Hebrew oath?
Narrator B: Three thousand people lift their right arms
and repeat after him:
Crowd: If I turn traitor to the cause I now pledge,
may this hand wither from the arm I now raise.
Top of Page
Narrator C: The next day, workers report to their jobs,
unsure what to do. Then they stand up and walk out. The streets are crowded
with workers. Traffic is completely stopped. That day, 25,000 workers leave
their jobs. Within the next few days, the number increases to nearly 30,000.
Pinna: I can't believe it! Why, there are thousands of workers out
Malka: What a show of strength!
Chaya: With this kind of turnout, the owners will have
to make changes.
Narrator C : In the first four days of the strike, almost
half of the original 25,000 strikers win contracts for better working conditions
and return to work. Thousands of workers line up to join the union. In the union
office . . .
Mary Dreier: We're going to need publicity, so people
will know what we're trying to accomplish. We'll need money to help pay the
strikers and bail them out of jail. We'll have to get someone to organize the
picket lines. This won't be easy.
Narrator C: To raise money, the union sends powerful
speakers to wealthy women's clubs in New England and upstate New York. Pauline
Newman, a former factory worker, is one such speaker. Wealthy women raise money
for the strikers. They also build popular sympathy for the strikers by talking
to newspaper reporters. Anne Morgan, a rich heiress, speaks to editors of The
New York Times :
Anne Morgan: When you hear of a woman who presses 40
dozen skirts for only eight dollars a week, something must be wrong.
Narrator C: The striking female workers become so popular
that a song is written about them: "Heaven Will Protect the Working Girl."
Speakers also go to women's colleges.
Pauline Newman: Imagine living on six dollars a week,
sleeping on a mattress on a kitchen floor, and going hungry for weeks just to
buy a winter jacket.
Violet Pike: Why, that is terrible! I've got to find
a way to help!
Narrator C: Pike leaves Vassar College and goes to New
York City. She joins dozens of young college women who march with striking workers
in the picket line. The police are reluctant to arrest the rich girls. Pike
talks with a worker who is about to cross the picket lines and go to work in
Pike: Miss, do you really want to put these other girls
out of work? Do you want to be a scab [strikebreaker]?
Narrator C: The owner comes out of his factory and begins
Owner: You don't understand this is a cutthroat business.
We have to make our products as cheaply as possible or we won't be able to sell
them for a profit and if we don't make a profit, we don't survive.
Pike: Look at these girls! Half of them don't have the
money to buy a winter coat in December and you're saying that you won't survive?
If all the factory owners would pay a living wage, then you'd all survive!
Top of Page
Narrator D: The owners hire thugs to harass the protesters.
The police side with the owners and arrest the young women on any excuse.
Thug (to a woman on the picket line) : Hey,
keep away from me!
Narrator D: He pushes the woman against the wall.
Thug: Hey, officer, officer! She hurt my little finger.
Police officer #2: Why, that's assault!
Protester: But I didn't do anything!
Police officer #2: Oh, and now you're resisting arrest,
too? They'll teach you a lesson about how to behave in jail.
Narrator D: By Christmas, more than 700 women have been
arrested. Like the police, most of the judges are harsh with the young protesters.
Judge #1: You have no right to picket. Every time you
go down there, you will get what is coming to you and I shall not interfere.
Judge #2: You are on strike against God and nature,
whose prime law is that man shall earn his bread by the sweat of his brow.
Narrator D: Nineteen young women are jailed. The rest
are fined. Still, the strikers refuse to give in. As soon as they are set free,
most of them return to the picket lines.
Top of Page
Narrator E: As the strike drags on, the union becomes
desperate for money. There is not enough money to help many of the strikers
pay for their rent or food. Most of the $60,000 dollar strike fund is spent
on bailing young women out of jail. One day, while they are picketing, Pinna
Chaya: Oh, no! Here, let's get her into this stairwell to get warm!
Malka: Pinna, when did you last eat?
Pinna (weakly) : I had a roll yesterday. You
know, my mother is sick . . . She needs medicine.
Chaya: And here you are, out in the bitter cold!
Narrator E: Chaya reaches into her pocket and pulls
out a piece of bread.
Chaya: Here, eat this. Now let's get you home to rest.
Narrator E: On December 23, Chaya visits Pinna at home.
Chaya: I have news: The bosses and the union have worked
out a deal. We'll get shorter hours and higher wages. But the owners won't let
us keep the union. They say that half a loaf is better than none. We have to
vote on the offer. What do you think?
Pinna: If we don't keep the union, the owners can wait
a few months and change everything back to the way it was before. Our struggle
will have been for nothing!
Chaya: You're right. I'm voting no.
Narrator E: On December 27, the women vote no by a big
majority and reject the proposed agreement.
Top of Page
The strike dragged on through January 1910, during one of the
coldest winters on record. More women got sick, and the newspapers began to
lose interest. Finally, on February 15, the strike came to an end. The factory
owners agreed to improve working conditions but some of the largest employers
refused to recognize the unions. Still, the young women had much to be proud
of. They had shown that they could organize for a cause and could be as tough
and determined as men. Other strikers modeled themselves on the shirtwaist workers'
strike. A song was written about them:
Hail the waistmakers of
Making their stand on the
Breaking the power of those
Pointing the way, smashing
Victory was followed by tragedy. In 1910, a fire broke out in
the Triangle Shirtwaist
Factory in New York City. Many of the factory's doors were locked shut,
trapping workers. More than 145 people, most of them young women, were killed.
After this widely reported tragedy, many new factory-safety laws were passed.
But for those 145 workers, the laws came too late.
Adapted from Junior Scholastic, March 9, 1998
Top of Page
Back to Women's History
|
<urn:uuid:b3b0f3ae-8425-46e1-a0e3-d0f8eb56fa78>
|
CC-MAIN-2016-26
|
http://teacher.scholastic.com/lessonrepro/lessonplans/waistmaker.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783392527.68/warc/CC-MAIN-20160624154952-00013-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.961134
| 2,776
| 3.640625
| 4
|
If Transparency International's Global Corruption Barometer, published today, is to be believed, global efforts to curb corruption are failing fairly dismally. The GCB differs from the more famous Corruption Perceptions Index because it is a poll of ordinary citizens, not experts.
Asked if they thought corruption had got better or worse in the last three years, 91,000 working men and women around the world have given their emphatic response. 85% of Asians, 89% of Latin Americans, 76% of Africans, and a headline-worthy 97% of Europeans say that corruption has either stayed the same or got worse. So much for the world being on a trajectory towards the bright uplands of transparency and accountability. We appear to be moving backwards.
Those are the figures that stand out. But the fact is that corruption is not news. It is the backdrop to everyday life for much of the world.
What does it mean in real life? Well, a third of respondents under the age of 30 report paying a bribe in the past 12 months. In Sub-Saharan Africa that figure is far higher, with over a half of all respondents paying a bribe in the last 12 months. Payments to the police to get off a petty charge; payments to the hospital to get a decent bed for an ill relative; payments to the land registry to properly log a piece of land.
One in four people reported paying bribes in the last year and 29% said they had paid a bribe to the police. In Sub-Saharan Africa nearly half questioned had paid bribes to the police. In the EU the highest percentage of bribes was to Customs. The report also says political parties are the most corrupt of institutions around the world. In a scoring system ranging one to five, five meaning extremely corrupt, political parties scored 4.2 with parliament, legislature, police, public officials and civil servants following close behind.
The problem is not only that poor people are being made even poorer by a range of informal charges. The problem is that people with more money can pay bigger bribes. So you don't get that good bed after all; your child doesn't get into a decent school; your land is not registered but instead is sold off without your knowledge. Why? Because having the law on your side is not enough if you are poor and corruption is endemic.
So another year, another bribery report. Political parties are the sectors most liable to be corrupt. Still, just like in the 2007 and 2006 reports. The poor pay the most from petty bribery.
There is no obvious solution to corruption, any more than there is to theft, which is what it is. Rising living standards seem to be correlated to reduced petty corruption, with only 5% of respondents in the rich world paying bribes in the last year (note that grand corruption is a different matter). But, ultimately, human beings tend to act in ways they think they will get away with. Corruption's greatest friend is impunity. Only when law is enforced will corruption begin to ebb.
The key data is below, with perception, bribery percentages and the institutions believed to be the most corrupt. What can you do with it?
Development and aid data
World government data
Can you do something with this data?
|
<urn:uuid:db115c14-a472-4610-babc-a1d36dac0200>
|
CC-MAIN-2016-26
|
http://www.theguardian.com/news/datablog/2010/dec/09/global-corruption-index-worlwide-transparency-international
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395560.14/warc/CC-MAIN-20160624154955-00044-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.964018
| 656
| 2.875
| 3
|
A group of MIT freshmen learn laboratory techniques from Prof. John Dolhun. Image courtesy of George Zaidan.
In this section we have provided a collection of chemistry courses and resources from across MIT. Some are materials that were used to teach MIT undergraduates, while others were designed specifically for high school students.
The research and teaching in the Chemistry Department cover such topics as biological chemistry, inorganic chemistry, organic chemistry, and physical chemistry. The department is considered to be one of the strongest chemistry departments in the world.
Learn more about MIT’s Chemistry Department.
We have selected relevant material from MIT's introductory courses to support students as they study and educators as they teach the AP* Chemistry curriculum. This section is organized by the topics that you’ll see on the chemistry exam.
* AP is a registered trademark of the College Board, which was not involved in the production of, and does not endorse, this product.
The following courses have been selected to help you explore Chemistry at MIT. The first course listed below, Introduction to Solid State Chemistry (3.091SC), is in our OCW Scholar format. OCW Scholar courses are designed for study at your own pace. They contain substantially more material than typical OCW courses, blending new content with existing material used in MIT classes.
Learn more about OCW Scholar.
|» Introduction to Solid State Chemistry (3.091SC)||Prof. Donald Sadoway|
|» Principles of Chemical Science (5.111)||Prof. Catherine Drennan, Dr. Elizabeth Vogel Taylor|
|» Kitchen Chemistry (ES.287)||Dr. Patricia Christie|
|» Organic Chemistry I (5.12)||Dr. Kimberly Berkowski, Prof. Sarah O’Connor|
|» Chemical Investigations of Boston Harbor (12.097)||Dr. Elizabeth Kujawinski, Prof. Franz Hover, Dr. Sheri White|
|» Chemistry of Sports (ES.010)||Dr. Patricia Christie, Mr. Steven Lyons|
In this section, you can watch a variety of videos that highlight different aspects of chemistry at MIT.
|» ChemLab Boot Camp Reality Series||Dr. John Dolhun, MIT Students|
|» Chemistry Behind the Magic: Chemical Demonstrations for the Classroom||Dr. John Dolhun, Dr. Bassam Shakhashiri|
|» Chemistry in Action: Profiles of MIT Researchers||Prof. Jacquin Niles, Prof. Liz Nolan, Prof. Katharina Ribbeck|
|» Behind the Scenes at MIT||The Drennan Research and Education Laboratory|
Much of the work that chemists do takes place in the laboratory. Learning how to use the equipment and conduct experiments are essential skills for any future chemists to master. MIT offers several laboratory-based classes to help students learn these fundamental techniques.
|» Chemistry Laboratory Techniques (5.301)||Dr. John J. Dolhun|
|» Introduction to Experimental Chemistry (5.302)||Dr. Janet Schrenk|
|» Laboratory Chemistry (5.310)||Dr. Janet Schrenk, Dr. Mircea Gheorghiu|
The experiments described in these materials are potentially hazardous. Among other things, the experiments should include the following safety measures: a high level of safety training, special facilities and equipment, the use of proper personal protective equipment, and supervision by appropriate individuals. You bear the sole responsibility, liability, and risk for the implementation of such safety procedures and measures. MIT and Dow shall have no responsibility, liability, or risk for the content or implementation of any of the material presented. Legal Notice
|
<urn:uuid:df125eae-7dd3-48ae-a3c1-d82e59b13264>
|
CC-MAIN-2016-26
|
http://ocw.mit.edu/high-school/chemistry/index.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397562.76/warc/CC-MAIN-20160624154957-00035-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.871708
| 762
| 2.890625
| 3
|
Data security: A problem in search of a mathematical theoryThe need for security in electronic communications is crucial in today's world. The foundation for providing this security rests on mathematics. In particular, a certain kind of mathematical function called a "hash function" is central in the design of cryptographic systems that protect electronic communications. But recently the most secure hash function in use today was shown to be vulnerable to attack. An article in the upcoming issue of the Notices of the AMS describes these attacks and sends out a call for a new mathematical theory to undergird future communications security systems.
A hash function is an easy-to-compute compression function that takes as input any string of computer bits and distills that string down to a fixed-length output string: Whether the input is an 8-character password or a 100-page document, the hash function outputs a string of a fixed length. An important feature of hash functions is that they must be hard---or at least computationally too expensive---to invert. So, for example, it should be hard, given the hash of a password, to recover the password itself.
One researcher calls hash functions the "duct tape" of cryptography because they are used everywhere for many different purposes: to authenticate messages, to ascertain software integrity, to create one-time passwords, and to support Internet communication protocols. The very ubiquity of hash functions makes any vulnerability found in them a widespread concern.
SHA-1 is a secure hash algorithm (that is, a computer algorithm based on a hash function) that is the government standard and is very widely used; it was developed by the National Security Agency. Other older and even less secure hash algorithms are still in use in many applications. Cryptographers were already concerned about vulnerabilities that had been exposed in those older algorithms. But they were astonished when, at a cryptography meeting in 2005, researchers announced that they had found a way to attack SHA-1 in far fewer steps than was previously known.
For now, SHA-1 is still safe; the method announced by the researchers would take a huge amount of computational time and resources, and it is not clear how this would be carried out. But such attacks always grow more sophisticated, so cryptographers would like to replace SHA-1 as soon as possible. The NSA has a series of hash algorithms, beginning with SHA-256, that are secure; the issue is how to deploy them throughout the infrastructure.
In her Notices article "Find Me a Hash", Susan Landau describes these developments and the nature of the new vulnerability of SHA-1. Her central point is that the mathematical theory of hash functions needs much more development before researchers can come up with more secure hash algorithms for tomorrow's applications.
An advance copy of Landau's article may be found through the non-public link http://www.ams.org/staff/jackson/fea-landau.pdf. The article will appear in the March 2006 issue of the Notices of the AMS (http://www.ams.org/notices).
Founded in 1888 to further mathematical research and scholarship, the more than 30,000-member American Mathematical Society fulfills its mission through programs and services that promote mathematical research and its uses, strengthen mathematical education, and foster awareness and appreciation of mathematics and its connections to other disciplines and to everyday life.
American Mathematical Society
201 Charles Street
Providence, RI 02904
Last reviewed: By John M. Grohol, Psy.D. on 30 Apr 2016
Published on PsychCentral.com. All rights reserved.
|
<urn:uuid:30f59bb7-7800-41ec-a3f9-e4605935482b>
|
CC-MAIN-2016-26
|
http://psychcentral.com/news/archives/2006-02/ams-dsa020106.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397695.90/warc/CC-MAIN-20160624154957-00031-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.944397
| 733
| 3.328125
| 3
|
So, lets get started!!!
Relationship between Project, Program and Portfolio:
As a project manager, you should know the basic concepts of program and portfolio and how they are related to each other and to projects. A program may be a part of a higher-level program; it certainly contains some interrelated projects, and it may contain some non-project work as well. Program management focuses on optimally managing the interdependencies among the various projects in the program. The person who manages a program is called the Program Manager.
The program manager’s responsibilities are:
• Prioritize to resolve resource conflict and constraints that affect multiple projects within his program.
• Keep your priorities aligned with the strategic goals and objectives of the organization.
• Resolve issues and manage change within the governance structure of the organization.
Just like a project is managed by a project manager, a program is managed by a program manager, who oversees the projects and provides high-level guidance to the project managers. In other words, a program manager oversees projects and coordinates efforts between projects but does not manage the projects.
Why is that?
That is because; we the project managers are managing our projects!!!
A portfolio contains both programs and projects and is managed by a portfolio manager. The portfolio is drawn directly from the strategic business plan of the organization.
The strategy of an organization is an action plan to achieve its business goals and objectives. It’s also called a strategic plan or a strategic business plan. The strategy determines the portfolio of projects and programs that the organization will execute. A portfolio is a set of projects, programs, or both that is managed in a coordinated fashion to obtain control and benefits not available from managing them individually.
What is Portfolio Management?
Portfolio management is the centralized management of one or more portfolios, and it includes identifying, prioritizing, authorizing, managing, and controlling projects, programs, and other related work in order to obtain specific strategic business objectives of the organization. Just as a program is managed by a program manager, a portfolio is managed by a portfolio manager.
To understand the relationship between these 3 entities, projects, programs and portfolios we need to understand that:
• If an organization does not have any programs but has only individual projects, all these projects can be grouped into one or more portfolios.
• If an organization has programs and no individual project external to all programs, all these programs can be grouped into one or more portfolios.
• If an organization has some programs and some individual projects, all these programs and projects can be grouped into one or more portfolios.
Portfolio management focuses on making sure that programs and projects are prioritized for resources to serve the organization’s strategy. In simpler terms, a portfolio manager worries about the success of the whole strategy put forth by the organization rather than the success of a single project (like what we do)
Therefore, investment decisions are usually made at the portfolio level. Program management focuses on achieving the benefits that would be aligned with the portfolio and hence with the strategic objectives of the organization. So, a portfolio is part of the interface between the programs and strategic business objectives of the organization for which the programs are run.
The relationship between these 3 entities is better explained by the picture below:
As you can see in the picture above, a portfolio is composed of projects, programs or both. And a program consists only of projects.
When compared to projects and programs, a portfolio is closer to an organization’s business objectives, and therefore this is where most of the investment decisions are made.
It’s also important to note that an operation is not part of a project. However, a program can include a non-project work. Similarly, a portfolio can also include work that is not included in any of its constituent projects and programs.
Let us wrap up this chapter with a comparison between projects, programs and portfolios.
Comparison between a Project, a Program, and Portfolio
|Definition||A limited set of efforts (work) to create a unique product, service, or results.||A group of related projects and possibly some related work that does not belong to any project.||A collection of projects, programs, and other related work.|
|Change||Project manager expects change and implements processes to manage and control it.||Program manager must expect changes from both inside and outside the program and thrive on them if they help maximize the strategic benefits and objectives of the program.||Portfolio manager continually monitors changes in the broader context of the strategic plan of the organization.|
|Management||Project manager manages or coordinates the project team to lead the project to its success.||Program manager manages the program staff and the project managers and provide overall leadership, including vision.||Portfolio manager may coordinate or manage the portfolio management staff.|
|Monitoring||Project manager monitors and controls the project activities (tasks) undertaken to produce the planned products, results, or services of the project.||Program manager monitors the progress of program components, including projects and program-related non-project work, to lead the program to success, which means overall goals and benefits will be achieved within the planned budget and schedule.||Portfolio manager manages the aggregated portfolio performance and value indicators.|
|Planning||Project manager develops, monitors, and controls project plans from high-level information throughout the project lifecycle by using progressive elaboration.||Program manager develops the program plan and performs high-level planning to provide guidance at component-level planning, such as project planning.||Portfolio manager performs planning at the portfolio level, which includes developing and executing necessary processes, including communication.|
|Scope||At a given time, a project has a scope limited to meeting its objectives, including delivering the planned product. The scope is developed and monitored and controlled throughout the lifecycle of the program by using progressive elaboration.||A program has a wider scope dedicated to meeting the benefits in context of the strategic goals of the organization.||A portfolio has a business scope that changes with the change in the strategic plan and goals of the organization.|
|Success||Success relates to the project and is measured generally by the criteria of completing the project within the planned budget, cost, and scope. The degree of customer satisfaction is another parameter to measure success.||Success relates to the overall program and is measured in terms of benefit delivery expected from the program.||Success relates to the overall portfolio performance, which is an aggregated performance of all of its components: programs and projects.|
Previous: Environmental Factors & Process Assets
Next: Other Terms Related to Project Management
|
<urn:uuid:840b5b01-b407-40d1-b8fb-d4c824b000da>
|
CC-MAIN-2016-26
|
http://getpmpcertified.blogspot.com/2011/05/chapter-13-relationship-between-project.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395620.9/warc/CC-MAIN-20160624154955-00051-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.944207
| 1,362
| 2.65625
| 3
|
Choosing nutritious foods can help you keep fit and strong and may prevent some diseases. Here you will find information about healthy eating for older people.
The Food Pyramid
Enjoying food is important at any age and by making healthy food choices now your body will get the vitamins and minerals you need to stay healthy, even if you don’t eat as much food as you used to.
The Food Pyramid is a nutrition guide that shows you the foods you should eat plenty of and those you should eat less frequently to maintain optimal health. It recommends daily amounts of each food type and suggests options you can try to keep your daily diet varied and interesting, so you can continue to enjoy your food.
Below is a list of the different food categories in the food pyramid, starting at the top and working down to the bottom. It is recommended that you eat more of the nutritious foods listed at the bottom of the pyramid than foods grouped at the top, as these are higher in fats and sugars and are less nutritious.
Fats, sugary snacks and alcohol
Choose very small amounts of the following:
- Fats and oils – use a small amount daily
- Sugars, confectionary, cakes, biscuits and high fat snack foods – an occasional treat
- Alcohol – if you drink alcohol, drink sensibly and preferably with meals.
Meat, fish, eggs and alternatives
Choose any two of the following each day:
- 2oz cooked lean meat or poultry
- 3oz cooked fish
- 2 eggs (not more than 7 per week)
- 6 tablespoons cooked peas/beans
- 2oz cheddar type cheese
- 3oz nuts.
Milk, cheese and yoghurt
Choose any three of the following each day:
- 1 cup of milk
- 1 carton of yoghurt
- 1oz cheddar cheese or blarney/edam cheese.
*Choose low fat choices frequently if you are watching your weight.
*Tasty tips - milk on cereal or porridge, cheese on toast, custard, rice or milk pudding, milky hot chocolate or malted drinks.
Fruit & vegetables
Choose four or more of the following each day:
- ½ glass of fruit juice
- 2 tablespoons of cooked vegetables or salad
- Small bowl of homemade vegetable soup
- 1 medium-sized piece of fresh fruit
- Small bowl of cooked or tinned fruit.
*Choose citrus fruits frequently.
Bread, cereals and potatoes
Choose six or more of the following each day:
- 1 bowl of breakfast cereal
- 1 slice of bread
- 2 tablespoons of cooked pasta/rice
- 1 medium potato – boiled or baked.
*Choose high fibre cereals and breads frequently.
*You need at least six servings each day.
What is a serving?
- Each choice recommended in the above lists is the equivalent of one serving.
- An average portion of meat, fish or poultry is about the size of a small pork chop.
Your daily diet
High fibre foods are important for good health. Eating more foods rich in fibre helps prevent constipation and to safeguard against other bowel problems.
Daily fibre guide:
- Having a high fibre cereal for breakfast each morning
- Try to use 100 per cent wholemeal bread
- Choose at least two vegetables each day
- Have one-two pieces of fruit each day
- Try to eat peas and beans regularly.
High fibre snacks:
- Baked beans on wholemeal toast
- Vegetable or lentil soup and wholemeal bread
- Mixed dried fruit and nuts
- Wholemeal scone and jam
- Stewed prunes and custard
- Breakfast cereals such as Bran Flakes or Weetabix and milk.
*All stewed fruit is a good source of fibre.
*Nuts are not a good form of fibre.
Drink six to eight cups of fluid every day, including water, milk, tea and fruit juice. A good fluid intake is important, especially if you are eating more fibre rich foods.
All parts of your body need oxygen and this is carried in the blood by iron. Good dietary sources of iron include:
- Meat, fish and offal (liver, heart, kidneys)
- Green leafy vegetables, peas, beans and fortified cereals
Foods rich in vitamin C, such as orange juice, will help your body to absorb more iron when taken with iron-rich food.
Vitamin D helps the body to absorb calcium from foods. It is needed to maintain healthy bones and is made by the action of sunlight on the skin.
But as people age, the skin is less able to produce it, so older people need to eat foods rich in vitamin D or take a vitamin D supplement.
Foods rich in vitamin D include oily fish, milk with added vitamin D, margarine, eggs and liver.
- Enjoy a wide variety of foods
- Eat at least six servings of bread, cereals and potatoes
- Eat five or more servings of fruit and vegetables.
- Make meal times social events
- Join others for meals or start your own lunch club
- If you get full quickly, eat little and often
- Take as much exercise as you can, out of doors if possible – always check with your doctor before starting a new exercise routine.
Choose lean for better health…
- Trim the fat from meat and the skin from poultry before you eat it
- Once trimmed, cheaper cuts of meat are as nutritious as expensive ones
- Chicken portions can be economical as there is no waste.
Choose fish more often…
- Fish is quick to prepare, cook and is easy to digest
- Try eating oily fish – rich in Vitamin D – twice a week
- Oily fish is rich in Omega-three fatty acids, which are good for your heart
- Try fresh, vacuum-packed or tinned tuna, mackerel, herring, sardines, salmon.
- Try two eggs instead of one serving of meat, poultry or fish for a main meal
- Eggs can be scrambled, boiled, poached or occasionally fried in a little oil.
Don’t forget your dairy foods…
- Bones of all ages need calcium
- Choose dairy products such as milk, yoghurt or cheese
- Eat three servings of dairy food per day.
Spice it up…
- Taste food before adding flavourings
- Try herbs, spices and pepper instead of salt.
Note:If you have a medical condition such as diabetes, some of the information here will not be suitable for you. Contact your doctor or dietician for advice on your diet.
|
<urn:uuid:9c77c586-c9a6-4885-9cb0-cf612c9dee0e>
|
CC-MAIN-2016-26
|
http://www.hse.ie/eng/services/list/4/olderpeople/tipsforhealthyliving/healthyeating.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397562.76/warc/CC-MAIN-20160624154957-00071-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.931555
| 1,387
| 3.109375
| 3
|
A new study shows that children who are exposed to bullying during childhood are at increased risk of psychiatric disorders in adulthood, regardless of whether they are victims or perpetrators.
Professor William E. Copeland of Duke University Medical Center and Professor Dieter Wolke of the University of Warwick led a team in examining whether bullying in childhood predicts psychiatric problems and suicidality in young adulthood. While some still view bullying as a harmless rite of passage, research shows that being a victim of bullying increases the risk of adverse outcomes to mental health.
This study, published in Online First by JAMA Psychiatry, looked beyond the victims of bullying and also investigated the impact on the bullies themselves, and those who fall into both categories.
Professor Wolke summarised the outcome of the study, "It is clear that those involved in bullying are at an increased risk for emotional disorders in later life. It is those in the middle of the chain, who are both bullies and victims, who are at the highest risk of suicide."
The results indicate a clear pattern in the three categories that highlights the extent of the influence that childhood bullying can have.
Victims of bullying displayed a higher prevalence of agoraphobia, general anxiety and panic disorder in young adulthood, whereas bullies showed a tendency to develop an antisocial personality disorder. Those who were both bullies and victims were significantly more likely to suffer from depression, panic disorder, agoraphobia (in females only) and suicidal tendencies (in males only).
Professor Wolke explained "Bullying simply cannot be seen as a harmless, inevitable part of growing up. Bullying can be easily assessed and monitored by health professionals and school personnel, and effective interventions that reduce victimization are already available.
"Understanding the impact of bullying on both the individual, whether victim or perpetrator, and on society as a whole, means we must promote such interventions to help reduce human suffering and provide a safer environment for children to grow up in."
The research assessed 1,420 participants four to six times between the ages of 9 and 16 years and accounted for the influence of childhood psychiatric problems and family hardships.
|Contact: Luke Harrison|
University of Warwick
|
<urn:uuid:e3050e75-1ddd-476b-8383-3514e5ab0f43>
|
CC-MAIN-2016-26
|
http://www.bio-medicine.org/medicine-news-1/The-long-shadow-cast-by-childhood-bullying-on-mental-health-in-adulthood-100542-1/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783408840.13/warc/CC-MAIN-20160624155008-00060-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.94966
| 438
| 3.0625
| 3
|
10. Begin upon this principle in childhood, and act upon it through life, and you will make yourself happy, and promote the happiness of all within your influence.
11. You go to school on a cold winter morning. A bright fire is blazing upon the hearth, surrounded with boys struggling to get near it to warm themselves. After you get slightly warmed, another school-mate comes in, suffering with cold. “Here, James,” you pleasantly call out to him, “I am almost warm; you may have my place.”
12. As you slip aside to allow him to take your place at the fire, will he not feel that you are kind? The worst dispositioned boy in the world cannot help admiring such generosity.
13. And even though he be so ungrateful as to be unwilling to return the favor, you may depend upon it that he will be your friend as far as he is capable of friendship. If you will habitually act upon this principle, you will never want friends.
14. Suppose, some day, you were out with your companions, playing ball. After you had been playing for some time, another boy comes along. He cannot be chosen upon either side, for there is no one to match him. “Henry,” you say, “you may take my place a little while, and I will rest.”
15. You throw yourself down upon the grass, while Henry, fresh and vigorous, takes your bat and engages in the game. He knows that you gave up to accommodate him; and how can he help liking you for it?
16. The fact is, that neither man nor child can cultivate such a spirit of generosity and kindness, without attracting affection and esteem.
17. Look and see which of your companions have the most friends, and you will find that they are those who have this noble spirit,—who are willing to deny themselves, that they may make their associates happy.
18. This is not peculiar to childhood. It is the same in all periods of life. There is but one way to make friends; and that is, by being friendly to others.
19. Perhaps some child, who reads this, feels conscious of being disliked, and yet desires to have the affection of his companions. You ask me what you shall do. I will tell you.
20. I will give you an infallible rule. Do all in your power to make others happy. Be willing to make sacrifices of your own convenience, that you may promote the happiness of others.
21. This is the way to make friends, and the only way. When you are playing with your brothers and sisters at home, be always ready to give them more than their share of privileges.
22. Manifest an obliging disposition, and they cannot but regard you with affection. In all your intercourse with others, at home or abroad, let these feelings influence you, and you will receive a rich reward.
Obedience and Disobedience.—CHILD’S COMPANION.
|
<urn:uuid:f71478e2-ff5a-4be2-a2d4-5b842109f544>
|
CC-MAIN-2016-26
|
http://www.bookrags.com/ebooks/16936/46.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396538.42/warc/CC-MAIN-20160624154956-00009-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.968648
| 633
| 3.03125
| 3
|
This species qualifies as Endangered because it has a very small range, which is severely fragmented, and in decline.
del Hoyo, J.; Collar, N. J.; Christie, D. A.; Elliott, A.; Fishpool, L. D. C. 2014. HBW and BirdLife International Illustrated Checklist of the Birds of the World. Barcelona, Spain and Cambridge UK: Lynx Edicions and BirdLife International.
Antrostomus noctitherus (del Hoyo and Collar 2014) was previously placed in the genus Caprimulgus.
Caprimulgus noctitherus (Wetmore, 1919)
Distribution and populationCaprimulgus noctitherus
22 cm. Mottled grey, brown and black nightjar. Black throat bordered by white band. White in outertail. Female similar, but buff throat-band and outertail. Similar spp. Chuck-will's-widow C. carolinensis (northern migrant in winter) is larger, more reddish and has less white in tail. Antillean Nighthawk Chordeiles gundlachii has distinctive white patch in wing. Voice Sequence of emphatic whistles whip whip whip ... (between 2-15 notes, males may also sing continuously for several minutes with up to 160 notes).
probably formerly occupied large areas of Puerto Rico (to U.S.A.)
, but its current distribution was recently thought to be restricted to the south-west, notably Susúa-Maricao, Guayanilla-Peñuelas and Guánica-Bermeja. However, recent survey work confirms that its range extends from Ponce through south-central Puerto Rico to Guayama province in the south-east (Vilella and González 2009). There are further recent records from the Parguera Hills and Sierra Bermeja, c.10 km west of Parguera. Studies in 1985-1987, 1989-1990 and 1992 found 712 singing males in 98 km2
of fragmented habitat, with 347 in the Guánica area, 177 in the Susúa-Maricao area and 188 in the Guayanilla area. The population was consequently estimated at 1,400-2,000 individuals, which is similar to the 1984 population estimate of 670-800 pairs (Vilella and Zwank 1993a). Population justification
The estimate of 930-1,300 mature individuals (roughly equivalent to 1,400-2,000 individuals in total) was estimated based on 712 calling males found within 66% of the suitable habitat within its known range.Trend justification
This species's population is suspected to be in decline owing to the continued loss and degradation of its habitat for residential, industrial and recreational development, amongst other related and unrelated threats. Ecology
The historical range probably comprised moist limestone and coastal forest in northern Puerto Rico, as well as currently occupied dry limestone forest, drier sections of the lower cordillera forest and perhaps dry coastal forest. It is presently more abundant in closed canopy dry forest on limestone soils, composed mainly of semi-deciduous hardwood trees with abundant leaf litter and an open understorey (little or no ground vegetation) at elevations up to 620 m, but more commonly above 75 m. It occurs at lower densities in dry, open, scrubby secondary growth, xeric or dry scrubland, open scrub-forest and thorny forest undergrowth, with a few birds in Eucalyptus robusta
plantations (Cleere and Nurney 1998). Breeding occurs between late February and early July, mainly between April and June (Vilella 1995). Nests are common at elevations above 100 m and are characterised by a deep layer of leaf litter and an open midstorey beneath a closed canopy (Vilella 2008). Birds are perhaps permanently territorial, exhibiting strong interannual site fidelity. In Guánica forest, c.87% of nests in one year produced at least one fledgling (Vilella 1995). It feeds on beetles, moths and other insects (Cleere and Nurney 1998). Threats
The introduction of the mongoose in 1877 may have contributed to the initial drastic population decline (there are no data on what the initial effect was), but the differing habitat preferences of the two species suggests very little overlap in their current ranges (Vilella and Zwank 1993b). Habitat loss and degradation now have more significant impacts, especially from residential, industrial and recreational expansion, with concomitant increases in disturbance and fire risk (Vilella 1995). Grass fires started by local people occasionally spread to adjacent forest, with fires that occur during periods of low rainfall being particularly damaging (S. A. Colón López in litt.
2011). A proposed windfarm development in the Karso del Sur IBA has the potential to wipe out 5% of the total breeding population (Anon. 2007). Young birds are predated by Short-eared Owl Asio flammeus
, and young and eggs may be predated by Pearly-eyed Thrasher Margarops fuscatus
, fire-ants and feral cats (Cleere and Nurney 1998). The proposed construction of a natural gas pipeline in the Guayanilla Hills would create significant disturbance to breeding nightjars and destroy and fragment tracts of the species's habitat (C. A. Delannoy in litt.
2012).Conservation Actions Underway
It is legally protected. Guánica, Susúa and Maricao are public lands designated as state forests, and Guánica is a biosphere reserve. The Conservation Trust of Puerto Rico has acquired lands in the Guayanilla-Peñuelas region; this area includes mature dry forest where nightjars are abundant. The latter constitutes the only protected nightjar habitat in this portion of its range. The population is surveyed regularly and spatial analysis is being used to identify areas of potentially suitable habitat for protection and examine changes in habitat cover over time (F. J. Vilella in litt.
2007). As part of BirdLife International's Preventing Extinctions Programme the Sociedad Ornitológica Puertorriqueña, Inc. have been designated as Species Guardian and have produced a revised species action plan in collaboration with the U.S. Fish and Wildlife Service. A survey of occupancy of habitat in order to establish current range was carried out by Mississippi State University between March and May 2009 (Vilella and González 2009). The priority conservation actions identified by the species action plan will be implemented through a newly-established Puerto Rican Nightjar Conservation Network and facilitated by the Species Guardian. Conservation Actions Proposed
Survey to identify additional areas for protection, particularly in the newly-established regions of its range in south-central and south-eastern Puerto Rico. Assess population size in newly-established regions of its range. Monitor to assess population trends and the effects of management. Study movements and dispersal patterns. Research breeding biology and life history parameters to develop population models and enable use of population viability analyses. Effectively conserve existing reserves. Reforest disturbed areas with native and selected plantation species. Acquire privately owned tracts of mature dry limestone forest (Vilella 1995). Lobby for priority site conservation through existing initiatives and site support groups (Vilella and González 2009). Create a new dry forest reserve in the Guayanilla Hills (González 2010).
Related state of the world's birds case studies
Cleere, N.; Nurney, D. 1998. Nightjars: a guide to nightjars and related nightbirds. Pica Press, Robertsbridge, U.K.
Collar, N. J.; Gonzaga, L. P.; Krabbe, N.; Madroño Nieto, A.; Naranjo, L. G.; Parker, T. A.; Wege, D. C. 1992. Threatened birds of the Americas: the ICBP/IUCN Red Data Book. International Council for Bird Preservation, Cambridge, U.K.
González, R. G. 2010. Population estimation and landscape ecology of the Puerto Rican Nightjar. Department of Wildlife, Fisheries and Aquaculture, Mississippi State University.
Noble, R. E.; Vilella, F. J.; Zwank, P. J. 1986. Status of the endangered Puerto Rican Nightjar in 1985. Caribbean Journal of Science 22: 137-143.
Vilella, F. J. 1995. Reproductive ecology and behaviour of the Puerto Rican Nightjar Caprimulgus noctitherus. Bird Conservation International 5: 349-366.
Vilella, F. J. 2008. Nest habitat use of the Puerto Rican Nightjar (Caprimulgus noctitherus) in Guánica Biosphere Reserve. Bird Conservation International 18(4): 307-317.
Vilella, F. J., and R. González. 2009. Geographic distribution of the Puerto Rican Nightjar: a patch occupancy approach. Final report, Cooperative Agreement 011406-001. . USGS Cooperative Research Unit, Mississippi State University., Mississippi State, Mississippi.
Vilella, F. J.; Zwank, P. J. 1993. Ecology of the small indian mongoose in a coastal dry forest of Puerto Rico where sympatric with the Puerto Rican Nightjar. Caribbean Journal of Science 29((1-2)): 24-29.
Vilella, F. J.; Zwank, P. J. 1993. Geographic distribution and abundance of the Puerto Rican Nightjar. Journal of Field Ornithology 64: 223-238.
Further web sources of information
Detailed species account from the Threatened birds of the Americas: the BirdLife International Red Data Book (BirdLife International 1992). Please note taxonomic treatment and IUCN Red List category may have changed since publication.
Detailed species account from the Threatened birds of the Americas: the BirdLife International Red Data Book (BirdLife International 1992). Please note, taxonomic treatment and IUCN Red List category may have changed since publication.
Explore HBW Alive for further information on this species
Recuento detallado de la especie tomado del libro Aves Amenazadas de las Americas, Libro Rojo de BirdLife International (BirdLife International 1992). Nota: la taxonomoía y la categoría de la Lista Roja de la UICN pudo haber cambiado desde esta publicación.
Search for photos and videos, and hear sounds of this species from the Internet Bird Collection
Species Guardian Action Update
Text account compilers
Benstead, P., Bird, J., Butchart, S., Calvert, R., Capper, D., Sharpe, C J, Symes, A., Taylor, J., Wege, D., Khwaja, N.
Colón López, S., Vilella, F., Delannoy, C., Cleere, N.
IUCN Red List evaluators
Butchart, S., Symes, A.
BirdLife International (2016) Species factsheet: Antrostomus noctitherus. Downloaded from
http://www.birdlife.org on 01/07/2016.
Recommended citation for factsheets for more than one species: BirdLife International (2016) IUCN Red List for birds. Downloaded from
http://www.birdlife.org on 01/07/2016.
This information is based upon, and updates, the information published in BirdLife International (2000)
Threatened birds of the world. Barcelona and Cambridge, UK: Lynx Edicions and BirdLife International, BirdLife International (2004)
Threatened birds of the world 2004 CD-ROM and BirdLife International (2008) Threatened birds of the world 2008 CD-ROM. These sources provide the information for species accounts for the birds on the IUCN Red List.
To provide new information to update this factsheet or to correct any errors, please email BirdLife
To contribute to discussions on the evaluation of the IUCN Red List status of Globally Threatened Birds, please visit BirdLife's Globally Threatened Bird Forums.
|
<urn:uuid:59725e9d-9b0a-4174-b32a-f218e491b512>
|
CC-MAIN-2016-26
|
http://www.birdlife.org/datazone/species/factsheet/22689809
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783403502.46/warc/CC-MAIN-20160624155003-00082-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.833613
| 2,588
| 2.71875
| 3
|
Performance-Based Teacher Evaluation in Missouri: A Three-Year Report
Metadata[+] Show full item record
The teacher performance evaluation, mandated in Missouri by a bill that legislators enacted during 1983, is a process for professional development through the identification and documentation of job related expectations and skills, and an opportunity to improve skill and job related decisionmaking. To determine the degree of implementation and the impact of performance evaluation procedures across the state, in 1986 one half of Missouri's superintendents were mailed a four-page survey. Usable responses were received from 219 of the 272 districts selected. Results indicate that: (1) by the 1985-86 school year, 98 percent of the districts used a performance-based teacher evaluation (PBTE) system; (2) committees of teachers and administrators were used 52 percent of the time for PBTE system development and implementation; (3) essentially identical systems to the state PBTE model were used by 85 percent of the respondents; and (4) the majority of the respondents believed that PBTE will help improve instruction and student achievement over the next five years.
Performance-Based Teacher Evaluation in Missouri: A Three Year Report. Study prepared for the Missouri Department of Elementary and Secondary Education, Jefferson City, Missouri, 1988. ED 311 588, EA 021 364 (Jerry Valentine with Roger D. Harting).
|
<urn:uuid:6cb7cf42-5670-4078-b3a1-53c3bfba6bf2>
|
CC-MAIN-2016-26
|
https://mospace.umsystem.edu/xmlui/handle/10355/3707
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395548.53/warc/CC-MAIN-20160624154955-00117-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.925596
| 274
| 2.765625
| 3
|
In Ancient China, my ancestors formulated a good way of teaching: They did not ask learners to jump to study, instead, they asked their students to prepare to learn. Preparation takes many years before learners are able to learn. Preparation includes learners straighten up their attitudes and build up humble attitudes. In other words, Preparation is to teach learners to be virtuous first. Then once the quality is established, then learners learn various kinds of knowledge based on their interests. Overall, nobody can teach learners who are not sincere in pursuing knowledge. If a horse does not want to drink water, then it is useless to force the horse to drink. A horse trainer will let the horse thirsty before lead it to bank of water. Education should do the same thing!
|
<urn:uuid:cc196b3c-5b93-4f01-8bfa-e47871dfccb1>
|
CC-MAIN-2016-26
|
http://mathforum.org/kb/message.jspa?messageID=7919948
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396945.81/warc/CC-MAIN-20160624154956-00173-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.966859
| 153
| 2.609375
| 3
|
This 2 part expository study of Philemon was preached at Flagstaff Christian Fellowship in 2007. Audio and manuscripts are available for each lesson.
The story is told of two brothers, convicted of stealing sheep, who were branded on the forehead with the letters ST, to indicate “sheep thief.” One brother couldn’t bear the stigma. He became bitter and moved away, never to return.
The other brother chose a different course. He said, “I can’t run from what I did, so I’ll stay here and win back the respect of my neighbors.” As the years passed, he built a solid reputation for integrity. One day a stranger saw him, now an old man, with the letters still on his forehead. He asked a townsman what they signified. “It happened a long time ago,” said the villager. “I’ve forgotten the particulars, but I think the letters are an abbreviation for ‘saint’” (adapted from “Our Daily Bread,” Aug., 1982).
Although there is no mention in the story that the cause of the thief’s transformation was the gospel, it illustrates how the gospel does in fact change everyone that it saves. As Paul wrote (2 Cor. 5:17), “Therefore if anyone is in Christ, he is a new creature; the old things passed away; behold, new things have come.” “But thanks be to God that though you were slaves of sin, you became obedient from the heart to that form of teaching to which you were committed, and having been freed from sin, you became slaves of righteousness” (Rom. 6:17-18). These verses state what the story of Philemon and Onesimus illustrates, that…
God changes every person whom He saves through the gospel.
Philemon is Paul’s shortest and most personal letter, written during his first imprisonment in Rome. Philemon, the main recipient of the letter, was a wealthy man from Colossae, near Laodicea, about 100 miles inland from Ephesus, which was on the west coast of modern Turkey. The letter was also addressed to Apphia, who was probably Philemon’s wife; to Archippus, who may have been the pastor of the church there (some think he was the son of Philemon and Apphia); and to the entire church that met in Philemon’s house. (There is no record of a church building until the third century.) Paul had not visited Colossae, although he hoped to do so soon (v. 22). But somehow, perhaps during Paul’s ministry in Ephesus, he had come into contact with Philemon and led him to Christ (v. 19).
Being wealthy, Philemon owned slaves. The New Testament never directly attacks the institution of slavery. If it had done so, as one author points out, “Christianity would have sunk beyond hope of recovery along with such revolutionary attempts; it might have brought on a new slave rising and been crushed along with it” (W. Bousset, cited by R. P. Martin, Zondervan Pictorial Encyclopedia of the Bible [Zondervan], ed. by Merrill C. Tenney, 4:755). But, as F. F. Bruce pointed out, “What this epistle does is to bring us into an atmosphere in which the institution could only wilt and die” (ibid.).
One of Philemon’s slaves was named Onesimus. He had stolen from his master and run away. In the Roman Empire, masters had absolute authority over slaves and they often tortured or killed them for minor offenses or mistakes. So Onesimus was a fugitive slave, under a capital offense.
In his travels, God providentially led Onesimus all the way to Rome, where he crossed paths with the apostle Paul. We don’t know whether he was imprisoned with Paul for a time or how they met. But the Hound of Heaven was pursuing Onesimus! Although he had undoubtedly heard the gospel in Philemon’s household, he ran from the place where he easily could have been saved. He traveled hundreds of miles to a large city where he “happened” to meet Paul. When Paul shared the gospel, God opened Onesimus’ heart and he trusted in Christ. He then stayed with Paul and the two men formed a close relationship as Onesimus served Paul (vv. 10-13).
In time, as Onesimus grew in the faith through Paul’s teaching, he realized that he needed to return to his master and make restitution for the crimes that he had committed. The fact that we have this letter to Philemon is proof of the genuine nature of Onesimus’ conversion. If he had been a false convert, he would have taken off for some other hiding place and never returned to Philemon. This short letter is Paul’s appeal to his friend, Philemon, and to the entire church, to welcome back this runaway slave, not as a second-class citizen, but as a beloved brother in Christ.
Paul’s task was not easy. He had to convince a man and an entire church that was immersed in the cultural acceptance of slavery to set aside that cultural viewpoint and to practice the Christian truth that all people are equal in Jesus Christ (Col. 3:11 also enforces this). This would be like trying to convince a slave owner and a white church in the South before the Civil War to accept a returning runaway black slave as a member in full standing! Paul could have asserted his apostolic authority, but he wanted to secure Philemon’s obedience from the heart. While not denying Onesimus’ crime, Paul wanted Philemon, his wife, and the entire church to forgive him completely. He wanted mercy to triumph over raw justice. He also wanted to leave the door open for Philemon to free his slave, so that perhaps Onesimus would choose to return to Rome and continue his ministry to Paul.
There are several ways to approach this letter. Next time I want to examine it for what it teaches us about the art of good relationships. But today, rather than giving a detailed, verse-by-verse exposition, I want to focus on how God changes us through the power of the gospel: He changes our character, our relationships with others, and our relationship with Him.
Everyone in this story is behaving differently than he would have before meeting Jesus Christ. These changes are not automatic or this letter would not have needed to be written. They require constant, lifelong work. I will limit myself to Paul and Onesimus:
This letter oozes with Paul’s gentleness, graciousness, and sensitivity. In verses 4-7, he commends Philemon in a loving and gracious manner, describing how his own heart has come to have much joy and comfort in Philemon’s love. He goes on to appeal to him as a brother in Christ (vv. 8, 10), urging Philemon (v. 17), “If then you regard me a partner, accept him as you would me.” He gently adds (v. 20), “Yes, brother, let me benefit from you in the Lord; refresh my heart in Christ.”
You may be thinking, “Yes, of course, this is the apostle Paul. What do you expect?”
But you may be forgetting what Paul was like before he met Christ. When the Jews stoned the innocent Stephen, Paul watched this gruesome spectacle in hearty agreement (Acts 8:1). Then he “began ravaging the church, entering house after house, and dragging off men and women, he would put them in prison” (Acts 8:3). He was “breathing threats and murder against the disciples of the Lord” (Acts 9:1). He describes himself during this time as being “a blasphemer and a persecutor and a violent aggressor” (1 Tim. 1:13). He wasn’t a nice man! To call him an angry young man would be an understatement. But, here he is, about 25 years later, a gentle, humble, gracious man, urging others to love and kindness.
Don’t miss Paul’s mention of Mark as one of his fellow workers (v. 24). On the first missionary journey, Mark had abandoned Paul and Barnabas. Later, when Barnabas wanted to give Mark a second chance, Paul adamantly refused, leading to a split between these two men of God. Barnabas took Mark and worked with him until Mark became a faithful man of God. As Paul grew in grace and gentleness, he came to see Mark as useful for service (2 Tim. 4:11). Paul’s change of heart towards Mark shows how God changed the apostle over the years as the fruit of the Spirit grew in his life.
Maybe before you met Christ, you were an angry person. You had a reputation for having a short fuse. But, as you learn to walk in the Spirit, not the flesh, you should see “love, joy, peace, patience, kindness, goodness, faithfulness, gentleness, and self-control” (Gal. 5:22-23) replacing outbursts of anger and arguments (Gal. 5:20). You learn to put off the sinful ways of the old man and put on the godly ways of the new man in Christ.
Onesimus had not been a Christian as long as Paul had been, but there were already some major changes in his character. Formerly, he had grudgingly served Philemon, doing only the bare minimum, and stealing everything he could as he looked for an opportunity to escape. But now in submission to the Lord, he returns to his master, ready and willing to render whatever service is required of him. Formerly, Paul says that Onesimus, whose name means “useful,” was useless to Philemon (v. 11). He was not a good worker. But now, he truly lives up to the meaning of his name, both to Philemon and to Paul.
This can only mean that God had changed Onesimus’ attitude. Before, he resented his lot in life as a slave. He hated his master and he hated his master’s God. But now, he was in submission to God to the extent that he was willing to give up his freedom, go back and place himself under his master’s authority. Instead of being a surly, angry slave, he now was a helpful, cheerful servant. God had changed Onesimus’ attitude through the gospel.
Has He changed your attitude? Teenager, has God changed you from grumbling and snapping at your parents to cheerful compliance from the heart as you seek to please them? Men and women, has God changed the way that you act on the job? Before, you did the bare minimum to keep your job, grumbling with other employees about the way the management treated you. Now, you excel with a joyful spirit of obedience, doing your job as unto the Lord. At home, before you met Christ, you were selfish and insensitive, exploding in anger if the rest of the family didn’t do things your way. Now, you are patient and kind towards them. You think about their needs and seek to serve them.
About fifty years after Paul wrote this letter, Ignatius, the bishop of Antioch, was being taken to execution in Rome. At a stopover in Smyrna, he wrote to the church of Ephesus and commended their bishop, whose name was Onesimus (Apostolic Fathers [Harvard University Press], translated by Kirsopp Lake, 1:166, 175). While we cannot positively identify him as the once-runaway slave, it is possible that God used this once useless slave in a mighty way as a servant of His church (see, also, William Barclay, The Letters to Timothy, Titus, and Philemon [Westminster Press], rev. ed., p. 275). If God has saved you, He changes your character to make you useful in His service.
This is an extension of changed character, of course. When you change from being hostile to gentle, from rebellious to submissive, and from being self-serving to serving others, it is bound to affect your relationships. Philemon illustrates two basic relational changes:
When Onesimus absconded with Philemon and Apphia’s money and some of their personal belongings, they were no doubt angry. They probably complained, “After the nice way that we treated him, he ripped us off! That ungrateful wretch!” And, Onesimus probably didn’t have the warm fuzzies when he thought about Philemon and Apphia. “They live in ease and luxury while we slaves work our fingers to the bone! It’s just not fair! Sure, I stole a few things, but they’ve still got more than plenty left!”
How can a relationship as strained as that ever be reconciled? Only by the power of God through the transformation of the gospel. One key evidence that a person is born again is when he wants to repair broken relationships and to make restitution for past wrongs. Jesus emphasized this in the Sermon on the Mount. After talking about the seriousness of the sin of anger, Jesus said (Matt. 5:23-24), “Therefore if you are presenting your offering at the altar, and there remember that your brother has something against you, leave your offering there before the altar and go; first be reconciled to your brother, and then come and present your offering.”
You can’t worship God properly until you first do all that you can to be reconciled with the person who has something against you. While it takes time and effort, if you do not work at repairing strained relationships, it may indicate that you are not right with God (Matt. 18:21-35). Reconciled relationships are a big deal to God! They should be a big deal to us, also!
Formerly, the relationship between Philemon and Onesimus was strictly master-slave. But now it had a new dimension: brother to beloved brother (v. 16). We don’t know whether Philemon freed Onesimus immediately or not, but even if he did not, they had a new basis for relating to one another. Perhaps in the church, Philemon even served communion to Onesimus. Perhaps Onesimus on occasion opened the Scriptures and taught the church the things that the beloved apostle Paul had taught him, as Philemon listened attentively. The gospel erases social class distinctions and puts us in relationship as members of the family of God. Included with social class distinctions, there is no place for any racial discrimination in the church of Jesus Christ!
Years ago, my Uncle John was an enlisted man in the National Guard. A colonel in his unit also belonged to the same church that my uncle belonged to. On some occasions when the colonel saw my uncle in the mess hall, he invited him to come over and join him for lunch. They would have a good time chatting together. After the meal, the colonel often said, “Here, let me get your tray.” He would carry my uncle’s dirty dishes to the window. The other men would gawk and say among themselves, “That guy must have something on the colonel!” He did: they were brothers in Christ!
I should add that when it came to performance on the job, my uncle respected the colonel’s rank and authority. He showed him proper respect and obeyed his orders. While at church or in social settings, your boss is your brother in Christ, on the job he is still your boss. You must show proper respect and serve him all the more because he is a brother (1 Tim. 6:2).
Thus God changes every person whom He saves through the gospel. He changes your character and He changes your relationships with others.
Martin Luther wrote, “We are all the Lord’s Onesimi” (cited by H. C. G. Moule, Colossian and Philemon Studies [Christian Literature Crusade], pp. 302, 315). What he meant is true—that this little book beautifully illustrates the salvation that every believer enjoys.
God created you to serve Him. He is your rightful owner and master. But, like Onesimus, you rebelled against Him. You said, “I will not have this Master to rule over me.” And so you took the body, the intelligence, and the talents that God had entrusted to you to use for Him and squandered them on yourself. Claiming to be free from God, you became the slave of sin. Like Onesimus, you were a condemned fugitive on the run, useless to your rightful Master, guilty, and indebted to Him. You had robbed God.
But even as God had His sovereign hand on Onesimus, so with you. In due time, while you were deliberately running in the opposite direction, He providentially led you across the path of someone who shared the gospel with you. At first, you were fearful of dealing with God, because you knew that you were guilty and condemned. You thought, “How could I possibly return to God and stand before Him in light of the things that I’ve done?”
Then the Savior said, “Don’t plead your own case. Don’t say a word on your own behalf. Don’t attempt to justify yourself. You are guilty as charged. Just give the Master this letter.” You looked down and read (v. 17), “… accept him as you would me.” “But, how can He do that? What about all the wrongs that I committed toward Him?” You kept reading (v. 18), “But if he has wronged you in any way or owes you anything, charge that to my account.”
Maybe you had heard it before without understanding, but suddenly He opened your blind eyes and it made sense. You never could hope to pay God for all of the sins that you have committed. But you don’t have to! Christ paid your debt on the cross. Everything that you stole and all the back wages that you owe were charged to His account. You put your trust in the Savior who paid the debt that you owed. You returned to the Master and willingly put yourself under His lordship. For the first time in your life, you were truly free! Now, you live to please Him and do His will from the heart. And to your amazement, the blessed Lord Jesus, who paid the debt you owed, is pleased to call you his beloved brother or sister, just as Paul refers to the slave, Onesimus (v. 16)!
Perhaps you’re thinking, “That’s all well and good for someone who has a rough background, who has done a lot of terrible things. But I’m not like that. I’ve always been a basically good person. I’ve always gone to church. I’m not like this runaway slave.” If you’re thinking that, then consider this story.
Some years ago, a church in England was having a combined communion service with one of its mission churches. The pastor noticed that a former burglar was kneeling at the communion rail beside a judge of the Supreme Court of England, the very judge who, years before, had sentenced that burglar to seven years in prison. After his release the burglar had been converted to Christ and had become a Christian worker.
After the service, as the judge and the pastor walked home together, the judge asked, “Did you see who was kneeling beside me at the communion rail?” “Yes,” replied the pastor, “but I didn’t know that you noticed.” The two men walked on in silence for a few moments, and then the judge said, “What a miracle of grace!” The pastor nodded in agreement, “Yes, what a marvelous miracle of grace!”
Then the judge said, “But to whom do you refer?” The pastor replied, “Why to the conversion of that convict.” The judge said, “But I was not referring to him. I was thinking of myself.”
“What do you mean?” the pastor asked. The judge replied, “That burglar knew how much he needed Christ to save him from his sins. But look at me. I was taught from childhood to live as a gentleman, to keep my word, to say my prayers, to go to church. I went through Oxford, took my degrees, was called to the bar and eventually became a judge. Pastor, nothing but the grace of God could have caused me to admit that I was a sinner on a level with that burglar. It took much more grace to forgive me for all my pride and self-righteousness, to get me to admit that I was no better in the eyes of God than that convict whom I had sent to prison.”
Has God opened your eyes to see that you are just as needy of the Savior as that convicted burglar or as Onesimus, the runaway thief and slave? Have you trusted in Christ’s shed blood to pay the debt that you rightfully owe?
If you have trusted in Christ, are you allowing His grace to change you? Is your character becoming less angry and more patient, kind, gentle, and loving? Is your attitude toward authority becoming more submissive, even when you’re mistreated? Is your life changing from self-centered uselessness to becoming a useful servant to others as you serve Christ?
What about your relationships? Are you working at being reconciled to those from whom you are alienated, as much as it depends on you? Have you sought forgiveness and made restitution to those you have wronged? Would those who formerly knew you as a sheep thief now think that the ST on your forehead must be an abbreviation for saint?
Copyright, Steven J. Cole, 2007, All Rights Reserved.
Unless otherwise noted, all Scripture Quotations are from the New American Standard Bible, Updated Edition © The Lockman Foundation
Once upon a time, a mean old mountaineer fell sick and died. There were no funeral directors back in the hills then, and embalming was not yet practiced. So the widow and family dressed the body and placed it in the coffin. As the deceased was being carried from the house, one pallbearer stumbled, causing the coffin to crash into a gatepost. The knock somehow revived the old mountaineer, who sat up yelling at everyone in sight.
The man lived for over a year and was as mean as ever. Then he got sick and died again. Once more the body was put in the coffin and the pallbearers lifted their burden. As they shuffled by, the long-suffering widow lifted her head and said, “Watch out for that gatepost!” (Merritt K. Freeman, Reader’s Digest, July, 1983.)
Most of us have known difficult people like that. Maybe they’re in your family. I hope that none are in this church, but it’s possible. You may not be so bold as to wish that they would die, but you may secretly wish that if that fate befell them, they wouldn’t get resurrected!
The gospel of Jesus Christ brings together people of diverse backgrounds and personalities, increasing the possibility for strained relationships. We can see this in this short letter of Philemon. We have Paul, a scholarly, zealous Jew and former Pharisee; Philemon, a wealthy Gentile businessman; and, Onesimus, a runaway slave. Any time you bring together people from such varied backgrounds, you have the potential either for great conflict or great glory. It brings great glory to God when people who would normally be at one another’s throats instead love one another because of the reality of Jesus Christ.
The potential for great conflict is increased when the divergent persons brought together by the gospel live in a culture permeated by inhuman and unjust social institutions. The Roman world accepted slavery as a matter of course. Slaves had no protection under Roman law. J. B. Lightfoot (Saint Paul’s Epistles to the Colossians and to Philemon [Zondervan], pp. 321-322) writes that two or three years before Paul wrote to Philemon, a slave had killed his master, a Roman senator. The law demanded that when this happened, all of the slaves in the household would be executed along with the one who did it. The senator had 400 slaves! The populace tried to intervene to save them from this unjust treatment. The Roman Senate held a special hearing and decided that the law needed to be carried out. All 400 were executed!
This was the social background and cultural mindset behind Paul’s letter to Philemon. If Paul could persuade Philemon to forgive this slave who had wronged him and, even more, to accept him as a brother in Christ, the word would spread like wildfire. When people asked, “Why did Philemon forgive this slave?” they would hear, “Because he follows Jesus, who taught His followers to love one another.” The potential for the gospel and the glory of God was great!
It’s no different today. The world is watching the lives of Christians to see whether they really are different because of the gospel. Does following Christ make a difference in our homes? Do we work through our problems with kindness, gentleness, patience, and understanding?
What about in our churches? This is why racial diversity in the local church is important. It’s easy to say, “In Christ there is no white or black, no Navajo or Hispanic,” when we segregate our churches according to race. But we ought to demonstrate the truth of that by meeting together across racial and cultural barriers. Racism in the local church erases the message that we are called to proclaim. Jesus said (John 13:35), “By this all men will know that you are My disciples, if you have love for one another.” Thus the furtherance of the gospel depends upon godly relationships among Christians. The book of Philemon teaches us that…
Godly relationships glorify God and demonstrate the reality of the gospel in our lives.
We are flooded with supposedly Christian books telling you how to use God and the Bible to reach your full potential, to boost your self-esteem, to achieve your best life now, etc. They convey the worldly message that it’s all about you.
But the Bible is radically God-centered. It’s all about God and His glory. The main reason that you should work through your marriage problems and relate to your children in a loving manner is not so that you’ll have a happy family, although it will result in that. The main reason you should work through your family problems in a godly manner is so that God will be glorified and others will be drawn to the Savior.
Worldly people should look at your marriage and home life and marvel at how you love one another. That’s when you tell them the difference that Jesus Christ has made in your life. He gets the glory and, of course, you enjoy the harmony of a happy home. But it’s all about His glory and the testimony of the gospel first. That’s why when Paul gives instruction to wives and husbands (Eph. 5:22-33), he says (5:32), “This mystery is great; but I am speaking with reference to Christ and the church.” Your marriage is to reflect the loving relationship between Christ and His church.
The same is true with regard to unity in the local church. When believers cannot get along and split over minor doctrinal differences or personality conflicts, it is not a great advertisement for the gospel. The world looks at the church, shrugs its shoulders, and says, “They’re no different than we are.” But when we demonstrate the love of Christ, especially across cultural, social, and racial barriers, the world takes notice.
That’s why Paul not only addressed this letter to Philemon, but also Apphia (probably Philemon’s wife), Archippus (perhaps the pastor of the church; Col. 4:17), and the entire church that gathered in their home. Paul included all of them because the matter of forgiving Onesimus and accepting him as a brother in Christ was a matter of corporate testimony. It was an opportunity for God to be glorified and for the gospel to spread in that city. Godly relationships in our homes and in the church glorify God and demonstrate the reality of the gospel in our lives.
With that as a foundation, I’d like to spell out ten principles for godly relationships as seen in how Paul relates to Philemon. This is not a comprehensive list, of course. But they are lessons worth learning and practicing for God’s glory and the furtherance of the gospel.
These are not just common sense principles that might appear in a Reader’s Digest article. Rather, they must be built on the foundation of heart-transformation that comes through faith in Christ. In verse 5, Paul refers to Philemon’s “love and the faith which you have toward the Lord Jesus and toward all the saints.” Probably, Paul begins by thinking of Philemon’s love. Then he goes to the source of that love, which is his faith in the Lord Jesus. He completes the thought by going back to the object of his love, namely, all the saints (Lightfoot, pp. 334-335).
The key to loving relationships is that God has transformed your heart by His grace and love in sending His Son to die for your sins. As Jesus told the disciples just before He went to the cross, they were to love one another just as He had loved them (John 13:34). When you live daily in light of the truth that the Son of God loved you and gave Himself for you, you have the proper foundation to love others, even those who are not easy to love.
Throughout this short letter, Paul affirms both Philemon and Onesimus. There is a way of using affirmation manipulatively, but when you do this, the other person usually senses your wrong motives. But Paul had a way of genuinely affirming people and acknowledging the valuable contribution that each one was making for the cause of Christ. Paul begins (v. 1) by addressing Philemon as a “beloved brother and fellow worker.” He thanks God for Philemon because of his faith and love (vv. 4-5). He expresses his joy and comfort that stem from Philemon’s love and mentions how the hearts of the saints have been refreshed through him (v. 7). He goes on to ask Philemon to show the same love toward this new brother, Onesimus. But you don’t get the feeling that Paul is flattering Philemon to manipulate him to do what Paul wants. Rather, he was truly appreciative of Philemon’s life and ministry in Christ.
How long has it been since you’ve told your mate or your children how much you appreciate them in a specific way? Maybe someone at church has ministered to you or encouraged you. Let the person know, either verbally or by a written note, how much you appreciate what he or she did.
Paul tells Philemon that he thanks God for him and prays for him (v. 4). Again, be careful to be genuine about this! Don’t say, “I’ll pray for you” to sound spiritual, and then fail to pray. If I tell someone that I will pray for him, I usually stop and do it as soon as I can, so that I don’t forget. When we pray for one another, God uses it to form a bond of love. This even applies when you’re angry with someone or when a relationship is strained. Have you noticed that it’s hard to pray sincerely for someone and stay angry with him at the same time! I am not referring to praying imprecatory psalms against him, but genuinely praying for God’s blessing in his life! And, it is hard to be angry with somebody who tells you that he has been praying for you!
Paul’s prayer (v. 6) is difficult Greek to translate, as reflected in the variations among the English versions. We can’t be dogmatic, but I think Paul is praying that Philemon’s generosity (“fellowship”) that stems from his faith will grow in effectiveness as he learns all of the good things that God has given to him for Christ’s sake. In other words, as Philemon realizes what God has generously given to him, it will cause him to overflow with generosity and grace towards others.
Paul had authority as an apostle to command Philemon to accept Onesimus, but he rather appeals to him (vv. 8-10), so that (v. 14), “your goodness would not be, in effect, by compulsion but of your own free will.” He wanted Philemon’s forgiveness and acceptance of Onesimus to come from his heart, not grudgingly.
Paul’s appeal was not just to Philemon’s mind, but also to his heart or emotions. Paul could have just said, “Philemon, you need to do this. Here are my reasons. End of the discussion!” But instead, he says (v. 9), “yet for love’s sake I rather appeal to you—since I am such a person as Paul, the aged, and now also a prisoner of Christ Jesus.” Paul was probably only 55-60, but he had suffered a lot, so his body was wearing out. Six times in this short letter, Paul refers to his imprisonment (vv. 1, 9, 10, 13, 22, 23). As Bishop Lightfoot puts it (p. 333), “How could Philemon resist an appeal which was penned within prison walls and by a manacled hand?” Paul refers to Onesimus as his child (v. 10), and tells Philemon that in sending him, it’s like sending his own heart (v. 12).
Paul’s dealings with Philemon apply especially to any relationship where you are in authority. Although there are times with your children when you must say, “Obey because I said so,” that should not be your primary means of relating to them. I’ve heard parents snap at their children and order them around like the family dog. Then they wonder why their kids aren’t overwhelmed with warm feelings toward them as parents, especially “after all I’ve done for you!” It’s better to appeal on the basis of love and save the commands for situations that have really serious consequences.
Paul really wanted Onesimus to stay with him, because he was in a difficult situation and Onesimus was providing valuable service to Paul. He could have rationalized, “Philemon would probably let Onesimus stay if he were aware of my situation. I’ll just keep him here.” But he didn’t want to presume on Philemon’s generosity.
It’s easy for pastors to fall into this trap. I once read of a pastor who got together for lunch with a man in his church. The time came when the man needed to get back to work, so he asked the pastor, “What did you want?” The pastor said, “I just wanted to see how you’re doing.” The man was surprised and replied, “That’s the first time any church leader has ever made an appointment with me when he didn’t want me to do something for him!”
There is a legitimate sense of meeting with someone to challenge him to a needed ministry or job in the church. The person may not be aware of the need and of how his particular gifts could fit the ministry unless you tell him. But you cross a line if you try to use people to accomplish your objectives. The proper focus is to encourage people to use their gifts for God’s purpose and glory.
Some people say, “I just say what I mean,” as if bluntness and insensitivity were virtues. They are not, to put it bluntly! While we need to be clear in communicating our desires, we should be careful to say it in a sensitive, tactful manner.
Note how Paul proceeds to build his case for Philemon to accept Onesimus. First, he begins, as we’ve seen, by stating his appreciation for Philemon’s love and faith. He moves from the general to the particular: “You’ve shown love to all the saints. Now, here is a new saint for you to love.”
Then, Paul paints this touching portrait of himself as the aged prisoner. He makes his appeal, but he doesn’t mention Onesimus by name until verse 10 (in Greek, Onesimus is the last word in the sentence). He goes on to describe the change in Onesimus (v. 11) and his own sense of loss in sending him back to Philemon (vv. 12-14). Finally, he softens the story by suggesting the overruling hand of God’s providence in the whole turn of events. He begins verse 15 with the word “perhaps.” He is saying, “Consider this perspective.” He does not say, “for this reason Onesimus ran away,” but rather, “was parted from you” (using a passive verb). He is not absolving Onesimus of blame, but neither is he magnifying his crime so as to stir up resentment in Philemon. Then, finally (v. 17), he gets around to his request, that Philemon accept Onesimus even as he would accept Paul. It’s a great lesson in diplomacy or tact!
There is always a cost involved in maintaining good relationships. Somehow, we’ve gotten the unrealistic idea that if the chemistry is right, good relationships just happen spontaneously without any effort. But in all good relationships, there is a price tag.
Paul’s cost was twofold: First, he was willing to part with Onesimus in spite of his own needs. Second, he was willing to pay for any costs that Onesimus had incurred towards Philemon. Some have said, in light of Paul’s rather humorous reminder (v. 19) that Philemon owes him his very self and from the fact that Paul was poor and in prison, that he didn’t really expect to pay. But I think Paul was sincere in wanting Philemon to view Onesimus’ debt as Paul’s debt. As Onesimus’ father in the faith, he wanted to provide for his child.
Philemon also incurred some costs. He lost a slave and his labor for a while, along with whatever cash and property that Onesimus had stolen. He had to bear these costs in order to forgive Onesimus. Also, there was the cost of his reputation in town when he forgave Onesimus. Other slave owners would have criticized him for setting a dangerous precedent.
And, of course, Onesimus had to bear a cost to return to Philemon. He had to part from his dear mentor, Paul. He had to be willing to give up his freedom and perhaps work to make restitution. Godly relationships always come with a price tag!
That price tag is usually called “forgiveness.” Forgiveness means that you bear the hurt and the one who wronged you goes free. I was once counseling with a couple that had a long history of one hurting the other and then the other retaliating. Then they got saved, but they were still bitter. We were getting nowhere. Finally, I said, “Look, each of you keeps bringing up all of these hurts from the past. We could keep dredging up the past for years to come. Or, you could choose to forgive one another.” I asked the husband if he would forgive his wife for all of these wrongs. He thought about it a moment and said that he would. I asked her the same question. She stewed about it for a while and then blurted, “If I forgive him, he goes free!”
I said, “Yes, that is what Jesus did for you. He bore the penalty you deserved and you went free.” But, she wouldn’t do it. At that point, I couldn’t help them.
But when we bear the cost, whether monetary or the cost of forgiveness, we always get more in return than we gave. Philemon received back this now useful slave, not just as a slave, but also as a brother. Onesimus now was able to serve out of joy in the Lord. The church welcomed a valuable member.
Paul expected Philemon’s obedience and even more (v. 21). But at the same time, he knew that people often do what you inspect, not just what you expect. So he mentions that he will be coming for a visit soon (v. 22). I don’t think that this implied a lack of trust on Paul’s part, but it did add a measure of accountability. Paul hoped to be there soon, and he would be able to tell whether Philemon and the church had forgiven and accepted Onesimus.
This principle also applies to rearing your children. Expect them to do their best to please you. Do you show surprise when they do well or when they mess up? You should expect them to do well, but be surprised if they disobey. Don’t expect your teenagers to rebel. Expect them to follow the Lord. Then follow through with reasonable accountability.
Paul mentions all of these other believers that greet Philemon (v. 23). On the one hand, he is just being friendly, but on the other hand, he’s letting Philemon know that he’s on a bigger team. If he drops the ball with Onesimus, it will affect the entire team.
In the local church, we will be more careful about restoring our relationships if we keep in mind that we’re all on the same team. We cannot serve Christ by ourselves. We can’t afford to say to anyone, “I don’t need you on the team.” Besides, it’s not my team. If the Lord has picked someone for His team, then I need to include the person and work through relational problems.
Paul begins and ends (vv. 3, 25) by mentioning God’s grace, and it was more than a polite formality. As I recently pointed out, God’s grace was at the center of Paul’s life. It summed up everything about how he related to God and to others. If we have been shown grace, then we need to show grace to others. If we want to be shown more grace, then we’ve got to give more grace to others. Philemon may have thought, “Onesimus doesn’t deserve forgiveness!” Precisely! Grace is always undeserved. Don’t ever forget it!
You’ve probably heard the little ditty, “To dwell above with the saints we love, O that will be glory! But to dwell below with the saints we know, well, that’s a different story!” That’s why we need to learn how to relate in a godly way that glorifies God and shows the reality of the gospel in our lives. This short letter to Philemon leaves us with the question, “How are your relationships?”
Copyright, Steven J. Cole, 2007, All Rights Reserved.
Unless otherwise noted, all Scripture Quotations are from the New American Standard Bible, Updated Edition © The Lockman Foundation
|
<urn:uuid:d40b8340-b86e-4476-89ae-af9b95d7e4f1>
|
CC-MAIN-2016-26
|
https://bible.org/print/book/export/html/21860
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396106.71/warc/CC-MAIN-20160624154956-00155-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.9782
| 9,418
| 2.59375
| 3
|
Ulun Danu Batur Sacred Temple
Pura Ulun Danu: Head of the Lake Temple
This temple is at the northeast shore. It is not to be confused with Pura Ulun Danu Batur, which is on the rim of the caldera. It is especially important for the Balinese. Only here can you get holy water of a particular variety.
The water is collected from the lake itself, directly in front of the temple. Visitors have to wear a sash and not go near. Bathing is forbidden. The lake is the ultimate source of water for the rivers and springs that irrigate central Bali. It is therefore of the utmost importance. The temple priests say that the lake is fed by springs located at each of the wind directions. Each of the springs is the origin of water for that particular region of central Bali. So, farmers from North Bali collect their holy water from the northern spring of the lake and so on.
The villagers of nearby Songan maintain the temple.
Pura Ulun Danu Batur, Temple of the Crater Lake
This is Bali's second most important temple after Pura Besakih. It is the ceremonial throne for Dewi Danu, the goddess of the lake. There are dramatic, many-tiered, pagoda-like merus, often covered in mist from the lake. The goddess is honoured with a tall meru of eleven tiers, the highest number. The meru of her consort, the god of Mount Agung, has only nine. That indicates her importance.
According to legend Dewi Danu and the god of Mount Agung emerged from an erupting volcano in 231 on our calendar. Together they took control of the waters and lands of Bali. They are the complementary male and female gods of the island.
There are two other nine-tiered merus, dedicated to the god of Mount Batur and to the deified King Waturenggong. King Waturenggong is discussed in the article entitled Balinese History - Pre-history to the Europeans.
One of the most interesting shrines is a pavilion in the inner courtyard to the far left. It is Chinese looking, dedicated to a Chinese princess, who resembles one of the Barong Landung characters in the dance play.
The temple stands at the head, physically and symbolically, of the water temple system and controls all water in central Bali. It is the supreme water temple. The temple is maintained by the several hundred irrigation societies, subaks, of the surrounding regions. Subaks are described in the article entitled Balinese Origins, Volcanoes and Civilisation. They pray to the goddess of the lake for rulings on water distribution. The high priest, her earthly representative, lays down her rulings. The subaks also pray that there will be no crop pestilence and honour the mountain gods and deified ancestors.
The high priest is an interesting character. He is picked out as a young boy by a virgin priestess after his predecessor dies. He is a commoner from a particular descent group called the Paseks of the Black Wood. He wears his hair long, dresses in white, is called Jero Gede and has complete control over the temple. He is neither fully divine, nor fully human. He has a job for life.
The Paseks of the Black Wood believe that they are the oldest of the Balinese descent groups and that they pre-date the kings. The story is that soon after the gods took possession of Bali following the emergence of the goddess of Mount Batur and the god of Mount Agung, the great priest-god Mahameru visited them, He bathed in Lake Batur and then decided to go on to Besakih. On the way he saw a statue of black wood, which looked human and he brought it to life. He taught him sacred knowledge, so that there would be priests in Bali. He was the first human in Bali.
The second-ranking priest is called the Lesser Jero Gede. He comes from the Pasek Gelgel descent group. The Pasek Gelgel were commoners who became loyal servants of the Gelgel kings. The Lesser Jero Gede is identified with the nine-tiered merus for the god of Mount Agung and is therefore linked to Besakih and the court of Klungkung. The two main priests thus derive their powers from different sources.
Unlike other temples in Bali, it is permanently open, and has a permanent staff of priests. A virgin priestess selects the 24 permanent priests when they are children. They serve for life.
The age of the temple is unknown, but there are references to it in 11th century texts. There was an eruption of Mount Batur in 1905, when the lava stopped at the main entrance. It was damaged in the 1917 eruption, although again the lava stopped at the walls. Another eruption at 1 am on 3 August 1926 covered the temple in tons of rubble and the village in many feet of lava rocks. Some shrines were saved, and brought up the cliff to the rim of the crater, and the present temple built around them. The present temple is a reconstruction of nine previous temples.
Clik here for more detailed temple
Labels: Bangli Regency
|
<urn:uuid:ccf60655-9a8e-4ce4-823c-d8b3ce7f1c3d>
|
CC-MAIN-2016-26
|
http://allaboutbali-info.blogspot.com/2007/09/ulun-danu-batur-sacred-temple.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397565.80/warc/CC-MAIN-20160624154957-00132-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.960341
| 1,103
| 2.8125
| 3
|
Hammer mill is one of the most excellent pulverizer for easily crushable materials such as limestone, coal, chemical fertilizer and so on. Hammer mill is also named hammer pulverizer, and crushes materials by the collision between the high-speed hammer and materials.
Our hammer mill has unique structure design. The design and placement of hammers is determined by operating parameters such as rotor speed, motor horsepower, and open area in the screen. Optimal hammer design and placement will provide maximum contact with the feed ingredient. Hammer mills in which the rotor speed is approximately 1,800 rpm, should be using hammers which are around 25cm (~ 10 inches) long, 6.35cm (~2.5 inches) wide, and 6.4mm (0.25 inches) thick. For a rotor speed of about 3,600 rpm, hammers should be 15 to 20 cm (~ 6-8 inches long, 5 cm (~ 2 inches) wide, and 6.4 mm (0.25 inches) thick.
The model of Hammer Mill:
The number of hammers used for a hammer mill of 1,800 rpm, should be 1 for every 2.5 to 3.5 horsepower, and for 3,600 rpm, one for every 1 to 2 horsepower. Hammers should be balanced and arranged on the rods so that they do not trail one another. The distance between hammer and screen should be 12 to 14 mm (~ 1/2 inch) for size reduction of cereal grains.
Hammer mill is of simple structure, large reduction ratio, and high-efficiency. It is applicable for both dry and wet crushing. Hammer mill is widely used for medium or fine crushing for medium hard and brittle materials by departments of mine, cement, coal, building material, metallurgy, chemical industry, road construction, gas chemical industry and thermal power generation, etc. Coal gangue, coke, slag, limestone, phosphate rock, salt, whiting, gypsum stains, alum, brick and tile, etc.
|
<urn:uuid:41484a05-fe2b-433f-a70a-a61391700afb>
|
CC-MAIN-2016-26
|
http://www.crusherindustry.com/index.php/hammer-mill-structure-design/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397111.67/warc/CC-MAIN-20160624154957-00114-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.9141
| 416
| 2.640625
| 3
|
New book takes closer look at baskets and their makersWritten by Admin
- font size decrease font size increase font size
Anna Fariello believes that artifacts — somewhat like windows — can act as passageways to a culture’s soul.
“Material culture can be a window onto the changes that occur in social and cultural history,” said Fariello, an associate professor and chief architect of the Craft Revival Project at Western Carolina University’s Hunter Library.
An author, editor and former research fellow at the Smithsonian Museum of American Art, Fariello most recently turned her attention to Cherokee basketry, a thousands-year-old tradition, passed from mother to daughter, that she believes is integral to Cherokee culture.
Fariello’s new book, titled Cherokee Basketry: From the Hands of our Elders, studies Cherokee baskets and basket-makers who lived during the first half of the 20th century.
The project reinforced Fariello’s understanding that for Cherokee people, “the making of things is significant to their culture and their identity,” a concept foreign to many people in contemporary, mainstream culture, she said. The Cherokees’ use of natural resources as basket materials gave Fariello an appreciation of the environmental sustainability and ecological balance also inherent in the culture.
The Eastern Band of Cherokee Indians played a significant role in the craft revival, a regional movement in the late 19th and early 20th centuries that produced a wealth of objects, identified traditional skills, and revitalized handwork production in Western North Carolina.
With a grant from the State Library of North Carolina, Fariello originally set out to expand the information available on the project’s site, which chronicles the movement and its impact on Western North Carolina through text and images.
Fariello worked with the Qualla Arts and Crafts Mutual and the Museum of the Cherokee Indian in Cherokee with the purpose of making their collections available online.
A grant of $47,000 from the Cherokee Preservation Foundation added a second element to the project: to research and more fully document basketry in those collections.
While the project did not start out as a book, Fariello said it seemed the logical conclusion. “The book takes scattered elements and arranges them for a more complete picture,” she said.
Cherokee Basketry examines specifics about basket-makers themselves, how baskets were made, and what they were used for. Archival photographs illustrate “Cherokee Basketry,” published by The History Press of Charleston, S.C.
“I hope that this book has a broad audience,” Fariello said. “I think it can serve as a classroom text for Cherokee studies or the visual arts, and I also think it will have a broad public appeal for anyone interested in regional culture, especially the influence of the Cherokees on Western North Carolina.”
Fariello presented books to Eastern Band of Cherokee Indians Chief Michell Hicks and the Tribal Council. Fariello also gave 200 copies of the book to Cherokee School Superintendent Joyce Dugan for teachers to use in the Eastern Band’s new K-12 school.
The project was a great service to the Qualla Arts and Crafts Mutual, whose permanent collection has more than 100 baskets and continues to grow.
“Before the archive organization, the only recorded information in our permanent collection was a handwritten line about each item,” said Vicki Cruz, manager of the Qualla Arts and Crafts Mutual.
Now the co-op’s archives are digitized and include contemporary photos, as well as information about dimensions, materials and patterns, and the artists themselves.
Fariello also worked with co-op employees on the care and display of the baskets, and about recordkeeping when a new piece enters the collection.
Cruz said she eventually plans to use her new knowledge to document the work of contemporary basket-makers. “The daughters of basket-makers Agnes Welch and Eva Wolfe, they’re basket-makers too, and now their daughters are starting to weave,” she said.
The basketry book is the first in the “From the Hands of our Elders” series, a three-year project to document Cherokee arts.
The next book, funded with $87,770 from the Cherokee Preservation Foundation, will focus on Cherokee potters and pottery during the first part of the 20th century. A book on Cherokee woodcarving and mask making is scheduled to follow.
|
<urn:uuid:156cb8e5-5baf-4dfd-b584-f1f0c3f013f2>
|
CC-MAIN-2016-26
|
http://www.smokymountainnews.com/component/k2/item/1358-new-book-takes-closer-look-at-baskets-and-their-makers
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783403502.46/warc/CC-MAIN-20160624155003-00060-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.951532
| 943
| 2.671875
| 3
|
What is included with this book?
Paul Freedman is Chester D. Tripp Professor of History, Yale University. His previous books include Images of the Medieval Peasant, The Origins of Peasant Servitude in Medieval Catalonia, and Food: The History of Taste.
|Introduction Spices: A Global Commodity||p. 1|
|Spices and Medieval Cuisine||p. 19|
|Medicine: Spices as Drugs||p. 50|
|The Odors of Paradise||p. 76|
|Trade and Prices||p. 104|
|Scarcity, Abundance, and Profit||p. 130|
|"That Damned Pepper": Spices and Moral Danger||p. 146|
|Searching for the Realms of Spices||p. 164|
|Finding the Realms of Spices: Portugal and Spain||p. 193|
|Conclusion The Rise and Fall of Spices||p. 215|
|Table of Contents provided by Ingram. All Rights Reserved.|
|
<urn:uuid:89623ace-40b7-40ec-9b7d-b344e0707566>
|
CC-MAIN-2016-26
|
http://www.ecampus.com/out-east-spices-medieval-imagination-paul/bk/9780300151350
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402746.23/warc/CC-MAIN-20160624155002-00101-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.723354
| 214
| 2.6875
| 3
|
Richard Conlin is president of Seattle's City Council, which is overseeing the city's effort to become the first carbon neutral city in the United States. He blogs about what reaching that goal really means for YES! Magazine.
A key strategy that contributes to Seattle's carbon neutrality work was approved by the Council in 2007, when my Zero Waste Initiative was adopted as City policy. The things we throw away not only generate carbon as they decompose—they also carry the embedded carbon that was used in creating them. Zero Waste is a strategy that addresses both of those aspects. And the evidence is now in: We are succeeding in making real change happen.
In the 1980s, Seattle embraced a commitment to recycling a minimum of 60 percent of our solid waste. However, 20 years later, recycling peaked at only 43 percent. When I reviewed our policies in 2006-2007, it was clear that the current strategy promised only incremental improvements—and would require a long-term commitment to generating massive quantities of garbage and shipping it to a landfill. Seattle would continue to send a mile-long train of garbage to be buried in eastern Oregon—every day.
That meant that we would continue to consume resources at an expanding rate. It meant that we would keep burying toxic substances and valuable materials. And it meant that we would keep generating greenhouse gases from landfills, contributing to global warming.
The Zero Waste Strategy set a new goal: Strive to reduce our waste stream to the minimum possible by making cradle-to-cradle responsibility the cornerstone for how we treat products. The cradle-to-cradle paradigm asserts that the materials we consume should continue to circulate in the production of new products—as organic matter destined for compost, as minerals for construction, or as synthetic compounds that can be transformed into the building blocks of other products. That puts waste reduction and recycling in the driver’s seat, rather than in the caboose of the garbage train.
Key Components of the Zero Waste Strategy
- Expand recycling efforts by creating incentives for product stewardship. The principle of product stewardship (also called "extended producer responsibility") puts the responsibility for recycling and disposal on the manufacturers, thus giving them a financial incentive to extend the life of their products by using materials that can be reused or recycled.
- Collect food waste as part of mandatory residential weekly organics collection.
- Tailor similar approaches to commercial accounts, emphasizing programs like food waste collection from restaurants and paper recycling from offices.
- Decrease waste production by banning some products from use in the City (such as Styrofoam and plastic bags), and working with businesses to develop take back programs for products like pharmaceuticals, paint, and electronic products.
- Design solid waste facilities and contracts to emphasize flexibility for better waste prevention, recycling, and disposal systems in the future, support full recycling of construction and demolition waste, and plan for major reductions in the amount of solid waste to be transferred and disposed of.
Implementation of Zero Waste has begun with mandatory residential organics collection, new policies around construction and demolition waste, bans on Styrofoam and other non-recyclable food service products, expanded product stewardship activities, and programs to promote additional recycling and composting in restaurants and other businesses.
In the near future, the City will add mandatory compostable service for multi-family buildings, move to restrict the delivery of unwanted phone books, start a pilot program for collecting garbage every other week rather than weekly, and continue work to expand product stewardship and business recycling. We are likely to also consider a ban on plastic bags (as an alternative to a proposed fee, which was repealed in a referendum financed by $1.5 million from the plastics industry), as well as limits or recycling requirements for other plastics, such as commercial plastic film used to wrap pallets.
The philosophy of Zero Waste includes adding a new indicator of our progress. While we will still measure our recycling rate, our new goal is to actually reduce the amount of waste that the City sends to the landfill. Resolution 30990 set as City policy that we will not dispose of any more total solid waste in future years than went to the landfill in 2006 (438,000 tons), and that for the next five years, the City will reduce the amount of solid waste disposed by at least one percent per year.
We have overachieved. Waste sent to the landfill was cut by 10.2 percent in 2008 and 10.9 percent more in 2009, to a total of 352,000 tons. While some of this decrease could be the result of the economic downturn (garbage generation traditionally decreases during recessions), probably at least half of it is the result of the actions taken through the Zero Waste Initiative. And there is a lot more action to come.
The Zero Waste strategy built on Seattle's success in water and energy conservation to create a new way of thinking about products and waste disposal. As we develop more sophisticated ways to make the cradle-to-cradle vision real, we will continue to make real progress towards our climate action goals.
Next: Improving performance, increasing efficiency, shifting modes, system thinking, carbon sequestration, and carbon offsets—identifying the types of changes we can make.
|
<urn:uuid:b68647d2-3b2c-485e-9f34-e6353f79b76f>
|
CC-MAIN-2016-26
|
http://www.yesmagazine.org/blogs/richard-conlin/waste-not-seattles-road-to-zero-trash?icl=yesemail_wkly20101231&amp;ica=mrZeroTrash
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396106.25/warc/CC-MAIN-20160624154956-00143-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.950721
| 1,067
| 2.9375
| 3
|
DISEASES OF INTEGUMENTARY SYSTEM
by: Oliver Pichay
Our Lady of Fatima University
Acne is a skin disease marked by pimples on the face, chest, and back. The most common skin disease. Increased levels of androgens (male hormones) cause the sebaceous glands to secrete an excessive amount of sebum into hair follicles. The excess sebum combines with dead, sticky skin cells to form a hard plug that blocks the follicle. Bacteria that normally lives on the skin then invades the blocked follicle. Weakened, the follicle bursts open, releasing the sebum, bacteria, skin cells, and white blood cells into the surrounding tissues. A pimple then forms.
Athlete’s foot is a common fungus infection in which the skin between the toes becomes itchy and sore, cracking and peeling away. Properly known as tinea pedis, the infection received its common name because the infection causing fungi grow well in warm, damp areas such as in and around swimming pools, showers, and locker rooms (areas commonly used by athletes).
There are few threats more serious to the skin than burns. Burns are injuries to tissues caused by intense heat, electricity, UV radiation (sunburn), or certain chemicals (such as acids).
Dermatitis is any inflammation of the skin. There are many types of dermatitis and most are characterized by a pink or red rash that itches. Two common types are contact dermatitis and seborrheic dermatitis.
Psoriasis is a chronic (long-term) skin disease characterized by inflamed lesions with silvery-white scabs of dead skin. Normal skin cells mature and replace dead skin cells every twenty-eight to thirty days.
Psoriasis causes skin cells to mature in less than a week.
Skin cancer is the growth of abnormal skin cells capable of invading and destroying other cells. Skin cancer is the single most common type of cancer in humans. The cause of most skin cancers or carcinomas is unknown, but overexposure to ultraviolet radiation in sunlight is a risk factor.
Basal cell carcinoma is the most common form of skin cancer, accounting for about 75 percent of cases. It is also the least malignant or cancerous (tending to grow and spread throughout the body). In this form of skin cancer, basal cells in the epidermis are altered so they no longer produce keratin. They also spread, invading the dermis and subcutaneous layer. Shiny, dome-shaped lesions develop most often on sunexposed areas of the face. The next most common areas affected are the ears, the backs of the hands, the shoulders, and the arms.
Squamous cell carcinoma affects the cells of the second deepest layer of the epidermis. Like basal cell carcinoma, this type of skin cancer also involves skin exposed to the sun: face, ears, hands, and arms. The cancer presents itself as a small, scaling, raised bump on the skin with a crusting center. It grows rapidly and spreads to adjacent lymph nodes if not removed. If the lesion is caught early and removed surgically or through radiation, the patient has a good chance of recovering completely.
Malignant melanoma accounts for about 5 percent of all skin cancers, but it is the most serious type. It is a cancer of the melanocytes, cells in the lower epidermis that produce melanin. In their early stages, melanomas resemble moles. Soon, they appear as an expanding brown to black patch. In addition to invading surrounding tissues, the cancer spreads aggressively to other parts of the body, especially the lungs and liver. Overexposure to the Sun may be a cause of melanomas, but the greatest risk factor seems to be genetic.
Vitiligo is a skin disorder in which the loss of melanocytes (cells that produce the color pigment melanin) results in patches of smooth, milky white skin.
Warts are small growths caused by a viral infection of the skin or mucous membrane. The virus infects the surface layer. Warts are contagious. They can easily pass from person to person. They can also pass from one area of the body to another on the same person.
Hand warts grow around the nails, on the fingers, and on the backs of the hands. They appear mostly in areas where the skin is broken.
Foot warts (also called plantar warts) usually appear on the ball of the foot, the heel, or the flat part of the toes. Foot warts do not stick up above the surface like hand warts. If left untreated, they can grow in size and spread into clusters of several warts. If located on a pressure point of the foot, these warts can be painful.
Is an autoimmune skin disease that causes the body’s immune system to attack the hair follicles, causing baldness in patches.
An advanced form of seborrhea, is a non-contagious skin disease that causes excessive oiliness of the skin, most commonly in the scalp, caused by overproduction of sebum, the substance produced by the body to lubricate the skin where hair follicles are present. Seborrhea is the form of the disease where oiliness only occurs without redness and scaling. The disease commonly occurs in infants, middle-aged people, and the elderly, and is commonly known in infants as cradle cap
Is an often tender infection of inflammation around the base of the nail fold. It can start suddenly (acute paronychia) or gradually (chronic paronychia).
Acute paronychia develops over a few hours when a nail fold becomes painful, red and swollen. Yellow pus may appear under the cuticle. In some cases fever and painful glands under the arms accompany a particularly severe case of acute paronychia. It is usually due to “Staph” bacteria germs.
Chronic paronychia is a gradual process and much more difficult to get rid of. It may start in one nail fold but often spreads to several others. Each affected nail fold (the skin that lies next to the nail) becomes swollen and lifted above the nail. It may be red and tender from time to time, and sometimes a little thick pus (white, yellow or green) can be expressed from under the cuticle.
|
<urn:uuid:42be1b30-afe4-4463-b5e6-87f939d08d36>
|
CC-MAIN-2016-26
|
http://nursingcrib.com/nursing-notes-reviewer/diseases-of-integumentary-system/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783391766.5/warc/CC-MAIN-20160624154951-00067-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.933905
| 1,325
| 3.484375
| 3
|
"What would the mass of air be inside a hot air balloon that has the volume of 5.25 x 10^4 L. The temperature of the air inside is 30 degrees celsius and the pressure is 95.5 kPa. Assume the composition of air is 80% nitrogen gas and 20% oxygen gas to determine the molar mass of air."
any input on how to do this would be appreciated, it's the last question on my assignment.
Similar questions that i've done like this are: What mass of oxygen, is available for a combustion reaction in a volume of 5.6L at STP
vO2 = 5.6L
vSTP = 22.4L/mol (22.4l/mol because of STP)
nO2 = 5.6 x (1mol/22.4l)
= 0.25 mol
mO2 = 0.25mol x (32.00g/1mol)
= 8 grams.
Idk how to determine the mass of the original question because it's a composition and not at STP or SATP
|
<urn:uuid:8d083594-1693-487a-b504-b966419ac876>
|
CC-MAIN-2016-26
|
http://www.chemicalforums.com/index.php?topic=64564.0
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393463.1/warc/CC-MAIN-20160624154953-00180-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.912184
| 232
| 3
| 3
|
Mata Khivi was Guru Angad Dev's wife made the concept of langar (community kitchen), a reality. "Langar" is an open and a free kitchen at the Gurudwara serving food for all.
By Harjinder Singh
'Langar' refers to the distribution of food - free - to the sangat. It promotes the idea of equality as the members of the sangat are required to sit cross legged on the floor alongside each other, regardless of caste, status or rank. There is no special treatment meted out to individuals of a certain class, food is not especially prepared for a particular individual or group of individuals
Whilst preparation due regard is made to purity, the sevadars (selfless workers) will normally utter the Gurbani and refrain from speaking if possible. The mouth and nose will be covered by a piece of cloth known as a parna.
The Langar system originated during Guru Nanak 's time. Once as a child, he was sent to the city by his father - Bhai Kalu Chand - to perform a profitable trade, he was given money for this purpose and a friend known as Bhai Bala was sent with him. During the journey however, the Guru came across some Sadhus (holy ascetics) who were resting in a nearby forest, the Guru spent most of the evening with them before continuing on his journey. Once at the city, he spent the money given by his father on food for the Sadhus - much to the discouragement of his friend. When the Guru returned home, he was scolded by his father.
Throughout his travels, he caused for food to be distributed wherever he rested and some years later, when he returned from his journeys, the prophet caused for the institution of Langar to become regular at the village of Kartarpur. The langar system continued uninterrupted from that time. During Guru Amar Das Ji's time, the Guru made it compulsory that anybody wishing to see him must first partake in the langar Pahile Pangat Pishe Sangat. The emperor Akbar was not exempt from this rule and during his visit, he found himself sitting alongside the lowly folks of his empire eating the same food as them.
The Langar is prepared from the food donations that are made before the Guru Granth Sahib, a kitchen is set aside for this purpose. When the food is prepared, it is taken before the Guru Granth Sahib and an Ardas (prayer) is performed asking the Guru to accept the food and bless the sevadars who prepared it and bless those that eat from the Langar. Following this, it is served in the Langar hall. Traditionally, the head must be covered and shoes removed in this room, the langar should be served on the floor with the sangat sitting cross legged. However, due to Western influences, it is normal to find chairs and table laid out and the rule of removing shoes has often been waived. Gurudwaras in the subcontinent however, still observe the traditional regulations.
It is advisable not to leave leftovers. Meat - including fish and eggs and alcoholic/narcotic substances are strictly against the Sikh diet, hence these are not allowed on Gurudwara premises.
Some Gurudwaras have 24 hour free food service. Langar is also a venue to encourage voluntary service or Sewa for humanity. Sitting and eating together on the floor instills humility and symbolizes equality - Equality amongst all human beings. Discrimination, be it on the grounds of race, sex, color, caste, religion, disability or any social stratification is not permissible in Sikhism.
|
<urn:uuid:7d65dcb4-7f0e-4733-9f79-5acfc15eebb9>
|
CC-MAIN-2016-26
|
http://www.sikhwomen.com/Community/Volunteer/langar.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783391519.2/warc/CC-MAIN-20160624154951-00042-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.979622
| 758
| 2.546875
| 3
|
Equality before Law and Equal Protection of Law
|Law of Crimes - Indian Penal Code|
|Written by Hanumant's Law Journal|
|Tuesday, 08 September 2009 01:35|
Law of Crimes (IPC)
Q. 1 What is an attempt to commit an offence? Distinguish between Preparation and Attempt. What do you mean by attempt to commit murder? Whether without causing injury can a person be held guilty of attempt to commit murder? Do the elements of Sec 511 (attempt to commit an offence) apply to section 307, 308, & 309 (attempt to commit murder, culpable homicide, and Suicide)?
Q. 2 How far is mistake of fact, accident, act of child, insanity, and intoxication are valid and good defences under IPC? In IPC, mistake of law is no defence but mistake of fact is a good defence. How? What exemptions have been given by IPC to minors for an offence under General Exceptions? What has to be provided by a person claiming immunity from criminal liability on the ground of Insanity?
Q. 7 Define and explain Theft. How is Theft different from Extortion? Under what circumstances Theft becomes Robbery? Can a man commit theft of his own property? A finds a valuable ring on the road. A sells it immediately without attempting to find the true owner. Is A guilty of any offence? Differentiate between Robbery and Dacoity.
Q. 8 Define Rape. Can a person commit rape with his wife? (Sec 375)
Q. 9 Short Notes and Differences -
CFA, LLB (Hons)
|
<urn:uuid:0ee63e01-1326-4f77-b86e-76e879550ed8>
|
CC-MAIN-2016-26
|
http://hanumant.com/index.php/academics/law-notes/11-law-of-crimes-indian-penal-code-.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398873.39/warc/CC-MAIN-20160624154958-00050-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.943477
| 338
| 2.703125
| 3
|
For a fun, hands-on activity on the subject of color mixing, I divide a can of vanilla frosting into three containers and then mix each with one of the three primary colors (red, blue, yellow). Then I give each child a full graham cracker. On one end I place a large dab of each of the three colors, to make three piles. On the other end of the cracker the students combine colors using their fingers. I ask them to combine yellow with blue, yellow with red, and blue with red. This gives them the new colors of green, orange and purple. After the oohs and ahs, I let them eat their crackers and frosting. Then we fill in a color wheel together. Two books I find particularly enjoyable for this subject are: 'Little Blue and Little Yellow' by Leo Lionni and 'Mouse Paint' by Ellen Stoll Walsh.
|
<urn:uuid:ff5cc789-0e16-403f-8364-81572e2b622a>
|
CC-MAIN-2016-26
|
http://www.nea.org/tools/tips/Color-Mixing-with-Frosting.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783392527.68/warc/CC-MAIN-20160624154952-00199-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.934811
| 185
| 2.84375
| 3
|
"We must abolish everything that bears even the semblence of privelige."
Message to Congress, April 8, 1913
Between two great wars - the Civil War and the first World War - the United States of America came of age. In a period of less than fifty years, it was transformed from a rural republic to an urban state. The frontier had vanished. Great factories and steel mills, transcontinental railroad lines, flourishing cities, vast agricultural holdings marked the land. And in them came accompanying evils: monopolies tended to develop, factory working conditions were poor, cities developed so quickly that they could not properly house or govern their teeming populations, factory production sometimes outran practical consumption. Reaction against these abuses came from America's people and from her political leaders - Cleveland, Bryan, Theodore Roosevelt, Wilson. Their powerfully articulated reforms, idealistic in philosophy but realistic in execution, accepted the dictum that "legislation may begin where an evil begins." Indeed, the accomplishments of the period of reform served effectively to check the wrongs engendered in the period of expansion.
"The Civil War," says one writer, "cut a white gash through the history of the country; it dramatized in a stroke the changes that had begun to take place during the preceding twenty or thirty years. . . ." War needs had enormously stimulated manufacturing and had speeded up an economic process whose fundamental factors were the exploitation of iron, steam, and electrical power, and the forward march of science and invention.
The 36,000 patents granted before 1860 were but a pale forerunner of the flood of inventions to follow. From 1860 to 1890, 440,000 patents were issued, and in the first quarter of the twentieth century, the number reached nearly a million. The principle of the dynamo, which was developed as early as 1831, revolutionized American life after 1880, when Thomas Edison and others made its use practical. After Samuel F. B. Morse perfected electrical telegraphy in 1844, distant parts of the continent were soon linked by a network of poles and wires. In 1876, Alexander Graham Bell exhibited a telephone instrument and, within half a century, 16,000,000 telephones were accelerating the social and economic life of the nation. The tempo of business was quickened too by the invention of the typewriter in 1867, the adding machine in 1888, and the cash register in 1897. The linotype composing machine, invented in 1886, the rotary press, and paper-folding machinery made it possible to print 240,000 eight-page newspapers in an hour. After 1880, Edison's incandescent lamp brought to millions of homes better, safer, cheaper light than had ever been known beforeA The talking machine was also perfected by Edison who, in conjunction with George Eastman, developed the motion picture. These, and the many other applications of science and ingenuity, resulted in a new level of productivity in virtually all fields.
Concurrently, the basic industry of the nation - iron and steel - was forging ahead, protected by a high tariff. Previously concentrated near deposits in the eastern states, the iron industry moved westward as geologists discovered new ore deposits. Especially notable was the great Mesabi iron range at the head of Lake Superior which, within a short time, proved one of the greatest ore producers in the world. The ore lay on the surface of the ground and was easy and cheap to mine. Remarkably free of chemical impurities, it could be processed under the new converter or open-hearth methods into steel of superior quality at a price of thirtyfive dollars instead of the previously prevailing cost of three hundred dollars a ton.
|
<urn:uuid:60a58fa2-e336-4316-82eb-3742d806a4df>
|
CC-MAIN-2016-26
|
http://www.let.rug.nl/usa/outlines/history-1963/the-era-of-expansion-and-reform/introduction.php
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783404382.73/warc/CC-MAIN-20160624155004-00182-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.963197
| 747
| 2.96875
| 3
|
|Page 2 of 2 <|
Town Lives Only in Memory
"Obviously, it's bittersweet," Foer said. "I'm really looking forward to hearing everybody's stories." He never met his grandfather, he said, "so this is the closest thing to a replacement."
The real story is gripping enough.
Trochenbrod, founded in the early 19th century as a way for Jews to avoid long mandatory service in the Russian army, was one of a kind. While there were large Jewish communities in many cities and tiny Jewish farming villages scattered across Eastern Europe, Trochenbrod was an all-Jewish town the likes of which had not existed since ancient times.
The town was near the front lines during World War I. When Trochenbrod was occupied by Austria-Hungary, Bendavid-Val's grandfather Rav Beider, a rabbi, negotiated the relaxation of forced labor imposed on local civilians. He died during a typhus epidemic in 1917.
When the war ended, Trochenbrod fell under the control of newly independent Poland. The town grew and prospered. The first section of its main street was paved in early 1939.
The project was never finished. At the outbreak of World War II that September, Poland was swiftly conquered by Germany and the Soviet Union; Trochenbrod fell under Russian control. Then Germany betrayed its former ally and invaded the Soviet Union on June 22, 1941.
Perhaps because of the lenient treatment they'd received from the German-speaking Austrians during the previous war, many Trochenbroders didn't expect brutality from the German army. Many ethnic Ukrainians, too, initially welcomed the Germans as liberators from Soviet rule.
But the war between Nazi Germany and the Soviet Union was conducted with unprecedented fury, and Jews living in German-occupied territory were the targets of a grotesque campaign of genocide.
Trochenbrod was not spared. Not long after the occupation, 150 residents were taken to another town and killed. On Aug. 9, 1942, Ukrainian militiamen allied with the Germans surrounded Trochenbrod. Troops from a Nazi death squad known as Einsatzgruppe C rounded up the town's inhabitants. About 4,500 were shot and piled into a mass grave, according to a monument on the site.
A few, sensing what was about to happen, had fled into the woods before the massacre. Others ran after the shooting started and escaped.
About two weeks later, Poles living in the area told the survivors the killings were over. But those who returned were shot.
A final massacre took place on the Jewish holiday of Yom Kippur, which began that year after sunset on Sept. 20. Many survivors hiding in the woods, cold and hungry after weeks of living in terror, returned to the town. They, too, were killed.
By then, a total of 5,000 people had been killed. A handful of skilled tradesmen were taken to other towns by the Germans and worked to death or executed. A Jewish historian writing in April 1945, shortly before Germany surrendered, said only 33 of the town's residents were still alive by the end of 1944. By then, the town had returned to Soviet control.
The survivors had nothing to return to. Germans and Ukrainians had burned some of the buildings in the village. Other houses had been looted, disassembled and destroyed by partisans and farmers in the area. After the war, the Soviets bulldozed what remained and turned the land into a collective farm.
Trochenbrod had ceased to exist. But yesterday, it lived on in memory.
"According to the Jewish religion, you're not allowed to be cremated," Gold said. "But I am going to be cremated. I can't get Trochenbrod out of my bones. I want my ashes to go in the mass grave, and I want to be there with my aunts and my uncles and my cousins and my neighbors."
|
<urn:uuid:6ce4b760-4893-4073-b65a-017ab3fc2c56>
|
CC-MAIN-2016-26
|
http://www.washingtonpost.com/wp-dyn/content/article/2008/04/13/AR2008041302403_2.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393463.1/warc/CC-MAIN-20160624154953-00092-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.987074
| 815
| 2.625
| 3
|
The artist who designed the print pictured at the top of this page was called Yoshitsuya. He was born in 1822 and worked in Edo (now Tokyo) as a printmaker, illustrator and tattoo designer. Yoshitsuya died in 1866, aged 44.
Woodblock prints were not created by one single artist. The signature on a print belonged to the artist who drew the original design and he worked with a team of woodcarvers and printers whose names were rarely recorded. Woodblock print artists trained by becoming apprentices in the workshop of a master artist. Yoshitsuya studied in the workshop of Kuniyoshi Utagawa (1798-1861), one of the most important ukiyo-e artists of the time.
When they started their apprenticeship, a student took on a new name which included the one syllable of their master's name. Alongside Yoshitsuya, other artists such as Yoshitoshi, Yoshiiku, and Yoshitora trained in Kuniyoshi's famous school.
Japanese Warrior Prints:
Kuniyoshi was famous for designing warrior prints called musha-e and he turned this theme into one of the most popular print subjects of the day. Although warrior prints had been made since the early days of woodblock printing, the subject had never been very fashionable. When Kuniyoshi first started to make warrior prints in 1818, he found it very difficult to make a living; the public were more interested in buying actor prints and landscapes.
However, he had a big commercial breakthrough in 1827 with the a series of prints called '108 Heroes of the Suikoden', which illustrated stories of courage and strength. After this, the print-buying public began to enthusiastically support musha-e prints by Kuniyoshi and other ukiyo-e artists.
The time was right for Warrior Prints. By the 1840s and 1850s, Japan was in the final phase of a long period of peace and prosperity under the Shogun rule. The price to be paid for this was a strict state control over even the most trivial things.
In 1842, censorship banned prints of beautiful women and kabuki actors, and also pictures of recent political events. Prints with historical themes were allowed, and so pictures depicting warriors and legends became the life-blood of artists like Kuniyoshi. His student Yoshitsuya carried on Kuniyoshi's legacy, and also achieved fame for his masterful prints of warriors and historic legends.
*Students can explore the print further through an interactive.*
Apprentice - someone who learns a skill while working with a master
Censorship - not allowing people to do or see something
Masterful - shows skill or great ability
Prosperity - wealth and success
Trivial - not serious or important
|
<urn:uuid:cf35983c-2c99-4da8-9335-a693c0c9c352>
|
CC-MAIN-2016-26
|
http://www.mylearning.org/japanese-woodblock-print/p-346/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395620.56/warc/CC-MAIN-20160624154955-00113-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.979881
| 576
| 3.3125
| 3
|
A worldwide chain of Galileo ground stations on some of the remotest sites on Earth is nearing completion ahead of this year’s launch of two more satellites. Engineers spent a hectic Christmas and New Year on the main island of the Kerguelen group in the Indian Ocean, working against the clock to install the latest Galileo sensor station – measuring regional signal accuracy so corrections can be made if needed. There is no airport on this desolate, sub-Antarctic French territory, and a boat calls only four times per year. Dropped off on 13 December, the team had to install and test the station before departing on 8 January. “Everything had to be done on a single trip, or else it might not have been ready in time,” explains Fermin Alvarez Lopez, Galileo station engineer. “Fortunately in this case the team could reuse a surplus protective facility to host the Galileo station. “Usually, we begin with an empty field to which we need to bring power, construct a housing, install antennas and electronics and finally connect to the Galileo infrastructure via satellite.”
Inhabited mainly by seabirds and feral cats, Kerguelen is far from the loneliest Galileo site. Up in high northern latitudes, Norway’s Jan Mayen Island, fabled for some of having one of the worst weather in the world, will soon host a sensor station. The site infrastructure was assembled last spring and summer and will be brought online this year. It sits on a beach of black sand littered with bleached timber – the only flat area on the whole volcanic island. The islands of Reunion in the Indian Ocean and New Caledonia in the Pacific are much more hospitable, though their tropical conditions are more of a challenge for Galileo electronics, which have to be air-conditioned.
Reunion came on line last July and New Caledonia in January. “All the Galileo stations we construct around the globe are more or less identical but must contend with very different environments,” adds Fermin. A worldwide network of Galileo Sensor Stations will continuously monitor Galileo performance for the Galileo Control Centre in Fucino, Italy, to prepare correction messages. The corrections are sent to the satellites via a network of Uplink Stations every 100 minutes or less. There are already sensor or uplink stations at Fucino in Italy, Kourou in French Guiana, the Norwegian island of Svalbard, Troll in Antarctica, Reunion and Kerguelen in the Indian Ocean as well as New Caledonia in the Pacific Ocean, linked to two Galileo Control Centres based at Fucino for navigation services and Oberpfaffenhofen in Germany for control of the satellites.
The ground network is completed by two Telemetry, Tracking and Command stations at Kiruna, Sweden and Kourou, French Guiana, already used for monitoring the first Galileo satellites, launched in October 2011. Once four Galileo satellites are up in orbit – the minimum needed for navigation – at the end of summer, ESA can evaluate the performance of the overall system. “Stations are largely automated – personnel from our host organisations need only replace faulty parts,” concludes Fermin. “For places like Kerguelen, where logistics are so challenging, we plan the availability of spares very carefully indeed.”
|
<urn:uuid:ff295381-5eb4-4dac-a92b-70acceadf5d6>
|
CC-MAIN-2016-26
|
http://www.un-spider.org/news-and-events/news/galileo-ground-reaches-some-earth%E2%80%99s-loneliest-places
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396538.42/warc/CC-MAIN-20160624154956-00065-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.933429
| 689
| 2.671875
| 3
|
This year marks the centennial anniversary of the start of WWI, which lasted from July 28, 1914 through Armistice Day, November 11, 1918.
From the seeds of difficult wartime circumstances, the idea of victory gardens took root and bloomed. These vegetable, fruit, and herb gardens were planted at private residences and in public parks throughout the U.S., U.K., Canada, and Germany. Not only did the victory gardens reduce pressure on the public food supply, but gardeners - including children - felt empowered by their contributions and rewarded by the food they grew.
"Food will win the war." - President Woodrow Wilson
During the first few years of WWI, food production fell dramatically as resources (labor, finances, time) were diverted to aid in the war effort. In March 1917 - weeks prior to the United States entering the war - millionaire businessman and philanthropist Charles Lathrop Pack organized the U.S. National War Garden Commission and launched the war garden campaign, with the idea that the food supply could be greatly increased through grassroots, at-home means. His colorful campaign (see poster) promoted the cultivation of private and public lands, resulting in over five million gardens throughout the United States.
"Every boy and girl who really sees what the home garden may mean will, I am sure, enter into the purpose with high spirits.... The movement to establish gardens, therefore, and to have the children work in them is just as real and patriotic an effort as the building of ships or the firing of cannon."- President Woodrow Wilson
In a further move to support the home garden effort and boost morale, the Bureau of Education launched the U.S. School Garden Army (USSGA), funded by the War Department at President Wilson's direction. Its motto was: A garden for every child, every child in a garden.
The target audience of this program was urban and suburban boys and girls (ages 9 through 15) and their teachers. The curriculum included: growing vegetables from seed, growing flowers, building hotbeds and coldframes, organic matter and soil health, regional guides and more. There was a victory garden, for example, on the south side of Kennedy School (where the gym and English Wing stand today).
From Victory Gardens to Community Gardens and Beyond
Since the turn of the 21st century, a renewed interest in victory gardens has sprouted and flourished. Today, you can easily find community gardens in public spaces. In March 2009, First Lady Michelle Obama planted an 1,100-square-foot "Kitchen Garden" on the White House lawn, the first since Eleanor Roosevelt's WWII garden, to raise awareness about healthy food.
Portland Parks & Rec's Community Gardens program has provided gardening opportunities since 1975. There are 50 community gardens located throughout the city, developed and operated by volunteers and PP&R staff, offering a variety of activities. The urban oasis called Kennedy Community Garden (shown here) is found on NE 35th and Jessup, directly behind the Kennedy School.
And in the newly acquired Pig Farm property across the street to the north of Edgefield, a county-funded program called CROPS (Community Reaps Our Produce and Shares),founded in 2009, provides volunteers as well as those in the justice system with the opportunity to cultivate the land for the greater good. According to its website: "The CROPS farm has yielded thousands of pounds of organic produce for hundreds of low-income Multnomah County residents. Labor for the farm is provided by volunteers through Hands On Greater Portland and the county's Alternative Community Service Program through the Department of Community Justice. The harvest is then distributed to those in need by the Oregon Food Bank." This program will continue as McMenamins begins to develop the property in the coming years.
While these gardens may not be in the exact same locations as the original WWI (and WWII) victory gardens, the sentiment with which people attend to them is the same: "Assuredly tall oaks from little acorns grow." - Charles Lathrop Pack.
|
<urn:uuid:f286ae58-86d7-4725-891a-9ee2e5f487d5>
|
CC-MAIN-2016-26
|
http://www.mcmenamins.com/blog/2014/7/10/190-V-is-for-Victory-Garden-
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783391519.2/warc/CC-MAIN-20160624154951-00167-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.964062
| 828
| 3.484375
| 3
|
Some of these elements (P, Cl, K, Ti, Cr, and Mn) have no coronal spectroscopic measurements available. The determination of the elemental abundances of these rarer species will allow us to fill in the "blanks" of the solar wind versus photospheric abundance tables. This is important in obtaining a much better analysis of the solar wind feeding and acceleration processes in the chromosphere and inner corona. The solar wind and coronal elemental abundances indicate an ordering of relative abundance enhancement (or depletion) to photospheric values partially correlated with the the amount of energy required to strip off the first electron from the atom, that is to become ionized. This is called the "FIP effect", after the name for the energy involved - the First Ionization Potential. The newly observed solar wind elements have different chemical properties from each other and previously measured elements (first ionization potentials, first ionization times, charge state equilibrium times, atomic mass, etc.). Knowledge of their relative abundances serve as diagnostic tools for determining conditions in the chromosphere/transition region where ions are separated from neutrals. The elemental abundance determination of potassium (K) will be particularly interesting since its first ionization potential at 4.34 eV makes it the lowest FIP species observed to date in the solar wind.
The FIP effect is not the same for all types of solar wind. The temporal resolution of CELIAS means that abundance variations in different types of solar wind (e.g., coronal hole-associated vs. slow solar wind) may be better traced to varying conditions in the source regions of the solar wind.
The MTOF sensor is routinely measuring isotopic abundance variations for several elements (neon, magnesium, silicon, sulfur, argon, calcium, iron, and nickel), some of which have never been previously observed in either the solar wind, solar energetic particles, or spectroscopically. Among the new solar wind isotopes are those of silicon, sulfur, calcium, chromium, iron, and nickel. Other isotopes are being measured with a much finer temporal resolution than previously available (on the order of minutes/hours instead of months/years).
Matter in the corona and solar wind is derived from the outer convective zone (OCZ) of the Sun. Isotopic abundances of the less volatile elements in the solar atmosphere are probably very similar to terrestrial, lunar and meteoritic abundances. From such elements it is possible to infer the amount of isotopic fractionation under varying conditions in the solar wind source region. For many species, the solar wind provides the only source of information, which is important for many cosmochemical and astrophysical applications. Knowledge of the isotopic composition of the OCZ will yield information on the early solar nebula and the history of the solar system.
|
<urn:uuid:58d09e5d-4471-4367-8340-62ee28293bfc>
|
CC-MAIN-2016-26
|
http://space.umd.edu/mtof/pr.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402746.23/warc/CC-MAIN-20160624155002-00086-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.890905
| 581
| 3.484375
| 3
|
Producer - Vince Patton
Videographers - Michael Bendixen, Todd Sonflieth, Nicholas Fisher, Frank Swanson
Editor - Michael Bendixen
Only one group of animals on the planet can start life as eggs floating in little more than jelly, hatch into swimmers entirely underwater, then completely morph their bodies to grow legs and ultimately crawl out to live on land. Amphibians’ ability to adapt may account for some of the longest-surviving species across Earth’s history.
However, adaptation has met its limits. For those who study amphibians, there has been one steady constant for the last two decades; in many locations they’re getting harder to find.
Today, the decline of amphibians is accepted fact. Twenty years ago that was not the case.
Two scientists, working independently, appeared on Oregon Field Guide in 1993 to sound the alarm that amphibians were disappearing around the globe.
Today, if they felt boastful, they’d be justified in saying, “I told you so.”
“In 1993 we didn’t know exactly what was going on,” says Professor Andrew Blaustein of Oregon State University’s zoology department. “It was still controversial to say that amphibian populations were in decline. We were just trying to figure out whether they were in decline. We thought they were.”
Marc Hayes, a senior research scientist with the Washington Department of Fish & Wildlife (WADFW), says, “It took awhile for things to get rolling, but the really positive thing is that many people are paying attention now.”
Two decades of research by Hayes and Blaustein has shown no easy answers as to why amphibian numbers have plummeted.
Blaustein made headlines in the early ’90s with his conclusions that ultraviolet radiation affected survival of some frogs. Lesser noticed were his findings about the same time that a water mold also affected many amphibians.
“People love simple answers,” Blaustein says. “I don’t think it’s a simple answer why amphibian populations decline.Everybody always has their favorite hypothesis.”
In addition to UV radiation and water mold, Blaustein’s team of graduate students have looked for the chytrid fungus which has also been linked to frog die-offs.
He sends his students to places like Lost Lake, an alpine getaway just off Santiam Pass in Oregon’s central Cascades. Western toad populations are about half what they were 20 years ago at the lake, but still reasonably easy to catch. Equipped with sterile gloves and cotton swabs appropriate to a medical clinic, the budding scientists catch toads and rub the swabs up and down the toads’ bellies and legs.
Later tests in the lab reveal the chytrid fungus is present not only at Lost Lake, but at every lake Blaustein’s team has sampled.
Blaustein says, “The species that we look at, all of them tend to have a really different response to this fungus. So we have some species in the lab that die really, really quickly. Some species that don’t die at all.”
WADFW’s Hayes supervises another avenue of research that investigates how much aggressive bullfrogs are to blame for the demise of frogs. He says Oregon spotted frogs have disappeared from nearly 90 percent of their historic range.
Yet one small group of spotted frogs bucks that trend. At Conboy Lake National Wildlife Refuge in southwest Washington, spotted frogs appear to live harmoniously with the larger, and usually predatory, bullfrogs.
“It really stuck out as the odd place,” says Hayes. He’s guiding Portland State University graduate student Kyle Tidwell who’s found that spotted frogs at Conboy Lake have found the best survival tactic is to just stand still.
When a predator dives from above, like a bird, the frogs jump away fast.
But if they approach from the side as a bullfrog would, even an animal as large as Tidwell himself, the frog just stands still. Tidwell often can wade slowly right up to the spotted frogs with his arm outstretched while the frog simply remains frozen in place.
“If you are a prey item for a bullfrog, it’s a good career move to remain still,” says Tidwell. “A bullfrog won’t see you. He won’t eat you. A theory that I have is that these spotted frogs here at Conboy Lake may be adapted to not moving and are thus not seen by the bullfrogs.”
So are big, bad bullfrogs getting a bad rap?
Tidwell says, “It is unclear as of yet.”
In addition to bullfrogs, disease, mold, UV radiation and pesticides, Hayes and Blaustein agree that humans pose the greatest risk when they continue to bulldoze frogs from their homes in the name of development.
Says Blaustein, “The major problem is habitat alteration. Habitat destruction. We’re destroying their habits.”
Hayes adds, “If we’ve got things going on with frogs, we should be concerned about the general condition of habitat for humans as well.”
In 1993, when Oregon Field Guide first met him, Hayes was predicting that spotted frogs would soon be added to the endangered species list. 20 years later it appears that is about to finally happen.
“I think it’s a critically important step,” says Hayes. “Most of the endangered species acts at the state level don’t have an enormous amount of strength and when it steps up to a federal situation, it increases the attention on the species and help for the species enormously.”
A recent study from the U.S. Geological Survey says that in another 20 years, frogs could disappear entirely from half of the places they live in the United States.
WEB EXTRA: Toad With Fifth Leg
|
<urn:uuid:a84189a7-bad7-4520-91fe-e8e7dea7fe75>
|
CC-MAIN-2016-26
|
http://www.opb.org/television/programs/ofg/segment/amphibian-declines-driven-by-complex-causes/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393442.26/warc/CC-MAIN-20160624154953-00183-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.961283
| 1,297
| 3.34375
| 3
|
Proposed changes to Denmark’s refugee law would have a devastating impact on vulnerable people who, in addition to having assets seized, would be forced to wait years for the chance to reunite with their family members trapped in warzones and refugee camps, said Amnesty International today.
The Danish Parliament is set to debate Thursday, ahead of a vote Tuesday, on proposed amendments to the Aliens Act, including one that would make “war refugees” wait for three years before being eligible to apply for family reunification.
“It’s simply cruel to force people who are running from conflicts to make an impossible choice: either bring children and other loved ones on dangerous, even lethal journeys, or leave them behind and face a prolonged separation while family members continue to suffer the horrors of war,” said Gauri van Gulik, Amnesty International’s Deputy Director for Europe and Central Asia.
“Separation can have a devastating impact on families, including their rehabilitation from experiences of trauma and their ability to integrate and adapt to life in a new country.”
While there has been a public outcry over the Danish government’s proposal to seize certain refugees’ assets, there are a host of other equally far-reaching and regressive measures being moved swiftly through the country’s parliament. Among them are further restrictions on eligibility requirements for permanent residency, reductions to the length of temporary residence permits and the introduction of fees for family reunification applications (currently 7,000 Danish Krone or approximately 900 euro per application), as well as the travel costs of family members to Denmark.
The government has proceeded with these plans despite acknowledging that they risk violating Article 8 of the European Convention on Human Rights, which guarantees the right to family life. The UN Refugee Agency (UNHCR) has also warned that these proposals risk violating other articles of the European Convention and the global Convention on the Rights of the Child. The measures – including amendments passed in November 2015 making it possible for police to detain asylum-seekers and migrants without judicial oversight – are part of the government’s stated aim to make Denmark less attractive to asylum-seekers.
Following Thursday’s parliamentary debate on the latest amendments, a final vote on 26 January would bring them into law.Amnesty International is urging states to press Denmark to change its worrying stance on refugees when it faces scrutiny at the UN’s Universal Periodic Review on Thursday.
“The international community must call Denmark out as it enters a race to the bottom. Denmark was one of the first champions of the Refugee Convention, but its government is now brazenly creating blocks to the well-being and safety of refugee families,” said Gauri van Gulik.
|
<urn:uuid:c627e903-d8c4-49f2-abda-1b216a1f8b12>
|
CC-MAIN-2016-26
|
http://www.amnestyusa.org/news/press-releases/danish-parliament-should-reject-cruel-and-regressive-changes-to-refugee-law
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395613.65/warc/CC-MAIN-20160624154955-00064-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.962512
| 555
| 2.578125
| 3
|
|Why Accelerators Matter|
A cosmologist's assessment: The universe is not enough
For two decades, I have been an advocate for using the universe as a heavenly laboratory to extend our experimental reach in addressing some of the most exciting questions in science. Indeed, experiments using beams of neutrinos from the sun, a distant supernova and cosmic-ray collisions in Earth's atmosphere have taught us much about the properties of neutrinos, including the first solid evidence for neutrino mass.
Yet, in making the case for nonaccelerator physics, I (and others) may have been too successful.
|
<urn:uuid:6c1b4578-07d3-4b81-8480-9c502be1a694>
|
CC-MAIN-2016-26
|
http://www.fnal.gov/pub/ferminews/interactions/index.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398628.62/warc/CC-MAIN-20160624154958-00024-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.928012
| 127
| 2.515625
| 3
|
Evidence-based Practices to Teach Students with ASD
|October 24 - November 28, 2016|
This course is estimated to require 20 contact hours to complete.
Course facilitator: Taryn Goodwin, M.Ed, BCBA
Office phone: 804-827-2685
This course is designed to provide educators with skills and knowledge to instruct students with ASD in the educational setting. The course provides an overview of the importance of good instruction, appropriate skill selection, and evidence-based practices. A focus of the course will surround the "foundational five" evidence-based practices. The "foundational five" include: antecedent-based interventions, visual supports, systematic instruction, and interventions to promote social and communications skills. Participants will learn how to implement the "foundational five" practices through case study examples and supplemental learning activities.
Who Should Take This Course
This course is targeted for any educator who supports at least one student with ASD. This includes general education teachers, special education teachers, paraprofessionals, and related service personnel. However, individuals who do not have direct instructional responsibilities are still encouraged to participate in the course. Others who may be interested in taking the course can include administrators, family members, and other service providers.
Upon completion of this course, the participant will be able to:
- Identify five evidence-based practices.
- Identify the process of selecting skills to teach.
- Discuss antecedent-based interventions.
- Discuss the importance and use of motivation.
- Discuss prompting, reinforcement, and the three-term contingency.
- Identify the basic tools for teaching communication.
- Identify the basic tools for teaching social skills.
Module One: Foundations of Instruction
Module Two: Introduction to the Foundational Five
Module Three: The Three-Term Contingency
Module Four: Strategies for Teaching Communcation and Social Skills
Pace of the Course
This course is an online offering through the Virginia Commonwealth University Autism Center for Excellence. Please note that this is NOT a self-pacing course. You will have assignments and due dates that must be adhered to. The course consists of 4 modules. You will work your way through 1 module at a time completing course activities which include:
- Recorded presentations
- Interactive learning activities
- Video examples
- Group discussion board facilitated by a professional in ASD
Participants are to complete all course activities which include narrated lectures, video examples, and learning activities. The following activities are required to complete the course and receive a certificate of completion:
Quizzes: Once all content is reviewed in a module, completion of a module quiz is required. A score of 80% or better is needed to move to the next module. Participants will have two attempts to complete the quiz with a score of 80% or better. Participants need to obtain a score of 80% or better on all four quizzes. If participants are unable to meet this requirement, they are welcome to complete the course without receiving a certificate of completion or discontinue the course at that time and register for the next available section. If the participant chooses to discontinue and register for another section, s/he would have to complete the entire course again.
Discussion board postings: During completion of a module, the participant will be required to respond to a discussion board question. Participants are required to answer each of the three discussion board questions and respond to their assigned instructor's comments for a total of at least two posts per discussion board. Participants must answer all three of the discussion board questions in order to receive their certificate.
Certificate of Completion from Virginia Commonwealth University Autism Center for Excellence
Upon completion of the course in its entirety, you will be eligible for a Certificate of Completion. This requires you to complete each module by viewing each presentation and reading any associated documents, articles, and web pages. Once you have completed the course content, please fill out the course evaluation. Once the evaluation is completed, you will be provided with a link for a printable Certificate of Completion. The course will document 5 hours of contact hours.
Continuing Education Units
Points for educators working towards licensure renewal (recertification) may be awarded for completion of this online course. VDOE provides the following requirements regarding professional development activities: Point value: one point per clock/contact hour; must be a minimum of five hours per activity. We estimate this course to take a total of 25 contact hours to complete. Any teacher who wants to use it as a professional development activity for re-certification needs prior approval of the school district. The school district will be responsible for designating the actual number of points that a teacher can earn for participating in the course.
*Please note that the course/training does not meet any of the requirements for initial licensure in special education or any category of licensure endorsement.
Accessing the Course
To participate, you need a computer with (preferably high-speed) internet access, Adobe Flash Player software within your browser, and a sound card with speakers in order to listen to the lectures (full text transcripts are provided for all lectures and multimedia).
Participants will be able to access course materials on VCU's "Blackboard" website. Each participant is provided the course URL, a unique username and a password on the first day of class. Please note that each participant should have his or her own email address that is not shared with other individuals.
|
<urn:uuid:90ef617c-68e9-4b5d-9a76-16ac50b4b139>
|
CC-MAIN-2016-26
|
http://www.vcuautismcenter.org/training/effectiveInstruction.cfm
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395679.92/warc/CC-MAIN-20160624154955-00157-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.911396
| 1,118
| 2.984375
| 3
|
Ultraviolet image of Jupiter taken by the Wide Field Camera of the Hubble Space Telescope. The image shows Jupiter's atmosphere at a wavelength of 2550 Angstroms after many impacts by fragments of comet Shoemaker-Levy 9. The most recent impactor is fragment R which is below the center of Jupiter (third dark spot from the right). This photo was taken 3:55 EDT on July 21, about 2.5 hours after R's impact. A large dark patch from the impact of fragment H is visible rising on the morning (left) side. Proceeding to the right, other dark spots were caused by impacts of fragments Ql, R, D and G (now one large spot), and L, with L covering the largest area of any seen thus far. Small dark spots from B, N, and Q2 are visible with careful inspection of the image. The spots are very dark in the ultraviolet because a large quantity of dust is being deposited high in Jupiter's stratosphere, and the dust absorbs sunlight. Scientists will be able to track winds in the stratosphere by watching the evolution of these features. Jupiter's moon Io is the dark spot just above the center of the planet.
Object Names: Jupiter, Comet P/Shoemaker-Levy 9
Image Type: Astronomical
Credit: Hubble Space Telescope Comet Team
|
<urn:uuid:669c04f7-2701-4942-96c6-00076a617eb7>
|
CC-MAIN-2016-26
|
http://hubblesite.org/newscenter/archive/releases/1994/35/image/a/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398628.62/warc/CC-MAIN-20160624154958-00067-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.937739
| 271
| 3.390625
| 3
|
Brief SummaryRead full entry
Philip M. McDonald and Robert J. Laacke
Monterey pine (Pinus radiata) is the most widely planted pine in the world (9). Rapid growth and desirable lumber and pulp qualities cause it to be the leading introduced species in Australia, New Zealand, and Spain (34), and a major species in plantations of Argentina, Chile, Uruguay, Kenya, and the Republic of South Africa. In these countries, Monterey pine is a mainstay of the forest economy, serving internal markets, generating valuable foreign exchange reserves as an export, and reducing cutting pressure on native forests.
Pinus radiata was first noted by Thomas Coulter at Monterey, CA, in 1830. The scientific name refers to the strong markings on the cone scales, and the common name to the peninsula on which it grows extensively. Other common names are insignis pine and radiata pine. Radiata pine is a common name increasingly used worldwide; pino insigne is the Spanish equivalent.
|
<urn:uuid:411e8134-b22f-456d-97a4-1ec193ac88ee>
|
CC-MAIN-2016-26
|
http://www.eol.org/pages/1061749/overview
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783392099.27/warc/CC-MAIN-20160624154952-00162-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.916257
| 206
| 3.015625
| 3
|
Oxidation and reduction
Oxidation is a reaction where oxygen is gained.
eg iron + oxygen ---> iron oxide
Reduction is a reaction where oxygen is lost. Eg iron oxide is reduced to form iron.
Classify the following reactions as oxidation or reduction:
making aluminium from aluminium oxide,
burning carbon in air,
copper oxide + carbon --> copper + carbon dioxide
carbon monoxide forming carbon dioxide.
Electron loss and gain
Oxidation is also a loss of electrons
eg Fe --> Fe2+ + 2e-
Reduction also the gain of electrons eg (when Fe ions becomes Fe atoms
Identify all of the elements below as being oxidised or reduced in the following reactions:
Cu2+ + 2e- ---> Cu
lead ions forming lead atomsNa ---> Na+ + e-
Ca + Cl2 --> CaCl2
Fe2+ ---> Fe3+ + e-
Reduction of metal ores
An ore is a material found in the ground which contains a metal. An ore is often a metal oxide mixed with rock . When a metal is extracted its ore is reduced. Metal loses oxygen from its oxide. Examples include: haematite which is mostly iron III oxide
bauxite which is mostly aluminium oxide Al2O3
malachite which is mostly copper carbonate CuCO3
Extraction and position in reactivity series
Uses and properties of aluminium
extraction method that uses a lot of electrical energy. Electrical energy is more expensive than energy from burning carbon
The extraction of aluminiumAluminium is found in the ground in an ore called bauxite. Bauxite is aluminium oxide (Al2O3) with iron oxide impurities.
After purification aluminium oxide is mixed with cryolite to lower the melting point from 2000º to 1000º, which saves money.
This mixture is heated and the molten liquid used as the electrolyte. Both electrodes are made of graphite (carbon). The anode (+ve) is graphite and the cathode (-ve) is a graphite lining to a steel case.
The carbon anodes react with oxygen so have to be replaced.
C + O2 --> CO2
At cathode - positive aluminium ions attracted, gain electrons and become atoms.
Al3+ + 3e- ---> Al
At anode - negative oxide ions attracted, lose electrons and become atoms.2O2- ----> O2 + 4e-
uses and properties of aluminium
overhead power cables-good electrical conductor, low density
drinks cans-Does not react with water
aircraft parts -high strength and low density
Carbon and carbon monoxide for reducing oxides
Carbon and carbon monoxide can both remove oxygen from other compounds so are good for reduction.
They are used to reduce the ores of metals below carbon in the reactivity series.
E.g. zinc, iron, tin and lead.
Iron extraction using the blast furnace Drag and drop labels test on blast furnace
A blast furnace is used in the process of extracting iron. The raw materials iron ore, coke and limestone are put in at the top. Hot air is blasted into this furnace at the bottom making the coke (carbon) burn faster and the temperature rises to about 1500º.
When the coke burns, carbon dioxide is produced. C + O2 ---> CO2 CO2 reacts with the unburnt coke to form carbon monoxide CO CO2 + C ---> 2CO Iron oxide Fe2O3 in the ore is reduced to iron by the reaction with the carbon monoxide. 3CO + Fe2O3 ---> 3CO2 + 2Fe Molten iron is a dense liquid, so runs to the bottom of the furnace and is tapped off.
Limestone CaCO3 helps remove impurities during the extraction by forming calcium oxide
CaO. CaCO3 ---> CaO + CO2
The rock impurities silicon dioxide SiO2 are then removed by the following reaction.
CaO + SiO2 ---> CaSiO3 CaSiO3
is known as slag and can be used in making cement and road building.
The purification of copperVery pure copper is needed for copper wires. Electrolysis is needed to purify copper. The anode is a mass of impure copper and the cathode is pure copper. The electrolyte is sulphuric acid. The impurities drop at the anode as sludge during electrolysis. At anode Cu ---> Cu2+ + 2e-
At cathode Cu2+ + 2e- ---> Cu
|
<urn:uuid:3fab7ecd-544a-47c0-963a-160d608d6048>
|
CC-MAIN-2016-26
|
http://igcsechemisrtynotes.blogspot.com/2009/03/iron-oxidereduction-is-reaction-where.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397111.67/warc/CC-MAIN-20160624154957-00038-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.89087
| 968
| 3.84375
| 4
|
Report details mercury emissions in Pa.
PITTSBURGH, Jan. 26 (UPI) -- Mercury emissions from Pennsylvania coal-fired power plants, including three ranked in the Top 10 emitters in the nation, pose a serious threat, a report says.
A report by the group PennEnvironment says the emissions are a threat to public health and the environment, the Pittsburgh Post-Gazette reported Wednesday.
PennEnvironment's report uses 2009 federal data ranking power plants that emit the most mercury and details the severe and long-lasting health impacts of exposures to children and adults, the newspaper said.
The Keystone coal-fired power plant in Shelocta, Pa., is the second-biggest mercury emitter in the nation, the group says, and the Conemaugh power plant in southern Indiana County ranks fourth.
"Powering our homes should not poison Pennsylvania's kids," Erika Staaf, clean water advocate for PennEnvironment, said. "Mercury pollution from power plants puts our kids and our environment at risk, and we need the Environmental Protection Agency to force these facilities to clean up.
"We might not be the 'tailpipe of the nation' like New England states, but we're right in the middle of all that mercury pollution," Staaf said. "We're not only catching it from Pennsylvania utilities but also from all those other high-ranking states."
The report's release was timed to support the EPA's new standards to limit mercury and other toxic air pollutants, expected in March, proposals that are strongly opposed by the coal and utility industries, the Post-Gazette said.
Study: Humans, orangutans in genetic link
ARHUS, Denmark, Jan. 26 (UPI) -- Though chimpanzees are our closest relatives, humans have some genes more like those of a more distant kin, the orangutan, Danish researchers say.
Researchers Mikkel Schierup and Thomas Mailund of Aarhus University in Denmark set out to examine the genetic variation present in common primate ancestor species, an article in the journal Genome Research reported.
With the addition of the orangutan to the collection of sequenced primate genomes, they examined the DNA sequences contained in them.
"There remains signals of the distant past in DNA," Mailund said, "and our approach is to use such signals to study the genetics of our ancestors."
Mailund and his colleagues looked for regions of the orangutan genome where humans and orangutans are more closely related than humans and chimpanzees.
"[I]n about 0.5 percent of our genome, we are (more closely) related to orangutans than we are to chimpanzees," Mailund said, "and in about 0.5 percent, chimpanzees are (more closely) related to orangutans than us."
Because humans and orangutans split millions of years prior to the human/chimp split, Schierup said, that suggests the ancestral species of human and chimps maintained high genetic diversity, in contrast to the genetic bottleneck humans are believed to have experienced following our divergence from chimps.
Astronomers spot farthest, earliest galaxy
WASHINGTON, Jan. 26 (UPI) -- U.S. astronomers say NASA's Hubble Space Telescope has found the most distant object ever seen in the universe, at a distance of 13.2 billion light-years.
Researchers at the Carnegie Observatories say the compact galaxy of blue stars is 150 million more light-years distant than the previous record holder, a Carnegie Institute release said Wednesday.
The distance means astronomers are seeing the galaxy as it existed only 480 million years after the Big Bang, providing insight into the birth of the first stars and galaxies and the evolution of the universe.
"We are thrilled to have discovered this galaxy, but we're equally surprised to have found only one," astronomer Ivo Labbe says. "This tells us that the universe was changing very rapidly in early times."
Previous searches had found 47 galaxies at later times, when the universe was about 650 million years old.
The rate of star birth therefore increased by about 10 times in the interval from 480 million years to 650 million years.
"This is an astonishing increase in such a short period, happening in just 1 percent of the age of the universe," Labbe says.
Astronomers say every step back in time takes closer to the early universe's "formative years" when stars and galaxies were just beginning to emerge in the aftermath of the Big Bang.
"We're moving into a regime where there are big changes afoot," Garth Illingworth of the University of California at Santa Cruz says. "And what it tells us is that if we go back another couple hundred million years toward the Big Bang we'll see absolutely dramatic things happening."
Call for halt to pesticides in bee deaths
LONDON, Jan. 26 (UPI) -- Pesticides implicated in widespread bee deaths should be discontinued in Britain pending scientific evidence about their effects, U.K. politicians were told.
Labor MP Martin Caton told the House of Commons a new generation of "neonicotinoid" pesticides is linked by "a growing weight of science" to insect losses, The Independent reported Wednesday.
"Alarm bells should be ringing" about neonicotinoids, which are "systemic" insecticides present in every part of treated plants, including the pollen and nectar that bees and other pollinators gather, Caton said.
Research in the United States suggests neonicotinoids make honeybees far more vulnerable to diseases, the Independent reported.
Caton called on U.K. Food and Farming Minister Jim Paice to suspend use of neonicotinoids "until the best scientific evidence gives them the all-clear."
The government's position is that the compounds are safe when used properly, even though they have been banned, in varying degrees, in other countries, The Independent reported.
|
<urn:uuid:69088eef-4e2e-4102-b46c-416c0b75d27a>
|
CC-MAIN-2016-26
|
http://www.upi.com/Science_News/2011/01/26/UPI-NewsTrack-Health-and-Science-News/UPI-45181296084616/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395679.18/warc/CC-MAIN-20160624154955-00172-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.934485
| 1,224
| 2.8125
| 3
|
A defensive earthwork thought to be an Iron Age hillfort also includes a Roman villa dating from c120AD to late 3rd century. Excavations in 1866 revealed a detached building with two heated rooms and mosaics. Further foundations were revealed during road widening in 1929.
These features are visible as earthworks and cropmarks on air photographs. The fort comprises a broad ditch with a narrower bank either side on three sides and is sub-rectangular in plan. Within the fort are the parchmarks of the Roman villa. several rectilinear rooms or buildings are visible along with other fragmentary linear features. Three circular features are also visible, one of which is complete.
|
<urn:uuid:4ad47061-f02e-4b8e-a03f-7b15312fb64e>
|
CC-MAIN-2016-26
|
http://www.pastscape.org.uk/hob.aspx?hob_id=52079
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393533.44/warc/CC-MAIN-20160624154953-00026-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.968878
| 141
| 2.71875
| 3
|
|Yale-New Haven Teachers Institute||Home|
This unit includes information on events at the close of the United States Civil War until federal troops left the South in 1879. Also included in the background information are the amendments to the United States Constitution which accorded rights to those who had formerly been legally enslaved. Primary sources of information where people involved describe their thoughts and feelings during this period of transition are used in the development of lessons that require students to respond through their own journal writing as seen through the eyes of those who were present during these events.
The objective for students is to describe the circumstances which existed at the close of the Civil War; how these circumstances drove the policies of Reconstruction; and the effectiveness of Reconstruction. Daily assessment of studentsí grasp of the concepts and events presented will be through assigned journal entries written as if each student were a particular person living during Reconstruction. Students will also research individuals who played a major role in Reconstruction. The culminating project assigned will be a timeline from 1864 to 1879.
(Recommended for U.S. History, grade 8)
|
<urn:uuid:bbbc6b43-1c7d-49e5-8cec-b8173f318191>
|
CC-MAIN-2016-26
|
http://www.yale.edu/ynhti/curriculum/guides/2008/1/08.01.06.x.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397797.77/warc/CC-MAIN-20160624154957-00150-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.967856
| 219
| 4.3125
| 4
|
Review: Performance Evolution of Different Routing Protocols in MANET
Ad-hoc networks are basically self organizing and self configuring multi-hop mobile wireless network in which the information packets are transmitted in the manner as that in Massage Switching (store and forward) from a Transmitter to an arbitrary Receiver via intermediate Stations (nodes). A number of routing protocols like Dynamic Source Routing (DSR), Ad Hoc On-Demand Distance Vector Routing (AODV) and Destination-Sequenced Distance-Vector (DSDV) have been implemented. Mobile Ad hoc NETwork (MANET) is an autonomous system of mobile nodes connected by wireless links. Each node operates not only as an end system, but also as a router to forward packets. The nodes are free to move about and organize themselves into a network.
|
<urn:uuid:58cf520a-7123-44c0-9ff8-e4dacc62bc59>
|
CC-MAIN-2016-26
|
http://www.techrepublic.com/resource-library/whitepapers/review-performance-evolution-of-different-routing-protocols-in-manet/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399385.17/warc/CC-MAIN-20160624154959-00141-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.914848
| 171
| 3.1875
| 3
|
Many computer systems are not overly well protected when someone else manages to get physical access to the computer. This can be a family member, a colleague at work, your boss, or a thief who just stole your laptop at Starbucks.
While user accounts are usually secured by a password, the computer may not always be locked which in turn means that a third-party can access most programs, files and information on it unhindered.
If you take web browsers for example, they are not protected by passwords. The only thing that you can do in most is to add password protection to authentication information, but that is about it.
Chrome just like Firefox supports profiles that you can create. They can be used by the same person, for instance to separate work and entertainment from one another, but also by different family members or work colleagues on the same system.
Google has added a feature to Chrome recently that allows you to lock down the browser using your Google password. While that may sound like a good idea, it has implications which you need to know about:
- Since you are linking your Google account to a profile, it is necessary to stay logged in whenever you use that profile in Chrome. This means that you are always signed in to Google when you use the feature.
- While you can lock your Chrome profile so that it cannot be accessed, you too cannot use Chrome at that time.
- You need to manually lock Chrome, there is no option to do this automatically (for instance when the computer goes to sleep or is turned off).
Set it up
- The feature is experimental at the time of writing which means that it may or may not be integrated natively in the browser.
- Load chrome://flags/#enable-new-profile-management in the address bar and switch the preference to enabled. This enables the browser's new profile management.
- Click on the restart button to apply the change and relaunch the browser.
You will see a profile menu at the top right corner of the screen on restart.
- Here you need to sign-in to a Google account using your account credentials.
- Once you have done so, you see your profile picture and name listed in the menu.
- Here you also find the lock button which you can click on to lock down the browser.
- This switches Chrome to the user manager window that displays options to sign in again, create a new account, or browse as guest.
- This page will remain until you sign in again or use one of the other options provided on the screen. It remains active when you close Chrome so that you can use it to lock down your browser profile completely using the feature.
Another interesting option that is provided by this new user management feature is the option to make available a guest browsing mode to others.
This is excellent news if you don't want third-parties to use your browser profile -- see open tabs, bookmarks, visited websites and more -- without switching to a different browser to provide them with that option.
Cut the link
You can cut the link at any time by open chrome://settings/ in the browser and clicking on the "disconnect your Google Account" option there.
To go back to the old profile manager, open the chrome://flags/#enable-new-profile-management preference again and set it to disabled. Restart the browser afterwards and the profile menu is gone from Chrome once again.
|
<urn:uuid:c3f6fd9e-75a2-4d9d-a87b-1ae00fd70796>
|
CC-MAIN-2016-26
|
http://www.ghacks.net/2014/07/17/lock-google-chrome-profile-google-password/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398216.41/warc/CC-MAIN-20160624154958-00011-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.913705
| 702
| 2.515625
| 3
|
The Relationship Between Resistance to the Fungal Toxin Cercosporin and Grey Leaf Spot Disease Resistance in Corn (ZEA MAYS L.)
Lair, Bradley S.
MetadataShow full item record
The problem. Corn is infected by the fungus "Cerospora zeae-maydis" which causes the disease Grey Leaf Spot. The fungus produces a toxin, cercosporin, whose role in the pathogenicity of the disease is not known. The first step in determining the importance of the toxin to the fungus is to screen corn inbreds to see if any disease resistant inbreds are also resistant to the toxin. Procedure. Thirteen corn inbreds were tested for their degree of resistance to the fungal toxin cercosporin. The level of tolerance to cercosporin for each inbred was then compared to the inbred's level of resistance to Grey Leaf Spot. Resistance to cercosporin was determined by measuring the increases in the conductivity of water containing leaf tissue slices following exposure to cercosporin. Ion leakage is an indicator of cellular damage, so resistant tissue would be expected ro have a lower level of conductivity increase than susceptible tissue. Resistance to Grey Leaf Spot disease had been previously determined by field test conducted by Pioneer Hi-Bred International, Inc. Findings. The ion leakage assay showed that the inbreds which were more disease resistant tended to have a lower tolerance for cercosporin than did the less disease resistant inbreds (correlation coefficient = 0.5524). Conclusion. Based on the lack of a positivc relationship between disease susceptibility and cercosporin susceptibility it was concluded that cercosporin resistance does not have a significant role in the prevention of Grey Leaf Spot infections among the tested inbreds.
65 leaves. Advisor: Michael E. Myszewski
|
<urn:uuid:72995ed7-888f-46a5-b119-044ecd0041ab>
|
CC-MAIN-2016-26
|
http://escholarshare.drake.edu/handle/2092/526
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395621.98/warc/CC-MAIN-20160624154955-00005-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.938069
| 389
| 2.9375
| 3
|
After writing the previous entry I looked more closely at the Earth Simulator, and find myself intrigued. Large scale simulation opens up whole new possibilities, rather as the new science of optics did 500 years ago: partly for our knowledge of the physical world, but also understanding of our own behaviour and psychology.
As an example fro the Earth Simulator journal, a simulation study of the 2003 heatwave in Europe looks at the large scale climatic events in the Atlantic that preceded the heatwave. The paper says:
"...a long-range forecast model must have the atmosphere up to the top of the stratosphere, all oceans, the land surface, and perhaps the ice, interacting dynamically and thermodynamically with each other. Needless to say, the model must be able to accurately represent those second- order variables, such as the cloudiness, precipitation, and soil moisture, that are important for low-frequency forcing. Finally, but never the least, observational network must be improved to provide a reasonable initial condition to the forecast model. In the light of long evolution time scales of planetary-scale waves, having an accurate initial condition that extends up to the upper stratosphere is critical to a reasonably accurate simulation of the low-frequency evolution of the atmosphere. The next generation of super computers will be probably large and fast enough to handle the task..."
They should also allow us to study data over longer time-series than we have done so far, to see really long-term changes in action. 'New' data sources, such as fossilised tree rings, allow us to recreate weather observations that nobody actually recorded, even thousands of years ago, so there is more data than might at first seem.
If we ever manage to flesh out the Gaia hypothesis, it may be due to the availability of large-scale simulation and modelling techniques.
At the opposite end of the scale, simulations of genes and and proteins may enable radical new designs of the building blocks of cells.
Just as microscopes enabled us to see small things, and telescopes very large distant things, perhaps we are looking at another real extension of our perceptions and understanding, made possible by petaflop speed and vast data storage capabilities.
We're also developing the ability to amass large amounts of sociological data too. At first this is sinister: governments and marketeers developing the ability to track us. For instance, every time I use my credit card or take my mobile phone anywhere, I generate data which is stored somewhere. RFIDs may enable retailers to track my purchases and even my movements. Face recognition (or number plate recognition) software can already allow closed circuit TV cameras to track me around the streets of London. Most of this data will be simply thrown away, unless the Police want to use tiny chunks of it for some reason - to trace a person in a particular place at a particular time.
But if all of this data could be collected, stored, and then used to generate a simulation model, what new truths might emerge from the aggregate?
For instance, the work of University of California at San Diego sociologist David P. Phillips, Ph.D, suggests that
- accidents and suicides can be linked to media reports. (The "Werther effect")
- cardiac mortality increases on psychologically stressful occasions such as "unlucky days." (The "Baskerville effect")
- legalised ganbling leads to higher suicide levels.
- a 25% increase in deaths attributed to prescription drug errors on the 1st day of any month, when US pharmacists have a spike in prescriptions to prepare.
Economist Stephen Levitt has studied similar relationships between data sets that aren't normally collected (or at least correlated) to find evidence of:
- match rigging in Sumo wrestling
- homes owned by real estate agents selling for higher prices than homes owned by their clients
- incentive systems for teachers influence the extent to which they cheat in administering tests to their pupils.
Drs Phillips and Levitt are both extremely perceptive thinkers with unusual abilities to suspect the existence of new relationships and to know where to look for evidence.
But what might become visible if we had a 'telescope' that would make these relationships stand out clearly, just as Galileo detected Jupiter's moons because their unexpected motion was suddenly there for him to observe?
Would we close casinos? Have a more balanced and less sensational media? Be better able to anticipate social and individual vulnerabilities? Be more honest?
Group therapists have spent some time working on the theory of 'large groups': but nobody has so far been really able to study the largest group of all. As the evidence becomes available, and the unimaginably powerful tools to store and crunch the numbers, is this about to change?
500 years ago, people thought the sun went round the earth. The evidence was there all the time; only our ability to perceive has changed.
|
<urn:uuid:afc6b07c-5e4b-4a8e-bbb6-81d3df8d2997>
|
CC-MAIN-2016-26
|
http://www.simulation.cc/comments.php?id=A133_0_1_0_C
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393997.50/warc/CC-MAIN-20160624154953-00165-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.948854
| 992
| 2.90625
| 3
|
Where there’s oil, there’s a way. This summer the federal government showed that it is willing to approve drilling operations in U.S. waters off Alaska. In addition to legislation, other barriers to Arctic development are disappearing: summers at the North Pole could be ice-free as soon as 2020, reducing the need for ice-breaking vessels and opening the way for faster and cheaper trading routes. An increase in shipping across the top of the world, however, could have “significant regional impacts by accelerating ice melt,” according to a recent government report by the Canadian Northwest Territories. And that aggravated melting could raise global sea levels. Continue reading
In late September, Volkswagen admitted to using software that activated hardware to scrub nitrogen oxide (NOx) emissions during required emissions tests, but not during normal driving. The deception improved the cars’ gas mileage at the cost of emitting between 10 and 40 times the legal limit of NOx, a precursor gas to nitrogen dioxide (NO2), ammonia (NH3), and other gases that cause respiratory problems. In the last few years, newly maturing instruments of several kinds have converged on a single message: diesel exhaust in the real world is far higher than what carmakers advertise and what is permitted by the law in many countries.
A new pollution study in Europe using a van to chase other vehicles and measure their tailpipe emissions finds that newer, diesel-fueled, heavy trucks and buses emit, on average, 34% more of the health and climate hazard known as black carbon than older vehicles of the same types.
A century ago, Panama beat out Nicaragua to snag one of the biggest engineering projects of the age: a U.S.-backed canal that would link the Atlantic and Pacific oceans, creating a shorter trade route between East and West. In 2014 — the 100th anniversary of the Panama Canal’s completion — Nicaragua made plans for its own interoceanic linkage, which would be triple the length of Panama’s. If completed, the project could break Panama’s long- standing monopoly on the shipping trade in the region — but at a severe ecological price.
|
<urn:uuid:ad263dc2-3812-49ac-ba91-d9e2f974a495>
|
CC-MAIN-2016-26
|
http://lucaslaursen.com/tag/environment/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393533.44/warc/CC-MAIN-20160624154953-00046-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.947506
| 439
| 2.6875
| 3
|
An example of complacent is a person working in their office and not worried about the dangerous weather conditions outside.
- satisfied; esp., self-satisfied, or smug
- affable; complaisant
Origin of complacentClassical Latin complacens, present participle of complacere, to be very pleasing ; from com-, intensive + placere, to please
- Satisfied with the current situation and unconcerned with changing it, often to the point of smugness: “a geologic cautionary tale for a complacent world accustomed to reliable infusions of cheap energy” (Paul Roberts).
- Eager to please; complaisant.
Origin of complacentLatin complac&emacron;ns, complacent-, present participle of complac&emacron;re, to please : com-, intensive pref.; see com– + plac&emacron;re, to please; see plak-1 in Indo-European roots.
(comparative more complacent, superlative most complacent)
- Complacent should not be confused with its homophone, complaisant.
|
<urn:uuid:33c6ab5b-147f-498b-95ef-c4d66b1eeb7b>
|
CC-MAIN-2016-26
|
http://www.yourdictionary.com/complacent
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397744.64/warc/CC-MAIN-20160624154957-00061-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.793848
| 238
| 2.9375
| 3
|
Monday, August 27, 2012
The above shows lithium production globally. The data come from this paper before 2009 and from the USGS after that. Since the USGS excludes US production (to protect proprietary information of the sole US producer) I have added the 2008 US production to the 2009-2011 totals, which are therefore approximate. Since US production in 2008 was less than 3% of the total, the error is probably small.
As you'd expect, lithium production grew fairly steadily for decades but has taken off in recent years due to the widespread adoption of lithium batteries for many purposes. The average growth rate over the last decade was 8.1%. The USGS estimates around 30 million tons of lithium resource globally, so we are currently only mining a little over 0.1% of it per year - there is no significant resource constraint here until the late 21st century at the earliest.
|
<urn:uuid:69c0d761-b07c-4c83-984d-84a3733fd2d0>
|
CC-MAIN-2016-26
|
http://earlywarn.blogspot.co.uk/2012/08/global-lithium-production-1950-2011.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402699.36/warc/CC-MAIN-20160624155002-00082-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.960363
| 180
| 2.546875
| 3
|
- freely available
Sustainability 2012, 4(12), 3326-3345; doi:10.3390/su4123326
Abstract: The Elephant Marsh, a wetland in Southern Malawi, is important for fishing, agriculture, hunting and the collection of natural resources for the livelihoods of local communities. However, there has been increasing pressure driven by a changing climate, population growth, rural poverty and agricultural conversion, all of which threaten the future of the wetland. Currently, Malawi does not have either a national wetland policy or a climate change policy and wetland issues are only marginally present in the National Parks and Wildlife Policy of 2000 and National Fisheries and Aquaculture Policy of 2001. As a result, the country lacks a framework that could be strong enough to achieve balanced and sustainable wetland management for multiple resource users. The objective of this study was to establish the development potentials of Elephant Marsh from an ecosystem-based (‘working-with-nature’) perspective. It was revealed that there are development potentials in fisheries, recession agriculture, biomass for energy, conservation and tourism. This paper emphasizes that as these opportunities are developed, there will be the need to strengthen management institutions at local and national levels, and the coordination between the two.
Wetlands and other aquatic ecosystems cover about 20% of Malawi’s surface area. The 1971 Ramsar Convention, of which Malawi is a party, defines a wetland as any area of marsh, fern, peat, land or water, whether natural or artificial, permanent or temporary with water that is static or flowing, fresh, brackish or salty, including areas of marine waters, the depth of which does not exceed six meters at low tide. As Turner et al. observed, wetlands are the only single group of ecosystems that have their own global framework for conservation and wise use (maintenance of the ecological character). For a wetland to qualify as a designated Ramsar site, it has to exhibit unique ecological, botanical, zoological, limnological or hydrological importance. In Malawi, only Lake Chilwa (224,800 hectares) has been designated as a Ramsar site.
Despite its long history and importance, the Elephant Marsh in southern Malawi is not designated as a Ramsar site. It is also one of the least studied wetlands in Malawi. The publications that do exist [2,3,4] focus almost entirely on fisheries management. In 2004, an inventory was made of potential strategies for the management of crocodiles and hippopotamus in the Lower Shire region of Malawi that included the Elephant Marsh . This inventory however lacks attention on the integration of conservation with local livelihoods, as is the case in ecosystem-based management.
Ecosystem-based management is commonly defined as an integrated, science-based approach to the management of natural resources that aims to sustain the health, resilience and diversity of ecosystems while allowing for sustainable use by humans of the goods and services they provide . This definition imparts a holistic vision of ecosystem management by including humans as the users of goods and services. The introduction of humans into the approach necessitates the need to include human values such as equity, socioeconomic and cultural values as well as the harmony of their interrelationships. This perspective also implies the principle of integrated river basin management that involves a comprehensive inclusion of all land and water services (such as transport and fisheries), planning and regulation of human activities towards a complex set of interacting objectives to ensure long-term sustainability . It simultaneously looks at all economic water-related sectors such as fisheries, water supply, agriculture and tourism, and recognizes the implications that originate from multiple functions of a resource. Thus, ecosystem-based management moves away from looking at human needs first (e.g. food and revenues) and then incorporating nature into these needs. Rather, it first takes stock of both the human and ecosystem needs and potentials and then tries to strike a sustainable balance of utilization. In philosophical terms, ecosystem-based management expresses a vision of ‘partnership with nature’ rather than the traditional attitude of ‘mastery over nature’ and its success relies on a well coordinated policy framework.
Malawi does not have a national wetland policy and issues of wetlands (and floodplains) are only marginally present in the National Parks and Wildlife Policy , and in the National Fisheries and Aquaculture Policy . As a result, the country lacks a management framework strong enough to enforce a balanced and sustainable wetland development under rising pressures such as overexploitation and agricultural conversion which are mainly driven by population growth, rural poverty, climate change and market growth. In Elephant Marsh, additional drivers include fluctuation in water levels caused mainly by hydroelectric power generation at Kapichira Dam and the abstraction of water for irrigation by Illovo sugar estate; both located upstream. Moreover, the coordination of the roles of the various stakeholders in wetland management at Elephant Marsh is not very clear or stable.
One specific purpose of the paper is to analyze the ecosystem-based potentials of the marsh as one way of assisting local communities in sustainably exploiting goods and services from the Elephant Marsh. Local communities have been engaging themselves in initiatives for wetland protection such as restoration of river banks thereby demonstrating their awareness of the value of the wetland. As such, an overview of the opportunities that lie at the Elephant Marsh is important for any balanced development planning of the area. The second specific purpose of the paper is to highlight existing local institutions pertaining to the management of the marsh. In order to avoid overexploitation, future development options will have to be efficient and effective. There is a need to build on local institutions; for example, as partners in co-management arrangements.
2. Location and Ecology
Elephant Marsh is located on the East African Rift Valley floor in the southern part of Malawi (14°25'–17°50'S and 35°15'–35°15'E), see Figure 1. It covers an average area of about 600 km2, although actual size varies from about 2700 km2 in the wet season to 500 km2 in the dry season [2,10]. The variation creates season-oriented pressure on the ecosystem goods and services that communities can draw from the wetland. The Elephant Marsh straddles the administrative districts of Chikhwawa and Nsanje, which fortunately follow similar institutional arrangements and therefore no major trans-district problems arise. The region has an average altitude of 500 m above sea level and an annual precipitation range of 560 to 960 mm. The mean annual precipitation in Malawi is 1180 mm and the altitude ranges from 50 m asl to 3000 m asl. Four hydro-climatic seasons are identified, comprising (1) hot, dry weather with low river levels from July to September, (2) hot, windy, wet weather from October to December, (3) hot, humid, wet weather from January to March, and (4) humid, cool weather from April to June .
The marsh is fed by the Shire River, the only outlet of Lake Malawi, which flows through it in a southerly direction before joining the Zambezi river in Mozambique. It extends from the south eastern part of Illovo sugar estate to just above the confluence of Shire River and Ruo River at Chiromo. Since the Ruo River has a less buffered flow regime than the Shire, its peak flow levels can rise above those of the Shire’s, causing backflow into the marsh, sometimes (1950, 1991, 2001, 2011, and 2012) with substantial flood damage .
The marsh has relatively grassy margins but the bulk of its surface is formed by a mosaic of rooted swamp vegetation (sudd), floating vegetation and open water. In the southern part, this pattern is interspersed with islands with saline soils and palm trees. Table 1 shows the typical flora and fauna found at the Elephant Marsh.
|Scientific Name||English Name|
|Nymphaea odorata||Water Lily|
|Eichhornia crassipes||water hyacinth|
|Pistia stratiotes||Water Lettuce|
|Azolla nilotica and Salvinia molesta||Floating Ferns|
|Phragmites australis||Common Reed|
|Vossia cuspidata||Hippo Grass|
|Lonchocarpus capassa||Apple Leaf|
|Hyphaene benguellensis||Vegetable-ivory Palm|
|Ardea purpurea||Purple Heron|
|Butorides striata||Green-backed Heron|
|Ardea goliath||Goliath Heron|
|Nettapus auritus||African Pygmy Goose|
|Anas undulate||Yellow-billed Duck|
|Erythrocercus livingstonei||Livingstone’s Flycatcher|
|Scotopelia peli||Pel's Fishing-owl|
|Telecanthura ussheri||Mottled Spinetail|
|Phalacrocorax lucidus||White-breasted Cormorant|
|Haliaeetus vocifer||African Fish Eagle|
|Alcedo atthis||Common Kingfisher|
|Alcedo cristata||Malachite Kingfisher|
|Anaplectes rubriceps||Red-headed Weaver|
|Ploceus cucullatus||Village Weaver|
|Tringa totanus||Common Redshank|
|Tringa nebularia||Common Greenshank|
|Bubulcus ibis||Cattle Egret|
|Merops boehmi||Boehm's Bee-eater|
|Tchagra minuta||Marsh Tchagra|
|Estrilda astrild||Common Waxbill|
|Actophilornis africanus||African Lily-trotter|
|Actitis hypoleucos||Common Sandpiper|
|Tringa stagnatilis||Marsh Sandpiper|
|Rostratula benghalensis||Greater painted Snipe|
|Macronyx croceus||Yellow-throated Longclaw|
|Glareola pratincola||Collared Pratincole|
|Acrocephalus palustris||Marsh Warbler|
|Mycteria ibis||Yellow-billed Stork|
|Ardeola ralloides||Squacco Heron|
|Asio capensis||Marsh Owl|
|Rynchops flavirostris||African Skimmer|
|Crocodylus niloticus||Nile Crocodile|
The Elephant Marsh is also home to several species of fish, out of which Clarias gariepinus (locally known as mlamba), Oreochromis mossambicus (chambo), Oreochromis placidus (makumba), and Barbus ssp. (matemba) comprise over 90 percent of the commercial catch . The Elephant Marsh traps a big amount of sediment each year, making water downstream clearer and less polluted. The wetland also acts as an ecological barrier between Barbus johnstonii (Cyprinidae family) of Lake Malawi and Upper Shire, and Barbus marequensis of the Lower Shire and Zambezi .
The International Union for Conservation of Nature (IUCN) red list identifies Rynchops flavirostris (African skimmer) and Oreochromis mossambicus (chambo) as species under threat in its natural range while the Convention on International Trade in Endangered Species (CITES) list includes Crocodylus niloticus (Nile crocodile) and Hippopotamus amphibius (hippopotamus). The Elephant Marsh is therefore a very important habitat for these species.
3. Ecosystem Services
Wetlands are important for many ecosystem services, such as fisheries, agriculture, livestock grazing, (eco) tourism, water supply, water purification, carbon sequestration, wildlife goods, biodiversity, and transport. Quite often however, wetlands are subjected to a development paradigm that maximizes the one or two ecosystem services for which markets are readily available such as cash crop production .
The Elephant Marsh wetland is one of the most productive ecosystems in Malawi, contributing to the livelihoods of thousands of households in Chikhwawa and Nsanje districts . Agricultural production in and around the wetland relies on the wetland’s year-round moisture and the fertile alluvial soils. Rainfall is usually erratic and rain-fed agriculture is becoming less reliable. The high productivity of the soils has been one of the major attractive factors for human settlement around the wetland since as early as the 3rd century AD . With a natural population growth of 2.8% and an influx of people from upland and other districts such as Blantyre, Thyolo and Mulanje coupled with rising poverty in Malawi, where 74 per cent of the population is living below the income poverty line of US$1.25 a day , pressure to convert the wetland to agricultural land is likely to increase. The 2008 population and housing census report for Malawi indicates that about 100,000 people had immigrated to Chikhwawa and Nsanje districts between 1998 and 2008 . This represents about 14% of the original population thereby creating more pressure on the ecosystem goods and services of the Elephant Marsh.
Fisheries are an important sector of the Elephant Marsh. For Malawi as a whole, fish contribute 60 percent of the animal protein intake , and the fisheries industry directly employs over 60,000 people, and indirectly engages 500,000 beneficiaries through fish processing, transportation, marketing, as well as boat building and repairs [22,23]. Fishing mostly occurs between April and July when flood waters are receding and the fish becomes easier to catch. The annual fish production from around the Elephant Marsh has been estimated at an average of 8500 tonnes . This figure possibly includes the lower sections of the Shire River downstream from Elephant Marsh but generally indicates an annual production of 141.7 kg/ha. There are no recent data on the economic value of fisheries exploitation at the Elephant Marsh partly due to lack national interest in carrying out research on common pool resources such as the Elephant Marsh. Unfortunately, such data is very important for future impact assessment studies. Based on 1990 data on production and market prices, the economic value of Elephant Marsh fisheries was estimated at US$ 1.1 million per year . Fish prices change quite fast in Malawi. For instance, the average fish price at rural markets in Malawi rose from MK 88.05 (US$ 0.53)/kg in 1999 to MK 210.19 (US$ 1.29)/kg in 2001 implying that fisheries value at the Elephant Marsh is certainly higher at present than in 1990.
Fishing is complemented by recession agriculture in terms of both household labor and income . The major crops grown in and around Elephant Marsh include rice, maize, sorghum, millet, beans, cassava and sweet potatoes. The cash crops are mostly sold at the local markets and then transported by traders to bigger towns and cities . The economic value of Elephant Marsh’s recession agriculture was estimated at US$ 0.7 million per year in 1990 .
Elephant Marsh is used for livestock grazing which include an estimated 104,450 cattle . The estimated economic value of Elephant Marsh for grazing was at US$1 million per year in 1990 . The wetlands are a source of good, year-round fodder (mainly sedge and young reed) and watering points for the animals. The best grazing period in the wetlands however is during the dry season. Unfortunately, this coincides with the breeding season for crocodiles posing a danger to livestock and herders. Crocodiles are generally looked upon as enemies by the local people because of attacks and competition for fish. They have also been seriously hunted for their eggs, meat and skin. In 1997, for example, over US$ 23,000 was generated from the sale of 200 skins, which were exported to fashion houses in countries like France . The poaching has led to reduction in crocodile populations. Our own field visits in 2011 showed that hippos too are hunted, with meat sold locally. Numbers and values are as yet unknown.
The estimated total economic value of Elephant Marsh in 1990 of US$ 2.8 million per year , besides being outdated to some extent, notably excludes other important ecosystem services such as water supply, water purification, transport, natural products and biodiversity.
4. The People and Their Traditions
The indigenous people at the Elephant Marsh are the Mang‘anja but many other ethnic groups have migrated to the area, most notably the Sena . Other ethnic groups in the area include: Lomwe, Yao, Chewa, Ngoni, Tonga and Tumbuka. The Man’ganja are usually specialized farmers while the Sena tend to engage more in fishing and livestock keeping, with a relatively business-oriented outlook.
There are five main traditional areas (commonly known as Traditional Authorities) around the Elephant Marsh, namely: Makhuwira, Mlolo, Lundu, N’gabu and Mbenje. Apart from their communal power, traditional authorities also act as the intermediaries between spirit worshiping communities and their gods. A rain cult among the Mang’anja worships Mbona whose head is believed to have been cut off hundreds of years ago leading to an outflow of a river of blood. Mbona is said to annually return to the home of his wife (Salima) in the form of a snake that foretells what will happen in the coming year [29,30]. The Mbona cult has been linked to population movements, settlement patterns, acceptance or non-acceptance of immigrants. In the 1930s, Mbona, through Traditional Authorities, directed the population to emigrate and relieve pressure on the marshes of the Lower Shire as a reaction to perennial flooding of the marshlands .
There are four categories of land tenure in Malawi namely; customary land, public land, leasehold and freehold. Ownership of land at the Elephant Marsh is based on customary tenure and access to land is through kinship or marriage, depending on ethnic cultures and traditions. For example, the Man’ganja system of succession and inheritance is matrilineal while the Sena system is patrilineal whereby inheritance follows the male line and the wife moves to her husband's village. These original traditions and norms have now been eroded by intermarriage, modernization and intermingling between the different tribes [29,30,32]. However, in accordance with the National Land Policy of 2004, land under customary tenure is communal and cannot be sold outside the community. Communal land is governed by customary law, in which the traditional leaders are the custodians of the land [33,34,35].
5. Management Arrangements
The Elephant Marsh and Lake Chilwa were mandated as the first two protected game reserves in Malawi in 1897. The aim was to protect the large game animals, including elephants, which were common in the area. It is reported that one of the early missionary explorers to Malawi, David Livingstone, met a huge herd of around 800 elephants in the wetland hence the name Elephant Marsh . The customary management institutions that prevailed in the unprotected areas (common pool resources) all over the country were mainly influenced by secular and religious powers of traditional chiefs. For example, there were ritual prohibitions of hunting in forests associated with shrines such as the Mbona among the Mang‘anja . The enforcement of natural resource management regulations has, however, never been very effective and was largely interrupted by the two world wars . The final loss of statutory protection of the Elephant Marsh and Lake Chilwa seems to have occurred during the transition from colonial rule to the then newly independent government in 1964 that lacked a well-coordinated legal and institutional setup.
Due to its customary tenure status, the Elephant Marsh is managed by local institutions with little input from the central government. In Malawi, the hierarchy of power has been devolved from central government to give authority to District Assemblies (DAs) to make local decisions that may favor development . For example, the formation and implementation of by-laws to support fisheries management in a particular area is done by DAs. The DAs (made up of elected politicians and councilors; inherited traditional authorities; and appointed, influential members of society such as religious leaders and officials from non-governmental organizations) get advice and guidance from District Executive Committees (DECs), which are formed by government employees from different departments in the district. Decision making at this level is based on consensus between DAs and DECs [38,39]. The next lower level is headed by the Traditional Authorities (TAs) and comprises Group Village Chiefs who make Area Development Committees (ADCs). Authority at this level comes from DAs but support and technical advice is given by Area Executive Committees (AECs), which are made up of extension workers from government and representatives from non-governmental organizations. Decisions made by ADCs are passed on to Group Village Development Committees (headed by Group Village Chief and comprised of traditional village chiefs) for implementation at the community level through Village Development Committees. Decisions made at all these levels are generally accepted by the people because of involvement of chiefs who traditionally, have a lot of power.
At the village level and under guidance of the village chief, each development sector is represented in the form of an executive committee that is responsible for coordination of specific activities. Figure 2 depicts the overall arrangement.
In the fisheries sector, the village level committee is called Beach Village Committee. Access to the Elephant Marsh is controlled through customary law by the Beach Village Committees, operating through Beach Chairs. Beach chairs are strategically positioned at entry canals that lead into the wetland. Figure 3 shows one of the entry points. The house on the left is where the Beach Chairman sits to run the fishing affairs of his area of jurisdiction. Some twenty Beach Chairs are found around Elephant Marsh.
Community members can get access rights by paying an annual fishing license fee of MK 360 (US$ 2.19) to the department of fisheries. The fee is quite low compared to the value of fish and can be afforded by most members of the community. Figure 4 captures local relations that exist in managing the fishery at Elephant Marsh.
Based on our field visits in 2011, the arrangement appears to be working smoothly; one strength being that it assures community membership of the wetland users. Immigrants are restricted from access to the wetland but are allowed, for example, as fish traders. In most cases, they are easily identified and are fondly referred to as “Angoni” meaning “outsider” (although Angoni is a name of an ethnic group).
6. Ecosystem-Based Potentials of the Elephant Marsh
The Elephant Marsh has rich alluvial soils that favor most crops including rice and maize. The current agricultural activities around and inside the Elephant Marsh are mostly for household food and not large scale commercial purposes. Prospects for undertaking large scale commercial agriculture (rice and maize production) are strong however, given the currently low opportunity cost of labor and the proximity of urban markets. This would increase employment opportunities as well as the average income levels of the local people. At the same time, these very prospects might lead to big-time investment to drain and convert the wetland into a large-scale irrigation scheme. Although a detailed discussion of such irrigation schemes lies outside the scope of this paper, any analyst would have to be concerned with the possible negative effects of such schemes such as loss of ecosystem goods and services. The communities are currently organizing themselves in small scale commercial farming groups and obtaining loans from money lending institutions (such as Malawi Union of Savings and Credit Cooperatives) to support initiatives that reduce wetland degradation such conservation agriculture.
Increased fish production in the Elephant Marsh appears to be an opportunity. The wetland is a good breeding ground for many species of fish and the good road network to Malawi’s commercial capital of Blantyre (at about 120 km) and other densely populated districts puts the Marsh in a good economic position. If proper ecosystem management approaches are adopted, the fish catch will increase. For example, Denny et al. have proposed integration of smallholder wetland aquaculture into farming activities at Yala Swamps in Kenya, a wetland similar to Elephant Marsh; in a system they termed ‘fingerponds’. In this approach, small ponds are dug into the wetland and used for fish production while the excavated soil is used to create raised bed gardens for vegetable production.
The hippopotamus that are found in the wetland are known to maintain the channels that enable fishing and probably also enhance fish productivity by creating more landscape diversity. During our field visit in 2011, fishermen complained that the channels are becoming too narrow due to declining numbers of hippopotamus. Harvesting reeds and floating vegetation for energy (see below), done in such a pattern that there is a balance with natural primary production in the swamp may also create more open water and enhance fish production.
Papyrus and reeds grow thickly in the Elephant Marsh and are used locally to make mats, hats, chairs, thatch, granaries, baskets and fishing gear. Papyrus is also used as a lining for coffins. Lily bulbs (locally known as nyika) are sometimes eaten for carbohydrates especially in years of poor crop harvest . Value addition, crafts development plus urban and tourist marketing of these products may promote the livelihood of the locals and enhance their motivation to protect the ecosystem.
Malawi is a country faced with acute energy shortages. Only 8 percent of the population has access to electricity. The papyrus and reeds may therefore relieve the energy demand by acting as a source of bio-energy. A similarly high bio-energy resource potential from reed harvesting in Poland has been uncovered . Reed (Phragmites australis ) is a herbaceous lignocellulolic crop with a net calorific value of 4944.4 kWh/ton and an annual above-ground production of 20 tonnes per hectare . Assuming 60 percent of the Elephant Marsh has reed growth, 480,000 tons could be annually produced using biogasification (decomposing the vegetation into methane, using anaerobic bacteria), having a calorific value of 2.37 × 109 kWh. Theoretically, this could be converted into a steady 10 to 20,000 kW [41,43,44,45,46], which is about 3 percent of Malawi’s total installed electricity capacity of 302 MW .
How this energy potential might be utilized requires more research. It might well be, for instance, that solar panels, combined with a small battery and LED lamps, would be the superior solution for household-level lighting needs. The biomass energy from the marsh could then be used for heavier electricity demands (communal video centers, maize mills, etc.), especially in villages that lie close to the marsh’s entry points where the biomass can easily be transported by boat. Another energy option to be explored is to focus on heat rather than electricity production, e.g. making briquettes as an alternative for firewood .
The landscape and fauna at the Elephant Marsh and the rich cultural and historical heritage of the people around it [32,49] make it a potential destination for social and ecotourism. A joint effort of the Mlambe Foundation of the Netherlands, the Museums of Malawi and the Department of Antiquities has created a heritage center called Tisunge (which means ‘Let us keep’) at the entrance gate of nearby Lengwe national park to preserve Lower Shire’s historical and cultural heritage. Archeologists and oral traditions have revealed small stone and iron tools from short-statured foragers of the 3rd century AD, referred to as Batwa . The center has a library, a small museum and a children’s club.
Tourism in Malawi is estimated to contribute about US$ 159 million per year and employs about 5 percent of the population. Ecotourism may not only support conservation efforts but also boost the economic activities of the local people in the area. There are already two well known protected areas in the proximity of the Elephant Marsh (Majete game reserve and Lengwe national park). While there are no data on the ecosystem dynamics in the wetland at the time of Livingstone’s journeys to the area, it would be interesting to connect the management plan with those of the protected areas both biologically and in terms of tourist packages. The Elephant Marsh could specialize in bird watching. This could then be combined with ‘social tourism’ for travelers who want to stay with a local family, learn their culture, join fishing and village life, and follow the footsteps of Livingstone. Social and ecotourism can create new livelihoods and act as an incentive for conservation and other sustainable livelihood activities such as beekeeping. The initial stages require collaboration with the protected areas and investment in at least one fast and trustworthy tourist boat. A good example of successful wetland ecotourism in sub-Saharan Africa is the Okavango Delta in Botswana. On the downside of this potential, it is worth remembering that wetlands can be a breeding ground for such diseases as malaria and schistosomiasis . A health risk assessment needs to be done before social and ecotourism is to be stimulated.
7. Towards Co-Management of the Elephant Marsh?
The exploitation pressure on the Elephant Marsh will certainly rise due to background developments such as population growth, market forces, rural poverty and climate change. During 2011, the consumer price index for various rural commodities in Malawi rose by about 5% . If the food prices (including fish) and energy shortages will continue to increase, there is likelihood that powerful outsiders such as business oriented citizens from other parts of Malawi and abroad would buy or force their way in (usually through village headmen), move away the natives to resettle elsewhere and exploit the Elephant Marsh, for example, for large scale commercial agriculture. Such cases have happened at Likangala Irrigation Scheme in Malawi and Gambella rice paddy in Ethiopia.
On top of that, any realization of the development potentials discussed above will make the wetland more attractive for use by both locals and outsiders. In Section 5, we have seen that the current local management arrangements appear to be working well but also that they are quite informal and not protected by strong central institutions or state involvement. The question therefore arises to what extent and in which way institutions need to be strengthened in order to prevent them to succumb under the rising tide of interested exploiters. Will management institutions remain strong enough if purely locally based? Can local institutions be entrusted to also safeguard the supra-local ecosystem services performed by the Marsh? These questions indicate that institutional analysis is warranted, especially with a view to explore the option to engage government in the guidance and protection of the local arrangements and organizations.
The question of how to manage common pool resources (CPR)—of which the Elephant Marsh in an example—was raised in the late 1970s by the U.S. treaty tribes in the western part of Washington State to describe the relationship they aspired to have with state managers over fisheries management . This happened a few years after Garrett Hardin had published his seminal article on “The Tragedy of the Commons” which, based on a rational choice logic, proclaimed that any common pool recourse will ultimately be overexploited to the ruin of all. Even though empirical social scientists have demonstrated convincingly that this idea is often contradicted by real-world facts, it remains true that common property regimes can function sustainably only under certain conditions and can fail under increasing outside pressure . “The Tragedy of Common Access” therefore arises from lack of support and strong recognition by central states of the locally developed institutions, which usually are better placed to manage common pool resources [56,57]. Ostrom highlighted the need to nest smaller common property systems such as the Elephant Marsh in bigger enterprises, for example, wetland management frameworks at national level so that issues of cross scale cooperation can best be addressed. Currently, the central state in Malawi does not fully recognize the right of local resource users at the Elephant Marsh to create their own management institutions. This situation jeopardizes the sustainability of the local wetland management institutions at Elephant Marsh.
Central states can have many roles in common property management . Some are negative, e.g. usurping or undermining local institutions. Others are positive, such as actively protecting common land against intrusion by outsiders. Local institutions therefore evolve and reposition themselves around internal and external factors that best represent the legitimacy, ideologies and economic interest of more powerful actors [59,60]. This unfortunately encourages open access constellations where external actors tend to benefit more because central states fail to enforce formal rules to control the activities of intruders. This “New Institutional Approach” [59,61] usually leads to a shift towards leasehold land tenure systems, which disadvantages the locals and a subsequent erosion of local institutions . ‘Co-management’ is the term coined for arrangements in which government and communities or user groups share responsibilities over a resource. Co-management has been engineered early in fisheries practice [55,62] but presently gains an ever widening application like in forest management . Experience from elsewhere (such as Kafue Flats Floodplain Wetland in Zambia) has however shown that although co-management arrangements promise many theoretical benefits, there is usually limited involvement and cost-benefit analysis of local group interests [59,60,61].
Africa offers a fertile ground for co-management, because community-based management of common pool resources was historically built on the heritage of communalism that utilized complementary and mutually beneficial traditional systems [65,66]. The local level systems were based on locally specific knowledge of resource dynamics and resource users and therefore tended to vary much between locations. For the same reason, present-day institutional scientists emphasize that co-management arrangements need to be locally crafted; there is no “one size fits all” model . In Africa, recent examples of co-management approaches include the Community Wildlife Service (CWS) in Kenya; Communal Areas Management Program for Indigenous Resources (CAMPFIRE) in Zimbabwe; Administrative Management Design for Game Management Areas (ADMADE) in Zambia; and Community Partnerships for Sustainable Resources Management (COMPASS) in Malawi. In all these arrangements, there is a defined system boundary around a natural resource and set rules that regulate entitlement of ownership and use. Co-management in all these cases depends on a good integration of local regimes into national systems. When a natural resource is not protected by the state, for instance, the dynamics of the right to own, the right to use, and the conflicts of user rights and obligations become central. The COMPASS project, which was concluded in 2009, aimed at enhancing the capacity of rural communities to sustainably manage natural resources and improve household income from sales of natural resource-based products. The project was a success because it worked extensively with community based organizations and communities saw immediate benefits through diversified livelihood sources, food availability and activities that promoted natural resources management. Due substantial community involvement in both the COMPASS project and the current management arrangements at Elephant Marsh and the similarity in intended outcomes, there are many lessons that may be replicated.
Institutional theories can of course be used in the design of co-management arrangements. Examples are the populist approach [55,69] the neo-liberal approach [70,71,72] and the classical approach [70,73]. But as said, the art of successful system design is not so much in theory-led panaceas but in locally based institutional ‘bricolage ’ [74,75] in which universal criteria such as efficiency and equity are built into existing traditions and institutions as discussed in Section 4 and Section 5 of this paper.
8. Concluding Remarks
For Elephant Marsh and many other similar wetlands, the first action is to explore the need of institutional strengthening vis-à-vis the rising pressures of the business-as-usual scenario and a scenario of possibly successful realization of ecosystem-based development potentials. This can take the form of a negotiated consensus between an outsider assessment and the community’s own assessment of institutional strengths and weaknesses. This then would be a basis for an open-ended process of participatory institutional bricolage that focuses on the points where engagement of the state is most needed. One outcome could be that the state would confine itself to regulation of access by outsiders and safeguarding of a number of supra-local values such as sustainability, biodiversity and external ecosystem services, and leaves all else to the communities to manage.
The latest Malawi State of Environment and Outlook report highlights that many wetlands in Malawi (including Elephant Marsh, Ndindi Marsh, Marshes of Chitipa, Lake Chilwa, Rungwenya) are under major threat due to anthropogenic activities, mainly agricultural conversion . Malawi needs to develop a wetland policy that will help in promoting a balanced and sustainable wetland management for multiple resource users under increasing pressure from population growth, poverty, overexploitation, a changing climate and agricultural conversion. The policy would therefore be of particular essence in protecting the many Malawian wetlands that are under similar circumstances as the Elephant Marsh. Realizing the importance of the Elephant Marsh, it would be paramount to designate it as a Ramsar site with the aim of enhancing the opportunities highlighted earlier in this paper and to arouse interest in scientific studies, local community awareness and involvement as well as funding opportunities for the protection of the wetland. Although designation of a wetland as a Ramsar site may lead to wise use and protection, it should be noted that there is need for strong national and international programs that promote community awareness and involvement in managing wetland ecosystems. For example, although Lake Chilwa is a Ramsar site, it still faces challenges such as inadequate national and international support for implementation of the management plan that was developed in 2001 with funds from the Danish International Development Agency (DANIDA); this includes the allocation of water, ecosystem degradation resulting from poor agricultural practices and the overexploitation of natural resources (mainly bird hunting for food) by local communities. The Ramsar status of any wetland alone is not enough as a management option unless it is coupled with other initiatives that promote sustainable livelihoods of local communities. It is also important to improve data collection schemes at the Elephant Marsh so that decision making by local and national institutions as well as policy formulation and implementation are based on real time information. This study has revealed that if the available opportunities are to be efficiently and effectively exploited at the Elephant Marsh, there is need to rise above the institutional design principles of Ostrom which are based on nested enterprises and move towards real participatory approaches such as constitutionality (local people’s sense of ownership in bottom-up institution building). There is need to strike a balance between the local wetland management system, where pressure on the Elephant Marsh emanates mainly from poverty, and the national and international interests of biodiversity conservation as advocated by the Ramsar convention. Although enhanced production and maximum benefits from ecosystem good and services are central to any management system of the Elephant Marsh, it is important to realize that there are always limits to growth. Any management program for the Elephant Marsh should therefore strive towards sustainable exploitation of the opportunities that lie in the wetland’s goods and services.
Conflict of Interest
The authors declare no conflict of interest.
- Turner, R.K.; van den Bergh, J.C.M.; Soderqvist, T.; Barendregt, A.; van der Straaten, J.; Maltby, E.; van Ierland, E.C. Ecological-economic analysis of wetlands: Scientific integration for management and policy. Ecol. Econ. 2000, 35, 7–23. [Google Scholar]
- Ngoma, P.G. The Welfare Value of Inland Small-Scale Floodplain Fisheries of the Zambezi River Basin. PhD Thesis, University of Cape Town, South Africa, 2010. [Google Scholar]
- Chimatiro, S.L. The Biophysical Dynamics of the Lower Shire River Floodplain Fisheries in Malawi. PhD Thesis, Rhodes University, South Africa, 2004. [Google Scholar]
- Njaya, F.J. Challenges of Co-Management on Shared Fishery Ecosystems: Case of Lake Chiuta. CASS-PLAAS, University of Western Cape, Cape Town, South Africa, 2005. [Google Scholar]
- United States Agency for International Development (USAID). Crocodile and Hippopotamus Management in the Lower Shire; USAID: Lilongwe, Malawi, 2000. Available online: http://pdf.usaid.gov/pdf_docs/PNADB173.pdf (accessed on 7 February 2012).
- Garcia, S.M.; Zerbi, A.; Aliaume, C.; Do Chi, T.; Lasserre, G. The Ecosystem Approach to Fisheries: Issues, Terminology, Principles, Institutional Foundations, Implementation and Outlook; FAO Fisheries Technical Paper. No. 443; Food and Agriculture Organization: Rome, Italy, 2003. [Google Scholar]
- De Groot, M.; Drenthen, M.; de Groot, W.T. Public visions on the human/nature relationship and the role of environmental ethics. Environ. Ethics 2011, 33, 25–44. [Google Scholar]
- Government of Malawi. National Parks and Wildlife Policy; Government of Malawi: Lilongwe, Malawi, 2000.
- Government of Malawi. National Fisheries and Aquaculture Policy; Government of Malawi: Lilongwe, Malawi, 2001.
- World Bank. The Zambezi River Basin a Multi-Sector Investment Opportunities Analysis, State of the Basin; Report 3; World Bank: Washington, DC, USA, 2010.
- Nyasa Times. Nsanje Floods Left Hundreds Destitute. 2012. Available online: http://www.nyasatimes.com/malawi/2012/01/11/nsanje-floods-left-hundreds-destitute/ (accessed on 11 January 2012).
- Willoughby, N.G.; Tweddle, D. The Ecology of the Commercially Important Species in the Shire Valley Fishery, Malawi; Food and Agriculture Organisation (FAO): Rome, Italy, 1977. Available online: http://www.fao.org/docrep/005/AC673B/AC673B06.htm (accessed on 7 February, 2012).
- Hughes, R.H.; Hughes, J.S. A Directory of African Wetlands: With a Chapter on Madagascar; IUCN, UNEP, WCMC: Geneva, Switzerland, 1992. [Google Scholar]
- Dowsett-Lemaire, F.; Dowsett, R.J. The Birds of Malawi: An Atlas and Handbook; Tauraco Press and Aves: Liège, Belgium, 2006. [Google Scholar]
- Government of Malawi. Malawi State of Environment and Outlook. Ministry of Natural Resources, Energy and Environment; Government of Malawi: Lilongwe, Malawi, 2010.
- Banister, K.E.; Clarke, M.A. A revision of the large Barbus (Pisces, Cyprinidae) of lake Malawi with a reconstruction of the history of the southern African rift valley lakes. J. Nat. Hist. 1980, 14, 483–542. [Google Scholar] [CrossRef]
- McCartney, M.P.; Houghton-Carr, H.A. Working wetland potential: An index to guide the sustainable development of African wetlands. Nat. Resour. Forum 2009, 33, 99–110. [Google Scholar] [CrossRef]
- Timberlake, J. Biodiversity of the Zambezi Basin Wetlands: A Review of Available Information; Phase 1; Zambezi Society & Biodiversity Foundation for Africa consultancy report for IUCN ROSA; IUCN: Gland, Switzerland, 1997. [Google Scholar]
- Robinson, K.R. The Iron Age of the Upper and Lower Shire; Department of Antiquities: Lilongwe, Malawi, 1973. [Google Scholar]
- National Statistics Office (NSO). Malawi Population and Housing Census Report; NSO: Zomba, Malawi, 2008.
- Human Development Report 2011; UNDP: New York, NY, USA, 2011. Available online: http://hdrstats.undp.org/images/explanations/MWI.pdf (accessed on 20 February 2012).
- Government of Malawi. Annual Economic Report; Ministry of Finance and Development Planning and Cooperation: Lilongwe, Malawi, 2011.
- Yaron, G.; Mangani, R.; Mlava, J.; Kambewa, P.; Makungwa, S.; Mtethiwa, A.; Munthali, S.; Mgoola, W.; Kazembe, J. Malawi Poverty and Environment Initiative, Economic Study; Consultancy report submitted to the Malawi Government and the UNDP/UNEP MPEI Project; UNDP/UNEP: Lilongwe, Malawi, 2011. [Google Scholar]
- Seyam, I.M.; Hoekstra, A.Y.; Ngabirano, G.S.; Savenije, H.H.G. The Value of Freshwater Wetlands in the Zambezi Basin. In Proceedings of Globalization and Water Resources Management: The Changing Value of Water, University of Dundee, New Zealand, 6–8 August 2001.
- Brummett, R.E. Factors influencing fish prices in southern Malawi. Aquaculture 2000, 186, 243–251. [Google Scholar] [CrossRef]
- Matiya, G.G.; Kumagai, S.; Kazima, J. Factors Influencing Prices of Fish in Central Region of Malawi; UNESCO/IOC: Oostende, Belgium, 2003. Available online: http://aquacomm.fcla. edu/1396/1/AquaFish_2 23–25 (accessed on 14 February 2012).
- Turpie, J.; Smith, B.; Emerton, L.; Barnes, J. The Economic Value of the Zambezi Basin Wetlands; IUCN Regional Office: Cape Town, South Africa, 1999. Available online: http://www.anchorenvironmental.co.za/Documents/Pdfs/Turpie%20et%20al.%201999%20EconVal%20Zambezi%20Basin.pdf (accessed on 20 February 2012).
- Schoffeleers, J.M. Symbolic and Social Aspects of Spirit Worship among the Mang'anja. PhD Thesis, Oxford University, United Kingdom, 1968. [Google Scholar]
- Schoffeleers, J.M. Mang'anja Traditional Religion: Spirit Beliefs and Practices in Malawi's Lower Shire Valley; Kachere: Zomba, Malawi, 2008. [Google Scholar]
- Mandala, E.C. Work and Control in a Peasant Economy: A History of the Lower Tchiri Valley in Malawi, 1859–1960; The University of Wisconsin Press: Madison, WI, USA, 1990. [Google Scholar]
- Schoffeleers, J.M. 1968. In Guardians of the Land: Essays on Central African Territorial Cults; Schoffeleers, J.M., Ed.; Mambo Press: Gweru, Zimbabwe, 1979. [Google Scholar]
- Schoffeleers, J.M. The History and Political Role of the M’bona Cult Among the Mang’anja. In The Historical Study of African Religion; Ranger, T.O., Kimambo, I.N., Eds.; University of California Press: Berkeley, CA, USA, 1974; pp. 73–94. [Google Scholar]
- Takane, T. Customary Land Tenure, Inheritance Rules, and Smallholder Farmers in Malawi; Discussion Paper No. 104; Institute of Developing Economies: Chiba, Japan, 2007. [Google Scholar]
- Chirwa, E.W. Land Tenure, Farm Investments and Food Production in Malawi; Briefing Paper No. 18; Research Programme Consortium for Improving Institutions for Pro-poor Growth (IPPG): Manchester, UK, 2008. Available online: http://www.ippg.org.uk/papers/dp18.pdf (accessed on 16 February 2012).
- Matchaya, G. Land ownership security in Malawi. Afr. J. Agr. Res. 2009, 4, 1–13. [Google Scholar]
- Inter-Agency Working Group on Protected Areas. Protected Areas: Their Role and Future in Malawi’s Land Budget; MEMP: Lilongwe, Malawi, 1997.
- Mvula, P.; Haller, T. Common pool resource management in Lake Chilwa, Malawi: A wetland under pressure. Dev. South. Afr. 2009, 26, 539–553. [Google Scholar] [CrossRef]
- Njaya, F.; Donda, S.; Bene, C. Analysis of power in fisheries co-management: Experiences from Malawi. Soc. Nat. Resour. 2011, 25, 1–15. [Google Scholar]
- Denny, P.; Kipkemboi, J.; Kaggwa, R.; Lamtane, H. The potential of Fingerpond systems to increase food production from wetlands in Africa. Int. J. Ecol. Environ. Sci. 2006, 32, 41–47. [Google Scholar]
- Biemans, M.; Waarts, Y.; Nieto, A.; Goba, V.; Jones-Walters, L.; Zöckler, C. Impacts of Biofuel Production on Biodiversity in Europe; ECNC-European Centre for Nature Conservation: Tilburg, The Netherlands, 2008. [Google Scholar]
- De Wit, M. Bioenergy Development Pathways for Europe: Potentials, Costs and Environmental Impacts. PhD Thesis, University of Utrecht, The Netherlands, 2011. [Google Scholar]
- Murray-Hudson, M.; Mmopelwa, G. Biomass production and economic value of Phragmites australis reedbeds in southern Okavango Delta, Botswana. Afr. J. Plant Sci. Biotechnol. 2011, 5, 16–20. [Google Scholar]
- Gravalos, I.; Kateris, D.; Xyradakis, P.; Gialamas, T.; Loutridis, S.; Augousti, A.; Georgiades, A.; Tsiropoulos, Z. A Study on Calorific Energy Values of Biomass Residue Pellets for Heating Purposes. In Proceedings on Forest Engineering: Meeting the Needs of the Society and the Environment, Padova, Italy, 11–14 July 2010.
- Kryževičienė, A.; Jasinskas, A.; Gulbinas, A. Perennial grasses as a source of bioenergy in Lithuania. Agron. Res. 2008, 6, 229–239. [Google Scholar]
- Rajvanshi, A.K. Biomass Gasification. Alternative Energy in Agriculture, Volume 2; Goswami, D.Y., Ed.; CRC Press Inc.: Boca Raton, FL, USA, 1986. Available online: http://nariphaltan. virtualave.net/gasbook.pdf (accessed on 21 February 2012). [Google Scholar]
- Nilsson, L.; Pisarek, M.; Buriak, J.; Oniszk-Popławska, A.; Bućko, P.; Ericsson, K.; Jaworski, L. Energy policy and the role of bioenergy in Poland. Energ. Pol. 2006, 34, 2236–2278. [Google Scholar]
- Tenthani, C.; Kaonga, C.C.; Kosamu, I.B.M. The Potential of Distributed Generation in Malawi. In the National Symposium on Climate Change and Environment, Lilongwe, Malawi, 19–21 October 2011.
- Faxälv, O.; Nyström, O. Biomass Briquettes in Malawi. BSc Thesis, Linköping University, Sweden, 2006. [Google Scholar]
- Olsthoorn, S. Attitudes towards Tourism and Possibilities for Local Participation in Tourism Development in the Lower Shire Valley in South-Malawi. BSc Thesis, NHTV Breda University of Applied Sciences, Breda, The Netherlands, 2011. [Google Scholar]
- Welling, M. Integrating narratives of the past: Challenge of interdisciplinary research and the case of the Maravi states of East–Central Africa, ca. 1500–1850 AD. Religion in Malawi 2000, 10, 29–35. [Google Scholar]
- Verhoeven, J.T.A.; Arheimer, B.; Yin, C.Q.; Hefting, M.M. Regional and global concerns over wetlands and water quality. Trends Ecol. Evol. 2006, 21, 96–103. [Google Scholar] [CrossRef]
- National Statistics Office (NSO). Monthly Statistical Bulletin February 2012; NSO: Zomba, Malawi, 2012. Available online: http://www.nso.malawi.net (accessed on 5 April 2012).
- Ostrom, E. Understanding Institutional Diversity; Princeton University Press: Princeton, NJ, USA, 2005. [Google Scholar]
- Hardin, G. The tragedy of the commons. Science 1968, 62, 1243–1248. [Google Scholar]
- Ostrom, E. Governing the Commons: The Evolution of Institutions for Collective Action; Cambridge University Press: Cambridge, UK, 1990. [Google Scholar]
- Woodhouse, P.; Bernstein, H.; Hulme, D. African Enclosures? The Social Dynamics of Wetlands in Drylands; Cambridge University Press: Cambridge, UK, 2000. [Google Scholar]
- Institutional Change and the Politics of Resource Management in African Wetlands. African Social Studies Series; Haller, T., Ed.; Brill: Leiden, The Netherlands, 2010.
- De Groot, W.T.; Warner, J.; Smits, A.J.M. Introduction. In The Social Side of River Management; De Groot, W.T., Warner, J., Eds.; NOVA Science Publishers Inc.: New York, NY, USA, 2011; pp. 1–11. [Google Scholar]
- Haller, T.; Merten, S. We are Zambians—Don’t tell us how to fish!” Institutional Change, Power Relations and Conflicts in the Kafue Flats Fisheries in Zambia. Hum. Ecol. 2008, 36, 699–715. [Google Scholar] [CrossRef]
- Chabwela, H.; Haller, T. Governance issues, potentials and features of participatory collective action in the Kafue flats. Int. J. Commons 2010, 4, 621–642. [Google Scholar]
- Ensminger, J. Anthropology and the new institutionalism. J. Inst. Theor. Econ. 1998, 154, 774–789. [Google Scholar]
- Olson, M. The Logic of Collective Action: Public Goods and the Theory of Groups; Havard Economic Studies 124; Havard University Press: Cambridge, MA, USA, 1965. [Google Scholar]
- Kayembe, M. Forest Co-Management and Sustainable Livelihoods Programme; Mulanje Mountain Conservation Trust: Mulanje, Malawi, 2008. [Google Scholar]
- Borrini-Feyerabend, G.; Farvar, M.T.; Nguinguiri, J.C.; Ndangang, V. Co-Management of Natural Resources: Organizing Negotiation and Learning by Doing; KasparekVerlag: Heidelberg, Germany, 2000. Available online: http://learningforsustainability.net/pubs/cmnr/cmnr.html (accessed on 20 January 2012).
- Songorwa, A.N. Community-based wildlife management (CWM) in Tanzania: Are the communities interested? World Dev. 1999, 27, 2061–2079. [Google Scholar] [CrossRef]
- Leaky, R.; Morell, V. Wildlife Wars: My Fight to Save Africa’s Natural Treasures; St. Martin’s Press: New York, NY, USA, 2001. [Google Scholar]
- Pomeroy, R.S. The Government as a Partner in Co-Management. In The Fisheries Co-Management Experience: Accomplishments, Challenges, and Prospects; Wilson, D.C., Raakjær Nielsen, J., Degnbol, P., Eds.; Kluwer Academic Publishers: Dordrecht, The Netherlands, 2003; pp. 247–259. [Google Scholar]
- Berkes, F. Devolution of environment and resources governance: Trends and future. Environ. Conserv. 2010, 37, 489–500. [Google Scholar] [CrossRef]
- Olsson, P.; Folke, C.; Hahn, T. Social-ecological transformation for ecosystem management: The development of adaptive co-management of a wetland landscape in southern Sweden. Ecol. Soc. 2004, 9, 2. [Google Scholar]
- Blaikie, P.; Brown, K.; Stocking, M.; Tang, L.; Dixon, P.; Sillitoe, P. Knowledge in action: Local knowledge as a development resource and barriers to its incorporation in natural resource research and development. Agric. Syst. 1997, 55, 217–237. [Google Scholar] [CrossRef]
- Adger, W.N.; Benjamisen, T.; Brown, A.K.; Svarstad, H. Advancing political ecology of community in natural resources conservation. World Dev. 2001, 27, 629–49. [Google Scholar]
- Béné, C.; Neiland, A. From Participation to Governance. A Critical Review of Governance, Co-Management and Participation in Natural Resources Management; Policy, Economics and Social Science Discussion Paper Series, 74; World Fish Center: Penang, Malaysia, 2006. [Google Scholar]
- Biot, Y.; Blaikie, P.M.; Jackson, C.; Palmer, J.R. Rethinking Research on Land Degradation in Developing Countries; The World Bank Discussion Papers, 289, 139; The International Bank for Reconstruction and Development: Washington, DC, USA, 1995. [Google Scholar]
- Russel, A.J.M.; Dobson, T. Chiefs as critical partners for decentralized governance of fisheries: An analysis of co-management case studies in Malawi. Soc. Natur. Resour. 2011, 24, 734–750. [Google Scholar]
- Lankhorst, M.; de Groot, W.T. The Importance of Engaging with and Building on Local Institutions for PES and REDD Effectiveness; Leiden University: Leiden, The Netherlands, 2012. [Google Scholar]
© 2012 by the authors; licensee MDPI, Basel, Switzerland. This article is an open-access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/).
|
<urn:uuid:400efc6f-f071-4086-8f4d-d3bccdf960a2>
|
CC-MAIN-2016-26
|
http://www.mdpi.com/2071-1050/4/12/3326/htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397636.15/warc/CC-MAIN-20160624154957-00135-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.895549
| 12,637
| 3.03125
| 3
|
The bloody whirlwind that was September of 1862 gave way to a relatively quiet month of October.
It was as if the gore of Antietam, the bloodiest day in American history, on Sept. 17th, and President Lincoln following up with the Emancipation Proclamation five days later had stopped the Civil War in the East by these spectacular military and political events. The major battles this month would be fought in the Western theater at Perryville, Ky., and Corinth, Miss.
The front page of The Republican on Oct. 1st touted ads for marble or granite monuments and whitewood or black walnut caskets. The last camp to send soldiers to the war in Springfield was filling up as part of Lincoln’s call for 300,000 fresh troops.
The yet-to-be implemented draft, announced in August, was again postponed until Oct. 15th.
Trains passed through Springfield almost daily with regiments from throughout New England. The soldiers of the 13th Vermont Infantry filled 29 cars as they made a brief stop in the city for refreshments and cheers from the locals.
On Oct. 2nd, the Westfield and Holyoke companies marched into Camp Banks accompanied by their fellow townspeople, a Holyoke brass band and the Westfield fire brigade. That brought the population to 890 men at the Boston Road encampment that stretched over many acres near present day Pine Point.
“Milton Bradley has executed a capital lithographic view of Camp Banks. Central to the picture, and over all, as a guardian spirit, is a likeness of the noble general whose name the camp bears. All the boys will be pleased with this sketch of their first encampment,” wrote The Republican.
Besides the picture of the camp graced by former governor N.P. Banks, Bradley’s litho machines were busy turning out games that were small enough to be carried by soldiers to help pass the boring hours of camp life that he had witnessed in Springfield. He sold them by the thousands at a dollar apiece.
On Oct. 2nd, The Republican ran an article describing the design of the Medal of Honor recently authorized by Congress. At least 15 of these would be credited to Civil War soldiers and sailors from Western Massachusetts. One, of the six credited to Springfield, would be a sergeant of the 46th Regiment preparing for the war at Camp Banks.
Western Massachusetts fighting men were scattered all over the map, some with Gen. Benjamin Butler in New Orleans, others in North Carolina, Texas, Florida, South Carolina, and Virginia. The Republican had several correspondents with these various units, many of whom wrote under pen names to protect themselves from officers they might criticize. The most famous was Dunn Browne, a soldier whose first dispatch from Bolivar Heights, near Harper’s Ferry, Va., was sent on Sept. 8, 1862, to be followed by 89 more as the war progressed.
He had written dozens of travel pieces during the 1850’s for The Republican under the same Dunn Browne pseudonym. Republican editor Samuel Bowles compiled them into a book. That same humorous slant continued during the war as he poked fun at himself and did not spare his superiors.
In one of his October dispatches he wrote: “The grand army of the Potomac, I am happy to inform you, anxious Republican, is safe (and so are its enemies).” Browne took aim at Major Gen. George B. McClellan whom he described as a master of inactivity.
It was an observation shared by the man Browne referred to as “that tall president.” Abraham Lincoln’s face-to-face meeting and nearly continuous call for action on McClellan’s part were ignored by the general. He would last the month, barely.
Springfield was preparing for another invasion of sorts in the second week of October when nearly 8,000 faithful would attend the 52nd annual convention of the American Board of Commissioners for Foreign Missions. The Oct. 7th-10th session would tax the city’s resources already stretched thin by hordes of new workers at the armory and other war oriented industries not to mention the nearly 1,000 soldiers in camp.
The American Board, organized in 1811, had sent out 1,258 missionaries to 39 countries since it had established its global network.
The four-day conference turned out to be a great success, save for the pickpockets that worked the crowded halls and auditoriums and unseasonably warm temperatures near 90 degrees. Extra trains and greatly reduced fares help get the crowds in and out of the city.
At the same time the missionaries were meeting in Springfield, Massachusetts Democrats were convening at Worcester and crafting a series of resolves attacking the policies of President Lincoln.
First among them was that they “deeply regreted” that Lincoln declared the Emancipation Proclamation on Sept. 22, 1862. They resolved the proclamation was “in the name of civilized humanity” unconstitutional, inexpedient and unjustifiable on the grounds of military necessity.
They also attacked the president on his suspension of certain “constitutional right” such as writ of habeus corpus and trial by jury. They also “resolved” that McClellan should be allowed to keep his command without interference.
On the suspension of habeus corpus, The Republican was quick to point out that Gen. Andrew Jackson, patron saint of Democrats, did the same thing in New Orleans, but Democrats took the opposite view in 1844 when a measure was proposed to refund a fine imposed on Jackson.
On Oct. 11th, The Republican reported another arson fire had broken out in downtown Springfield. Several businesses, a paint shop and saloon were destroyed in the most recent of several suspicious blazes. The city fathers were already running ads in the paper offering a $500 reward for the arrest and conviction of those responsible for a fire in the Union Block back in August.
While McClellan and his army were dormant, the readers of The Republican learned on Oct. 13th of the daring Confederate cavalry raid deep into Pennsylvania by Jeb Stuart. The rebels captured tons of supplies and 800 horses. The newspaper recounted one instance where the rebels halted a funeral procession and took the horses attached to the hearse.
On that same day it was reported that several of the original officers of the 10th Massachusetts, the first regiment from Springfield to leave for the war, had been placed under arrest and faced court martial for protesting the choice of Capt. Dexter Parker to be their new major. Parker, a former state representative, was seen as a politically connected outsider, although he was a veteran of previous battles. The bickering went on for weeks.
Back in Springfield military discipline was also an issue and stringent orders in relation to deserters were published which called for policing the camps and empowering local authorities to arrest suspected deserters. The Republican wrote the following on one incident that deals with the desertion problem and points out the anger felt towards the English who at this time were aiding the Confederates:
“Two scamps named James Hayden and Francis Leonard, Englishmen by birth, who were previously employed at the factories in Indian Orchard, were arrested as deserters in this city by Officer Shaw. They have enlisted under various aliases in this state and Connecticut and after getting the bounty deserted.”
The newspaper went on to recount how they spent most of their ill gotten gains “having a good time.” The article concluded, “This getting the bounty from the government and then deserting, is the meanest of all mean things. But what better could we expect from Englishmen.”
As the month drew to a close activities at Camp Banks were stepped up. The soldiers now knew they would be sent to join with local 27th and other Massachusetts regiments in North Carolina. More than $5,000 in bounty money had been distributed, special trains had been put on for visitors to say their good-byes and Gov. John Andrews had reviewed the troops.
The men of the 46th were issued new uniforms and overcoats. The uniforms were fine, but the coats were a disaster and turned out to be another example of profit gouging.
“The overcoats furnished to our new regiments are absolutely worthless, and it is an outrage upon the soldiers to force them to take them,” wrote The Republican. “They come from Pennsylvania contractors, whose fraud upon the government have been indecent and monstrous since the war commenced.”
Meanwhile, an ad in the newspaper by the Haynes Company of downtown Springfield was seeking seamstresses and tailors to work on an order for 16,000 coats. Previously the city-based Brigham Co. had turned out thousands of coats with only two being returned.
On Oct. 30th, The Republican described in great detail that the Ames manufacturing company of Chicopee had completed an elegant presentation sword intended as a gift from the 21st regiment to Gen. Jesse Reno.
“The blade is beautifully engraved and the hilt embedded with magnificent sapphire and other gems.”
The sword would be presented to the general’s widow. He had been killed in September at the Battle of South Mountain.
In 2001, a Maine auction house sold the Reno sword for $109,000, setting a record for an Ames sword.
At the end of the October 1862 the newly formed Internal Revenue Service estimated it would collect $250 million in national taxes for the year. That would be enough to pay for half of the war expenses. The Republican also reported war-driven inflation was pushing up the price of everything and the prospects for the poor in the coming winter were bleak because of the high cost of kerosene.
Two competing newspaper ads sought agents to sell a couple of newly minted books – “History of the Civil War in America” by J.T. Headley, and “Abbott’s History of the Civil War in America.”
They may have been jumping the gun. There was much more history to be made.
|
<urn:uuid:cab5f4bb-47d7-44a1-b1eb-ce71a5c3a50f>
|
CC-MAIN-2016-26
|
http://www.masslive.com/history/index.ssf/2012/10/civil_war_october_1862_bounty_jumpers_pickpockets_and_politicans.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396872.10/warc/CC-MAIN-20160624154956-00085-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.981902
| 2,090
| 2.75
| 3
|
Make MRI Images Crisper with Iron Oxide Nanoparticles
Medical imaging has come a long way in the last hundred years. The next great improvements in imaging may be largely due to nanotechnology, which helps diagnosticians pinpoint problem spots and improve the quality of images.
Physicians often use magnetic resonance imaging (MRI) to obtain images of the organs in a patient and avoid potentially harmful imaging methods such as x-raying.
So how does MRI work? Most of the molecules in your body contain hydrogen. Water molecules have two hydrogen atoms, and the organic molecules that make up the rest of our bodies are called hydrocarbons because they contain hydrogen and carbon. The magnetic fields generated by the MRI machine interact with hydrogen atoms throughout the body, producing an image of all the organs.
Hydrogen has just one proton in its nucleus. It’s this proton in hydrogen that the MRI uses to produce images of the inside of a patient. In the magnetic field generated by the MRI machine, the spin of the protons in the hydrogen atoms are set in one direction.
If you’ve been unfortunate enough to plow through about 200 advanced mathematics classes to study quantum mechanics, you know that protons have spin. The direction of that spin determines the direction of a magnet, which is composed of the spins of all the charged particles (protons and electrons) together.
To take an MRI image, the MRI machine generates a radio frequency pulse that has just the right amount of energy to flip the spin direction of the protons. When the protons flip back to the spin direction aligned with the magnetic field, they send out another radio frequency pulse. This pulse is detected by the machine, which then uses the pulse to generate an image.
The time it takes for the protons to flip back and generate the return radio frequency pulse depends on the protons’ location and the density of the tissue. This relaxation time is different for protons in an organ than for protons in the bloodstream and is different for healthy tissue than it is for cancer tumors. These differences in the relaxation time are used to generate the MRI images.
By now, you’re asking yourself, where do nanoparticles enter the picture? Remember that iron oxide is paramagnetic. You get a better MRI image if paramagnetic nanoparticles are attached to the object you’re imaging.
Paramagnetic nanoparticles reduce the time it takes for the protons to flip back to the spin direction aligned with the magnetic field. Therefore, the difference in the relaxation time of the tissue that has nanoparticles attached versus the relaxation time of the surrounding tissue is greater, which creates more contrast and produces a clearer image.
Because of this effect, researchers are functionalizing iron oxide nanoparticles by coating them with molecules attracted to specific sites, such as cancer tumors, to provide a better MRI image.
|
<urn:uuid:46f70bac-264d-47a8-a1b9-875740761864>
|
CC-MAIN-2016-26
|
http://www.dummies.com/how-to/content/make-mri-images-crisper-with-iron-oxide-nanopartic.navId-612405.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783391766.5/warc/CC-MAIN-20160624154951-00034-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.914678
| 586
| 3.96875
| 4
|
Since 2004 Google has been in widespread use, and there are now generations of people who have grown up using Google on a daily basis.
These are the same people that have grown up in an age of technology, using mobile phones and specifically SMS text messaging. It has long been argued that text messaging has negatively impacted people’s ability to spell and use grammar correctly, particularly in formal writing.
Google is similarly positioned to exert such negative influence and I’ll attempt to show how it could be doing using an example from the world of retail.
I was actually working for a client in the retail sector who sells clothing when I came across some shocking examples of the use, or rather misuse, of the apostrophe within meta titles and descriptions belonging to some of the major UK retailers.
Sorry if you find this next section a little patronising, but I’m going to assume that everyone reading this has had their understanding of grammar impaired by the continued use of search engines and mobile phones.
Which is Correct:
I’ll get the first one out of the way immediately, there is no such word as “mens”. “Men” is already a plural and so does not need pluralising in this way. This also makes “mens’…” inaccurate. The correct plural possessive (as the clothing ‘belongs’ to men) is therefore “men’s”.
Now let’s see which of the top 7 retailers got this one right in their meta title and description:
As we can see, all of the retailers have used the grammatically incorrect version, although interestingly Republic has chosen to optimise for both “mens” and “men’s”.
Womens Clothing, Women’s Clothing or Womens’ Clothing?
The rule for “women” is exactly the same as for “men” above. The correct use is therefore “women’s clothing”.
Again let’s see which of the top 7 ranking retailers got this one correct in their meta title and description:
Many more retailers seem to have got this correct, the reason for which I shall return to later.
Ladies Clothing, Lady’s Clothing, Ladies’ Clothing?
This is probably the most tricky one of the three examples I’ve provided. “Ladies” refers to more than one ‘lady’, whilst “lady’s clothing” would refer to one particular lady’s clothing. The correct choice is “ladies’ clothing” with the apostrophe after the ‘s’ being used to signify possession (the clothing ‘belongs’ to the ladies).
Not many of the major retailers seem to be targeting this keyword, but those that were all seemed to have opted for “ladies…” and not “ladies’…”
Why Do Google Not Auto-correct?
This confused me somewhat. Normally if you spell something incorrectly Google will either automatically correct your spelling, or at least suggest what it thinks you might mean. Enter “mens clothing” however and… nothing. Not a sausage.
Why is this?
Do Google not know that “mens” is not a word? Do they not have a good grasp of grammar? It’s difficult to believe that this is the case, though I’m at pains to offer an alternative explanation. This is made all the more confusing when you search for “womens clothing” and Google asks if you meant “women’s clothing” – why do it for ‘womens’ and not ‘mens’!?
Why Are Retailers Getting it Wrong?
The first thing to establish here is, are retailers actually getting it wrong, or are they purposefully using incorrect constructions in order to target the most popular search terms? According to Adwords, “mens clothing” is searched for 40,500 times monthly (locally in the UK, using exact match), compared to just 73 times for “men’s clothing”. That is a staggering statistic.
The SERPs for “mens clothing” and “men’s clothing” are different too, so Google are definitely not ignoring the apostrophe in this instance. From this perspective you can completely understand why retailers are using incorrect spellings within their meta titles. Some retailers, such as Republic even use both “mens” and “men’s”. One can only assume that the misspellings within the meta descriptions represent a lack of SEO knowledge (meta descriptions aren’t used for rankings), or are an attempt to maintain consistency (I’m probably being generous here).
I guess that retailers, or at least the people who do their SEO, have to decide whether it is more important to be correct, or to use the construction that most people use. I suspect that the latter option will win on most occasions when sales are at stake, at least when the difference in search volumes between the two is so pronounced. I just really thought that as an industry, we’d got beyond the whole incorrect spelling for SEO thing.
Chicken or Egg?
So who is to blame? Do retailers spell incorrectly deliberately because customers do? Do customers spell incorrectly because they’ve been badly educated by Google and the retailers? I suspect that both are true to an extent. It’s a chicken and egg situation and the only party involved that can actually fix this, is Google.
If they autocorrected searches for “mens clothing” to “men’s clothing”, and their autocomplete also selected the correct variant, people would begin to search in this way and retailers would have to optimise for the correct spelling. You can already see evidence of this above, with many more retailers using the grammatically correct “women’s clothing”, quite probably because Google suggests that particular spelling.
Does Search Illiteracy Equal Illiteracy?
So far I’ve spoken only of the influence upon people’s search behaviour, but it’s possible that repeated incorrect grammar use online could spread beyond search engines and into general language use. The aforementioned links between text message speak and a decline in literacy are often disputed. Indeed, renowned linguist David Crystal has categorically stated that he believes any such link is a myth.
I would argue that there is a clear distinction between txt spk and standard language use though, whereas the distinction between “mens” and “men’s” is less clear. Children and impressionable adults are much more likely to believe that “mens” is acceptable language use, and to use it themselves, than they are likely to think that “gr8” is fine to use in formal writing. People often learn by imitation, and Google along with retailers and SEOs, are not setting the best possible example.
So come on Google, you can do better.
Dan Almond studied English at The University of Liverpool and works at Piranha Internet, a Preston SEO Company. He regularly blogs about all things SEO and social media on the Piranha Internet blog.
|
<urn:uuid:ea97cad6-ff8b-438f-b30b-988f85cf9c71>
|
CC-MAIN-2016-26
|
http://www.seosmarty.com/is-google-making-us-illiterate/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396224.52/warc/CC-MAIN-20160624154956-00169-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.945369
| 1,532
| 2.609375
| 3
|
|Número de publicación||US7376091 B1|
|Tipo de publicación||Concesión|
|Número de solicitud||US 10/200,263|
|Fecha de publicación||20 May 2008|
|Fecha de presentación||22 Jul 2002|
|Fecha de prioridad||22 Jul 2002|
|Número de publicación||10200263, 200263, US 7376091 B1, US 7376091B1, US-B1-7376091, US7376091 B1, US7376091B1|
|Inventores||Ryan M. Eccles, Jeffrey B. Danley|
|Cesionario original||Sprint Spectrum L.P.|
|Exportar cita||BiBTeX, EndNote, RefMan|
|Citas de patentes (18), Otras citas (14), Citada por (48), Clasificaciones (8), Eventos legales (3)|
|Enlaces externos: USPTO, Cesión de USPTO, Espacenet|
The present invention relates generally to wireless data communications. More specifically, it relates to 802.11 networks and cellular networks.
One or more devices can connect in a wireless local area network (“WLAN”) using the Institute of Electrical and Electronics Engineers 802.11 standard. The 802.11 standard provides a physical layer protocol that can be used to transmit physical bits of information across a wireless interface of the 802.11 WLAN. The 802.11 standard also provides a MAC sub-layer format, which can be used to format bits of information into packets of data. The formatted MAC sub-layer packets can then be transmitted to other devices on the 802.11 WLAN using the physical layer protocol.
Using the 802.11 standard, two or more devices can wirelessly connect with each other and exchange data. In an ad-hoc configuration, the wireless devices can exchange data directly with other wireless devices on the 802.11 WLAN. In a basic service set configuration, an access point can serve as an intermediary for communication between devices on the 802.11 WLAN. Thus, a device sends a packet to the access point, which then relays the packet to its intended destination device.
The access point can also be used to provide connectivity to other networks. For example, the access point can connect over a wired link to another access point. This configuration, which is termed an extended service set, links two or more basic service sets. In this configuration, a device in one basic service set can exchange data with a device in another basic service set.
In another example, the access point connects via a wired link to another network, such as the Internet. Using this connectivity, a device on the 802.11 WLAN can exchange data with a device on the other connected network, such as the Internet. While this configuration allows for increased access by devices on the 802.11 WLAN, it has several disadvantages.
In one example of a disadvantage, the wired link to the other network limits the mobility of the 802.11 WLAN. The 802.11 WLAN is confined to a fixed location by the wired connection and cannot be easily moved without rewiring the connection to the access point. In another example of a disadvantage, the wired connection to another network increases the difficulty of setting-up an 802.11 WLAN. In order to set-up the 802.11 WLAN, the access point's location must be known. Then, the wired link can be installed at the access point's location. Installing a wired connection can include running cabling to the location of the access point, which can be expensive and time-consuming.
Therefore, there exists a need for a better way to connect an access point in an 802.11 WLAN with other networks.
A Network Access Point (“NAP”) can connect to one or more devices in a wireless local area network (“WLAN”). The devices in the WLAN can communicate using the Institute of Electrical and Electronics Engineers 802.11 standard. The 802.11 standard generally provides physical layer and MAC sub-layer formats that the devices on the WLAN can use to exchange data.
The NAP can additionally wirelessly connect to a cellular network. The cellular network can in turn connect to the Internet or to another network. The cellular network, however, may use different physical layer and Medium Access Control (“MAC”) sub-layer formats than the 802.11 WLAN. The NAP can convert between the physical and MAC sub-layer formats used by the 802.11 WLAN and the physical and MAC sub-layer formats used by the cellular network. Thus, via the cellular network, the NAP can provide connectivity between the WLAN and another network, such as the Internet.
In one principal aspect, a device on the 802.11 WLAN can send a message over the cellular network to a device on another network, such as the Internet. For example, the NAP can receive a message from a device on the 802.11 WLAN. The NAP can convert the message from the 802.11 format to a cellular network format. Then, it can send the message over the cellular network to a destination device, such as a device on the Internet.
In another principal aspect, a device on the Internet, or on another network, can send a message to a device on the 802.11 WLAN. For example, a device on the Internet can send a message to a device on the 802.11 WLAN. The message can be sent from the device via the cellular network where it is received by the NAP. The NAP can convert the message from a format used by the cellular network format into the 802.11 WLAN format. Then, the NAP can send the message to the device on the 802.11 WLAN.
These as well as other aspects and advantages of the present invention will become apparent from reading the following detailed description, with appropriate reference to the accompanying drawings.
Exemplary embodiments of the present invention are described herein with reference to the drawings, in which:
1. Exemplary Architecture
In the BSS configuration, the wireless nodes 52, 58 can exchange data with each other through the NAP 54. For example, the PDA 52 can send a message to the NAP 54 that is then relayed to the laptop computer 58.
In another configuration, multiple NAPs can be linked together to form an extended services set (“ESS”). Thus, an ESS can include two or more BSSs. The wireless access points can be linked in a variety of different manners, such as through a wired Ethernet connection. Once linked together, wireless nodes connected to one NAP can exchange data with wireless nodes connected to another NAP. Additionally, a wireless node can roam among the different wireless access points in the ESS. The use of an ESS can advantageously extend the range of the 802.11 WLAN past the range supported by a single BSS.
In the BSS 50, the wireless nodes 52, 58 communicate with the NAP 54 over wireless 802.11 interfaces 56, 60. The IEEE 802.11 standard provides protocols for a physical (“PHY”) layer, which specifies physical methods for transmitting bits of information over the 802.11 interfaces 56, 60. The IEEE 802.11 standard also provides for a MAC sub-layer, which can be used to format the bits sent over the 802.11 interfaces 56, 60 using one of the PHY layer protocols.
The IEEE 802.11 standard defines three different PHYs, each of which can be used to send data over the 802.11 interfaces 56, 60, and a BSS 50 will generally select one of the three PHYs to use for communications. The three PHYs are Direct Sequence Spread Spectrum (“DSSS”), Frequency Hopped Spread Spectrum (“FHSS”) and Infrared (“IR”). Although any of the three PHYs may be used, DSSS and FHSS are the most common PHY implementations. DSSS and FHSS can be advantageously used over the 2.4 GHz ISM band that has been allocated by the United States Federal Communications Commission (“FCC”) for unlicensed operation; however, other frequency bands may also be used.
In DSSS, information bits to be transmitted over the 802.11 interfaces 56, 60 are combined with a longer pseudo-random numerical sequence using the XOR function. The pseudo-random numerical sequence is typically an 11-bit Barker code. The resulting bit stream is then modulated onto a carrier frequency using differential phase shift keying (“DPSK”) and transmitted to the NAP 54. At the NAP 54, a correlator removes the pseudo-random numerical sequence and recovers the original data stream. Thus, the 802.11 interfaces 56, 60 can be a common transmission channel used by the wireless devices 52, 58 and the NAP 54.
In FHSS, the carrier frequency “hops” from channel to channel in a pseudo-random manner. The wireless nodes 52, 58 and the NAP 54 hop in sequence with the carrier frequency changes. The information to be transmitted over the channel is modulated using a 2-level Frequency Shift Keying (“2FSK”) or a 4-level Frequency Shift Keying (“4FSK.”). Once received at the wireless node or the NAP, the received signal is demodulated to recover the original data stream. Similarly, the 802.11 interfaces 56, 60 in this configuration can form a common transmission channel used by the wireless devices 52, 58 and the NAP 54.
While the PHY protocols specify a method for the physical transmission of data over the 802.11 interfaces 56, 60, the MAC sub-layer protocols specify methods for allocating channel usage among the wireless nodes 52, 58 and the wireless access point 54 and for formatting the data transmitted over the transmission channel. The IEEE 802.11 standard specifies two different MAC sub-layer protocols, the Distributed Coordination Function (“DCF”) and the Point Coordination Function (“PCF”).
DCF generally uses Carrier Sense Multiple Access/Collision Avoidance (“CSMA/CA”) to control access to the 802.11 interfaces 56, 60. Under CSMA/CA, if a station (i.e., a wireless node 52, 58 or the NAP 54) wants to transmit data it senses the transmission channel to determine if the transmission channel is idle. If the channel is idle, then the station can transmit data. If, however, the channel is busy because another station is transmitting, the station waits until the transmission channel becomes idle. Once the transmission channel becomes idle, the station uses a random backoff algorithm before again sensing the transmission channel to determine if it is available for transmissions. The random backoff algorithm helps to prevent multiple stations from simultaneously attempting to transmit over the transmission channel immediately upon completion of the previous transmission.
The Collision Avoidance mechanism of CSMA/CA uses an acknowledgment packet (“ACK”) to help avoid data loss caused by two stations simultaneously transmitting data. A transmitting station transmits data to a receiving station. Once received, the receiving station checks the CRC of the received packet. If the CRC matches with the data received, the receiving station transmits an ACK back to the transmitting station. If a collision occurred, the CRC of the received packet would not match that of the received data because part of the data may be lost or incorrectly received. Therefore, no ACK would be sent from the receiving station to the transmitting station. After a predetermined period of time, the transmitting station would resend the packet to the receiving station.
As an alternative to CSMA/CA, the BSS 50 may optionally use VCS. VCS provides a method where a station can reserve the transmission channel for a specified period of time. This can be done using Request to Send (“RTS”) and Clear to Send (“CTS”) frames. A RTS frame can be sent from a wireless node to the NAP 54, and it can specify a period of time for which the wireless nodes wants to transmit over the transmission channel. In response, the NAP 54 sends a CTS frame to all the wireless nodes, and the CTS frame indicates a duration for which the transmission channel is reserved for the requesting wireless node.
VCS can advantageously help prevent collisions where the BSS 50 may have hidden nodes. A hidden node occurs when a wireless node can communicate with the NAP 54 but remains out of range from one or more of the other wireless nodes. Therefore, the hidden node would not receive the initial RTS frame sent by the other node, but it would receive the CTS frame sent by the NAP 54.
PCF is a second MAC-layer protocol defined by 802.11. PCF is an extension to DCF, and it may optionally be used in conjunction with DCF. In PCF, a point controller runs in the NAP 54. The point controller provides lower transfer delay variations in order to support time-bounded services, such as telephony.
In addition to specifying methods for handling channel usage, the MAC sub-layer protocols also specify methods for formatting data sent over the transmission channel. Data to be transmitted over the transmission channel can be formatted into a data frame.
The Frame Control field 80 is 2-bytes long, and it comprises a number of sub-fields that carry formatting information. The sub-fields generally indicate a protocol version for the 802.11 standard. They can also indicate a function of the Data Frame, such as by indicating that it is a data frame instead of a control frame. Other formatting information, such as power management and fragmentation information can be carried in the Frame Control field 80.
The Duration ID 82 field is a 16-bit field that indicates a duration value for the frame. The four address fields 84, 86, 88, 92 indicate various addresses used in transmitting the Data Frame, such as a basic service set identifier (“BSSID”), a source address (“SA”), a destination address (“DA”), transmitting station address (“TA”) and receiving station address (“RA”).
The BSSID is a 48-bit field that uses the same format as an IEEE 802 MAC address, and it uniquely identifies each BSS. The DA includes an IEEE MAC individual or group address that identifies that station intended as the final recipient of the frame. The SA includes an IEEE MAC address that identifies the station from which the transfer of the frame was initiated. The RA includes an IEEE MAC address that identifies the intended immediate recipient station, and the TA includes an IEEE MAC address that identifies the station that has transmitted the frame.
The addresses carried by the four fields 84, 86, 88, 92 may vary based on values indicated in the Frame Control field 80. Specifically, the addresses carried by the four fields 84, 86, 88, 92 may vary based on the To DS and From DS sub-fields of the Frame Control field 80. Table 1 indicates the various addresses carried by the four fields 84, 86, 88, 92 for the four combinations of the To DS and From DS fields.
The Sequence Control field 90 is a 16-bit field that indicates a sequence number and a fragment number for the frame. Each frame transmitted by a station is assigned a sequence number to identify the frame. The sequence number is also used by the destination device to reassemble the frames into their original order. A frame, however, may be fragmented into more than one frame during transmission. The fragment number identifies the various fragments of a frame and is used in reconstructing the original frame from its fragments.
The Frame Body field 94 is a variable length field. For example, it can range from 0 bytes to 2312 bytes. The Frame Body field 94 can carry the data in the Data Frame. The FCS field 96 carries a 32-bit Cyclic Redundancy Code (“CRC”). The CRC can provide error checking for the Data Frame so that the ultimate recipient of the frame can determine whether the frame was accurately received.
Using the PHY and MAC sub-layer protocols defined in 802.11, a wireless node can exchange data with another device on the 802.11 WLAN. For example, the PDA 52 can send data to the NAP 54, which can then relay the data to the laptop computer 58. Similarly, the laptop computer 58 can send data to the NAP 54, which can then forward the data to the PDA 52. Thus, the PDA 52 can communicate with the laptop computer 58.
The NAP 54 can additionally wirelessly interface with a cellular network 64 over a cellular interface 62. And, the cellular network 64 can connect to one or more packet data networks, such as the Internet 66. Using this connectivity, the NAP 54 can communicate with a device on the cellular network 64 or on a network connected to the cellular network 64. For example, the Network Interface 54 can communicate with a computer 68 on the Internet 66 using the cellular network's connectivity to the Internet 66. The wireless nodes 52, 58 can then also communicate with the computer 68 through the NAP's 54 cellular network connection.
In a CDMA system, multiple wireless devices may use the same frequency range, and the multiple wireless devices may each simultaneously communicate with the base station 108 using the same frequency range. The NAP 54 in a CDMA system spreads its signal across the frequency range. Spreading the signal across a wide bandwidth, such as approximately 1.266 MHz, can reduce interference between signals from different wireless devices. This can allow individual signals to be differentiated from other signals, and therefore, accurately recovered. In order to perform signal spreading, each NAP may be assigned a unique code, such as a Walsh code. The code may be a sequence of bits, such as a 64 bit binary number; however, other lengths may also be used.
The NAP 54 can transmit data by creating a modulated signal. The modulated signal may be created, for example, by modulating the wireless device's unique code with the data to be transmitted. In creating the modulated signal, the modulation bit rate of the code is ordinarily greater than the bit rate of the data. Once the modulated signal is created, it can then be sent over the common frequency range to the base station 108.
To accurately recover the modulated signal, the base station 108 can also store the unique code used by the NAP 54. Then, the base station 108 can monitor the frequency range for signals having the modulation pattern of the wireless device's code. This allows the base station 108 to differentiate the signal of the NAP 54 from the signals of the other wireless devices, such as other NAPs or cellular phones, which can appear as noise. After recovering the modulated signal, the base station 108, or other device, can then recover the data from the modulated signal. For example, the base station 108 can demodulate the modulated signal using the unique code for the NAP 54. Communication from the base station 108 to the NAP 54 can occur in a similar manner, although it may occur in a different frequency range.
A CDMA implementation will define one or more physical layer protocols and other layer protocols to be used in transmitting information between the NAP 54 and the base station 108 via the CDMA cellular interface 62. Each CDMA implementation may have its own variations of these protocols, which will also differ from the 802.11 PHY and MAC sub-layers. While a CDMA implementation may define different PHY and MAC layer protocols, it may alternatively use additional or different layers than the PHY and MAC layers.
For example, CDMA2000 defines a physical layer protocol that specifies a method to send physical bits over the cellular interface 62. Additionally, CDMA2000 defines a MAC layer protocol and a link access control (“LAC”) layer protocol, both of which can be used to format physical bits into frames for transmission over the cellular interface 62 using the physical layer protocol. A MAC layer, LAC layer or other layer frame generally includes a header portion and a data portion. The data portion can be used to carry data. The header portion generally includes one or more sub-fields, which can be used for addressing, control and other information. The header sub-fields, the functions of the header sub-fields, the length of the frame and other characteristics can vary depending on the specific CDMA2000 implementation of the cellular network, and different cellular networks can use different implementations.
The MAC and LAC layers are generally two sub-layers of the data link layer in the Open Systems Interconnection (“OSI”) reference model. The OSI reference model generally provides a protocol stack that can be used to exchange data between devices, although data communication between devices does not necessarily have to strictly adhere to each layer in the OSI reference model. Higher layers in the OSI model generally provide more robust features. Packets from higher layers are generally encapsulated into packets in decreasing layers until the lowest level packets, such as MAC layer packets, are ultimately transmitted over a physical medium using the physical layer protocol.
CDMA is described in further detail in Telecommunications Industry Association (“TIA”) standards IS-95A and IS-95B. CDMA is also described in the TIA IS-2000 series of standards, which are commonly referred to as CDMA2000. The CDMA2000 physical layer is described in more detail in TIA/EIA/IS-2000-2a, which is incorporated herein by reference in its entirety. The CDMA2000 MAC layer is described in more detail in TIA/ELA/IS-2000-3a, which is incorporated herein by reference in its entirety. The CDMA2000 MAC layer is also described in more detail in “Medium Access Control (MAC) Standard for cdma2000 Spread Spectrum Systems,” published by 3rd Generation Partnership Project 2 (“3GPP2”), Version 1.0, April 2002, which is incorporated herein by reference in its entirety. The CDMA200 link access control layer is described in more detail in TIA/EIA/IS-2000-4a, which is incorporated herein by reference in its entirety. CDMA is further described in the International Telecommunications Union (“ITU”) IMT-2000 series of standards.
Additional variations of CDMA or other protocols may also be used for communication between the NAP 54 and the base station 108. For example, the NAP 54 and the base station 108 may communicate using Wideband CDMA (“WCDMA”), Universal Mobile Telecommunications System (“UMTS”), Time Division-Synchronous CDMA (“TD-SCDMA”), Advanced Mobile Phone Service (“AMPS”), Digital AMPS (“D-AMPS”), Global System for Mobile Communication (“GSM”), General Packet Radio Services (“GPRS”), IS-136, Time Division Multiple Access (“TDMA”) or other protocols.
Each of these protocols can define one or more MAC layers, LAC layers, data link layers or other layers above the physical layer. Each of the layers can use its own frame, and each layer may use more than one type of frame. For example, a layer can use one or more different frames to carry control information, and it can use one or more different frames to carry data information. The specific implementation layers and frame formats can differ among the various protocols; however, each frame generally includes both a data portion and a header portion. For example, depending on the protocol used by the cellular network and the specific implementation of the protocol by the cellular network, the header fields for these different types of frames can vary. Other characteristics, such as the length and function of the frames can also differ. More information about the layers and the frames used by the different protocols can be found in the respective standards documents for each of the protocols.
The base station 108 couples to a base station controller (“BSC”) 110, which can perform various functions such as managing handoffs of the NAP 54 as it moves among base stations. The BSC 110 in turn connects to a mobile switching center (“MSC”) 112. The MSC 112 can manage setup and teardown of connections with the NAP 54. While the BSC 110 and the MSC 112 are depicted as separate components, it is possible that their functionality may be combined into a single component.
The MSC 112 may also include a visitor location register (“VLR”). The VLR may be used to track wireless devices that travel away from their “home” MSC to another MSC. The VLR may receive information about a roaming NAP from the roaming wireless device's home MSC, and it may store that information. When the roaming NAP travels away from the MSC, the VLR may then remove information about that roaming wireless device.
Additionally, the MSC 112 may connect to a home location register (“HLR”) 114. The HLR 114 can be a database that can store subscription information for wireless devices. Also, the HLR 114 can track the current location of wireless devices. For example, when a NAP roams away from its home MSC 112 to another MSC, the HLR 114 may be appropriately updated. Then, the HLR 114 can be used to route calls to the wireless device.
The MSC 112 can additionally provide connectivity to the PSTN 102. Using the connectivity, the NAP 54 may then communicate with another device that is also connected to the PSTN 102. The NAP 54 may also communicate with another device on the cellular network.
In addition to connecting to the MSC 112, the BSC 110 may also connect with a PDSN 104. The PDSN 104 can provide connectivity to a packet-switched network, such as the Internet 66, an intranet or another network. The PDSN 104 may connect to the Internet 66 through a firewall 116. The firewall 116 can be used to provide protection for the PDSN 104, for example by restricting access from the Internet 66 back through the firewall 116 to the PDSN 104. Once the NAP 54 connects, for example, to the Internet 66, it can exchange data with other devices that are also connected to the Internet 66.
For example, the NAP 54 may establish a Point-to-Point Protocol (“PPP”) session with the PDSN 104. As is known in the art, PPP is a data link protocol for communication between two devices. PPP can provide a method for framing data sent between the two devices. Additionally, it can implement a link control protocol for controlling transmission links between the two devices, and it can provide a way to negotiate higher-level protocol options for communication between the two devices.
As a further part of establishing the PPP session, the NAP 54 may be assigned an Internet Protocol (“IP”) address. This may be done, for example, after the NAP 54 has been authorized to access the cellular network 64. The IP address may be used by the NAP 54 to communicate in data sessions with other devices. For example, the NAP 54 can use its IP address to communicate with another device on the Internet 66, such as the computer 68.
While the NAP 54 may have a pre-assigned IP address, its IP address may be assigned at connection time. This may be done, for example, by using a Dynamic Host Control Protocol (“DHCP”) application program. The DHCP application program may run on the PDSN 104, or it may run on another element. When the NAP 54 establishes a PPP session with the PDSN 104, the DHCP application program may assign the NAP 54 an IP address to use for that connection.
The NAP 54 may additionally run a Port Address Translation (“PAT”) program. While the NAP 54 may be assigned one IP address when it connects to the cellular network 64, more than one wireless node in the BSS 50 may want to use the IP address assigned to the NAP 54, for example to communicate with a device on the Internet 66. The PAT program can be used to assign one or more unique identifiers to each wireless node. The unique identifiers, which are typically port assignments, can be used in conjunction with the single assigned IP address to identify packets for a particular wireless node. This allows each wireless node to engage in one or more unique sessions with other devices, such as devices on the Internet 66, using the single IP address assigned to the NAP 54.
PPP is described in more detail in Internet Engineering Task Force (“IETF”) Request for Comments (“RFCs”) 1661, 1662 and 1663, all of which are incorporated herein by reference in their entirety. DHCP is described in more detail in IETF RFCs 1541, 2131, 2132, which are all incorporated herein by reference in their entirety. PAT described in more detail in IETF RFC 3022, which is incorporated herein by reference in its entirety. More information on these and other IETF standards may be found at the URL “www.ietf.org.”
Once connected to the PDSN 104, for example through a PPP session, the NAP 54 can access the Internet 66. While the NAP 54 may communicate with the PDSN 104 through a PPP session, it may communicate with other devices using higher-level protocols. For example, the NAP 54 may use IP to communicate with other devices on the Internet 66. IP provides a method for transmitting data between devices on the same or on different networks.
In IP communications, each device may be assigned an IP address, which is 32-bits long. The IP address assigned to a device is usually globally unique, and this allows data to be accurately sent between devices on different networks. Data to be transmitted between devices is placed into an IP packet. The IP packet can include a header portion and a data portion. The header portion generally identifies a source device and a destination device, while the data portion carries the data to be transmitted between the two devices.
The protocol field 166 can indicate a protocol used with the IP packet. For example, Transmission Control Protocol (“TCP”), User Datagram Protocol (“UDP”), Encapsulating Security Payload (“ESP”), and Authentication Header (“AH”) are common protocols that may be used in conjunction with IP. Other protocols may be used as well. The header checksum field 168 can be used to verify the contents of the IP packet header 150. The source address field 170 may include a source IP address for a sending device, and the destination address field 172 may include an IP address for a receiving device. The options field 174 can be used for security, source routing, error reporting, debugging, time stamping or other information. IP data may be carried in the IP packet data portion, which is generally appended below the options-field 174.
The IP packet is sent over the network, and, using the IP address in the destination address field 172 of the IP packet header 150, appropriately routed to the destination device. The packet may travel through different devices and across different networks before ultimately reaching its destination. The IP address can help to provide accurate routing through the intermediate devices to the intended destination device.
IP, however, does not provide a mechanism to assure that packets will be received at their intended destination. They may be lost during transmission due to data corruption, buffer overflow, equipment failure or other problems. TCP complements IP by ensuring reliable end-to-end transmission of the packets. Among other functions, TCP handles lost or corrupted packets, and it reassembles packets that arrive at their destination out of order. IP is described in more detail in IETF RFC 791, which is incorporated herein by reference in its entirety. TCP is described in more detail in IETF RFC 793, which is incorporated herein by reference in its entirety.
TCP/IP is one method for sending data between two devices, and other Internet or network protocols may also be used. For example, UDP may be used in conjunction with IP to exchange data between devices. UDP provides a connectionless protocol for exchanging data between devices, such as devices connected over an IP network. UDP does not guarantee reliable transmission between the devices, and it provides only minimal error protection. UDP is described in further detail in IETF RFC 768, which is incorporated herein by reference in its entirety.
The protocol stack of
The IP address assigned to the NAP 54 is generally associated with the NAP's home network. However, as is common, the NAP 54 may roam to one or more different networks. Mobile IP is an extension of IP that allows the NAP 54 to move transparently move between different “foreign” networks while still receiving data addressed to the IP address associated with the wireless device's home network. Using Mobile IP, the wireless device's movement away from its home network can appear transparent to protocol layers above IP (e.g., TCP or UDP). Mobile IP is described in more detail in IETF RFCs 2002-2005, each of which is incorporated herein by reference in its entirety.
As indicted by the dashed outline, the mobile node 54 may “roam” away from its home network 202 and connect to a foreign network 206, such as another exemplary cellular network as depicted in
The foreign network 206 may also include one or more mobile nodes for which the foreign network 206 serves as the home network; however, no such mobile nodes are depicted in
As the mobile node 54 travels away from its home network 202, it may connect to a foreign network 206. The roaming mobile node 54 listens for mobile IP “agent advertisement” messages from foreign agents (i.e., foreign gateway routers such as the foreign agent 208). The agent advertisement messages can indicate that the roaming mobile node 54 is now on a foreign network 206. When the roaming mobile node 54 receives an agent advertisement message from a foreign agent, such as foreign agent 208, the mobile node 54 can register with the foreign agent (e.g., foreign agent 208) and also with its home agent (e.g., home agent 204). The registration can indicate that the mobile node 54 has roamed away from its home network 202 to a foreign network 206.
The mobile node 54 uses its home global address, such as its IP address, on the home network 202 to register with the foreign agent 208 and with the home agent 204. After registration of the mobile node 54, the foreign agent 208 may accept data packets for the mobile node 54 at the specific home global address for the mobile mode 106 in addition to data packets for other devices on the foreign network 206. The foreign agent 208 may also assign a temporary subnet network address on the foreign network 206 to the mobile node 54.
The network device 122 can send a data message addressed to the mobile node 54. This may be done, for example, by sending the mobile node 54 a packet addressed to its globally routable IP address. The packet travels through the Internet 66 and is routed to the home agent 204. The home agent 204 accepts packets addressed to IP addresses for devices in the home network 202. If the mobile node 54 were connected to the home network 202, the home agent 204 would forward the packet to the mobile node 54. However, the mobile node 54 is not connected to the home network 202. The mobile node 54 is connected to the foreign network 206, and the packet is forwarded from the home agent 204 to the foreign network 206.
The mobile node 54 previously registered its new location with the home agent 204 and with the foreign agent 208. The home agent 204 encapsulates the packet addressed to the mobile node 54 into a tunnel packet, which is sent to the foreign agent 208 through the virtual tunnel 214. When the foreign agent 208 receives the tunnel packet, it removes the tunnel packet header and routes the packet to the mobile node 54.
The cellular network 64 provides the NAP 54 with a wireless interface to the Internet 66 or to another network connected to the cellular network 64. Thus, the NAP 54 can advantageously move to various different locations covered by the cellular network 54 and connect to the Internet 66. Mobile IP can advantageously allow the NAP 54 to move to different locations, such as other locations within the cellular network 64 or another cellular network, while retaining its connection to the Internet 66. Similarly, the wireless nodes 52, 58 can move along with the NAP and remain connected to the Internet 66.
In one example of using the NAP's mobility provided by the cellular network 64, the BSS 50 could be located on a train, bus, airplane or other moving vehicle. The various wireless nodes 52, 58 in the BSS 50 could communicate with each other through the NAP 54. The relative proximity of the wireless nodes 52, 58 and the NAP 54 could be limited by the space of the vehicle. For instance, the wireless nodes 52, 58 could all be located within the vehicle and may also move around within the vehicle. The NAP 54 may also be located within the vehicle, such as in the vehicle or mounted to the outside of the vehicle. The NAP 54 can connect to the cellular network 64, and the cellular network 64 can in turn provide the NAP 54 and the wireless nodes 52, 58 with access to the Internet 66. As the vehicle changes location, the NAP 54 can maintain its connectivity with the Internet 66 by moving among various different base stations in the cellular network 64.
In another example of using the NAP's mobility provided by the cellular network 64, the NAP 54 can be conveniently moved among various different locations. For instance, the NAP 54 can be moved among different locations in a building or other area. At each location, the NAP 54 can connect to the cellular network 64, which can in turn provide connectivity to the Internet 66 for the NAP 54 and the wireless nodes 52, 58. The use of the cellular network 64 can eliminate the need to establish a wired connection at each NAP 54 location in order for the NAP 54 to be able to connect to the Internet 66.
The NAP 54 can be implemented in a variety of different ways. In one exemplary embodiment, the NAP 54 can be a computer having an 802.11 interface card and a cellular wireless interface card. The cellular wireless interface card can be a CDMA card, such as a Sprint PCS Wireless Web Modem™ Aircard 510, manufactured by Sierra Wireless. Of course, the different cards may be used, and the protocol used by the cellular wireless interface card may vary with the protocol used by the cellular network 64. Additionally, the cellular interface card can be a cell phone or other wireless device capable of communicating over the cellular network 64 and also capable of connecting to the NAP 54.
The 802.11 interface card can be used to communicate over an 802.11 wireless network. The 802.11 interface card can interface with the NAP 54 using a variety of different ports, such as a serial port, a parallel port, a Personal Computer Memory Card International Association (“PCMCIA”) slot, a Universal Serial Bus (“USB”) port or another type of connector. The cellular interface card can interface with the computer in a similar manner, although it may use a different type of interface than the 802.11 interface card.
The 802.11 interface card can support wireless communications with the 802.11 WLAN. For example, it can be used to wirelessly communicate with other devices using the 802.11 standard. The cellular interface card can likewise be capable of communicating with the cellular network 64. The computer could then be programmed to receive data using one of the interface cards, convert the data into a format for transmission using the other interface card, and then transmit the data using the other interface card.
The processor 224 connects to memory 226. The memory 226 can be a variety of different types of memory, such as a hard disk, a floppy disk, RAM, ROM, EPROM, EEPROM or other memory. The memory 226 can be programmed with an application, which can execute on the processor 224. The application can receive packets from one transmission interface, convert the packets into a format for transmission using the other interface, and then send the packets to the other interface for transmission.
In an alternate embodiment, the functionality of the NAP 54 can be distributed across a number of different components, each of which can be in a different location. For example, the CDMA transmission interface could be located on the outside of a vehicle in order to provide a clear link to the cellular network 54. The CDMA transmission interface could be linked, via a wired or wireless link, to a processing unit located in another location, such as inside the vehicle. The processing unit could handle the conversion between MAC sub-layer formats. The 802.11 could also be located inside the vehicle, such as in a location to provide a clear link to the devices on the WLAN. The 802.11 WLAN could also be linked, via a wired or wireless link, to the processing unit.
In another embodiment, the NAP 54 could be programmed so that it can interface with multiple types of cellular networks. For example it could connect to CDMA, W-CDMA and TDMA networks. Of course, other combinations are possible. Additionally, the NAP 54 could be programmed to link a variety of different types of wireless networks, which can use protocols other than 802.11, with the cellular network 64.
2. Exemplary Operation
It should be understood that many variations could be made to the process described in
In another variation, one or more of the wireless nodes may use its own IP address to communicate with other devices, such as ones on the Internet. Alternatively, the cellular network can assign more than one IP address to the NAP, and the IP addresses can then be used by the wireless nodes. These variations are not exhaustive, and others also exist.
In one example of reformatting the data packets, the NAP converts the packets from the 802.11 MAC sub-layer format used by the wireless node into a format used by the cellular network. For instance, the cellular network may use a different MAC sub-layer format, or the cellular network may use a data-link layer format or another type of format to transmit data packets. The NAP can convert a packet, for example, by removing the data portion of the 802.11 MAC sub-layer packet and placing it into the data portion of a cellular network MAC sub-layer packet. The NAP can additionally set the header fields of the cellular network MAC sub-layer packet, which may differ from the header fields of the 802.11 MAC sub-layer packet. If the cellular network doesn't use a MAC sub-layer format, the NAP can perform a similar conversion by removing the data portion of the 802.11 MAC sub-layer packet and placing it into packet using a different data-link format or another type of format used by the cellular network. The NAP can also set the heading information of the packet.
Since the MAC sub-layer packets can carry higher-level protocol packets in their data portions, the reformatting of the MAC sub-layer packets does not necessarily affect the higher-level protocol packets carried by the MAC sub-layer packets. After reformatting the MAC sub-layer packets, as shown at Step 276, the NAP transmits the reformatted data packets over the cellular network to a device, such as one on the Internet. Finally, at Step 278, the device receives the transmitted data packets, and it can then retrieve the data sent by the wireless node.
For example, an application running on the wireless node can determine data to be sent to the device. This generally occurs at the application layer in the OSI reference model. Then, the application data determined by the application program can be placed into a TCP packet, which is a transport layer protocol in the OSI reference model. As previously discussed, TCP provides a method for reliable transmission of data over the Internet. In another example, the application data may be placed in a UDP packet, which is also a transport layer protocol. Then, the TCP, UDP or other packets can be subsequently placed into one or more lower-level packets. For example, the TCP, UDP or other packets can be placed in IP packets, which is a network layer protocol. As previously discussed, IP provides a method for transmitting packets between devices on the same or different networks. The IP packet may further be encapsulated into lower-level packets.
Then, at Step 304, the wireless node places the high-level data packets into 802.11 MAC sub-layer packets. The packets placed into the MAC sub-layer packets are generally from the protocol layer running directly above the MAC sub-layer. For example, the wireless node may place IP packets into the 802.11 MAC sub-layer packets; however, the IP packets may further be encapsulated into other lower-level packets before finally being placed into the 802.11 MAC sub-layer packets. Next, at Step 306, the wireless node transmits the 802.11 MAC sub-layer packets to the NAP. This can be done, for instance, using one of the 802.11 PHY protocols. Then, at Step 308, the NAP receives the 802.11 MAC sub-layer packets transmitted by the wireless node.
While the previous flowcharts have described communication from a wireless node to another device through the cellular network, the NAP can also be used in a similar manner for transmissions to the wireless node, such as from a device on the cellular network or on the Internet. For example, a device on the Internet can determine application data, or other data, to be sent to a wireless node. The Internet device can format the data, such as by placing it in TCP, IP or other packets. Those packets can then be placed into data-link or MAC sub-layer packets for transmission via the cellular network to the NAP. Once the NAP receives the packets, the NAP can reformat the packets for transmission over the 802.11 MAC sub-layer to the wireless node.
Next, at Step 354, the NAP places the extracted data portion into an 802.11 MAC sub-layer packet. At Step 356, the wireless access point transmits the 802.11 MAC sub-layer packet to the wireless node. Then, at Step 358, the wireless node receives the MAC sub-layer packet from the NAP, and the wireless node can extract the data from the received packet.
It should be understood that the programs, processes, methods and apparatus described herein are not related or limited to any particular type of computer or network apparatus (hardware or software), unless indicated otherwise. Various types of general purpose or specialized computer apparatus may be used with or perform operations in accordance with the teachings described herein. While various elements of the preferred embodiments have been described as being implemented in software, in other embodiments hardware or firmware implementations may alternatively be used, and vice-versa.
In view of the wide variety of embodiments to which the principles of the present invention can be applied, it should be understood that the illustrated embodiments are exemplary only, and should not necessarily be taken as limiting the scope of the present invention. For example, the steps of the flow diagrams may be taken in sequences other than those described, and more, fewer or other elements may be used in the block diagrams.
The claims should not be read as limited to the described order or elements unless stated to that effect. In addition, use of the term “means” in any claim is intended to invoke 35 U.S.C. §112, paragraph 6, and any claim without the word “means” is not so intended. Therefore, all embodiments that come within the scope and spirit of the following claims and equivalents thereto are claimed as the invention.
|Patente citada||Fecha de presentación||Fecha de publicación||Solicitante||Título|
|US5737703||16 Oct 1995||7 Abr 1998||Nokia Mobile Phones Limited||Multi-mode radio telephone which executes handover between different system|
|US5774461||27 Sep 1995||30 Jun 1998||Lucent Technologies Inc.||Medium access control and air interface subsystem for an indoor wireless ATM network|
|US6115762||21 Ago 1997||5 Sep 2000||Advanced Micro Devices, Inc.||PC wireless communications utilizing an embedded antenna comprising a plurality of radiating and receiving elements responsive to steering circuitry to form a direct antenna beam|
|US6205495||15 Jul 1998||20 Mar 2001||Gateway, Inc.||Wireless interface for standard modems|
|US6292747||20 Abr 2000||18 Sep 2001||International Business Machines Corporation||Heterogeneous wireless network for traveler information|
|US6327254||22 May 1998||4 Dic 2001||Lucent Technologies Inc.||Method for bandwidth sharing in a multiple access system for communications networks|
|US6330244||16 Ene 1998||11 Dic 2001||Jerome Swartz||System for digital radio communication between a wireless lan and a PBX|
|US6438117||7 Ene 2000||20 Ago 2002||Qualcomm Incorporated||Base station synchronization for handover in a hybrid GSM/CDMA network|
|US6680923||23 May 2000||20 Ene 2004||Calypso Wireless, Inc.||Communication system and method|
|US6850512 *||26 Ago 1999||1 Feb 2005||Ipr Licensing, Inc.||Two tier hi-speed wireless communication link|
|US20010036830||13 Abr 2001||1 Nov 2001||Geng Wu||Network resource sharing during handover of a mobile station between cellular wireless networks|
|US20030091021||13 Nov 2001||15 May 2003||Nokia Corporation||Physically scoped multicast in multi-access networks|
|US20030156566 *||20 Feb 2002||21 Ago 2003||Doug Griswold||Mobile data communications apparatus, methods and computer program products implementing cellular wireless data communications via a wireless local area network|
|US20030171112 *||30 Ago 2001||11 Sep 2003||Siemens Aktiengesellschaft||Generic wlan architecture|
|US20030202497 *||31 Oct 2002||30 Oct 2003||Samsung Electronics Co. Ltd.||Integrated WI-FI and wireless public network and method of operation|
|US20040009751 *||11 Jul 2002||15 Ene 2004||Oliver Michaelis||Interface selection in a wireless communication network|
|US20040196978 *||12 Jun 2002||7 Oct 2004||Godfrey James A.||System and method for processing encoded messages for exchange with a mobile data communication device|
|US20060025077 *||1 Sep 2005||2 Feb 2006||Amit Haller||Method, system and computer readable medium for making a business decision in response to information from a short distance wireless network|
|1||"802.11b and 3G Synergies for 2002," 802.11 Insights, http://www.80211-planet.com/columns/article/0,4000,1781<SUB>-</SUB>950811,00.html, printed Feb. 22, 2002.|
|2||"E-200 Cassiopeia Pocket PC 2002," Casio, http://www.casio.com/personalpcs/product.cfm?section=19&product=4146, printed Feb. 22, 2002.|
|3||"Making Notebooks Truly Mobile," T Techtv, http://www.techtv.com/freshgear/products/story/0,23008,3347281,00.html., printed Feb. 25, 2002.|
|4||"Product Description," WeRoam, http://www.weroam.com/, printed Feb. 25, 2002.|
|5||"Roaming Between WLAN and GSM Networks to Become Easier," thinkmobile, http://www.thinkmobile.com/laptops/news/00/48/33/, printed Feb. 25, 2002.|
|6||Erick Schonfeld, "The Island of the Wireless Guerrillas," Business 2.0, Apr. 2002 Issue, printed on Mar. 21, 2002 from http://www.business2.com.|
|7||Internet Engineering Task Force ("IETF") Request for Comments ("RFCs") 2002, "IP Mobility Support," C. Perkins, Oct. 1996.|
|8||Internet Engineering Task Force ("IETF") Request for Comments ("RFCs") 2003, "IP Encapsulation within IP," C. Perkins, Oct. 1996.|
|9||Internet Engineering Task Force ("IETF") Request for Comments ("RFCs") 2004, "Minimal Encapsulation within IP," C. Perkins, Oct. 1996.|
|10||Internet Engineering Task force ("IETF") Request for Comments ("RFCs") 2005, "Applicability Statement for IP Mobility Support," J. Solomon, Oct. 1996.|
|11||Internet Engineering Task Force ("IETF") Request for Comments ("RFCs") 768, "User Datagram Protocol," J. Postel, Aug. 1980.|
|12||Internet Engineering Task Force ("IETF") Request for Comments ("RFCs") 791, "Internet Protocol DARPA Internet Program Protocol Specification," Information Sciences Institute, Sep. 1981.|
|13||Internet Engineering Task Force ("IETF") Request for Comments ("RFCs") 793, "Transmission Control Protocol DARPA Internet Program Protocol Specification," Information Sciences Institute, Sep. 1981.|
|14||P. Srisuresh et al., "Traditional IP Network Address Translator (Traditional NAT)," Network Working Group, Request for Comments 3022, Jan. 2001.|
|Patente citante||Fecha de presentación||Fecha de publicación||Solicitante||Título|
|US7609697 *||30 Mar 2004||27 Oct 2009||Sony Corporation||Optimizing IEEE 802.11 for TCP/IP data transfer|
|US7760739 *||20 Jul 2010||Samsung Electronics Co., Ltd.||Wireless broadband (WiBro) station capable of supporting quality of service (QoS) and method for servicing QoS in WiBro network|
|US7876709 *||5 Oct 2007||25 Ene 2011||Schilling Donald L||Mesh network communication systems and methods|
|US8036218 *||14 Jul 2008||11 Oct 2011||Intellectual Ventures I Llc||Technique for achieving connectivity between telecommunication stations|
|US8064461||22 Nov 2011||Sony Corporation||Method and apparatus for TCIP/IP data transfer over a wireless network|
|US8205002 *||18 Nov 2009||19 Jun 2012||Teamon Systems, Inc.||Communications system providing extensible protocol translation features and related methods|
|US8213396||3 Jul 2012||Sprint Spectrum L.P.||Methods and systems for disabling paging to a wireless communication device|
|US8233450 *||31 Jul 2012||Interdigital Technology Corporation||Wireless communication methods and components for facilitating multiple network type compatibility|
|US8244228 *||24 Jun 2004||14 Ago 2012||Marvell International Ltd.||Method and apparatus for providing a mobile wireless local area network|
|US8284421 *||9 Oct 2003||9 Oct 2012||Samsung Electronics Co., Ltd.||Printing client management method and wireless LAN printer in wireless network|
|US8515467 *||25 Jun 2008||20 Ago 2013||Microsoft Corporation||Adapter for synchronizing data over different networks|
|US8554945 *||29 Ago 2003||8 Oct 2013||Sprint Communications Company L.P.||Cellular extension of wireless local area networks|
|US8606250||14 Ago 2012||10 Dic 2013||Marvell International Ltd.||Method and apparatus for providing a mobile wireless local area network|
|US8694000||22 Feb 2011||8 Abr 2014||Ipr Licensing, Inc.||Two tier hi-speed wireless communication link|
|US8724544 *||31 Dic 2009||13 May 2014||Lg Electronics Inc.||Method for transmitting a packet at a base station in a network using multiple communication schemes|
|US8768384||10 Feb 2010||1 Jul 2014||Sprint Spectrum L.P.||Methods and devices for efficient use of multiple paging channels|
|US8830971||26 Jul 2011||9 Sep 2014||Sprint Spectrum L.P.||Control of maximum number of concurrent local device connections for a mobile hotspot|
|US8964765 *||1 Sep 2005||24 Feb 2015||Broadcom Corporation||Mobile handheld multi-media gateway and phone|
|US9161301||6 Feb 2013||13 Oct 2015||Apple Inc.||Reducing power consumption when bridging independent chipsets|
|US9246736||5 Mar 2015||26 Ene 2016||Parkervision, Inc.||Method and system for down-converting an electromagnetic signal|
|US9246737||5 Mar 2015||26 Ene 2016||Parkervision, Inc.||Method and system for down-converting an electromagnetic signal|
|US9288100||31 Jul 2015||15 Mar 2016||Parkervision, Inc.||Method and system for down-converting and electromagnetic signal|
|US9306792||26 Feb 2015||5 Abr 2016||Parkervision, Inc.||Methods and systems for down-converting a signal|
|US9319262||26 Jun 2015||19 Abr 2016||Parkervision, Inc.||Methods and systems for down-converting a signal|
|US9325556||31 Jul 2015||26 Abr 2016||Parkervision, Inc.||Methods and systems for down-converting a signal|
|US9350591||5 Mar 2015||24 May 2016||Parkervision, Inc.||Method and system for down-converting an electromagnetic signal|
|US9351278||21 Ene 2014||24 May 2016||Sprint Spectrum L.P.||Controlling wireless paging parameters based on device type prevalence|
|US9369940||21 Ene 2015||14 Jun 2016||Broadcom Corporation||Mobile handheld multi-media gateway and phone|
|US20040141487 *||9 Oct 2003||22 Jul 2004||Samsung Electronics Co., Ltd.||Printing client management method and wireless LAN printer in wireless network|
|US20050226239 *||30 Mar 2004||13 Oct 2005||Sony Corporation And Sony Electronics, Inc.||Optimizing IEEE 802.11 for TCP/IP data transfer|
|US20060056448 *||21 Dic 2004||16 Mar 2006||Interdigital Technology Corporation||Wireless communication methods and components for facilitating multiple network type compatibility|
|US20060104249 *||1 Sep 2005||18 May 2006||Jeyhan Karaoguz||Mobile handheld multi-media gateway and phone|
|US20060114874 *||9 Ene 2006||1 Jun 2006||Interdigital Technology Corporation||System and method for integrating WLAN and 3G|
|US20070091819 *||24 Oct 2005||26 Abr 2007||Microsoft Corporation||Declarative system configurations|
|US20070165565 *||19 Sep 2006||19 Jul 2007||Jae-Dong Jung||Wireless broadband (WiBro) station capable of supporting quality of service (QoS) and method for servicing QoS in WiBro network|
|US20070274232 *||14 Jun 2004||29 Nov 2007||Telefonaktiebolaget Lm Ericsson (Pub)||Method, Communication Device and System for Detecting Neighboring Nodes in a Wireless Multihop Network Using Ndp|
|US20090092143 *||5 Oct 2007||9 Abr 2009||Schilling Donald L||Mesh network communication systems and methods|
|US20090141693 *||14 Jul 2008||4 Jun 2009||Conexant, Inc.||Technique for Achieving Connectivity between Telecommunication Stations|
|US20090325610 *||25 Jun 2008||31 Dic 2009||Microsoft Corporation||Adapter for synchronizing data over different networks|
|US20100008342 *||14 Ene 2010||Sony Corporatation||Optimizing ieee 802.11 for tcip/ip data transfer|
|US20100061310 *||11 Mar 2010||Teamon Systems, Inc.||Communications system providing extensible protocol translation features and related methods|
|US20110044240 *||24 Feb 2011||Seo Woo Jang||Method for transmitting a packet at a base station in a network using multiple communication schemes|
|US20110200027 *||18 Ago 2011||Ipr Licensing, Inc.||Two tier hi-speed wireless communication link|
|US20120272310 *||19 Jul 2011||25 Oct 2012||Novatel Wireless, Inc.||Systems and methods for secure communication over a wireless network|
|US20120311078 *||6 Dic 2012||Amx Llc||Apparatus, method, and computer program for streaming media peripheral address and capability configuration|
|US20140164658 *||11 Dic 2012||12 Jun 2014||Mark Kramer||Wireless Protocol Communication Bridge And System Comprising Bridge|
|WO2012030585A3 *||23 Ago 2011||28 Jun 2012||Marvell World Trade Ltd.||Link adaptation a communication network|
|WO2013130860A1 *||28 Feb 2013||6 Sep 2013||Visual Telehealth Systems, Inc.||System, method, apparatus, and computer program product for providing network connectivity|
|Clasificación de EE.UU.||370/265, 370/466|
|Clasificación cooperativa||H04W92/02, H04W84/005, H04W84/12, H04W84/042|
|22 Jul 2002||AS||Assignment|
Owner name: SPRINT SPECTRUM L.P., KANSAS
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:DANLEY, JEFFREY B.;ECCLES, RYAN M.;REEL/FRAME:013140/0180
Effective date: 20020708
|23 Sep 2011||FPAY||Fee payment|
Year of fee payment: 4
|17 Nov 2015||FPAY||Fee payment|
Year of fee payment: 8
|
<urn:uuid:2c5a2e49-0fd9-41bb-8536-3a41d7a833af>
|
CC-MAIN-2016-26
|
http://www.google.es/patents/US7376091?hl=es&dq=flatulence
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783403825.35/warc/CC-MAIN-20160624155003-00030-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.85951
| 13,310
| 2.640625
| 3
|
Whether it’s Russia’s military adventures in the Crimea or China’s less-than-neighborly attempt to exert influence in the South China Sea, international tensions are on the rise—and if those tensions lead to accidents in space, neither the community of nations nor the US has the tools to prevent such a conflict from spinning out of control and costing billions.
American national security analyst Micah Zenko of the Council on Foreign Relations outlines these concerns in a new report on the growing threat of dangerous space incidents. He compares the problem to cybersecurity, another relatively new concern that has attracted attention from the world’s security leaders. In comparison, he says that senior officials are not paying enough attention to potential problems in space, where there is much less room for error.
“The difference is that cyber domain can be degraded [by cyber attacks,] but space just falls off a cliff,” Zenko says of a scenario where satellites are damaged intentionally or by accident. “Once the debris is there [in orbit] it’s there forever unless you bring it back down or burn it up, and we are many years from anything like that.”
Zenko is concerned about scenarios where countries like China, North Korea or Iran seek to demonstrate their space capabilities in a crisis by testing or actually deploying anti-satellite weapons. The US, the country most dependent on space technology both commercially and militarily, is particularly vulnerable to an attack like that; private companies spent $225 billion on commercial space activity in 2012, according to the Space Foundation (pdf). Replacing damaged satellite infrastructure isn’t exactly a walk in the park.
And this isn’t just fear-mongering: A Chinese anti-satellite test in 2007 went wrong, creating a cloud of debris that inspired the movie Gravity‘s space-station-shredding catastrophes. China is currently testing technology that involves moving satellites close together in orbit, and no one is sure if they’ll be able to keep such tests under control or what they’ll do if it goes wrong again.
One reason why is that NASA, the US space agency, is forbidden from contact with Chinese space officials, preventing communication about best practices and contingency plans that does occur on other military issues. Currently, the US isn’t even acknowledging China’s space weaponry, or its own. When it comes to nations with which the US has worse relations and less influence, like North Korea and Iran, there is little to do but invest in damage mitigation, upgrade space monitoring, and work to update international space law that hasn’t changed since the 1970s.
|
<urn:uuid:2abde8d2-9a4d-46e3-8b8f-0f92ea561412>
|
CC-MAIN-2016-26
|
http://qz.com/201414/space-isnt-just-the-final-frontier-its-a-dangerous-venue-for-geopolitical-brinksmanship/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395166.84/warc/CC-MAIN-20160624154955-00030-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.935879
| 551
| 2.671875
| 3
|
This is a special structure used to say why something is or should be ‘more…’
The robbery was all the more distressing because the robbers broke up a lot of our furniture.
Sunday mornings were all the more enjoyable because Susie used to come around to breakfast.
That murder attempt made it all the more important to seek police protection.
He doesn’t seem to be any the better for his experience.
He explained everything carefully, but I was none the wiser.
Note that this structure is only used to express abstract ideas.
Three / four times + comparative
The structure three times + comparative can be used instead of three times as much.
I can run three times faster than you. OR I can run three times as fast as you.
The task was ten times more difficult than I expected.
I can walk four times further than you.
Note that twice and half are not possible in this structure.
She is twice as pretty as her sister. (NOT She is twice prettier than her sister.)
Pronouns after than
In an informal style, object pronouns are used after than. In a formal style, subject pronouns are used usually with verbs.
She is older than me. (Informal)
She is older than I am. (Formal)
|
<urn:uuid:6a34436d-ec7b-4a03-8d59-461f0c306441>
|
CC-MAIN-2016-26
|
http://www.englishgrammar.org/comparative/?article2pdf=1
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397636.15/warc/CC-MAIN-20160624154957-00167-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.97452
| 273
| 3.359375
| 3
|
Re: vaccinations for children?
1) All pediatric vaccines except flu are now mercury-free, and the amount of aluminum isn't much greater than what they are exposed to every day by eating food and breathing the air. Baby formula and breast milk have aluminum.
2) Unvaccinated babies can get SIDS, too, though breast-feeding can help prevent it. In fact, there's some evidence that SIDS is a bad reaction to certain bacteria. (Other theories are out there too.)
3) Never heard of this one. Any evidence?
4) Unvaccinated kids do get autism. Amish kids get autism. In fact, high fevers resulting from childhood illnesses used to be a major cause of brain damage and mental retardation in children.
5) Over 100 people caught measles in the US in 2008. Most of them were unvaccinated. Vaccination against measles works very well in about 98% of people.
6) Once a child is fully vaccinated, he or she has little to fear from unvaccinated classmates. However, 26 of last year's US measles cases occured in babies 15 months and younger who hadn't been vaccinated yet. These little babies are also at higher risk for serious complications. Thank God, they all recovered, though some of them were hospitalized for a while. And babies don't go to school, but older siblings could carry the virus home on their skin or clothing.
There's a great deal of misinformation and rumor floating around. Talk to your pediatrician about your concerns, and let me know if you have any other questions.
|
<urn:uuid:0b97e970-5617-47fa-8bf1-7a0dd28fbeb0>
|
CC-MAIN-2016-26
|
http://www.healthboards.com/boards/vaccination-immunization/674463-vaccinations-children.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783394414.43/warc/CC-MAIN-20160624154954-00104-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.972072
| 325
| 2.703125
| 3
|
This report details how budget-strapped organizations working in the developing world are able to use open source software to accomplish computing task that would otherwise just be too expensive.
From the introduction:
(Via infoDev: http://www.infodev.org/content/library/detail/837)
The emphasis on openness in open source software has fostered the growth of a world-wide community of developers contributing to the evolution and improvement of various software programs for use in networked servers and desktop systems ranging from operating systems and web servers, to e-mail, word processing and spreadsheets. While such a diffused structure for software development may seem chaotic, this approach is being considered as a more democratic alternative to monolithic single vendor efforts.
Interest in OSS is Likely to Grow: While ICT priorities will vary among countries, as it increases as a component of a country s development strategy, understanding OSS dynamics should also have more importance. With some discussions becoming quite passionate, decision-makers will have questions about the potential that open source software may offer, where and how it should be used, along with its potential risks.
OSS is Different from Proprietary Software: With OSS, the programming code used to create software solutions is available for inspection, modification, re-use and distribution by others. It is often assumed that open source software is free of charge. While this can be the case, OSS can be purchased for a fee as well. The concept of free, in this context, emphasizes what can be done with the source code rather than its cost. Because of its collaborative nature, the open source model lends itself to allow participants to be both producers and consumers/users of the software.
OSS Arguments Range from the Technical to the Economic: The OSS topic incorporates the concepts of community, public good, non-commercialism, ecosystems, and issues of intellectual property, copyrights and patents. Underlying much of the discussion is that 'information' in general, and 'software' as a means of delivery is unlike other goods and services. Central to the discussion are the issues of when and if information should be owned versus shared, what is the value of software, and when is it considered a commodity.
|
<urn:uuid:5b38c9ab-e4c9-4c89-b0bd-01c22005a1cb>
|
CC-MAIN-2016-26
|
http://unthinkingly.com/posts/2005/11/open/source/software/in/the/developing/world.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783391634.7/warc/CC-MAIN-20160624154951-00120-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.940382
| 456
| 3.125
| 3
|
Laurence Corash, a hematologist at the University of California, San Francisco, started hearing reports in the early 1980s that demand for the antibiotic pentamidine was skyrocketing. The drug was used to treat pneumocystosis, a severe pneumonia caused by a yeast-like fungus that typically gained a foothold by exploiting the weakened immune systems of very old or severely malnourished people.
Some of Corash’s hemophilia patients, who were otherwise healthy, started contracting the fungal disease and taking pentamidine to combat the infection. Searching for a cause for this trend, Corash realized that his patients had one thing in common: they were getting injections of a concentrated blood extract called factor VIII to help their blood clot. It dawned upon the physician that something in the factor VIII preparations might be destroying his patients’ immune systems.
By 1984, Corash realized that the newly characterized HIV virus was the causative agent. “It was a very sad and gut-wrenching experience to have to sit down with people and say, ‘You got this disease from the products I gave you, and I don’t have a treatment for you,’” Corash says. “To see 300 people get HIV infections from the treatments that you give them is a very disturbing thing.”
So when researchers at Advanced Genetics Research Institute (AGRI), a Berkeley, California, veterinary pharmaceutical company, called Corash to help them run routine blood tests on a new vaccine against the feline leukemia virus, he wondered whether the agent used to inactivate the virus for the vaccine, a defensive chemical produced by plants called a psoralen, might also inactivate HIV, and so protect his hemophilia patients from acquiring the disease from factor VIII preparations. The AGRI scientists realized that psoralens, which prevented DNA and RNA replication in most viruses and bacteria, could conceivably wipe out any pathogens in blood products like factor VIII without harming the patient, because the plasma from which factor VIII is derived does not contain any cells or nuclei to be damaged by the treatment.
The vaccine’s virus-inactivating agent, a chemical called 8-methoxypsoralen, normally drifts harmlessly in and out of cells and nestles inside nucleic acid helices. But when the psoralen molecule is hit with UV light, two photons bind the ends of the molecule, one to each strand of the DNA, and “tie the strands together,” preventing replication, says John Hearst, a founder of AGRI and a molecular biologist at the University of California, Berkeley, who studied some of the first synthetic psoralen compounds in the 1970s. Carl Hanson, who was then a postdoctoral student in Hearst’s lab, discovered that the cross-linking worked in both RNA and DNA, and reasoned that it could thus prevent bacteria, viruses, and eukaryotic cells from replicating.
“Using drugs that target DNA and RNA was very innovative as a concept,” says Richard Benjamin, chief medical officer for the American Red Cross. Several members of Hearst’s lab began meeting for coffee at Oliveto Restaurant near Berkeley to brainstorm ways of using psoralens to develop blood-cleaning products, says Hanson, who is now at the California Department of Public Health.
To show that the approach could actually prevent the transmission of disease, Corash and collaborator Harvey Alter of the National Institutes of Health mixed concentrated factor VIII preparations with hepatitis B and C viruses, added psoralens, and then shone UV light on the preparations. Healthy chimpanzees transfused with the treated factor VIII and other psoralen-cleaned concentrates were disease-free months later.
The group formed a startup called Steritech and began synthesizing psoralen compounds that could inactivate viruses and bacteria more quickly. Their original product took 8 hours to clean a few hundred milliliters of blood; by the end of 1993, newer variants could clean the same amount of blood in less than 3 minutes.
Steritech (renamed Cerus in 1997) would go on to develop pathogen-inactivation products to scrub red blood cells, plasma, and platelets of HIV and several other viruses and bacteria. The technology is currently used in parts of Europe and Asia to clean blood supplies of dozens of pathogens such as SARS, MRSA, and HIV, and is currently under FDA regulatory review. When more than one-third of the population on the French island of Réunion in the Indian Ocean was infected with a rare arthritis-causing virus called Chikungunya, France hired Cerus to sterilize the entire blood supply on the tiny Indian Ocean outpost.
|
<urn:uuid:7da2e8e0-2599-4ec3-9e36-d075cc1541d0>
|
CC-MAIN-2016-26
|
http://www.the-scientist.com/?articles.view/articleNo/31093/title/Blood-Simple/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399385.17/warc/CC-MAIN-20160624154959-00162-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.956438
| 975
| 3.296875
| 3
|
2 Answers | Add Yours
Macbeth refers to the day as "foul" because so many people have died in the battle against the Norwegians and Scottish rebels and "fair" because the Scottish soldiers won the battle. He grieves for the loss of life but rejoices in victory.
In the opening scene of the play, the witches use the same words when they say, "Fair is foul and foul is fair," and set the tone for the play. The audience has heard their words, but Macbeth doesn't know about them, thus fulfilling the definition of dramatic irony. The confusion between what is good and what is evil will pervade the play, particularly for Macbeth.
Or he's commenting on the weather "the fog" and delighting in the massacre. The coordinating pronoun "and" aligns "foul" and "fair"--and Macbeth's starting with "foul" reveals the first image in his mind. Macbeth is "bloody," an exceutioner. He split a guy open from the groin to the mouth and stuck his head up on a stick on the field, and he wasn't even bothered at all to go a second round. Though the king is shocked and asks "Dismay'd not this / Our captains, Macbeth and Banquo?" the Sergeant even jokes about how killing is in Macbeth's nature: "As sparrows eagles or the hare the lion" (as sparrows shock eagles or hares shock lions).
A dramatic irony is also that the audience knows that he will fall--from the play's title of course, but also from the "I have not seen"--standard foreshadowing language, still used in horror movies today--by tying the foul and fair to the "I," the hero can see external nature but not internal corruption--or even better--that he thinks he sees corruption but doesn't, creating dramatic irony upon irony with "I have not seen"--and so it just hit me--he's starting to "make assurance double sure.' So his first words and his blindness to their meaning reveal his nature.
We’ve answered 327,545 questions. We can answer yours, too.Ask a question
|
<urn:uuid:d3efcad8-d5da-41d9-9ab8-b8f6437078dc>
|
CC-MAIN-2016-26
|
http://www.enotes.com/homework-help/when-macbeth-says-quot-foul-fair-day-have-not-seen-59915
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393442.26/warc/CC-MAIN-20160624154953-00015-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.968683
| 469
| 3.5
| 4
|
- (uncountable) The truth is an idea which is correct or accepted as correct.
- Don't lie to me. Tell me the truth.
- There is no absolute truth in history.
- Sometimes, truth is stranger than fiction.
- The honest truth is, we made a lot of mistakes on this job.
|
<urn:uuid:f0067b35-607e-41dd-95a2-9573dda379f1>
|
CC-MAIN-2016-26
|
https://simple.wiktionary.org/wiki/truth
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783404382.73/warc/CC-MAIN-20160624155004-00092-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.912009
| 69
| 2.734375
| 3
|
Student ID Badge Policy (7th - 12th Grades)
Student ID Cards & Lanyards
In an effort to promote College and Career Readiness, students in seventh grade through 12th grade will have the ability to possess their ID cards in a number of ways-- on a lanyard, in their wallets, or in their pockets—while on campus in order to more closely mirror college, career and real-life expectations and procedures.
- Students shall have their ID on them at all times. If students opt to wear a lanyard, it must be a TUSD one.
- Students will need their ID to check books, verify identification if they commit an infraction or there is a reasonable suspicion they committed a behavioral infraction, they are referred to the Dean, etc.
- If students repeatedly do not have their ID when it’s needed (no exact number but a pattern is recognized), they should be referred to the Dean.
- The emphasis is on teaching students responsible behavior and holding them accountable to carrying an ID, not tracking their lack of an ID and tracking repeat consequences.
|
<urn:uuid:e788beb2-99e4-4fa8-be77-e48e2e96cc4e>
|
CC-MAIN-2016-26
|
http://turlockusd-ca.schoolloop.com/idbadges
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397695.90/warc/CC-MAIN-20160624154957-00071-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.954782
| 228
| 2.515625
| 3
|
Some 230 million years ago, giant reptiles walked the Earth. Some were large and fearsome predators; others were nimble and fleet-footed runners; and yet others were heavily armoured with bony plates running down their backs. Their bodies had evolved into an extraordinary range of shapes and sizes and they had done so at a breakneck pace. They were truly some of the most impressive animals of their time. They were the crurotarsans.
Wait… the who and what now? Chances are you’ve never heard of the crurotarsans and you were expecting that other, more famous group of giant reptiles – the dinosaurs. There is certainly no doubt that the dinosaurs were an evolutionary success story, diversifying from a standard body plan – a small, two-legged meat-eater – into a dazzling selection of forms. Today, living dinosaurs – the birds – still rule our skies and back in their heyday, they were the dominant back-boned animals on land for millions of years.
But what was the secret to their rise to power? Many palaeontologists believe that they simply outcompeted other animal groups that were around at the same time like the bizarre, buck-toothed rhynchosaurs or mammal-like reptiles like the cynodonts. Perhaps their upright postures made them faster or more agile; perhaps they were actually warm-blooded and able to cope with a wider range of climates. Either way, the fact that they and not the other reptile groups ascended to dominance is often taken as a sign of their superiority.
But Stephen Brusatte from Columbia University challenges that view. According to his take on Triassic life, the dinosaurs fared no better than their competitors, the crurotarsans, and were actually less successful for about 30 million years. They eventually supplanted these other groups because of luck rather than because they possessed any special advantage.
During the Triassic period, the crurotarsans (which eventually gave rise to today’s crocodiles and alligators) were at their most diverse. They ranged from top predators like Postosuchus to the armoured aetosaurs like Desmatosuchus to swift, two-legged runners like Effigia and Shuvosaurus. Many of them were incredibly similar to the dinosaurs we know and love (see bottom image) and some were even mistaken for dinosaurs when they were first discovered. These strikingly similar bodies suggest that members of the two groups shared similar lifestyles and probably competed for the same resources.
Did the dinosaurs simply win the battle? Brusette noted that answers to this question often invoke nebulous concepts of “superiority” and he wanted to look at it from a more objective angle, comparing the two groups along measurable lines. To that end, he worked with three other palaeontologists to construct a family tree of 64 dinosaurs and crurotarsans, based on 437 features on each of their skeletons.
The team calculated how fast each group was evolving based on their bones. If dinosaurs really outcompeted the crurotarsans, you would expect to see the former group evolving at increasing rates during the Triassic, while the latter group’s rate of evolution slowed. But that’s not what happened. Instead, Brusette found that during the Triassic as a whole, the crurotarsans were keeping pace with the expansion of the dinosaur lineage. It’s possible that during the mid-Triassic, the dinosaurs were evolving at a slightly more rapid rate, but it’s hard to be sure based on such few samples.
Brusette also looked at the range of body plans developed by each group, also known as their “disparity”. Animal groups with high disparity and a wide range of body shapes tend to have a more varied set of lifestyles, habitats and diets. And surprisingly, the crurotarsans had about twice as much disparity as the dinosaurs did at the time.
So for the 30 million years when the dinosaurs and the crurotarsans shared the planet, both were evolving at equal rates and it was the crurotarsans who were experimenting with twice as many body shapes. To Brusette, that’s a blow to the long-standing view that the “superior” dinosaurs were in some way “preordained for success”.
Instead, he suggests that the dinosaurs’ success hinged on a combination of “good luck” and perseverance. Both they and the crurotarsans survived an extinction event 228 million years ago, which wiped out many other reptile groups like the rhynchosaurs. At the end of the Triassic period, some 28 million years later, the dinosaurs weathered another (much bigger) extinction event that finally killed the majority of crurotarsans off for good.
It’s not clear why the dinosaurs persevered and the crurotarsans didn’t. Perhaps the dinos had some unique adaptation that the crurotarsans lacked, which ensured their survival. But Brusette says that this explanation is “difficult to entertain” because the crurotarsans were more abundant at the time and had vastly more varied bodies. He also says that the death of certain groups during mass extinctions is more likely to be due to random factors rather than any specific aspect of their lifestyles.
Whatever the answer, the sudden volte face of the crurotarsans, from ruling reptiles to evolutionary footnotes, gave the dinosaurs their chance. They were the reptilian equivalent of videotapes, rising to dominance in the wake of a superior Betamax technology. In the brave, new world of the Jurassic, they could exploit the niches vacated by their fallen competitors.
The rise of the dinosaurs is often spoken of as a single event but it was more likely to have been a two-stage process. The predecessors of the gigantic, long-necked sauropods expanded into new species after the late Triassic extinction, while the big meat-eaters and the armoured plant-eaters only came to the fore as a second extinction heralded the start of the Jurassic. Brusette refers to the dinosaurs as the “beneficiaries of two mass extinction events”, which is ironic given what happened next. About a 130 million years later, the dinosaurs’ luck proved to be finite. They survived through two extinctions, but as the saying goes, third time’s the charm.
Reference: Science doi:10.1126/science.1161833
An array of crurotarsans taken from Wikipedia and illustrated by Arthur Weasley. Clockwise from top left: Effigia, Shuvosaurus, Rutiodon, Postosuchus, Lotosaurus and Desmatosuchus.
|
<urn:uuid:dae9a5cd-adb5-4f33-aa47-d27e9579444c>
|
CC-MAIN-2016-26
|
http://blogs.discovermagazine.com/notrocketscience/2008/09/11/rise-of-dinosaurs-down-to-luck-not-superiority/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397795.31/warc/CC-MAIN-20160624154957-00149-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.975922
| 1,401
| 3.75
| 4
|
But genes, though hugely important, might not be the whole story. Researchers at Oxford University are interested in understanding how changes in cells' metabolism – the chemical processes through which cells get the energy they need – could also prime them to become cancerous.
They have just started collaborating with a lab at Keio University in Japan to bring large-scale techniques to the study of metabolic processes going on in cancer cells, much as gene technologies have given such insight into DNA changes involved in cancers.
'Altered cellular metabolism is a hallmark of cancer,' says Dr Patrick Pollard, who is leading this effort in the Nuffield Department of Clinical Medicine at Oxford.
This is not a new finding - it is something that has been known for a long time. The biochemist and Nobel laureate Otto Warburg pointed it out in the early 1900s. He observed that most cancer cells get the energy they need predominantly through a high rate of glycolysis (the metabolic process that breaks down glucose to release energy). It helps the cancer cells deal with the low oxygen levels that tend to be present in a tumour.
But whether dysfunctional metabolism causes cancer, as Warburg believed, or is something that happens afterwards is a different question.
In the meantime, gene studies rapidly progressed and gave us a picture of how genetic changes lead to cancer.
It goes something like this: DNA mutations spring up all the time in the body's cells, but most are quickly repaired. Alternatively the cell might shut down or be killed off before any damage is caused. However, the repair machinery is not perfect. If changes occur that bypass parts of the repair machinery or sabotage it, the cell can escape the body's normal controls on growth and further DNA changes can begin to accumulate as the cell switches to become cancerous.
So what has metabolism got to do with this? We get the energy we need from food of course, and we talk about our metabolism in the way our bodies make use of that food as a fuel for everything we do during the day. Our cells are the same. They have whole series of chemical reactions going on simultaneously to keep them working, wherever and whatever they are doing in the body – from heart cells to neurons in the brain and liver or pancreatic cells. Cellular metabolism is a constant process with thousands of metabolic reactions happening at the same time, all of which need to be regulated to keep our cells ticking over healthily.
It's what happens when the regulation of cellular metabolic processes goes wrong that could be of interest. And it's only a lot more recently that techniques to probe the entirety of metabolic processes in the cell have advanced. The result is something of a return to vogue for studies to understand how altered cellular metabolism and cancer are linked.
Studies of the genetic basis of cancer and dysfunctional metabolism in cancer cells are complementary, Patrick believes. 'Genomic data is very important, but certain changes in cells can’t always be accounted for by genetics.'
He is now collaborating with Professor Tomoyoshi Soga's large lab at Keio University in Japan, which has been at the forefront of developing the technology for metabolomics research over the past couple of decades (metabolomics being the ugly-sounding term used to describe research that studies all metabolic processes at once, like genomics is the study of the entire genome).
The Japanese lab's ability to screen samples for thousands of compounds and metabolites at once, coupled with the access to tumour material and cell and animal models of disease in Oxford, should give great power to probe the metabolic changes that occur in cancer.
There is reason to believe that dysfunctional cell metabolism is important in cancer. Some genes with metabolic functions are associated with some cancers, and changes in the function of a metabolic enzyme have been implicated in the development of gliomas.
These results have led to the idea that some metabolic compounds, or metabolites, when they accumulate in cells, can cause changes to metabolic processes and set cells off on a path towards cancer.
Patrick Pollard and colleagues have now published a perspective article in the journal Frontiers in Molecular and Cellular Oncology that proposes fumarate as such an 'oncometabolite'. Fumarate is a standard compound involved in cellular metabolism.
In that article, the researchers summarise evidence (often from their own lab) that shows how accumulation of fumarate when an enzyme goes wrong affects various biological pathways in the cell. It shifts the balance of metabolic processes and disrupts the cell in ways that could favour development of cancer.
This work on metabolic pathways involving fumarate has already led to a cheap and reliable diagnostic test for a rare form of cancer caused by accumulation of fumarate within cells. Their test for hereditary leiomyomatosis and renal cell cancer (HLRCC) involves screening tumour samples for a particular molecular fingerprint unique to this type of cancer. The Oxford researchers are now hoping to develop their test for clinical use, largely to help with genetic counselling for families as the condition can be inherited.
While HLRCC is a rare type of cancer, Patrick Pollard says: 'Metabolic changes are observed in most cancers, so there could be wider implications. Lots of findings about pathways that are important in cancer come from studying rare cancers.'
This is where the collaboration with Keio University comes in. The Keio group is able to label glucose or glutamine, basic biological sources of fuel for cells, and track the pathways cells use to burn up the fuel. It allows the scientists to work out the metabolic pathways that are being used preferentially by different cell types including cancer-derived cell lines.
Patrick gives an example of how the research might progress: they could profile the metabolites in a cohort of tumour samples and matched normal tissue. This would produce a dataset of the concentrations of hundreds of different metabolites in each group. Statistical approaches could suggest which metabolic pathways were abnormal. These would then be the subject of experiments targeting the pathways to confirm the relationship between changed metabolism and uncontrolled growth of the cancer cells.
Patrick and colleagues write in their latest article that the shift in focus of cancer research to include cancer cell metabolism 'has highlighted how woefully ignorant we are about the complexities and interrelationships of cellular metabolic pathways'.
Hopefully, research efforts like this large-scale approach to understanding cell metabolism can give insight into how cells respond to shifted metabolic processes and how this is associated with the development of some cancers.
|
<urn:uuid:9a91c335-d4c4-4542-a21f-445b2f17a8f0>
|
CC-MAIN-2016-26
|
http://www.technologynetworks.com/Metabolomics/news.aspx?id=142871
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396029.85/warc/CC-MAIN-20160624154956-00186-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.951776
| 1,310
| 3.34375
| 3
|
1. The act of displacing, or the state of being displaced; a putting out of place. The quantity of anything, as water, displaced by a floating body, as by a ship, the weight of the displaced liquid being equal to that of the displacing body.
2. <psychology> The process by which an emotional or behavioural response that is appropriate for one situation appears in another situation for which it is inappropriate.
3. <chemistry> The process of extracting soluble substances from organic material and the like, whereby a quantity of saturated solvent is displaced, or removed, for another quantity of the solvent.
4. <mechanics> Piston displacement, the volume of the space swept through, or weight of steam, water, etc, displaced, in a given time, by the piston of a steam engine or pump.
Origin: Cf. F. Deplacement.
(03 Jul 1999)
|
<urn:uuid:0ae4503b-eea2-468b-b66b-b47d2c1806da>
|
CC-MAIN-2016-26
|
http://www.mondofacto.com/facts/dictionary?displacement
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397864.87/warc/CC-MAIN-20160624154957-00134-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.925424
| 190
| 3.296875
| 3
|
Rheumatoid lung disease
Rheumatoid lung disease is a group of lung problems related to rheumatoid arthritis. The condition can include:
- Blockage of the small airways (bronchiolitis obliterans)
- Fluid in the chest (pleural effusions)
- High blood pressure in the lungs (pulmonary hypertension)
- Lumps in the lungs (nodules)
- Scarring (pulmonary fibrosis)
Lung disease - rheumatoid arthritis; Rheumatoid nodules; Rheumatoid lung
Lung problems are common in rheumatoid arthritis. They often cause no symptoms.
The cause of lung disease associated with rheumatoid arthritis is unknown. Sometimes, the medicines used to treat rheumatoid arthritis, especially methotrexate, may result in lung disease.
Symptoms may include any of the following:
Exams and Tests
The doctor may hear crackles (rales) when listening to the lungs with a stethoscope. Or, there may be decreased breath sounds, wheezing, a rubbing sound, or normal breath sounds.
The following tests may show signs of rheumatoid lung disease:
- Chest x-ray
- CT scan of the chest
- Echocardiogram (may show pulmonary hypertension)
- Lung biopsy (bronchoscopic, video-assisted, or open)
- Lung function tests
- Needle inserted into the fluid around the lung (thoracentesis)
- Blood tests for rheumatoid arthritis
Many people with this condition have no symptoms. Treatment is aimed at the health problems causing the lung problem and the complications caused by the disorder. Corticosteroids or other medicines that suppress the immune system are sometimes useful.
Outcome is related to the underlying disorder and the type and severity of lung disease. In severe cases, lung transplantation can be considered.
Rheumatoid lung disease may lead to:
When to Contact a Medical Professional
Call your health care provider right away if you have rheumatoid arthritis and you develop unexplained breathing difficulties.
Corte TJ, duBois RM, Wells AU. Connective tissue diseases. In: Broaddus VC, Mason RJ, Ernst JD, et al, eds. Murray and Nadel's Textbook of Respiratory Medicine. 6th ed. Philadelphia, PA: Elsevier Saunders; 2016:chap 65.
Lake F, Proudman S. Rheumatoid arthritis and lung disease: from mechanisms to a practical approach. Semin Respir Crit Care Med. 2014;35:222-238. PMID: 24668537 www.ncbi.nlm.nih.gov/pubmed/24668537.
Reviewed By: Denis Hadjiliadis, MD, MHS, Associate Professor of Medicine, Pulmonary, Allergy, and Critical Care, Perelman School of Medicine, University of Pennsylvania, Philadelphia, PA. Also reviewed by David Zieve, MD, MHA, Isla Ogilvie, PhD, and the A.D.A.M. Editorial team.
|
<urn:uuid:ce9c494c-ebea-4648-b6da-8243291d60ed>
|
CC-MAIN-2016-26
|
http://arh.adam.com/content.aspx?productId=101&pid=1&gid=000113
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783408840.13/warc/CC-MAIN-20160624155008-00163-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.820128
| 663
| 2.671875
| 3
|
Indexed Units of Account: Theory and Assessment of Historical Experience
NBER Working Paper No. 6356
An indexed unit of account is a money analogue, used to express prices; the unit's" purchasing power is defined by an index. Indexed units of account are not true money in that" they are not used as a medium of exchange. The first successful indexed unit of account Unidad de Fomento (UF) has been used in Chile since 1967, and has been copied in Colombia Ecuador, Mexico, and Uruguay. The reasons for creating such units are discussed from the" standpoint of monetary theory. The experience with such units in Chile is discussed. It is argued" that important practical problems in implementing indexation were solved by creating such" indexed units of account. The existing indexed units of accounts may not be ideal for all" purposes, however, and alternative definitions of the units, relating the units to measures of" income, may also be advantageous. The indexed units of account might someday be" monetized,' i.e., institutions such as debit cards may be devised to allow the units to be used for" all transactions, so that the role of conventional money might be reduced to clearing-house" functions only.
Document Object Identifier (DOI): 10.3386/w6356
Published: Chapter 4 in "Indexation, Inflation, and Monetary Policy," edited by Fernando Lefort and Klaus Schmidt-Hebbel, Volume 2 of the series "Banca Central, Análisis y Políticas Económicas" of the Central Bank of Chile, 2002, pp. 105-134
Users who downloaded this paper also downloaded these:
|
<urn:uuid:41e278b2-c5e1-43bc-b252-1afb95f6bd8c>
|
CC-MAIN-2016-26
|
http://www.nber.org/papers/w6356
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783400031.51/warc/CC-MAIN-20160624155000-00137-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.915654
| 346
| 2.953125
| 3
|
Community service is a form of volunteerism that has no intentional tie to learning; the emphasis is strictly on the service. Service-learning on the other hand is a teaching methodology that emphasizes both the service and the learning goals in such a way that both are enriched. In addition, service-learning meets a genuine community need, includes thoughtful partnerships, and have clear connections to learning objectives.
(Adapted from the National Youth Leadership Council )
If ever unsure,
determine if the project/activity is:
- Meeting a community need
- Connecting to learning outcomes in an academic course
- Allowing appropriate time for reflection to assess the impact of the service on student learning
The above criteria should be explored to determine the validity of service-learning activities.
|
<urn:uuid:ca556c65-b14d-4ca8-aa95-5c99e4d03475>
|
CC-MAIN-2016-26
|
http://www.benedict.edu/cms/?q=node/327
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783391519.0/warc/CC-MAIN-20160624154951-00139-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.943775
| 156
| 3.15625
| 3
|
Nursing profession is the most satisfying and challenging profession among all the professions that are available for a student to choose from. The increasing demand for nurses in healthcare industry, the decent financial package and opportunities for further growth might lure many people to this noble profession.
You need to have some special traits or skills that will help you in a long way in taking up this profession and achieve success both financially, and mentally in the form of immense job satisfaction.
The typical personality traits that an aspiring nurse or a future nurse should have include the following:
• mental strength or inner strength, and
• calmness or level-headed nature
As a nurse, you should have the urge and motivation coupled with compassion to help other people and also the determination to make an impact in the other person’s life in such a way that he or she will become persons from the state of patients.
It is the responsibility of the nurse to ensure that a patient is saved, in the first instance, from further deterioration in his or her health condition by providing adequate care with affection and kindness.
While treating the patient, a nurse should be honest enough to do what she or he knows and accept his inability or lack of knowledge when questioned by the patient about the state of health. Giving false promises or misleading the patients should not be done by the nurse.
All days at work may not be good or satisfactory. As a nurse, you may have to see some bad moments such as death of a patient despite your best efforts to save the life, a still born baby, a premature death or such other unfortunate events. You should, as a nurse, have the mental strength and capability to withstand such setbacks and take things in your stride. You should act with confidence and at the same time with relative calmness and ease such that there is no sign of panic or concern in your face which might bother the patient and the other family members of the patient.
Thus, the nursing profession demands, at the minimum, these personality traits from a person aspiring to become a nurse.
|
<urn:uuid:3a031855-4c62-428d-9a2d-8cb8c1a34793>
|
CC-MAIN-2016-26
|
http://www.nursingstudenttutor.com/nursing/essential-personality-skills-a-nurse-should-have.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783400031.51/warc/CC-MAIN-20160624155000-00070-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.952304
| 416
| 2.640625
| 3
|
Sparklers burn around 1,000 people per year and around 50% of sparkler injuries happen to children under five. Sparklers reach 1,800° Fahrenheit when the chemical mixture on the wire is lit and stay hot after the sizzling is complete.
Kids love Sparklers and, even if you’d never buy them, you might find your child begging to hold one at your Fourth of July celebration. Don’t be afraid to say no, of course, but if you do say yes, children should be shown how to safely hold it and should be supervised closely.
Here are some other good tips to keep in mind.
- An adult should light one sparkler at a time.
- Children should be standing and holding the wire at arms length.
- Everyone using a sparkler should be more than an arms length away from one another.
- Instruct children not to throw or swing sparklers.
- Remind children the wire stays hot after it is extinguished.
- Have a glass or bucket of water for sparkler disposal.
|
<urn:uuid:60e2d2e0-e2ca-4c61-a8ad-469efb6d321b>
|
CC-MAIN-2016-26
|
http://blog.sgws.org/sparkler-safety-on-independence-day/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395679.18/warc/CC-MAIN-20160624154955-00190-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.893226
| 219
| 3.25
| 3
|
March 12, 2009 Let’s be honest, for most people exercising is a bit of a pain and the following day you can wind up sore in muscles you didn’t even know you were using. Researchers at the University of Tokyo have developed a system that could help lessen such painful surprises by displaying muscular activity in real time.
The system consists of a computerized, sensor-based “magic mirror” that analyzes muscular activity and shows real-time computer-generated images of hard muscles are working while exercising. It is currently capable of monitoring the activity of 30% of the body’s roughly 300 skeletal muscles through 16 electromyographs (instruments that record the electrical waves associated with muscle activity) attached to the user’s body, 10 motion-capture cameras, and a pair of floor sensors that measures the force exerted on the legs.
Using this data a real-time computer-generated image of the user’s musculo-skeletal system is displayed on a screen with each muscle shown in a different color representing how much it is being used at that moment. Active muscles are shown in red, while inactive muscles are shown in yellow. The magic mirror system is able to display the images in real-time even when the user is moving rapidly thanks to newly developed software that the researchers say is 10 times faster than previous technology.
The magic mirror was developed by researchers at the Information and Robot Technology Research Initiative (IRT) under the leadership of professor Yoshihiko Nakamura and was unveiled to the media at the University of Tokyo with the system’s display monitor showing a real-time computer-generated image of a male model’s musculo-skeletal system. The team is working on a more compact version that incorporates the cameras directly into the display with hopes the system will find its way into homes and gyms to help people get in shape as well as hospitals where it could be used to help doctors treat conditions that affect the muscles. There's also bound to be interest from those who train and monitor elite athletes.
Now, if I only had some muscles worth displaying.
Source: Pink Tentacle.
|
<urn:uuid:280a3771-4ed8-4b4f-a2ce-acfd397930d7>
|
CC-MAIN-2016-26
|
http://www.gizmag.com/muscle-magic-mirror/11219/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396949.33/warc/CC-MAIN-20160624154956-00160-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.951147
| 445
| 3.09375
| 3
|
During the Cold War, two things came to be known and generally recognized in the Middle East concerning the two rival superpowers. If you did anything to annoy the Russians, punishment would be swift and dire. If you said or did anything against the Americans, not only would there be no punishment; there might even be some possibility of reward, as the usual anxious procession of diplomats and politicians, journalists and scholars and miscellaneous others came with their usual pleading inquiries: "What have we done to offend you? What can we do to put it right?"
A few examples may suffice. During the troubles in Lebanon in the 1970s and '80s, there were many attacks on American installations and individuals--notably the attack on the Marine barracks in Beirut in 1983, followed by a prompt withdrawal, and a whole series of kidnappings of Americans, both official and private, as well as of Europeans. There was only one attack on Soviet citizens, when one diplomat was killed and several others kidnapped. The Soviet response through their local agents was swift, and directed against the family of the leader of the kidnappers. The kidnapped Russians were promptly released, and after that there were no attacks on Soviet citizens or installations throughout the period of the Lebanese troubles.
These different responses evoked different treatment. While American policies, institutions and individuals were subject to unremitting criticism and sometimes deadly attack, the Soviets were immune. Their retention of the vast, largely Muslim colonial empire accumulated by the czars in Asia passed unnoticed, as did their propaganda and sometimes action against Muslim beliefs and institutions.
Most remarkable of all was the response of the Arab and other Muslim countries to the Soviet invasion of Afghanistan in December 1979. Washington's handling of the Tehran hostage crisis assured the Soviets that they had nothing to fear from the U.S. They already knew that they need not worry about the Arab and other Muslim governments. The Soviets already ruled--or misruled--half a dozen Muslim countries in Asia, without arousing any opposition or criticism. Initially, their decision and action to invade and conquer Afghanistan and install a puppet regime in Kabul went almost unresisted. After weeks of debate, the U.N. General Assembly finally was persuaded to pass a resolution "strongly deploring the recent armed intervention in Afghanistan." The words "condemn" and "aggression" were not used, and the source of the "intervention" was not named. Even this anodyne resolution was too much for some of the Arab states. South Yemen voted no; Algeria and Syria abstained; Libya was absent; the nonvoting PLO observer to the Assembly even made a speech defending the Soviets.
One might have expected that the recently established Organization of the Islamic Conference would take a tougher line. It did not. After a month of negotiation and manipulation, the organization finally held a meeting in Pakistan to discuss the Afghan question. Two of the Arab states, South Yemen and Syria, boycotted the meeting. The representative of the PLO, a full member of this organization, was present, but abstained from voting on a resolution critical of the Soviet action; the Libyan delegate went further, and used this occasion to denounce the U.S.
The Muslim willingness to submit to Soviet authority, though widespread, was not unanimous. The Afghan people, who had successfully defied the British Empire in its prime, found a way to resist the Soviet invaders. An organization known as the Taliban (literally, "the students") began to organize resistance and even guerrilla warfare against the Soviet occupiers and their puppets. For this, they were able to attract some support from the Muslim world--some grants of money, and growing numbers of volunteers to fight in the Holy War against the infidel conqueror. Notable among these was a group led by a Saudi of Yemeni origin called Osama bin Laden.
To accomplish their purpose, they did not disdain to turn to the U.S. for help, which they got. In the Muslim perception there has been, since the time of the Prophet, an ongoing struggle between the two world religions, Christendom and Islam, for the privilege and opportunity to bring salvation to the rest of humankind, removing whatever obstacles there might be in their path. For a long time, the main enemy was seen, with some plausibility, as being the West, and some Muslims were, naturally enough, willing to accept what help they could get against that enemy. This explains the widespread support in the Arab countries and in some other places first for the Third Reich and, after its collapse, for the Soviet Union. These were the main enemies of the West, and therefore natural allies.
Now the situation had changed. The more immediate, more dangerous enemy was the Soviet Union, already ruling a number of Muslim countries, and daily increasing its influence and presence in others. It was therefore natural to seek and accept American help. As Osama bin Laden explained, in this final phase of the millennial struggle, the world of the unbelievers was divided between two superpowers. The first task was to deal with the more deadly and more dangerous of the two, the Soviet Union. After that, dealing with the pampered and degenerate Americans would be easy.
We in the Western world see the defeat and collapse of the Soviet Union as a Western, more specifically an American, victory in the Cold War. For Osama bin Laden and his followers, it was a Muslim victory in a jihad, and, given the circumstances, this perception does not lack plausibility.
From the writings and the speeches of Osama bin Laden and his colleagues, it is clear that they expected this second task, dealing with America, would be comparatively simple and easy. This perception was certainly encouraged and so it seemed, confirmed by the American response to a whole series of attacks--on the World Trade Center in New York and on U.S. troops in Mogadishu in 1993, on the U.S. military office in Riyadh in 1995, on the American embassies in Kenya and Tanzania in 1998, on the USS Cole in Yemen in 2000--all of which evoked only angry words, sometimes accompanied by the dispatch of expensive missiles to remote and uninhabited places.
Stage One of the jihad was to drive the infidels from the lands of Islam; Stage Two--to bring the war into the enemy camp, and the attacks of 9/11 were clearly intended to be the opening salvo of this stage. The response to 9/11, so completely out of accord with previous American practice, came as a shock, and it is noteworthy that there has been no successful attack on American soil since then. The U.S. actions in Afghanistan and in Iraq indicated that there had been a major change in the U.S., and that some revision of their assessment, and of the policies based on that assessment, was necessary.
More recent developments, and notably the public discourse inside the U.S., are persuading increasing numbers of Islamist radicals that their first assessment was correct after all, and that they need only to press a little harder to achieve final victory. It is not yet clear whether they are right or wrong in this view. If they are right, the consequences--both for Islam and for America--will be deep, wide and lasting.
The drumbeat of defeatism in Iraq has been proceeding nearly four years and the hysteria of the anti-war media has had an inevitable erosion of the national willpower. GWB's feckless ineptitude in letting Cheney/Rumsfeld pursue their "war with what you've got" on-the-cheap mode, ignoring Shinseki and promoting yes-men like Tommy-boy Franks, also contributed to the current malaise.
Bush's relentlessly low-brow schtick now will turn even conservatives against him as his immigration bill hands America over to the Democrats as a flood tide of impecunious attain the promised land [public dole] of a Euro-America under Democratic nanny-staters.
Bush's father would get "wobbly." GWB reveals himself an invertebrate under a brittle shell.
|
<urn:uuid:2cb37ddb-1d3e-4428-a271-b1ec2467ce3b>
|
CC-MAIN-2016-26
|
http://daveinboca.blogspot.com/2007/05/osama-gets-rewarded-again-for-911.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783404405.88/warc/CC-MAIN-20160624155004-00035-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.976077
| 1,646
| 2.5625
| 3
|
Amines may be formed by reduction of amides, nitriles, or nitro compounds, or by reaction of ammonia with organic halides, alcohols, or sulfonic acids. They are produced in nature by the putrefaction of organic matter.
Simple amines are pungent liquids which are strong bases and ligands; many occur naturally in decaying organic matter. They give amides with acid derivatives. All amines react with nitrous acid (dilute hydrochloric acid and sodium nitrate) but the product varies according to the number and type of hydrocarbon units attached to the nitrogen atom in the amine group. If the amino group is attached directly to a hydrocarbon ring and the reaction is carried out at 5°C or below, a diazonium salt is formed. Diazonium salts are the starting points in the manufacture of azo dyes. Amines are also used in the manufacture of many drugs and synthetic fibers.
Related entry• aniline
Related category• ORGANIC CHEMISTRY
Home • About • Copyright © The Worlds of David Darling • Encyclopedia of Alternative Energy • Contact
|
<urn:uuid:c2d9891b-ccaa-4145-89ca-416231352205>
|
CC-MAIN-2016-26
|
http://www.daviddarling.info/encyclopedia/A/amine.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783403826.29/warc/CC-MAIN-20160624155003-00050-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.913599
| 235
| 3.703125
| 4
|
|Online Judge||Problem Set||Authors||Online Contests||User|
Ranking the Cows
Each of Farmer John's N cows (1 ≤ N ≤ 1,000) produces milk at a different positive rate, and FJ would like to order his cows according to these rates from the fastest milk producer to the slowest.
FJ has already compared the milk output rate for M (1 ≤ M ≤ 10,000) pairs of cows. He wants to make a list of C additional pairs of cows such that, if he now compares those C pairs, he will definitely be able to deduce the correct ordering of all N cows. Please help him determine the minimum value of C for which such a list is possible.
Line 1: Two space-separated integers: N and M
Lines 2..M+1: Two space-separated integers, respectively: X and Y. Both X and Y are in the range 1...N and describe a comparison where cow X was ranked higher than cow Y.
Line 1: A single integer that is the minimum value of C.
5 5 2 1 1 5 2 3 1 4 3 4
From the information in the 5 test results, Farmer John knows that since cow 2 > cow 1 > cow 5 and cow 2 > cow 3 > cow 4, cow 2 has the highest rank. However, he needs to know whether cow 1 > cow 3 to determine the cow with the second highest rank. Also, he will need one more question to determine the ordering between cow 4 and cow 5. After that, he will need to know if cow 5 > cow 3 if cow 1 has higher rank than cow 3. He will have to ask three questions in order to be sure he has the rankings: "Is cow 1 > cow 3? Is cow 4 > cow 5? Is cow 5 > cow 3?"
[Submit] [Go Back] [Status] [Discuss]
Home Page Go Back To top
All Rights Reserved 2003-2013 Ying Fuchen,Xu Pengcheng,Xie Di
Any problem, Please Contact Administrator
|
<urn:uuid:2f66cb42-f602-4a52-ac00-1d3ba5374228>
|
CC-MAIN-2016-26
|
http://poj.org/problem?id=3275
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397864.87/warc/CC-MAIN-20160624154957-00042-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.9185
| 433
| 2.984375
| 3
|
Huge Human Population Boom 40,000 to 50,000 Years Ago
Posted on March 14, 2013 Comments (1)
Interesting open access paper on looking at the Y-chromosome to explore our ancestry: A calibrated human Y-chromosomal phylogeny based on resequencing. I can’t understand all the details but the basic idea isn’t that complicated. It is interesting to see these details as are the conclusions that can be drawn: that we had a big explosion of human population o 41,000–52,000 years ago.
This population explosion occurred, between the first expansion of modern humans out of Africa 60,000 to 70,000 years ago and the Neolithic expansions of people in several parts of the world starting 10,000 years ago.
“We think this second, previously unknown population boom, may have occurred as humans adapted to their new environment after the first out-of-Africa expansion,” says Dr Qasim Ayub, lead author from the Wellcome Trust Sanger institute. “We think that when humans moved from the horn of Africa to Asia, Australia and eventually Europe, they remained in small groups by the coasts. It took them tens of thousands of years to adapt to the mountainous, forested surroundings on the inner continents. However, once their genetic makeup was suited to these new environments, the population increased extremely rapidly as the groups travelled inland and took advantage of the abundance of space and food.”
The work highlights how it is now possible to obtain new biological insights from existing DNA sequencing data sets, and the value of sharing data. The majority of the DNA information used for this study was obtained from freely-available online data-sets.
This is the first time researchers have used the information from large-scale DNA sequencing to create an accurate family tree of the Y chromosome, from which the inferences about human population history could be made.
|
<urn:uuid:34323c4e-abce-4cd0-b024-6db055ee2006>
|
CC-MAIN-2016-26
|
http://engineering.curiouscatblog.net/2013/03/14/huge-human-population-boom-40000-to-50000-years-ago/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397696.49/warc/CC-MAIN-20160624154957-00055-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.958604
| 395
| 3
| 3
|
1. How can I tell by looking at a Nutrition Facts Panel if a product has added sugars?
Current nutrition labels don't list the amount of added sugars (alone) in a product. The line for "sugars" you see on a nutrition label includes both added and naturally occurring sugars in the product. Naturally occurring sugars are found in milk (lactose) and fruit (fructose). Any product that contains milk (such as yogurt, milk, cream) or fruit (fresh, dried) contains some natural sugars.
But you can read the ingredient list on a processed food's label to tell if the product contains added sugars. Names for added sugars on labels include:
- Brown sugar
- Corn sweetener
- Corn syrup
- Sugar molecules ending in "ose" (dextrose, fructose, glucose, lactose, maltose, sucrose)
- High-fructose corn syrup
- Fruit juice concentrates
- Invert sugar
- Malt sugar
- Raw sugar
2. Are all foods labeled "Fat Free" food for me in terms of weight management?
No. Foods which are "fat-free" can still be very high in calories and low in nutrients, such as fat-free cookies, sweets, desserts, and other snack foods. Choose foods like vegetables, fruits, fish and other seafood, whole-grain products (like whole-grain breads, cereals, pasta and rice), nuts, beans, and fat-free or low-fat dairy products.
3. Why can't I see monounsaturated and polyunsaturated fat on many food labels?
Currently, food manufacturers aren't required to show the monounsaturated and polyunsaturated fat content in their products. If the food manufacturer chooses not to disclose it, you won't see it
4. I would like to get advice about my eating habits.
Registered Dietitians (RD) are the health professionals who are trained to provide counseling on nutrition and eating habits. An RD can provide personalized dietary advice taking into consideration your health status, lifestyle, and food likes and dislikes. The American Dietetic Association has a Find a Nutrition Professional service that allows you to locate an RD in your geographical area. Be advised that this list may not include all RDs in your area. You may access the ADA website here www.eatright.org
5. Which type of oil is best for cooking?
You should look for oils that are high in unsaturated fats (monounsaturated or polyunsaturated on nutrition labels) and low in saturated fat. The top two on this list are canola oil and olive oil. When it comes to olive oil, the difference between virgin, extra virgin, or light is more a matter of preference in terms of flavor. These variations do not change the nutrition facts
|
<urn:uuid:01e0daee-d613-41e4-9aa1-dca78f35268b>
|
CC-MAIN-2016-26
|
http://www.marsfood.com/for-your-health/faqs/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398628.62/warc/CC-MAIN-20160624154958-00164-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.920618
| 580
| 2.765625
| 3
|
- Gender Through Comics was a Massive Open Online Course (MOOC) taught in spring 2013. It looked at how to explore gender-related questions through comic books.
- Christina Blanch says that gender is about men and women just as much as comic books are for both sexes.
- She argues the sexualized media standards can be attributed to the 'male gaze', which is the tendency of pop art to adapt to the heterosexual man's point of view.
Editor's Note: Christina Blanch is a comics scholar. Cofounder of CAPE, she recently taught a new online course on Gender through Comic Books.
Gender issues are strewn throughout the comics industry and have been for decades, from the way this particular branch of pop culture portrays traditional male and female roles, to the treatment of costumed attendees ("cosplayers") at Comic Cons, to the disproportionately small number of women working in the comic book world.
The study of gender is as misunderstood as comic books are; while gender is thought of as a topic for women, comic books are thought of as a boy's club. Of course, neither characterization is accurate; gender is about men and women just as comic books are also for men and women of all ages.
Gender as shown in popular media is not reflective of "real" life. Think about American media, and the portrayal of women not just in comics but in magazines, films and other mediums. Esthetic standards have changed over the decades from the hourglass ideal to size zero models, from looking naturally physically fit to using medical treatments and/or Photoshop to modify bodies.
These media standards can be attributed to the male gaze. The "male gaze," as students of film know, is a term coined in the mid-1970s but timeless in meaning; the tendency of pop art to default to a heterosexual male point of view because, by and large, that's who makes it.
This unconscious "entitlement" where men are watchers and women are watched (and exploited) creates a sense of entitlement. One that is alienating and excludes anyone who is not a straight white male.
When people think of comic books, they generally think of its predominant genre, superheroes. And it should come as no surprise that many of the superhero comic books have major gender issues.
In superhero comics, both men and women are portrayed with near unattainable bodies; men are massively muscular while women can make lingerie models look bashful. When women comment negatively on how comics females are sexualized, the common reply from men is, "Hey, guys aren't realistically portrayed either, so what's the big deal?" The difference, of course, is that superhero men in comics look like body builders and athletes while most female superheroes today look more like porn stars.
The women athletes of today do not look how superheroes portray them. Why is this? Because the superhero industry caters to an audience of adolescent males.
Or, is the "male gaze" simply the unintentional norm in comic books? Are superheroines victims of the "male gaze"? Are feminine superheroes those who embody the traditional male-defined ideas of femininity or those that espouse the ideal of liberated, empowered women? Or are they simply women who dismiss all tropes of "femininity" and are simply themselves?
Think about Wonder Woman, one of the oldest and best-known female superheroes. She is seen as a feminist icon, featured on the cover of the first issue of Ms. Magazine. Yet she runs around in a bathing suit. And even though her clothes never change, depending on who draws her, she can look family-friendly on a toy you wouldn't hesitate to buy your daughter or like a pole dancer on the cover of a graphic novel.
Superman and Spider-Man don't suffer this. It's almost impossible to sexualize Superman, who in the current movie 'lost' his strong man underpants making him less sexualized, and in my opinion completely impossible to sexualize Spider-Man. In fact, Spider-Man is often drawn swinging through the air in flexible poses in a skintight costume and I have never once thought of him as sexualized.
There should be room for all kinds of bodies in comic books, not just the ones that are currently culturally celebrated. The problem of the notions of beauty extends far beyond comic books. The male gaze, intentional or not, is present in comic books.
Comic books can be powerful, and I argue that the way comics represent women affects the way people view women and how they view themselves. The only way to stop this is to talk about the issue, even if it is uncomfortable. In order for something to change, it has to be acknowledged. My 'Gender through Comic Books' class was one step in that direction.
As a comic book fan, for every powerful female superhero like Supergirl or Batgirl, there are so many more that are only eye candy for male readers. The real power of Wonder Woman and other female superheroes is that they rise above the pin-up girl quality to be inspirational to young women.
|
<urn:uuid:bc836d45-c9d4-4699-b493-3dc40fe3134f>
|
CC-MAIN-2016-26
|
http://edition.cnn.com/2013/06/13/showbiz/comic-book-heroes-oped-superheroines/index.html?hpt=hp_mid
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397873.63/warc/CC-MAIN-20160624154957-00013-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.965807
| 1,039
| 2.671875
| 3
|
Examining dangers of sun damage
The Skin Cancer Foundation reports 69 percent of early basal cell cancers are associated with tanning beds. The foundation also cautions a 75 percent increased risk if tanning beds are used before age 35.
Spring and summer are coming and now is the time to educate and prepare for the dangers of exposure to UV rays from natural or artificial tanning. UV radiation is only a small part of the sun’s rays but is harmful to humans. The Skin Cancer Foundation and The American Cancer Society agree, sun damage will age skin without skin cancer being present. David Nelson, a dermatologist in Hudson, said, “Sun protection is one of the easiest ways of preventing age related skin changes.” UV radiation from the sun is a proven carcinogen, doing damage to the skin. Carcinogens are substances capable of causing cancer. Any sun exposure gives off a dose of UV radiation according to Nelson.
The Skin Cancer Foundation, the American Cancer Society, and the National Institute of Health all agree on a few basic dangers of sun exposure:
- Sun damage is accumulative.
- Once you have exposure to UV rays the damage starts.
- It is important while you are young to protect your skin every day because damaged skin will become loose, saggy, and wrinkly as you age.
- Sun damage can occur from natural sun or UV rays at the tanning salon. Tanning beds, booths, and tanning lights of any kind, give off even stronger UV radiation than the sun itself.
The American Cancer Society reports basal cell skin cancer, the most common type of skin cancer, is treatable if caught early. All types of skin cancer from basal cell, squamous, melanoma and other varieties can be fatal without treatment. As many as 170,000 cases of non-melanoma cancers are attributed to tanning beds. Also, The Skin Cancer Foundation attributes 90 percent of visible signs of aging to UV rays from the sun or tanning beds.
Drew Reese, manager at Sunrise Tanning in River Falls, said he believes people could tan responsibly. He likens himself to a bartender. It is his duty to cut off service to those people that go overboard with tanning. Reese admits sun damage occurs to some degree anytime you tan. He recommends, “Moderation is the key for everything in life.” Reese went on to say tanning is good because it provides vitamin D, helps skin conditions, and combats depression.
Nelson disagrees. He stated the benefits of tanning are minimal and people can receive any health benefits in healthier ways. A Seasonal Affective Disorder narrow spectrum light can give enough Vitamin D to help alleviate depression without UV rays, and tanning does not significantly help skin conditions according to Nelson. Concerning the concept of tanning he said, “Goth looks good, I wish it was still popular.”
Gregory Goblirsch, a physician at River Falls clinic said in a prepared statement, “If you do not want to have old looking skin in your thirties and forties, protect your skin from the sun and avoid tanning beds now. Indoor tanning increases the risk of melanomas and other skin cancers and it is not protection for the adverse rays of the sun.”
In the FAQ section on the Indoor Tanning Association’s website the question of UV rays is addressed, “Since the mid-1980s, there has been considerable public health concern and attention focused on the risks of overexposure to ultraviolet light. The indoor tanning industry shares this concern. However, in the course of this public debate, we believe that the risks associated with UV light have been overstated and the benefits ignored.” The Indoor Tanning Association goes on to say the science will catch up and prove the physical and emotional benefits of moderate tanning.
The National Institute of Health released a 1995 study of 1,307 teens from 13 to 15 years old. This study found 40 to 70 percent of them had detectable skin damage. The American Cancer Society recommends: slip on a shirt, slop on some sunscreen, slap on a hat, and wrap on sunglasses to protect the eyes and delicate skin around them All sources agreed light skinned, fair people are at higher risk for sun damage and skin cancers. Other risk factors include family history, an abundance of moles and freckles, residing in a high altitude, autoimmune diseases, certain medications and organ transplant patients.
The Indoor Tanning Association states they do not agree with the current science about the serious nature of UV skin damage and will wait until there is more study. The medical community warns of the dangers and suggests anyone going outdoors should have a 15 to a 30 SPF, sun protection factor, with water proof broad spectrum protection, reapplied often. A common skin cancer saying in the medical community is: slip, slop, slap and wrap.
|
<urn:uuid:00c64c1e-9c37-43e9-99a3-c3d681ae65ea>
|
CC-MAIN-2016-26
|
http://uwrfvoice.com/news/11805
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395346.6/warc/CC-MAIN-20160624154955-00114-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.937296
| 1,013
| 3.171875
| 3
|
ORGANIZATIONAL CULTURE : ORGANIZATIONAL CULTURE Chapter 7
Lecture 4 CULTURE REVIEWED : CULTURE REVIEWED Organizations also have a learned, shared, interrelated set of symbols and patterns of basic assumptions
The culture help the organizations cope with problems it faces
CULTURE HELPS ORGANIZATIONS INTEGRATE INTERNALLY (PPS) AND ADAPT/SHAPE EXTERNALITIES (6 GLOBAL ENVIRONMENTS) TO SURVIVE: CULTURE HELPS ORGANIZATIONS INTEGRATE INTERNALLY (PPS) AND ADAPT/SHAPE EXTERNALITIES (6 GLOBAL ENVIRONMENTS) TO SURVIVE Culture permeates the organization
Through knowledge acquisition
Organizational rites , ORGANIZATIONAL KNOWLEDGE: ORGANIZATIONAL KNOWLEDGE Explicit—formalized and widely distributed
Implicit—norms or “how we do things around here” EXAMINE ORGANIZATIONAL SYMBOLS: EXAMINE ORGANIZATIONAL SYMBOLS What language is in use and where?
Who is pictured on annual reports, web pages, or brochures?
What colors represent the company; where are they used?
What logos are in use?
ORGANIZATIONAL STORIES TELL US: ORGANIZATIONAL STORIES TELL US what the employee is supposed to do when in doubt
what to do when a high-status person breaks the rules
how the little person advances within the organization ORGANIZATIONAL RITES REINFORM NORMS: ORGANIZATIONAL RITES REINFORM NORMS Rites of degradation dissolve a person’s organizational identity
Rites of enhancement recognize accomplishments or enhance power
Rites of renewal lubricate social relations
Rites of conflict reduction reduces conflict by partitioning it
Rites of integration revive common feeling NATIONS TRADITIONALLY SHAPE ORGANIZATIONS: NATIONS TRADITIONALLY SHAPE ORGANIZATIONS Business culture BUT INFLUENCES COME FROM MULTIPLE SOURCES: BUT INFLUENCES COME FROM MULTIPLE SOURCES Professional training/groups
Subgroups, e.g., R&D or accounting INCREASINGLY WE ALSO SEE: INCREASINGLY WE ALSO SEE business influences come not only from domestic influences but also from international and global business activities, e.g.,
joint ventures and other strategic alliances OFTEN CREATING CULTURE CLASH: OFTEN CREATING CULTURE CLASH between parent and subsidiary
among managers THUS IN A GLOBAL WORLD, BUSINESSES BECOME CULTURAL CONDUITS: THUS IN A GLOBAL WORLD, BUSINESSES BECOME CULTURAL CONDUITS See page 207 of Introduction to Globalization and Business by Barbara Parker BUSINESS INFLUENCES CULTURE THROUGH : BUSINESS INFLUENCES CULTURE THROUGH Global entertainment and electronic media
Global demographic groups
GLOBAL INFLUENCES OF BUSINESS ON CULTURE: GLOBAL INFLUENCES OF BUSINESS ON CULTURE Make global businesses more central to
And cause them to interact more with social actors such as NGOs and governments
|
<urn:uuid:0eb35691-1327-42be-a7c3-a0c5e4eaf73d>
|
CC-MAIN-2016-26
|
http://www.authorstream.com/Presentation/Ulisse-57418-Chapter-7-Lecture-4-Organizational-Culture-REVIEWED-HELPS-ORGANIZATIONS-INTEGRATE-lectu-Education-ppt-powerpoint/
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397428.37/warc/CC-MAIN-20160624154957-00012-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.736003
| 703
| 2.96875
| 3
|
The Nephite people loved their liberty and knew that without it they would not be able to worship as they pleased. They wanted to serve the Lord rather than a king or some other kind of ruler.
This did not please one ambitious man named Amalickiah. He wanted to be king. With the help of some wicked judges, he urged the people to rebel against the government of judges that had been established. So persuasive was he that many of the people followed him.
Amalickiah and his supporters went to the land of the Lamanites, where he persuaded the Lamanite king to go to war against the Nephites. Amalickiah connived first to become captain of the Lamanite armies; then he conspired to kill the Lamanite king and marry the queen, making himself king. Thus armed with the power he craved, he determined to destroy his former people, the Nephites.
One courageous Nephite leader, Teancum, stood up against Amalickiah. An officer in General Moroni’s army, Teancum had already defeated another Nephite dissenter named Morianton, who had tried to claim the land of Lehi from its inhabitants.
Now Teancum prepared to defend the Nephites’ freedom from Amalickiah. He fought Amalickiah’s forces in a battle that lasted an entire day. That night, while both armies rested, Teancum slipped into the Lamanite camp. Entering Amalickiah’s tent quietly so as to not disturb the sleeping guards, Teancum killed the Lamanite king. Without their leader, the Lamanites withdrew.
The fighting had not ended, however. Ammoron, the brother of Amalickiah, was named king of the Lamanites, and he vowed to continue the war.
Although Moroni had strengthened the defenses of the city of Mulek, the Lamanite armies captured it and increased the fortifications even more. Moroni enlisted Teancum’s help in recapturing the city. Because of the new fortifications, Teancum knew that they could never take the city by direct attack. His men would easily be killed by the Lamanites protected behind the city walls.
Leading his army back to Bountiful, Teancum waited for the arrival of Moroni with his soldiers. Together, Moroni, Teancum, and many of the Nephite chief captains conceived a plan to lure the Lamanites out of the city. Teancum would take a small part of his troops and march past the city toward the seashore, making sure that the Lamanites saw them. Then, when the Lamanites followed Teancum, Moroni and some of his men marched into the city and took possession of it. The remainder of Moroni’s men marched after the Lamanites.
Teancum’s men were joined by Lehi, another Nephite general, and his army. Together they faced their enemy, who then fled back toward the city, not knowing that it had been captured. Teancum and Lehi waited until the Lamanites were caught between their army and Moroni’s before they attacked. After much bloodshed, many Lamanites chose to lay down their weapons and surrender. The rest were either killed in battle or taken prisoner.
Despite this victory, the fighting between the Nephites and the Lamanites continued. Only scanty reinforcements and provisions were sent to Teancum, Lehi, and Moroni, because some Nephite dissenters had driven out Pahoran, the chief judge, and had made an alliance with Ammoron. Moroni took part of his army and went to help Pahoran. As soon as the dissenters were defeated, Moroni sent six thousand men and provisions to Lehi and Teancum. The Nephite armies routed the Lamanite armies until they were all trapped in the land of Moroni.
Teancum believed that if Ammoron were killed, the other Lamanites might give up the war, so after everyone was asleep, Teancum, using a long rope, climbed to the top of the city wall. After lowering himself inside the Lamanite camp, he searched until he found the king’s tent.
Teancum threw a javelin at Ammoron, striking him in the chest. But Ammoron did not die immediately; he cried out, arousing his guards, who pursued and killed Teancum before he could escape.
Moroni, Lehi, and their armies were very sad when they learned of Teancum’s death. He had risked his life many times in preserving the liberty of his country.
Knowing that the enemy would be easier to defeat without the leadership of their king, Moroni and Lehi decided to use the advantage Teancum had given them. They ordered their men to attack the Lamanites the next morning. So totally were the Lamanites defeated that they did not wage war again against the Nephites for many years.
Teancum lived and died bravely, defending his people and their liberty.
|
<urn:uuid:77b222df-19a4-4edd-8149-a6ff23c172fb>
|
CC-MAIN-2016-26
|
https://www.lds.org/friend/1988/05/scriptural-giants-teancum-fighter-for-freedom?lang=eng
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402516.86/warc/CC-MAIN-20160624155002-00194-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.988718
| 1,079
| 3.515625
| 4
|
The Columbus Zoo's little lion cubs are growing up fast and treat mom like a jungle gym. Now ready for their public debut, we strongly recommend you make the trip to watch them romp. African lion populations have decreased by a staggering 50% over the last two decades due to human encroachment. Earlier photos available here.
More pictures and info after the jump.
The three lion cubs born on September 22 are now ready for their public debut and will be provided access to the outdoor habitat daily weather permitting. What time they will go out each day and how long they will stay out will depend upon the weather and the animals. (Note: the Zoo is closed on Thanksgiving and Christmas Day.)
The three cubs have been named:
· Kitambi – Named by the animal care staff, he is the only male and the largest of the trio. His name means “pride” in Swahili and it was chosen to reflect his take charge personality. · Adia – Named by the high bidder at the Wine for Wildlife conservation fundraiser held at the Zoo in October, her name means “gift” in Swahili. · Mekita – Mekita’s name is derived from the first letters of the three daughters of this Zoo donor who also won the right to name the cub at Wine for Wildlife.
These cubs are the first for mother Asali and father Tomo and the first born at the Columbus Zoo in 24 years. The pairing of Asali and Tomo was recommended by the Association of Zoos and Aquariums’ Species Survival Plan (SSP) for African lions. The AZA, of which the Columbus Zoo is an accredited member, strives to maintain a sustainable population of lions in North America.
Currently there are 349 African lions in 98 institutions in North America. Of those 349 animals only 176 are “pedigreed” meaning lions with known ancestry. The Columbus Zoo lions are one of only 31 pairs of pedigreed lions recommended for breeding by the SSP to maintain genetic diversity.
Once common in Africa, lions recently became a global issue when scientific evidence revealed that lion populations had plummeted by a staggering 50% over the past two decades. Lions are threatened by human population growth and agricultural expansion–which leads to increasing levels of conflict between people and lions.
Through its Conservation Fund, the Columbus Zoo is supporting the work of Shivani Bhalla, a Kenyan Ph.D. student at the University of Oxford. Shivani and her team fit radio-collars on lions in northern Kenya to gather behavioral information critical to formulating a conservation plan. The goal is to encourage a more harmonious co-existence between wildlife and people by reducing the loss of livestock caused by lion attacks and reducing the number of lions killed in the conflicts.
|
<urn:uuid:3377175f-bea7-42cf-ac25-f7842c0cee62>
|
CC-MAIN-2016-26
|
http://www.zooborns.com/zooborns/2009/11/columbus-zoo-lion-cubs-are-a-pawful.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783394605.61/warc/CC-MAIN-20160624154954-00070-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.951936
| 573
| 2.765625
| 3
|
How to improve the availability of veterinary vaccines in Europe
EMA publishes workshop report on requirements for the authorisation of vaccines
The European Medicines Agency (EMA) has published today the outcome of a workshop which explored how to ensure the availability of veterinary vaccines in the European Union (EU).
The availability of a wide range of veterinary vaccines is critical for the protection of animal health. Veterinary vaccines may protect human health, too, in those cases where they are used to prevent outbreaks of diseases in animals that can be transmitted to man, especially in animals that are intended for human consumption. Vaccines can also reduce the need for antibiotics, helping to stem the risk of antimicrobial resistance.
The workshop was jointly organised by EMA and Heads of Medicines Agencies (HMA) on 25 March 2015 and brought together experts from national competent authorities, the veterinary/pharmaceutical industry, and EMA. The participants examined the reasons why more veterinary vaccines are not currently available and discussed if the level of requirements for the authorisation of veterinary vaccines in the current legal framework is well balanced or might in some cases discourage potential applicants.
The workshop concluded that several factors combine to make the EU market less attractive for the authorisation of vaccines than other regions which might lead to a lack of availability of certain vaccines. The reasons for reduced availability are complex and multifactorial and differ depending on the type of vaccine concerned, such as vaccines for companion animals, for livestock, for treating major diseases, for treating minor diseases, or for treating outbreaks of epizootics diseases such as Foot-and-Mouth disease or Bluetongue.
The workshop concluded with a series of recommendations intended to improve this situation whilst maintaining a high level of protection of animal and human health, and of the environment. These include:
- increase predictability of regulatory outcomes for applicants through early and/or enhanced engagement in the development of scientific and administrative guidelines for veterinary vaccines;
- identify and propose specific training for regulatory assessors to enhance consistency of assessment and share experience;
- examine the feasibility of preparing lists of diseases for which vaccines are not available, and are therefore required, together with clear expectations of what would be needed for their authorisation;
- examine the factors identified by the industry as constraining the availability of vaccines within the EU;
- take the opportunity of the ongoing revision of the guidelines on data requirements for products for minor use, minor species (MUMS) to explore the scope for further reduction of data requirements for this type of product;
- Use the outcome of the workshop to enrich the discussions on authorisation of vaccines in the European Council and Parliament on revision of the legislation governing veterinary medicines.
This meeting report and its recommendations will form the basis for a joint EMA/HMA action plan to improve the availability of veterinary vaccines in the EU, involving industry and other experts in its preparation and implementation.
How useful is this page?
Average rating:Based on 6 ratings
Add your rating:
- See all ratings
2 ratings0 ratings0 ratings2 ratings2 ratings
|
<urn:uuid:270c5a09-940b-4cc5-a18a-62e91f8a63ca>
|
CC-MAIN-2016-26
|
http://www.ema.europa.eu/ema/index.jsp?curl=pages/news_and_events/news/2015/07/news_detail_002364.jsp&mid=WC0b01ac058004d5c1
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396106.25/warc/CC-MAIN-20160624154956-00157-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.918769
| 621
| 2.734375
| 3
|
Black History Month
Posted in the Robbinsdale Forum
Saint Paul, MN
#1 Feb 11, 2013
Black History Month is again in full swing. Originally envisioned by the renowned historian Carter G. Woodson as Negro History Week, since 1976 the nation has been asked to take the month of February to recall and celebrate the unique contribution of African Americans aka Negroes aka Colored folks aka Black people to the American story. To truly appreciate the mistold and overlooked history and why it is so important that America focuses on it, one need look no further than Woodsons works. These include one of the most passionate arguments against white supremacy ever written, Carter G. Woodsons Appeal, written in 1921 and The Miseducation of the Negro (which should be required reading for every American, and which can be read in its entirety here), if for no other reason than his now 80-year old evaluation of the fundamental issues affecting the psyche of Black Americans and our collective relationship to this country's majority (in this author's opinion) remains true to this day:
When you control a man's thinking you do not have to worry about his actions. You do not have to tell him not to stand here or go yonder. He will find his 'proper place' and will stay in it. You do not need to send him to the back door. He will go without being told. In fact, if there is no back door, he will cut one for his special benefit. His education makes it necessary.
The 2013 theme for Black History Month is "At the Crossroads of Freedom and Equality: The Emancipation Proclamation and the March on Washington". This theme succinctly evokes the watchful hopefulness that many Black Americans feel this year, which is both celebrating the Jubilee (the 150th anniversary of the Proclamation) and the 50-Year Anniversary of the March for Jobs and Freedom. The watchful hopefulness that many of us had, in some measure, when President Barack Hussein Obama was elected, then inaugurated, as the nation's first Black President. As President Obama noted in his proclamation honoring this month:
We look back to the men and women who helped raise the pillars of democracy, even when the halls they built were not theirs to occupy. We trace generations of African Americans, free and slave, who risked everything to realize their God-given rights. We listen to the echoes of speeches and struggle that made our Nation stronger, and we hear again the thousands who sat in, stood up, and called out for equal treatment under the law. And we see yesterday's visionaries in tomorrow's leaders, reminding us that while we have yet to reach the mountaintop, we cannot stop climbing.
Saint Paul, MN
#2 Feb 12, 2013
The Crassuses of the world are few and far between, thank the lord.
#3 Feb 12, 2013
Give a man a fish and he will eat for a day.
Teach a man to fish and he will eat for a lifetime.
2013 Updated Revision:
Give a man a welfare check, a free cell phone with unlimited free minutes, free Internet, cash for his clunker, food stamps, section 8 housing, free contraceptives, Medicaid, ninety-nine weeks of unemployment, free medicine, and he will vote Democratic the rest of his life even after he's dead.
Add your comments below
|Fourth of July Fireworks in Minnesota||14 min||Phineas||14|
|Typical Minnesota Voter||20 min||Phineas||4|
|Pride Weekend Kick-Off Parties||2 hr||OK Barry||4|
|britain leaves EU, new world order stunned||4 hr||OK Barry||10|
|harrassed on purpose my whole life||21 hr||space ace||3|
|Obama's America||Fri||OK Barry||75|
|Wisconsin girl who drowned in Crystal identified (Aug '08)||Oct '15||Anonymous||8|
Find what you want!
Search Robbinsdale Forum Now
Copyright © 2016 Topix LLC
|
<urn:uuid:9d8f16d7-aa6f-48a4-9e02-e6492ec83cbd>
|
CC-MAIN-2016-26
|
http://www.topix.com/forum/city/robbinsdale-mn/TPLM0DROUE2O2Q5MR
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393518.22/warc/CC-MAIN-20160624154953-00156-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.940165
| 844
| 2.6875
| 3
|
Print out the word search puzzle about Sweden. Encourage the children to find and circle the words listed. I think word searches are a great way to expand and practice vocabulary words! Plus they're a fun way to reinforce a lesson about a new country.
- As you look for the hidden words, remember that they can be horizontal, vertical, or diagonal—frontward or backward.
- Close the template window after printing to return to this screen.
- Set page margins to zero if you have trouble fitting the template on one page (FILE, PAGE SETUP or FILE, PRINTER SETUP in most browsers).
|
<urn:uuid:5e9368ad-cbb6-452e-9ff9-4a4558704c36>
|
CC-MAIN-2016-26
|
http://www.dltk-kids.com/rc/wordsearch_sweden.htm
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395560.14/warc/CC-MAIN-20160624154955-00037-ip-10-164-35-72.ec2.internal.warc.gz
|
en
| 0.830516
| 126
| 3.5
| 4
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.