text
stringlengths
307
28.2k
__index_level_0__
int64
0
904
Dermatology is the a branch of medical science dealing with the skin, its structure, functions, and diseases. Dermatologists specialize in diagnosing and treating conditions related to the skin, hair, and nails, including concerns related to cosmetic issues, such as sun damage and aging, as well as skin cancer, and other medical skin conditions. Dermatologists who have additional interest and skill in performing surgical procedures are referred to as dermatologic surgeons or dermasurgeons. Specialty terms like "dermatologist" and "dermatologic surgeon" are often unregulated and may be used in some states by any doctor, regardless of their training and credentials. So, for instance, a doctor who has an active medical license and is board certified in Internal Medicine but who has not undergone any specialty training in dermatology may refer to him or herself as a dermatologist or dermasurgeon, despite the fact that their training and credentials may not reflect specialization in this area of medical practice. The skin is the largest organ of the human body, and as a result, dermatologists typically offer a wide variety of treatments for it. Whether you wish to correct wrinkles, crepey skin, or razor bumps, a board certified dermatologist or dermasurgeon may help you by offering a single treatment or any combination of the following: Cosmetic dermatology - Non-surgical procedures - Laser treatments - Chemical peel - Injectable fillers - Botox and Dysport - Lip augmentation - Non-surgical nose job - Non-surgical facelift - Acne treatment - Acne scar removal - Vein treatment - Scar removal - Skin tightening Cosmetic dermatology - Surgical procedures Most dermatologists and dermasurgeons also offer treatments for a variety of medical skin conditions, in addition to cosmetic treatments. Although most skin problems can create aesthetic concerns, the following conditions are usually considered medical issues, and treatment may be covered by insurance. Medical dermatology - Conditions treated - Skin cancer
52
While Blackboard is the dominant commercial learning management (LMS) for the creation and management of online courses, one of its main competitors is Moodle. Moodle is a free, open source LMS for creating and managing online courses that is currently in use from the classroom level to the university level. It can be used for completely online courses or to augment classroom instruction. While it has forums and wikis to create communities around courses, it can also be used with assignments and quizzes to teach in a more traditional format. How widespread is Moodle used in education? Currently, there are 51,900 registered and validated Moodle sites hosting some 2.7 million courses for 30 million users in 206 countries worldwide. It was designed to promote the use of a social constructivist model wherein “groups construct knowledge for one another, collaboratively creating a small culture of shared artifacts with shared meanings. When one is immersed within a culture like this, one is learning all the time about how to be a part of that culture, on many levels.” Moodle doesn’t have to be used with this pedagogical model, but its orientation is towards the community-based development structure (here, learning) of the Web. Connexions“Connexions is an environment for collaboratively developing, freely sharing, and rapidly publishing scholarly content on the Web.” It is not simply a Web site that hosts textbooks, articles, and courses. A non-profit run by “Most textbooks are a mass of information in linear format: one topic follows after another. However, our brains are not linear - we learn by making connections between new concepts and things we already know. Connexions mimics this by breaking down content into smaller chunks, called modules, that can be linked together and arranged in different ways. This lets students see the relationships both within and between topics and helps demonstrate that knowledge is naturally interconnected, not isolated into separate classes or books.” Connexions identifies itself as part of the open education movement and as inspired by the open source software movement. Their modules, be they a textbook, an article, or a course, are open education resources, which are “teaching and learning materials that are free to use and also re-use in new ways around the world.” Connexions sees itself as part of both a global and a grassroots community. Currently, 500,000+ unique visitors a month visit their Web site. MIT OpenCourseWare (OCW) MIT OCW is the result of MIT’s desire to use the Internet to pursue its mission of advancing knowledge and educating students. Announced in 2001 and launched in 2002, MIT OCW has now published 1,890 courses online for free use. OCW is a “Web-based publication of virtually all MIT course content. OCW is open and available to the world and is a permanent MIT activity.” These courses are educational resources and do not lead to course credit, certificates or degrees, nor do they involve contact with faculty. MIT OCW’s largest group of its one million monthly visits are self-learners though students and teachers are larger subgroups of what is a global audience. It is a major gift of knowledge to the open education movement from one of the world’s most prestigious academic institutions. There are many other open education resources to explore, for example, the Open Education Resources Commons or even iTunes U, You Tube, or TeacherTube. The commercial sector undoubtedly has much to offer education, but the open education movement will continue to bring its own change just as Linux and Firefox continue to do so today. What experience have you had with educational tools and resources on the Web? Contact us and share your experiences. Return to previous page No Comments for this article at this time.
337
You have been insulted, your ego is bruised, your pride is hurt, you have been shown powerless and diminished in some way, and now you are hurt and mad as hell! You have just been humiliated, it is unfair, and you don't like feeling foolish. Humiliation often results in violent retaliation and revenge. Remember, at the end of the day, the only opinion of yourself that matters is - Feeling disrespected. - A loss of stature or image. - An image change reflecting a decrease in what others believe about your - Induced shame - To reduce the pride or fail to recognize the dignity of another - An event perceived to cause loss of honor and induce - Feeling powerless. - Being unjustly forced into a degrading position. - Ridicule, scorn, contempt or other treatment at the hands of others. Root: from Latin humilis, low, lowly, from humus, ground. Literally, “reducing to dirt”. Synonyms include losing face, being made to feel like a fool, feeling foolish, hurt, disgraced, indignity, put-down, debased, dejected, denigrated, dishonored, disrespected, dis'ed, defamed, humbled, scorned, slighted, slurred, shamed, mortified, rejected, being laughed at. While humility is considered a strength, humiliation is hurtful; the distinction pivots on autonomy. Appreciation is the opposite of humiliation. Humiliation involves an event that demonstrates unequal power in a relationship where you are in the inferior position and unjustly diminished. Often the painful experience is vividly remembered for a long time. Your vindictive passions are aroused and a humiliated fury may result. There are three involved parties: 1) the perpetrator exercising power, 2) the victim who is shown powerless and therefore humiliated, and 3) the witness or observers to the event. Because of the powerlessness and lack of control that it exposes, humiliation may lead to anxiety. Humility is recognizing and accepting our own limitations based on an accurate and modest estimate of our importance and significance. The humble person recognizes he is one among the six billion interdependent people on this earth, earth is one planet circling the sun, and our sun is one of a billion stars in the presently known universe. Because of this broad and sound perspective on her significance, the truly humble person cannot be humiliated. Humility reduces our need for self-justification and allows us to admit to and learn from our mistakes. Our ego Humiliation and Shame Shame is private, humiliation is public. The essential distinction between humiliation and shame is this: you agree with shame and you disagree with humiliation. Humiliation is suffering an insult. If you judge the insult to be credible, then you feel shame. Others can insult and humiliate you, but you will only feel shame if your self-image is reduced; and that requires your own assessment and decision. A person who is insecure about their genuine stature is more prone to feeling shame as a result of an insult. This is because they give more credibility to what others think of them than to what they think of themselves. This can result in People believe they deserve their shame, they do not believe they deserve their humiliation. Humiliation is seen as unjust. Forms of Humiliation Humans have many ways to slight others and humiliate them. For example: - Overlooking someone, taking them for granted, ignoring them, giving them the silent treatment, treating them as invisible, or making them wait unnecessarily for you, - Rejecting someone, holding them distant, abandoned, or isolated, - Withholding acknowledgement, denying recognition, manipulating - Denying someone basic social amenities, needs, or human - Manipulating people or treating them like objects (it) or animals, rather than as a person (thou). - Treating people unfairly, - Domination, control, manipulation, abandonment, - Threats or abuse including: verbal (e.g. name calling), physical, psychological, or sexual, - Assault, attack, or injury - Reduction in rank, responsibility, role, title, positional power, or - Betrayal, or being cheated, lied to, defrauded, suckered, or duped, - Being laughed at, mocked, teased, ridiculed, given a dirty look, spit on, or made to look stupid or foolish. - Being the victim of a practical joke, prank, or confidence scheme. - False accusation or insinuation, - Public shame, disrespect, or being dis'ed, downgraded, defeated, or - Forced nakedness, - Rape or incest, - Seeing your love interest flirt with another, induced jealousy, violating your love interest, cuckolding, - Seeing your wife, girlfriend, sister, or daughter sexually violated, - Poverty, unemployment, bad investments, debt, bankruptcy, foreclosure, imprisonment, homelessness, punishment, - Denigration of a person's values, beliefs, heritage, race, gender, appearance, characteristics, or affiliations, - Dependency, especially on weaker people, - Losing a dominance contest. Being forced to submit. - Trespass such as violating privacy or other boundaries, - Violating, denying, or suppressing - Losing basic personal freedoms such a mobility, access, or autonomy; being controlled, dominated, intruded on, exploited, or manipulated, - Diminished competency resulting from being disabled, immobilized, tricked, weakened, trapped, mislead, thwarted goals, opposed, sabotage, or let down. - Diminished resources resulting from being defrauded, robbed, cheated, evicted, or being deprived of privileges, or rights, - Having safety or security reduced by intimidation or threat, - Dismissing, discounting, or silencing your story, - Being treated as an equal by a lower stature person. The Paradox of Humiliation An insult usually hurts, but it is important to resolve in your own mind, based on evidence, why the insult hurts. What loss does it represent to you? Decide if the insult: - is an unjustified attack that does not decrease your stature, diminish your self-image, nor tarnish your public image or reputation, or - is justified and has diminished your public image or reputation, or - is justified and has diminished or revised your self-image. Begin the analysis by deciding if the insult is based on information that accurately represents you. Then reflect and consider if your image accurately represents your stature. If you decide the insult is unjustified then you can simply ignore it (“don't take the bait”) or you can describe why it is unfair and ask your offender for an apology. If your public image exceeds your stature, then the insult may a justifiable retaliation for your arrogance and it may contain an important message you can learn from. If the insult is justified it may cause you to feel shame and then lead you to revise your better align it with your stature. The insult is never justified if it is an attempt to reduce your stature below the threshold of human Public Image, Self-Image, Stature, and Revenge For an insult to diminish your public image, the public has to believe it is true. For an insult to diminish your self-image or self-esteem, you have to believe it is true. An insult cannot diminish your stature because your self-image is not your self. An insult may cause you to reassess your self-image or self-esteem. Revenge is often sought as a remedy for humiliation; perhaps using the phrase “protecting honor” as justification. But revenge cannot be an effective remedy for humiliation, because it does nothing to increase your stature. Humiliation is more demeaning and hurtful than “taking offense” at something. “Taking offense” is cognitive; you have questioned, disagreed with, or attacked my beliefs and perhaps my values. We disagree, and I think you are wrong. Offense is intellectual; it is about what I think. “Humiliation” is visceral; you have attacked me, my being, my self, and made me feel foolish about who I am. The attack is personal and credible enough that you have caused me to doubt my own worth, and thereby induced my shame. Humiliation is existential; it is about who I am. Humiliation has been linked to academic failure, low self-esteem, social isolation, conflict, delinquency, abuse, discrimination, depression, learned helplessness, social disruption, torture, and even death. People in power use humiliation as a form of social control; it is a common tool of oppression. The fear of humiliation is also a powerful motivating force. Although shame and humiliation are human universals, the particular circumstances and events that cause humiliation can vary greatly from one culture to the next. An event that is benign in one culture may cause great offense, shame, and humiliation in another. For example: - Under Islamic law a woman who spends time alone with an unrelated man brings great shame to her family. Victims of humiliation may be able to achieve resolution through either of two paths. The first is to reappraise the humiliating experience in some way that acknowledges the victim's strength and ability to cope with a difficult situation. This approach increases self-confidence and diminishes the fear of humiliation. The second path is to leave the degrading environment and find a more appreciative - “The most dangerous men on earth are those who are afraid they are wimps.” ~ James Gilligan - “No one can make you feel inferior without your consent.” ~ - “The truly humble person cannot be humiliated.” ~ Donald Klein - “The fear of humiliation appears to be one of the most powerful motivators in individual and collective human behavior.” ~ Donald Klein - “Persistent humiliation robs you of the vantage of rebellion.” ~ M. - “Ridicule is man's most potent weapon.” ~ - “The difference between how a person treats the powerless versus the powerful is as good a measure of human character as I know.” ~ Robert I. - “When you dismiss my story you dismiss who I am; you diminish me.” ~ Leland R. Beaumont On Apology, by Aaron Lazare Somebodies and Nobodies: Overcoming the Abuse of Rank, by Robert W. Fuller Violence, by James The No Asshole Rule, by Robert I. Sutton Threatened Egotism to Violence and Aggression: The Dark Side of High Self-Esteem, Psychology Review, 1996, Vol. 103, No. 1, 5-33, by Roy F. Baumeister, Laura Smart, Joseph M. Boden Humiliation and Assistance: Telling the Truth About Power, Telling a New Story, by Linda M. Hartling, Wellesley College The Humiliation Dynamic, Donald C. Klein, Ph.D., The Union Institute Humiliation: Assessing the Specter of Derision, Degradation, and Debasement, Linda M. Hartling (1995) Doctoral dissertation. Cincinnati, OH: Union Institute Graduate School.
748
Author:Inam Abidi Amrohvi “The tyrant dies and his rule ends, the martyr dies and his rule begins.” — Soren Kierkegard The straight path or the right path is always the most difficult one to travel but one that rewards the most, and so we are told when young. This battle of good versus the evil is an age old phenomenon. Every religion has some story or the other to show us the ‘right’ path from the ‘wrong’ one.Hinduism celebrates the victory of Lord Krishna over the demon Narakasura (among other stories) as Diwali, Christians remember the crucification of Jesus Christ as a supreme sacrifice in the way of God, and so do Muslims observe Moharram (the month in which the tragedy of Karbala took place) to commemorate the supreme sacrifice of Imam Husain, the grandson of the Prophet [PBUH]. “Think not of those who are slain in Allah’s way as dead. Nay, they live, finding their sustenance in the presence of their Lord.”—Surah Aal-e-Imran (Chapter 3), Verse 169 The tragedy of Karbala took place some 49 years after the death of Prophet Mohammad [PBUH] in 61 Hijri (AD 680). The Events Leading Up To Karbala The Muslim Caliphate briefly came to Imam Hasan (elder grandson of the Prophet [PBUH]) after the martydom of Ali bin Abi Talib (son-in-law of the Prophet [PBUH] and the Fourth Caliph of Islam). Sensing a possible split in the Muslim empire Hasan entered into a peace treaty with Amir Mu’awiyah, the son of Abu Sufyan and father of Yazid. “Hasan agreed to relinquish all authority to Mu’awiyah in exchange for an agreement not to harm any of the supporters of Ali, and to govern by the book of God and the examples of the Prophet. This he would do by letter and by word, explaining to the congregation in the Kufa mosque that he had ceded his right to rule ‘for the best interest of the community and for the sake of sparing blood’. Mu’awiyah acknowledged that ‘the reign would belong to Hasan after him’ (though this would soon be quietly forgotten) and that to avoid all future strife the next Caliph was to be decided by a formal council.” —The Heirs of the Prophet Muhammad and the roots of the Sunni-Shia Schism, Barnaby Rogerson All the first four Caliphs had first been acclaimed by the people of Medina but this right and duty had now been brushed aside in favour of the courtiers at Damascus. The solemn pledge to hold a ’shura’ was broken. None of the previous Caliphs had thought to impose their own sons on the community, and had looked beyond the narrow loyalties of a family, towards their brother in faith. When Mu’awiyah died, Yazid was acclaimed as the Caliph. It marked the decisive emergence of dynastic monarchy triumphing over the religion of God. The moment Yazid came to power he started demanding the oath of allegiance (bay’ah) from everyone using unfair means. Paying allegiance was an old Arab practice which was carried out in important matters such as that of rulership and authority. Those who were ruled, and specially the well known among them, would give their hand in allegiance, agreement and obedience to their king or the one in authority and in this way would show their whole-hearted support for his actions without any opposition to him. The approach of Yazid was proof enough of the kind of Muslim he was. He showed complete disregard for the tenets of Islam. *Ibne Aseer (A renowned historian Allamah Ali bin Abil Karam more famous as Ibne Aseer Jazari) in his Tareekhe Kamil has this to say for Yazid, “Yazid was notorious and well known for his love of numerous musical instruments, passion for hunting and play with young boys, dogs, monkeys, etc. Every morning he rose still drunk. His monkeys and young boys wore gold caps. If a monkey died, he spent a considerable time in mourning it.” “Traditions inform us that Yazeed loved worldly vices, would drink, listen to music, kept the company of boys with no facial hair, played drums, kept dogs, making frogs, bears and monkeys fight. Every morning he used be intoxicated and use to bind monkey with the saddle of a horse and make the horse run.” —Al Bidayah Wal Nihayah, Ibn Kathir Yazid’s message was delivered to Imam Husain as well but he said a firm no. Acknowledging Yazid’s authority by the Prophet’s [PBUH] grandson at this point would have meant confirmation of his evil deeds and Caliphate. For Yazid, Husain’s seal of approval was the one most needed. *Abul Hasan Ali bin Husain Mas’oodi in his Muroojuz Zahab wa ma’adinul Jawahir reported, “Whoever accepted the slavery of Yazid by swearing fealty at his hands was spared, otherwise he was subjugated. Thus the meaning of allegiance to Yazid was not merely the acceptance of a new caliph, but it meant to sell one’s Religion and faith in slavery to a tyrant.” The Kufans urged Husain in Medina to ride north and lead them against the usurpation of the Islamic world by Yazid, and to reclaim his rightful place as the head of the Muslim nation. Husain, encouraged by the chief men of Medina, decided to respond and rode out of the oasis to assume the leadership of the true army of Islam. But not a soul left the garrison city to join him on the desert trail. The Kufans too would betray him! When Husain settled at a land devoid of water or vegetation named Karbala (‘Karb’ in Arabic means grief and ‘bala’ is for trials) he had just 72 loyal soldiers with him. Battle For Truth The battle of Karbala finds great similarity with the one at Badr – Islam’s first battle. It was the holy Prophet [PBUH] at Badr who fought with 313 die-hard supporters against a formidable army of some 1000 men. That day against all odds the small group won a decisive victory, and paved the way for a future Muslim empire. 56 years later it was his grandson with just 72 loyal men, who fought against an impossible opposition of several thousands to save Islam from the clutches of tyranny. Karbala was a battle of truth against falsehood, humanity against villainy, righteousness against evil, justice against corruption. The much loved grandson of the Prophet [PBUH] stood in the scorching heat of Karbala along with his companions, devoid of water but determined. His loved ones, including his six month old son, fell martyr one after the other. In spite of this he repeatedly invited the other party towards righteousness and forbade them from evil and immorality, but it all fell on deaf ears. When the time arrived for him to march ahead all alone, he did it in a fashion which was reminiscent of his illustrious father Ali. One of those who fought the battle of Karbala against him says, “I have never seen a person bereaved of his sons, menfolk and his companions more Lion-hearted than him. The foot soldiers were scattering to his right and left like goats when a wolf come upon them.” —–Ibne Aseer, Tareekh Kamil Husain fell in the desert of Karbala on that fateful Friday, the 10th of Moharram 61H. Worse was to follow. The bodies of the martyrs including the Imam were not only refused a proper burial but were trampled under the horses’ hooves and were left for the birds. The Kufan army looted the belongings of Husain. Imam’s family including his women-folk and tender children were humiliated and taken captives after burning down their camps. The women were paraded with uncovered heads. It wasn’t Islam! “If Hussain fought to quench his worldly desires, then I do not understand why his sisters, wives and children accompanied him. It stands to reason therefore that he sacrificed purely for Islam.” —Charles Dickens The severed heads of the martyrs including Husain were raised on spears. How Yazid played with Husain’s head and the emotions of Imam’s family is a well documented fact. Karbala to this day remains a heart-wrenching story of exemplary courage and bravery to uphold the real principles of Islam. “In a distant age and climate, the tragic scene of the death of Husain will awaken the sympathy of the coldest reader.”—Edward Gibbon Abdullah Yusuf Ali, the famous English translator of Qurán, has beautifully summed up the whole essence of this epic battle. There is of course the physical suffering in martyrdom, and all sorrow and suffering claim our sympathy, —- the dearest, purest, most outflowing sympathy that we can give. But there is a greater suffering than physical suffering. That is when a valiant soul seems to stand against the world; when the noblest motives are reviled and mocked; when truth seems to suffer an eclipse. It may even seem that the martyr has but to say a word of compliance, do a little deed of non-resistance; and much sorrow and suffering would be saved; and the insidious whisper comes: “Truth after all can never die.” That is perfectly true. Abstract truth can never die. It is independent of man’s cognition. But the whole battle is for man’s keeping hold of truth and righteousness. And that can only be done by the highest examples of man’s conduct – spiritual striving and suffering enduring firmness of faith and purpose, patience and courage where ordinary mortals would give in or be cowed down, the sacrifice of ordinary motives to supreme truth in scorn of consequence. The martyr bears witness, and the witness redeems what would otherwise be called failure. It so happened with Husain. For all were touched by the story of his martyrdom, and it gave the deathblow to the politics of Damascus and all it stood for. Lessons From Karbala Karbala stands for courage, self-sacrifice, integrity, honesty, vision, and bravery beyond words. It symbolises all that is pure and true. Karbala teaches us that real battles are always fought in the minds and not on ground. Yazid was powerful and yet he lost the battle for truth. “I learned from Hussain how to be wronged and be a winner.” —Mahatma Gandhi Also, being in the majority need not necessarily make you right. “The best lesson which we get from the tragedy of Karbala is that Hussain and his companions were the rigid believers of God. They illustrated that numerical superiority does not count when it comes to truth and falsehood. The victory of Hussain despite his minority marvels me! —Thomas Carlyle As the old adage goes, “Nothing lasts for ever.” Husain and his followers made sure that their martyrdom gave a fatal blow to Yazid’s oppressive rule. Karbala haunted Yazid till his eventual death two years later. “Imam Husayn uprooted despotism forever till the Day of Resurrection. He watered the dry garden of freedom with the surging wave of his blood, and indeed he awakened the sleeping Muslim nation. Husayn weltered in blood and dust for the sake of truth. Verily he, therefore, became the bed-rock (foundation) of the Muslim creed; la ilaha illa Allah (There is no god but Allah).”—Sir Muhammad Iqbal It also teaches us to be patient and stand up against any form of wrong treatment. We curse Yazid and his army for their inhuman treatment of people, yet the cruel treatment of captives by the so called jihadis meets little protest. Muslims must recognize and protest against the savagery of inhuman treatment at all times, no matter who does it and where it takes place. “If a man kills a believer intentionally, his recompense is Hell, to abide therein (For ever): And the wrath and the curse of Allah are upon him, and a dreadful penalty is prepared for him.”— Surah An-Nisa (Chapter 4), Verse 93 The best homage that we can pay to the great tragedy is to do some soul-searching. Do we have the right to be called the followers of the Prophet [PBUH]? Have we really understood the message of Imam Husain? Are the tears for Husain drawn merely by the scenes of mere butchery? Would we ever stand up to the false narrations of the events at Karbala by some maulanas to generate excessive grief? Was Karbala a political war or a struggle for true faith? Are we ready to shed aside our differences and respect each others’ view during our religious discourses during Moharram? And when we finally have all the answers then we would understand the real message of Karbala. “Shah ast Hussain, Badshah ast Hussain, Deen ast Hussain, Deen e Panah ast Hussain, Sar dad, na dad dast, dar dast-e-yazeed, Haqaa key binaey La ila ast Hussain” “It’s Hussain the Prince, it’s Hussain the king, He is Faith, and Faith’s Defender most daring, He preferred death to Yazid’s allegiance, With his blood, Islam has verily been living.” —Khwaja Moinuddin Chisti
719
Dating photos relies on a combination of: - internal evidence - clothing, subject matter, composition, props, etc - identification of people in it - what age were they when the photo was taken? how does this fit with known birth dates? - production processes - different materials (eg. type of photographic paper) and chemical processes resulted in characteristic types of photo. Standard sizes of commercial prints have changed over time. - photographer - photographer's marks and advertising can be used to identify the photographer, hence the period the business operated. Jayne Shrimpton and Maureen Taylor's books are good references, but they concentrate on the 1850-1950 period. The scanned image shows a black-and-white print. The informal outdoor setting suggests it was taken by an amatuer photographer. I think this print has been cut down from a larger original because prints usually had white borders on all sides. Commercially processed prints tended to come in standard sizes, which is derived from the size of the negative. Typically commercial processesing produced contact prints (exactly the same size as the negative) and enlargements of the whole negative, which maintain the aspect ratio of the negative. Unfortunately in this case, we do not know the size of the original print, so we can't deduce the size of the negative. As othe answers have suggested, the 1950s is strongly indicated. At that time, colour photography existed, but was not as widely popular and affordable as black-and-white.
724
|Met proto-oncogene (hepatocyte growth factor receptor)| Crystallographic structure of MET. PDB rendering based on 1r0p. |External IDs||ChEMBL: GeneCards:| |RNA expression pattern| c-Met (MET or MNNG HOS Transforming gene) is a proto-oncogene that encodes a protein known as hepatocyte growth factor receptor (HGFR). The hepatocyte growth factor receptor protein possesses tyrosine-kinase activity. The primary single chain precursor protein is post-translationally cleaved to produce the alpha and beta subunits, which are disulfide linked to form the mature receptor. MET is a membrane receptor that is essential for embryonic development and wound healing. Hepatocyte growth factor (HGF) is the only known ligand of the MET receptor. MET is normally expressed by cells of epithelial origin, while expression of HGF is restricted to cells of mesenchymal origin. Upon HGF stimulation, MET induces several biological responses that collectively give rise to a program known as invasive growth. Abnormal MET activation in cancer correlates with poor prognosis, where aberrantly active MET triggers tumor growth, formation of new blood vessels (angiogenesis) that supply the tumor with nutrients, and cancer spread to other organs (metastasis). MET is deregulated in many types of human malignancies, including cancers of kidney, liver, stomach, breast, and brain. Normally, only stem cells and progenitor cells express MET, which allows these cells to grow invasively in order to generate new tissues in an embryo or regenerate damaged tissues in an adult. However, cancer stem cells are thought to hijack the ability of normal stem cells to express MET, and thus become the cause of cancer persistence and spread to other sites in the body. MET proto-oncogene (GeneID: 4233) has a total length of 125,982 bp, and it is located in the 7q31 locus of chromosome 7. MET is transcribed into a 6,641 bp mature mRNA, which is then translated into a 1,390 amino-acid MET protein. MET is a receptor tyrosine kinase (RTK) that is produced as a single-chain precursor. The precursor is proteolytically cleaved at a furin site to yield a highly glycosylated extracellular α-subunit and a transmembrane β-subunit, which are linked together by a disulfide bridge. - Region of homology to semaphorins (Sema domain), which includes the full α-chain and the N-terminal part of the β-chain - Cysteine-rich MET-related sequence (MRS domain) - Glycine-proline-rich repeats (G-P repeats) - Four immunoglobulin-like structures (Ig domains), a typical protein-protein interaction region. A Juxtamembrane segment that contains: - a serine residue (Ser 985), which inhibits the receptor kinase activity upon phosphorylation - a tyrosine (Tyr 1003), which is responsible for MET polyubiquitination, endocytosis, and degradation upon interaction with the ubiquitin ligase CBL - Tyrosine kinase domain, which mediates MET biological activity. Following MET activation, transphosphorylation occurs on Tyr 1234 and Tyr 1235 - C-terminal region contains two crucial tyrosines (Tyr 1349 and Tyr 1356), which are inserted into the multisubstrate docking site, capable of recruiting downstream adapter proteins with Src homology-2 (SH2) domains. The two tyrosines of the docking site have been reported to be necessary and sufficient for the signal transduction both in vitro. MET signaling pathway MET activation by its ligand HGF induces MET kinase catalytic activity, which triggers transphosphorylation of the tyrosines Tyr 1234 and Tyr 1235. These two tyrosines engage various signal transducers, thus initiating a whole spectrum of biological activities driven by MET, collectively known as the invasive growth program. The transducers interact with the intracellular multisubstrate docking site of MET either directly, such as GRB2, SHC, SRC, and the p85 regulatory subunit of phosphatidylinositol-3 kinase (PI3K), or indirectly through the scaffolding protein Gab1 Tyr 1349 and Tyr 1356 of the multisubstrate docking site are both involved in the interaction with GAB1, SRC, and SHC, while only Tyr 1356 is involved in the recruitment of GRB2, phospholipase C γ (PLC-γ), p85, and SHP2. GAB1 is a key coordinator of the cellular responses to MET and binds the MET intracellular region with high avidity, but low affinity. Upon interaction with MET, GAB1 becomes phosphorylated on several tyrosine residues which, in turn, recruit a number of signalling effectors, including PI3K, SHP2, and PLC-γ. GAB1 phosphorylation by MET results in a sustained signal that mediates most of the downstream signaling pathways. Activation of signal transduction MET engagement activates multiple signal transduction pathways: - The RAS pathway mediates HGF-induced scattering and proliferation signals, which lead to branching morphogenesis. Of note, HGF, differently from most mitogens, induces sustained RAS activation, and thus prolonged MAPK activity. - The PI3K pathway is activated in two ways: PI3K can be either downstream of RAS, or it can be recruited directly through the multifunctional docking site. Activation of the PI3K pathway is currently associated with cell motility through remodeling of adhesion to the extracellular matrix as well as localized recruitment of transducers involved in cytoskeletal reorganization, such as RAC1 and PAK. PI3K activation also triggers a survival signal due to activation of the AKT pathway. - The STAT pathway, together with the sustained MAPK activation, is necessary for the HGF-induced branching morphogenesis. MET activates the STAT3 transcription factor directly, through an SH2 domain. - The beta-catenin pathway, a key component of the Wnt signaling pathway, translocates into the nucleus following MET activation and participates in transcriptional regulation of numerous genes. Role in development During embryonic development, transformation of the flat, two-layer germinal disc into a three-dimensional body depends on transition of some cells from an epithelial phenotype to spindle-shaped cells with motile behaviour, a mesenchymal phenotype. This process is referred to as epithelial-mesenchymal transition (EMT). Later in embryonic development, MET is crucial for gastrulation, angiogenesis, myoblast migration, bone remodeling, and nerve sprouting among others. MET is essential for embryogenesis, because MET -/- mice die in utero due to severe defects in placental development. Furthermore, MET is required for such critical processes as liver regeneration and wound healing during adulthood. Tissue distribution MET is normally expressed by epithelial cells. However, MET is also found on endothelial cells, neurons, hepatocytes, hematopoietic cells, and melanocytes. HGF expression is restricted to cells of mesenchymal origin. Transcriptional control MET transcription is activated by HGF and several growth factors. MET promoter has four putative binding sites for Ets, a family of transcription factors that control several invasive growth genes. ETS1 activates MET transcription in vitro. MET transcription is activated by hypoxia-inducible factor 1 (HIF1), which is activated by low concentration of intracellular oxygen. HIF1 can bind to one of the several hypoxia response elements (HREs) in the MET promoter. Hypoxia also activates transcription factor AP-1, which is involved in MET transcription. Role in cancer MET pathway plays an important role in the development of cancer through: - angiogenesis (sprouting of new blood vessels from pre-existing ones to supply a tumor with nutrients); - scatter (cells dissociation due to metalloprotease production), which often leads to metastasis. Coordinated down-regulation of both MET and its downstream effector extracellular signal-regulated kinase 2 (ERK2) by miR-199a* may be effective in inhibiting not only cell proliferation but also motility and invasive capabilities of tumor cells. Interaction with tumour suppressor genes PTEN (phosphatase and tensin homolog) is a tumor suppressor gene encoding a protein PTEN, which possesses lipid and protein phosphatase-dependent as well as phosphatase-independent activities. PTEN protein phosphatase is able to interfere with MET signaling by dephosphorylating either PIP3 generated by PI3K, or the p52 isoform of SHC. SHC dephosphorylation inhibits recruitment of the GRB2 adapter to activated MET. Cancer therapies targeting HGF/MET Since tumor invasion and metastasis are the main cause of death in cancer patients, interfering with MET signaling appears to be a promising therapeutic approach. A comprehensive list of HGF and MET targeted experimental therapeutics for oncology now in human clinical trials can be found here. MET kinase inhibitors Kinase inhibitors are low molecular weight molecules that prevent ATP binding to MET, thus inhibiting receptor transphosphorylation and recruitment of the downstream effectors. The limitations of kinase inhibitors include the facts that they only inhibit kinase-dependent MET activation, and that none of them is fully specific for MET. - K252a (Fermentek Biotechnology) is a staurosporine analogue isolated from Nocardiopsis sp. soil fungi, and it is a potent inhibitor of all receptor tyrosine kinases (RTKs). At nanomolar concentrations, K252a inhibits both the wild type and the mutant (M1268T) MET function. - SU11274 (SUGEN) specifically inhibits MET kinase activity and its subsequent signaling. SU11274 is also an effective inhibitor of the M1268T and H1112Y MET mutants, but not the L1213V and Y1248H mutants. SU11274 has been demonstrated to inhibit HGF-induced motility and invasion of epithelial and carcinoma cells. - PHA-665752 (Pfizer) specifically inhibits MET kinase activity, and it has been demonstrated to represses both HGF-dependent and constitutive MET phosphorylation. Furthermore, some tumors harboring MET amplifications are highly sensitive to treatment with PHA-665752. - ARQ197 (ArQule) is a promising selective inhibitor of MET, which entered a phase 2 clinical trial in 2008. - Foretinib (XL880, Exelixis) targets multiple receptor tyrosine kinases (RTKs) with growth-promoting and angiogenic properties. The primary targets of foretinib are MET, VEGFR2, and KDR. Foretinib has completed a phase 2 clinical trials with indications for papillary renal cell carcinoma, gastric cancer, and head and neck cancer. - SGX523 (SGX Pharmaceuticals) specifically inhibits MET at low nanomolar concentrations. - MP470 (SuperGen) is a novel inhibitor of c-KIT, MET, PDGFR, Flt3, and AXL. Phase I clinical trial of MP470 had been announced in 2007. HGF inhibitors Since HGF is the only known ligand of MET, formation of a HGF:MET complex blocks MET biological activity. For this purpose, truncated HGF, anti-HGF neutralizing antibodies, and an uncleavable form of HGF have been utilized so far. The major limitation of HGF inhibitors is that they block only HGF-dependent MET activation. - NK4 competes with HGF as it binds MET without inducing receptor activation, thus behaving as a full antagonist. NK4 is a molecule bearing the N-terminal hairpin and the four kringle domains of HGF. Moreover, NK4 is structurally similar to angiostatins, which is why it possesses anti-angiogenic activity. - Neutralizing anti-HGF antibodies were initially tested in combination, and it was shown that at least three antibodies, acting on different HGF epitopes, are necessary to prevent MET tyrosine kinase activation. More recently, it has been demonstrated that fully human monoclonal antibodies can individually bind and neutralize human HGF, leading to regression of tumors in mouse models. Two anti-HGF antibodies are currently available: the humanized AV299 (AVEO), and the fully human AMG102 (Amgen). - Uncleavable HGF is an engineered form of pro-HGF carrying a single amino-acid substitution, which prevents the maturation of the molecule. Uncleavable HGF is capable of blocking MET-induced biological responses by binding MET with high affinity and displacing mature HGF. Moreover, uncleavable HGF competes with the wild-type endogenous pro-HGF for the catalytic domain of proteases that cleave HGF precursors. Local and systemic expression of uncleavable HGF inhibits tumor growth and, more importantly, prevents metastasis. Decoy MET Decoy MET refers to a soluble truncated MET receptor. Decoys are able to inhibit MET activation mediated by both HGF-dependent and independent mechanisms, as decoys prevent both the ligand binding and the MET receptor homodimerization. CGEN241 (Compugen) is a decoy MET that is highly efficient in inhibiting tumor growth and preventing metastasis in animal models. Immunotherapy targeting MET Drugs used for immunotherapy can act either passively by enhancing the immunologic response to MET-expressing tumor cells, or actively by stimulating immune cells and altering differentiation/growth of tumor cells. Passive immunotherapy Administering monoclonal antibodies (mAbs) is a form of passive immunotherapy. MAbs facilitate destruction of tumor cells by complement-dependent cytotoxicity (CDC) and cell-mediated cytotoxicity (ADCC). In CDC, mAbs bind to specific antigen, leading to activation of the complement cascade, which in turn leads to formation of pores in tumor cells. In ADCC, the Fab domain of a mAb binds to a tumor antigen, and Fc domain binds to Fc receptors present on effector cells (phagocytes and NK cells), thus forming a bridge between an effector and a target cells. This induces the effector cell activation, leading to phagocytosis of the tumor cell by neutrophils and macrophages. Furthermore, NK cells release cytotoxic molecules, which lyse tumor cells. - DN30 is monoclonal anti-MET antibody that recognizes the extracellular portion of MET. DN30 induces both shedding of the MET ectodomain as well as cleavage of the intracellular domain, which is successively degraded by proteasome machinery. As a consequence, on one side MET is inactivated, and on the other side the shed portion of extracellular MET hampers activation of other MET receptors, acting as a decoy. DN30 inhibits tumour growth and prevents metastasis in animal models. - OA-5D5 is one-armed monoclonal anti-MET antibody that was demonstrated to inhibit orthotopic pancreatic and glioblastoma tumor growth and to improve survival in tumor xenograft models. OA-5D5 is produced as a recombinant protein in Escherichia coli. It is composed of murine variable domains for the heavy and light chains with human IgG1 constant domains. The antibody blocks HGF binding to MET in a competitive fashion. Active immunotherapy Active immunotherapy to MET-expressing tumors can be achieved by administering cytokines, such as interferons (IFNs) and interleukins (IL-2), which triggers non-specific stimulation of numerous immune cells. IFNs have been tested as therapies for many types of cancers and have demonstrated therapeutic benefits. IL-2 has been approved by the U.S. Food and Drug Administration (FDA) for the treatment of renal cell carcinoma and metastatic melanoma, which often have deregulated MET activity. See also - Bottaro DP, Rubin JS, Faletto DL, Chan AM, Kmiecik TE, Vande Woude GF, Aaronson SA (February 1991). "Identification of the hepatocyte growth factor receptor as the met proto-oncogene product". Science 251 (4995): 802–4. doi:10.1126/science.1846706. PMID 1846706. - Galland F, Stefanova M, Lafage M, Birnbaum D (1992). "Localization of the 5' end of the MCF2 oncogene to human chromosome 15q15----q23". Cytogenet. Cell Genet. 60 (2): 114–6. doi:10.1159/000133316. PMID 1611909. - Cooper CS (January 1992). "The met oncogene: from detection by transfection to transmembrane receptor for hepatocyte growth factor". Oncogene 7 (1): 3–7. PMID 1531516. - "Entrez Gene: MET met proto-oncogene (hepatocyte growth factor receptor)". - Gentile A, Trusolino L, Comoglio PM (March 2008). "The Met tyrosine kinase receptor in development and cancer". Cancer Metastasis Rev. 27 (1): 85–94. doi:10.1007/s10555-007-9107-6. PMID 18175071. - Birchmeier C, Birchmeier W, Gherardi E, Vande Woude GF (December 2003). "Met, metastasis, motility and more". Nat. Rev. Mol. Cell Biol. 4 (12): 915–25. doi:10.1038/nrm1261. PMID 14685170. - Gandino L, Longati P, Medico E, Prat M, Comoglio PM (January 1994). "Phosphorylation of serine 985 negatively regulates the hepatocyte growth factor receptor kinase". J. Biol. Chem. 269 (3): 1815–20. PMID 8294430. - Peschard P, Fournier TM, Lamorte L, Naujokas MA, Band H, Langdon WY, Park M (November 2001). "Mutation of the c-Cbl TKB domain binding site on the Met receptor tyrosine kinase converts it into a transforming protein". Mol. Cell 8 (5): 995–1004. doi:10.1016/S1097-2765(01)00378-1. PMID 11741535. - Ponzetto C, Bardelli A, Zhen Z, Maina F, dalla Zonca P, Giordano S, Graziani A, Panayotou G, Comoglio PM (April 1994). "A multifunctional docking site mediates signaling and transformation by the hepatocyte growth factor/scatter factor receptor family". Cell 77 (2): 261–71. doi:10.1016/0092-8674(94)90318-2. PMID 7513258. - Maina F, Casagranda F, Audero E, Simeone A, Comoglio PM, Klein R, Ponzetto C (November 1996). "Uncoupling of Grb2 from the Met receptor in vivo reveals complex roles in muscle development". Cell 87 (3): 531–42. doi:10.1016/S0092-8674(00)81372-0. PMID 8898205. - Abounader R, Reznik T, Colantuoni C, Martinez-Murillo F, Rosen EM, Laterra J (December 2004). "Regulation of c-Met-dependent gene expression by PTEN". Oncogene 23 (57): 9173–82. doi:10.1038/sj.onc.1208146. PMID 15516982. - Pelicci G, Giordano S, Zhen Z, Salcini AE, Lanfrancone L, Bardelli A, Panayotou G, Waterfield MD, Ponzetto C, Pelicci PG (April 1995). "The motogenic and mitogenic responses to HGF are amplified by the Shc adaptor protein". Oncogene 10 (8): 1631–8. PMID 7731718. - Weidner KM, Di Cesare S, Sachs M, Brinkmann V, Behrens J, Birchmeier W (November 1996). "Interaction between Gab1 and the c-Met receptor tyrosine kinase is responsible for epithelial morphogenesis". Nature 384 (6605): 173–6. doi:10.1038/384173a0. PMID 8906793. - Furge KA, Zhang YW, Vande Woude GF (November 2000). "Met receptor tyrosine kinase: enhanced signaling through adapter proteins". Oncogene 19 (49): 5582–9. doi:10.1038/sj.onc.1203859. PMID 11114738. - Gual P, Giordano S, Anguissola S, Parker PJ, Comoglio PM (January 2001). "Gab1 phosphorylation: a novel mechanism for negative regulation of HGF receptor signaling". Oncogene 20 (2): 156–66. doi:10.1038/sj.onc.1204047. PMID 11313945. - Gual P, Giordano S, Williams TA, Rocchi S, Van Obberghen E, Comoglio PM (March 2000). "Sustained recruitment of phospholipase C-gamma to Gab1 is required for HGF-induced branching tubulogenesis". Oncogene 19 (12): 1509–18. doi:10.1038/sj.onc.1203514. PMID 10734310. - O'Brien LE, Tang K, Kats ES, Schutz-Geschwender A, Lipschutz JH, Mostov KE (July 2004). "ERK and MMPs sequentially regulate distinct stages of epithelial tubule development". Dev. Cell 7 (1): 21–32. doi:10.1016/j.devcel.2004.06.001. PMID 15239951. - Marshall CJ (January 1995). "Specificity of receptor tyrosine kinase signaling: transient versus sustained extracellular signal-regulated kinase activation". Cell 80 (2): 179–85. doi:10.1016/0092-8674(95)90401-8. PMID 7834738. - Graziani A, Gramaglia D, Cantley LC, Comoglio PM (November 1991). "The tyrosine-phosphorylated hepatocyte growth factor/scatter factor receptor associates with phosphatidylinositol 3-kinase". J. Biol. Chem. 266 (33): 22087–90. PMID 1718989. - Boccaccio C, Andò M, Tamagnone L, Bardelli A, Michieli P, Battistini C, Comoglio PM (January 1998). "Induction of epithelial tubules by growth factor HGF depends on the STAT pathway". Nature 391 (6664): 285–8. doi:10.1038/34657. PMID 9440692. - Monga SP, Mars WM, Pediaditakis P, Bell A, Mulé K, Bowen WC, Wang X, Zarnegar R, Michalopoulos GK (April 2002). "Hepatocyte growth factor induces Wnt-independent nuclear translocation of beta-catenin after Met-beta-catenin dissociation in hepatocytes". Cancer Res 7 (62): 2064–71. ISSN 0008-5472. PMID 11929826. - Gude NA, Emmanuel G, Wu W, Cottage CT, Fischer K, Quijada P, Muraski JA, Alvarez R, Rubio M, Schaefer E, Sussman MA (May 2008). "Activation of Notch-mediated protective signaling in the myocardium". Circ. Res. 102 (9): 1025–35. doi:10.1161/CIRCRESAHA.107.164749. PMID 18369158. - "he fields of HGF/c-Met involvement". HealthValue. Retrieved 2009-06-13. - Boccaccio C, Comoglio PM (August 2006). "Invasive growth: a MET-driven genetic programme for cancer and stem cells". Nat. Rev. Cancer 6 (8): 637–45. doi:10.1038/nrc1912. PMID 16862193. - Birchmeier C, Gherardi E (October 1998). "Developmental roles of HGF/SF and its receptor, the c-Met tyrosine kinase". Trends Cell Biol. 8 (10): 404–10. doi:10.1016/S0962-8924(98)01359-2. PMID 9789329. - Uehara Y, Minowa O, Mori C, Shiota K, Kuno J, Noda T, Kitamura N (February 1995). "Placental defect and embryonic lethality in mice lacking hepatocyte growth factor/scatter factor". Nature 373 (6516): 702–5. doi:10.1038/373702a0. PMID 7854453. - Shirasaki F, Makhluf HA, LeRoy C, Watson DK, Trojanowska M (December 1999). "Ets transcription factors cooperate with Sp1 to activate the human tenascin-C promoter". Oncogene 18 (54): 7755–64. doi:10.1038/sj.onc.1203360. PMID 10618716. - Gambarotta G, Boccaccio C, Giordano S, Andŏ M, Stella MC, Comoglio PM (November 1996). "Ets up-regulates MET transcription". Oncogene 13 (9): 1911–7. PMID 8934537. - Pennacchietti S, Michieli P, Galluzzo M, Mazzone M, Giordano S, Comoglio PM (April 2003). "Hypoxia promotes invasive growth by transcriptional activation of the met protooncogene". Cancer Cell 3 (4): 347–61. doi:10.1016/S1535-6108(03)00085-0. PMID 12726861. - "HGF/c-Met and cancer". HealthValue. Retrieved 2009-06-13. - Kim S, Lee UJ, Kim MN, et al. (June 2008). "MicroRNA miR-199a* regulates the MET proto-oncogene and the downstream extracellular signal-regulated kinase 2 (ERK2)". J. Biol. Chem. 283 (26): 18158–66. doi:10.1074/jbc.M800186200. PMID 18456660. - Maehama T, Dixon JE (May 1998). "The tumor suppressor, PTEN/MMAC1, dephosphorylates the lipid second messenger, phosphatidylinositol 3,4,5-trisphosphate". J. Biol. Chem. 273 (22): 13375–8. doi:10.1074/jbc.273.22.13375. PMID 9593664. - Morris MR, Gentle D, Abdulrahman M, Maina EN, Gupta K, Banks RE, Wiesener MS, Kishida T, Yao M, Teh B, Latif F, Maher ER (June 2005). "Tumor suppressor activity and epigenetic inactivation of hepatocyte growth factor activator inhibitor type 2/SPINT2 in papillary and clear cell renal cell carcinoma". Cancer Res. 65 (11): 4598–606. doi:10.1158/0008-5472.CAN-04-3371. PMID 15930277. - Morotti A, Mila S, Accornero P, Tagliabue E, Ponzetto C (July 2002). "K252a inhibits the oncogenic properties of Met, the HGF receptor". Oncogene 21 (32): 4885–93. doi:10.1038/sj.onc.1205622. PMID 12118367. - Berthou S, Aebersold DM, Schmidt LS, Stroka D, Heigl C, Streit B, Stalder D, Gruber G, Liang C, Howlett AR, Candinas D, Greiner RH, Lipson KE, Zimmer Y (July 2004). "The Met kinase inhibitor SU11274 exhibits a selective inhibition pattern toward different receptor mutated variants". Oncogene 23 (31): 5387–93. doi:10.1038/sj.onc.1207691. PMID 15064724. - Wang X, Le P, Liang C, Chan J, Kiewlich D, Miller T, Harris D, Sun L, Rice A, Vasile S, Blake RA, Howlett AR, Patel N, McMahon G, Lipson KE (November 2003). "Potent and selective inhibitors of the Met [hepatocyte growth factor/scatter factor (HGF/SF) receptor] tyrosine kinase block HGF/SF-induced tumor cell growth and invasion". Mol. Cancer Ther. 2 (11): 1085–92. PMID 14617781. - Christensen JG, Schreck R, Burrows J, Kuruganti P, Chan E, Le P, Chen J, Wang X, Ruslim L, Blake R, Lipson KE, Ramphal J, Do S, Cui JJ, Cherrington JM, Mendel DB (November 2003). "A selective small molecule inhibitor of c-Met kinase inhibits c-Met-dependent phenotypes in vitro and exhibits cytoreductive antitumor activity in vivo". Cancer Res. 63 (21): 7345–55. PMID 14612533. - Smolen GA, Sordella R, Muir B, Mohapatra G, Barmettler A, Archibald H, Kim WJ, Okimoto RA, Bell DW, Sgroi DC, Christensen JG, Settleman J, Haber DA (February 2006). "Amplification of MET may identify a subset of cancers with extreme sensitivity to the selective tyrosine kinase inhibitor PHA-665752". Proc. Natl. Acad. Sci. U.S.A. 103 (7): 2316–21. doi:10.1073/pnas.0508776103. PMC 1413705. PMID 16461907. - Matsumoto K, Nakamura T (April 2003). "NK4 (HGF-antagonist/angiogenesis inhibitor) in cancer biology and therapeutics". Cancer Sci. 94 (4): 321–7. doi:10.1111/j.1349-7006.2003.tb01440.x. PMID 12824898. - Cao B, Su Y, Oskarsson M, Zhao P, Kort EJ, Fisher RJ, Wang LM, Vande Woude GF (June 2001). "Neutralizing monoclonal antibodies to hepatocyte growth factor/scatter factor (HGF/SF) display antitumor activity in animal models". Proc. Natl. Acad. Sci. U.S.A. 98 (13): 7443–8. doi:10.1073/pnas.131200498. PMC 34688. PMID 11416216. - Burgess T, Coxon A, Meyer S, Sun J, Rex K, Tsuruda T, Chen Q, Ho SY, Li L, Kaufman S, McDorman K, Cattley RC, Sun J, Elliott G, Zhang K, Feng X, Jia XC, Green L, Radinsky R, Kendall R (February 2006). "Fully human monoclonal antibodies to hepatocyte growth factor with therapeutic potential against hepatocyte growth factor/c-Met-dependent human tumors". Cancer Res. 66 (3): 1721–9. doi:10.1158/0008-5472.CAN-05-3329. PMID 16452232. - Mazzone M, Basilico C, Cavassa S, Pennacchietti S, Risio M, Naldini L, Comoglio PM, Michieli P (November 2004). "An uncleavable form of pro–scatter factor suppresses tumor growth and dissemination in mice". J. Clin. Invest. 114 (10): 1418–32. doi:10.1172/JCI22235. PMC 525743. PMID 15545993. - Michieli P, Mazzone M, Basilico C, Cavassa S, Sottile A, Naldini L, Comoglio PM (July 2004). "Targeting the tumor and its microenvironment by a dual-function decoy Met receptor". Cancer Cell 6 (1): 61–73. doi:10.1016/j.ccr.2004.05.032. PMID 15261142. - Reang P, Gupta M, Kohli K (2006). "Biological Response Modifiers in Cancer". MedGenMed 8 (4): 33. PMC 1868326. PMID 17415315. - Petrelli A, Circosta P, Granziero L, Mazzone M, Pisacane A, Fenoglio S, Comoglio PM, Giordano S (March 2006). "Ab-induced ectodomain shedding mediates hepatocyte growth factor receptor down-regulation and hampers biological activity". Proc. Natl. Acad. Sci. U.S.A. 103 (13): 5090–5. doi:10.1073/pnas.0508156103. PMC 1458799. PMID 16547140. - Jin H, Yang R, Zheng Z, Romero M, Ross J, Bou-Reslan H, Carano RA, Kasman I, Mai E, Young J, Zha J, Zhang Z, Ross S, Schwall R, Colbern G, Merchant M (June 2008). "MetMAb, the one-armed 5D5 anti-c-Met antibody, inhibits orthotopic pancreatic tumor growth and improves survival". Cancer Res. 68 (11): 4360–8. doi:10.1158/0008-5472.CAN-07-5960. PMID 18519697. - Martens T, Schmidt NO, Eckerich C, Fillbrandt R, Merchant M, Schwall R, Westphal M, Lamszus K (October 2006). "A novel one-armed anti-c-Met antibody inhibits glioblastoma growth in vivo". Clin. Cancer Res. 12 (20 Pt 1): 6144–52. doi:10.1158/1078-0432.CCR-05-1418. PMID 17062691. - Comoglio, P M (1993). "Structure, biosynthesis and biochemical properties of the HGF receptor in normal and malignant cells". EXS (SWITZERLAND) 65: 131–65. ISSN 1023-294X. PMID 8380735. - Naldini, L; Weidner K M, Vigna E, Gaudino G, Bardelli A, Ponzetto C, Narsimhan R P, Hartmann G, Zarnegar R, Michalopoulos G K (Oct. 1991). "Scatter factor and hepatocyte growth factor are indistinguishable ligands for the MET receptor". EMBO J. (ENGLAND) 10 (10): 2867–78. ISSN 0261-4189. PMC 452997. PMID 1655405. - Petrelli, Annalisa; Gilestro Giorgio F, Lanzardo Stefania, Comoglio Paolo M, Migone Nicola, Giordano Silvia (Mar. 2002). "The endophilin-CIN85-Cbl complex mediates ligand-dependent downregulation of c-Met". Nature (England) 416 (6877): 187–90. doi:10.1038/416187a. ISSN 0028-0836. PMID 11894096. - Ng, Cherlyn; Jackson Rebecca A, Buschdorf Jan P, Sun Qingxiang, Guy Graeme R, Sivaraman J (Mar. 2008). "Structural basis for a novel intrapeptidyl H-bond and reverse binding of c-Cbl-TKB domain substrates". EMBO J. (England) 27 (5): 804–16. doi:10.1038/emboj.2008.18. PMC 2265755. PMID 18273061. - Grisendi, S; Chambraud B, Gout I, Comoglio P M, Crepaldi T (Dec. 2001). "Ligand-regulated binding of FAP68 to the hepatocyte growth factor receptor". J. Biol. Chem. (United States)
295
Identifying time lags in the restoration of grassland butterfly communities: a multi-site assessment Woodcock, B.A.; Bullock, J.M.; Mortimer, S.R.; Brereton, T.; Redhead, J.W.; Thomas, J.A.; Pywell, R.F.. 2012 Identifying time lags in the restoration of grassland butterfly communities: a multi-site assessment. Biological Conservation, 155. 50-58. 10.1016/j.biocon.2012.05.013Full text not available from this repository. Although grasslands are crucial habitats for European butterflies, large-scale declines in quality and area have devastated many species. Grasslandrestoration can contribute to the recovery of butterfly populations, although there is a paucity of information on the long-term effects of management. Using eight UK data sets (9–21 years), we investigate changes in restoration success for (1) arable reversion sites, were grassland was established on bare ground using seed mixtures, and (2) grassland enhancement sites, where degraded grasslands are restored by scrub removal followed by the re-instigation of cutting/grazing. We also assessed the importance of individual butterfly traits and ecological characteristics in determining colonisation times. Consistent increases in restoration success over time were seen for arable reversion sites, with the most rapid rates of increase in restoration success seen over the first 10 years. For grasslands enhancement there were no consistent increases in restoration success over time. Butterfly colonisation times were fastest for species with widespread host plants or where host plants established well during restoration. Low mobility butterfly species took longer to colonise. We show that arable reversion is an effective tool for the management of butterflycommunities. We suggest that as restoration takes time to achieve, its use as a mitigation tool against future environmental change (i.e. by decreasing isolation in fragmented landscapes) needs to take into account such time lags. |Programmes:||CEH Topics & Objectives 2009 onwards > Biodiversity| |CEH Sections:||CEH fellows |Additional Keywords:||arable reversion, calcareous, grassland enhancement, mesotrophic, functional traits, recreation| |NORA Subject Terms:||Ecology and Environment| |Date made live:||12 Sep 2012 15:38| Actions (login required)
701
Did You Know Did you know that there is a town in Germany by the name of Reher?? That there is also one by the name of Stoltenberg?? Do you know where our Reher and Stoltenberg ancestors came from in Germany?? Johann Reher came from the town of Bebensee. His father Casper came from Dreggers which was 6 miles east of there. Bad Segeberg is also associated with the family. It is about 7 miles north and the closest large town. Since the town of Reher is 40 miles west of Bebensee and Dreggers I'm not sure if there is any connection to our name and family. Forty miles in the mid 1800's was quite a distance to travel. Claus Stoltenberg came from Brodersdorf which is 46 miles north of Bebensee and about 10 miles northeast of Kiel, a major city on the Baltic Sea. Brodersdorf is two to three miles south of the Baltic Sea. Other towns associated with the Stoltenberg side of the family are all located in close proximity. They are LaBoe, Stein, Fahren, Probsteierhagen and Wentdorf. The town of Stoltenberg is only seven miles to the southeast of Brodersdorf. The above map of northern Germany will show you where the towns Reher, Stoltenberg, Bebensee, Dreggers, and Brodersdorf are located. I've marked these towns with a dark asterisk * to make them easier to find. Click on the map to make it bigger and easier to see the towns marked with an asterisk. After the larger map comes up, click on that again to zoom in. It is about 60 miles from Kiel at the top of the map to Hamburg which is towards the bottom of this map. From Reher to Bebensee it is 40 miles, to Brodersdorf it is 46 miles which is also the distance from Bebensee to Brodersdorf and Stoltenberg... almost a perfect equilateral triangle. See the map below... Reher is in the bottom left corner or the triangle, Bebensee in the bottom right and Brodersdorf in the top. Hamburg is the port that our Johann & Sophia Reher sailed out of with their two small children, Emma and Ernest when they came to America in 1872. The map above shows a closer view of the area where Bebensee & Dreggers are located... where Johann Reher and his father were born. Once again, click on the map to make it larger. The map above shows a closer view of the area where the Stoltenberg side of the family came from. You'll see all of the towns: Brodersdorf, LaBoe, Stein, Fahren, Probsteierhagen and Wentdorf. I've added the Stoltenberg name myself as the town didn't show up on this map. So Now You Know
251
When he shot President Lincoln, John Wilkes Booth was 26 years old, and one of the nation’s most famous actors. (Charles DeForest Fredericks/National Portrait Gallery) John Wilkes Booth, a Maryland native, spent the war performing in theatrical productions. But the conflict was never far from his mind. In a letter to his mother, he expressed chagrin that he hadn’t joined the Confederate army, writing, “I have … begun to deem myself a coward, and to despise my own existence.” He was outraged by the reelection of Lincoln, whom he viewed as the instigator of all the country’s woes. The month after the inauguration, Booth learned that Lincoln would be attending a performance at Ford’s Theatre on April 14. That night, he crept into Lincoln’s theater box and shot him in the back of the head. It was the first time a president had been murdered. “Wanted” posters were issued for Booth, and on April 26, he was cornered in a tobacco barn and shot by a federal sergeant, acting against orders to bring him in alive. Several months later, Charles Creighton Hazewell, a frequent contributor, sought to make sense of the assassination—speculating that the plot may have been hatched in Canada (where a number of secessionist schemes had originated) and hinting at evidence that the plan had been endorsed at the highest levels of the Confederate government.—Sage Stossel The assassination of President Lincoln threw a whole nation into mourning … Of all our Presidents since Washington, Mr. Lincoln had excited the smallest amount of that feeling which places its object in personal danger. He was a man who made a singularly favorable impression on those who approached him, resembling in that respect President Jackson, who often made warm friends of bitter foes, when circumstances had forced them to seek his presence; and it is probable, that, if he and the honest chiefs of the Rebels could have been brought face to face, there never would have been civil war,—at least, any contest of grand proportions; for he would not have failed to convince them that all that they had any right to claim, and therefore all that they could expect their fellow-citizens to fight for, would be more secure under his government than it had been under the governments of such men as Pierce and Buchanan, who made use of sectionalism and slavery to promote the selfish interests of themselves and their party … Ignorance was the parent of the civil war, as it has been the parent of many other evils,—ignorance of the character and purpose of the man who was chosen President in 1860–61, and who entered upon official life with less animosity toward his opponents than ever before or since had been felt by a man elected to a great place after a bitter and exciting contest … That one of the most insignificant of [the secessionists’] number should have murdered the man whose election they declared to be cause for war is nothing strange, being in perfect keeping with their whole course. The wretch who shot the chief magistrate of the Republic is of hardly more account than was the weapon which he used. The real murderers of Mr. Lincoln are the men whose action brought about the civil war. Booth’s deed was a logical proceeding, following strictly from the principles avowed by the Rebels, and in harmony with their course during the last five years. The fall of a public man by the hand of an assassin always affects the mind more strongly than it is affected by the fall of thousands of men in battle; but in strictness, Booth, vile as his deed was, can be held to have been no worse, morally, than was that old gentleman who insisted upon being allowed the privilege of firing the first shot at Fort Sumter. Ruffin’s act is not so disgusting as Booth’s; but of the two men, Booth exhibited the greater courage,—courage of the basest kind, indeed, but sure to be attended with the heaviest risks, as the hand of every man would be directed against its exhibitor. Had the Rebels succeeded, Ruffin would have been honored by his fellows; but even a successful Southern Confederacy would have been too hot a country for the abode of a wilful murderer. Such a man would have been no more pleasantly situated even in South Carolina than was Benedict Arnold in England. And as he chose to become an assassin after the event of the war had been decided, and when his victim was bent upon sparing Southern feeling so far as it could be spared without injustice being done to the country, Booth must have expected to find his act condemned by every rational Southern man as a worse than useless crime, as a blunder of the very first magnitude. Had he succeeded in getting abroad, Secession exiles would have shunned him, and have treated him as one who had brought an ineffaceable stain on their cause, and also had rendered their restoration to their homes impossible. The pistol-shot of Sergeant Corbett saved him from the gallows, and it saved him also from the denunciations of the men whom he thought to serve. He exhibited, therefore, a species of courage that is by no means common; for he not only risked his life, and rendered it impossible for honorable men to sympathize with him, but he ran the hazard of being denounced and cast off by his own party … All Secessionists who retain any self-respect must rejoice that one whose doings brought additional ignominy on a cause that could not well bear it has passed away and gone to his account. It would have been more satisfactory to loyal men, if he had been reserved for the gallows; but even they must admit that it is a terrible trial to any people who get possession of an odious criminal, because they may be led so to act as to disgrace themselves, and to turn sympathy in the direction of the evil-doer … Therefore the shot of Sergeant Corbett is not to be regretted, save that it gave too honorable a form of death to one who had earned all that there is of disgraceful in that mode of dying to which a peculiar stigma is attached by the common consent of mankind. Whether Booth was the agent of a band of conspirators, or was one of a few vile men who sought an odious immortality, it is impossible to say. We have the authority of a high Government official for the statement that “the President’s murder was organized in Canada and approved at Richmond”; but the evidence in support of this extraordinary announcement is, doubtless for the best of reasons, withheld at the time we write. There is nothing improbable in the supposition that the assassination plot was formed in Canada, as some of the vilest miscreants of the Secession side have been allowed to live in that country … But it is not probable that British subjects had anything to do with any conspiracy of this kind. The Canadian error was in allowing the scum of Secession to abuse the “right of hospitality” through the pursuit of hostile action against us from the territory of a neutral … That a plan to murder President Lincoln should have been approved at Richmond is nothing strange; and though such approval would have been supremely foolish, what but supreme folly is the chief characteristic of the whole Southern movement? If the seal of Richmond’s approval was placed on a plan formed in Canada, something more than the murder of Mr. Lincoln was intended. It must have been meant to kill every man who could legally take his place, either as President or as President pro tempore. The only persons who had any title to step into the Presidency on Mr. Lincoln’s death were Mr. Johnson, who became President on the 15th of April, and Mr. Foster, one of the Connecticut Senators, who is President of the Senate … It does not appear that any attempt was made on the life of Mr. Foster, though Mr. Johnson was on the list of those doomed by the assassins; and the savage attack made on Mr. Seward shows what those assassins were capable of. But had all the members of the Administration been struck down at the same time, it is not at all probable that “anarchy” would have been the effect, though to produce that must have been the object aimed at by the conspirators. Anarchy is not so easily brought about as persons of an anarchical turn of mind suppose. The training we have gone through since the close of 1860 has fitted us to bear many rude assaults on order without our becoming disorderly. Our conviction is, that, if every man who held high office at Washington had been killed on the 14th of April, things would have gone pretty much as we have seen them go, and that thus the American people would have vindicated their right to be considered a self-governing race. It would not be a very flattering thought, that the peace of the country is at the command of any dozen of hardened ruffians who should have the capacity to form an assassination plot, the discretion to keep silent respecting their purpose, and the boldness and the skill requisite to carry it out to its most minute details: for the neglect of one of those details might be fatal to the whole project. Society does not exist in such peril as that. john wilkes booth, a Maryland native, spent the war performing in theatrical productions. But the conflict was never far from his mind. In a letter to his mother, he expressed chagrin that he hadn’t joined the Confederate army, writing, “I have … begun to deem myself a coward, and to despise my own existence.” He was outraged by the reelection of Lincoln, whom he viewed as the instigator of all the country’s woes. The month after the inauguration, Booth learned that Lincoln would be attending a performance at Ford’s Theatre on April 14. That night, he crept into Lincoln’s theater box and shot him in the back of the head. It was the first time a president had been murdered. “Wanted” posters were issued for Booth, and on April 26, he was cornered in a tobacco barn and shot by a federal sergeant, who acted against orders to bring him in alive. Several months later, Charles Creighton Hazewell, a frequent Atlantic contributor, sought to make sense of the assassination—speculating that the plot may have been hatched in Canada (where a number of secessionist schemes had originated) and hinting at evidence that the plan had been endorsed at the highest levels of the Confederate government. Read the full text of this article here. This article available online at:
726
By Elliot Mamet On June 23rd, 1972, President Nixon signed Title IX into law. Nearly 40 years later, the passage of Title IX is viewed as an unequivocal milestone in the struggle to protect, defend and expand civil liberties. As we celebrate Title IX’s 40th birthday, it is worth reflecting on its significance, as well as on the challenges that lie ahead. Title IX mandates that federally funded institutions may not exclude or discriminate from an educational program or activity on the basis of sex. The law leverages federal funds in order to require equal opportunity for men and women. There are exceptions to Title IX (like sororities or the Boy Scouts), although in general, Title IX has applied quite broadly and unilaterally to different institutions. Through Title IX, the doors have opened a little wider for equal opportunity in the United States. Title IX shattered the stereotype that women are too “fragile” or “weak” to play sports, but Title IX goes so much further than sports. By prohibiting discrimination based on non-conformity with gender stereotypes, Title IX has been used as an effective tool for defending the civil rights and civil liberties of LGBT students. Additionally, Title IX prohibits discrimination and harassment based on students’ gender identity, change of sex, and/or transgender status. Yet even with these successes, enforcing Title IX still has its challenges. One important concern for policymakers is applying Title IX in a way that is conscious of the diversity of gender expression. In a society where gender and sexual orientation mean different things to different people, self-identifying as the normative “male” or “female” can be difficult . A sound approach to Title IX regulation would prioritize meeting the needs of participants in a particular sport or program. Federally funded institutions should allow students to participate in programs and sports based on the gender with which they identify, in a way that is conscious to individual needs. In this way, programs and activities could act as a safe space where program leaders are more sensitive to the diversity of gender expression. Looking back at the past 40 years under Title IX, it is clear that Title IX has grown to reflect a fundamental mindset—that human institutions, whether the soccer team or a PhD program—shouldn’t shut out certain categories of people a priori . If the Declaration of Independence and the Emancipation Proclamation mean anything at all to us today, surely they must be interpreted as another step on our quest to “make declarations of freedom real ,” as Martin Luther King Jr. said. And surely, in its own way, Title IX reflects that quest. It is today, nearly 40 years after Title IX was passed into law, that Title IX’s lessons must be heeded with the utmost resolve. Elliot Mamet is the summer Colorado College Public Interest Fellow at the ACLU of Colorado. He is an incoming sophomore at Colorado College, a four-year, private liberal arts school, where he is studying political science.
461
||This article has multiple issues. Please help improve it or discuss these issues on the talk page. ||This article's factual accuracy may be compromised due to out-of-date information. (July 2012) ||This article needs additional citations for verification. (July 2012) ||An editor has expressed a concern that this article lends undue weight to certain ideas, incidents, controversies or matters relative to the article subject as a whole. (July 2012) Culinary arts is the art of preparing and cooking foods. The word "culinary" is defined as something related to, or connected with, cooking. A culinarian is a person working in the culinary arts. A culinarian working in restaurants is commonly known as a cook or a chef. Culinary artists are responsible for skilfully preparing meals that are as pleasing to the palate as to the eye. They are required to have a knowledge of the science of food and an understanding of diet and nutrition. They work primarily in restaurants, delicatessens, hospitals and other institutions. Kitchen conditions vary depending on the type of business, restaurant, nursing home, etc. The Table arts or the art of having food can also be called as "Culinary arts". Careers in culinary arts Related careers Below is a list of the wide variety of culinary arts occupations. - Consulting and Design Specialists – Work with restaurant owners in developing menus, the layout and design of dining rooms, and service protocols. - Dining Room Service – Manage a restaurant, cafeterias, clubs, etc. Diplomas and degree programs are offered in restaurant management by colleges around the world. - Food and Beverage Controller – Purchase and source ingredients in large hotels as well as manage the stores and stock control. - Entrepreneurship – Deepen and invest in businesses, such as bakeries, restaurants, or specialty foods (such as chocolates, cheese, etc.). - Food and Beverage Managers – Manage all food and beverage outlets in hotels and other large establishments. - Food Stylists and Photographers – Work with magazines, books, catalogs and other media to make food visually appealing. - Food Writers and Food Critics – Communicate with the public on food trends, chefs and restaurants though newspapers, magazines, blogs, and books. Notables in this field include Julia Child, Craig Claiborne and James Beard. - Research and Development Kitchens – Develop new products for commercial manufacturers and may also work in test kitchens for publications, restaurant chains, grocery chains, or others. - Sales – Introduce chefs and business owners to new products and equipment relevant to food production and service. - Instructors – Teach aspects of culinary arts in high school, vocational schools, colleges, recreational programs, and for specialty businesses (for example, the professional and recreational courses in baking at King Arthur Flour). Occupational outlook The occupation outlook for chefs, restaurant managers, dietitians, and nutritionists is fairly good, with "as fast as the average" growth. Increasingly a college education with formal qualifications is required for success in this field. The culinary industry continues to be male-dominated, with the latest statistics showing only 19% of all 'chefs and head cooks' being female. Notable culinary colleges around the world - JaganNath Institute of Management Sciences, Rohini, Delhi, India - College of Tourism & Hotel Management, Lahore, Punjab, Pakistan - Culinary Academy of India, Hyderabad, Andhra Pradesh, India - Culinary Academy of India, Hyderabad, Andhra Pradesh, India - ITM School of Culinary Arts, Mumbai, Maharashtra, India - Welcomgroup Graduate School of Hotel Administration, Manipal, Karnataka, India - Institute of Technical Education (College West) – School of Hospitality, Singapore - ITM (Institute of Technology and Management) – Institute of Hotel Management, Bangalore, Karnataka, India - Apicius International School of Hospitality, Florence, Italy - Le Cordon Bleu, Paris, France - École des trois gourmandes, Paris, France - HRC Culinary Academy, Bulgaria - Institut Paul Bocuse, Ecully, France - Mutfak Sanatlari Akademisi, Istanbul, Turkey - School of Culinary Arts and Food Technology, DIT, Dublin, Ireland - Scuola di Arte Culinaria Cordon Bleu, Florence, Italy - Westminster Kingsway College (London) - University of West London (London) - School of Restaurant and Culinary Arts, Umeå University (Sweden) - Camosun College (Victoria, BC) - Canadore College (North Bay, ON) - The Culinary Institute of Canada (Charlottetown, PE) - Georgian College (Owen Sound, ON) - George Brown College (Toronto, ON) - Humber College (Toronto, ON) - Institut de tourisme et d'hôtellerie du Québec (Montreal, QC) - Niagara Culinary Institute (Niagara College, Niagara-on-the-Lake, ON) - Northwest Culinary Academy of Vancouver (Vancouver, BC) - Nova Scotia Community College (Nova Scotia) - Pacific Institute of Culinary Arts (Vancouver, BC) - Vancouver Community College (Vancouver, BC) - Culinary Institute of Vancouver Island (Nanaimo, BC) - Sault College (Sault Ste. Marie, ON) - Baltimore International College, Baltimore, Maryland - California Culinary Academy, San Francisco, California - California School of Culinary Arts, Pasadena, California - California State, Pomona, California - California State University Hospitality Management Education Initiative - Chattahoochee Technical College in Marietta, Georgia - Cooking and Hospitality Institute of Chicago - Coosa Valley Technical College, Rome, Georgia - Culinard, the Culinary Institute of Virginia College - Cypress Community College Hotel, Restaurant Management, & Culinary Arts Program in Anaheim - Classic Cooking Academy, Scottsdale, Arizona - Center for Kosher Culinary Arts, Brooklyn, New York - Culinary Institute of America in Hyde Park, New York - Culinary Institute of America at Greystone in St. Helena, California - The Culinary Institute of Charleston, South Carolina - L'Ecole Culinaire in Saint Louis, Missouri and Memphis, Tennessee - Glendale Community College (California) - International Culinary Centers in NY and CA which include: - Institute for the Culinary Arts at Metropolitan Community College, Omaha, Nebraska - Johnson & Wales University, College of Culinary Arts - Kendall College in Chicago, Illinois - Lincoln College of Technology - Manchester Community College in Connecticut - New England Culinary Institute in Vermont - Orlando Culinary Academy - Pennsylvania Culinary Institute - The Restaurant School at Walnut Hill College, Philadelphia, Pennsylvania, - Scottsdale Culinary Institute - Secchia Institute for Culinary Education: Grand Rapids Community College, Grand Rapids, MI - The Southeast Culinary and Hospitality College in Bristol, Virginia - Sullivan University Louisville, Kentucky - Los Angeles Trade–Technical College - Texas Culinary Academy - Central New Mexico Community College, Albuquerque, NM - AUT University (Auckland University of Technology) - MIT (Manukau Institute of Technology) - Wintec, Waikato Institute of Technology See also - McBride, Kate, ed. The Professional Chef/ the Culinary Institute of America, 8th ed. Hoboken, NJ: John Wiley & Sons, INC, 2006. Further reading - Beal, Eileen. Choosing a career in the restaurant industry. New York: Rosen Pub. Group, 1997. - Institute for Research. Careers and jobs in the restaurant business: jobs, management, ownership. Chicago: The Institute, 1977. External links
455
How lego does it today. I found little information about Autodesk Maya being the 3D modeling software being used. Here`s a blurb about their current design process : Primary concept and development work takes place at the Billund headquarters, where the company employs approximately 120 designers. The company also has smaller design offices in the UK, Spain, Germany, and Japan, which are tasked with developing products aimed specifically at these markets. The average development period for a new product is around twelve months, in three stages. The first stage is to identify market trends and developments, including contact by the designers directly with the market; some are stationed in toy shops close to holiday periods, while others interview children. The second stage is the design and development of the product based upon the results of the first stage. As of September 2008 the design teams use 3D modeling software to generate CAD drawings from initial design sketches. The designs are then prototyped using an in-house stereolithography machine. These are presented to the entire project team for comment and for testing by parents and children during the "validation" process. Designs may then be altered in accordance with the results from the focus groups. Virtual models of completed Lego products are built concurrently with the writing of the user instructions. Completed CAD models are also used in the wider organization, such as for marketing and packaging. source : wikipedia How lego used to do it do you know? How people do it themselves Lego provide software that does just that. Check for "Lego digital designer" which allows to create a model, save a building manuals and buy the lego parts online. Also check up this related question :"Do any programs exist that allow you to build own LEGO plans?" For more information on how to create high quality computer images of lego models, check this question : "How can I create synthetic imagery (rendering) of lego models?"
901
Irritable Bowel Syndrome (IBS) What Is It? Irritable bowel syndrome (IBS) is a common disorder that causes a variety of symptoms, including: - Abdominal pain - Diarrhea and/or constipation The severity of the disorder varies from person to person. Some people experience symptoms that come and go and are just mildly annoying. Others have such severe daily bowel problems that IBS affects their ability to work, sleep and enjoy life. In addition, symptoms may change over time. A person may have severe symptoms for several weeks and then feel well for months or even years. Most people are never cured of IBS. However, the disorder is not related to any other disease. It does not develop into colitis. People with IBS do not have an increased risk of colon cancer. IBS usually starts in early adulthood. It affects twice as many women as men. Approximately 10% to 20% of the population has IBS. But half of all people with the condition never seek medical care for their symptoms. No one knows what causes IBS. Some studies suggest that the nerves of the colon may be much more sensitive than usual in people with IBS. The normal movement of food and gas through the colon causes pain, intestinal spasms and an irregular pattern of bowel movements. Stress does not cause IBS. But stress can increase the frequency and severity of symptoms. IBS has been called irritable colon, spastic colon, mucous colitis and functional bowel disease. People with IBS may have some or all of these symptoms: - Mild or severe abdominal pain, discomfort or cramping that usually goes away after a bowel movement - Periods of diarrhea or constipation, or alternating between these two symptoms - Bloating, gassiness or a feeling of having a distended abdomen - Mucus in bowel movements - Feeling as though a bowel movement is incomplete Although the symptoms of IBS often change over time, people tend to develop their own pattern. For example, some people have mostly diarrhea, some have mostly constipation and others have abdominal pain without a major change in bowel movements. There is no test for IBS. Your doctor will diagnose IBS if you have the typical symptoms and have been tested for other disorders that can cause similar symptoms. Your doctor will ask about your medical history and symptoms. Your doctor will examine you, testing your abdomen for tenderness and feeling to determine whether internal organs are larger than normal. The doctor will check for fever or weight loss. If you have any of these signs, you likely have something other than IBS. Depending on your medical history, your doctor may do tests to eliminate other diseases that may cause similar symptoms. These tests might include: - Blood tests - Stool sample, to check for blood or evidence of infection - Sigmoidoscopy, in which a flexible, lighted tube with a tiny camera on the end is inserted into the rectum and up the left side of the colon - Colonoscopy, in which a longer tube examines the entire colon Your doctor may suggest that you stop eating or drinking certain foods for up to three weeks to determine if your diet is contributing to your symptoms. For example, your doctor may ask you to eliminate milk products if he or she suspects lactose intolerance. IBS symptoms may be a daily problem throughout a person's life. Symptoms may come and go, lasting a day, a week or a month before disappearing. Dietary changes with or without medication may help to reduce the frequency or severity of symptoms. Because no one knows what causes IBS, it is impossible to prevent the disorder. Once diagnosed with IBS, a person may be able to reduce the frequency and severity of symptoms by reducing stress or changing the diet. Changing your diet may improve symptoms dramatically. It often takes a long time to discover what works well for you. And you may need to alter your original program if symptoms flare. Keep track of the different foods you eat throughout the day. See which foods seem to make your symptoms worse. After you discover your particular trigger foods, eliminate them from your diet. Some common IBS trigger foods include: - Cabbage, broccoli, kale, legumes and other gas-producing foods - Dairy products - Fatty foods, including whole milk, cream, cheese, butter, oils, meats and avocados - Raw fruits - Foods, gums and beverages that contain sorbitol, an artificial sweetener The way you eat may help to create IBS symptoms. Eating large meals can cause cramping and diarrhea, so eating smaller meals more often may help some people with IBS. Eating quickly can cause you to swallow air, which can cause belching or gas. Adding fiber to your diet, especially if constipation is one of your main symptoms, often helps to regulate your bowel movements and reduce abdominal discomfort. At first, fiber will increase the amount of gas in your system, so add fiber gradually. Over time, the body adjusts to the effects of fiber and the gassiness will decrease. Fruits, vegetables and whole-grain breads and cereals are good food sources of fiber. Your doctor may recommend a fiber supplement. Some experts believe that the fiber methylcellulose creates the least amount of gas, and brands of this fiber are often recommended for people with IBS. Psyllium is also a good source of fiber. If your symptoms are not relieved after you eliminate trigger foods and add fiber, your doctor may prescribe medications. For people that have frequent loose stools (diarrhea-predominant IBS), medication options include: - Antidiarrheals -- loperamide (Imodium), diphenoxylate (Lomotil and other brand names) - Antispasmodics to reduce cramping -- dicyclomine (Bentyl) - Pain-reducing agents -- amitriptyline (Elavil), desipramine (Norpramin) - Alosetron (Lotronex) is approved only for women with severe diarrhea-predominant IBS who have very severe diarrhea and have not responded to other treatments. To receive this drug, you must sign a form stating that you are aware of life-threatening complications, such as a blocked, ruptured or damaged bowel. For people with constipation-predominant IBS, fiber and plenty of fluids are the mainstays of therapy. If medication is needed, your doctor may prescribe an osmotic laxative such as lactulose. A newer drug approved for women with persistent constipation is lubiprostone (Amitiza). Lubiprostone acts on the cells that line the inside of the intestines. The drug promotes increased fluid secretion into the intestine, making stool passage easier. When To Call a Professional It is useful for anyone with irritable bowel symptoms to discuss their symptoms with a doctor, so that diet, fiber and drug treatment strategies can be planned. After you have been diagnosed with irritable bowel syndrome, contact your doctor if you have: - An episode of severe symptoms - Unexplained weight loss or fever - Blood in your stool - Abdominal pain that is accompanied by vomiting, dizziness or fainting - Abdominal pain or diarrhea that awakens you from sleep There is no cure for IBS. But most people can lessen the symptoms by making dietary changes, reducing stress and, if necessary, taking medication. National Institute of Diabetes and Digestive and Kidney Disorders Office of Communications and Public Liaison Building 31, Room 9A06 31 Center Drive, MSC 2560 Bethesda, MD 20892-2560 American College of Gastroenterology (ACG) P.O. Box 342260 Bethesda, MD 20827-2260 American Gastroenterological Association 4930 Del Ray Ave. Bethesda, MD 20814
269
Undated (WXOW) - In 2009, the US Preventative Task force recommended against breast cancer screening for women aged 40 to 49. It said the risks outweigh the small potential benefit in younger women, but a new study in the "Annals of Internal Medicine" says these women would benefit from screening the latest turn in the see-saw debate over detecting breast cancer. The study says screening is helpful for women with a two-fold increase in such risk factors as: having dense breasts, a family history of breast cancer and having had hormone replacement therapy. The authors acknowledge that false positives can cause needless procedures and increased anxiety, but they say false positives can be reduced by focusing on high-risk patients and using regular instead of digital mammogram's. All content © Copyright 2000 - 2013 WorldNow and WXOW. All Rights Reserved. Persons with disabilities who need assistance with issues relating to the content of this station's public inspection file should contact Administrative Assistant Theresa Wopat at 507-895-9969. Questions or concerns relating to the accessibility of the FCC's online public file system should be directed to the FCC at 888-225-5322, at 888-835-5322 (TTY) or at email@example.com.
201
Tag writer: Michele Wick, Psychology Imagine the texture of skirt fabric rubbing against tiny feet, the sweet smell of grass, or the delight of looking at a resplendent blue shirt. Sensory experiences are a vital part of who we are; they are building blocks of a growing brain. Countless occurrences, like the intimate play we see in Cassatt’s print, help shape the contours of pliant neural networks. The child may not remember this exact moment, the feel of the woman’s secure grasp, the pleasure of gazing in her eyes, or the sound of her breath. Nevertheless, they have left their imprint on a blossoming mind. Image Information: Mary Cassatt, American (1844–1926). Under the Horse Chestnut Tree , 1895. Drypoint and aquatint printed in blue, green, yellow, brown and flesh on paper. Sheet: 18 13/16 x 14 3/8 in.; 47.7838 x 36.5125 cm; plate: 16 1/8 x 11 3/8 in.; 40.9575 x 28.8925 cm. Bequest of Helen Haase
161
Many soldiers fighting in the First World War suffered from trench foot. This was an infection of the feet caused by cold, wet and insanitary conditions. In the trenches men stood for hours on end in waterlogged trenches without being able to remove wet socks or boots. The feet would gradually go numb and the skin would turn red or blue. If untreated, trench foot could turn gangrenous and result in amputation. Trench foot was a particular problem in the early stages of the war. For example, during the winter of 1914-15 over 20,000 men in the British Army were treated for trench foot. Brigadier-General Frank Percy Crozier argued that: " The fight against the condition known as trench-feet had been incessant and an uphill game." Arthur Savage pointed out that trench foot had serious consequences: "My memories are of sheer terror and the horror of seeing men sobbing because they had trench foot that had turned gangrenous. They knew they were going to lose a leg." Brigadier-General Frank Percy Crozier explained how the officers tried to solve the problem: "Socks are changed and dried in the line, thigh boots are worn and are dried every four days when we come out." The only remedy for trench foot was for the soldiers to dry their feet and change their socks several times a day. By the end of 1915 British soldiers in the trenches had to have three pairs of socks with them and were under orders to change their socks at least twice a day. As well as drying their feet, soldiers were told to cover their feet with a grease made from whale-oil. It has been estimated that a battalion at the front would use ten gallons of whale-oil every day. The trenches were wet and cold and at this time some of them did not have duckboards and dug-outs. The battalion lived in mud and water. Altogether about 200 men were evacuated for trench feet and rheumatism. Gum boots were provided for the troops in the most exposed positions. Trench feet was still a new ailment and the provision of dry socks was vitally important. Part of the trench was reserved for men to go two at a time, at least once a day, and rub each other's feet with grease. If you have never had trench feet described to you. I will tell you. Your feet swell to two or three times their normal size and go completely dead. You could stick a bayonet into them and not feel a thing. If you are fortunate enough not to lose your feet and the swelling begins to go down. It is then that the intolerable, indescribable agony begins. I have heard men cry and even scream with the pain and many had to have their feet and legs amputated. My memories are of sheer terror and the horror of seeing men sobbing because they had trench foot that had turned gangrenous. They knew they were going to lose a leg. Memories of lice in your clothing driving you crazy. Filth and lack of privacy. Of huge rats that showed no fear of you as they stole your food rations. And cold deep wet mud everywhere. And of course, corpses. I'd never seen a dead body before I went to war. But in the trenches the dead are lying all around you. You could be talking to the fellow next to you when suddenly he'd be hit by a sniper and fall dead beside you. And there he's stay for days. Some of their feet were horrible to look at: raw skin and bleeding blisters and big, angry sores. Their army boots rarely fitted comfortably. They were made in a few standard sizes, and a man was lucky if he got a pair that was neither too big nor too small. To march all day in them with blistered feet must have been a torment... The men marched like beasts of burden with heavy packs on their backs, rifles and bandoliers of ammunition slung across their shoulders. Sometimes they would break into a marching song to ease the misery, but now and then, as I marched at the head of my platoon, I would hear a clatter behind me and turn to see a man lying prostrate in the road. The sergeants were instructed to prod them and order them to get up. There was always the possibility that the man had decided that he had taken as much as he could bear and had staged his collapse to get out of it. But most of them were genuine - down and out. The fight against the condition known as "trench-feet" had been incessant and an uphill game. However, science and discipline had conquered, and now we seldom have a case, and if we do there is trouble. Socks are changed and dried in the line, thigh boots are worn and are dried every four days when we come out. Things are better, but the weather gets worse.
555
|Home :: Building Database :: Extras :: Search :: Map||You are here Architecture Edinburgh Queensferry KY11| Scroll down for more pictures Firth of Forth Bridge |Also known as:||Forth Rail Bridge| This structure is a great undulating steel monster rising out of the estuary that is formed by the Forth river as it slowly spreads out toward the North Sea. "Monster" is an appropriate word, because this bridge has the looks of a beast, and the strength to back it up. It is considered one of the strongest, most stable, and most expensive bridges in history. That came out of necessity. The bridge was built after the span across the Firth of Tay collapsed, killing 75 people on a train in the middle of the night. Engineers and planners needed to cross the Forth, but had to do it in a way that would be acceptable to a public still shocked by what was then the worst bridge disaster in history. What they came up with wasn't merely another cantilever-truss bridge. What they put together was a marvel of Victorian engineering, and a span so overbuilt that it barely moves in even the heaviest wind, even though a certain amount of sway is expected in most large structures. This is achieved by using steel plate tubes with internal braces. The most stout of these building members are 12-feet in diameter. Its nearly exclusive use of steel, combined with its latticework appearance have made some people refer to it as the "Eiffel Tower of Scotland." >1890 - The then-Prince of Wales drives the last rivet into place. It was gold plated and is inscribed. He would later go on to become King Edward VII. >57 people lost their lives building the Forth of Firth bridge. >The bridge is held together by nearly 7,000,000 rivets. >The bridge is made from 54,000 tons of steel. >The bridge is made from 194,000 cubic yards of granite. >The bridge is made from 21,000 tons of cement. >The bridge rests on three piers, 70-feet in diameter. >Each of these piers descends up to 90 feet into the earth before resting on bedrock. >The bridge is designed to stand up to wind forces as high as 56 pounds per square foot. Rate This Bridge method='post' action='/Building.php?ID=307#Rate'>Current rating: 70% name='Rating' id='Rating' value='Praise' class='Plain'> name='Rating' id='Rating' value='Raze' class='Plain'> There are eight comments. I am from the County of Fifeand have gone over the bridge many times on the steam trains.On the middle span we through a penny into the water or good luck.I have been in Australia for 37 years but stll consider the Forth Railway Bridge the milestone in engineering and the best in the world. James A Taylor - Saturday, October 10th, 2009 @ 2:28am I have riden across the bridge 5 times. If I am lucky enough to get to my favorite overseas city, Edinburgh. I would love to visit it from the shore in North Queensferry and visit Inchgarvie if possible. In my opinion the two most impressive bridges in the world are the Great Forth Bridge and the Brooklyn Bridge. James Anderson - Saturday, February 21st, 2009 @ 7:38am I visited the bridge in 1970 and i'm still fascinated by the vast of it....excellent achievement robert ledger - Thursday, April 3rd, 2008 @ 10:20am My brothers and I were born in a little cottage underneath the Forth Bridge on the North side. We think of this Bridge as the Best in the World. It is magic!! Avril Hylton - Sunday, January 1st, 2006 @ 12:57pm india - Thursday, July 7th, 2005 @ 5:24am To view this bridge in the mist with just the tops rising above in the sunshine is a dream. Mal Walker - Sunday, March 13th, 2005 @ 1:51am |LACU Community||LACU Extras||LACU Tools||LACU Sister Sites|
729
Safety in the gym begins with the design and equipping of the gym. In order to do everything possible to ensure the safety of gymnasts, certain design concepts must be incorporated into the building and layout or redesign of any gymnastics facility. Emergency Response Equipment and System While we plan to make sure the safety of all gymnasts is so aggressively protected that no serious injury will ever occur, it is a prime responsibility of a gym designer to design and provide an emergency response system. A proper emergency response system will include both emergency response equipment and hardware and safety plans and safety training for all staff. Emergency Situations to Plan for and Provide Emergency Response Equipment for - Emergencies when the coach is alone in the gym (no other coaches or office staff) - Emergencies when no other staff person notices the problem. - Emergencies when the coach cannot leave the accident area at all - Emergencies in the waiting areas or other parts of the facility other than the gym The concept of clear pathways to emergency exits is a commonly ignored gym design problem. In any emergency, especially in case of fire, clear, quick access to exits is necessary. Clear pathways are also needed to provide easy access to all gym areas for emergency personnel. When gym areas are not separated for age groups, walkways provide safe passage for preschoolers and other young gymnasts through areas where larger, older gymnasts are working out. Separate Cordoned-Off Preschool Areas Mixing small inexperienced preschoolers with older larger gymnasts in the same areas can be a prescription for accident and injury. Separate areas can still be a problem when preschoolers must travel from preschool area to preschool area but must travel through areas with older larger gymnasts. It is also probably a very good idea to provide separate areas for younger beginner gymnasts as well as preschoolers. Pits are one of the biggest safety feature innovations in the history of gymnastics and sports training. As a minimum there should be pits available for training bar dismounts and release moves and also vault and tumbling pits. Pits for beam dismounts, p-bar dismounts, ring dismounts should also be available for maximum safety. Training pits should logically be longer and wider than competition matting requirements. Since gymnasts have not yet mastered the skills they are performing, like they would be in competitions, they need a larger margin of safety in the size of the safe landing areas. Gymnasts landing in pits may fall backwards or sideways striking the edge of the pit if the pit is not wide or ling enough. 8″ Pit Side Mats For the same reasons as above, falls backwards or sideways, the sides of the pit should be fully padded with mats soft enough to really cushion a fall against them. The commonly used inch and a ¼ mats over concrete are not really enough protection. Type of Pits Must Match Training Style and Systems There are loose foam bungee pits, loose foam pits, bungee resi-pits and resi-pits. It is extremely common for coaches to place 8″ foam or competition mats over loose foam pits for more stable landings as gymnasts progress. Ideally all of those pits would be available for training progressions providing the full range of landing and release move safety progression. If only one pit type is available, it should likely be the softest landing, the loose foam bungee pit. The style of training progressions normally used by the coaches should match the type of pit being used. More gymnast skill and experience is required for safe landings on the harder pit surfaces as opposed to the softer ones. Unless gymnasts are training for competitive trampoline competition, it is much safer for all trampolines in the gym to be sunk in the ground with the bed level with the rest of the floor. Then, in case an athlete should fly off of the trampoline, the fall is to a level floor (suitably matted) and not down and additional four and a half feet fall from an above ground trampoline. Open View of Whole Gym for General Supervision Visibility All gyms should have at least one person or more designated with responsibility for general supervision of the gym at all times. General supervision means that someone should be watching the entire gym, not just one class to look for possible dangerous situations, like wandering preschoolers or non-class members, accidents, etc. In order for this to happen the gym must be completely open so that one person can see the whole gym. View into Gym from all Offices and other Rooms For the same general supervision reasons as above, ideally all offices and other rooms in the gym should have a view into the gym so as much supervision as possible occurs, including from staff members not in the gym itself. Windows or other openings into the gym from all, or as many as possible, rooms in the building make general supervision of the gym easier and more effective. Available Hydration and Air Conditioning for Safe Summer Workouts In certain climates or during certain seasons of the year, heat stroke or heat exhaustion are things all coaches should be aware of and taking precautions to prevent. From a design perspective, this means that where applicable, air conditioning should be available in the gym to lessen the possibilities. Equipment or a system should be in place to allow proper hydration for gymnasts. This would show up in gym design by having a sufficient number of water fountains or water sources, spread throughout the gym. Complete Matting and Safety Margins One of the most important safety measures for gym design, in terms of gym equipment layout is allowing sufficient space for safe matting and allowing for a sufficient matting margin of error. To us, that means that matting should extend to any and all places that might even possibly need to be padded against a fall from the equipment. Sufficient space for and sufficient matting should always be designed into any gym design. Fire Control Detection and Suppression System Considering the dangers from the smoke from burning foam and smoke inhalation in general, smoke detectors or a smoke detector system should be a requirement for gymnastics facilities. In addition, because of the flammability of foam, it would be good policy to have a fire detection and suppression system throughout the entire gym. You can learn much more about designing a safer gym in our Secrets to Gymnastics Gym Design e-book.
401
How do you get your heart rate on target? When you work out, are you doing too much or not enough? There’s a simple way to know: Your target heart rate helps you hit the bull’s eye. “We don’t want people to over-exercise, and the other extreme is not getting enough exercise,” says Gerald Fletcher, M.D., a cardiologist and professor in the Mayo Clinic College of Medicine in Jacksonville, Fla. First Thing’s First Before you learn how to calculate and monitor your target training heart rate, you have to know your resting heart rate. Your resting heart rate is the number of times your heart beats per minute while it’s at rest. It’s best to check it in the morning after you’ve had a good night’s sleep and before you get out of bed. The average resting heart rate is 60-80 beats per minute, but it’s usually lower for physically fit people. It also rises with age. Hitttin’ the Target Now you’re ready to determine your target training heart rate. As you exercise, periodically: • Take your pulse on the inside of your wrist, on the thumb side. • Use the tips of your first two fingers (not your thumb) to press lightly over the blood vessels on your wrist. • Count your pulse for 10 seconds and multiply by 6 to find your beats per minute. You want to stay between 50 percent to 85 percent of your maximum heart rate. This range is your target heart rate. Know Your Numbers The table below shows estimated target heart rates for different ages. In the age category closest to yours, read across to find your target heart rate. Your maximum heart rate is about 220 minus your age. The figures are averages, so use them as general guidelines. |Age||Target HR Zone 50-85%||Average Maximum Heart Rate, 100%| |20 years||100-170 beats per minute||200 beats per minute| |30 years||95-162 beats per minute||190 beats per minute| |35 years||93-157 beats per minute||185 beats per minute| |40 years||90-153 beats per minute||180 beats per minute| |45 years||88-149 beats per minute||175 beats per minute| |50 years||85-145 beats per minute||170 beats per minute| |55 years||83-140 beats per minute||165 beats per minute| |60 years||80-136 beats per minute||160 beats per minute| |65 years||78-132 beats per minute||155 beats per minute| |70 years||75-128 beats per minute||150 beats per minute| Important Note: A few high blood pressure medications lower the maximum heart rate and thus the target zone rate. If you're taking such medicine, call your physician to find out if you need to use a lower target heart rate. So what’s in a number? If your target heart rate is too high, you’re straining. So slow down. If it’s too low, and the intensity feels “light” or “moderate/brisk,” push yourself to exercise a little harder. During the first few weeks of working out, aim for the lowest part of your target zone (50 percent). Then, gradually build up to the higher part (85 percent). After six months or more, you may be able to exercise comfortably at up to 85 percent of your maximum heart rate. But you don't have to exercise that hard to stay in shape. “It’s not an absolute, but it’s a good tool to have,” says Fletcher, who is also an American Heart Association volunteer. “And if you don’t know it, remember, if you’re not able to carry on a conversation (while exercising), that may be a bit too much.” If you have a heart condition or you’re in cardiac rehab, talk to a healthcare professional about what exercises you can engage in, what your target heart rate should be and whether you need to be monitored during physical activity. This will also help you to choose the types of physical activity that are appropriate for your current fitness level and health goals, because some activities are safer than others.
702
Miriam has four children, although she has given birth six times. Two infants unfortunately died within days of birth. However, her most recent birth was different in that Miriam and her female relatives had learned from the local female community health worker (CHW) about the importance of keeping the baby warm. An old custom of washing a newborn soon after birth is being discounted with the knowledge that infants were becoming sick. Instead, a baby should be gently dried with a towel and placed next to the mother's skin. Washing should wait until later. "Until I received training about the care of newborn babies, I followed our old customs. I did not realize how important it is to keep the baby warm after birth," said a CHW. "Embracing a newborn against the mother's warm skin is so simple, and the mothers like it, too." With nearly nine out of 10 births in Afghanistan still occurring in the home, USAID is training local health workers in essential maternal and newborn care. They then teach pregnant mothers and their families the simple but important actions they can take to preserve the lives of newborns. Although general health has improved since 2002, Afghanistan remains a country with some of the poorest health indicators worldwide. Afghanistan has one of the highest mortality rates of any nation: about one in five children die before the age of five. Approximately 80 percent of women in rural Afghanistan give birth outside a health facility without a skilled birth provider. Consequently, teaching basic newborn care along with other basic health skills to community care providers is a vital part of the Ministry of Public Health's national strategy. Together, USAID and the Afghan Ministry of Health are helping save the lives of babies born in rural homes by ensuring that local health workers know the key newborn care skills to share with pregnant mothers and their families. Families can be more confident and better prepared for their babies' births. Last updated: June 05, 2012
476
Key: "S:" = Show Synset (semantic) relations, "W:" = Show Word (lexical) relations Display options for sense: (gloss) "an example sentence" - S: (n) fire (the event of something burning (often destructive)) "they lost everything in the fire" - S: (n) fire, firing (the act of firing weapons or artillery at an enemy) "hold your fire until you can see the whites of their eyes"; "they retreated in the face of withering enemy fire" - S: (n) fire, flame, flaming (the process of combustion of inflammable materials producing heat and light and (often) smoke) "fire was one of our ancestors' first discoveries" - S: (n) fire (a fireplace in which a relatively small fire is burning) "they sat by the fire and talked" - S: (n) fire (once thought to be one of four elements composing the universe (Empedocles)) - S: (n) ardor, ardour, fervor, fervour, fervency, fire, fervidness (feelings of great warmth and intensity) "he spoke with great ardor" - S: (n) fire (fuel that is burning and is used as a means for cooking) "put the kettle on the fire"; "barbecue over an open fire" - S: (n) fire (a severe trial) "he went through fire and damnation" - S: (n) fire, attack, flak, flack, blast (intense adverse criticism) "Clinton directed his fire at the Republican Party"; "the government has come under attack"; "don't give me any flak" - S: (v) open fire, fire (start firing a weapon) - S: (v) fire, discharge (cause to go off) "fire a gun"; "fire a bullet" - S: (v) fire (bake in a kiln so as to harden) "fire pottery" - S: (v) displace, fire, give notice, can, dismiss, give the axe, send away, sack, force out, give the sack, terminate (terminate the employment of; discharge from an office or position) "The boss fired his secretary today"; "The company terminated 25% of its workers" - S: (v) fire, discharge, go off (go off or discharge) "The gun fired" - S: (v) fire (drive out or away by or as if by fire) "The soldiers were fired"; "Surrender fires the cold skepticism" - S: (v) arouse, elicit, enkindle, kindle, evoke, fire, raise, provoke (call forth (emotions, feelings, and responses)) "arouse pity"; "raise a smile"; "evoke sympathy" - S: (v) burn, fire, burn down (destroy by fire) "They burned the house and his diaries" - S: (v) fuel, fire (provide with fuel) "Oil fires the furnace" - S: (v) fire (generate an electrical impulse) "the neurons fired fast" - S: (v) fire, flame up (become ignited) "The furnace wouldn't fire" - S: (v) fire, light, ignite (start or maintain a fire in) "fire the furnace"
771
May 19, 2008 A vaccine created by University of Rochester Medical Center scientists prevents the development of Alzheimer's disease-like pathology in mice without causing inflammation or significant side effects. Vaccinated mice generated an immune response to the protein known as amyloid-beta peptide, which accumulates in what are called "amyloid plaques" in brains of people with Alzheimer's. The vaccinated mice demonstrated normal learning skills and functioning memory in spite of being genetically designed to develop an aggressive form of the disease. The Rochester scientists reported the findings in an article in the May issue of Molecular Therapy, the journal of The American Society of Gene Therapy. "Our study demonstrates that we can create a potent but safe version of a vaccine that utilizes the strategy of immune response shaping to prevent Alzheimer's-related pathologies and memory deficits," said William Bowers, associate professor of neurology and of microbiology and immunology at the Medical Center and lead author of the article. "The vaccinated mice not only performed better, we found no evidence of signature amyloid plaque in their brains." Alzheimer's is a progressive neurodegenerative disease associated with dementia and a decline in performance of normal activities. Hallmarks of the disease include the accumulation of amyloid plaques in the brains of patients and the loss of normal functioning tau, a protein that stabilizes the transport networks in neurons. Abnormal tau function eventually leads to another classic hallmark of Alzheimer's, neurofibrillary tangle in nerve cells. After several decades of exposure to these insults, neurons ultimately succumb and die, leading to progressively damaged learning and memory centers in the brain. The mice that received the vaccines were genetically engineered to express large amounts of amyloid beta protein. They also harbored a mutation that causes the tau-related tangle pathology. Prior to the start of the vaccine study, the mice were trained to navigate a maze using spatial clues. They were then tested periodically during the 10-month study on the amount of time and distance traveled to an escape pod and the number of errors made along the way. "What we found exciting was that by targeting one pathology of Alzheimer's -- amyloid beta -- we were able to also prevent the transition of tau from its normal form to a form found in the disease state," Bowers said. The goal of the vaccine is to prompt the immune system to recognize amyloid beta protein and remove it. To create the vaccine, Bowers and the research group use a herpes virus that is stripped of the viral genes that can cause disease or harm. They then load the virus container with the genetic code for amyloid beta and interleukin-4, a protein that stimulates immune responses involving type 2 T helper cells, which are lymphocytes that play an important role in the immune system. The research group tested several versions of a vaccine. Mice were given three injections of empty virus alone, a vaccine carrying only the amyloid beta genetic code, or a vaccine encoding both amyloid beta and interlueikin-4, which was found to be the most effective. "We have learned a great deal from this ongoing project," Bowers said. "Importantly, it has demonstrated the combined strengths of the gene delivery platform and the immune shaping concept for the creation of customized vaccines for Alzheimer's disease, as well as a number of other diseases. We are currently working on strategies we believe can make the vaccine even safer." Bowers expects the vaccine eventually to be tested in people, but due to the number of studies required to satisfy regulatory requirements, it could be three or more years before human trials testing this type of Alzheimer's vaccine occur. Grants from the National Institutes of Health supported the study. In addition to Bowers, authors of the Molecular Therapy article include Maria E. Frazer, Jennifer E. Hughes, Michael A. Mastrangelo and Jennifer Tibbens of the Medical Center and Howard J. Federoff of Georgetown University Medical Center. Other social bookmarking and sharing tools: Note: Materials may be edited for content and length. For further information, please contact the source cited above. Note: If no author is given, the source is cited instead.
105
The What Works Clearinghouse (WWC) was established in 2002 by the U.S. Department of Education's Institute of Education Sciences to provide educators, policymakers, and the public with a central and trusted source of scientific evidence of what works in education. The WWC is administered by the Department, through a contract to a joint venture of the American Institutes for Research and the Campbell Collaboration. To provide information needed by decision-makers, the WWC reviews and reports on existing studies of interventions (education programs, products, practices, and policies) in selected topic areas. WWC reviews of the evidence apply a set of standards that follow scientifically valid criteria for determining the effectiveness of these interventions. The WWC provides its findings in accessible, user-friendly, online reports, which include the following: - Reports on evaluation studies that pass the WWC standards - Reports on the research base for each identified intervention - Reports that synthesize the evaluation studies of interventions within defined topic areas A Technical Advisory Group (TAG) composed of the nation's leading experts in research design, program evaluation, and research synthesis advises on the standards for evaluation research reviews and monitors and informs the methodological aspects of WWC reviews and reports. The WWC is committed to ensuring that its products and services meet user needs and invites input from educators, policymakers, researchers, and members of the public. All products are available through the WWC website at www.whatworks.ed.gov
565
When the National Wild Turkey Federation (NWTF) was first founded in 1973 there were only 1.5 million wild turkeys across the U.S., Canada and Mexico. Today, it is estimated there are more than 5.6 million wild turkeys. In Utah, wild turkey restoration efforts continue to be the most aggressive in the nation. Over 2,800 wild turkeys have been relocated to suitable habitat areas in Utah since the winter of 1999. As a result, wild turkey permits have increased 20 percent for the spring 2002 season. However, this program will not be complete until over 200,000 wild turkeys roam the cottonwood river bottoms, pinyon/juniper, and ponderosa pine forests of the state. Whether you pursue wild turkeys as a hunter, or simply enjoy watching these magnificent birds in their natural surroundings, the time to view wild turkeys in Utah has never been better. At the forefront of this dramatic return in Utah, has been the Federation's volunteers, working side-by-side with the Utah Division of Wildlife Resources. Now, with most restoration efforts completed in the East, all eyes have shifted to the West, where the wild turkey continues to redefine it's own idea of suitable habitat. While the release of a wild turkey into western habitat remains one of the federation's most enduring symbols, it is just one brick in a foundation of good works that are impacting people's lives and the environment in many positive ways. Since 1977, the NWTF has spent over 144 million dollars on over 16,000 projects nationwide. The federation helps fund transplants, research projects, habitat acquisition, education, and the equipment needed to successfully accomplish these tasks. Through the Federation's regional habitat programs, volunteers have helped improve hundreds of thousands of acres by planting trees, crops, winter food sources and grasses that provide food and shelter for not only the wild turkey, but many others species of wildlife as well. Also improved in many areas, particularly in the west, has been water quality. Projects occurring right here in southeastern Utah include a San Rafael Desert guzzler, Knolls Ranch habitat improvement, and numerous other projects on the La Sal Mountains, Blue Mountains and Book Cliffs areas. This month the Price River chapter of the NWTF will be hosting it's annual Wild Turkey Banquet on January 26. For more information, please call (435) 259-9453.
389
|Paradise in Peril: Chilkoot's Brown Bears| by Lincoln Larson March 10, 2004 : The Chilkoot Brown Bear Project I uttered the habitual salutation as I began the trek down from my isolated research cabin to the banks of Southeast Alaskaís Chilkoot River. Although I saw no evidence of recent bear activity through the light of my headlamp, I had no intention of startling a 700-pound sow with cubs in the predawn of that cold, rainy September day. At 5:00 AM, I was the only human being walking along the river. As I approached my observation post, I heard splashing nearby. Straining my eyes in the darkness, I struggled to find the source of the commotion. Through my binoculars, I could just a make out the silhouette of a subadult grizzly devouring salmon carcasses on the riverís far bank, 60 meters away. At that distance, I was in no danger. Suddenly I froze. A large, dark form shot into my field of view, no more than 10 meters away. Even in the dark, I immediately recognized the shape of a large female brown bear. As I slowly and quietly backed away, two cubs ran up the bank and onto the road where I was standing. I managed to move behind the trunk of a spruce tree. My trembling fingers clutched the cannister of bear spray fastened to my beltóa last resort in case of a grizzly charge. The bears were obviously aware of my presence, but upwind, and in the dark, they were unable to locate my exact position. After over a minute of intense sniffing and scanning, the large sow eventually decided to saunter off downriver. The cubs bounded off behind her, and I breathed a heavy sigh of relief. I had emerged unscathed and transformed after my closest grizzly encounter while working on the Chilkoot Brown Bear Project. Chilkoot Study Area Inquisitive Subadult Bear : Studying the Chilkoot Bears The Chilkoot River flows about one mile out of Chilkoot Lake and into Lutak Sound, 10 miles north of Haines, Alaska. Every year, four different species of salmon (pink, sockeye, chum and coho) return to the river to spawn. The largest run occurs in September, when over 100,000 pinks and sockeyes (see note below) enter the icy waters to breed. The abundance of salmon attracts many predators to the Chilkoot each fall, including bald eagles and grizzly bears. Hundreds of fishermen and tourists also follow the salmon upstream to capitalize on the extraordinary angling and wildlife-viewing opportunities. This unique situation, a wild Alaskan River with easy road access, raises multiple conservation issues centered on the preservation of Chilkootís grizzly bears. Taking advantage of the ideal setting, the Brown Bear Project focuses on bear foraging ecology and habitat use patterns in relation to the riverís human activity. For two months beginning in mid-August, the research team observed and recorded bear and human behavior along the river corridor. We were stationed at designated points along the river for three-hour shifts at sunrise and sunset (mixed with the occasional midday observation). Though spectators avoided the river on cold, rainy days, adverse weather conditions did not deter the bears or the researchers. We logged many hours huddled in freezing rain, inspired by the rapture of field biology and our majestic surroundings. The observation posts were concealed and did not obstruct bear access routes to the river. As a result, both tourists and bruins were rarely aware of our presence. Using video cameras, binoculars, and tape recorders, we documented human and bear activity throughout the three-hour periods. From August to October, we viewed 16 different bears (not counting cubs) foraging along the Chilkoot River. Each of these bears was either an adult female (some with litters of up to four cubs) or a subadult (age 2-3 years). The large males presumably stayed deeper in the mountains, farther from the threats posed by hunters and civilization. During the project, I became very familiar with all the individual bears and their idiosyncrasies. The grizzlies displayed a variety of different fishing techniques. While many of the subadults ran, jumped, and futilely flailed at fish in the swiftly moving water, the older bears had clearly refined their skills. One mother preferred snorkeling for salmon, another opted to wait patiently before plunging on unfortunate passersby, and another had mastered a herding technique, chasing fish into pools with no outlets. The cubs enthusiastically attempted to imitate their mothersí tactics, but experienced little success. They often left the water and frolicked on the riverbanks, anxiously awaiting the delivery of their next meal. As the season progressed, the bears began to consume fish carcasses at a higher rate. Live fish offer a richer energy content but, with hibernation looming, bears desperate to pack on the pounds seemed to prefer quantity instead of quality. Individual bears developed certain routines that made their spatial and temporal habitat use patterns very predictable. One adult female emerged from the same spot in the forest at exactly the same time (virtually down to the minute) for five consecutive days, constantly fishing the same segment of the river. With many bears in a relatively small area (up to seven bears were sometimes visible along a 100 meter stretch of river), confrontations and chases between grizzlies unwilling to share fishing spots often occurred. Sows with cubs dominated the riverís feeding hierarchy, and smaller subadults were frequently forced to retreat. All the bears faced one common obstacle, however: human disturbances. NOTE: Fish counts are conducted at the Weir, a man-made structure composed of a series of closely-spaced bars designed to block fish movement upstream while permitting the free flow of water. A few bars are lifted several times a day, creating a small opening through which fish can pass. Fish & Game Officials count the salmon as they swim by. After spawning, the salmon die and their bodies float downstream. Bears often congregate at the Weir early in the morning to pick the fish carcasses off the bars. Fishing Along the Chilkoot Subadult Feeding on Carcasses : The Impacts of Human Activity Evidence indicates that human activity greatly influences brown bear activity. Bears were most active in the extreme early morning and late evening, corresponding to the minimum in angler and vehicle densities. Bears in more remote locations, such as Alaskaís Katmai National Park, prefer to fish during the daylight hours when live fish capture rates are much higher. The Chilkoot grizzlies, however, choose to forage in the dark to eliminate human disturbances. With humans in the vicinity, the bears experienced decreased fishing success and often resorted to eating fish carcasses while maintaining constant vigilance. In some instances, vehicle traffic along the road was so heavy that bears were denied access to the river. Sows with cubs generally showed less tolerance for humans, possibly due to the recent shootings of several young bears that some members of the local community perceived as threats. In most cases, these cubs discovered garbage that had not been properly disposed, and they began to associate humans with food. Food-conditioned bears are reluctant to exploit the valuable salmon resource of the river, electing to scavenge trash cans and fishermenís coolers in search of an easier meal. As people from around the world flock to the Chilkoot River each fall to witness the amazing bear-feeding spectacle, the number and intensity of bear-human interactions will continue to grow. Men and bears are capable of coexistence, but the volatile situation along the Chilkoot demonstrates that proper management techniques are necessary to ensure a relationship beneficial to both species. We must give the animals some space in order to encourage and appreciate their natural behavior. As my experience with the Chilkoot brown bears confirms, the common perception of grizzlies as menacing monsters and man-killers is completely unwarranted. While the bears certainly offer an imposing, commanding presence, they are generally benign, intelligent creatures that should be revered, not feared. The Chilkoot River System provides an excellent case study for wildlife management techniques around Alaskaís salmon streams. If we can understand the effects of human habitat use and recreation in this river ecosystem, we can begin to develop strategies for protecting bears in other areas. Special thanks to Lori and Anthony Crupi, founder and director of the Chilkoot Brown Bear Project. About the author: Lincoln Larson is a recent graduate of Duke University (Durham, North Carolina) and an aspiring field biologist.
1
Aswan High Dam on the Nile River Aswan-- On 15 January 1971, Egypt celebrated the completion of the High Dam, whose funding was the center of a Cold War dispute that led to the 1956 Suez War. Located on the Upper Nile, around 1000km downstream from Cairo, the gigantic mountain of concrete and steel is among the 20th century's most elaborate engineering work. Aswan High Dam on the Nile River is located at the north end of Lake Nasser. The construction of the High Dam began in 1960, and it was officially inaugurated ten years later, at a cost of US$1 billion, much of which was provided by the former Soviet Union. The dam stores 160 billion cubic meters of water, and the reservoir behind it, named Lake Nasser, stretches some 350km into Egypt and 150km into Sudan. It is a symbol for Egyptians patience and challenge. The Suez Crisis began on 26 July 1956 when Egyptian President Gamal Abdel Nasser nationalised the Suez Canal. The move was in response to a decision by the United States and Britain to withdraw finance for the Aswan High Dam - a massive project to bring water to the Nile valley and electricity to develop Egypt's industry - because of Egypt's political and military ties to the Soviet Union. The world-famous High Dam was an engineering miracle when it was built in the 1960s. Today it provides irrigation and electricity for the whole of Egypt and, together with the old Aswan Dam, 6km downriver, wonderful views for visitors. From the top of the two mile-long High Dam you can gaze across Lake Nasser, the huge reservoir created when it was built to Kalabsha temple in the south and the huge power station to the north. The story of the High Dam was a tale of a nation, hikayit sha‘b, as Abdel Halim Hafiz chanted in an iconic song from the Nasserist period. This nation lived under the yoke of British colonialism for over 70 years. After gaining independence, Egypt's revolutionary president, Colonel Gamal Abdel Nasser, approached the World Bank to finance the construction of a dam on the Nile, a vital step towards economic development. The World Bank refused. In an audacious challenge to old and new imperialism, Nasser nationalized the Suez Canal in 1956 to acquire funding for the project. The struggling nation heroically endured subsequent military assaults and a trade embargo. The dam was eventually built. The story of the High Dam at Aswan is indeed the tale of this nation. The stages of its history chronicle critical transformations in Egyptian history at large. During the last half century, the dam moved from being a celebrated monument to Egyptian independence to a forgotten barrage deep in the country's south. It was a state-engineered tool of anti-imperialist propaganda, whose splendor faded away with the downfall and fundamental reversion of the anti-imperial project. In other words Egypt had monopoly of the waters. On behalf of its colonial possessions - Sudan, Kenya, Tanzania and Uganda - Britain, which was primarily concerned with the Suez Canal and the passage to India, signed away their most precious resource. Egypt had the right to veto any project along the Nile and full rights of inspection. In 1959, this deal was overtaken by a new agreement between Egypt and Sudan splitting the waters 75 per cent to 25 per cent and guaranteeing Cairo "full control of the river". The results of this control are nowhere more clearly seen than at Lake Nasser, a man-made reservoir 550km-long, created when Egypt completed the Aswan high dam. The country's largest engineering project took six years to build and another five years to fill. Some 55.5 billion cu m of water gush from the Aswan dam into Egypt annually. It has enabled Cairo to regulate the life-giving annual flood, to irrigate its otherwise parched landscape, and at the point it was finished supplied half the country's electricity needs. Nasser was in need of a success, a success to rival that of the Suez Canal, which is a 190 km-long man-made waterway linking the Mediterranean with the Red Sea. The French dug the Suez Canal 97 years before Nasser took the decision to nationalize it. Nasser took the decision to nationalize the Suez Canal just two years before it was supposed to revert back to Egyptian control. This was used as justification by three countries [Britain, France and Israel] to launch a tripartite strike against Egypt. The President's decision to cancel the contract just two years before its expiry date made it seem like Nasser was seeking a popular confrontation. The difference is that the Aswan High Dam is a success story, whereas the Suez Canal was a story of conflict. The High Dam is a witness of the history of Egypt's relationship with the Soviet Union, which continued throughout Nasser's rule. The Aswan High Dam is considered to be the most important construction of the Nasser regime. Abu Simbel, Egypt — In the 1960s, rising waters from a new dam threatened to submerge the temples and monuments of Nubia, the ancient home of black pharaohs in Egypt's far south. To preserve them, the antiquities were dismantled, moved and reconstructed. Today, most of the surviving monuments can be seen only from the lake created by the waters that nearly destroyed them. A short flight from Aswan is Abu Simbel and the Great Temple of Ramses II, and the gods of creation and light, Ptah, Amen and Heru-khuti is the most iconic Ancient Egyptian sight after the Pyramids. The temple has four massive statues of Ramses II and the gods Ra-Horakhty, Amun and Ptah at its entrance. Beyond lie two pillared halls and the sacred sanctuary. Every wall and ceiling is a storybook art gallery of this extraordinary pharaoh's life. (He lived to 90 and is said to have fathered more than 200 children). Know more details about Visiting Temples of Ramses II at Abu Simbel, Aswan Construction of the high dam was an enormous national project that every Egyptian contributed to. Nubians in particular sacrificed their possessions, including 45 Nubian villages lying on 300 square kilometers of land and one million palm trees. They were moved from a paradise on the banks of the Nile. These treasures are all submerged under water now. Along with the loss of the land, there was also the loss of heritage, values, memories and lifestyle, and, above all proximity to the water, the primary source of life. For More Information Visit: Aswan Tourism and Tourist Information Cruise ships on Egypt's Lake Nasser visit the ancient temples of Nubia's black pharaohs: The Aswan High Dam: A Political Witness: http://aawsat.com/english/news.asp?section=2&id=19640 Memories of a high dam: http://www.almasryalyoum.com/en/news/memories-dam-high-dam%E2%80%A6 Suez Crisis: Key players: http://news.bbc.co.uk/2/hi/5195582.stm Nile deal brings countries to boiling point over water: http://www.nzherald.co.nz/world/news/article.cfm?c_id=2&objectid=10648772
844
Written By Dan Suthers based on explanations by Scott Ferguson, June Firing, Kyle Hogrefe, and Danny Merritt. Physical Oceanography studies the movement of ocean water (ranging from small scale oscillations to basin-wide flows) and the physical and chemical characteristics of that water (e.g., temperature and salinity). Most research on currents and water characteristics has focused on large scale patterns, such as gyres that flow around ocean basins . Water of different densities does not mix easily. Density depends on temperature and salinity. Therefore, if you measure the temperature and salinity of water at different depths you can track the same body of water as it moves around an ocean basin (e.g., the North Pacific) and even around the globe. In this research, measurements are often taken on a large scale. For example, during a transect a ship might make measurements of water temperature and salinity at different depths, but do so only at every degree of longitude or latitude: about every 60 miles. One square kilometer is a standard resolution for satellites that calculate sea surface temperature. This research helps us understand major influences on reef life, such as transport of warm or cold water, nutrients, and possibly organisms from one region to another. However, the data gathered for oceanography at this scale is not detailed enough to understand how water characteristics influence life at a local level. Reef-specific oceanography studies the currents and water characteristics on a local scale. The topography of a reef--where it's shallow and deep; how it's situated relative to ocean currents and prevailing winds--can influence water temperature and the distribution of nutrients beyond what can be predicted by looking only at large scale currents in the region of the reef. Marine biologists such as those on this expedition study the distribution of marine life on a local scale, comparing for example life at different depths and within and outside an atoll, as well comparing reefs at different locations in the island chain. In order to understand the distribution of life they are seeing, they need reef-specific oceanographic data. Data for reef-specific oceanography is being gathered by taking direct measurements while we are up here, by leaving sensors in place that send their data back by satellite or are retrieved later, and by satellite imagery. The first two forms of data, measured directly on site, help scientists to "ground truth" satellite data: observations in the field are compared to what the satellite sees so that we know how to interpret the images. Reef Oceanography data is being gathered on this expedition by two teams: Night Operations (Scott Ferguson, assisted by Drew Rapp), who operate off the Hi`ialakai; and the Mooring Team (Elizabeth Keenan, Danny Merritt, Stephani Holzwarth, and team leader Kyle Hogrefe), who operate off of the jet boat HI-2. The instruments they use and what they measure are described below. As we consider this diverse collection of instruments we should keep in mind that they are all contributing to the same objective: to have an empirically based model of how ocean water characteristics are distributed across space and time. The most important water characteristic studied from the point of view of reef health is temperature. See our article on coral bleaching for a discussion of how temperature can affect the symbiotic relationship between coral and algae. Reef life is also strongly affected by the availability of nutrients. Both temperature and nutrients, in turn, are affected by the movement of water, so some of the measurements made are intended to give a profile of the bodies of water surrounding reefs. Yearly Water Column Measurements Some measurements are only taken about once a year, when researchers can come up to the locations where the measurements are made. Ship-based CTDs. The Night Operations team conduct Conductivity, Temperature and Depth or "CTD" measurements at several locations around the reef. (They also make observations with a Towed Optical Assessment Device, but this is for unrelated purposes: see the September 18th journal for a brief description.) The CTD deployed by Night Operations is a large device that can reach 500 meters in depth, taking up to five water samples at different depths, and making other measurements on a continuous basis on the the way down and up. Temperature and pressure are measured directly. Salinity is measured indirectly by measuring the conductivity of water to electricity. Chlorophyll is measured indirectly by a fluorometer that emits purple light ("black light") and measures fluorescence in response to that light. These measurements are made continuously, providing a profile of temperature, salinity, and chlorophyll as a function of depth. The photograph shows the dta from a test run of the CTD, including temperature (blue), salinity (red) and density (green). Analysis of the water samples will tell scientists how much chlorophyll is actually in the water. This information can then be compared to the measurements of the flurometer to see how well it predicts levels of chlorophyll. The presence of chlorophyll is a good sign of producivity: the food chain is built on phytoplankton (microscopic plants) that produce food energy from light energy. They are eaten by microscopic zooplankton (floating animals), which in turn are eaten by larger animals, and so on. Shipboard CTD measurements are typically taken at three locations around a given island or atoll: the windward and leeward sides, and at a standard oceanographic "station" assigned to each island or atoll that is being surveyed over a long period of time. There is one such station per each major island or atoll in the NWHI: Nihoa, Necker, French Frigate Shoals, Gardner, Maro Reef, Laysan, Lisanski, Pearl and Hermes, Midway, and Kure. Shallow water CTDs. In order to understand the local reef ecosystem, we need measurements at more locations than just three, and we need to sample in shallower water than the ship can operate in. For these reasons, the oceanographers aboard make other measurements from the HI-2 jetboat. These measurements are taken every mile or two around the island/atoll between the 80 and 120 foot isobath and inside the atolls in a few places as well, providing greater resolution. A handheld CTD device is pictured. Like its big brother, it includes a temperature sensor, a depth sensor, and a conductivity sensor (for salinity). The handheld device also has transmissometer that measures the level of particulate matter in the water (a proxy for turbidity). It does so by shining a light at a sensor and seeing how much of that light gets through the water. These measurements are also made continuously as the device descends and ascends. Unlike the larger version, the small boat CTD does not take water samples and does not have a fluormeter. Separate devices are used for these purposes. Water samples are taken by a handheld device consisting of a tube with spring loaded caps at both ends. The caps are set in the open position so water can flow through the tube as it descends. A weight is then slid down the supporting rope to hit a trigger and close the caps. The sampler is then taken to the surface, where the water is used to first rinse out a sample bottle (to avoid contamination from other water), and then the sample bottle is filled. The bottle is opaque to prevent further modification of the chlorophyll content by light. (Water from the large CTD is also stored in these same bottles.) Water samples are typically taken at three depths, 5, 30 and 60 feet, measured out by marks on the rope holding the sampling device. A radiometer on the small boat plays the role of the fluorometer, and also gives important information about available solar radiation. Two radiometers are coupled together to take readings above and below water. A instrument on the boat reads the amount of light arriving at the ocean surface. Another instrument is put in the water to read the light reflected back from the water. This is compared to the former surface measurement for reference. These measurements are made at light frequencies relevant to photosynthesis. By reading reflected light at certain wavelenghths, scientists can tell how much chlorophyll is in the water. Time Series Measurements The measurements just described provide a lot of detail about the water at a given location and different depths, but only at one or a few points in time: when the scientists can come up here. To fully understand an ecosystem, we need to monitor it over many years. The instruments described in this section record a series of measurements of water characteristics over time. They include CREWS buoys, SST buoys, and SST "pipe bombs." CREWS Buoys. These are large buoys (pictured) that are anchored at a specific location and can send data back daily to scientists via satellite. CREWS stands for Coral Reef Early Warning System, reflecting a major function of these buoys: to warn scientists as soon as possible of an unusual change taking place in the environment of a coral reef ecosystem. These buoys have sensors both in and above the water that measure water and air temperature, water salinity (via conductivity), wind speed, and barometric pressure. A few of them also have radiometers, but these can only be located where staff can get to them every few weeks to clean the sensors. There is one at French Frigate Shoals, serviced by USGS staff on Tern Island. SST Buoys and Pipes. CREWS buoys are large and expensive, so other instruments are also used that measure fewer parameters but can be deployed in more locations. Sea Surface Temperature (SST) buoys are round floating buoys that are anchored in a specific location. They measure water temperature and send this data back at regular intervals via satellite. The "pipe bombs of science" are strapped to the reef at different depths and locations around an atoll. These are set to measure temperature every half an hour, and record it on a data chip. Scientists must come up to the NWHI and retrieve these devices in order to obtain the data. Tracking Water Movement Currents, tides and waves also affect reef life. The mooring team installs two further kinds of instruments to track these parameters. Now we can appreciate why they are always so busy! Wave and Tide Recorders (WTDs), record water pressure with high sensitivity, providing information about waves and tides. (When a wave passes over, or when the tide comes in, there is more water over the instrument and hence more pressure on it.) This instrument measures the tide 48 times a day, and records wave height 8 times a day in the process. Each measurement involves recording the pressure for 18 minutes, and then estimating wave and tide values based on changes in the pressure. They are deployed at 50 to 100 feet. The Ocean Data Platform (ODP) contains temperature and salinity sensors, as well as an Acoustic Doppler Profiler (ADP). The ADP can measure current speed and direction in multiple directions and at different depths. These are placed at 60-100 feet, "hopefully deeper than the wave energy you are trying to study," as Kyle put it after a day of trying to extract an ODP that had somehow flipped and gotten wedged in the rocks! Other instruments used by reef oceanographers are not described here because we don't have them on this expedition. Drifting buoys that follow water at 15 meters depth, measuring GPS position and water temperature over time, were not delivered to Honolulu in time for the expedition due to the hurricanes in Florida. Two other sensors will be installed on the Hi`ialakai later this year: an Acoustic Doppler Current Profiler that measures current velocity using the Doppler effect, and a sonar that measures biomass in the water column. Putting It All Together into a Model of the NWHI Visualize, if you will, a three dimensional model of the Northwestern Hawaiian Island chain. Imagine that we have represented this model in a computer such that we can attach the data gathered by the various devices just discussed to the corresponding location in the model. Now imagine that we can move a slider or use a play/fast forward/rewind control like on a video recorder to move this model through time, so we can store data taken at different times as well as different places. In other words, we have organized all the data collected in a four dimensional "space," where the first three dimensions are for the location of the various sensors discussed above (latitude, longitude, and depth) and the fourth dimension is for time. In some places in this model, we will have detailed information such as temperature, salinity, chlorophyll and light levels, etc., measured continuously over a number of years. In other places we will have only temperature, and in some places we have measurements only once a year. Finally, in most places we have no measurements at all! But we have taken our measurements at enough locations that we can "interpolate" or predict mathematically the values the measures would be at the points in between those we actually took. In some places and times we have different measures of the same thing. For example, we have the actual chlorophyll content of water and the estimate of that content taken by a radiometer or fluorometer; or we have the actual temperature and the estimated temperature taken by satellite. We can see how close these measurements are to each other, to better understand how we can use less expensive measures (such as a satellite) to estimate parameters that otherwise would require more expensive measures (sending people to the actual locations). All of this data organized in space and time provides a physical model of the ocean environment of reef ecosystems. Marine biologists can use this model to understand what is affecting the prevalence and health of the various organisms of the reef. We will see how marine biologists find out what organisms are present in another article. Garrison (2002)
561
Multiple sclerosis is a progressive disease for which no cure has yet been found. Researchers are working to identify new and better strategies to stop that progression. People with primary-progressive MS (read more about courses of MS) experience a slow but nearly continuous worsening of their disease from the onset, with no distinct relapses or remissions. A more common type of progressive MS is secondary-progressive MS, which starts as relapsing-remitting MS and then transitions into a progressive course, with or without occasional relapses. Some of the burning questions that are being addressed through research include: - What factors influence the transition from a largely relapsing-remitting course with distinct immune attacks to a largely progressive (steadily worsening) course (secondary-progressive MS)? - Can the disease-modifying therapies prevent, delay, or slow long-term MS progression? - What causes primary-progressive MS, and is it the same (currently unknown) thing that causes more common forms of MS? - What new therapies will help people with progressive MS? - What causes degeneration of nerve fibers—thought to be the cause of long-term disability experienced by many with MS—and how can that be stopped or reversed? Although many of the National MS Society’s research studies explore virtually every aspect of MS and more basic aspects of how the nervous system and immune system works, some studies focus specifically on progressive forms of MS. As part of its Strategic Response for 2011-2015, the National MS Society is increasing its focus on understanding mechanisms that drive MS progression and finding new therapies to treat it. Current projects involving people with progressive MS include: - Four different teams at Harvard and State University of New York, Buffalo using different methods and approaches to identify possible risk factors that drive progression, some of which may be preventable. Ideally, they will find ways to more quickly identify progressive disease based on biological markers, rather than waiting for symptoms to worsen. - A genetics study at Vanderbilt University looking at how variants in a person’s DNA may lead to progressive MS. - An imaging study of people with primary-progressive MS at Massachusetts General Hospital aimed at revealing spinal cord damage that is difficult to detect. - New York University researchers developing and applying a new way to assess cumulative disability over many functions to provide a tool to improve care and research. - MS Tissue Banks that provide shared resources to empower investigations into disease mechanisms. - Clinical trials at the University of Alabama at Birmingham and University of Illinois, Urbana Champaign, of novel rehabilitation strategies aimed at restoring mobility in people with progressive and advanced MS. A Cleveland Clinic study evaluating a new "hip flexion assist device" designed to improve walking ability. - A Fast Forward alliance to accelerate the clinical application of adult stem cells for MS including progressive MS. - Drexel University researchers examining driving ability at various stages of MS progression to improve safety and independence. - A clinical trial at the University of California, Los Angeles testing the ability of aerobic exercise to improve cognitive function. - A study at Buffalo General Hospital investigating changes in the brain (atrophy) that may lead to personality and behavior disorders in MS and the impact of those disorders on disease course and quality of life. - Oregon Health & Science University pilot study evaluating the sensitivity of an electronic instrument to detect and measure gait and mobility changes in people with MS. - In collaboration with the MS Society of Canada, the Society has funded seven research projects focusing on whether CCSVI (vein blockages) plays a role in the MS disease process. - Shared DNA bank at the University of California, San Francisco, propelling studies aimed at identifying genes that make people susceptible to developing MS, and genes that may influence course and severity.
80
NetWellness is a global, community service providing quality, unbiased health information from our partner university faculty. NetWellness is commercial-free and does not accept advertising. Saturday, May 18, 2013 Cold and Flu Catching Colds and Flu I wasn`t sure which catergory this would come under, but it involves catching a cold or the flu. I know that germs are the cause of getting these conditions and being outside in the cold whether without a jacket doesn`t cause someone to get them. But someone told me that if you are exposed to a cold environment and then warm one, back and forth, it can make someone sick with the cold or the flu, and does involve germs somehow. If that is true, can you please explain how that happens? Thanks A cold or flu is caused by a viral infection, and viruses tend to be very contagious. They are spread primarily by droplets, or in other words, by saliva and mucus either sprayed into the air or by direct human contact. Going repeatedly from a cold to a warm environment and back should not increase one's chances to become infected. However, when the weather turns colder, people tend to begin spending more time indoors. This creates closer human contact and thereby increases the likelihood of infection. This is in large part why cold and flu season is during the colder months. Allen M Seiden, MD Professor of Otolaryngology, Director of Division of Rhinology and Sinus Disorders, Director of University Taste and Smell Center, Director of University Sinus and Allergy College of Medicine University of Cincinnati
205
17 entries found for ball. The first 10 are listed below. To select an entry, click on it. Main Entry: 1ball Etymology: Middle English bal "ball" 1 a: something round or roundish <a ball of twine> b: a usually round object used in a game or sport c: a usually round shot for a firearm d: the rounded bulge at the base of the thumb; also: the rounded wide part of the bottom of the human foot between the toes and arch 2: a game or sport (as baseball) played with a ball <play ball> 3: a pitched baseball that fails to pass through the strike zone and is not struck at by the batter
34
Establishing awareness of intellectual property amongst staff of your company is essential for early maximizing the value of your intellectual property and the wealth of your business and reducing the possibilities of accidental non-confidential disclosures, that could prejudice successful patent applications and negatively affect the value of your intellectual property and ultimately the wealth of your business. Regular training sessions of staff on intellectual property are key and should include the following: how to identify and protect intellectual property; how to use patents to improvements of technology; understanding Patent Process; how to deal with confidential information (see some examples in the scenarios below); record keeping of intellectual property, including laboratory notebooks and policy on intellectual property; and who to contact in case of need. The record keeping procedures and manuals will address the following questions: has the inventor kept the idea confidential? is there a written description of the idea and has been kept safe and confidential? how the idea has been generated? If during a collaborative programme, then was it agreed beforehand who owns what? is the idea a new product, a new material, a new process for making something? If so, is it patentable or protectable in any other way? is the idea a variation in a product or material or process? If so, it is still likely to be patentable or protectable in any other way? who generated the idea? The answer to this question is very important in the event self-employed or other third party consultants are involved in any research and development or collaborative project. The main object of this record keeping is to track, protect and maintain all relevant intellectual property rights of the business so that intellectual property can be licensed, assigned or exploited to the fullest extent and benefit of the company. The record keeping procedures should also include a form upon which, potential inventions should be recorded identifying the following: Who: department and research area; Named individuals: inventors and authors; What: technical description; Why: perceived novelty; How to use the information: potential applications/markets; What else is needed: background or third party intellectual property and information. The correct use of laboratory notebooks by staff is also essential. In the event of a dispute laboratory notebooks may be required to be presented as legal evidence. It is therefore recommended that: permanent bindings are used on notebooks (loose leaf books should be avoided to prevent possible removal or substitution of pages); pages should be numbered and any additional drawings cards or computer printouts should be permanently attached to the notebook clearly identified and have reference made to them in the notebook; all projects related and other activities, such as breaks in research due to secondment or holiday should be recorded factually; and the notebook should be reviewed regularly by someone who understands the technology involved, each page should ideally be signed by a witness and again the choice of the witness is important and should not be someone who may be nominated as core inventor. The witness should also sign and date and graphs, chart, printouts, which are inserted into the laboratory notebook. In addition, to the use of appropriate record keeping procedures and notebooks, an evaluation of IPR policy should be adopted. Such an evaluation should include factors, such as potential market, market, impact, competitive products, timing, intellectual property protection available and experience in the field concerned. Finally, once relevant intellectual property rights have been identified, protected, exploited and enforced, it is advisable that, regular audit of such rights is undertaken to ensure that, the intellectual property rights reflect the current needs of the business and that expenditure is limited accordingly. How to take care of confidential information: Scenario 1 – Have you been asked to sign a confidentiality undertaking? If so, please check that it is only confidentiality restriction and not a transfer of intellectual rights. Obtain express confirmation from the discloser, that the information is not confidential, where possible, before disclosure. Make a written record of what was disclosed, by whom and when. Please remember that, an obligation, to keep information confidential, includes the obligation of not disclosure or not use of the information, without the permission of the person to whom the obligation is owned. Scenario 2 – Put in writing or some other permanent form. Mark any documents with appropriate confidentiality and IPR disclaimers. Keep a copy of what is disclosed and a record of when and to whom. If an oral disclosure is made in confidence, confirm in writing what was disclosed and what was given in confidence. Have the recipient sign a confidentiality undertaking of the disclosure. Scenario 3 – Consider whether anything in the paper describes a new device, chemical compound or manufacturing process or a significant improvement or modification to any such matters. Do not disclose anything, without first considering the possibility of the content of the papers being patentable in whole or in part. Consider whether there are any restrains, under any relevant agreements (including research and development or collaboration agreements). Keep an eye on any relevant timetable for confirming publication. Request that, the publisher confirms confidentiality on receipt of paper pending decision on publication. Please, always remember that, any document exchanged, should be clearly marked as being confidential. Scenario 4 – Consider what background IPR, if any, are free from obligations of confidentiality and may be introduced to the project. Prior to disclosing any information to third parties, have a confidentiality agreement signed. Such agreements, may take many forms and the terms should be adjusted in accordance with the particular circumstances. You should always include the following: - identification of parties; - what information is to be kept secret; and - for how long. If in any doubt, consult your legal adviser. The World Intellectual Property Rights Organization, WIPO has organized a three day workshop to educate the public on intellectual property rights. The initiative started today at the Coco palm hotel. The drive which is aimed at sensitizing St. Lucians to intellectual property rights issues will also include a public forum for persons interested in learning more about the issue. Video Rating: 0 / 5 The expression, ‘intellectual property’ has come to be internationally recognized as covering mainly two branches, namely; ‘industrial property’ and ‘copyright’. Patents, industrial designs and trade marks used to be considered as different kinds of industrial property. In Bangladesh (during the time of the then British regime), the first legislation of its kind, on copyright was introduced in 1914, which was mainly based on the British Copyright law of 1911. After the independence from Britain new law on copyright was promulgated in 1962. The Copyright Ordinance 1962 has been replaced by the new copyright act of 2000. Now in our country, Copyright law is regulated by the Copyright Act 2000. This is done because of the prevailing situation in Bangladesh and around the world. In case of patent and designs we have law which we inherited from our Colonial ruler. Patent rights are created by statute and governed by the Patent and Designs Act 1911. We have also law related to trademarks and it is regulated by the Trademarks Act 1940. Intellectual property has acquired an internationally recognized character. Now it is regarded as “one of the most important sectors” of international law, having its source in various international conventions. At present, each and every country is trying to shape or reshape their legislature, relating to intellectual property; in the light of those international conventions. The convention establishing the World Intellectual Property Organization (WIPO), concluded in Stockholm on July 14th, 1967, provides that, ‘intellectual property’ shall include rights relating to: 1. literary, artistic and scientific works, 2. performances of performing artists, phonograms and broadcasts, 3. inventions in all fields of human endeavor, 4. scientific discoveries, 5. industrial designs, 6. trade marks, service marks and commercial names and designations, 7. protection against unfair competition, And all other rights resulting from intellectual activity in the industrial, scientific, literary or artistic fields. (Article 2/VIII) 1 Intellectual property protects application of ideas and information that are of commercial value.2 By virtue of a number of international conventions such as the, Berne Convention and the Universal Copyright Convention, copyright acquired in one country extends to other countries which are member of these conventions. Other intellectual properties are beginning to acquire the same nature as well. The principles of intellectual property law are substantially the same in all countries with little variation to meet the national requirements of each of the countries. Bangladesh, as a least developed country, has also enacted intellectual property law in its national legislature. The Trade Related aspects of Intellectual Property rights (TRIPs) were included as integral part of World Trade Organization (WTO) due to pressure and interest of basically transnational companies and developed countries to ensure maximum profit or interest out of intellectual property in international trade.3 The TRIPs Agreement has been called the most ambitious international intellectual property convention ever attempted. TRIPs agreement has established the protection of intellectual property as a major part of the multinational trading system embodied in the WTO. As one commentator observer, intellectual property is now a key component of this trading system, “the protection of intellectual property is one of the three pillars of the WTO”.4 Bangladesh is now enjoying the transitional period that has been fixed by WTO under the light of TRIPs. So, we do not have a clear idea about the relation between intellectual property rights and economical development. But, it is certain that after the expiration of transitional period, Bangladesh will have to face a serious and severe situation because of the weak legal framework relating to intellectual property. Now, in brief, the main features of intellectual property laws are given below: 1. The Patents and Designs Acts, 1911:- (Act no. 11 of 1911) The salient features of our existing Act are as follows; Part-1; of the Patents and Designs Act, 1911; is about of patent. This part starts from section-1 and extends to section-42. Section 2(8) contains the definition of invention; it proceeds as – invention means any manner of new manufacture and includes an improvement and all alleged invention. In sub-section (10) of the same section, provides the explanation of manufacture, “manufacture includes any art, process or manner or producing, preparing or making any article and also any article prepared or produced by manufacturer.” Section-3 of the Act provides about the manner and mode of an application for patent. According to section-3(1); a patent application can be made by any person, whether he is a citizen of Bangladesh or not. An application can be made, alone or jointly with any other person. According to section-4 of the Act; there are some provisions about specification. Wection-4(2) states that, a complete specification must particularly describe and ascertain the nature of the invention and the manner in which the invention is to be performed. Section-10 of the Act, discusses about the topic, “grant and sealing of patent”. According to section-10(1); if there is no opposition of the patent application or, in case of opposition, if the determination is in favor of the grant of a patent, a patent shall, on payment of the prescribed fee, be granted, subject to such conditions if any as the Government thinks expedient, to the applicant, or in the case of a joint application to the applicants jointly, and the Controller shall cause the patent to be sealed with the seal of the Patent Office. Term of patent, is laid down in section-14(1) of the Act. The duration of patent is sixteen years from its date. Section 15 of the Act; also provides rules regarding extension of the term of patent. If any patent has been ceased, owing to the failure of patentee to pay any prescribed fee within the prescribed time, the patentee may apply to the controller in the prescribed manner for an order for the restoration of the patent. Section-16 of the Act deals with the matter, restoration of lapsed patent. Section-22 of the Act contains provisions of “Compulsory Licenses and Revocation”. Both the Govt. and High Court Division are empowered to grant compulsory license or revocation of patent. Any person interested may present a petition to the Govt., alleging that the demand for a patented article in Bangladesh is not being met to an adequate extent and on reasonable terms and praying for the grant of a compulsory license, or in the alternative, for the revocation of the patent. According to section-25 of the Act, if any patented invention or the mode which it is exercised; is mischievous to the state or prejudicial to the public; Govt. can declare the patent, revoked, by notification in the official Gazette. Section-26 of the Act; provides the grounds, on which; a patent can be revoked by the High Court Division. Section-26(2) also provides, who can present a petition for revocation of a patent. Section-30 of the Act; declares that; an innocent infringer of a patent; is exempted from liability or damages for infringement. Part-II of the Act; describes all about ‘Designs’ or industrial designs. According to section-43(1); any person claiming to be the proprietor of any new or original design not previously published in Bangladesh, can apply to the Controller for the registration of that particular design. According to section-47(1); the proprietor of a registered design, shall subject to the provisions of this Act, have copyright in the design during five years from the date of registration. Section-51(A) of the Act; narrates that, any person interested may present a petition for the cancellation of the registration of a design. Such petition should be presented to the High Court Division. Part-III of the Act; is about, Patent Office and proceedings there at. According to section-59 of the Act; every register kept under this Act shall at any convenient times be open to the inspection of the public, subject to provisions of this Act. Section-65 of the Act; states that, in any proceeding under this Act, the Controller shall have the powers of a Civil Court for the purpose of receiving evidence, administrating oaths, enforcing the attendance of witness compelling the discovery and production of documents, issuing commissions, for the examining of witnesses and awarding costs and such award shall be executable in any Court having jurisdiction as if it were a decree of that Court.5 2. The Trade Marks Act; 1940: (Act No. V of 1940) The basic principles of the Trade marks Act are described below: Section-2 of the Trade marks Act contains definitions that are related to this Act. As to, section-2(k); trade mark means a mark used or proposed to be used in relation to goods for the purpose of indicating or so as to indicate a connection in the course of trade between the goods and some person having the right, either as proprietor or as registered user, to use the mark whether with or without any indication of that identity of that person. The establishment of Trade marks Registry at Dhaka, appointment of the Registrar and Deputy Registrar are laid down in section-4 of the Act. According to section-5 of the Act; the registration of a trade mark, requires distinctiveness. Purpose of such distinctiveness is to distinguish those particular goods from the others, which have similarity in nature. Any mark, containing scandalous design; or be likely to hurt the religious susceptibilities of any class of the citizens, or to be contrary to any law for the time being in force or morality is prohibited for registration of that mark. Section-8 of the Act, say so. Section-16 of the Act; provides that; when an application for registration of a trade mark has been accepted and either has not been opposed or having been opposed, has been decided in favor of the applicant, the Registrar shall, registers the said trade mark. Section-18 of the Act, says that; the registration of a trade mark shall be a period of seven years, and may be renewed from time to time in accordance with the provisions of this section. According to section-20 of the Act; no person shall be entitled to institute any proceedings to prevent, or recover damages for the infringement of an unregistered trade mark. According to section-46 of the Act; any person aggrieved can apply to the High Court Division or the Registrar, for the cancellation or verification of the registration of a trade mark on the ground of any contravention of, or failure to observe a condition entered on the register in relation there to. Chapter-IX of the Act; is specially written down for textile goods. Chapter-X of the Act, states the provisions regarding offences and restriction of use of Royal Arms and state emblems. According to section-73 of the Act, any suit for the infringement of a trade mark or otherwise relating to any right in the trade mark; shall be instituted to a District Court having jurisdiction to try the suit.6 3. THE COPYRIGHT ACT; 2000: (Act No. 28 of 2000) A short overview:- Section-2 of the Copyright Act; provides all the definitions related to copyright and so on. According to Chapter II; section -9, 10 and 11; Copyright Board will consist and the post of Register has made. The board is a quasi-judicial body; while working, it would be deemed as a Civil Court. Definition of copyright is laid down in Chapter III; section 14 of the Act. Section 14(2) includes, ‘computer programs’ as a subject to this Act. Chapter IV; deals with the ownership of copyright and the rights of the copyright owner. This Chapter starts from section-17; ends to section-23. Chapter V of the Act; describes all about the term of different types of copyright. Generally the term extends from the lifetime of the author until sixty years from the beginning of the calendar year next following the year in which the author dies; is at section-22. The section also provides that, copyright shall subsist in any literary, dramatic, musical or artistic work (other than a photograph). Section-25 to section-32 of the Act narrates the duration of copyright for different types. For instance, posthumous work, cinematograph films, sound recordings, photograph, anonymous and pseudonymous works, Govt. works, work of any local body, work of international organizations. Section-50 of the Act; deals with compulsory licenses in works withheld from public. Chapter X of the Act is about, registration of copyright. Chapter XII; section-71, describes about infringement of copyright and section-72 of the Act; provides acts not to be infringement of copyright. Chapter XIV; is about Civil remedies, that are available against infringement of copyright. Exclusively, section-76 of the Act; provides, remedies against such infringement. According to section-81 if the Act; the Court of District Judge, is the Court of first instance of such proceedings. Chapter XV of this Act; describes offences and punishment. According to section-82 of the Act; any person who knowingly infringes or abets the infringement of copyright; shall be punishable with imprisonment for a term which shall not be less than six months. But, which may extend to four years and fine which shall not be less than fifty thousand taka but which may extend to Taka two lacks. But; where the infringement has not been made for gain in the course of trade or business; the Court may, adequate and special reasons to be mentioned in the judgment, impose a sentence of imprisonment for a term of less than six months or a fine of less than fifty thousand taka. According to section-95 of the Act; an order made by the Registrar is a subject to appeal to Copyright Board. According to section-96; against any order; made by the Board; any aggrieved person, within thirty days of such order can file a petition of appeal to the High Court Division.7 PROBLEMES AND INSUFFICIENCY OF THE EXISTING INTELLECTUAL PROPERTY LAWS: PATENTS AND DESIGNS ACT:- The defects are;- Like any other national patent system, novelty is an essential requirement of an invention to be patentable under the existing law of our country. But it is clear from the definition of ‘invention’ in section-2(8) of the 1911 Act; the invention to be patentable need not have a commercial pecuniary success. In other words, utility of an invention is not required by this definition. Although lack of utility is a ground for revocation of a patent under section-26(f) of the Act, till now this has not been included in the definition of invention. The 1911 Act makes no difference between patentable and non patentable inventions. Considering the public interest certain items should be kept outside the domain of patent protection. Since under the existing law no item has been excluded from the domain of patent protection, any type of new invention may obtain patent protection although it should not be patentable for the greater interest of the public at large. Under the existing law, the application for a patent must contain a declaration that the applicant is the true and first inventor or the assignor or legal representative of such inventor. But the term, “true and first inventor” is left undefined. Thus any person importing an invention for the first time into Bangladesh or any person to whom an invention is first communicated from outside Bangladesh can claim to be the “true and first inventor” of that invention and thus, can take the advantage of the vagueness of the term. Here; a fact should be added that, such practice already has begun. Some pharmaceutical companies don’t having any research and develop cell, importing some drugs, and by claiming patent, under the ambiguity of the Act, getting patent. A statistic says that, at the 1st and 2nd week of March, 2006; on an average, 40 patents were granted by the patent office, in each week. Thus, the local producers are forced to remain non productive on that particular patented items. The standard of examination varies from country to country. In some countries like Netherlands, Germany, U.S.A. and Japan it is rigorously involving an extensive search for both novelty and obviousness among documents published in many countries, over a period of many years. But according to our existing patent law; examination is less rigorous involving for novelty only, and the extent of search is restricted. Term of patent protection shall, as laid down in section-14, be sixteen years from its date. But the term is not sufficient enough for the exploitation of the patent right. What constitutes infringement of patent isn’t defined in the Patents and Designs Act, 1911. Section-29(1) of the Act only says that, the patentee has a right to sue against the infringer during the continuance of the patent acquired by him. Section-30 of the Act says that, a patentee shall not be entitled to damages against an innocent infringer. But, ignorance of law is no defense. The infringer should pay for the project as compensation of damages. Under the existing law any process or manner of producing, preparing or making an article in patentable as appears from section-2 (8) read with section-2(16). But, the 1911 Act does not confer upon the patentee the exclusive right to exercise the process. The 1911 Act contains provisions regarding compulsory licenses of patent rights but the terms and conditions of conditions of compulsory licenses are not detailed in the Act. TRADE MARKS ACT:- 1. Section-22(3) of Trade Marks Act defined infringement in a very narrow sense though the act has provisions against infringement. 2. Although Chapter X of the Act, describes about offences and restrictions of use of Royal Arms and state emblems but this chapter does not extends to the infringement of any registered trademark. Any deceptive use of any registered trademark; is not also included in this chapter. 3. There is no provision for protection of internationally recognized trademark in our existing Trademark Act 1940. Our existing copyright law has been enacted in line with the copyright law of India. It has been enacted to cope with the prevailing international set up of copyright system. So, preventive measures have been adopted to tackle the future complications in copyright sector. NECESSARY PROPOSAL FOR REFORMATIONS: The term ‘intellectual property’ is still at its nascent stage in our country and people are not aware of the concept and importance of intellectual property. But, in international arena, the concept and coverage of intellectual property is growing so fast than any other brunches of law. We have intellectual property laws but these laws are not sufficient to tackle the challenges that are imminent and threatening us. Keeping in mind the Trade Related Aspects of Intellectual Property Rights (TRIPs)
775
Buried inside Robert Bryce’s relatively new book entitled Power Hungry is a call to “aggressively pursue taxes or caps on the emissions of neurotoxins, particularly those that come from burning coal” to generate electricity such as mercury and lead. This is notable not because Bryce agrees with many environmental and human health experts, but also because the book credibly debunks the move to tax or cap carbon dioxide emissions both from technical and political perspectives. The word “neurotoxic” literally translates as “nerve poison”. Broadly described, a neurotoxicant is any chemical substance which adversely acts on the structure or function of the human nervous system. As its subtitle signals, Power Hungry also declares policies subsidizing renewable sources of electricity, biofuels and electric vehicles as too costly and impractical to make a significant difference in making the U.S. power and transportation systems more sustainable. So why take aim at mercury and lead, which is certain to drive up the cost of coal-fired electricity just as a carbon cap or tax would? Because, Bryce asserts, “arguing against heavy metal contaminants with known neurotoxicity will be far easier than arguing against carbon dioxide emissions. Cutting the output of mercury and the other heavy metals may, in the long run, turn out to have far greater benefits for the environmental and human health.” Bryce draws a parallel to the U.S. government ordering oil refiners to remove lead from gasoline starting in the 1970s. In the book, which has has received predominantly good reviews on Amazon.com, Bryce makes some valid points about the carbon density of our energy sources. Among his overarching messages is that the carbon density of the world’s major economies is actually declining (see graph below). Not to be missed: his attack on carbon sequestration, pp. 160-165. His case about the threat of neurotoxins begins on p. 167. There’s a lot more to this challenge of reducing America’s reliance on coal-fired power plants than this. But considering the failure by the U.S. Congress to agree on a carbon tax or cap, his idea has serious merit and deserves a broad discussion, especially as Congress reassess its budget priorities. This includes billions of dollars of tax breaks and incentives for oil and other fossil fuels.
508
Doing u-substitution twice (second time with w) Example where we do substitution twice to get the integral into a reasonable form Doing u-substitution twice (second time with w) ⇐ Use this menu to view and help create subtitles for this video in many different languages. You'll probably want to hide YouTube's captions if using these subtitles. - Let's see if we can take the integral of cosine of 5x over e to the sine of 5x dx. - And there's a crow squawking outside of my window so I'll try to stay focused. - So let's think about whether u-substitution might be appropriate. Your first temptation might to said, - "Hey, maybe we let u equal sine of 5x, and if u is equal to sine of 5x, - we have something that is pretty close to du up here." Let's verify that. - So du could be equal to -- so du/dx (derivative of u with respect to x), - well we just use the chain rule. Derivative of 5x is 5, - times the derivative of sine of 5x with respect to 5x, that's just going to be cosine of 5x. - If we want to write this in differential form, which is useful when we do our u-substitution, - we could say that du is equal to 5 cosine 5x. - Now when you look over here, we don't have quite du there. We have just cosine of 5x dx-- - sorry, I need cosine of 5x dx, just like that. So when you look over here, - you have a cosine of 5x dx, but we don't have a 5 cosine of 5x dx, - but we know how to solve that. We can multiply by 5 and divide by 5. - 1/5 times 5 is just going to be 1. So we haven't changed the value of the expression. - But when we do it this way, we see pretty clearly, we have our u and we have our du. - Our du is 5 -- let me circle that and let me do that in that blue color -- - is 5 cosine of 5x dx. So we can rewrite this entire expression as -- - I'll do that 1/5 in purple -- this is going to be equal to 1/5 -- - I hope you don't hear that crow outside; he's getting quite obnoxious -- - 1/5 times the integral of, well all this stuff in blue is my du, - and then that is over e to the u. So how do we take the anti-derivative of this? - Well, you might be tempted to -- well, what would you do here? - Well, we're still not quite ready to simply take the anti-derivative here. - If I were to rewrite this, I could rewrite this as (this is equal to) - 1/5 times the integral of e to the negative u du. - And so, what might jump out of you is maybe we do another substitution, - and we already use the letter u, so maybe we might use w. We'll do some "w-substitution." - And you might be able to do this in your head, but we'll do w-substitution just to make it a little bit clearer. - So let's -- this would've been really useful if this was just e to the u, - because we know the anti-derivative of e to the u. It's just e to the u. - So let's just try to get it in terms of the form of e to the negative something. - So let's set -- and I'm running out of colors here -- w equal to negative u. - And in that case, then dw (derivative of w with respect to u) is negative 1, - or if we were to write that statement in differential form, - dw is equal to du times negative 1 is negative du. - So this right over here would be our w, and do we have a dw here? - Well we just have du; we don't have a negative du there. - But we can create a negative du by multiplying this inside by negative 1, - but then also multiplying the outside by negative 1. - Negative 1 times negative 1 is positive 1; we haven't changed the value. - We have to do both of these in order for it to make sense. - Or I could do it like this. So negative 1 over here, and a negative 1 right over there. - And if we do it in that form, then this negative 1 times du -- - that's the same thing as negative du -- this is this right over here. - And so we can rewrite our integral -- it's going to be equal to -- - now it's going to be negative 1/5 -- trying to use the colors as best as I can -- - times the indefinite integral of e to the -- well instead of negative u, we could right w. - E to the w. And instead of du times negative 1 or negative du, we can write "dw." - Now this simplifies things a good bit. We know what the anti-derivative of this in terms of w. - This is going to be equal to negative 1/5 e to the w, and then we might have some constant there, - so I just do a plus C. And now we just have to all of our un-substituting. - So we know that w is equal to negative u, so we could write that -- - so this is equal to negative 1/5 -- I want to stay true to my colors -- e to the negative u, - that's what w is equal to, plus C. But we're still not done un-substituting. - We know that u is equal to sine of 5x. So we can write this as being equal to - negative 1/5 times e to the negative u, which is negative u is sine of 5x, - and then finally, we have our plus C. Now, there was a simpler way that we could've done this - by just doing one substitution. But then you kind of have to look ahead a little bit - and realize that it was not trivial to take -- not to bad to take your anti-derivative of e to the negative u. - The inside that you might of have although you shouldn't really hold yourself - when you feel too bad when you didn't see that inside. - We could've rewritten that original integral -- let me rewrite it -- - it's cosine of 5x over e to the sine of 5x dx. We could've written this entire integral as being equal to - cosine of 5x times e to the negative sine of 5x dx. And in this situation, we could've said - u to be equal to negative of 5x, and say well, if u is equal to -- - or negative sine of 5x, then du is going to be equal to negative 5 cosine of 5x, - and we don't have a negative 5 -- oh, dx, we don't have a negative 5 here, - but we can construct one by putting negative 5 there, then multiplying by negative 1/5, - and then that would've immediately simplified this integral right over here to be equal to - negative 1/5 times the integral of -- well, we have our du -- let me do this in a different color -- - that's the negative 5 -- let me do it this way -- negative 5 cosine of 5x dx. - So that is our du -- I'm just changing the order of multiplication -- times e to the u. - This whole thing now is u this second time around. So if we did it this way, with just one substitution, - we could've immediately gotten to the result that we wanted. You take the anti-derivative of this -- - I'll do it in one color now, just 'cause I think you get the idea -- this is equal to - negative 1/5 e to the u plus C. u is equal to negative sine of 5x, - so this is equal to negative 1/5 e to the negative sine of 5x plus C. And we're done. - So this one is faster; it's simpler, and over time, you might even start being able to do this in your head. - This top one, you still didn't mess up by just setting u equal to sine of 5x; - we just have to do an extra substitution in order to work it through all the way. - And I was able to do this video despite the crowing crow outside -- or squawking crow. Be specific, and indicate a time in the video: At 5:31, how is the moon large enough to block the sun? Isn't the sun way larger? Have something that's not a question about this content? This discussion area is not meant for answering homework questions. Share a tip When naming a variable, it is okay to use most letters, but some are reserved, like 'e', which represents the value 2.7831... Have something that's not a tip or feedback about this content? This discussion area is not meant for answering homework questions. Discuss the site For general discussions about Khan Academy, visit our Reddit discussion page. Flag inappropriate posts Here are posts to avoid making. If you do encounter them, flag them for attention from our Guardians. - disrespectful or offensive - an advertisement - low quality - not about the video topic - soliciting votes or seeking badges - a homework question - a duplicate answer - repeatedly making the same post - a tip or feedback in Questions - a question in Tips & Feedback - an answer that should be its own question about the site
427
William Gilly has seen a Kraken. The mythical squid beast with ship-dooming tentacles surely exists, Gilly says, because he's seen a baby one. "It was this big around," he says, making a circle as big as a tire with his arms, a proud, boyish smile on his face. Fishermen spotted the carcass of the 2.4-metre-long, 181-kilogram baby giant squid in Monterey Bay three years ago, according to "If you're an assistant professor proposing to study it, I don't think you'd get tenure," he says. "But one has to exist." laboratory at Stanford University's Hopkins Marine Station in Pacific Grove brims with squid décor: stuffed animals, preserved specimens, glass figurines, drawings, photographs, plastic toys, and piñatas. He has studied these denizens of the sea for almost four decades, and he's handled countless numbers of the fabled Kraken's smaller cousins, the very real jumbo Humboldt squid. Like their giant counterparts, Humboldt squid are enigmatic. No one has seen them mate or lay eggs. No one has watched them develop from egg to adult. No one knows how many exist. These tentacled titans have now ensnared marine biologists with another riddle: they have left their normal gathering grounds in the Sea of Cortez in Baja California, Mexico. Fishermen worry that a critical part of their livelihood may be gone. Many families have depended on Humboldt squid since the slippery creatures moved in droves into the Gulf of California's Guaymas Basin in the "We have a huge problem on our hands," says coordinator Juan Pedro Vela Arreola of the Alianza de Ribereños y Armadores, an association of fishermen and producers in Mexico. "Fishermen are desperate." Gilly blames the most recent El Niño in the Pacific Ocean for forcing some Humboldt squid to migrate away. Others have physically shrunk -- just one bizarre adaptation among their many strange body-shifting traits. Leaders of Mexican fisheries and scientists are banding together to figure out whether the diablos rojos (red devils) will come back, and how to cope in the "You have to learn to live in a very unpredictable way," says Unai Markaida of El Colegio de la Frontera Sur (ECOSUR) in Campeche, Mexico. "You live like a squid, and you adapt to the life it leads." "They're very mysterious," says marine biologist Danna Staaf, stressing very in a slightly higher pitch. "And Staaf, a self-described "cephalopodiatrist," completed her PhD with Gilly's team. She studied Humboldt squid on two summer research cruises in the Gulf of California before the latest El Niño drove them away. She and her crewmates pulled up to 15 squid out of the water every night, when they would come up to the surface from depths of more than 975 metres to feed. Many of the 9-kilogram cephalopods she caught were about 1.2 metres long. Most were a year old. Scientists can tell their age by looking at the number of rings on tiny crystals located near their brain called statoliths, like botanists can age a tree by counting its rings. These stones help a squid detect gravity and maintain their balance and sense of space. The scientists stored some of the catch in their "squid condo," an oversize cooler with continuously flowing water and six clear, plastic tubes. They housed squid in separate tubes to keep them from attacking one another. Over the next few days, they studied the squids' behaviours and neurophysiology. For instance, altering the temperature and oxygen content of the water could trigger or change their escape response -- the way squid dart away when startled by a predator. Staaf dissected other squid to study their development, the focus of her dissertation. She used their eggs and sperm to make squid babies. She wanted to discover the temperature range at which their eggs could hatch and develop. At the time, Humboldt squid had spread to waters off the coast of Monterey. Marine scientists thought the squid might establish new colonies there, but Staaf wanted to know whether it was even possible for the animals to grow in the much cooler waters of California's Pacific coast. In the lab, she found, their eggs can grow between temperatures of 15 and 25 degrees Celsius, suggesting it is possible they could set up a breeding population. Whether squid babies have the same preferences in the wild is still unknown, Staaf says. Other team members studied squid chromatophores, structures in their muscles that allow them to change colour. Humboldts sometimes flash from red to white as they propel themselves through dark waters. Scientists don't know how they control these colour shifts, whether it's the brain or local nerve cells that set off the flickering. They also don't fully understand why they suddenly change colours, but some speculate it's a form of When they're not in direct contact with other squid, their flesh flickers from red to white in a random, mosaic-like pattern. Gilly compares this to visual white noise. But as they interact with their species, the irregular colour waves become more organised, like a cephalopod Morse code, Gilly says. They can change the intensity of the flashing, as well as the rhythm and frequency. Squid might use these "calls," together with arm posturing, to attract mates or to establish hierarchies, for example. Gilly and his team have seen some of these behaviours through underwater "Crittercams," about the size of 340-gram drink bottle, attached to a squid's back. "Ideally, we'd also like to see what they eat," Gilly says, because that might help his team study these animals. Scientists can't get Humboldts to eat in the lab, so squid last only a few days in Indeed, squid dislike being trapped, strongly. Sometimes they get so anxious, they ram themselves against the tank. "They've never seen the bottom. They've certainly never seen the wall of a tank," Gilly says. "They're intelligent organisms. And when you put one in an abnormal situation, they get totally freaked out. They don't do their flickering in the lab," he notes. Scientists do know that during the day, Humboldt squid forage for silvery lanternfish and other small animals in the oxygen minimum zone, a dark, cold netherworld more than 900 metres deep. Here, oxygen is scarce, and while few animals can withstand its hostile environment, Humboldts seem to thrive. "Living in low oxygen -- that's surprising, especially for an animal that's an athlete," Markaida says. How they move and how their nervous system functions under these conditions is still a mystery. Widespread changes in the temperatures of Earth's oceans have compelled many creatures, including the powerful Humboldt squid, to seek new climes. Their dominion usually stretches from Argentina to California, but more recently they've been spotted in Canada and Alaska. Scientists don't yet understand how the squid are settling into their new hangouts. This month, a few Humboldts stranded themselves on the beaches of Pacific Grove, Calif, while whale-watching boats have spotted them near Point Pinos. These sightings might be a sign they are returning, Gilly says.
454
From the time of Aristotle (384-322 BC) until the late 1500’s, gravity was believed to act differently on different objects. - Drop a metal bar and a feather at the same time… which one hits the ground first? - Obviously, common sense will tell you that the bar will hit first, while the feather slowly flutters to the ground. - In Aristotle’s view, this was because the bar was being pulled harder (and faster) by gravity because of its physical properties. - Because everyone sees this when they drop different objects, it wasn’t questioned for almost 2000 years. Galileo Galilei was the first major scientist to refute (prove wrong) Aristotle’s theories. - In his famous (at least to Physicists!) experiment, Galileo went to the top of the leaning tower of Pisa and dropped a wooden ball and a lead ball, both the same size, but different masses. - They both hit the ground at the same time, even though Aristotle would say that the heavier metal ball should hit first. - Galileo had shown that the different rates at which some objects fall is due to air resistance, a type of friction. - Get rid of friction (air resistance) and all objects will fall at the same rate. - Galileo said that the acceleration of any object (in the absence of air resistance) is the same. - To this day we follow the model that Galileo created. ag = g = 9.81m/s2 ag = g = acceleration due to gravity Since gravity is just an acceleration like any other, it can be used in any of the formulas that we have used so far. - Just be careful about using the correct sign (positive or negative) depending on the problem. Examples of Calculations with Gravity Example 1: A ball is thrown up into the air at an initial velocity of 56.3m/s. Determine its velocity after 4.52s have passed. In the question the velocity upwards is positive, and I’ll keep it that way. That just means that I have to make sure that I use gravity as a negative number, since gravity always acts down. vf = vi + at = 56.3m/s + (-9.81m/s2)(4.52s) vf = 12.0 m/s This value is still positive, but smaller. The ball is slowing down as it rises into the air. Example 2: I throw a ball down off the top of a cliff so that it leaves my hand at 12m/s. Determine how fast is it going 3.47 seconds later. In this question I gave a downward velocity as positive. I might as well stick with this, but that means I have defined down as positive. That means gravity will be positive as well.vf = vi + at = 12m/s + (9.81m/s2)(3.47s) vf = 46 m/s Here the number is getting bigger. It’s positive, but in this question I’ve defined down as positive, so it’s speeding up in the positive direction. Example 3: I throw up a ball at 56.3 m/s again. Determine how fast is it going after 8.0s. We’re defining up as positive again. vf = vi + at = 56.3m/s + (-9.81m/s2)(8.0s) vf = -22 m/s Why did I get a negative answer? - The ball reached its maximum height, where it stopped, and then started to fall down. - Falling down means a negative velocity. There’s a few rules that you have to keep track of. Let’s look at the way an object thrown up into the air moves. As the ball is going up… - It starts at the bottom at the maximum speed. - As it rises, it slows down. - It finally reaches it’s maximum height, where for a moment its velocity is zero. - This is exactly half ways through the flight time. As the ball is coming down… - The ball begins to speed up, but downwards. - When it reaches the same height that it started from, it will be going at the same speed as it was originally moving at. - It takes just as long to go up as it takes to come down. Example 4: I throw my ball up into the (again) at a velocity of 56.3 m/s. a) Determine how much time does it take to reach its maximum height. - It reaches its maximum height when its velocity is zero. We’ll use that as the final velocity. - Also, if we define up as positive, we need to remember to define down (like gravity) as negative. a = (vf - vi) / t t = (vf - vi) / a = (0 - 56.3m/s) / -9.81m/s2 t = 5.74s b) Determine how high it goes. - It’s best to try to avoid using the number you calculated in part (a), since if you made a mistake, this answer will be wrong also. - If you can’t avoid it, then go ahead and use it. vf2 = vi2 + 2ad d = (vf2 = vi2) / 2a = (0 - 56.32) / 2(-9.81m/s2) d = 1.62e2 m c) Determine how fast is it going when it reaches my hand again. - Ignoring air resistance, it will be going as fast coming down as it was going up. You might have heard people in movies say how many "gee’s" they were feeling. - All this means is that they are comparing the acceleration they are feeling to regular gravity. - So, right now, you are experiencing 1g… regular gravity. - During lift-off the astronauts in the space shuttle experience about 4g’s. - That works out to about 39m/s2. - Gravity on the moon is about 1.7m/s2 = 0.17g
366
Network With Us Join us on Facebook to get the latest news and updates. Lauren Boulden's Story Using Think-Alouds to Get Inside Langston Hughes' Head Over my past few years of teaching, there have been multiple occasions where I have been stumped on how to present a particular concept to my students. I've always been able to turn to ReadWriteThink.org for hands-on, engaging lessons. For example, I knew I wanted my students to develop their skills when it came to interacting with text, particularly with poetry. While searching through the myriad options on ReadWriteThink, I came upon "Building Reading Comprehension Through Think-Alouds." At first, I planned to use the lesson exactly as written: Read Langston Hughes's poem "Dream Variation" and model a think-aloud with students; then have the students try their hand at some think-alouds using other poetry. After working out all of the details, I realized I could develop some additional skills, which would fit perfectly into the scope and sequence of my class. After completing the think-aloud to "Dream Variation," I broke students into selected groups. Each group was given a different Langston Hughes poem and asked to complete a think-aloud. The next day, the students were put into a new jigsaw group where they were solely responsible for sharing what their Langston Hughes poem conveyed. Based on the meanings behind their group mates' poems, along with using the knowledge of both their poem and "Dream Variation," students were asked to figure out who Langston Hughes was as a man. What did he stand for? What were his beliefs? What did he want out of life? Students used clues from the various poems to fill in a head-shaped graphic organizer to depict their understanding of who Hughes could be. This simple lesson of working with poems and think-alouds turned into a few days of group communication, text deciphering, inferences, and even an author study! Without great lessons available on ReadWriteThink.org, such as "Building Reading Comprehension Through Think-Alouds," my students would never have been able to tackle so many key reading strategies in such a short amount of time. Grades 6 – 8 | Lesson Plan | Standard Lesson Students learn components of think-alouds and type-of-text interactions through teacher modeling. In the process, students develop the ability to use think-alouds to aid in reading comprehension tasks. Lauren describes how she used ReadWriteThink in her classroom. I have been teaching seventh- and eighth-grade language arts in Delaware for the past five years. I grew up in Long Island, New York, but have called Delaware my home since completing my undergraduate and master’s work at the University of Delaware. Teaching and learning have become my prime passions in life, which is why my days are spent teaching English, directing plays, organizing the school newspaper, and teaching yoga in the evenings.
91
Rurik DynastyArticle Free Pass Rurik Dynasty, princes of Kievan Rus and, later, Muscovy who, according to tradition, were descendants of the Varangian prince Rurik, who had been invited by the people of Novgorod to rule that city (c. 862); the Rurik princes maintained their control over Kievan Rus and, later, Muscovy until 1598. Rurik’s successor Oleg (d. 912) conquered Kiev (c. 882) and established control of the trade route extending from Novgorod, along the Dnieper River, to the Black Sea. Igor (allegedly Rurik’s son; reigned 912–945) and his successors—his wife, St. Olga (regent 945–969), and their son Svyatoslav (reigned 945–972)—further extended their territories; Svyatoslav’s son Vladimir I (St. Vladimir; reigned c. 980–1015) consolidated the dynasty’s rule. Vladimir compiled the first Kievan Rus law code and introduced Christianity into the country. He also organized the Kievan Rus lands into a cohesive confederation by distributing the major cities among his sons; the eldest was to be grand prince of Kiev, and the brothers were to succeed each other, moving up the hierarchy of cities toward Kiev, filling vacancies left by the advancement or death of an elder brother. The youngest brother was to be succeeded as grand prince by his eldest nephew whose father had been a grand prince. This succession pattern was generally followed through the reigns of Svyatopolk (1015–19); Yaroslav the Wise (1019–54); his sons Izyaslav (1054–68; 1069–73; and 1077–78), Svyatoslav (1073–76), and Vsevolod (1078–93); and Svyatopolk II (son of Izyaslav; reigned 1093–1113). The successions were accomplished, however, amid continual civil wars. In addition to the princes’ unwillingness to adhere to the pattern and readiness to seize their positions by force instead, the system was upset whenever a city rejected the prince designated to rule it. It was also undermined by the tendency of the princes to settle in regions they ruled rather than move from city to city to become the prince of Kiev. In 1097 all the princes of Kievan Rus met at Lyubech (northwest of Chernigov) and decided to divide their lands into patrimonial estates. The succession for grand prince, however, continued to be based on the generation pattern; thus, Vladimir Monomakh succeeded his cousin Svyatopolk II as grand prince of Kiev. During his reign (1113–25) Vladimir tried to restore unity to the lands of Kievan Rus; and his sons (Mstislav, reigned 1125–32; Yaropolk, 1132–39; Vyacheslav, 1139; and Yury Dolgoruky, 1149–57) succeeded him eventually, though not without some troubles in the 1140s. Nevertheless, distinct branches of the dynasty established their own rule in the major centres of the country outside Kiev—Halicz, Novgorod, and Suzdal. The princes of these regions vied with each other for control of Kiev; but when Andrew Bogolyubsky of Suzdal finally conquered and sacked the city (1169), he returned to Vladimir (a city in the Suzdal principality) and transferred the seat of the grand prince to Vladimir. Andrew Bogolyubsky’s brother Vsevolod III succeeded him as grand prince of Vladimir (reigned 1176–1212); Vsevolod was followed by his sons Yury (1212–38), Yaroslav (1238–46), and Svyatoslav (1246–47) and his grandson Andrew (1247–52). Alexander Nevsky (1252–63) succeeded his brother Andrew; and Alexander’s brothers and sons succeeded him. Furthering the tendency toward fragmentation, however, none moved to Vladimir but remained in their regional seats and secured their local princely houses. Thus, Alexander’s brother Yaroslav (grand prince of Vladimir, 1264–71) founded the house of Tver, and Alexander’s son Daniel founded the house of Moscow. After the Mongol invasion (1240) the Russian princes were obliged to seek a patent from the Mongol khan in order to rule as grand prince. Rivalry for the patent, as well as for leadership in the grand principality of Vladimir, developed among the princely houses, particularly those of Tver and Moscow. Gradually, the princes of Moscow became dominant, forming the grand principality of Moscow (Muscovy), which they ruled until their male line died out in 1598. What made you want to look up "Rurik Dynasty"? Please share what surprised you most...
339
When Edgar Degas painted his friend Henri Michel-Levy in 1878, he included a lay figure sprawled on the ground below him. How did lay figures hold a pose? As we saw in the final illustration yesterday, lay figures could be held up with ropes attached to the extremities. But some of them also had adjustable screws in the joints. For standing poses, the figure generally also had a support attached to the pelvis from behind. This wood and metal skeleton has many points of articulation, even separate radius and ulna “bones” in the arm. In this one, the arms also pronate, and the knees can rotate outward. All the joints can be tightened with screws. It has sort of a pre-Steampunk (“wood-punk?”) mech vibe to it. Imagine an army of these guys with crossbows. This full size lay figure had sufficient bulk and volume to support the shape of the clothes. But such mannikins never looked completely natural, and artists were often embarrassed to use them, regarding them as a poor substitute for a live model. For this reason, lay figures were not often discussed, or if so, they tended to be disparaged. The Journal of the Society of the Arts in 1854 said that under pressing financial circumstances, a painter with a “mercantile spirit” might use a lay figure that “answers for both the male and female form,” which could lead to a disharmonious and incongruous figure. Check out the robot blog where I'm a guest contributor: "Nuthin' But Mech." Read the full GurneyJourney series on lay figures:Part 2
564
One of the greatest composers of all time, Franz JosephHaydn made an enormous contribution in the creation and development of virtually all musical forms and genres. 1760, Haydn was appointed the official musician for the Esterhazy Princes. Only in 1790, Haydn was released and allowed to travel. Haydn went to London where he became the most important and influential musician. Haydn retired in Vienna still being in the service of Prince Nikolaus. Haydn remains one of the most popular musicians.
345
Most of you probably don't remember. I don't, besides that I was in residency. I bet you have no idea how close you came to dying (it was 2 minutes). Or, if you didn't die, having your life dramatically altered. A Black Brant is a type of goose. It's also the name of a Canadian rocket routinely used for atmospheric experiments. It's launched with a bunch of instruments (depending on what's being studied) and the instruments are monitored during the flight. They then parachute back to Earth and are recovered for further data. Black Brants are commonly used by Canada, the U.S., and several other countries for research. And so it was on this day in 1995. A team of U.S. and Norwegian scientists launched a Black Brant from northwest Norway to study the Aurora Borealis. It contained standard scientific instruments. But things - almost - went horribly wrong. Routine notification of scientific and test launches is customary, and this one was no exception. 30 countries were told, including Russia. But due to layers of bureaucracy, the notice wasn't passed along their military chain. After all, the cold war had been over for 4 years. As the rocket climbed, it was picked up by Russian radar early warning systems. It was on a trajectory that matched a predicted Trident missile launch from U.S. nuclear submarines in the Arctic circle. As it flew it also crossed an air corridor between American ballistic missile silos in North Dakota and Moscow, which resulted in Russian satellites tracking it. The Russians read it as an American first strike. Both sides had practiced war games where a single high-altitude nuclear explosion from a submarine would be used to blind radar and satellites from the real attack, while the electromagnetic pulse would paralyze their defenses. The Russian military went to full alert. Their ballistic missile submarines in the Arctic were all ordered to prepare for immediate launch. Silo crews on land were notified. Their targets would be the major cities of North America and western Europe. They knew the American/NATO forces would respond in kind. The Black Brant used in this case was a 4-stage rocket. As it separated the radar pattern matched that of a ballistic missile with multiple re-entry warheads coming down, further convincing the Russians that an attack was underway. The nuclear briefcase, with its launching codes, was brought to Russian President Boris Yeltsin. Like the Americans, the Russians use a mandatory 10 minute launch window (the time needed for a submarine-launched missile to reach either country). Yeltsin activated his nuclear keys to launch a counterattack- but waited for final verification. At 8 minutes into the alert the rocket's course became clearer, and the Russians realized it was not incoming. With 2 minutes left before the mandatory nuclear launch time, Yeltsin deactivated the briefcase and ordered all nuclear forces off alert. The incident wasn't reported at the time. The Black Brant rocket completed it's planned flight, landing near Spitsbergen and recovered. The scientists involved had no idea what had happened. Did that story scare you? Then think about this: It's a single incident. On November 9, 1979 the U.S. military was testing a radar training tape of what an incoming missile strike would look like. Unfortunately, while being tested, the tape was accidentally broadcast on screens at the American nuclear missile headquarters (NORAD). The long range nuclear bombers in Alaska were ordered to take off to bomb Russia, while the command tried to verify the attack with other radar systems and satellites (which didn't show anything unusual). It took 6 minutes before an anonymous officer discovered the error, and the bombers were recalled. We've all heard of Yeltsin, but have you ever heard of Stanislav Petrov? He's a retired Soviet military officer, now living in Fryazino, Russia. In September, 1983 U.S.-Soviet relations were likely at their worst point since the Cuban Missile Crisis. To top it off, the Russians had just installed a new early-warning system. On September 26, 1983, Petrov was the shift officer in command of the Soviet early-warning radar defenses. The system twice reported an incoming nuclear strike from North America, once with a single missile, a second time with 4. Petrov, in a remarkably gutsy move, overrode the computer both times. He declared it an error and didn't pass the information to his superiors. His reasoning was based entirely on his gut instinct that the new system couldn't be trusted. As it turned out, he was right. Petrov himself couldn't launch a strike. But both sides were on such a hair trigger at the time that if he'd passed the information farther up the line, most historians agree that his superiors would have assumed the worst and ordered a retaliatory attack. You want more? During the Cuban Missile Crisis Vasili Arkhipov was First Officer on a submarine stationed in the Caribbean. His submerged boat was surrounded by American destroyers, who were trying to identify it. The captain thought war between the U.S. and U.S.S.R. had started, and wanted to launch a nuclear torpedo. To do so required a unanimous opinion of the boat's 3 top officers. The other 2 wanted to launch, and Arkhipov refused. He argued so forcefully against doing so that the captain decided to surface, identify himself, and check with Moscow. The movie "Crimson Tide" was based on his story. In only one incident was it actually a world leader who averted disaster. In the rest (and there are many others, read here, or over here) it was a few people (even one), considerably lower in the chain. On this day in 1995 it was only 2 minutes. Just 120 seconds. Less time than it took you to read this. Life on the edge is precarious.
776
From Sioux Falls to Rapid City, fire weather meteorologists are watching conditions closely. And until we receive widespread, heavy moisture they'll be monitoring what is known as the Keetch-Byram Drought Index or KBDI. It measures the amount of precipitation needed to return the soil to full saturation. It uses a system rating of zero to 800, which represents the moisture amount of zero to eight inches of water. It's what is needed to reduce the drought index to zero, which is saturation. Much of KELOLAND is at 500 or above. The KBDI of 400 to 600 is typical of late summer and early fall. When it gets to 600 and above, that's when intense, deep burning fires can be expected with an emphasis on downwind new fires occuring. The highest spots are in south central, north central and northeast South Dakota. Just this week, the area near Lake Andes is also considered at 800. It's an important number to know this time of year, whether you're harvesting or off road for hunting. © 2012 KELOLAND TV. All Rights Reserved.
241
Physical examination by a health care provider confirms the abnormal curve of the spine. The doctor will also look for any nervous system (neurological) changes (weakness, paralysis, or changes in sensation) below the curve. MRI (if there may be a tumor, infection, or neurological symptoms) Treatment depends on the cause of the disorder: Congenital kyphosis requires corrective surgery at an early age. Scheuermann's disease is treated with a brace and physical therapy. Occasionally surgery is needed for large (greater than 60 degrees), painful curves. Multiple compression fractures from osteoporosis can be left alone if there are no nervous system problems or pain. However, the osteoporosis needs to be treated to help prevent future fractures. For debilitating deformity or pain, surgery is an option. Kyphosis caused by infection or tumor needs to be treated more aggressively, often with surgery and medications. Treatment for other types of kyphosis depends on the cause. Surgery is needed if neurological symptoms or persistent pain develop. Adolescents with Scheuermann's disease tend to do well even if they need surgery, and the disease stops once they stop growing. If the kyphosis is due to degenerative joint disease or multiple compression fractures, surgery is needed to correct the defect and improve pain. Decreased lung capacity Disabling back pain Neurological symptoms including leg weakness or paralysis Round back deformity Treating and preventing osteoporosis can prevent many cases of kyphosis in the elderly. Early diagnosis and bracing of Scheuermann's disease can reduce the need for surgery, but there is no way to prevent the disease. Spiegel DA, Hosalkar HS, Dormans JP. The spine. In: Kliegman RM, Behrman RE, Jenson HB, Stanton BF, eds. Nelson Textbook of Pediatrics. 18th ed. Philadelphia, Pa: Saunders Elsevier; 2007:chap 678. Thomas N. Joseph, MD, Private Practice specializing in Orthopaedics, subspecialty Foot and Ankle, Camden Bone & Joint, Camden, SC. Review provided by VeriMed Healthcare Network. Also reviewed by David Zieve, MD, MHA, Medical Director, A.D.A.M. Health Solutions, Inc.
13
MIDDLE SCHOOL STUDENTS LEARN ABOUT THE JUSTICE SYSTEM Middle school students from several New Castle County schools are having an opportunity to spend a morning in the New Castle County Courthouse to learn more about how the court system works and to speak informally with prosecutors and public defenders. Starting with a tour of the courthouse, the students learn about the “nuts and bolts” of the justice system, including new technologies used in the courtroom, as well as court facilities and security, and watch a demonstration by Pocket, the dog whose well-trained nose aids Capitol Police in protecting the courthouse. Thereafter, they get an opportunity to learn about the legal aspects of the court system from a judge who explains how trials work. And, then, when they least expect it, they get to experience a trial themselves – albeit a mock one. As they are listening to the judge explain the various aspects of a trial, a “theft” occurs and the alleged perpetrator is put on trial. Students act as prosecutors, public defenders, judges, bailiffs, and jurors, with their real-life counterparts coaching them on their roles. After the trial is completed and the jury reaches a verdict, the group discusses what occurred at the trial and why the jury reached its verdict. The visit concludes with lunch and an opportunity to speak informally with the real life prosecutors, public defenders, and others involved in the trial. All of those attending expressed a great deal of enthusiasm about the experience. “I loved everything!” exclaimed one student on his evaluation. “My favorite part of the day was the mock trial. It was fun to act like it was a real case,” said another. A third student appreciated the one-on-one contact with those who work in the field, saying “My favorite part of the day was talking to Mr. Andy [Public Defender Andrew Rosen]. He told me some important things.” And the professionals involved enjoyed working with the students, as well, according to “Mr. Andy” of the Public Defender’s Office. In November and December, the project hosted approximately 25 students from Bayard Middle School in Wilmington, as well as about 180 students over three days from Newark Charter School. In the upcoming months, the project is slated to host students from East Side Charter, Springer Middle School, and H.B. duPont Middle School. The project, which is spearheaded by the Administrative Office of the Courts, is a cooperative effort with the Attorney General’s Office and the Office of the Public Defender. It originated last year as part of the Delaware Supreme Court’s racial and ethnic fairness initiative, which is co-chaired by Justice Henry duPont Ridgely of the Supreme Court and Chief Judge Alex J. Smalls of the Court of Common Pleas. For further information contact Kirsten Morris by e-mail at Kirsten.firstname.lastname@example.org or by phone at 302-255-0094.
315
Protractors - Innovation While only one patent model for a protractor survives in the Smithsonian collections—from an inventor with a colorful personal history—several of the other objects also provide examples of technical innovation. For instance, some are manufactured versions of patented inventions. Others were named for the person with whom they were associated, even if that engineer or craftsman laid no claim to designing that protractor. "Protractors - Innovation" showing 1 items. - This brass semicircular protractor is divided by single degrees and marked by tens from 10° to 90° to 10°. It is attached with metal screws to a set of brass parallel rules. Brass S-shaped hinges connect the rules to each other. The bottom left screw on the parallel rules does not attach to the bottom piece. A rectangular brass arm is screwed to the center of the protractor. A thin brass piece screwed to the arm is marked with a small arrow for pointing to the angle markings. The protractor is stored in a wooden case, which also contains a pair of metal dividers (5-1/4" long). - The base of the protractor is signed: L. Dod, Newark. Lebbeus Dod (1739–1816) manufactured mathematical instruments in New Jersey and is credited with inventing the "parallel rule protractor." He served as a captain of artillery during the Revolutionary War, mainly by making muskets. His three sons, Stephen (1770–1855), Abner (1772–1847), and Daniel (1778–1823), were also noted instrument and clock makers. The family was most associated with Mendham, N.J. (where a historic marker on N.J. Route 24 indicates Dod's house), but Dod is known to have also lived at various times in Newark. - ID number MA*310890 is a similar protractor and parallel rule. - References: Bethuel Lewis Dodd and John Robertson Burnet, "Biographical Sketch of Lebbeus Dod," in Genealogies of the Male Descendants of Daniel Dod . . . 1646–1863 (Newark, N.J., 1864), 144–147; Alexander Farnham, "More Information About New Jersey Toolmakers," The Tool Shed, no. 120 (February 2002), http://www.craftsofnj.org/Newjerseytools/Alex%20Farnham%20more%20Jeraey%20Tools/Alex%20Farnham.htm; Deborah J. Warner, “Surveyor's Compass,” National Museum of American History Physical Sciences Collection: Surveying and Geodesy, http://americanhistory.si.edu/collections/surveying/object.cfm?recordnumber=747113; Peggy A. Kidwell, "American Parallel Rules: Invention on the Fringes of Industry," Rittenhouse 10, no. 39 (1996): 90–96. - date made - late 1700s - Dod, Lebbeus - ID Number - accession number - catalog number - Data Source - National Museum of American History, Kenneth E. Behring Center
600
The riveting story of the two crusading lawyers who led the legal battle to end segregation, one case and one courtroom at a time. The Supreme Court’s decision inBrown v. Board of Educationis widely considered a seminal point in the battle to end segregation, but it was in fact the culmination of a decades-long legal campaign.Root and Branchis the epic story of the two fiercely dedicated lawyers who led the fight from county courthouses to the marble halls of the Supreme Court, and, in the process, laid the legal foundations of the civil rights movement. Charles Hamilton Houston was the pioneer: After becoming the first African-American on theHarvard Law Review, he transformed the law school at all-black Howard University into a West Point for civil rights advocacy. One of Houston’s students at Howard was a brash young man named Thurgood Marshall. Soon after Marshall’s graduation, Houston and Marshall opened the NAACP’s legal office. The abstemious, proper Houston and the folksy, easygoing Marshall made an unlikely duo, but together they faced down angry Southern mobs, negotiated with presidents and senators, and convinced even racist judges and juries that the Constitution demanded equal justice under law for all American citizens. Houston, tragically, would die before his strategy came to fruition in the Brown suit, but Marshall would argue the case victoriously and go on to become the first African-American Supreme Court justice—always crediting his mentor for teaching him everything he knew. Together, the two advocates changed the course of American history.
387
Tips to Facilitate Workshops Effectively Facilitators play a very important role in the creation of a respectful, positive learning environment during a workshop. Here you will find some tips to facilitate workshops effectively. - Make sure everybody has a chance to participate. For example, through small group activities or direct questions to different participants. Help the group to avoid long discussions between two people who may isolate the rest of the/other participants. Promote the importance of sharing the space and listening to different voices and opinions. - Be prepared to make adjustments to the agenda – sometimes you have to cross out activities, but the most important thing is to achieve the general goals of the workshop. - Make every possible thing to have all the logistics ready beforehand to then be able to focus on the workshop’s agenda. - Pay attention to the group’s energy and motivation – Plan activities where everyone is able to participate and to stay active and engaged. - Provide space for the participants to be able to share their own experiences and knowledge. Remember that each one of us has a lot to learn and a lot to teach. - Relax and have fun! Be a part of the process – You are learning, too, so you don’t have to know it all nor do everything perfect. - Be prepared for difficult questions. Get familiarized with the topic, know the content of the workshop but remember you don’t have to know all the answers! You can ask other participants what they know about the topic, or you can find out the answers later and share them with the participants after the workshop. - Focus on giving general information – Avoid answering questions about specific cases. Usually, this can change the direction of the conversation and might be considered as providing legal advice without a license to do so. - Your work as facilitator is to help the group learn together, not necessarily to present all the information and be the “expert” in the topic. - Try to be as clear as possible – especially when you are giving the exercises’ instructions. Work as a team with the other facilitators during the whole workshop.
273
SAINT ALEXANDER NEVSKY Alexander Nevsky (1220-1263) was proclaimed Saint of the Russian Orthodox Church by Metropolite Macarius in 1547 ||| Back to the Royal Russia News Archive ||| ||| Royal Russia Bulletin - Our Official Blog. Updated Daily With News Clips, Videos & Photographs ||| ||| Royal Russia Video & Film Archive ||| Romanov & Imperial Russia Links ||| ||| Our Bookshop: Books on the Romanovs & Imperial Russia ||| Gilbert's Books - Publisher of Books on the Romanovs ||| ||| What's New @ Royal Russia - Updated Monthly ||| ||| Return to Royal Russia - Directory ||| Return to Royal Russia - Main Page ||| Alexander Nevsky (1220-1263) The life of a saint is always a mystery both for contemporaries and for descendants. Only our Lord and Savoir Jesus Christ can evaluate in full measure all the troubles and accomplishments of his hermit. The life of a saint, although it belongs to the church on our sinful earth, serves as an expression of the will of the Church in Heaven. We recall the saints in the most difficult minutes of our life, when it seemed there is no way out. And that is when God sends us his hermit. This happened to our Russian land more than once. “In the year 1237,” runs the chronicle, “Batu Khan, cruel and godless, came to the Russian land and there were many Tartars with him. Batu Khan’s army was so big that one Russian had to fight against a thousand Tartars, and two – against a legion. There had never been a battle like that and there were no survivors. Almost all Russia, except its Northern areas, languished under the Tartar-Mongol yoke for nearly 300 years. Having conquered the Russian land, the Tartars went down the Volga River where they founded their kingdom – the “Golden Horde”. The town of Sarai was its capital. Fortunately, the Tartars, though they imposed a heavy tax on Russia, left untouched the Russian Orthodox Church – the guarantee of the future liberation of Russia. Alexander’s father, Grand Prince Yaroslav, undertook to take care of the devastated Russian land. The Tartars and Mongols were not the only enemies Russia had to face at the time. Germans and Swedes threatened it from the West. Prince Alexander was 20 years old when he clashed with them for the first time. Be that time Grand Prince Yaroslav, Alexander’s father, made him Prince of Novgorod. Taught martial arts since early childhood, Alexander was a skilled warrior. He was a man of military bearing and rare beauty. A contemporary wrote about him: “I traveled about many countries and saw many celebrities, but never did I meet a prince or king equal to Prince Alexander.” Prince Alexander was a wise and just ruler, and had good manners which made him very popular and highly respected. A contemporary of his wrote: “He treated priests and monks with love and respect; he was considerate to the poor. And as for metropolitans and bishops, Prince Alexander honored them as he honored Jesus Christ.” Prince Alexander’s subjects used to say: “Our Prince is sinless.” In 1240 Prince Birger of Sweden sent his messengers to Prince Alexander with the following address. “Hey, Prince Alexander! You may resist if you can. But remember that I am already here ready to conquer your land.” For a long time Prince Alexander prayed in the St. Sofia Cathedral of Novgorod. He recalled the words of Jesus Christ: “No love is greater than the love of a man who gives life for his friends”. When he left the church, he addressed the army in these words: “God is not force, God is truth.” Prince Alexander entrusted his hopes to the Holy Trinity and made up his mind to fight. The two armies met on the banks of the Neva River. One was the army of the proud invader, the other – of the Russian combatants. Our Lord helped his hermit — Prince Alexander. The legend has it that a soldier named Philip had a miraculous vision on the eve of the battle. He was on patrol on the Neva River. At dawn he saw a boat with martyr princes Boris and Gleb, ancestors of Prince Alexander, in full combat gear. Suddenly Philip heard a voice from the boat: “Gleb, brother of mine! Hurry up, we must help our relative, Grand Prince Alexander.” And the vision disappeared… Encouraged by the miraculous vision, Alexander rushed his men to the scene and gave the battle on the banks of the Neva. The battle was great, says the chronicle, and many people were killed, both Russians and Latins, and Prince Alexander left a scar on the face of their leader with a lance. At this point I must explain that in medieval Russia all intruders from the West were called Latins. After the glorious victory in the battle of the Neva Prince Alexander was awarded the honorary title Alexander Nevsky or Alexander of the Neva. Birger and his warriors were defeated. But another threat to Russia already loomed in the West. The German crusaders (or Teutonic knights) conquered the ancient Russian fortress of Koporye. In 1241 Alexander Nevsky regained it, but in a year the Teutonic knights were back. They also seized the ancient Russian towns Pskov and Izborsk. By the winter of 1242 Prince Alexander had gathered an army to defend Russia from the German crusaders. And on April 5th Russian warriors and Teutonic knights met in a merciless battle on the ice of Lake Chudskoye, also known as Lake Peipus. Prince Alexander was praying: God and our Savior Jesus Christ! Help us defend our country, our mothers and fathers, our sons and daughters, as many years ago you helped Moses. Here’s how one chronicler described the battle on Lake Chudskoye: “Prince Alexander arranged his men in battle formation and moved towards the enemy. Alexander had many brave men, like King David in ancient times. It was a Saturday. The troops clashed when the sun rose. It was a fierce battle. The crackle of breaking spears and the clanging swords sounded as though the ice began to move. The ice couldn’t be seen for blood… With God’s help the courageous Russian warriors defeated the Teutonic knights. Many knights drowned, others were taken prisoner, and only few of them escaped. The contemporaries rejoiced over the victory in what would later be called “The Battle on the Ice”. Entrance of Alexander Nevsky at Pskov after the Battle on the Ice. Artist: Valentin Serov Having preserved Russian land in the West, the Grand Prince Alexander clearly realized he ought to maintain peace with the Tartars, the “Golden Horde”. Weak and devastated, Russia was in no position to fight again. The Tartar yoke was a heavy burden on the Russian people. Before he could become a real ruler of his domain any Russian prince had to go to the “Golden Horde” where, after a long and humiliating procedure he might (or might not) get the so called “Yarlyk” – a license to rule. For many Russian princes, landlords and warriors the way to the “Golden Horde” was the last. Alexander Nevsky too, went to see Batu Khan, the king of the Tartars. Batu Khan was amazed to see him; he told his nobles: “It’s true what they said, that there’s no one like him.” He paid the prince all due honors and let him go safely. Alexander Nevsky had to go to Sarai, the capital of the “Golden Horde” on three occasions. And every time he was not sure he would return. But he never lost heart, for he was sure that God would not leave him. In the “Golden Horde” Prince Alexander always remembered he was not only a prince but also a Christian. He told pagans and Muslims about the Christian faith, about our Lord and Savior Jesus Christ and about the Holy Trinity. That was the beginning of Christianization of oriental peoples. Thousands of them turned their souls to Jesus Christ. Owing to the efforts of Alexander Nevsky the Russian Orthodox episcopate was established in Sarai in 1261. In 1252 Alexander Nevsky became the absolute ruler of the Russian land. His responsibilities were enormous. He managed to protect southern, eastern and western boundaries of Russia firmly enough. His wise rule breathed a new life into Russia after the Tartar invasion. Churches, monasteries and towns were built all over the country. Unfortunately, Prince Alexander’s farsighted policy was sometimes disapproved of by his fellow countrymen. In 1261 many Russian towns rose in revolt. The Tartar envoys who had come to collect tribute were killed. People waited for revenge with horror. Prince Alexander had to go to the Tartar capital again in order to ward off devastating raids against Russia. An excellent diplomat, the prince saved Russia and coped with his duty to God and the country. However years of wars and the affairs of the state undermined Alexander Nevsky’s health. Upon his return from Sarai the Grand Prince fell ill and died in a small monastery of St. Feodor in the town of Gorodets, not far from the ancient city of Vladimir, on November 14, 1263. Just before his death Alexander, in keeping with the ancient Russian tradition, took monastic vows and was named Alexi. The death of Alexander Nevsky in 1263. Artist: M. V. Nesterov “Brethren! The sun has set over Russian land! Our Grand Prince Alexander has passes away. No one like him will be found in Russian land.” And there was so much weeping and groaning as had never been heard before; the land trembled. Nine days people carried Grand Prince Alexander’s body to the city of Vladimir where the burial service took place in the St. Vladimir Cathedral on November 23. During that service a miracle happened. When a priest about to pull a scroll with the last prayer in the late prince’s hand approached the body, the dead prince stretched out his hand, took the prayer and crossed his hands on his chest again. This episode caused awe and terror in the crowd present… In 120 years, shortly before a great battle with the Tartars, a monk at the church where the Grand Prince Alexander’s body was buried saw a vision during the night praying. The candles in front of Prince Alexander’s tomb suddenly lit up and two elders came up to the tomb and said: “Arise, our prince! Hurry to help your relative, Prince Dmitry!” And the saint prince arose and became invisible. After that vision the saint’s tomb was opened and the relics found undecayed. Many sick people who came close to them are said to have been healed. The Russian Orthodox Church canonized Grand Prince Alexander. 1724 was the time of sweeping and rapid reforms of the Russian emperor Peter the Great. Those were the times of great changes in all spheres of life: spiritual, political, economic. The Emperor and the Holy Synod began to play the leading role in the Russian Church, whereas before the Patriarch was the most important figure. The Emperor and the Holy Synod decided that the relics of Alexander Nevsky be transferred to St. Petersburg, to the monastery built in his honor. On August 30 the capital of the Russian Empire welcomed the boat carrying the holy relics. Peter the Great piloted the boat himself; senior officials assisted him as sailors. A festive religious service for the Grand Prince took place at the monastery of his name. The commemoration of St. Alexander took place shortly after Russia’s victory in the Northern war of 1700-1721 against Sweden. Almost for 200 years the relics of St. Alexander were kept in the Alexander Nevsky Monastery. After the Bolshevik revolution of 1917 the relics were taken away and put on display at a museum of atheism. As for the Alexander Nevsky Monastery, it was closed down. Alexander Nevsky remained a saint most revered by the Russian people. People named in his honor are too numerous to count. In 1990 the relics of Saint Alexander Nevsky were returned to the Russian Orthodox Church to take their place in the Alexander Nevsky Lavra in St. Petersburg to the joy of all Russian believers. And we know that owing to St. Alexander’s prayers, our Russian land will be revived and stand firm forever… Watercolour of the Alexander Nevsky Lavra in St. Petersburg 7 December, 2012
166
Racism can be a tough thing to study. In situations where all things appear even, they might not be even at all. For example, in situations where employers are refusing to hire minority candidates, the argument could sometimes be made (although maybe not successfully) that there are extenuating circumstances. A truly successful study of race should be made in a laboratory of sorts. The only difference between two people should be skin color. Well, thanks to the internet, the great equalizer, we do have such a situation, eBay. Three Yale and Harvard researchers conducted a study called, “Race Effects on Ebay.” The results? Americans are racist. Even when selling the exact same items, buyers responded more favorably to white people than to black. From Good Technology: The researchers auctioned off moderately priced baseball cards, which were photographed held in either a dark black hand or a white hand. Though the cards themselves were the same, cards held in a black hand sold for about 20 percent less than cards held in a white hand. What’s more, “the race effect was more pronounced in sales of minority player cards.” The eBay study mimics a similar one from 2010. While that experiment, from the Centre for Economic Policy Research, focused on iPods sold via general online classified ads, the results were sadly the same: Black sellers received fewer responses and fewer cash offers than white sellers, and the cash offers they did receive were significantly lower. Beyond that, buyers corresponding with black sellers “exhibited lower trust,” according to the researchers. In other words, they were far less likely to accept delivery by mail (44 percent) and far more likely to object to the idea of making a long-distance payment (56 percent). The 2010 study also found that there were regional discrepancies. The Northeast part of the U.S. was the worst, where black people received 32% fewer offers. The Midwest had a 23% gap and the South, 15%. There was virtually no difference in the West.
840
Hypertension is often diagnosed during a visit to your doctor. Blood pressure is measured using a cuff around your arm and a device called a sphygmomanometer. Your doctor may ask you to sit quietly for five minutes before checking your blood pressure. If your blood pressure reading is high, you will probably be asked to come back for repeat blood pressure checks. If you have three visits with readings over 140/90 mmHG, you will be diagnosed with high blood pressure. Some people’s blood pressure goes up when they are at the doctor’s office. If your doctor suspects that may be occurring, he or she may ask you to get some blood pressure readings at home. In some cases, he or she may recommend that you wear an ambulatory blood pressure monitor. This device measures your blood pressure regularly throughout the day as you go about your activities. It is usually worn for 24 hours, even while sleeping. - Reviewer: Michael J. Fucci, DO - Review Date: 09/2012 - - Update Date: 00/91/2012 -
897
by George Heymann | @techeadlines Google has started a new page on Google Plus to share their vision of what its augmented reality glasses could be. They are soliciting suggestions from users on what they would like to see from Project Glass. “We think technology should work for you—to be there when you need it and get out of your way when you don’t. A group of us from Google[x] started Project Glass to build this kind of technology, one that helps you explore and share your world, putting you back in the moment. We’re sharing this information now because we want to start a conversation and learn from your valuable input. So we took a few design photos to show what this technology could look like and created a video to demonstrate what it might enable you to do.” Video after the break. Read the rest of this entry » Filed under: Android, General technology, Google, Media, Services, Augmented reality, eyeglasses, feature, featured, glasses, Google, Google Plus, Google Project Gass, google virtual reality glasses, New York Times, Project Glass, technology, turn by turn directions, UI, User interface, video chat, Virtual reality, Virtual reality glasses January 18, 2012 • 11:07 am $3 million grant from the Bill & Melinda Gates Foundation will fund development by Eric Klopfer MIT Education Arcade With a new $3 million grant from the Bill & Melinda Gates Foundation, the MIT Education Arcade is about to design, build and research a massively multiplayer online game (MMOG) to help high school students learn math and biology. In contrast to the way that Science, Technology, Engineering and Math (STEM) are currently taught in secondary schools — which often results in students becoming disengaged and disinterested in the subjects at an early age — educational games such as the one to be developed give students the chance to explore STEM topics in a way that deepens their knowledge while also developing 21st-century skills. Read the rest of this entry » Filed under: Gaming, Services, Software, 3 million dollar grant, Associate Professor, Augmented reality, Bill & Melinda Gates Foundation, Common Core, Common Core standards, Education, education arcade, education program, Eric Klopfer, Filament Games, game to help teach math and science, High school, Math, mit, MIT education arcade, MMOG, Next generation science, StarLogo TNG, STEM, Washington, Washington D.C. by George Heymann Blackberry no sooner made its official Blackberry Bold 9900 announcement and then T-mobile tweeted that it would be carrying the device. The 9900 will be T-mobile’s first 4G capable Blackberry. It is rumored to be available on T-Mobile in the June/July timeframe. The Blackberry Bold 9900/9930 will be a touch screen device with a 1.2 GHz processor, 8 GB of onboard memory, expandable to 32GB, HSPA+ 14.4 capable, 5 megapixel camera with flash, 720p HD video recording, dual-band WiFi, a built-in compass (magnetometer) and Near Field Communication (NFC) technology featuring the new Blackberry 7 OS. Press release after the break Filed under: Blackberry, Hardware, 4G, Augmented reality, BlackBerry, Blackberry Bold 9900, Blackberry Bold 9930, Evolution-Data Optimized, Evolved HSPA, Hertz, High-definition video, HSPA+, Research In Motion, T-Mobile, Touchscreen, Wi-Fi
646
This WebQuest was designed to meet the 3rd grade TEKS for TEXAS in the Writing 3.1(C) revise selected drafts for varied purposes, including to achieve a sense of audience, precise word choices, and vivid images. Science 3.9(A) observe and identify characteristics among species that allow each to survive and reproduce. Social Studies 3.16(D & E) use various parts of a source, including the table of contents, glossary, and index, as well as keyword computer searches, to locate information;(E) interpret and create visuals including graphs, charts, tables, timelines, illustrations, and maps. Art 3.2(C) produce drawings, paintings, prints, constructions, ceramics, and fiberart, using a variety of art materials appropriately.
818
Editor’s Note: Ronald E. Hall, Ph.D. is a professor at Michigan State University and the author of "The Melanin Millennium." He has lectured on skin color both domestically and internationally, and testified as an expert witness in skin color discrimination cases. His forthcoming book is a revised edition of "The Color Complex." By Ronald E. Hall, Special to CNN (CNN) - In the early part of this century, there were separate facilities for blacks and whites, the Ku Klux Klan was a popular white supremacist organization and racism was easy to see. In 1964, civil rights legislation outlawed racial discrimination, and there has been an advance of racial equality, including the election, and re-election of the first black president. But while overt acts of racism have declined, discrimination continues in another form: colorism. Colorism is a manifestation of how Western imperialism has exported European ideals, most notably the universal idealization of light skin, to American shores. Not only have whites discriminated against blacks because of skin color, but people of color have also discriminated against one another. While colorism has existed for some time, it has only been recently acknowledged, as seen in the increase of legal cases and studies examining this “ism.” Colorism is rooted in the long span of American history. The NAACP’s Crisis magazine printed an editorial on a heated exchange between the light-skinned W. E. B. DuBois and the dark-skinned Marcus Garvey. DuBois referred to Garvey as "fat, black” and “ugly," as if to suggest that a dark skin color denoted inferiority. Such an exchange was not an anomaly. A prominent NAACP official referred to Garvey by skin color, as a "Jamaican Negro of unmixed stock.” The not-so-subtle derogatory remark implied that having dark skin was unattractive. Recently, I was retained as an expert witness for a suit filed against Sears Holding Management Corp. in Chicago. The plaintiff in the case was African-American, and previously employed by the defendant as an executive. In filing suit, the plaintiff alleged she was denied equal pay, promotion and then terminated on the basis of her age, race and skin color. According to testimony, a light-skinned African-American male employee of the company with less seniority cooperated in the plaintiff’s eventual termination. The case is ongoing. In 1989, the Federal District Court of Atlanta heard the case of Walker vs. the Internal Revenue Service. Tracey Walker, the plaintiff, alleged that her IRS supervisor discriminated against her via performance evaluations on the basis of skin color. This is a landmark case as both the plaintiff and her supervisor are African-Americans. The plaintiff is light-skinned, whereas the defendant, by comparison, is dark-skinned. The presiding judge determined that such discrimination is a fact in the African-American community but that the plaintiff had failed to prove it to his satisfaction in her particular case. The issue has not only been among African-Americans. In Felix v. Marquez, a case litigated in 1981 by the U.S. District Court of the District of Columbia, the litigants were employees of the Office of the Commonwealth of Puerto Rico in Washington. The darker-skinned Felix alleged that the lighter-skinned defendant did not promote her because of colorism. During the trial, Felix contended that only two of her 28 fellow employees were as dark or darker in skin color than she, which Felix suggested is the reason she was not promoted. The increase in legal cases has been telling of the increase in acknowledging colorism in the United States, and recent studies have also explored the topic around the world. Eurogamy is a discriminatory marital pattern based on having light skin. Eurogamy was demonstrated in a study done in Asia using random samples of a mail-order bride magazine published from 1991 through 2000. In the study, 620 Asian females were questioned about their spousal preferences. When light skin was a requirement for marriage, 96% of the females requested Caucasian men, 2% requested Asian men and 2% requested Hispanic men. Colorism is manifested in discriminatory references to skin color, even who is seen as a suitable mate: If there is no action, it will continue as another insidious “ism” of the new millennium. The opinions expressed in this commentary are solely those of Ronald E. Hall.
484
- Reading Rockets: Classroom Strategies (MUST SEE includes teacher examples) The classroom strategy section is designed to share with teachers what research suggests are the most effective ways to build fluency, vocabulary, comprehension, and writing skills. Not ESL specific, see Colorin Colorado for ESL bilingual, but helpful strategies. Well organized, includes teacher examples. You can submit your own. in Literacy > Reading Strategies - 6+1 Trait® Spanish Writing Scoring Guides 6+1 Trait® Spanish Writing- Rúbricas para la evaluación The 6+1 Trait Spanish Writing model is not a direct translation of the 6+1 Trait (English) Writing Model. While some aspects and traits of English and Spanish correspond, not all do. This model is intended for native Spanish speakers who are not fluent in English, yet need to learn the basic principles of writing without the additional challenge of being forced to use an unfamiliar language. Read examples of real student papers that have been assessed with the 6+1 Trait scoring guides. in Bilingual Resourses > Bilingual Literacy - Brent Loken Student Videos Brent Loken's website with student videos from his classes. Links to related articles and blogs that support creative, student-centered, project-based learning. in Student Projects - FlamingText.com Examples in Technology by 3 users examples from all users
885
Essentials oils have been used throughout history medicinally and as Fragrance, and interest has revived over the past several years with an increase in the popularity of aromatherapy. Natural essential oils stimulate our mind and body, promote circulation and support skin cell function, and contain fungicidal and anti-bacterial properties making them a valuable component in beauty and health products. In fact tea tree oil for example, is the strongest known antibiotic in the world. What are Essential Oils? Essential oils are concentrated oils extracted from fruit, flowers, leaves, and stems of plants. These fragrant oils help plants to attract insects and protect them against harmful organisms. Each plant's oil carries a distinctive scent (or essence) with unique properties from the plant, flower, or fruit from which they are derived. Some, like Lavender and rose, are used to soothe and calm. Other essential oils are more invigorating — basil and rosemary — and used to boost energy and bring about mental clarity. How are Essential Oils Produced? Essential oils are generally produced via two main methods of extraction; steam distillation and cold-pressing. During steam distillation, oil is released from the plant. Oil and water then separate providing the plant's essential oil, called hydrosol or floral water. Lavender, peppermint, and eucalyptus oils are obtained through distillation. Most citrus oils are produced using the cold-press method of extraction. The rinds are ground down and pressed mechanically, releasing a mixture of oil and liquid. Use in Cosmetics Many natural cosmetics manufacturers use a blend of natural essential oils to compose their individual product fragrances, Lavera included. These oils are a much safer alternative to synthetic Fragrance, which have been linked to skin irritation, headaches, and even birth defects. Essential oils are also used as a preservative method in cosmetics. We utilize a blend of 18 essential oils and vitamins to preserve our products and prevent bacterial growth. As a result, Lavera products have a 2-3 year shelf life from date of manufacture, without the use of Parabens and other synthetic preservatives. Concerns Over Safety Some essential oils, like citrus peel extracts, are very effective insecticides and considered to be of low toxicity to mammals. While these oils may be detrimental to the safety of insects and small mammals, the doses used are much higher than those used in cosmetic products, and the subject is much smaller than a human. Essential oils are highly concentrated and should not be applied directly to the skin, but diluted with a base oil, like Jojoba or Sweet Almond. Essential oils should be avoided in high concentrations and not ingested unless prescribed by a health practitioner. Essential Oils Used in Lavera Products The essential oils used in Lavera products are 100% natural and pharmaceutical-grade. Our essential oil blend used to impart the Lavera scent is listed on Lavera labels as "Fragrance (Parfum)" with a footnote stating that only natural essential oils are used, never synthetic fragrance. For more information on fragrance labeling in cosmetics please read The Dirty Dozen on our blog. The primary essential oils used in Lavera products for preservation are: - Citral — found in Lemon Oil, Orange Oil, Lemon-Grass Oil and Bergamot Oil - Citronellol – found in Geranium Oil, Muscatel Sage, Sandalwood and Citronella Oil - Eugenol – found in Clove Oil - Coumarin – found in Sweet grass and sweet clover - Geraniol – found in Rose Oil, Geranium Oil, Palmarosa Oil, Lavender Oil and Ylang-Ylang Oil - Limonene – found in Lemon Oil, Orange Oil, Grapefruit Oil, Bergamot Oil, Fennel Oil and Lavender Oil - Linalool – found in Lavender Oil, Bergamot Oil, Geranium Oil and Ylang-Ylang Oil Each of these natural essential oils is used in Lavera products at a range of 0.1% or less to ensure safety and gentleness. These are safe levels of essential oils that not only provide our natural and unique aroma blends, but keep our products fresh and help to prevent harmful bacterial growth. A much healthier alternative to products with synthetic fragrance and preservatives. Natural essential oils, when used properly, are a safe and effective means of conveying fragrance in a cosmetic product, as well as ensuring the product’s safety.
504
This tutorial shows how to send modifications of code in the right way: by using patches. The word developer is used here for someone having a KDE SVN account. We suppose that you have modified some code in KDE and that you are ready to share it. First a few important points: Now you have the modification as a source file. Sending the source file will not be helpful, as probably someone else has done other modifications to the original file in the meantime. So your modified file could not replace it. That is why patches exist. Patches list the modifications, the line numbers and a few other useful information to be able to put that patch back into the existing code. (This process is called "patching" or also "applying a patch.") The main tool for creating patches is a tool called diff, which makes the difference between two files. This tool has a mode called unified diff, which KDE developers use. Unified diffs have not just the difference between the file but also the neighborhood around the differences. That allows to patch even if the line numbers are not the same anymore. The most simple patch is created between the modified file (here called source.cpp) and the non-modified version of the file (here called source.cpp.orig.) diff -u -p source.cpp.orig source.cpp That lists the difference between the two files in the unified diff format (and with function name information if possible.) However it only displays it to screen, which is of course not the goal. So you need to redirect the output. diff -u -p source.cpp.orig source.cpp > ~/patch.diff ~/patch.diff is here an example and you can create the file where you prefer with the name that you prefer. (You will soon find out that it is probably not a good idea to create a patch where the source is.) But normally, you do not just change one file and you do not keep the original version around to be able to make the difference later. But here too, there is a solution. The program svn, which is used on the command line interact with the SVN server, has a diff function too: svn diff. You can run it like this and it will give you the difference of the current directory and all sub-directories below it. Of course, here too, you want to redirect the output. svn diff > ~/patch.diff There are useful variants too (shown here without redirection) Note: even if svn can make the difference of another directory (svn diff mydirectory), it is not recommended to do it for a patch that should be applied again. (The problem is that the person that will apply the patch will have to be more careful about how he applies it.) Note: for simple diff, like those shown in the examples above, svn diff can be used offline, therefore without an active connection to the KDE SVN server. This is possible, as svn keeps a copy of the original files locally. (This feature is part of the design of SVN.) By default, svn diff does not have a feature like the -p parameter of diff. But svn allows that an external diff program is called, so you can call diff: svn diff --diff-cmd diff --extensions "-u -p" The procedures described above work very well with text files, for example C++ source code. However they do not work with binary files, as diff is not made to handle them. And even if SVN can internally store binary differences, svn diff is not prepared to do anything similar yet, mainly because it currently uses the unified diff format only, which is not meant for binary data. Therefore, unfortunately, there is little choice but to attach binary files separately from the patch, of course attached in the same email. First, you need to make svn aware of files you have added. svn add path/to/new/file /path/to/another/new/file Then run svn diff as before. Note that if you do svn revert, for example, the files you created will NOT be deleted by svn - but svn will no longer care about them (so they won't show up when you do svn diff, for example). You will have to rm them manually. (TODO: are there any other issues with adding new files if you don't have commit access?) Now you are ready to share the patch. If your patch fixes a bug from KDE Bugs, then the easiest way is to attach it there, see next section. The main way of sharing a patch is to email to a mailing list. But be careful not to send big patches to a mailing list, a few 10KB is the limit. If you find that the patch is too big to send to a mailing list, the best is to create a bug report in KDE Bugs and to attach the patch there, after having created the bug report. Another possibility, however seldom used, is to post the patch on a public Web server (be it by HTTP or FTP) and to send an email to the mailing list, telling that the patch is waiting there. Another variant is to ask on the mailing list which developer is ready to get a big patch. (Try to give its size and ask if you should send it compressed, for example by bzip2.) A last variant, if you know exactly which developer will process the patch and that you know or that you suppose that he currently has time, is to send the patch to a developer directly. (But here too, be careful if your patch is big. Some KDE developers have still analog modems.) In this section we assume that you have chosen to add your patch to an existing KDE bug or that you have created a bug report just for your patch. Even if this tutorial is more meant to send patches to a mailing list, most of it can be applied to adding a patch to KDE Bugs. You have two ways to do it: To send an email to a bug report, you can use an email address of the form firstname.lastname@example.org where 12345 is the bug number. Please be sure to attach your patch and not to have it inlined in your text. (If it is inlined, it would be corrupted by KDE Bugs, as HTML does not respect spaces.) Note: if you send an email to KDE Bugs, be careful to use as sender the same email address as your login email address in KDE Bugs. Otherwise KDE Bugs will reject your email. Note: if you create a new bug report just for your patch, be careful that you cannot attach a patch directly when creating a new bug. However as soon as the new bug is created, you can then attach files, one-by-one, therefore also patches. Warning: sometimes your patch will be forgotten because the developers do not always closely monitor the bug database. In this case, try sending your patch by email as described below. If that also does not help, you can always talk to the developers on IRC Assuming that you have chosen to send the patch to a mailing list, you might ask yourself: to which one? The best destination for patches is the corresponding developer mailing list. In case of doubt, you can send any patch for KDE to the kde-devel mailing list. (However with an increased risk that you would miss the right developer.) Of course, if you know exactly which developer will process the patch and that you know or that you suppose that he currently has time, then you can send the patch to him directly. Now you have a patch redirected into a file (for this example called patch.diff), you are ready to send it by email. But the first question: where? Now that you have entered an email address, a good practice is to attach the patch to your file before writing anything else in the email. So you will not forget to attach it. A little note here: yes, in KDE (unlike for the Linux Kernel for example), we prefer to have the patches sent as attachments. Now you are ready to write the rest of the email. Please think of a title that matches your patch. (Think of having to find it again in the archives in a few months or even years.) A good habit is to precede the title by [PATCH]. So for example a title could be [PATCH] Fix backup files. As for the body of the email, please tell to which file or directory your patch applies. For example for a file: The attached patch applies to the file koffice/kword/kwdoc.cpp or for a directory: The attached patch applies to the directory koffice/kword. This help the developers to have an overview of which code has been modified. Also tell for which branch it is meant, for example for trunk. Then tell what your patch does. If it fixes a bug, then please give the bug number too. If the bug was not registered in KDE Bugs, then please describe instead the bug that is fixed. Similarly, if you know that the patch fixes a bug introduced from a precise SVN revision, please add the revision number. Tell also what could be useful to the developers, for example if you could not completely test the patch (and why), if you need help to finish fixing the code or if it is a quick&dirty solution that should be fixed better in long-term. Now check the email again to see if you have not forgotten anything (especially to attach the patch) and you can send the email. One popular way of submitting patches is KDE's reviewboard. A big advantage over using the bugtracker of KDE is that the patches are less likely to be forgotten here. Also, the reviewboard allows inline review of diffs and other gimmicks. First you need to check if the project you've created the patch for is actually using reviewboard. For this, go to the groups section and see if the project's group is listed there. If it is listed there, you should use the reviewboard, otherwise send the patch by other means. For sending a patch, you first need to register. Then simply click New Review Request and fill out the form. The most important parts of the form are: After you completed the form, a notification mail will be sent to the developers and they will answer you. Now you have to wait that a developer reacts on your patch. (If you are not subscribed to the mailing lists where you have sent the patch, then monitor the mailing list archives] for such a message.) The reaction is normally one of the following: The first case is when nobody has answered. That perhaps means that you have chosen the wrong mailing list. Perhaps you have not explained correctly what the patch fixes or you have given a title that is not precise enough. If this happens, the developer might have overlooked the patch. Perhaps the developer that should have answered has not any time currently. (That too happens unfortunately.) The best is to try to work a little more on the patch, make a better description and try again a second time, perhaps to another mailing list or to use KDE Bugs instead. If the developer tells you that your patch conflicts with changes that he is currently doing, you could probably not do much against it. Maybe you can discuss with him how you can effectively work with him on this piece of code. If your patch was not accepted, you could work further on it. Probably you should discuss the problem on the mailing list to know in which direction you should work further. If a developer wants a few changes, then work on the code to make the changes according to the critic. If you need help because you do not understand how to do the needed change, then ask it on the mailing list. If your patch was accepted, congratulations! :)
831
Philippa Ryan, Scientist, British Museum Archaeobotany is the study of ancient plant remains, and I joined the field team at Amara West in Sudan earlier this year to collect samples for archaeobotanical analysis. Charred plant materials were retrieved on-site from sediments through dry-sieving and flotation. These samples were subsequently brought back to the British Museum for further sorting and identification. At the moment I am analysing the charred seeds and fruits with Caroline Cartwright, who is also analysing the wood charcoal. The macroscopic plant remains are analysed using both a stereo microscope and a SEM (scanning electron microscope). Charred remains found so far include cereal grains (wheat and barley) and crop-processing waste, fruits such as figs and a wide range of wild plants. I am also processing sediment samples to extract phytoliths (microscopic plant remains), which are formed when soluble silica taken up in groundwater by plants is deposited within and between certain plant cells. These silicified cells are found within many different plant families such as grasses (which include cereals), sedges and palms. Phytoliths are difficult to identify, but have the advantage of surviving in both charred and non-charred contexts, so we can learn about the presence and use of plants in areas where seeds and grains don’t survive. At the moment, I am processing sediments to extract phytoliths, which includes the removal of carbonates, clays, organics, other remaining non-siliceous material through heavy liquid flotation, and finally mounting dried phytoliths onto slides. Phytoliths are then identified and counted using an optical (light) microscope. Analysis of these different types of plant remains helps us learn about the past uses of plants at Amara West in day-to-day life, such as for food, fuel and animal fodder. I am also looking at the distributions of seeds and phytoliths across the site to examine locations of plant based activities such as food processing, as well as whether there are any differences in diet between poorer and richer households, or across the history of the site. Plant remains can also help to provide information about the nearby vegetation, for instance the types of grasses, wetland plants and trees that grew near the ancient town.
243
Office of Environment and Energy The Energy web site describes HUD energy initiatives, policies and how federal government wide energy policies affect HUD programs and assistance. HUD faces many challenges when it comes to energy policy. For an overview, see Implementing HUD's Energy Strategy, a report to Congress dated December 2008, that includes a summary of progress toward implementing planned actions . First, utility bills burden the poor and can cause homelessness. There is a Home Energy Affordability Gap Index based on energy bills for persons below 185 percent of the Federal Poverty Level. The gap was $34.1 billion at 2007/2008 winter heating fuel prices . The burden on the poor is more than four times the average 4 percent others pay.Twenty-six percent of evictions were due to utility cut-offs in St. Paul, MN. Second, HUD programs are affected by energy costs. HUD's own "energy bill" - the amount that HUD spends annually on heating, lighting, and cooling its portfolio of public and assisted housing and section 8 vouchers - reached the $5 billion mark in 2007 . Public Housing utilities cost more than $1 billion per year. Third, energy costs affect economic development. Importing fuel drains millions of dollars from local economies . Database of State Incentives for Renewables & Efficiency (DSIRE) Information on state, local, utility and federal incentives and policies that promote renewable energy and energy efficiency from a database funded by the U.S. Department of Energy. Edison Electric Institute’s Electric Company Programs Information on energy efficiency and low-income assistance programs offered by various utilities across the nation. HUD’s Public and Indian Housing Environmental and Conservation Clearinghouse Sources of funding for energy conservation and utility cost reduction activities from HUD’s Public and Indian Housing Environmental Clearinghouse. Promoting Energy Star through HUD’s HOME Investment Partnerships Program Resources for promoting Energy Star through the HOME program. Additional HUD Resources Useful documents, publications, and information related to resource conservation in public housing from HUD’s Public and Indian Housing Environmental Clearinghouse. Energy Star For New Construction Assisted By The Home Program HUD has worked with EPA to promote the use of ENERGY STAR standards in construction of houses. Here are the results of that production by the HOME Program for Fiscal Year 2009. Energy Star for Grantees Energy Efficiency with CDBG HOME Energy Star Awards for Affordable Housing Regional Energy Coordinators reviewed applications for Energy Star Awards for Affordable Housing in 2008, 2009, and 2010. HUD CHP Screening Tools HUD's 2002 Energy Action Plan committed HUD to promote the use of combined heat and power (cogeneration) (CHP) in housing and community development. HUD developed a Q Guide explaining CHP to building owners and managers. HUD and DOE Oak Ridge National Laboratory then developed a Level 1 feasibility screening software tool to enable them quickly to get a rough estimate of the cost, savings and payback for installing CHP. The Level 1 screening tool requires only monthly utility bills and a little information about the building and its occupants. PDF | Download Software | more... HUD and ORNL have now produced a Level 2 Combined Heat and Power (CHP) analysis tool for more detailed analysis of the potential for installing combined heat and power (cogeneration) in multifamily buildings. Level 2 works from hourly utility consumption and detailed information about the building and its equipment. ORNL Level 2 Tool "HUD CHP Guide #3 Introduction to the Level 2 Analysis for Combined Heat and Power in Multifamily Housing" explains how it was developed and provides links to ORNL for downloading the tool, its Users' Manual and training material. It also provides an exercise to demonstrate how it works. The tool is complex and calls for analysis by those with advanced ability to understand building energy use and simulation. Green Homes and Communities This website has very good energy information, including references to Sustainable Communities, DOE EECBG funding etc. Energy Efficiency in CPD Programs - See Table on page 13 for planned actions developed by the Energy Task Force. - See Fisher, Sheehan and Colton, On the Brink 2008; The Home Energy Affordability Gap - See Table B-1, in "Implementing HUD's Energy Strategy" - See Energy and Economic Development Phase I | Phase II.
566
EARLY SPRING in the Lamar River Valley: several wolves chase elk while an interested grizzly bear awaits the outcome. Grizzlies can drive wolves off a kill; more often they scavenge after the wolves have eaten their fill. Image: DIANE HARGREAVES Several scrawny cottonwood trees do not usually generate much excitement in the world of ecology. But on a wind-whipped August afternoon in Yellowstone National Park's Lamar Valley, William J. Ripple, a professor of botany at Oregon State University, stands next to a 12-foot-high cottonwood tree and is quietly ecstatic. "You can see the terminal bud scars," the bespectacled Ripple says, bending the limber tree over to show lines that mark a year's growth of a foot or more on the broom-handle-size trunk. "You can see that elk haven't browsed it this year, didn't browse it last year and, in fact, haven't browsed it since 1998." Ripple gestures at the sprawling mountain valley around us and points out that although numerous other cottonwoods dot the landscape, this knot of saplings comprises the only young ones--the rest of this part of the Lamar is a geriatric ward for trees. The stately specimens that grow in the valley bottom are 70 to 100 years old, and not a newcomer is in sight to take their place. On the hillside, aspen trees present a similar picture. Groves of elderly aspen tremble in the wind, but no sprouts push up in the understory.
562
In the above applet, there is a pull-down menu at the top to select which function you would like to explore. The selected function is plotted in the left window and its derivative on the right. 1. Exponential function with a fixed base The initial example shows an exponential function with a base of k, a constant (initially 5 in the example). What does the derivative look like? It sort of looks like the original exponential function, but rising more steeply. Move the k slider around and notice what happens to the shape of the derivative. Are there some values of k for which the derivative rises less steeply than the original curve? What value of k makes the two curves look similar? You can get even closer to this magic value for k by setting x = 1 and then watching the value of f '(1) (shown in a box in the right hand graph) as you move the k slider. Since f (1) = k, when f ' (1) = k, the two curves are identical. Once you get close using the k slider, you can also fine tune the value of k using the left and right arrow keys on your keyboard. You should find that for k ≈ 2.718 the function and its derivative are the same. The exact answer is k = e. In fact, you can type "e" into the k input box to make the curves the same. So, What about when the base is a number other than e? It appears that the derivative is like the original exponential, but stretched or squished. In fact, that is what happens, and the shortcut is 2. Exponential function with a base between 0 and 1 What about for 0 < k < 1? Select the second example from the drop down menu. This is the same function, but now the k slider will let you select values from 0 to 5 (instead of just from 1 to 5, as in the previous example). What happens to the derivative curve? Why? What is the sign of the logarithm of a number between 0 and 1? The rule given above still works in this case.
686
Commemorations for Kiahk 15 This day marks the departure of St. Gregory, the Patriarch of the Armenians who was a martyr, without bloodshed (A Confessor). This saint, as it was mentioned on the 19th day of the Coptic month of Tute, was tortured by Tiridates, the Armenian king, in the year 272 A.D. for disobeying the king and refusing to worship the idols. The king cast the saint into an empty pit where he lived for 15 years, during which God took care of him. Near the pit lived an old widow, who saw, in a vision, someone telling her to make bread regularly and cast it into this pit. She continued to do so for 15 years. Because of the length of time, no one in his congregation knew if he was alive or dead. When the king killed Arbsima, the virgin, and all the virgins who were with her, he also ordered that their bodies be cast away on the mountains. Later on he regretted what he did for he wanted to marry Arbsima. When the king's family and close advisers saw how he grieved for killing St. Arbsima, they advised him to go out for hunting to recreate himself. While he was riding his horse the Devil jumped on him and cast him on the ground. King Tiridates became possessed with an evil spirit and assumed the appearance and manners of a wild boar, to an extent that no one was able to go near him safely. Many of the people of his kingdom had the same fate. Great fear and crying was heard all over the palace and the kingdom as a result of what had happened to the king and many others as a result of what the king did to the virgins. The king's sister saw a vision on three consecutive nights. A man was telling her that unless she brought St. Gregory out of the pit, the King would not be saved nor would be cured. The people were surprised, since they believed that he was dead. They went to the pit and dropped a rope and called his name. When the saint moved the rope, they knew that he was still alive, they asked him to tie the rope around him and they pulled him out. The people took the Saint with great honor to the palace. They asked him to heal the king of his sickness. The Saint asked him if he would go back to his evil deeds. When the king expressed no intention of going back to his evil works, the saint prayed for him, and the evil spirit departed from him. His personality and his mind were restored, but he was not completely cured. The nails of his hands and feet remained like those of a boar as a punishment and as a reminder to him of what he was and in order for him not to go back to his evil works. The saint inquired about the whereabouts of the bodies of the virgins. He went and found them undecayed and he placed them in an honorable place. St. Gregory cured all who were sick and cast out many devils. The king and his people believed. He taught and baptized them. He built many churches, ordained bishops and priests for them and he instituted laws for them to follow. When he completed his strife, he departed in peace. His prayers be with us and Glory be to our God forever. Amen.
189
DLTK's Crafts for Kids Cone Santa Paper Craft Set Santa out on a coffee table or the mantle as a fun Christmas decoration or put him on the top of a small Christmas tree as a tree topper - something to color with The directions are appropriate for an older child or adult to assemble. Don't worry too much if younger children glue the pieces a bit off kilter -- part of the fun of watching them grow is seeing their progress over the years! - Color and cut out the pieces. - Roll the large triangular piece and use the tab to glue it into a cone - Glue the nose onto the face using a dot of glue on the nose (this allows the mustache to stick out from the edges a bit in a slightly 3d manner). - Glue the hat band around the top, just above the face. - Glue the beard around the top, just below the face. You can see how the mouth fits into the little notch in the beard. - Glue the belt around the center, just below the buttons. - Fold the arms in half and glue together (so they're coloured on both sides). Use a dot of glue on the top of the arms (shoulder) to position the arms near the beard, leaving them sticking out in a slightly 3d manner. You can have them sticking straight down, reaching forward, waving, etc... however you want Santa to look!). - Close template window when done printing to return to this screen. - Set page margins to zero if you have trouble fitting the template on one page (FILE, PAGE SETUP or FILE, PRINTER SETUP in most browsers). Printable version of these instructions
782
Nanocrystals May Provide Boost for Solar Cells, Solar Hydrogen Production 5 January 2006 Los Alamos National Laboratory scientists have discovered that a phenomenon called carrier multiplication, in which the absorption of a single photon by a nanocrystal quantum dot can generate multiple electrons, is applicable to a broader array of materials that previously thought. The discovery increases the potential for the use of nanoscrystals as solar cell materials to produce higher electrical outputs than current solar cells, as well as possible application for the photocatalytic production of hydrogen. In papers published recently in the journals Nature Physics and Applied Physics Letters, the scientists demonstrate that carrier multiplication is not unique to lead selenide nanocrystals, but also occurs with very high efficiency in nanocrystals of other compositions, such as cadmium selenide. These new results also shed light on the mechanism for carrier multiplication, which likely occurs via the instantaneous photoexcitation of multiple electrons. Such a process has never been observed in macroscopic materials and it explicitly relies on the unique physics of the nanoscale size regime. Carrier multiplication actually relies upon very strong interactions between electrons squeezed within the tiny volume of a nanoscale semiconductor particle. That is why it is the particle size, not its composition that mostly determines the efficiency of the effect. In nanosize crystals, strong electron-electron interactions make a high-energy electron unstable. This electron only exists in its so-called 'virtual state' for an instant before rapidly transforming into a more stable state comprising two or more electrons.—Lead project scientist Victor Klimov The Los Alamos findings point toward practical photovoltaic technologies that may utilize such traditional solar cell materials as cadmium telluride, which is very similar to cadmium selenide. Other interesting opportunities may also be associated with the use of carrier multiplication in solar-fuel technologies and specifically, the production of hydrogen by photo-catalytic water splitting. The latter process requires four electrons per water molecule and its efficiency can be dramatically enhanced if these multiple electrons can be produced via a single-photon absorption event. Research on carrier multiplication at Los Alamos is funded by the DOE’s Office of Basic Energy Sciences and by Los Alamos’ Laboratory-Directed Research and Development (LDRD) program. "High-efficiency carrier multiplication through direct photogeneration of multi-excitons via virtual single-exciton states; Richard D. Schaller, Vladimir M. Agranovich and Victor I. Klimov; Nature Physics 1, 189-194 (2005) doi:10.1038/nphys151 "Effect of electronic structure on carrier multiplication efficiency: Comparative study of PbSe and CdSe nanocrystals"; Richard D. Schaller, Melissa A. Petruska, and Victor I. Klimov; Appl. Phys. Lett. 87, 253102 (2005) LANL Quantum Dot Research website TrackBack URL for this entry: Listed below are links to weblogs that reference Nanocrystals May Provide Boost for Solar Cells, Solar Hydrogen Production:
699
(Water on the Brain) |Copyright © Nucleus Medical Media, Inc.| - An excess of CSF is produced (rare) - A blockage that doesn't allow CSF to drain properly (more commonly) - Brain tumors - Cancer in the cerebrospinal fluid (CSF) - Swelling in the CSF (such as sarcoidosis) - Cysts in the brain - Malformations of the brain, such as: - Brain injuries - Infections of the brain or the meninges can be caused by a number of agents including bacteria, mycobacteria, fungus, viruses, and parasites, such as: - Problems with the blood vessel in the brain - Bleeding into the brain or CSF space - Headache (often worse when lying down or upon first awakening in the morning or with straining) - Nausea / Vomiting - Problems with balance - Difficulty walking - Poor coordination - Personality changes - Memory problems - Dementia in the elderly - Coma and death - Slow development - Loss of developmental milestones—no longer able to do activities they once could do - Bulging fontanelle (soft spot on the head) - Large head circumference - Shunt placement (ventriculoperitoneal shunt)—a shunt (a tube placed into the brain) allows excess CSF to drain into another area, usually the abdomen. Sometimes a temporary extraventricular drain (EVD) is placed. - Third ventriculostomy—a hole is created in an area of the brain. It allows the CSF to flow out of the area where it is building up. - Removal of the obstruction of CSF flow. For example: removal of tumor or cyst - Lumbar puncture (spinal tap)—This involves the insertion of a needle between the back bones in the back to remove excess CSF. - Medicines—In some cases, medicines, such as acetazolamide (Diamox) and furosemide (Lasix), may decrease the production of CSF. - Other medicines such as steroids or mannitol may decrease swelling around lesions that are causing obstruction of CSF flow. - Get regular prenatal care. - Keep your child’s vaccines up to date. - Protect yourself or your child from head injuries. Toxoplasmosis—foodborne illness that may be prevented by: - Carefully cook meat and vegetables. - Correctly clean contaminated knives and cutting surfaces. - Avoid handling cat litter, or wear gloves when cleaning the litter box. - Cytomegalovirus (CMV)—talk to your doctor about identifying CMV in pregnancy - Lymphocytic choriomeningitis virus (LCV) from pet rodents (mice, rats, hamsters)—avoid rodent contact during pregnancy - Viruses that cause chickenpox or mumps—can be prevented with vaccinations American Neurological Association http://www.aneuroa.org/ Hydrocephalus Foundation, Inc. http://www.hydrocephalus.org/ National Institute for Neurological Disorders and Stroke http://www.ninds.nih.gov/ Health Canada http://www.hc-sc.gc.ca/ Spina Bifida and Hydrocephalus Association of Canada http://www.sbhac.ca/ Goetz CG. Textbook of Clinical Neurology. 3rd ed. Philadelphia, PA: WB Saunders Company; 2007. Hydrocephalus in adults. EBSCO DynaMed website. Available at: http://www.ebscohost.com/dynamed/what.php . Updated May 25, 2012. Accessed September 20, 2012. Hydrocephalus in children. EBSCO DynaMed website. Available at: http://www.ebscohost.com/dynamed/what.php . Updated May 21, 2012. Accessed September 20, 2012. Hydrocephalus fact sheet. National Institute of Neurological Disorders and Stroke website. Available at: http://www.ninds.nih.gov/disorders/hydrocephalus/detail%5Fhydrocephalus.htm . Updated December 16, 2011. Accessed September 20, 2012. Kliegman R, Behrman RE, Jenson HB, Stanton BF. Nelson Textbook of Pediatrics. 18th ed. Philadelphia, PA: WB Saunders Company; 2007. - Reviewer: Rimas Lukas, MD - Review Date: 09/2012 - - Update Date: 00/93/2012 - This content is reviewed regularly and is updated when new and relevant evidence is made available. This information is neither intended nor implied to be a substitute for professional medical advice. Always seek the advice of your physician or other qualified health provider prior to starting any new treatment or with questions regarding a medical condition. Copyright © EBSCO Publishing All rights reserved.
475
Commercially-pressed CD's and CD-R or CD-RW disks are fundamentally different technologies, which is why a commercial CD will continue to be readable long after a CD-R has become unusable. A CD drive uses a focused laser beam that is reflected from the media surface in the CD disc. The beam is reflected onto a sensor that detects changes in the amount of energy that is reflected. The original (commercial) process used perforated aluminum as the media surface. When you use the term "pressed" you are using an old vinyl record term, but the production process is pretty much the same. There is a "master" disk that is put into a press which is filled with polycarbonate. The master disk has little pins sticking up everywhere there is to be a hole in the aluminum. The disk is cooled, and liquid aluminum is spun onto it. This results in an aluminum layer with holes in it. When the disc is played, the laser reflects strongly from the shiny aluminum or less strongly (or not at all) from the holes. The reflection/non-reflection is translated into the ones and zeros of the binary data stored on the disk. Over time the aluminum can oxidize or there can be other changes in the plastic and other materials that make the disc unusable. These are long term effects and the ultimate statistical life of a commercial CD is often debated, without conclusion, by the experts. The CD-R and CD-RW do not use an aluminum media surface. Instead, they use a dye. When the disc is written, a high-powered laser causes spots on the disk to turn dark (hence the term "burning"). When played back, the sensor in the player sees the difference in reflectivity of the dark and not-so-dark spots as the binary data. Unfortunately, because the dye is a light-sensitive chemical, over time it will fade. This can happen from the heat of the reading laser, from ambient light, and from chemical degradation in the dye and support media. CD-R/RW media is safe for backup, and for creating alternate media (copying music files to play in your car so that if they are damaged from heat or wear out you can make another one, and preserve your originals elsewhere), and similar purposes. However, they are not safe for archival storage because they are not stable enough for that purpose. Side note: when burning CD's for use in a car, for best results get "music CD's" which are designed for that application, or slow your burning speed down to 12x or 16x to get a darker spot from your high speed burner. The car will read the disc more reliably. Insofar as tape storage is concerned, tape is also not a good archival choice of media. It's generally better than CD-R, although I haven't seen any comparative studies. Major data centers who use tape storage refresh the storage periodically. Their Tape Management System (TMS) remembers the date the tape was recorded, and will call it up to be copied periodically. The old tape is then erased and reused until it reaches end of life (sometimes a fixed usage or time interval, sometimes when the number of recoverable errors reaches a threshold) at which time it is scrapped. The whole issue of long term archive is complex, and goes beyond media. For media, if a data center stored its files on a 9 track magnetic tape twenty years ago, how would it retrieve that data today (you cannot find working 9 track drives). What if it had used an early Magneto-Optical (MO) drive? Small businesses have trouble when their tape drive fails, and they can't buy another drive in that old format. File formats are another problem. I have word processing documents that deceased family members created years ago. I no longer have word processing software that will import some of those formats. I can (sometimes) extract the raw text and then try to reformat it in a current program, but if I don't have a printed original I don't know how it was intended to be formatted. The only archival format that has stood the test of time is paper. Submitted by: Kevin G. of Dallas, TX Well, Carl, that so-called expert sure has stirred the waters and a LOT of people are wondering about the same question. However, your friendly Federal Government has studied the problem even longer. To be specific, the National Archives and Records Administration, in charge of all of the record archiving of the government, has no standard on media storage, and requested NIST, that's National Institute of Standards and Technology, to write a new standard on media durability. If you never heard of NIST, you're not alone, as NIST is more of a background organization, but suffice to say, they're the ones who creates the standards, references, and accuracy tests for all industries, from DNA to Time accuracy (in fact, if NIST operates one of the Internet "clocks" you can calibrate your PC to). NIST DNA reference material improves forensic DNA test accuracy. NIST also invented closed captioning and many other technology, but enough about NIST. A gentleman by the name of Fred Byers spent a whole year testing various media, and wrote a guide for NIST to librarians who need to archive information on how to care for optical media such as CD-R and DVD-R's and such. In the guide, he basically stated that with proper handling (store in low humidity, no scratching, stored vertically, etc.) a DVD-R should last 30 years with no fear of losing any information. However, that is NOT an absolute number as it is dependent on a LARGE NUMBER OF FACTORS, some of which in your control, and some not: Factors that affect disc life expectancy include the following: type -- as recordable media is more durable than rewritable media manufacturing quality -- you get what you pay for condition of the disc before recording -- obvious quality of the disc recording -- garbage in, garbage out handling and maintenance -- scratches are bad for any discs environmental conditions -- humidity and temperature can warp disc, ruining the reflective layer in the media. light, esp. UV light can destroy the dye used in recordable media, etc. Let us discuss each factor in a bit more detail All types of media can be damaged through warpage (disc bending), scratches, and reflective layer breakdown due to oxygen leakage. Recordable media, in addition, is susceptible to UV rays, which affects the dye used in the process. Rewritable media, with phase-change recording, is even more susceptible to UV ray and temperature. It is generally acknowledged that certain brands of media are better than others, and often the stuff on sale is not the stuff you may want to buy and keep around. What you may not know is that there are only like 16 media manufacturers in the world. They make the media for all the brands that you see in the market, and some brands / factories are known to make high grade media (i.e. they tested best for maintaining data integrity, even when the media was subject to aging tests). While few independent labs did comprehensives tests, a test in Europe a while back for CD-R's revealed that Taiyo Yuden (Verbatim), Kodak (Kodak), and TDK (TDK) kept the most data intact. Condition of the disc before recording A disc should be brand new when used. While shelf live of a media is up to 5 years, why take chances? Buy them as you need tem. Handling and maintenance Scratches are bad for any discs, as it breaks open the substrate layer and allows air to tarnish the inside silver reflective layer inside. Scratches also can make information on the media unreadable by interrupting the laser's path. Environmental conditions -- humidity and temperature can warp the media, and exposure to UV light can destroy the dye used in CD-R's and DVD-R's. Hope that answers your questions. Submitted by: Kasey C. of San Francisco, CA In the '80's, the CD was introduced in the market and portrayed as "THE" solution to the vinyl records. The CD could be thrown in a mud pool, step on it, scratch it, nothing would harm he CD. Now we all know that CD's has a lower lifetime as their vinyl counterparts and are more susceptible to errors than them. This is also true for the CD as a media to record software. The early CD's, were recorded at maximum 640 MB. Mostly not even 640 MB but something like 528 MB. This made them less susceptible to scratches. But as the CD technology was in a constant evolution, overburning a CD to 800 MB and more became common use. Also the DVD was introduced, offering 4/9GB on a wafer of the size of a CD. It is obvious the the tracks are becoming so small that the finest scratch, the smallest fault, can ruin the CD/DVD forever. Answering your question, there is no miracle solution to keep CD/DVD from deterioration trough age. But with a little bit of care, you can have many years of pleasure of your recordings. 1. Buy only CD/DVD from a good brand. Buying low priced CD/DVD will mostly result in very disappointing experiences. 2. Dont overburn a CD/DVD. While the overburn technique is now widely accepted by most software, it is still not fully reliable and mostly dont approved by the CD manufacturers. 3. Put every CD back in the jewel case after use, clean them as prescribed by the manufacturer, and avoid as much as possible touching the reading surface of the CD. As a final remark, CD/DVD are nowadays not expensive and if you can make a backup of them, make a backup and store it in a safe place. I use an external harddisk of 250GB (<300 CD's) to store a backup of the CD's/DVD's I have. Price of the harddisk is about 100$. I have been able many times to rescue recordings which were otherwise lost forever by this harddisk. Hope this helps, Submitted by: Carlos You have just discovered what most people don't discover until they actually lose data: commercial CDs and home-burned CDs are not the same. While a commercial premade CD will last a very long time if it is cared for properly, a home-burned CD will begin to deteriorate. The reason is that the home-burned version uses dyes to accomplish what the premade CD does by having it built into the disk. This is, of course, an oversimplified explanation, but it will suffice. There are a few ways to maximize the amount of time a CD will last. First of all, buy good quality CDs to begin with. Stick with brand names that you are familiar with and have used successfully in the past. Do not assume that just because a blank CD is made by a well-known company that it will be high quality. Test them out by actually using them. One of the best ways to do this is to use them for your regular system backups. Be sure to actually restore from those backups periodically (easier if you have another computer handy that you can wipe out data on) or else use a backup program that allows you to mount the backup as a "virtual drive" and retrieve data from it. This lets you know if there is a problem with a brand deteriorating unusually fast. Second, never use labels on CDs. I found this out the hard way. Labels cause the CD to deteriorate much more rapidly than it otherwise would. Certain inks used in pens have been reported to do the same, but I have never encountered this problem, so it shouldn't be too severe. Do be certain, however, that you are gentle when marking CDs. Use a felt tip and do not press hard. Third, put a note somewhere on the CD that tells you when you made it. This lets you monitor how long it has been since the CD was burned. If the data is irreplaceable, burn it to a new CD every 2 years. As for the recommendation to use magnetic tapes, that has its own set of problems. Magnetic tapes also deteriorate, and they are subject to some damage that CDs are immune to, notably damage from electrical or magnetic fields. In short, CDs are good for long term storage-- but don't assume that "long term" means forever. Check them regularly and burn them to new media when problems develop or even before if you can't replace what's on them. As for storage, that is pretty much common sense. Keep the CDs in a case or an envelope if they are not actually being used. Avoid temperature extremes and handle gently. I also recommend making two copies of every important CD. This practice just saved my data when I discovered that the labels on my CDs had wiped out some irreplaceable family photos. It costs twice as much, but if the data is important to you then it isn't really very expensive, is it? Submitted by: Denise R. of Lebanon, Missouri Hi Carl N, Your question has been set by a lot of people over the last 10 years. I've burned CD in 100s over the years and only found 2 discs with missing information. Lifetime of CDs is not limited due to one parameters only, more issues are setting the limit of lifetime. One is related conditions of storage and how you handle the discs. In other word, how careless or careful you are as the user. Then the material used in the CDs - how cheap a blank CD did you buy. And lastly your burning equipment, that is the laser diode. When pressed CDs were introduced in beginning of the 80s lovers of vinyl records claimed, that CDs would last for 2 years only. But as you have experienced CDs from this period can still be played. I remember one report from about 1990, which claimed a lifetime of only 3-4 years. Looking into the report, it turned out that the condition of storage was -30C (some -25F) and reading/playing equipment had a worn laser diode. Most of us can only say: I don't store my CDs in the freezer and todays laser diodes doesn't wear out as they used to. Turning towards recordable CDs, the whole issue is a matter of having a whole bunch of clear holes placed in circles in a foil. Readability of these holes are depending on a number of issues. How clear are the holes? Is edge of the hole clear? Is the reflectivity of the materials sufficient? Is the laser still as effective as it was? or has the surface become matte? For the early CD-burners this was jeopardized by increasing burning speed and some blank CD had doubtful foil material. Adding, to this some CD-burners were even sold with writing speeds beyond its capability. Many blank CDs were rejected in this period due to bad burners rather than bad discs. It is my conclusion, that this interim period has given us some doubtful discs. You have to be careful with your CDs and also a little bit extra careful with your own. They don't like heat, bright light, bending, and writing with aggressive writing pens is also nasty. Especially pens with unknown chemicals may etch the CDs, it is just like burning, but this time controlled by the chemicals. In case you wanna increase the lifetime of your recordings, you may buy CDs which is claimed to 300+ years lifetime. These CDs are referred to as GOLD-CD. These CDs has a special layer which include some 24ct gold. The advantages of these CDs are the ability to create clear holes into it with reduced oxidation or corrosion over time. Amazing almost also unbelievable 300 year. Just 100 years could be great for me. In 10-20 years everything would be transferred to new media type anyway. I saw a report on the 300 years at Price of these GOLD CDs is 10-20x times the usual ones. You have been suggested to use magnetic tape. Nor tapes does not last forever. As matter of fact the sound quality decays over time; frequency range is decreased by each use. This loss you can not be restored as with a digital media. Only digital storage keeps its audio frequency range over time and use. Like R&R;DIGITAL media is here to stay. You may call it CD, DVD, MPx, Blu-ray or whatever, but it's digital. I believe that todays discs and equipment can provide a disc with sufficient lifetime for most of us and may even restore your more doubtful discs from the early burning time with success. Even discs which are registered as 'No disc' may be restored by copying it today. In case you wanna assure yourselves; let the PC verify the burned disc, this option is normally disabled by default. What shall I do with my precious discs from the early days? My best recommendation would be to make a new copy, while the old is still readable. This is easy and cheap to most of us today as having two drives in your PC is not uncommon. Lastly, the quality and lifetime of recorded discs is today likely to most depended on your own care. Submitted by: Leif M. of Helsingor, Denmark Regarding problems developing over time with recordable CD-R media, I've run into some of this myself, but I also have quite a few discs that were made back when the very first 1x CD burners were made available to the public, and they still read just fine for me. I suspect that there are several factors involved here. 1. I'm certain there's a difference in quality between brands of CD-R media. A number of my really old CD-Rs that still read flawlessly today were Kodak branded, and were considered expensive "premium quality" discs at the time. They're even physically a little bit thicker than most other media I've handled. By contrast, some of the generic media I purchased because of the low price on 100-pack spindles has actually developed "bubbles" where you can see the dye that's sandwiched between the layers of plastic is disintegrating. (Of course it won't read if small spots are completely gone!) There were/are several different types of dye used for CD-R media, as well, and I wouldn't be surprised if it's turning out that some types have better longevity than others. For example, Verbatim was known for using their trademark blue-tinted dye, while others were shades of green or gold. 2. From what I've read and observed, handling makes a big difference too. Leaving your CD-R's exposed to sunlight (as folks tend to do with music CDs used in their cars or trucks) probably shaves years off of their lifespan. Putting them in some type of jewel-case or sleeve when not in use is a very good idea. Boxes of empty jewel-cases can be purchased fairly inexpensively at most office supply and electronics chain stores. 3. A CD-R holding computer data is inherently more "fragile" and subject to data loss than a CD-R recorded as an audio disc. The standard used for recording audio CDs incorporates quite a bit of error correction information to handle small scuffs and scratches on the media, but besides that, audio data is spread out over a much larger portion of the CD-R. If you have a .ZIP file stored on a CD-R, for example, a pinhole-sized mark someplace on the disc where that .ZIP file is stored can easily be enough to prevent the whole archive from extracting properly. By contrast, the same sized mark might only cause a very brief "stutter" at one point of a song on a music disc (or not pose a discernable problem at all, due to the error correction). If your audio discs are already deteriorating to the point where players are rejecting them as "unreadable" or they're skipping badly, it sounds to me like things have gotten pretty bad. The only recommendation I'd have is to re-record your music to fresh, good-quality CD-R media and throw out the old ones - and in the future, make a habit of transferring your music to fresh discs every few years or so. Luckily, in the case of computer software backups, they tend to become so outdated, you no longer really need to keep them by the time the media they're recorded on starts failing. But for those trying to preserve digital photos and the like, I'd recommend this same procedure. Make a fresh set of backups every so often and discard the old media - before it fails on you and you lose something priceless! Submitted by: Tom W. CD burned media fails after time. I am a practicing technician and this is not a new complaint. It is my firm belief that most consumers burn their media at the fastest speed possible for both their software and the media they use. This is fine but there may well be a trade-off in doing this. What most consumers do not perhaps understand is that commercially produced CD's have actual pits pressed into them that represent the digital data of the original sound data. A burned CD on the other hand is made by fabricating a photo sensitive layer to mimic the pits found in pressed media. I have found three major causes for this consumers problem they are as 1. A slower burn makes a stronger image representation in the photo sensitive layer of a burned CD. A faster burn while successful may not impress the photo sensitive layer as effectively as a slow burn. Over time the burn fails as the photo sensitive layer deteriorates. 2. Sunlight and other forms of intense light can effect a burned CD because it can cause a distortion in the burned media's photo sensitive layer. 3. Scratches by far are more evident on burned media and more easily caused than on pressed media. Most consumers seem to ignore the manufactures warning and suggestions. Handling of the disc in a careful manner as advised by the manufacturer is the best policy here. I use a camera lens cloth to clean surface of all my media. A camera lens cloth will not scratch the disc surface. Paper and regular household cloths will cause scratches. Observe the above and I do believe you will have better results. One more thing always use the media recommended by the burner manufacturer. It is endorsed and guaranteed to work, many of the cheap non name discs out there are just not up to par. Its just like the old cassette tape days. Most audiophiles went for tapes like Maxell, JVC, Sony etc. but as everyone knows there were a lot of bogus brands out there for the un-informed to purchase. Submitted by: Peter K. > I recently read an article by a data storage expert who claimed that > burned CD-Rs and CD-RWs can be expected to last only two to five years > and not a whole lot more. I personally have commercially pressed CDs > from the 1980s that still play fine, but I have begun to notice that > some of my burned CD-Rs are beginning to skip you mention that there are basically two types of CDs: Those that are created with all information in place and those you can buy and write on. The first type is quite robust as the information has been "engraved" into the surface just below the reflector. The most critical part of such a CD is the reflector, most often a very thin layer of aluminum. The second type of CD works a bit differently: There is a dye layer below the reflector and the information is written onto the CD-R(W) by "burning" and thereby locally changing the optical properties of the dye. The most critical part is the dye, besides the reflector as above. If the dye degrades the CD easily gets unreadable. The dye of CD-RW is even more critical as it must be "resetable" - another constraint. > The expert suggests that for secure long-term storage, high -quality > magnetic tape is the way to go. This solution is quite expensive as you need a tape drive and enough tape cartridges, but has the advantage of a much larger storage capacity. If the manufacturers say their tape cartridges are reliable for a very long time they have one advantage above CD-R: This type
681
for National Geographic News To swat a fly can be a lesson in futility. The insect darts from each swipe with uncanny precision, altering its course to zip off in nearly the opposite direction. Precisely how a fly achieves its aerial acrobatics is more than a curiosity of annoyance for Michael Dickinson, a bioengineer at the California Institute of Technology in Pasadena. Dickinson has built an entire research lab, not to mention professional career, seeking an answer to just how a fly's brain controls its muscles in precision flight. "An interest in the brain led to an interest in flight and aerodynamics," said Dickinson. "I've spent a lot of time with folks in the lab trying to figure out the basic aerodynamics of insect flight." Together with Steven Fry, a biologist at the University of Zurich in Switzerland, and Rosalyn Sayaman, a research assistant also at the California Institute of Technology, Dickinson determined how common fruit flies use their wings to make 90-degree turns at speeds faster than a blink of the human eye, let alone the swoosh of a swatter. The researchers discovered that the mechanics of how flies execute such turns were contrary to what they initially believed. To turn, a flying creature must generate enough twisting force, or torque, to offset two forces working against itthe inertia of its own body (think forward motion on a bicycle, once you stop pedaling) and the viscous friction of the air, which for small insects is thought to be like syrup. Scientists had long assumed that the viscosity of the air, and not inertia, was the greater force for insects such as flies to overcome. Inertia, they believed, was primarily the bane of larger animals like birds. "No one challenged the notion because there was no indication that it might be different," said Fry. "The results actually proved the opposite." The research team found that fruit flies make subtle changes in the tilt of their wings relative to the ground and the size of each wing flap to generate the forces that allow them to turn. Flies then create an opposite twisting force with their wings to stop the inertia of the turn, preventing an out of control spin. This finding, say the researchers, indicates that inertia, and not friction, is the greater force for the fruit fly to overcome in the turn. Ron Fearing, an electrical engineer at the University of California at Berkeley who is developing a tiny robotic insect capable of autonomous flight, said that the research team has "shown a quite surprising result, in that very subtle changes in wing motion are responsible for rapid maneuvers." The Fly Tests SOURCES AND RELATED WEB SITES
510
HAND-HELD computers have many uses -- but who would have thought they could take art home from a museum? That is just what is happening at the current Biennial exhibition at the Whitney Museum of American Art in New York. At a special kiosk, visitors can download ''Tap,'' a digital artwork by James Buckhouse, into electronic organizers equipped with the Palm operating system, and with that download, receive their own digital dancer (male or female, the viewer picks). The dancer practices, learns from other dancers and gives recitals. Technology in museums, especially the artistic kind, has traditionally meant audio guides. This was not a deliberate oversight; many museums began testing an array of Jetsons-style gadgetry a few years ago, but the dot-com bust and the economic downturn have delayed progress. Museums are now slowly recapturing their momentum. Many are experimenting with the latest technology, and soon their galleries may be wired (or go wireless) for the Internet, allowing visitors to use their hand-held computers to download information about an entire collection or a single object, to explore a museum's hidden archives or bookmark Web pages. The Exploratorium, a science and art museum in San Francisco, is developing the Electronic Guidebook Project, which will not only allow visitors to download additional material on their hand-held computers, but also create a password-protected personal Web page, meaning people can revisit their own selection of the museum's collections from any computer. The American Museum of the Moving Image in New York is testing eDocent, a wireless network in its galleries that will allow visitors to download information into their hand-held computers and bookmark Web pages. The network may also give audiences viewings of what they cannot see in the gallery. Like many museums, the Museum of the Moving Image can display only a small percentage of its collection, 1,200 of 90,000 objects. When eDocent becomes a reality, which is not expected until 2003, audiences could see much of this hidden collection. ''Because our collection is so extensive, we have a huge amount of material to link,'' said Rochelle Slovin, the museum's director. ''The ultimate goal of eDocent is for the information to be so rich and extensive that you could go deeper and deeper into the layers.'' The Walker Art Center in Minneapolis is preparing for a $90 million renovation and expansion project, which will break ground in 2003. Central to the renovation is a wireless network that will provide visitors with more information about objects in the museum, said Andrew Blauvelt, the museum's design director. He thinks that hand-held computers will not be the only way to download material. Indeed, Mr. Blauvelt is interested in what he calls ''social computing,'' which is a shared or collaborative computer experience. This could involve a group sitting at a ''smart'' table, where touch screens embedded in the tabletop would allow many users to tap into Walker's collections and resources, and simultaneously interact and discuss the information with others. To explore other social computing possibilities, Mr. Blauvelt has invited more than 30 artists, designers and architects to submit ideas. He is also interested in futuristic options, like wearable computer guides. ''Technically, the iPAQ is wearable,'' he said, referring to Compaq's hand-held device. ''This is more radical, where circuitry is stitched into a fabric or a scarf.'' Many museums hope that the new technology lures younger audiences. ''We have an entire generation coming up speaking digital as a first language,'' said Leonard Steinbach, a program creator at the Cleveland Museum of Art.
58
Science Fair Project Encyclopedia |President of the| Historically, Landes was part of Gascony. It was one of the original 83 departments created during the French Revolution on March 4, 1790. It was created from parts of the provinces of Guyenne and Gascony. - Prefecture website (in French) - Conseil Général website (in French) Landes is also the name of a commune in the Charente-Maritime département, in France. The contents of this article is licensed from www.wikipedia.org under the GNU Free Documentation License. Click here to see the transparent copy and copyright details
474
Kanthapura is the story of a village in South India named `Kanthapura` written by Raja Rao. He was an excellent writer and the simple story of a village life is depicted in an extra-ordinary way in this creation of his. The title of the story is kept by the name of the village only. So the title truly signifies the story. Born on November 8 in the year of 1908 Raja Rao was a famous writer. The place was Hassan, in the state of Mysore in south India, into a well-known Brahman family. He post-graduated in France, and all his publications were in English. Rao was very much concerned with his language and consciousness. He studied in a Muslim school. After taking a degree from Madras University, he left India for Europe, where he remained for a decade. He studied at the universities of Montpellier and the Sorbonne, doing research in Christian theology and history. In 1931 he married Camille Mouly. She was a French academic. His first stories were published in French and English. His Kannada articles were also published in an influential journal `Jaya Karnataka`. He marriage with Camille Mouly didn`t work out and he got divorced in 1939. Rao returned to India and began his first period of residence in an ashram. In search of his spiritual heritage, he traveled widely in India. This happened during WW II. In 1942 he was active in an underground movement against colonial rule. He also edited the literary magazine `Tomorrow` for some days. `Kanthapura` is the first major Indian novel in English by Raja Rao. The novel deals with the Civil disobedience movement of 1030`s. Mahatma Gandhi on the participation of a small village of South India in the National struggle calls for the story`s central concern. The villagers sacrifice all their material possessions in a triumph of the spirit. It shows how the people of country united at the time of movement and joined at the non-violence movement to bring independence from the British. `Kanthapura` was first published in English and then in France. Achakka narrates the whole story. She is an old village woman and the story revolves around in a village Kanthapura in South India. In this village there are clear discrimination between Brahman, Sudra and Pariah quarters still the mutual bonding between the villagers are very strong and they live happily with equal social and economical bonding. To maintain social harmony they live like one single family. Kanthapura may be isolated and deprived of modern civilization but it is compensated by an ever-enriching cycle of ceremonies, rituals and festivals. Rao depicts beautifully the partication of the villagers in different festivals like Dussera, Sankara-jayanti, Kartik Purnima, Ganesh Jayanti, Styanarayana Puja, etc. the common picture of village has always come up in many of Rao`s story and that can be called as Raja Rao`s speciality. `Kanthapura` by Raja Rao is a marvelous creation. He depicts very simple happenings of a village in a lively manner. In his writing a clear picture of villagers become prominent. In his village religion imparted through discourses and pujas keeps alive in the natives a sense of presence of God. In the whole story a serenity flows in a simple harmonic motion which makes the story worth reading.
560
Source: The Pennsylvania Center for the Book Date: Summer 2010 Byline: Jim Byrne The Philadelphia Lazaretto: A Most Unloved Institution In mid-July 1800, the U.S.S. Ganges, on the U.S. Navy’s earliest warships, encountered two American schooners, the Phebe and the Prudent, while navigating the Straits of Florida. These schooners held neither sugar cane nor corn but rather human cargo, 134 chained captives from West Africa to be exact, doomed for delivery to a notorious slave trader in Havana, Cuba. Commissioned with enforcing the newly-passed Federal Slave Trade Act that prohibited the transport of slaves by U.S. ships, Ganges Captain John Mullowny seized the Phebe and the Prudent, assigned prize crews to man both ships, and commanded them to sail north for Philadelphia. After a 1,500 mile, month long trip up the eastern coast of the United States, the crews arrived at the confluence of the Schuylkill and Delaware rivers with their recently confiscated cargo. Emaciated, exposed, and, surely disoriented, the scores of African survivors disembarked on Province Island, home to the Marine Hospital, a.k.a. the Philadelphia Lazaretto. “The Ganges Africans” — the name bestowed upon them after many were given the surname Ganges — were part of one of the first slave trade violation cases confronted by the newly-established Federal judicial system. Their story exemplifies the ideological clashes that were occurring in the young nation and that would eventually boil over into the Civil War. Interestingly enough, at least two of the Ganges Africans would have extended stays in the Philadelphia area. One of them would become an indentured servant to Thomas Egger, the last quarantine master of the “old” Lazaretto on Province Island and the first one of the “new” Lazaretto in Tinicum Township, Delaware County. A second of the slaves was indentured to farmer Thomas Smith who had sold the property for the new facility to the Philadelphia Board of Health. Moreover, their story reflects in miniature the history of the Philadelphia Lazaretto itself: integral to our nation’s demographic and political landscape and yet often overlooked. Stories like those of the Ganges Africans and the thousands of others who remain little-known or whose tales are untold are the reasons University of Pennsylvania historian David Barnes calls the Philadelphia Lazaretto a place “even rarer and more precious than New York’s [Ellis Island].” Lazaretto seems an unusual name for a hospital in the American colonies. As it turns out, however, the word would become a common English term for isolation facilities and quarantine hospitals, ceasing to be a proper noun at all. As one might think, the term derives from the Italian, but its exact provenance is not completely clear. One theory holds that in 16th century Venice, the name of a local hospital, the Nazaretto, was combined with the name of Lazarus the Beggar from the New Testament. Professor Barnes notes that this theory is less plausible than the simpler, and generally accepted, thought isolation wards and quarantines came to be named for Lazarus the Beggar, patron saint of lepers. Regardless of its origin, it started to be applied to the “old” facility on Province Island built in 1743, though it was still referred to the Marine Hospital. The “new” Lazaretto, however, would never be called anything else. At the end of the 18th century, politicians and doctors throughout the United States were passionately debating public health and quarantine issues, much as members of those same two professions debate health care policy today. Thousands were falling victim to the effects of infectious diseases such as tuberculosis and yellow fever. The issue came to a head in 1793 after futile attempts to quarantine all ships arriving at the port of Philadelphia failed. A yellow fever epidemic of calamitous proportions broke out throughout the city. Within two months, the nation’s largest city and political and economic capital, lost more than a quarter of its population. Approximately 10% perished from yellow fever and another 17% fled the city. After the 1793 epidemic, the city created a Board of Health to oversee conditions in the city. It found, among other things, that the old quarantine facility had failed terribly in preventing the propagation of yellow fever and other infectious diseases. Many authorities blamed this failure on its location only a few miles from the most densely populated parts of the city and thu, facilitating the interaction between infected patients and residents. Determined to prevent another calamity, The Board of Health constructed a new lazaretto ten miles south of Philadelphia in the isolated, uninhabited marshlands of Tinicum Township, Delaware County. Construction of the Philadelphia Lazaretto finished in 1801, almost a century before the building of New York’s Ellis Island and San Francisco’s Angel Island. Upon completion, the Lazaretto was the first of its kind. It was a complex — both stately and state of the art — that, as The Philadelphia Public Ledger said in 1879, “might be mistaken for [the grounds of a] wealthy country gentleman....were it not for the yellow Quarantine flag.” The central figure of the ten acre campus was the main hospital, an august Georgian, double-brick building that could house upwards of 200 patients at a given time. The campus also included the following: the Dutch hospital which was added in 1805 and was primarily used to house German immigrants afflicted with smallpox; the dead-house which was used for incinerating infected patients’ belongings; the barge houses which served as the waiting and sleeping quarters of the bargemen on duty during quarantine season; the residences of the chief physician and the quarantine master; and the government warehouse which stored the goods and merchandise of the quarantined vessels. These facilities and the sheer size of the campus made the Philadelphia Lazaretto a state-of-the-art hospital in comparison to its contemporaries. Remarkably, more than two centuries after their construction, the main hospital building and several other buildings remain intact and are rather well preserved. During its years of operation from 1801 to 1893, the Philadelphia Lazaretto was certainly neither revered nor loved. As a matter of fact, sailors, merchants, and newly arriving immigrants dreaded and abhorred the sight of its flag — a yellow banner. It was, as University of Pennsylvania professor and the Philadelphia Lazaretto’s de facto historian David Barnes calls it, a most unloved institution. During the hospital’s near century of operation, the Philadelphia Lazaretto’s staff inspected and quarantined hundreds of thousands of merchant ships, much to the chagrin of businessmen and sailors. The hours, days, or even months at the Lazaretto meant the spoiling or confiscation of cargo and, in turn, the loss of significant capital. In addition to the loss of the merchants’ cargo, the Philadelphia Lazaretto was also the site at which sailors and immigrants perished. Many immigrants, much like the “Ganges Africans,” took their first steps on American soil. According to various estimates, a thirst of all Americans have an ancestor whose first contact with the New World was at the Lazaretto. After closing its doors as a quarantine station in 1893, the site and the buildings went through several transformations. The Philadelphia Athletic Club purchased the site and renamed it the Orchard Club. The Orchard Club was a summer get-away for wealthy Philadelphians who used its prime waterfront location for leisure and recreation. There were several athletic clubs whos sponsored baseball teams during this era, and some even played their games on the grounds of the Lazaretto. These were not, however, the forerunners of the American League’s Philadelphia Athletics. After the closing of the Orchard Club, Colonel Robert Edward Glendinning — a substantial contributor to wartime aviation in the First World War — and George C. Thomas opened the Essington School of Flying in 1913. It was the state’s first water flying school and one of the first in the world. Sadly, today the Philadelphia Lazaretto lies, mostly forgotten, in the same marshlands of Tinicum Township, Delaware County. Were it not for the tireless lobbying of a group of hard-working activists, the site may well have been destroyed. Though a township firestation was recently build on the northern half of the Lazaretto site, there is still much worthy of preservation. Similar projects, like New York’s restored Ellis Island and San Francisco’s Angel Island (in process), have given voice to the thousands and hundreds of thousands who came to these shores. The Friends of the Lazaretto and others are working hard to ensure that the rest of the site will stand as testament to the immigrants who landed in Philadelphia.
856
Recently there has been a substantial increase in the attention being paid to Chronic Wasting Disease (CWD) by the media, state and federal natural resource agencies, and hunters and outdoor enthusiasts. The Florida Fish and Wildlife Conservation Commission (FWC) developed this page to provide background information on CWD and explain what is being done to determine if the disease is in Florida, and if it is not, what we are doing to make sure it never gets here. What is Chronic Wasting Disease? Chronic Wasting Disease is a progressive, neurological, debilitating disease that belongs to a family of diseases known as Transmissible Spongiform Encephalopathies (TSEs). It is believed to be caused by an abnormal protein called a prion. CWD has been diagnosed in mule deer, white-tailed deer, and Rocky Mountain elk in captive herds and in the wild. Other cervids (antlered animals) may also be susceptible. CWD attacks the brains of infected animals, causing them to become emaciated, display abnormal behavior, and lose bodily functions. CWD is a fatal disease. Clinical signs include excessive salivation and grinding of teeth, increased drinking and urination, dramatic loss of weight and body condition, poor hair coat, staggering, and finally death. Behavioral changes, including decreased interaction with other animals, listlessness, lowering of the head, blank facial expression, and repetitive walking in set patterns also may occur. How is CWD transmitted? Transmission of CWD occurs by direct contact with body fluids (feces, urine, saliva) or by indirect contact (contaminated environment). The prion is persistent in the environment and premises may remain infective for years. Crowding, such as in deer farms or by artificial feeding, facilitates transmission. There is no evidence that CWD can be transmitted to livestock or humans. Where is CWD found? CWD has been found in captive and/or free-ranging cervids in Colorado, Illinois, Iowa, Kansas, Maryland, Michigan, Minnesota, Missouri, Montana, Nebraska, New Mexico, New York, North Dakota, Oklahoma, Pennsylvania, South Dakota, Texas, Utah, Virginia, West Virginia, Wisconsin, Wyoming, the Canadian provinces of Saskatchewan and Alberta, and South Korea. In the US, the core endemic area is contiguous portions of Wyoming, Colorado, and Nebraska. The prevalence of CWD in this area is approximately <1% - 15% in mule deer and <1% in elk, although this varies greatly by location. Virginia and West Virginia are the only Southeastern states where CWD has been detected. CWD has not been found in Florida. How is CWD diagnosed? Currently the only practical method for diagnosing CWD is through analysis of brain stem tissue or lymph nodes from dead animals. There is no practical live-animal test. A tonsilar biopsy may be done on live animals; however, this is difficult and deer have to be held until diagnosis. How is CWD controlled in a population? Control is extremely difficult once CWD becomes established in a natural population. This is because of the lack of a practical live-animal test, long incubation periods, and the persistence of the prion in the environment. Also, there is no vaccine or treatment once an animal gets the disease. If detected early in free-ranging populations, i.e. when prevalence is low, then eradication may be an achievable goal. This is not currently considered possible in the core endemic area; Wisconsin, however, has initiated an aggressive eradication program in the portion of the state where CWD has been found. What steps is FWC taking to determine if CWD is in Florida, and if it is not, what is being done to keep it from getting here? The FWC has initiated a comprehensive monitoring program to make sure CWD is not already in Florida. We are asking the general public to keep their eye out for deer showing symptoms indicative of CWD. If you see a sickly, extremely skinny deer (see photo) report its location to the CWD hotline, toll free (866) 293-9282. If you harvest such a deer, do not handle it but call the CWD hotline. A biologist will collect the deer and take it to a lab for a necropsy. In addition, we will be collecting and testing tissue samples from hunter-killed deer during the hunting season. All CWD test results will be posted on this site as they are received. Click here for Florida CWD test results. The number one objective in CWD management is to prevent it from spreading into new areas. One theoretical mode of disease transmission is through infected deer, elk or moose carcasses. Therefore, in an effort to minimize the risk of the disease spreading, Florida has adopted regulations affecting the transportation of hunter-harvested deer, elk and moose from CWD-infected areas. It is illegal to bring into Florida carcasses of any species of the family Cervidae (e.g. deer, elk and moose) from 21 states and two Canadian provinces where CWD has been detected. At this time, CWD has been detected in Colorado, Illinois, Iowa, Kansas, Maryland, Michigan, Minnesota, Missouri, Montana, Nebraska, New Mexico, New York, North Dakota, Oklahoma, South Dakota, Texas, Utah, Virginia, West Virginia, Wisconsin, Wyoming, and the Canadian provinces of Saskatchewan and Alberta. Visit the United States Department of Agriculture's Web site for state-to-state CWD reports. Hunters still can bring back de-boned meat from any CWD-affected region, as well as finished taxidermy mounts, hides, skulls, antlers and teeth as long as all soft tissue has been removed. Whole, bone-in carcasses and parts are permitted to be brought back to Florida if they were harvested from non-affected CWD states. The most likely way CWD will get to Florida is through importation of live infected animals. To prevent this, live cervids (mule deer, white-tailed deer and elk) cannot be imported into Florida unless they come from a herd certified CWD-free by the Florida Department of Agriculture and Consumer Services. Any illegal importations of cervids should be reported to 1-888-404-FWCC. Public health and wildlife officials advise hunters to take the following precautions when pursuing or handling deer that may have been exposed to CWD: - Do not shoot, handle or consume any animal that is acting abnormally or appears to be sick. Contact the Florida Fish and Wildlife Conservation Commission (FWC) toll free at (866) 293-9282, if you see or harvest an animal that appears sick. - Wear latex or rubber gloves when field dressing your deer. - Bone out the meat from your animal. Don't saw through bone, and avoid cutting through the brain or spinal cord (backbone). - Minimize the handling of brain and spinal tissues. - Wash hands and instruments thoroughly after field dressing is completed. - Avoid consuming brain, spinal cord, eyes, spleen, tonsils and lymph nodes of harvested animals. (Normal field dressing coupled with boning out a carcass will remove most, if not all, of these body parts. Cutting away all fatty tissue will remove remaining lymph nodes.) - Avoid consuming the meat from any animal that tests positive for the disease. - If you have your deer commercially processed, request that your animal is processed individually, without meat from other animals being added to meat from your animal. For additional information on Chronic Wasting Disease check out these sites: USDA - Animal and Plant Health Inspection Services USGS - National Wildlife Health Center Southeastern Cooperative Wildlife Disease Study Florida Department of Health - Disease Control Chronic Wasting Disease Alliance Other FWC Resources: Florida Monitoring Program 2002-2009 If you see a sickly, extremely skinny deer report its location to the CWD hotline, toll free (866) 293-9282.
747
Games, Interactivity, and Playable Media Games, Interactivity, and Playable Media spans offerings in visual arts, film and media, and computer science to foster technical and digital literacy in the arts. Designed for experimentation, this initiative helps students establish digital proficiency while supporting the exploration of a wide range of new media forms and technologies. Courses of study might include visual programming, artificial intelligence, gaming, robotics, experimental animation, computer arts, experimental media design, data visualization, real-time interactivity, digital signal processing, cross-platform media environments, and mobile media development. Students are encouraged to coordinate these project-based investigations of the digital throughout their studies in the humanities, including literature, philosophy, politics, sociology, theatre, and writing.
252
The Founding Fathers, as a group, were a band of very wise men. Perhaps the wisest was Benjamin Franklin, a rare combination of genius and solid common sense. He also had that attribute of truly wise people: the sense to hide his intellect to some extent behind a fog of good humor. How fortunate for America that throughout his life he placed his intellect at the service of his country, a country he understood at an early date embraced all of the colonies in British America. At the end of his life his final great service to America was at the Constitutional Convention where his calming words helped bring disputing factions together to achieve the task of hammering a document together that has endured through the centuries. Many of the delegates noted the importance of Doctor Franklin in the process of bringing the Constitution to life. One of the delegates, Dr. James McHenry of Maryland, a surgeon who had served as an aide to General Washington during the Revolutionary War, recorded that as Franklin was leaving Constitution Hall “A lady asked Dr. (Benjamin) Franklin, “Well Doctor, what have we got, a republic or a monarchy?” “A republic,” replied the Doctor, “if you can keep it.” I have always been struck by that answer, because Franklin indicated in it that it is the responsibility of each individual American to keep the nation a Republic, not the responsibility of someone else. Sound advice in 1787, sound advice in 2011.
21
|born on||11 March 1611 at 12:00 (= 12:00 noon )| |Place||Southwick, England, 50n50, 0w13| |Timezone||LMT m0w13 (is local mean time)| |Astrology data||20°32' 15°14 Asc. 17°30'| British scientist, a brilliant linguist and mathematician. He was the son of a non-conformist clergyman who died when the boy was five and left the legacy of a good library. Pell was a bright and multi-lingual student and very handsome. Famed in philosophy and math, he established a school in Sussex. Married in 1632, he had eight kids. Also unpractical and improvident, he struggled with his financial position and died in poverty 12/12/1685. - Relationship : Marriage 1632 (Lasting) - Death, Cause unspecified 12 December 1685 (Age 74) chart Placidus Equal_H. - Death of Father 1617 (When he was five) Martin Harvey in Nativitas I, "His youngest uncle guessed 'about noon.'" - Notable : Famous : Top 5% of Profession - Notable : Extraordinary Talents : For Languages - Vocation : Science : Mathematics/ Statistics (Mathematician) - Family : Parenting : Kids more than 3 (Eight) - Family : Relationship : Number of Marriages (One) - Family : Childhood : Family traumatic event (Age five when dad died) - Lifestyle : Financial : On the edge (Impractical; died in poverty)
313
“Norman Clyde was attracted to the Sierra Nevada Mountains sometime after 1911 while in his mid-20s… Clyde spent more than 50 years perfecting his mental maps, locating crashed airplanes, and rescuing lost souls and climbers in trouble - or retrieving their bodies. Clyde’s name was legendary. Many climbers would rank him second only to John Muir as an intimate pioneer of places inaccessible and second to none as a climber… Clyde climbed Mt. Whitney at least 50 times. Between 1914 and about 1940, he became the first climber to reach the tops of at least 126 peaks.”
459
Date: September 16th 2006 Hair loss is experienced by all of us at one or the other time. To know the causes of hair fall, it is very essential to know the structure of hair and its normal growth cycle. Structure of hair The hair on our scalp can be divided into two parts, the root and shaft. The root part of hair is in the skin (epidermis) of scalp. The hair root is surrounded by a pouch like structure called follicle. The base of hair root is in the shape of a bulb. This bulb is indented by capillaries and nerve fibers. The cells in the center of bulb divide. The newly divided hair cells push the previous cells up. The cells which move upwards die slowly forming hard hair shaft. The hair shaft has three layers the cuticle, medulla and cortex.Cuticle is the outer layers and protects the inner layers. It is transparent. Healthy cuticle gives a shiny appearance for hair and unhealthy cuticle gives lifeless look. The medulla is the innermost layer composed of large cells. The cortex is the layer between cuticle and medulla. This contains pigment and keratin. Cortex determines the bulk and strength of hair. The hair follicle contains oil secreting glands which make the hair shiny .Stress and illness diminish secretion of oil and pigments causing graying of hair.According to Ayurveda the hair is considered as a tissue which uses the same nutrients of bone and considered as a tissue which is formed as bi-product of bone tissue. Normal cycle of hair growth. About 10 % of the hair on the scalp is in a resting phase at any given time. The resting hair falls after 2 to 3 months and new hair starts growing in its place. The growing phase continues for 2.25 to 6 yrs. During this phase each hair grows approximately 1 cm per month. At any given time about 90% of the hair on scalp will be in growing phase. Few strands of hair fall as the part of normal hair growth cycle. But some people may experience excessive hair fall which is more than normal cycle. Excessive hair loss can affect men, women and children. Causes of hair loss 1. Hormonal imbalance in men and women: In men high concentration of dihydrotestosterone (DHT) in hair follicles causes hair fall. In women hormonal imbalances during pregnancy and after delivery cause hair fall. 2. High amount of sebum in scalp clogs pores of scalp and prevent nutrition to hair follicle. 3. Inadequate nutrition causes hair fall. 4. Stress, worry, lack of sleep, worry and anxiety cause hair fall 5. Long standing diseases like typhoid, viral infections, anemia, surgery etc cause general debility which lead to hair fall 6. Some medicines used for gout, chemo therapy of cancer , birth control pills , antidepressants etc cause hair fall 7. Diseases like lupus, diabetes cause hair fall. 8. Tying hair tightly pulls the hair from follicles and cause traction alopecia. 9. Heredity also causes hair fall. 10. Dandruff or Fungal infection of scalp. 11. Accumulation of dirt on scalp causes blocking of pores and weakens hair roots. This leads to hair fall. According to ayurveda the causes of hair loss are described as follows:- 1. Too much exposure to dust, sunlight, water and other pollutants. 2. Too much of sweating. 3. Irregular sleeping pattern. 4. Anxiety, depression, insomnia. 5. Unhygienic way of living 7. Alcohol consumption. Hair Loss Remedies 1. Liberal intake of vitamins. 2. High protein and iron rich diet. 3. Consumption of raw vegetables, fresh fruits, salads, green leafy vegetables regularly. 4. Washing hair regularly ( twice weekly ) with suitable shampoo. 5. Using relaxing techniques to overcome stress, anxiety and sleeplessness. 6. Preventing fungal infections of scalp. 7. Preventing hairstyles which pull hair. Due to these causes the tridoshas get vitiated and cause hair loss. The vitiated doshas affect the scalp skin and cause hair fall occurs. Medicated oil with the herbs Bhringaraja ( Eclipta Alba ), Amalaki ( Embelica officinalis ), Haritaki ( Terminalia chebula ) and Vibhitaki ( Terminalia bellirica ) is a best remedy for hair fall. Leave a Reply You must be logged in to post a comment.
160
With the arrival of cold weather, the Occupational Safety and Health Administration is reminding employers to take necessary precautions to protect workers from the serious, and sometimes fatal, effects of carbon monoxide exposure. Recently, a worker in a New England warehouse was found unconscious and seizing, suffering from carbon monoxide poisoning. Several other workers at the site also became sick. All of the windows and doors were closed to conserve heat, there was no exhaust ventilation in the facility, and very high levels of carbon monoxide were measured at the site. Every year, workers die from carbon monoxide poisoning, usually while using fuel-burning equipment and tools in buildings or semi-enclosed spaces without adequate ventilation. This can be especially true during the winter months when employees use this type of equipment in indoor spaces that have been sealed tightly to block out cold temperatures and wind. Symptoms of carbon monoxide exposure can include everything from headaches, dizziness and drowsiness to nausea, vomiting or tightness across the chest. Severe carbon monoxide poisoning can cause neurological damage, coma and death. Sources of carbon monoxide can include anything that uses combustion to operate, such as gas generators, power tools, compressors, pumps, welding equipment, space heaters and furnaces. To reduce the risk of carbon monoxide poisoning in the workplace, employers should install an effective ventilation system, avoid the use of fuel-burning equipment in enclosed or partially-enclosed spaces, use carbon monoxide detectors in areas where the hazard is a concern and take other precautions outlined in OSHA's Carbon Monoxide Fact Sheet. For additional information on carbon monoxide poisoning and preventing exposure in the workplace, see OSHA's Carbon Monoxide Poisoning Quick Cards (in English and Spanish). Under the Occupational Safety and Health Act of 1970, employers are responsible for providing safe and healthful workplaces for their employees. OSHA's role is to ensure these conditions for America's working men and women by setting and enforcing standards, and providing training, education and assistance. For more information, visit www.osha.gov.
276
Malheur Cave, 13 miles east of Princeton, is 3,000 feet long, and the height varies from 8 feet near the entrance to a maximum of 20 feet far back in the cave. An underground lake fills the lower end of the cave, and fluctuation can cause the water to raise within 1,000 feet of the entrance. The Masons, Robert Burns Masonic Lodge No. 97, used this cave extensively for ceremonies and other functions. The curious come on a year-round basic, the kids for fun, the scientists for answers to long-time questions, and the cavers, just to meet or visit an old friend. The Masons own the cave, but have left it open to whoever wishes to cool off on a hot summer day, explore its many wonders and paddle its waters, just as it was done decades ago After passing under the low, arching entrance, the passage opens to a wide expanse of level dirt floor. The walking passage eventually reaches two rows of wooden beachers used by the Masons. After passing the cement platform, the passage begins to get more muddy and filled with boulders of breakdown from the ceiling. The point where the passage turns to water depends on the time of year and the level of the adjacent reservoir. Beneath the waters is a submerged boat and soon the waters reach to the ceiling of the passage. Divers have plumbed to the end of the cave.
191
As one year shifts into the next, it is worthwhile to look at two artists who use non-permanence and change as their medium. It may seem strange to make an artwork knowing it may only last a few hours, but that's exactly what happens when you create art on the beach. And we're not talking sandcastles. Jim Denevan and Andres Amador are just two artists who use sand as their palette and canvas. Their large scale earth works, so large they are only visible from afar, hark back to the sixties tradition of land art, zen meditation and even crop circles, but with a contemporary twist. Andres Amador's Playa Paintings, ranging from 100 to several thousand feet, were all made by raking sand on the beaches around California. "The beach renews itself and there is no clean up involved", he says of his methods. Some have environmental messages, like the Biohazard and Warning signs he made following the oil spill of 2007. Surfer (and founder of the "Outstanding in the Field" moveable feasts) Jim Denevan has created over 600 drawings in the sand, using sticks and garden tools. He has also exhibited at PS1 MOMA and Headlands Center for the Arts. He recently made the world's largest freehand drawing on a dry lake in Nevada, walking for eight days to draw the 3 mile pattern. Although their art is as temporary as the winds or tides, for both Amador and Denevan it is this fleeting moment that motivates them. So sign up to their newsletters to find out about the next sand action, or it will be gone before you know it. Click on a picture to launch the image gallery (7 images)
385
Recent acts of violence alongside pending legislation and international pressure have brought to light the pressing need for lawmaking in support of LGBT rights in Chile. Together with protests for reforms in the education system, the public seems to be increasingly impatient about what the government is doing to protect LGBT rights. These demands are important beyond the scope of gay rights, because they have brought attention to the need for Chile to recognize, accept and protect the human rights of an evolving, heterogeneous culture as a fundamental prerequisite for continued prosperity. The passage of an antidiscrimination law, which remained unresolved for over seven years, by a close 58-56 vote in the Chamber of Deputies this month was a basic necessity for the country. The Chilean Movement for Sexual Minorities (MOVILH) notes that in 2011 gay, lesbian and transgender Chileans were increasingly outspoken in reporting abuse and discrimination based on sexual orientation and gender identity. However, this recently passed antidiscrimination law does not deal with hate crimes per se, but rather defines illegal discrimination. Furthermore, certain passages have yet to be finalized in a mixed commission of Senators and Deputies on May 2. The recent death of gay youth Daniel Zamudio points to precisely why legislating solely on discrimination does not suffice in this case, serving as an exceptionally violent example as to why hate crimes require specific punishment under the law. Zamudio received not only the public’s sympathy, but also worldwide attention including a briefing note from the UN Office of the High Commissioner for Human Rights’ spokesman, Rupert Colville, urging Chile to enact hate crime legislation. In this regard, the MOVILH also argues that Chilean society is not opposed to legislating on issues of gay rights and antidiscrimination in its entirety, but there is a lack of bravery and willingness within Congress to approach these pending issues. The recent Inter-American Court of Human Rights’ overturning of a Chilean court ruling against lesbian Judge Karen Atala, who lost custody of her children because of her same-sex relationship, is further international pressure for Chile to meet requirements stipulated by international agreements it has signed onto. Chile’s gay rights deficit is worrying as the country continues to be viewed as an example for continued economic growth despite global market volatility. President Sebastian Piñera’s administration is cautious about giving into all public demands, as Chile’s Minister of Finance Felipe Larraín recently said: “If we surrender to the temptation of appeasing demands by giving in to all of them, we will never get to our final goal [development].” However, most gay rights issues rely merely on political willingness rather than investment for social welfare. Furthermore, acting on gay rights is not the investment equivalent of reforming a public education system. On the contrary, the lack of legislative initiative to protect gay Chileans is hindering the business community’s business opportunities. Private initiatives have been taken to reach out to gay customers, like for example the granting of access to mortgages and family insurance plans to Banco de Chile customers in same-sex relationships, proving how it is not only the public that is restless, but also the private sector that recognizes the positive effects of social inclusion in business. What could potentially prove threatening to Chile’s continued economic success might just be the lack of recognition given to the longstanding need for social inclusion of minorities in the country’s legal framework. In contrast, Chile’s neighbor Argentina has clearly reaped the benefits of gay tourism and investment since legislating on gay marriage, while Chile continues to turn a blind eye to opportunity. This is not to say that Piñera’s administration has not taken basic steps to promote the rights of gay couples, like for example Piñera’s public presentation of a civil unions bill in August 2011. However, this legislative project was not only perceived as a political tool in the midst of cabinet discussions with student protest leaders, but is also minimal when considering the prominent use of gay couples in campaign ads for Sebastian Piñera during his presidential campaign. For this reason, the inclusion of a question in the 2012 census that allows gay couples to state whether they live with a same-sex partner may become an important, confidential and unbiased figure that current and future administrations could use to advocate for legislation on gay unions. This paradox persists despite the heightened quality of life of Chileans. Economic growth is creating an increasingly obvious deficit in basic human rights the country has yet to attain. In spite of continued development and well-regarded fiscal policy through the recession and into today’s administration, Chile continues to be in debt to not only its citizens and the country’s business community, but also to international human rights agreements on sexual orientation and gender identity. These international standards continue to be well above those demonstrated by the current state of gay rights legislation in Chile. Eduardo Ayala is a guest blogger to AQ Online. He is Chilean-American and works at the Council of the Americas in New York. He graduated from The George Washington University, during which time he also completed coursework at The University of Chile and The Pontifical Catholic University of Chile in Santiago.
805
by Nate Jones, Vertebrate Ecology Lab (still in the Bering Sea) … Of course the bad weather I’ve been writing about was nothing compared to what happens on the Bering during the months of February or March, and the Gold Rush fishes regularly during that time of year, so I had complete faith in the seaworthiness of the ship and the judgment and skill of the crew. I took comfort in that thought, and stumbled down to my bunk for what became a grueling 72 hours of bumps, rolls, and queasy stomachs. During this stormy time the crew exchanged watches at the helm, keeping the ship pointed into the fury. We all hoped for the best, but by the time the seas had calmed to (a more manageable?) 8-10’, the hungry ocean had damaged and ripped off much of our scientific equipment, snapping several ¼” steel bolts and ripping welds clean apart! The Gold Rush itself weathered this storm in fine shape (wish we could say the same of our scientific equipment!), and there were no major injuries to anyone on board. It really was quite a minor event in the context of the Bering Sea; just another blowy, bumpy day or two out on the water. But, it impressed me and I couldn’t help contemplating darker scenarios – what happens when there is a true emergency? What if someone had been swept overboard, or, worse yet, what if the ship itself had been damaged or taken on water and started to go down? Such things do happen, although not as frequently now as they have in the past (coast guard regulations and improvements in technology and crew training have contributed to much increased safety). In my next post I’ll put up some images from training exercises that are routinely undertaken to help prepare crew and passengers (scientists) for emergencies at sea…
413
What fun it is to build a snowman each year! This Shared Reading book is similar to the familar "Buckle My Shoe" but with original text. It shows each step necessary to make a snowman. It is a perfect way to develop the concept of sequencing with your students. ?This full colored printable comes with matching pictures and word cards for your Pocket Chart & a student extension worksheet to use in a poetry journal or as a Take-Home page.?Enjoy our poem! Jackie and Kylene Jackie and Kylene primary grade teachers who specialize in Singable Text for grades Kindergarten & 1st. Our songs, poems, and songs are always set to familiar tunes and great for developing literacy skills in both English only and English Language Learners. We LOVE creating both our singables and other resources that support teachers like skill-based games, writing extensions, emergent readers. Visit our website at www.jkcurriculumconnection.com for additional FREE downloads and teaching tips and resources.
491
Who's most likely to get Parkinson's disease? In the U.S., the disease is more likely to affect men than women, more likely to affect white or Hispanic individuals than black or Asian people and much more likely to affect those over sixty than those younger, according to a study published in the American Journal of Epidemiology in 2003. Other research suggests that globally, you're more likely to get Parkinson's if you live in an industrialized country like the U.S. than if you live in a less developed nation. However, there's no clear-cut data on the demographics. "It's hard to believe that we don't have that data now," says Dr. J. William Langston, founder and director of the Parkinson's Institute, "but ... it's not available anywhere in the world." In part, this is because Parkinson's disease affects a relatively small population -- at most one to two percent in the United States -- and because of difficulties in consistently diagnosing the disorder. Is the risk of getting this disease growing? There's even less data on how the rate of Parkinson's cases have changed since it was first identified in 1817. The number of cases is rising as the global population ages, but it's not clear whether Parkinson's is affecting a larger percentage of the population than it has in the past. Some research has found that the risk of getting Parkinson's in the U.S. rose slightly between 1935 and 1985, but when it comes to tracing the history of the disease, major data holes remain. "Certainly, there have been individuals described hundreds and hundreds of years ago that have what sounds very much like Parkinson's disease," says Dr. Michael Zigmond, a Parkinson's researcher at the University of Pittsburgh. However, he adds, "We can't easily evaluate people who are not here now, even through the eyes of a neurologist 50 or 100 years ago." What we call Parkinson's today, doctors might have diagnosed differently in the past. What doctors used to call Parkinson's we may now have identified as something else. However, there are some new projects underway on the demographics of the disease. For example, the California Parkinson's Disease Registry will collect detailed information on every Parkinson's diagnosis in that state. Says Dr. Langston, "This will tell us for the first time, is the disease increasing, changing with time? Are there pockets or clusters of the disease? Are there differences in rural versus urban areas, socioeconomic differences, etc.?" What causes Parkinson's? Even though Parkinson's was formally identified almost 200 years ago, scientists are still trying to find out what causes it. "We still don't have a smoking gun, that's for sure," says Dr. Langston. "But that's what we're looking for." The greatest obstacle to pinpointing what causes it is that there seems to be no single cause. In some cases, the disease appears to be a genetic defect, while in others, exposure to toxic substances or certain viruses seems to be a factor. Some scientists believe a mix of environmental exposures and underlying genetic sensitivities may ultimately explain what triggers the disease. What about environmental factors? Sorting out the possible environmental influences on Parkinson's disease is a big challenge. In the early 1980s, after discovering the toxin MPTP -- very similar to a compound found in a common pesticide -- could induce Parkinson's virtually overnight, scientists expected to track down the chemicals responsible for causing the disease in a matter of a few years. Nearly three decades later, "Very few individual specific compounds have been identified," says Dr. Langston. "Most of these are modest risk factors, two to threefold increase in risk." Scientists have tracked disparate leads in search of an environmental explanation. They've researched Parkinson's-like symptoms in an individual who ingested petroleum products, in Taiwanese women who'd contracted a herpes virus and in people from Guam who eat a type of seed known to contain a neurotoxin. While finding a common thread among these scenarios has proved nearly impossible, much of the research has led back to pesticide exposure as the leading suspect in causing a large number of Parkinson's cases. How clear is the link between pesticide exposure and Parkinson's? According to Dr. William Langston, "I don't think we're yet at the point of being able to say unequivocally that if you live in an area where there's more pesticides than other areas, you're at a higher risk." But new research may illuminate the link. One study is mapping Parkinson's cases in California against areas known to have high pesticide use. Another is collecting data from over 50,000 licensed pesticide applicators in two states to track whether these individuals face an increased risk of getting Parkinson's. "This, I think, may really answer the question of not only whether pesticides are an increased risk, but also, specifically, which pesticides," Dr. Langston hopes. "Because it's their profession, they know what they use, as opposed to, I couldn't tell you what I sprayed with in the garage last week." Is there a gene, or genes, that causes Parkinson's? So far scientists have identified six forms of genetic Parkinson's and are searching for more. However, the number of cases with a genetic link is a tiny portion of the overall number of cases. Still, doctors hope that better understanding the genetic form of the disease could help unravel the mysteries about other forms of Parkinson's. But the genetic component of Parkinson's has also proved more complicated than once thought. Scientists have determined there's no single gene for Parkinson's -- one gene may trigger the disease in one family, while a different gene triggers it in another family. Scientists also suspect that in some cases, developing genetic Parkinson's may require having multiple trigger genes, because studies of families with a high incidence of the disorder have shown that some individuals can carry the main gene identified as causing Parkinson's yet never develop symptoms. How far along are scientists in figuring out the interaction -- the connection -- between genes and the environment? A large study of over 20,000 identical twins -- who share the same genetic code -- is underway to trace when different environmental exposures can trigger Parkinson's in one twin but not the other and under what circumstances both twins develop Parkinson's. Why is Parkinson's so hard to diagnose? Diagnosing Parkinson's can be a challenge in part because some mild Parkinson's symptoms at first just seem like the universal effects of aging -- a tremor in the hand, difficulty balancing and shuffling the feet. "I think everybody gets a little Parkinsonian as you get older," says Dr. Clive Svendsen, who is studying stem cell therapies for Parkinson's at the University of Wisconsin. "And in fact, most of the literature points out a gradual reduction in dopamine neurons" -- the neurons whose death causes Parkinson's best-known physical symptoms -- "over time in everybody." What are the hallmark symptoms? Do all patients have the same symptoms? There's no clear epidemiological record of whether the specific symptoms doctors look for and patients express have evolved over time, but the hallmark of Parkinson's has always been tremors throughout the body. Making a definitive diagnosis has often proved difficult, however, because the exact nature of the symptoms can vary widely from patient to patient. Recent studies show that even members of the same family who share a single genetic form of Parkinson's may display very different symptoms. One patient may have foot tremors accompanied by difficulty sleeping, while another may have hand tremors and difficulty keeping his balance. What are the new discoveries about Parkinson's symptoms? In recent years scientists have found that Parkinson's is much more than a disease of shaking limbs. "When I started my residency, this was a very simple disease," recalls Dr. William Langston. "A number of cells die in a small area of the brain that made a chemical called dopamine. When they died, you had no more dopamine. Without dopamine, it's difficult to move. ... And that's the way we diagnosed it. When dopamine's down, you got rigid, you developed a tremor, gait became slowed and shuffling, etc. Any neurologist can diagnose that." But now, says Langston, "At this point in time, we know that Parkinson's is a much more complicated disorder. Many different areas of the brain can be affected. It probably evolves in a very specific order, starting in the low brain stem and then eventually affecting other areas, including the nigra, which causes Parkinsonism [the tremors]. But all of these other areas of the brain that are affected can also cause symptoms." These newly-recognized symptoms range from loss of the sense of smell to digestive problems to depression. Why has it taken doctors so long to recognize the wide array of symptoms now connected to Parkinson's? "Because [patients] don't come to neurologists if they have, say, sleep disorders or loss of sense of smell or even constipation, which is a very bothersome symptom in Parkinson's," says Langston. How close are we to having an earlier, more accurate diagnosis of Parkinson's? The National Institute of Neurological Disorders and Stroke, part of the National Institutes of Health, is working on improving its guidelines for diagnosing Parkinson's to reflect the latest science. Other researchers are focusing on finding new ways of identifying the disease altogether. Some are searching for a Parkinson's biomarker -- a biological trait displayed only in people who have or are at risk of developing the disease. And now that sense of smell has been tied to Parkinson's, a study led by the Institute for Neurodegenerative Disorders and the University of Pennsylvania is seeking to determine if how well a person performs on a test to identify 40 common odors can predict the individual's likelihood of developing Parkinson's. So far, they've found the average person can identify 35 of the odors, while the average diagnosed Parkinson's patient can only correctly name 20. How close are scientists to finding a cure? As scientists learn more about the great complexity of Parkinson's disease, hopes for finding a cure within the next few years is fading. But all the new information is paving the way for inventing better treatments that won't cure Parkinson's completely but will minimize the disease's effects. "What we have to think about is whether the patient would be happy with still having constipation, still having other side effects of the disease, but being able to maintain a movement without arresting tremor and being able to initiate their own movement," says Dr. Clive Svendsen. "We're looking for a treatment that ... isn't curing it, but it's making the quality of life better." If there's no cure in sight in the near future, what are the treatment options? Since the 1960s, the leading treatment for Parkinson's has been the drug Levodopa, or L-dopa, a compound that can counteract the loss of dopamine neurons that causes the tremor symptoms of the disease. In the past couple of decades, deep brain stimulation -- a treatment that involves implanting a pacemaker-like device to deliver electric shocks to the parts of the brain that are damaged in Parkinson's patients -- has become another widely-employed treatment that generally produces positive results. But the effectiveness of L-dopa decreases the longer a patient uses it, and deep brain stimulation requires a highly invasive operation, so scientists continue to look for better Parkinson's treatments. As explored in My Father, My Brother and Me, doctors have recently started studying the power of exercise as a therapy to not only keep Parkinson's patients physically healthy but beneficially alter their brain chemistry. What are some of the newer treatments being pursued? Another area that offers great promise is neuroprotection, explained by Dr. Langston as "the idea of protecting nerve cells from dying or damage, ... another great Holy Grail in the field of neurology." Scientists studying neuroprotection are looking for chemical substances that, when introduced into the brain, could either blunt the effects of Parkinson's disease on a patient after he is diagnosed or, better yet, prevent Parkinson's altogether. "The problem is," according to Dr. Langston, "I think it's a laboratory concept that jumped into the clinical all too quickly. In a laboratory animal, you can actually measure nerve cells after an experiment. We can't do that in humans. We have no way to really show we've slowed down the progress of cell death in living humans." With thousands of potentially helpful chemicals to test, and without the scientific ability to widely screen substances for their ability to protect human brains against damage, Langston suggests researchers focus less on the effects of these substances on the brain itself and more on their effects on the patient as a whole. "For the moment, where I think we need to focus in clinical trials is delaying disability. We clinicians can measure that. So start a patient on your neuroprotective agent. We can't prove [the neuroprotection], but if disability is really delayed or completely stopped, I think that would be very compelling." Other scientists are working on refining the mode of delivery for a known neuroprotective substance. "There are some very powerful drugs for Parkinson's disease that are very difficult to get into the brain," says Dr. Svendsen. "GDNF [glial cell derived neurotrophic factor] is one of those drugs. ... Even at late stage Parkinson's, you have lots of neurons left, they just don't have any dopamine left in them, and they're very shrunken. And in that sense, [growth factors like GDNF] might again be like the fertilizer. Put it onto those cells, and even though they've practically disappeared, the growth factor will make them rejuvenate and start to produce dopamine again." The problem, says Svendsen, is, "You can give [GDNF] peripherally in the blood, but it doesn't penetrate the blood-brain barrier [to get into the brain]. The idea is to design stem cells that make this drug, put the stem cells in the brain, and then they'll deliver it -- rather like a Trojan Horse. The brain accepts the stem cell because it's [a brain cell] and it's going to integrate and migrate and get into the brain tissue. ... And that's how we can sneak drugs into the brain, [overcoming] this powerful blood-brain barrier, which usually blocks this process." The major obstacle Svendsen needs to solve to implement this type of therapy is creating an off switch of sorts for the cells that will produce GDNF. "It does remind me of the Walt Disney Fantasia movie and 'The Sorcerer's Apprentice,'" he says, "when Mickey Mouse is in the basement with the sorcerer and he gets a great way to make the broomsticks carry the water up and down. And, of course, it goes horribly wrong because [they] carry too much water, and it's overflowing, [so he] chops the broomsticks in half [but] they just keep carrying the water up and down. "I wake up at night with that dream in my head, thinking, boy, if we put cells in the brain that produce [GDNF] that we think it's great and then it has a toxic effect, we can't switch it off. ... But on the other hand, we need to move forward in these diseases. ... It's a difficult one." Could Parkinson's be a "gateway disease?" Could solving it clear the way to understanding -- even curing -- other neurological conditions? "I think there's a general sense in the scientific and medical community that solving any of these major diseases -- Parkinson's, Lou Gehrig Disease, Alzheimer's -- could have an enormous impact on the others," says Dr. William Langston. But for many years, Parkinson's received special attention. "For many years, the thought was Parkinson's was the perfect disease to lead the way in terms of solving these diseases," Langston explains. "The main reason for that is we were totally focused on one small area of the brain known as substantia nigra -- literally, black stuff -- [a] small pigmented dark area in the brain that sits atop the brain stem. Now, that looked like a pretty easy target, not a big nucleus. We fix that, we get more of the normal chemistry restored in the brain, and we fix the disease. To some degree, I think, that's still true. But we're now learning that Parkinson's is actually much more complex." As scientists have learned that the symptoms of Parkinson's go far beyond the movement problems linked to the decay of the substantia nigra, they've realized that the simplicity that once made this seem like an easy neurological disorder to crack -- the best candidate for a cure -- was an illusion. Does that mean what's learned about Parkinson's will have no effect on our ability to solve neurological diseases? No. The complex nature of Parkinson's doesn't rule out the ability of breakthroughs studying this disease to have an impact on the understanding and treatment of other disorders. "I think you're going to see most surgical therapies carried out first in Parkinson's disease," says Langston, citing the disease's pronounced effect on a small area of the brain. "And that's already happening with gene therapy, where genes are inserted in the brain to try to make cells healthier. ... If we get to the point of stem cells going in, all of that will probably be done with Parkinson's first." Dr. Clive Svendsen is studying how to use stem cells to deliver growth factor -- a chemical that can regenerate important nerve cells in the brain -- as a treatment for Parkinson's. He points out that, "The Department of Defense has funded work in Parkinson's disease for a number of years. ... I think some of this comes through lobbying of people like Muhammad Ali and Michael J. Fox, and certain senators, to try and get funds appropriated specifically for Parkinson's disease. A number of veterans get Parkinson's disease. [With] Gulf War syndrome, there's an increased performance of ALS [another neurodegenerative disease]. And just neuro injury in wartime conditions is important to the Army. They're looking to stem cells releasing growth factors as a potential treatment for their troops on the field and for their veterans." Solving even a part of Parkinson's could still help solve parts of other brain disorders. Are stem cells key to finding a cure? Theoretically, stem cells should be able to replace the damaged brain cells whose degeneration leads to Parkinson's symptoms. "We have shown very clearly that our basic science work in the laboratory ... proved that we can restore ... brain function in patients," says Dr. Ole Isacson of the Parkinson's Research Center at Harvard Medical School. "But we do need a lot of work to overcome the obstacles of making this happen [in] every case and in a reliable way." "When we started with neurotransplants -- and we started with fetal cells first, and eventually the hope was stem cells would replace those -- we thought this was gonna be easy," Dr. William Langston explains. "We just put the cells in, fix this one small area of the brain, and we cure the disease. And we were very disappointed when that didn't happen. I think now with our evolving concept of Parkinson's disease, treating this one small area of the brain that we can already treat pretty well with surgical therapies, [stem cell therapy is] important but I think it is no longer the Holy Grail." Some patients who've received experimental cell transplants have seen their symptoms improve, while others have experienced no change or even gotten worse. "Some more extreme critics of this field," says Dr. Clive Svendsen, "would say that we now have two types of Parkinson's. We have Parkinson's disease and Parkinson's plus transplant disease." [Editors' Note: Researchers at MIT's Whitehead Institute for Biomedical Research have developed a new method of reprogramming the skin cells of Parkinson's patients into "an embryonic-stem-cell-like state," using "the resulting cells to derive dopamine-producing neurons, the cell type that degenerates in Parkinson’s disease patients." According to The New York Times, this method, "would in principle allow the brain cells that are lost in Parkinson's to be replaced with cells that carried no risk of immune rejection."] Why haven't stem cell transplants worked so far? There are many reasons scientists have encountered obstacles in engineering successful stem cell treatments for Parkinson's. "The comparison I always use is, imagine trying to wire your house after it was built," says Langston. "I mean, when you build a house, all the wiring goes in very early. When the house is built, if you had to do all the wiring afterwards, that would be pretty tricky. Now imagine you're trying to do that in a living brain with 4 billion neurons." Some stem cells revert from the type of cells they've been cultivated to become -- generally dopamine neurons when dealing with Parkinson's -- back into generic stem cells when they're placed in the brain. And an adult brain seems to have ways of recognizing embryonic stem cells as not belonging. "We're learning there're all types of signals in the adult brain that tell these little guys to go away," says Langston. Furthermore, a stem cell's inherent ability to develop into any kind of cell -- the property that makes them useful -- can also be a hazard. Says Isaacson, "While we know that we can generate the dopamine neuron, it also tends to generate other cell types, including skin, and maybe even bone. So the challenge is, even though we can get the cell we want, [we need] to eliminate the other unwanted cells, lest they would grow into tissues that would be very problematic and even dangerous to the patient." In some cases, says Langston, "We don't even understand the reasons why the attempts we've already done have failed." The risk of stem cell procedures compared to the safety of other relatively effective Parkinson's treatments gives some scientists pause. "The patients will have [to] think about this," says Svendsen. "Am I gonna risk a new procedure that hasn't been tried or go with the steady state procedures which we know work?" Two perspectives on the promise of stem cells... Because of the practical difficulties surrounding stem cell procedures, some scientists no longer think of them as a potential wonder cure-all. "It's not popular to say that stem cells aren't the answer, but I now believe they are not," says Langston. "I don't think we should give up with them. I think they're gonna help other diseases, and eventually they may really help Parkinson's. But I don't think that should be our major focus. The brain is not a pincushion. We can't keep plucking cells in all over the place." Others are more optimistic, although they point out it may take many years to fix the current problems with stem cell transplant technologies. "What we're facing is the same kind of problems that you see almost in engineering. If you think of the early development of airplanes, or flight, the first airplane crashed very quickly," says Ole Isacson. "But many years, in a way, is still a short time in my world, because if you think about the kind of discoveries that are necessary to make a medical treatment available to a large group of patients, decades is the norm rather than the exception." "We're looking at this through the Parkinson's window," says Clive Svendsen, "but if you look outside the Parkinson's window and go to the rest of the world, [there are] lots of places that this technology will be used, I'm sure."
343
In the era of Facebook and Twitter, it's clear we love talking about ourselves—indeed, the topic makes up 40% of our everyday conversation. Now scientists can explain why: Doing so stimulates the brain the same way sex, food, and cash do. Researchers scanned subjects' brains and found that parts linked to those pleasures lit up when subjects chatted about themselves. Researchers also offered study subjects up to 4 cents per question to talk about topics other than themselves, like President Obama. Turns out "people were even willing to forgo money in order to talk about themselves," says a researcher. Subjects would part with 17% to 25% of the potential cash for an opportunity for self-disclosure, the Wall Street Journal reports.
769
Imprint training pioneer Dr. Robert Miller debunks some of the common misconceptions about this useful foal handling technique. The technique of imprinting has been used to help train foals for more than 50 years, but common misconceptions about what it means to imprint young horses still exist. While recent years have seen more and more owners and trainers fully commit to properly using this valuable foal handling procedure, a few basic misunderstandings still remain that prevent those who attempt to apply imprint training techniques from achieving the results that they desire. Photo by Megan Parks Dr. Robert Miller, one of the pioneering practitioners of equine imprint training, believes that proper implementation of imprint training principles make a horse more trainable and easier to handle, but only if it is done correctly and completely—and only if the person performing the technique is realistic about exactly what the process is meant to achieve. “You’re not going to change [a foal’s] personality,” Miller says. “Energetic will be energetic. Lazy will be lazy. Highly reactive will be highly reactive. Indifferent will be indifferent. Intelligent will be intelligent. But what [imprinting] does is, if you do it right after they are born, before any other learning goes in—you build a foundation.” Understanding what that foundation is meant to support is the key to getting the long-term results that proper imprint training can provide. “You’re not imprint training the body,” Miller says. “You’re imprint training the mind.” In the wild, horse have always been prey animals and, therefore, a foal must be able to get to its feet within an hour after birth and run with its herd as a means of self defense. This history means that even domesticated horses are born with a healthy paranoia of just about everything. Fear is the natural first response a horse feels to new stimuli. They have to learn not to fear people, objects and even other animals. It is almost impossible to teach a horse anything if his focus is on self preservation. “It applies to us, too,” Miller says. “If we are preparing to take a test, and we’re really scared, our learning ability isn’t nearly as great as if we are laid back and relaxed and can think things out.” Fear and anxiety interfere with the learning procedure because, in any animal, it increases the primary defensive behavior. “In some species, [the defensive behavior] is to fight, so fear will precipitate an attack,” Miller explains. “But in the horse, fear usually precipitates flight or the desire for flight. “In the horse—and this is only true in the horse and not dogs, cattle or people—control of the feet controls the mind. When you control the animal’s primary defense, you control the mind. In wolves, it’s control of the muzzle. In the human being, it’s control of the hands. In horses, it’s control of the feet. Every school of horsemanship has relied upon [this concept] even if they didn’t understand why it worked.” The main goal of all imprint training is to minimize the fear responses that can keep a horse from learning. “If we don’t have the fear, the horse isn’t thinking about running away,” Miller says. “Instead, the horse is paying attention and subject to quick learning.” It is important to Miller that people understand that imprinting and training are two different things—a fact that he believes sometimes gets overlooked. “Imprinting is a visual memorization of what the foal sees moving around it, and it triggers an instinct to trust and to follow,” Miller says. “Training is learning by reinforcement. The only reason I called the process Imprint Training is because it’s training during the imprint period.” In nature, a foal imprints on its mother and the other members of its herd, serving to protect the foal against predators in the wild. However, foals can also imprint on a variety of other creatures, too. “In domestication, it can be a human, or a dog or a piece of machinery,” Miller says. “Anything that moves, the foal will be imprinted upon it and tend to want to go to it and be near it and trust it.” It is this inherent trust that Miller uses to teach the newborn foal that the world isn’t nearly as scary as it would otherwise believe it to be. “In an hour to hour and a half, I can get so much done with a foal,” he says. “It’s a great time saver.” Doing It Right Miller often regrets calling the process Imprint Training because people confuse the meaning of term. “I often have people come up to me and say, ‘I imprinted my horse when he was 6 months of age,’ or it was an 18 month old,” he says. “They don’t understand that imprinting only occurs in the horse [immediately after birth]. “It’s not that way with all species. Dogs, for example, imprint between 6 and 7 weeks of age. But that is a different species. They are not precocial. They are helpless as babies, just like humans. Whereas in the precocial species like horses, the ones who must be able to run from danger by the time they are one hour of age, the imprinting begins in the hour after birth.” To Miller, the advantages of imprint training are that it happens very quickly, you don’t have to rely on or undo any previous negative learning, and since the foal is already down and has yet to stand, you can prepare a foal for most of what it needs to know for the rest of its life in about an hour. During that time, Miller touches literally every part of the foal—from nose to tail and from ears to hooves—with the goal of habituating [making it comfortable with and unafraid of] common loud or frightening sounds or movements that can spook a horse, being touched in the areas that will be handled during farriery and during veterinary examinations of every body opening, as well as pressure in the saddle area. Teaching foals not to fear pressure in the girth area is usually saved for the second session when they are already on their feet. “You remove the anxiety, the fear,” Miller says, “and they are quicker to learn other things.” The mistake most people make when imprint training is that they don’t do enough at the right times, either during the first session when the foal has yet to stand, or during subsequent training sessions when the foal is on its feet. “I poll every audience that I speak to,” Miller says, “and what I’ve learned from doing this over the last four decades is the two most common mistakes are rushing the training and failing to follow up after the first session.” Miller says it is almost always men who make the mistake of rushing the first session of imprint training. “They are usually working for a ranch or farm,” he says, “and they show them my video and tell them they want them to do this with their foals, and they rush it.” For example, when Miller is habituating a foal to having his feet touched, he taps the bottom of each hoof with his hand 100 times to ensure that he’s tapping long enough for the foal’s initial fear response to the touch to wear off and he learns that having his foot touched isn’t something to be afraid of. “Men will often tap the hoof 5-10 times and quit,” Miller says, “and what they’ve taught the foal to do is to fear that touch. They have failed to habituate by stopping during the fear and flight period in the foal’s mind.” By doing this, they have actually sensitized the foal to fear of having its feet touched, and the next day, the person can’t get anywhere near them to continue the second phase of the training. “Whereas the foals I do, you can touch them anywhere on their body the next day,” Miller says. “Women just love this part of the training because of the intimacy of it.” Conversely, Miller states it is almost always women who fail to complete imprint training after the first session. “They do the birth session, but they don’t do sessions two through seven when the foal is on its feet, which is where you get their respect,” he says of the sessions where the foal is habituated to a variety of body pressure and movement cues, as well as leading and tying. “I ask them ‘Why didn’t you do it?’ and the answer is always the same. ‘He didn’t like it, so I didn’t do it.’ They often admit that they got bad results, but claim to know what they did wrong.” The Lessons Transfer While one of the major complaints about imprint training is that the foal will only respond to the person he imprinted upon, Miller doesn’t believe this to be the case. The foal may be slightly more responsive to that individual, but if that person imprint trains the foal properly, anyone who handles that horse in the future will have an easier time than if the horse had never received imprint training. Miller admits that the trust an imprinted animal gains in its imprinter doesn’t transfer directly to all other humans. However, it does prepare them for what other people may do with them and makes the horse’s transition to the new handler’s style easier and faster. “Say you have an individual sacking out a colt who has never been ridden with a blanket, and he stands perfectly happy while everything happens,” Miller says. “If a stranger comes along with a blanket, he’s going to react with fear to the stranger, but once he’s past that and the blanket begins, the attitude is, ‘Oh, I remember,’ and the horse relaxes. “As far as their future talent on the racetrack, as a jumping horse, as a roping horse or a barrel horse, imprint training doesn’t interfere. It actually enhances it because you remove most of the fear factors [that can interfere with learning]. If a foal has learned to be unafraid of a human presence and being touched on any part of its body, and now you want to make a rope horse out of it, it’s not going to get all boogered when the rope drags on the ground beside it or you throw it out in front of him. I wouldn’t say it improves performance, but it enhances learning.” The same basic principle applies to imprint training a young horse to be relaxed in a stall area around other horses, in your training pen and especially when approaching what some horses consider to be a scary object—a barrel. Once a horse is hauled to a show, the environment may be different and cause anxiety temporarily, but the similarity of the situation to what they’ve experienced before will help the horse relax and perform to the best of its ability faster. Although imprint training doesn’t affect a horse’s personality, it will help more reactive horses become more handlable. A highly reactive individual will still remain flighty, but if you’ve de-sensitized him to the everyday things he might spook at—which interferes with what you’re trying to teach them at any point—it helps him learn what you’re teaching faster. Respect, Not Fear Imprint training has gained wide acceptance over the last 25 years, but there are still some trainers who object to the technique. Many object for a one primary reason—they believe that since imprinting lessens a horse’s fears, it makes the horse much harder for anyone who didn’t imprint that horse to control. “The objective in training horses should be 100 percent respect and zero percent fear,” Miller states. “Some people think you’ve got to show them who’s boss. You’ve got to show a horse who’s the leader, but you don’t have to show them who’s boss, which infers fear of the boss. It’s not necessary to be able to control the horse.” The idea that fear of humans is necessary to maintain control of a horse and to get it to do what you want it to do ignores a fact that practitioners of natural horsemanship have known for decades—if you really want your horse to want to work for you, fear can’t be part of the equation. For Miller, the goal of imprint training is to get the horse to see the human as a herd leader and be submissive to his or her requests as a result. You don’t want a horse to fear you, but depend on you for leadership and guidance. When done correctly, imprint training enhances a horse’s relationship with all humans. All it takes is putting in the effort to achieve the results you want instead of looking for a quick, fear-based fix. According to Miller, in wild mustang herds, the leader is most often the oldest mare, which indicates that physical strength has nothing to do with gaining the respect of the horse or achieving leadership. The stallion, who many would perceive as the natural choice to be the leader, runs in back and chases the stragglers to get them to keep up with the leading mare, serving as more of a guardian for the herd than a leader of it. “There are still some trainers that object to [imprint training], and there are still trainers who do it improperly and criticize the technique,” Miller says. “Any training technique ever devised, if you don’t do them correctly, you can’t expect good results. “I hear people say, ‘I did my colt Parelli style,’ or, ‘I did my colt Kurt Pate style, and it didn’t do any good.’ Well, they didn’t do it correctly because they are very good training techniques. They blame the technique rather than themselves.” But as with any training program, in the end, you and your horse will get out of it what you put into it. After 50 years of teaching and practicing the techniques of imprint training, Miller believes that if it is done properly, it will absolutely make a difference in the teachability and overall confidence and happiness of the horse. “Simply put, imprint training works,” Miller says emphatically. “It works consistently and very, very effectively. “The foal respects the mare, but is also bonded to her and trusts her. We can get exactly the same thing, trust combined with respect.” Dr. Robert Miller graduated from Colorado State University and settled in Thousand Oaks, Calif., where he founded the Conejo Valley Veterinary Clinic. He retired in 1987 after 31 years as a renowned veterinarian and expert in ethology (the study of animal behavior) in order to devote his full time to the teaching of equine behavior and to support the revolution in horsemanship that began in the Western United States in the late 20th Century and is now a worldwide phenomenon. He is best known for his scientifically based system of training newborn foals, called imprint training, which is now in use all over the world. He has authored several books, including Imprint Training of the Newborn Foal, and has been on the editorial staff of several veterinary practice and horse industry magazines.
308
January 10, 2002 Parshat Vaerah (Exodus 6:2-9:35) From the Torah's beginning until its end, God is portrayed as being personally involved in the welfare of humanity. Deism is not a Jewish notion. God is not an "unmoved mover," the proverbial clockmaker who after assembling and winding his ware, steps back watching it tick down, never to again involve Himself with it. On the contrary, God hears our innermost thoughts, feels our deepest concerns, judges us and guides us through our lives. A traditional Jewish concept of God is one that is interactive and intimately personal. This week's Torah portion, Vaerah, begins with God hearing, and ultimately reacting to, the Israelites brutal enslavement. "I have now heard the moaning of the Israelites because the Egyptians are holding them in slavery, and I have remembered My covenant." (Exodus 6:5) The covenant being remembered is between God and the Israelite people. Curiously, it was the king of Egypt, and not God, or the Israelites themselves, who coined the phrase, "Israelite People." Acting out of panic, Pharaoh wanted to do away with the Hebrews, when he declared they were becoming too numerous. (Exodus 1:9) Even so, the distinction placed on our understanding of covenant is an important one. The covenant serves to bind God to an entire group, not to an individual, or a handful of individuals. "The God of Israel is no mythological deity who mingles freely with men in history," writes philosopher Rabbi Emil Fackenheim in his book, "God's Presence in History." "Nevertheless, not messengers, not angels, not intermediaries, but God himself acts in human history." God hears the cries of the people Israel and responds. The plagues used to dislodge the Hebrew slaves are physical indicators of God's personal involvement. Admittedly, not all the Hebrew slaves were liberated from their miserable environment. Over the span of several hundred years, countless generations of Israelites were born and died while held captive by Pharaoh and his cohorts, never having experienced the beauty of life. Collectively, we have survived as a people, and the covenant between God and us continues. While unimaginably large numbers of Jews have suffered and died throughout history, the Jewish People continue to thrive; the covenant remains intact. To those who are turned off to faith because of great personal, or even national loss, little can be said; out of respect, perhaps nothing ought to be said. After the Holocaust, for example, a number of Jewish theologians have felt the covenant was so compromised that it is no longer binding. All that notwithstanding, the spiritual question most of us encounter is whether life is little more than a series of coincidences. To some, our existence is the outgrowth of luck, possibly karma, astrology or magic. To the Jew, our people's existence is the result of God, and the covenant we have with Him. No doubt, life is made more palatable because of it. And, if the message conveyed throughout the Torah is correct, all peoples, Jewish or not, are additionally blessed to have a God who is personally involved in the day-to-day affairs of their lives. Michael Gotlieb is the rabbi of Kehillat Ma'arav in Santa Monica.
661
U.S. Virgin Islands are often referred as 'America's Paradise'. Saint Thomas, Saint John and Saint Croix - the three main islands that constitute U.S. Virgin Islands - are surrounded by North Atlantic Ocean on the north and Caribbean Sea on the south. They form Virgin Islands archipelago together with British Virgin Islands, which lie on their west. The islands are popular for their sea, surf, sand and sun and are important tourist attractions of America. Christopher Columbus is credited with discovering the islands in 1493. They were held by European colonial powers such as Spain, Britain, the Netherlands, France and Denmark-Norway one after the other. The Islands were purchased by the United States from Denmark in 1917. Saint Thomas is the busiest and the most cosmopolitan of U.S. Virgin Islands. Charlotte Amalie in Saint Thomas is the Caribbeans' most popular cruise ship hub. Saint Thomas pampers its visitors with a wide choice of beaches, each having its own specialty. Magens Bay, St. Thomas' most visited beach, has calm waters and is ideal for swimming and children. Water sports opportunities include boating and kayaking. Palm tree-lined beach of Lindberg Bay is picturesque and is perfect for relaxing. There are facilities for a range of water sports. Coki Point is an excellent beach for snorkeling. Saint Thomas is also a shoppers' paradise. One can have bird's eye view of the U.S. Virgin Island from St. Thomas Skyride, a cable car system. Saint John is the smallest of U.S. Virgin Islands, but has the best beaches. Trunk Bay is a picturesque beach famous for its white sand and beautiful water. The beach is a popular snorkeling spot. Honeymoon Bay, featuring white sand and crystal clear water, is a quieter beach compared to Trunk Bay. Hawknest Beach, Great Cruz Bay, Maho Bay and Salomon Beach are just some of the other beaches that Saint John offers. The island, of which a large part is covered by Virgin Islands National Park, has spectacular landscape with lush mountains and beautiful beaches. One can get a peek into Saint John's history and heritage by visiting ruins of sugar plantation sites and rock carvings. Saint Croix is the largest of three main U.S. Virgin islands. This island is known for its historical sites, rainforest, beaches and hills. There are plantation villages of yesteryears and other sites related with with the plantation agriculture, which made Saint Croix a major sugar producing island. Colonial architecture coexists with modern buildings across towns of the islands. Palm-lined sunny beaches of Saint Croix present unmatched beauty. Protestant Cay, Mermaid Beach and Shoy's are some of the popular beaches of this island.
130
BSA Supply No. 35940 If you have ever wanted to go back in time or wished you could visit the future, if you are curious about the world, or if you are interested in how things work or like to learn new things, these are all reasons why you should want to read. Reading is fascinating. It's full of surprises. And it will take you places you can't get to in any other way. - Do EACH of the following: - Learn how to search your library's card catalog or computerized catalog by author, title, and subject. - With the assistance of your merit badge counselor or a librarian, select six books of four different types (such as poetry, drama/plays, fiction, nonfiction, biographies, etc.). Ask your librarian or counselor about award-winning books that are recommended for readers your age and include at least one of those titles. - Find the books in the library catalog. With your counselor's or a librarian's assistance, locate the books on the shelves. - Read each book. Keep a log of your reading that includes the title of the book, the pages or chapters read, the date you completed them, and your thoughts about what you have read so far. Discuss your reading with your counselor. Using your log as a reference, explain why you chose each book and tell whether you enjoyed it and what it meant to you. - Read about the world around you from any two sources--books, magazines, newspapers, the Internet (with your parent's permission), field manuals, etc. Topics may include sports, environmental problems, politics, social issues, current events, nature, religion, etc. Discuss what you have learned with your counselor. - Do ONE of the following: - From a catalog of your choice, fill out an order form for merchandise as if you intended to place an order. Share the completed form with your counselor and discuss - With your parent's permission, locate at least five Web sites that are helpful for your Scouting or other activities. Write the Internet addresses of these sites in your log. Talk with your counselor or a librarian about safety rules for using the - With your counselor's and your parent's permission, choose ONE of the following activities and devote at least four hours of service to that activity. Discuss your participation with your counselor. - Read to a sick, blind, or homebound person in a hospital or in an extended-care - Perform volunteer work at your school library or a public library. - Read stories to younger children, in a group or individually. - Best Books for Young Adults - http://www.ala.org/ yalsa/booklists/bbya - BookSpot: Young Adult Books - http://www.bookspot.com/ youngadult.htm - Choices Booklists - http://www.reading.org/ choices - National Book Awards for Young People's Literature - http://www.literature-awards. com/national_book_awards.html - Newbery Medal Winners and Honor Books - http://www.ala.org/alsc/ newbpast.html - 100 Best Books for Children - http://www.teachersfirst.com/ 100books.htm - Summer Reading Lists - http://www.educationworld. com/summer_reading - Teenreads.com - http://www.teenreads.com - U.S. Children's Book Awards - http://www.ucalgary.ca/~dkbrown/ usawards.html - The Online Books Page - http://digital.library.upenn.edu/books - Project Gutenberg - http://gutenberg.net P.O. Box 152350 Irving, TX 75015-2350 Web site: http://www.boyslife.org 30 Grove St., Suite C Peterborough, NH 03458 Toll-free telephone: 800-821-0115 Web site: http://www.cobblestonepub. com/pages/callmain.htm Cicada and Cricket P.O. Box 7434 Red Oak, IA 51591-0433 Toll-free telephone: 800-821-0115 Web site: http://www.cricketmag.com 149 Fifth Ave. New York, NY 10010 Web site: http://www.kidsdiscover.com SAS Campus Drive Cary, NC 27513 Web site: http://www.ncsu.edu/midlink National Geographic Kids P.O. Box 63002 Tampa, FL 33663-3002 Toll-free telephone: 800-647-5463 Web site: http://www.nationalgeographic. com/ngkids P.O. Box 3939 Eugene, OR 97403 Web site: http://www.skippingstones.org Sports Illustrated for Kids P.O. Box 60001 Tampa, FL 33660-0001 Toll-free telephone: 800-992-0196 Web site: http://www.sikids.com P.O. Box 83 Santa Cruz, CA 95063 Toll-free telephone: 800-447-4569 Web site: http://www.stonesoup.com - Internet Public Library - http://www.ipl.org/div/news - Refdesk.com - http://www.refdesk.com/paper.html - Barron's Profiles of American Colleges. Barron's Educational Series, annual. - Books in Print. Bowker, annual. - Contemporary Authors. Gale, annual. - Current Biography. H. W. Wilson, annual. - Guinness World Records. Bantam Books, annual. - Readers' Guide to Periodical Literature. H. W. Wilson, annual. - Subject Guide to Books in Print. Bowker, annual. - Subject Guide to Children's Books in Print. Bowker, annual. Web Directories, Search Engines, and Web Guides - The Alphabet Superhighway - http://www.ash.udel.edu/ash - Cool Sites for Kids - http://www.ala.org/alsc/children_links.html - Internet Search Engines for Kids - http://www.ivyjoy.com/rayne/kidssearch.html - Kids and Teens: Directories - http://dmoz.org/Kids_and_ Teens/Directories - Kids Pick - http://www.ala.org/kidspick - KidSpace - http://www.ipl.org/div/ kidspace - Great Web Sites for Kids - http://www.ala.org/parentspage/greatsites/amazing.html - Teen Hoopla- http://www.ala.org/ teenhoopla/sitemap.html - TeenSpace - http://www.ipl.org/div/teen America's Literacy Directory Web site: http://www.literacydirectory.org American Federation for the Blind 11 Penn Plaza, Suite 300 New York, NY 10001 Toll-free telephone: 800-232-5463 Web site: http://www.afb.org The Barbara Bush Foundation for Family Literacy 1201 15th St. NW, Suite 420 Washington, DC 20005 Web site: http://www.barbarabushfoundation.com National Literacy Hotline Toll-free telephone: 800-228-8813 Read Across America National Education Association 1201 16th St., NW Washington, DC 20036 Web site: http://www.nea.org/readacross Reading Is Fundamental Inc. 1825 Connecticut Ave., NW, Suite 400 Washington, DC 20009 Toll-free telephone: 877-RIF-READ Web site: http://www.rif.org
663
One of the most frequently asked questions here at Jacob Lake Inn is, “Where is the lake?” Many people who visit this area from wetter climates may not consider our lake to be a lake, but this small accumulation of water, supplied by rain and snow melt, is one of the only permanent water sources on top of the Kaibab Plateau. Known as the “waterless mountain”, meaning there are no streams or running water, the Kaibab Plateau contains several small lakes comparable to Jacob Lake. Many of these lakes are formed in the beds of sink holes, plugged up by organic material, and filled with rain and melted snow. These lakes, and in particular, Jacob Lake, as small as it may be, were often the difference between life and death for Native, immigrant and traveler. The Piute Indians who inhabited the Kaibab Plateau told Jacob Hamblin, Mormon pioneer and explorer, about this little known water supply, and he in turn told other pioneers traveling through the area. The Honeymoon Trail, a route traveled by settlers and couples from settlements in southern Arizona on their way to the Mormon temple in St. George, snaked around the base of the plateau. The new route over the plateau, with the stop at Jacob Lake, cut off a significant portion of their journey, thus establishing the trail and Jacob Lake as a valuable resource. The Piutes held Jacob Hamblin in high regard, due to his honest trading practices and peacemaking abilities with the local tribes and white pioneers, and named the lake after him. The concept of land ownership was absent from the Piute culture. They did not give Hamblin the lake, but rather they honored him by giving this priceless body of water his name. The size of Jacob Lake has changed over the years. In the past, especially in a wet year it could nearly reach the fence that surrounds it, but due to recent droughts and mild winters the lake has decreased in size. Jacob Lake stands as an example of the value placed on water in this dry region and though this water source no longer supplies water to thirsty travelers; it does provide wildlife with a dependable water supply throughout the year. When Harold and Nina N. Bowman established Jacob Lake Inn in 1923, their families had been involved in the exploration and settling of much of southern Utah and the Arizona Strip. Nina's grandfather, Franklin B. Woolley, wrote the 1866 cavalry exploration report of the territory from St. George to the Kaibab Plateau to the mouth of the Green River. The report included the first official descriptions and map of the area. Harold's father, Henry E. Bowman, engineered and supplied the cable tram that crossed the Colorado River in the Grand Canyon. Henry also built (with a lot of help from the people of Kanab, Glendale, and Orderville) the first road from Kanab, Utah to Mt. Carmel. This made the area more accessible to travelers and tourists. Franklin B.'s brother, Edwin D. Woolley Jr was one of the first white men to see the Grand Canyon from the North Rim. Upon seeing it he almost fell off his horse and exclaimed "This is one of the wonders of the world! People will come from all corners of the globe and pay large sums of money to gaze at what we now behold." As a local community leader and a man of wonderful vision, Woolley saw the importance of tourism in the growth of Southern Utah and the Grand Canyon area. Due to the lack of water for large scale agriculture, this region had limited economic potential. Edwin D. continually sought to plan and develop ways to open Southern Utah and the North Rim area to people from around the world. He organized many expeditions to the North Rim, bring- ing groups of dignitaries, important businessmen and important politicians to the area. Some of his more illustrious guests included Buffalo Bill Cody and Zane Grey. In 1890 Edwin D. convinced a group of English noblemen accompanied by Buffalo Bill to invest in developing this prime hunting ground. However, the lack of adequate roads spoiled the deal. After riding in an automobile for the first time in 1908, Edwin D. planned and guided the first automobile trip in 1913 to the North Rim. This incredible feat was accomplished by building the road as they went. This also required gas to be shipped 320 miles from the closest gas station which was in Salt Lake City. President Teddy Roosevelt also frequented the Kaibab. In 1903, Roosevelt, with his two older sons and nephew, made an expedition from the South Rim to the North Rim. Roosevelt's impressions of the Grand Canyon, together with his hunting experiences on the Kaibab, led him to push for a change in the status of the Grand Canyon. In 1908 this national forest and game reserve became a national monument, which led to its eventual designation as a National Park in 1919. In 1923, Harold and Nina Bowman, realizing the improved mobility the automobile afforded travelers, started a business selling gas from a fifty-gallon barrel in the back of a truck. This venture, originally located on the "shores" of Jacob Lake, began a short two years after their marriage. They each had a heritage of pioneering men and women and neither was daunted by this enterprise. The first lodge was built a year later on the ridge above the lake (across from what is now the Kaibab Kamper Village) at the head of Jacob Canyon. As Harold stated in his personal history "Jacob Lake Inn was quite an experiment at first. We built a two room cabin, and Nina moved out there and just used quilts for doors. She took care of the place and her brother Ezra Nixon ran the service station. If we could sell a barrel of gas in one day, we thought we had had good business." As described before, the first lodge had two rooms, a main room in which root beer and Native American crafts were sold and a kitchen where meals were prepared for visitors, family and staff. This lodge remained by Jacob Lake unti11929 when the highway, which had come up through the narrow Jacob Canyon, was moved. This old road was an enlargement of the original trail used by Jacob Hamblin and the Piutes as they trekked the shortest distance to water at Jacob Lake. With the increase in travel, thanks to the automobile, a highway was engineered and constructed to allow safe travel up the spine of the mountain. With this new highway changing the route of travel, the Bowmans built the new Jacob Lake Inn at its present location, what is now the junction of Highway 89a and Highway 67. When Harold learned that the location of the new highway junction was positioned at the base of a large hill, and that it would be an inconvenient location for travelers headed to the Grand Canyon, Harold borrowed a BPR grader and built a better road. This shifted the junction of the road from the base of the hill to the flatter land right in front of the Jacob Lake Inn. Harold's road became the more traveled route, and when the highway was paved In the mid thirties, it became the official highway. Effie Dean Bowman (Rich) was born in 1923, the same year as Jacob Lake Inn, so to speak. Harold Jr. was born in 1927. In 1929, Effie Dean and Harold began the lifestyle of spending summers at Jacob Lake and winters in Salt Lake City when Effie Dean entered the first grade. On the Kaibab they had dogs, squirrels and porcupines for pets and each other for friends as they watched their parents work hard. Nina would start the day doing laundry, then move to baking and cooking, then working in the gift shop. Harold Sr. was always building onto the lodge, greeting customers (if a car stopped out in the road, he would go out and give directions and invite the guests in), and helped to keep things running smoothly. Effie Dean and Harold Jr. started working at a young age. Effie Dean, at age seven, started the very important job of emptying slop jars in the rooms. Harold Jr. started at age four taking firewood to all the cabins. They washed dishes, cleaned rooms, emptied slop jars, gathered firewood, and moved on to other jobs. Effie Dean began waitressing at thirteen, and Harold started in the service station at eight. As more people traveled to see the Grand Canyon North Rim, Jacob Lake Inn's reputation for hospitality and good food began to grow. The Prince of Siam and his entourage stopped on their way to the Canyon and even though he was a reluctant subject, Nina captured his likeness for posterity. The lodge also expanded with the growing number of tourists, adding a dining room, new motel units, and even relocating the gas station twice. The staff kept growing too, and soon it grew beyond the scope of family and friends. Annual pilgrimages to regional colleges and universities or any place they could find good employees began bringing bright, friendly young people to the Inn to help care for their children and serve their guests. Effie Dean and Harold Jr. continued working with the family after pursuing an education, military service, and their respective marriages (Effie Dean married John P. Rich and Harold married Afton Kunz). Soon the third generation began. John Jr. and Bonnie, Nina, Steve, Harold III, Chris, Kent, Kim, Genene, Mary Lynne, and Matt all helped keep the business going. They started out by showing guests to their cabins, washing headlights (they couldn't reach the windshields), bussing tables, crushing and bagging ice, slicing bread, washing dishes, hauling trash, chopping wood, herding cattle, fixing fences, and any number of jobs that needed doing. During these summers they worked alongside the young people, explored the Kaibab Forest roads on their days off, and traveled back home to Salt Lake for the fall and winter to attend school. Harold Jr. once stated he was neither a country hick nor a city slicker, he had the best of both, and now the fourth generation of the Bowman family has experienced this fortunate life as well. As time went on, Harold Jr.'s wife and children pursued other interests and professions, while Effie Dean, her children, their spouses, and grandchildren, continue the seasonal trek to the Kaibab.They manage the lodge, hire personnel, and perform the tasks regular employees won't do. As Jacob Lake's founding generations pass on, (Nina N. in 1959, Harold Jr. in 1961, Harold Sr. in 1974, and John Rich Sr. in 1995), those that remain acknowledge the heritage that their pioneering ancestors set forth. This legacy of hard work, friendly knowledgeable service, excellent products, and a love for the Kaibab, the Grand Canyon, and the red rock deserts they call home.
871
Many conditions during pregnancy or labor can make a C-section necessary, including: Prolonged or ineffective labor Placenta issues if the placenta is positioned abnormally low in the cervix (placenta previa), it can block the birth canal. The placenta can also suddenly separate from the uterus (placenta abruptia), causing the mother to hemorrhage and the baby to have an abnormal heart rate. Disproportion or multiple births: if the baby’s head is too large for the birth canal, or if there is more than one baby to deliver, a C-section may be safer than a vaginal delivery. Abnormal presentation: if the baby’s position in the womb is abnormal, it may be safer to deliver via a C-section. Prolapsed cord: if the umbilical cord cord comes before the baby through the vagina, it can strangle the baby during a vaginal delivery. Fetal distress or medical problems: if the mother has diabetes, genital herpes, hypertension, cardiac disease, toxemia, or ovarian or uterine cysts, vaginal delivery may be hazardous for both mother and child. If a C-section may be necessary for you, it is important to plan ahead and know what risks may be involved. Learn more about potential C-section risks .
99
Reishiki - the external expression of respect In Iaido dojo you will practice with a wooden sword (Bokken), or a training sword (Iaito), or even a real Japanese sword with a cutting blade (Katana). There will be numerous people practicing, all in one room. Following the rules of etiquette ensures that no one gets injured. Also, following the rules of etiquette enhances practice in other ways. The teacher can more quickly determine skill levels when students line up in the order of rank. The ceremonial bowing serves as a concentration and focusing point; when bowing, practitioners shows respect for others. Maintaining observant silence allows students to focus their attention and practice reading body language. Cleaning the dojo after practice leaves it ready for the next group. Always remember, reishiki comes from the heart and without sincere respect it will be only an empty gestures. - Be on time. - Do not make class wait. - Finger and toe nails must be cut short and all jewelry removed. - Remove shoes before entering. - A sword should be untied and held in the right hand. - Step directly in to the dojo. - Do not block doorway. - Stop and bow to Shinzen. - Avoid drawing or pointing a sword toward Shinzen. - Before practice, be sure your sword is in proper shape. - Check the Mekugi. - Place it at Shimoza (opposite side of room from shinzen) with the Ha to the wall. - Never touch a sword without the owner's permission. - Do not knock or step over any sword. - The floor must be cleared and swept. - Leave the Dojo ready for those who practice after you. - Eating, drinking, and smoking are not allowed on the Dojo floor. - When on the practice floor do not have private conversations other than iaido related subjects. - Tell the teacher of any injuries or problems, or of having to leave early. - Do not leave without permission. - Do not speak when teacher is speaking. - Thank the teacher. - Show respect to other iaidoka (students) - Do not draw directly towards others. - Do not do anything that may distract or injure a fellow practitioner or spectator.
372
Coffee is an important crop and is crucial to the economy of many developing countries, generating around US$70 billion per year. There are 115 species in the Coffea genus, but only two, C. arabica and C. canephora, are commercially cultivated. Coffee plants are attacked by many pathogens and insect-pests, which affect not only the production of coffee but also its grain quality, reducing the commercial value of the product. The main insect-pest, the coffee berry borer (Hypotheneumus hampei), is responsible for worldwide annual losses of around US$500 million. The coffee berry borer exclusively damages the coffee berries, and it is mainly controlled by organochlorine insecticides that are both toxic and carcinogenic. Unfortunately, natural resistance in the genus Coffea to H. hampei has not been documented. To overcome these problems, biotechnological strategies can be used to introduce an α-amylase inhibitor gene (α-AI1), which confers resistance against the coffee berry borer insect-pest, into C. arabica plants. We transformed C. arabica with the α-amylase inhibitor-1 gene (α-AI1) from the common bean, Phaseolus vulgaris, under control of the seed-specific phytohemagglutinin promoter (PHA-L). The presence of the α-AI1 gene in six regenerated transgenic T1 coffee plants was identified by PCR and Southern blotting. Immunoblotting and ELISA experiments using antibodies against α-AI1 inhibitor showed a maximum α-AI1 concentration of 0.29% in crude seed extracts. Inhibitory in vitro assays of the α-AI1 protein against H. hampei α-amylases in transgenic seed extracts showed up to 88% inhibition of enzyme activity. This is the first report showing the production of transgenic coffee plants with the biotechnological potential to control the coffee berry borer, the most important insect-pest of crop coffee.
87
Breaking the COX code Using the team approach Editor’s Note: This story, first published in 2004, has been updated. Prostaglandins, which were first isolated from the prostate gland in 1936, are very rapidly metabolized, or broken down, making measurement in the blood difficult. Researchers at Vanderbilt led by John Oates, M.D., developed methods for measuring levels of prostaglandin metabolites (breakdown products) in the urine using mass spectrometry. Using this technique, the research team—which by the late 1970s included L. Jackson Roberts, M.D.—identified prostaglandin D2 as a product of the human mast cell and demonstrated its release during allergic asthma. With colleagues including Garret A. FitzGerald, M.D., now chair of Pharmacology at the University of Pennsylvania, Oates and Roberts showed that low doses of aspirin blocked the production of thromboxane, a prostaglandin made by platelets that causes blood clotting and constriction of blood vessels. Their findings supported the use of low dose aspirin to prevent heart attacks. In the early 1990s, Vanderbilt researchers led by Ray DuBois, M.D., Ph.D., discovered a link between the COX-2 enzyme and colon cancer. That work helped lead to current tests of COX-2 inhibitors as a potential way to prevent cancer. In 2004 another group led by the late Jason Morrow, M.D., and David H. Johnson, M.D., director of the Hematology-Oncology division at Vanderbilt, reported that urine levels of a prostaglandin metabolite called PGE-M could predict the effectiveness of a COX-2 inhibitor in patients with non-small cell lung cancer. This suggests, Morrow said in 2004, “that the measurement of these inflammatory ‘mediators’ and their suppression may be useful in the treatment of lung cancer.” COX enzymes also may play a role in Alzheimer’s disease. In addition to prostaglandins, the COX pathway can lead to the production of highly reactive molecular compounds called levuglandins, which, in turn, can form “adducts,” or irreversible attachments to proteins that may be toxic to nerve cells. Also in 2004, Oates and his colleagues at Vanderbilt and Johns Hopkins University reported that they found a 12-fold increase in the level of adducts in the brains of patients who had Alzheimer’s disease compared to age-matched control brains. “These are the first clear data showing that COX products are elevated in the brains of patients with Alzheimer’s disease,” says Oates, Thomas F. Frist Professor of Medicine and professor of Pharmacology. Vanderbilt currently is participating in a national trial to see if long-term use of COX inhibitors will reduce the incidence of the disease.
458
New to Typophile? Accounts are free, and easy to set up. In current practice, usage of the term case most likely refers to the use of uppercase (capital) or lowercase letters. See some examples below. In letterpress practice, case refers to the physical box (case), usually wooden, that a given set of letters is stored. Capital letters were stored in the upper (top) case and lowercase letters were stored in the lower (bottom) case. ALL CAPS -- All letters are capitalized. Title Case -- The first letter of each word is capitalized. Sentence case -- where the first character is capital and the remaining words are lowercase. Camel Case -- Also called internal caps where one or more characters in a given word (or string) has a capitalized letter. This is often used in programming languages and increasingly seen for naming or branding companies or products. Greek OpenType Features
330
Problem: Tall buildings risky in high seismic zones; Status: Hill-stations are getting concretised and growing vertically; Challenge: Use local construction material; regulate traffic Evam Piljain, an 80-year-old Toda who's spent all her life in Ooty, feels distraught at the sight of her hometown. "I cannot sit in the verandah anymore," she says. She moves to her drawing room and gazes wistfully at a photograph of Ooty taken in the early part of the twentieth century -- green, picturesque. But outside, hill after hill is chock-a-bloc with concrete buildings. Other Indian hill-stations are no different. Roller-compacted concrete (RCC) has taken over from wood and mud and is now synonymous with construction. Reminisces B P Rai, secretary, Federation of Societies for Environmental Protection, a Darjeeling-based NGO, "Earlier, there were only small wooden houses. But with increased population, the need was felt to construct RCC multi-storey buildings, which can take a load of 7-8 storeys. This has spelt disaster." Centre for Science and Environment’s Sustainable Buildings Programme is organizing 5 day training on Green buildings. The programme aims to enable participants to adopt a common sense approach to green buildings, one that blends traditional wisdom with modern science.
214
An estimated 50,000 to 60,000 farmworkers between the ages of 14 and 16 might be affected by proposed changes to child labor laws. Stricter regulations bring new training requirements Producers could soon lose a share of their farmworkers or be subject to big fines if one of those workers sustains a serious injury, or dies, in a farm accident. The U.S. Department of Labor’s Wage and Hour Division is now poring over the more than 3,000 comments it received on its proposed changes to the Hazardous Occupations Orders for Agricultural Employment. The changes will affect hired farmworkers between the ages of 14 and 16 regardless of their immigration status. Children working on farms owned or operated by their parents will continue to be exempt from the orders. While no one knows for sure exactly how many young workers would be affected by the changes, the Department of Labor estimates that between 50,000 and 60,000 hired farmworkers are between the ages of 14 and 16. The most important of the proposed child labor changes—the first in more than three decades—that crop producers need to be aware of include: - The tractor-safety certification training required for these workers to be able to operate tractors and other farm machinery would be increased from 20 hours to 90 hours. Children enrolled in the program, however, could work and operate farm machinery while taking the training. - The height at which these children could work would be lowered from the current 20' to 6'. - They would be banned from working in grain elevators. - They would not be allowed to use electronic devices such as iPods or cell phones while operating a motor vehicle such as a tractor (GPS is an exception). - Tractors operated by these workers would need to have rollover protection and a proper seat belt. "Farmers have big concerns about some of the proposed changes," says Craig Lang, president of the Iowa Farm Bureau Federation and a fifth-generation dairy producer from Brooklyn, Iowa. A lot of kids work for neighbors, and there are certain things parents would like their kids to be able to do when they reach age 14 or 15—including running a tractor and other farm machinery, Lang says. The proposed change that Lang and others have the biggest objection to is the extended requirement for tractor-safety certification. "There’s no realistic way to financially support the expanded training," says Bob Aherin, an ag engineer specializing in farm safety at the University of Illinois. "There are very few Extension programs that would have the capacity to offer the coursework. It would be great if we could get young people to go through a 90-hour training, but I just don’t see it happening." The height restriction is also an issue. "Farmers view this as another intrusion of government into the private lives of citizens," Lang says. "Parents should be able to determine whether it is safe for their child to work for a neighbor and at what height. When does the intrusion of government stop and allow good parenting to take over?" Greg Rinehart farms 900 acres near Boone, Iowa, with the help of his 10 children. He’s concerned that kids across the country—particularly those in locations far from city centers—will lose out on the opportunity to work on farms if the proposed rules go into effect. "Kids learn great work ethics on farms," Rinehart says. "They learn the value of hard work, work skills and life lessons. We don’t want to limit kids’ exposure to farms and farm work." The penalty could reach $100,000, the maximum allowed by law, for employers who knowingly violate the orders and employ an untrained child worker in a hazardous job who sustains serious dismemberment or dies. "Minor violations could result in a warning," says Michael Hancock, assistant administrator for policy at the Department of Labor’s Wage and Hour Division. "The secretary of labor really believes in these regulations. To expect a final ruling in 2012 is not too ambitious. This is a life and death issue for children." According to study conducted by the General Accounting Office, 4% of all working youth during the 1990s were employed in agriculture, but they experienced more than 40% of the youth occupational fatalities. The Bureau of Labor Statistics reported that agricultural workers ages 15 to 17 have a risk of dying that’s 4.4 times greater than the average 15- to 17-year-old worker. The greatest risk of death comes from tractor rollovers. - January 2012
466
Recent medical reports suggest that ingested aluminum has a direct link to Alzheimer's, attention deficit disorder, bone degeneration, kidney dysfunction, and even Parkinson's disease. Studies have also shown that aluminum salts can be absorbed from the intestines and concentrated in various human tissues. Most baking powder products, a staple in some households, contain toxic levels of aluminum. With all this known, you probably would wonder why aluminum is allowed in baking powder and why anyone would use it. The baking powders that contain aluminum are ‘double-acting’ indicating that although some of the leavening power is released when the mix is prepared, the greater leavening takes place when the item is baked. This produces a very fine, light texture, and is appreciated particularly in commercial baking, where mixes often sit for long periods before they go into the oven. But it isn’t necessary for your baking. For a lighter texture, just bake the mix immediately. Also, if you've ever experienced a bitter, "tinny" flavor when biting into a muffin, that's because of the baking powder used—and often the overuse of it. Using aluminum free baking powder not only will keep you from ingesting aluminum, but will also take away that bitter flavor. April 10, 2011 at 9:41 pm My son is allergic to corn. There is only one brand of baking powder (that I know of) that does not have cornstarch in it. Does this have cornstarch? January 24, 2012 at 10:35 pm Try the Arrowroot powder. xx April 1, 2012 at 2:33 pm RE: Baking Powder - Make your own. It's easier to find aluminum-free baking soda than baking powder: 1 teaspoon baking soda 2 teaspoons cream of tartar 1 teaspoon corn starch (optional - can use arrowroot instead of corn starch) Mix the baking soda and cream of tartar together until well combined. Use immediately. Yield: One tablespoon of baking powder. To store baking powder: Add a teaspoon of corn starch to the mixture, and stir. This will absorb any moisture from the air, and prevent the baking powder from reacting before you need it. Store in an air-tight container.
121